Powered by Deep Web Technologies
Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; L. Masinter; P. Leach; T. Berners-Lee

1999-06-01T23:59:59.000Z

2

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; T. Berners-Lee

1997-01-01T23:59:59.000Z

3

Efficient Data Transfer Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

4

An object-oriented implementation of the Xpress Transfer Protocol  

SciTech Connect

Object-oriented design principles map well onto protocol implementations because protocols essentially manipulate two structures - packets and the states of the endpoints. In this paper the authors describe an implementation of the Xpress Transfer Protocol as a user space daemon written in C++. The object-oriented model forces the programmer to properly place functionality and information ownership. The model facilitates porting to various platforms and greatly eases the task of building data delivery services.

Strayer, W.T.; Gray, S.; Cline, R.E. Jr.

1994-10-01T23:59:59.000Z

5

Noema: A Metalanguage for Scripting Versionable Hypertexts  

Science Conference Proceedings (OSTI)

In this paper we present Noema, a new intensional hypertext metalanguage based on both intensional HTML and XML. The design of Noema aims at the improvement of the expressiveness of intensional HTML and introduces principles such as intensional XML-like ...

Ioannis T. Kassios; m. c. schraefel

2002-04-01T23:59:59.000Z

6

HyperSea: towards a spatial hypertext environment for web 2.0 content  

Science Conference Proceedings (OSTI)

In this paper, we present HyperSea, an environment for importing, organizing and interacting with web 2.0 content. The environment is based mainly on previous research on hypertext systems, spatial hypertext and it tries to overcome presentation limitations ... Keywords: hypertext structure, spatial hypertext, web 2.0 content

Georgios D.P. Styliaras; Sotiris P. Christodoulou

2009-06-01T23:59:59.000Z

7

Proceedings of the 24th ACM Conference on Hypertext and Social Media  

Science Conference Proceedings (OSTI)

We welcome all participants to the 24th ACM Conference on Hypertext and Social Media (Hypertext 2013), which will be held in Paris, France, from May 1st until May 3rd, 2013. The ACM Hypertext and Social Media conference series is a premium venue for ...

Gerd Stumme, Andreas Hotho

2013-05-01T23:59:59.000Z

8

On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols  

Science Conference Proceedings (OSTI)

No quantum key distribution (QKD) protocol has been proved fully secure. A remaining problem is the eavesdropper's ability to make coherent measurements on the joint properties of large composite systems. This problem has been recently solved by Yao ...

Dominic Mayers

1995-08-01T23:59:59.000Z

9

Automatic detection of cohesive subgroups within social hypertext: A heuristic approach  

Science Conference Proceedings (OSTI)

The problem of identifying cohesive subgroups in social hypertext is reviewed. A computationally efficient three-step framework for identifying cohesive subgroups is proposed, referred to as the Social Cohesion Analysis of Networks (SCAN) method. In ... Keywords: Cluster Analysis, Cohesive Subgroups, Network Centrality, Online Community, Similarity Measurement, Social Hypertext, Social Networks, Subgroup Evolution

Alvin Chin; Mark Chignell

2008-01-01T23:59:59.000Z

10

How much is too much in a hypertext link?: investigating context and preview -- a formative evaluation  

Science Conference Proceedings (OSTI)

A high quality of free movement, or mobility, is key to the accessibility, design, and usability of many 'common-use' hypermedia resources (Web sites) and key to good mobility is context and preview. This is especially the case when a hypertext anchor ... Keywords: document engineering, evaluation, hypertext, web mobility

Simon Harper; Yeliz Yesilada; Carole Goble; Robert Stevens

2004-08-01T23:59:59.000Z

11

Comparison of edit history clustering techniques for spatial hypertext  

E-Print Network (OSTI)

History mechanisms available in hypertext systems allow access to past user interactions with the system. This helps users evaluate past work and learn from past activity. It also allows systems identify usage patterns and potentially predict behaviors with the system. Thus, recording history is useful to both the system and the user. Various tools and techniques have been developed to group and annotate history in Visual Knowledge Builder (VKB). But the problem with these tools is that the operations are performed manually. For a large VKB history growing over a long period of time, performing grouping operations using such tools is difficult and time consuming. This thesis examines various methods to analyze VKB history in order to automatically group/cluster all the user events in this history. In this thesis, three different approaches are compared. The first approach is a pattern matching approach identifying repeated patterns of edit events in the history. The second approach is a rule-based approach that uses simple rules, such as group all consecutive events on a single object. The third approach uses hierarchical agglomerative clustering (HAC) where edits are grouped based on a function of edit time and edit location. The contributions of this thesis work are: (a) developing tools to automatically cluster large VKB history using these approaches, (b) analyzing performance of each approach in order to determine their relative strengths and weaknesses, and (c) answering the question, how well do the automatic clustering approaches perform by comparing the results obtained from this automatic tool with that obtained from the manual grouping performed by actual users on a same set of VKB history. Results obtained from this thesis work show that the rule-based approach performs the best in that it best matches human-defined groups and generates the fewest number of groups. The hierarchic agglomerative clustering approach is in between the other two approaches with regards to identifying human-defined groups. The pattern-matching approach generates many potential groups but only a few matches with those generated by actual VKB users.

Mandal, Bikash

2005-12-01T23:59:59.000Z

12

A hypertext model for accessing complex information: the reconstruction of a journey through Italy and Greece  

E-Print Network (OSTI)

The objective of this study is to construct a model of a computer based hypertext environment to enable easier access to complex information while providing the viewer with greater insight into a particular subject matter than could traditional text. The study addresses the importance of active participation and the relationship of new knowledge with existing knowledge, both of which the hypertext environment supports. The project will compile my postcards, sketches and journal entries which were gathered during a semester long study abroad program in Italy. The hypertext will provide the viewer with an opportunity to choose items of personal interest and experience the Italian culture in a way which is specific to each person. The project will be organized geographically, to simulate the traveling experience. It will feature various levels of personal involvement, allowing the viewer to merely observe images of sites, or to explore deeply into the culture and the people through my documented experiences. The goal is to present many facets of a complex land and culture within a medium better suited than traditional text to allowing the user choices as to how they wish to explore such an environment.

Parrish, David Allen

1995-01-01T23:59:59.000Z

13

PROTOCOLS MANUAL  

NLE Websites -- All DOE Office Websites (Extended Search)

as your end-user's. For instance, if you always issue the same set of commands when you enter SPIRES, you can assemble the commands in a protocol and add it, with your account as...

14

Effective Protocols for Mobile Communications and Networking  

SciTech Connect

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

15

NFS version 4 Protocol  

Science Conference Proceedings (OSTI)

NFS (Network File System) version 4 is a distributed file system protocol which owes heritage to NFS protocol versions 2 [RFC1094] and 3 [RFC1813]. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2000-12-01T23:59:59.000Z

16

The Financial Management Environment (FaME): A prototype interactive hypertext-based financial planning and reporting system  

Science Conference Proceedings (OSTI)

It is critical in every government, research, and industrial organization that accurate and timely financial information be made available at all levels so that, project and business decisions can be made within funding constraints. The FaME prototype implemented at Oak Ridge National Laboratory extracts financial data from a legacy system, builds easy-to-understand reports and graphs, and presents them on-line so that people at all levels in an organization can assess the financial status of individual projects or entire organizations. Reports are presented in hypertext and graphical formats that can be read with popular World Wide Web browsers such as NCSA Mosaic or Netscape. All reports are hyper-linked in a natural way to simplify navigation and information retrieval. To protect potentially sensitive information, FAME provides access control so that individuals can retrieve only the information that is required for them to carry out their financial duties. In addition to the reports and graphs, FAME includes budget building tools to provide for financial planning. Another primary feature is that the prototype 1 utilizes equipment that already exists on the user`s desktop. The overall goal of the FAME system is to provide users with precise and meaningful information on the financial status of an organization or project at a glance.

Barnes, K.D.; Donato, J.M.; Flanagan, D.M. [and others

1995-11-01T23:59:59.000Z

17

Delta Coherence Protocols: The Home Update Protocol  

SciTech Connect

We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

Williams, C.; Reynolds, P.F.; de Supinoki, B.

2000-07-21T23:59:59.000Z

18

Efficient Wide Area Data Transfer Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

stood the challenges presented by their extraordinary instru- ment in terms of data generation, distribution, and analysis. Many other research disciplines are now facing the...

19

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network (OSTI)

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil. This fact alone tells us that oil is a finite resource, which in turn means that it is subject to depletion1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict

Keeling, Stephen L.

20

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks  

E-Print Network (OSTI)

This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

Yu, Hong

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Commercial Buildings Communications protocols  

Science Conference Proceedings (OSTI)

There are many automation and control protocols in use in commercial building and residential sectors today. For both commercial building and residential sectors there are several thousand manufacturers throughout the world that supply end-use electrical appliances and other building fixtures that communicate using these automation and control protocols. Some of these protocols are based on open standards (for example, BACnet, DALI) while others are semi-proprietary (for example, Zigbee, LonWorks, Modbus...

2008-05-15T23:59:59.000Z

22

Aliasing on the world wide web: prevalence and performance implications  

Science Conference Proceedings (OSTI)

Aliasing occurs in Web transactions when requests containing different URLs elicit replies containing identical data payloads. Conventional caches associate stored data with URLs and can therefore suffer redundant payload transfers due to aliasing and ... Keywords: DTD, HTTP, WWW, Zipf's law, aliasing, cache hierarchies, caching, duplicate suppression, duplicate transfer detection, hypertext transfer protocol, performance analysis, redundant transfers, resource modification, world wide web

Terence Kelly; Jeffrey Mogul

2002-05-01T23:59:59.000Z

23

House Simulation Protocols Report  

Energy.gov (U.S. Department of Energy (DOE))

Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and...

24

Web Recency Maintenance Protocol  

Science Conference Proceedings (OSTI)

In this paper, we propose a new protocol namely Web Recency Maintenance Protocol (WRMP) that employs "push" mechanism to maintain the currency of the World Wide Web (WWW) at Search Engine (SE) site. As of this writing SEs are adopting "pull" technology, ...

K. Satya Sai Prakash; S. V. Raghavan

2002-12-01T23:59:59.000Z

25

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

26

Office Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Oversight » Safety & Emergency Management Evaluations Services » Oversight » Safety & Emergency Management Evaluations » Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

27

Designing Security Properties-Centric Communication Protocols using a Component-Based Approach  

Science Conference Proceedings (OSTI)

Numerous communication protocols have been designed offering a set of security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and security properties they ... Keywords: Communication Protocols, Component-based Approach, Electronic Document Transfer, Security Components, Security Properties

N. Nobelis; K. Boudaoud; C. Delettre; M. Riveill

2012-01-01T23:59:59.000Z

28

An Evaluation of UDP Transport Protocols  

Science Conference Proceedings (OSTI)

Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

Carter, S

2004-12-21T23:59:59.000Z

29

SCADA protocol vulnerabilities  

Science Conference Proceedings (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

30

The SUPDUP Protocol  

E-Print Network (OSTI)

The SUPDUP protocol provides for login to a remote system over a network with terminal-independent output, so that only the local system need know how to handle the user's terminal. It offers facilities for graphics and ...

Stallman, Richard M.

1983-07-01T23:59:59.000Z

31

A Protocol for Quantum Energy Distribution  

E-Print Network (OSTI)

A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

Masahiro Hotta

2008-03-11T23:59:59.000Z

32

Optimal protocols for nonlocality distillation  

Science Conference Proceedings (OSTI)

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

33

APS Protocol for  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

34

Accountable internet protocol (aip)  

Science Conference Proceedings (OSTI)

This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding ... Keywords: accountability, address, internet architecture, scalability, security

David G. Andersen; Hari Balakrishnan; Nick Feamster; Teemu Koponen; Daekyeong Moon; Scott Shenker

2008-08-01T23:59:59.000Z

35

Protocols from perceptual observations  

Science Conference Proceedings (OSTI)

This paper presents a cognitive vision system capable of autonomously learning protocols from perceptual observations of dynamic scenes. The work is motivated by the aim of creating a synthetic agent that can observe a scene containing interactions between ... Keywords: Autonomous learning, Cognitive vision, Inductive logic programming, Spatio-temporal reasoning, Symbol grounding, Unsupervised clustering

Chris J. Needham; Paulo E. Santos; Derek R. Magee; Vincent Devin; David C. Hogg; Anthony G. Cohn

2005-09-01T23:59:59.000Z

36

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

37

Transferring Data  

NLE Websites -- All DOE Office Websites (Extended Search)

, 2012 David Turner NERSC User Services Group * Secure Shell (ssh) - Protocol version 2 since 2006 - Encrypts all communications * Control - Prevents password "sniffing" * Data -...

38

Supplement No. 2 to the FUSRAP Summary Protocol Verification and Certification Protocol  

Energy.gov (U.S. Department of Energy (DOE))

Supplement No. 2 to the FUSRAP Summary Protocol Verification and Certification Protocol (November 1985, Rev. 1)

39

Securing Block Storage Protocols over IP  

Science Conference Proceedings (OSTI)

This document discusses how to secure block storage and storage discovery protocols running over IP (Internet Protocol) using IPsec and IKE (Internet Key Exchange). Threat models and security protocols are developed for iSCSI (Internet Protocol Small ...

B. Aboba; J. Tseng; J. Walker; V. Rangan; F. Travostino

2004-04-01T23:59:59.000Z

40

Protocols for wide-area data-intensive applications: design and performance issues  

Science Conference Proceedings (OSTI)

Providing high-speed data transfer is vital to various data-intensive applications. While there have been remarkable technology advances to provide ultra-high-speed network bandwidth, existing protocols and applications may not be able to fully utilize ...

Yufei Ren; Tan Li; Dantong Yu; Shudong Jin; Thomas Robertazzi; Brian L. Tierney; Eric Pouyoul

2012-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Tech Transfer  

Tech Transfer The Industrial Partnerships Office is improving tech transfer processes with our very own Yellow Belt. Several of the Lab's process ...

42

RDMA read based rendezvous protocol for MPI over InfiniBand: design alternatives and benefits  

Science Conference Proceedings (OSTI)

Message Passing Interface (MPI) is a popular parallel programming model for scientific applications. Most high-performance MPI implementations use Rendezvous Protocol for efficient transfer of large messages. This protocol can be designed using either ... Keywords: InfiniBand, MPI, communication overlap

Sayantan Sur; Hyun-Wook Jin; Lei Chai; Dhabaleswar K. Panda

2006-03-01T23:59:59.000Z

43

Appraisal Process Protocols, Independent Oversight - November...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Protocols, Independent Oversight - November 2012 Appraisal Process Protocols, Independent Oversight - November 2012 November 2012 Updated Independent Oversight...

44

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

45

Energy Efficiency Savings Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

46

Transferring Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Transferring Data Transferring Data to and from NERSC Yushu Yao 1 Tuesday, March 8, 2011 Overview 2 * Structure of NERSC Systems and Disks * Data Transfer Nodes * Transfer Data from/to NERSC - scp/sftp - bbcp - GridFTP * Sharing Data Within NERSC Tuesday, March 8, 2011 Systems and Disks 3 System Hopper Franklin Carver Euclid Data Transfer Node PDSF Global Home ($HOME) Global Scratch ($GSCRATCH) Project Directory Local Non-shared Scratch Data transfer nodes can access most of the disks, suggested for transferring data in/out NERSC Tuesday, March 8, 2011 Data Transfer Nodes * Two Servers Available Now: - dtn01.nersc.gov and dtn02.nersc.gov - Accessible by all NERSC users * Designed to Transfer Data: - High speed connection to HPSS and NGF (Global Home, Project, and Global Scratch) - High speed ethernet to wide area network

47

VITP: an information transfer protocol for vehicular computing  

Science Conference Proceedings (OSTI)

Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deployment of a wide variety of vehicular applications and services. In this paper, ... Keywords: location-based services, middleware, vehicular computing

Marios D. Dikaiakos; Saif Iqbal; Tamer Nadeem; Liviu Iftode

2005-09-01T23:59:59.000Z

48

Scalable RFID Security Protocols supporting Tag Ownership Transfer  

E-Print Network (OSTI)

server, then the damage would be very serious. · Tag Tracking: if the responses of a tag are linkable be able to resist tag track- ing attacks. If messages from tags are anonymous, then the problem of tag its identifier. Tag tracking is thus partially possible [10], as in the HM scheme. The RFID

Sheldon, Nathan D.

49

Technology Transfer  

A new search feature has been implemented, which allows searching of technology transfer information across the Department of Energy Laboratories.

50

Protocols and Systems Services  

E-Print Network (OSTI)

Current data-centers rely on TCP/IP over Fast- and Gigabit-Ethernet for data communication even within the cluster environment for costeffective designs, thus limiting their maximum capacity. Together with raw performance, such data-centers also lack in efficient support for intelligent services, such as requirements for caching documents, managing limited physical resources, load-balancing, controlling overload scenarios, and prioritization and QoS mechanisms, that are becoming a common requirement today. On the other hand, the System Area Network (SAN) technology is making rapid advances during the recent years. Besides high performance, these modern interconnects are providing a range of novel features and their support in hardware (e.g., RDMA, atomic operations, QoS support). In this paper, we address the capabilities of these current generation SAN technologies in addressing the limitations of existing data-centers. Specifically, we present a novel framework comprising of three layers (communication protocol support, data-center service primitives and advanced data-center services) that work together to tackle the issues associated with existing data-centers. We also present preliminary results in the various aspects of the framework, which demonstrate close to an order of magnitude performance benefits achievable by our framework as compared to existing data-centers in several cases.

Balaji Vaidyanathan Narravula; P. Balaji; K. Vaidyanathan; S. Narravula; H. -w. Jin; D. K. Panda

2006-01-01T23:59:59.000Z

51

HHuubbbbllee SSppaaccee TTeelleessccooppee Servicing Mission 4  

E-Print Network (OSTI)

Operator pull-out push-out pull-in push-in , Context Node Cpull-out push-out push-out ,CB A pullpush information between two physical enti- ties. This distribution is implemented as a connector based on the HyperText Transfer Protocol (HTTP). This connector is composed of i) an HTTP server publishing part

Colorado at Boulder, University of

52

Don't optimize existing protocols, design optimizable protocols  

Science Conference Proceedings (OSTI)

As networks grow in size and complexity, network management has become an increasingly challenging task. Many protocols have tunable parameters, and optimization is the process of setting these parameters to optimize an objective. In recent years, optimization ...

Jiayue He; Jennifer Rexford; Mung Chiang

2007-07-01T23:59:59.000Z

53

Network File System (NFS) version 4 Protocol  

Science Conference Proceedings (OSTI)

The Network File System (NFS) version 4 is a distributed filesystem protocol which owes heritage to NFS protocol version 2, RFC 1094, and version 3, RFC 1813. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2003-04-01T23:59:59.000Z

54

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocols Report This image shows a cover of a report titled "Building America House Simulation Protocols." The Building America logo is shown in the lower left corner of...

55

Simulatable security for quantum protocols  

E-Print Network (OSTI)

The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a larger one. Recently, these methods have received much attention in the quantum cryptographic community. We give a short introduction to simulatable security in general and proceed by sketching the many different definitional choices together with their advantages and disadvantages. Based on the reactive simulatability modelling of Backes, Pfitzmann and Waidner we then develop a quantum security model. By following the BPW modelling as closely as possible, we show that composable quantum security definitions for quantum protocols can strongly profit from their classical counterparts, since most of the definitional choices in the modelling are independent of the underlying machine model. In particular, we give a proof for the simple composition theorem in our framework.

Dominique Unruh

2004-09-18T23:59:59.000Z

56

RadNet: Open network protocol for radiation data  

SciTech Connect

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

57

DotDFS: A Grid-based high-throughput file transfer system  

Science Conference Proceedings (OSTI)

DotGrid platform is a Grid infrastructure integrated with a set of open and standard protocols recently implemented on the top of Microsoft .NET in Windows and MONO .NET in UNIX/Linux. DotGrid infrastructure along with its proposed protocols provides ... Keywords: Concurrent systems, Data grids, Event-driven architecture, File transfer protocols, Grid computing, Grid security, High throughput file transfer, Modeling parallel TCP throughput

Alireza Poshtkohi; M. B. Ghaznavi-Ghoushchi

2011-02-01T23:59:59.000Z

58

Formal apparatus for measurement of lightweight protocols  

Science Conference Proceedings (OSTI)

Lightweight protocols are an important topic in the area of computer communications. With the proliferation of security services not only ordinary communication protocols, but also cryptographic protocols, i.e. security services, have become a subject ... Keywords: Lightweight protocols, Security, Security services metrics, Standardization, Ubiquitous computing

Denis Tr?ek; Damjan Kova?

2009-02-01T23:59:59.000Z

59

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

60

Evaluation of replacement protocols and modifications to TCP to enhance ASC Wide Area Network performance.  

SciTech Connect

Historically, TCP/IP has been the protocol suite used to transfer data throughout the Advanced Simulation and Computing (ASC) community. However, TCP was developed many years ago for an environment very different from the ASC Wide Area Network (WAN) of today. There have been numerous publications that hint of better performance if modifications were made to the TCP algorithms or a different protocol was used to transfer data across a high bandwidth, high delay WAN. Since Sandia National Laboratories wants to maximize the ASC WAN performance to support the Thor's Hammer supercomputer, there is strong interest in evaluating modifications to the TCP protocol and in evaluating alternatives to TCP, such as SCTP, to determine if they provide improved performance. Therefore, the goal of this project is to test, evaluate, compare, and report protocol technologies that enhance the performance of the ASC WAN.

Romero, Randy L. Jr.

2004-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Summary Protocol: Identification, Characterization, Designation, Remedial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

62

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

63

FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL  

E-Print Network (OSTI)

the SCADA networks protocols. Here the critical features of some common SCADA protocols will be presented

Dutertre, Bruno

64

An ATM Adaptation Layer for Reliable Transfers  

Science Conference Proceedings (OSTI)

There has been much attention given to ATM Adaptation Layers (AAL) over the ten-year history of ATM standardization. Yet none of the existing standards include a retransmission protocol to ensure reliability of the transfers. In this paper we propose ...

Gunnar Karlsson

1996-09-01T23:59:59.000Z

65

Oblivious transfer with complex attribute-based access control  

Science Conference Proceedings (OSTI)

In this paper, we present oblivious transfer with complex attribute-based access control policies. The protocol allows a database server to directly enforce "and" and "or" access control policies (c11 ? c12 ... Keywords: access control, attribute-based encryption, oblivious transfer

Lingling Xu; Fangguo Zhang

2010-12-01T23:59:59.000Z

66

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

67

IPv6 Advanced Protocols Implementation  

Science Conference Proceedings (OSTI)

This book is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not ...

Qing Li; Jinmei Tatuya; Keiichi Shima

2007-04-01T23:59:59.000Z

68

An empirical study of TCP/IP performance over ATM1This paper was also presented at the Transport Protocols for High Speed Broadband Networks Workshop, at Globecom'96, in Westminster, London, UK, on 22 November, 1996. 1  

Science Conference Proceedings (OSTI)

This paper outlines some basic performance characteristics of the Transmission Control Protocol/Internet Protocol (TCP/IP) over Asynchronous Transfer Mode (ATM). It also discusses a few solutions to assure acceptable TCP/IP performance over ATM which ... Keywords: ATM, Physical layer convergence protocol, TCP/IP performance

Is?L SebKtekin; Tony J Bogovic; Padma Krishnaswamy

1998-08-01T23:59:59.000Z

69

Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency & Renewable and Energy - Commercialization Energy Efficiency & Renewable and Energy - Commercialization Deployment SBIR/STTR - Small Business Innovation Research and Small Business Technology Transfer USEFUL LINKS Contract Opportunities: FBO.gov FedConnect.net Grant Opportunities DOE Organization Chart Association of University Technology Managers (AUTM) Federal Laboratory Consortium (FLC) Feedback Contact us about Tech Transfer: Mary.McManmon@science.doe.gov Mary McManmon, 202-586-3509 link to Adobe PDF Reader link to Adobe Flash player Licensing Guide and Sample License The Technology Transfer Working Group (TTWG), made up of representatives from each DOE Laboratory and Facility, recently created a Licensing Guide and Sample License [762-KB PDF]. The Guide will serve to provide a general understanding of typical contract terms and provisions to help reduce both

70

Cryptographic voting protocols: a systems perspective  

Science Conference Proceedings (OSTI)

Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software ...

Chris Karlof; Naveen Sastry; David Wagner

2005-07-01T23:59:59.000Z

71

Improving Accelerated Weathering Protocols to Anticipate ...  

Science Conference Proceedings (OSTI)

... Step # Water Spray Irradiance ... water sprays during the dark cycle augmented with numerous shorter sprays ? New Protocol correctly ...

2013-04-19T23:59:59.000Z

72

Independent Oversight Appraisal Process Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

73

Independent Oversight Appraisal Process Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

74

Former Worker Program Medical Protocol | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medical Protocol Former Worker Program Medical Protocol April 2013 The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which...

75

Deriving Efficient Cache Coherence Protocols Through Refinement  

Science Conference Proceedings (OSTI)

We address the problem of developing efficient cache coherence protocols for use in distributed systems implementing distributed shared memory (DSM) using message passing. A serious drawback of traditional approaches to this problem is that the users ... Keywords: DSM protocols, communication protocols, refinement

Ratan Nalumasu; Ganesh Gopalakrishnan

2002-01-01T23:59:59.000Z

76

Optimal bounds for quantum weak oblivious transfer  

E-Print Network (OSTI)

Oblivious transfer is a fundamental cryptographic primitive in which Bob transfers one of two bits to Alice in such a way that Bob cannot know which of the two bits Alice has learned. We present an optimal security bound for quantum oblivious transfer protocols under a natural and demanding definition of what it means for Alice to cheat. Our lower bound is a smooth tradeoff between the probability B with which Bob can guess Alice's bit choice and the probability A with which Alice can guess both of Bob's bits given that she learns one of the bits with certainty. We prove that 2B + A is greater than or equal to 2 in any quantum protocol for oblivious transfer, from which it follows that one of the two parties must be able to cheat with probability at least 2/3. We prove that this bound is optimal by exhibiting a family of protocols whose cheating probabilities can be made arbitrarily close to any point on the tradeoff curve.

Andr Chailloux; Gus Gutoski; Jamie Sikora

2013-10-11T23:59:59.000Z

77

Implementing Network File System Protocol for Highly Available Clustered Applications on Network Attached Storage  

Science Conference Proceedings (OSTI)

This paper introduces method for implementing NFS protocol for larger block/network packets transfer over to NAS [Network Attached Storage] from Highly Available clients. NAS storage scalability is habitually inadequate to the volume of the appliance. ... Keywords: NAS, NFS, RPC, RAID

K. J. Latesh Kumar

2013-09-01T23:59:59.000Z

78

Analyzing the effect of routing protocols on media access control protocols in radio networks  

SciTech Connect

We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

79

TECHNOLOGY TRANSFER  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

404-NOV. 1, 2000 404-NOV. 1, 2000 TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 VerDate 11-MAY-2000 04:52 Nov 16, 2000 Jkt 089139 PO 00000 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL404.106 APPS27 PsN: PUBL404 114 STAT. 1742 PUBLIC LAW 106-404-NOV. 1, 2000 Public Law 106-404 106th Congress An Act To improve the ability of Federal agencies to license federally owned inventions. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ''Technology Transfer Commer- cialization Act of 2000''. SEC. 2. FINDINGS. The Congress finds that- (1) the importance of linking our unparalleled network of over 700 Federal laboratories and our Nation's universities with United States industry continues to hold great promise

80

Electron Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

3 3 Pierre Kennepohl1,2 and Edward Solomon1* 1Department of Chemistry, Stanford University, Stanford, CA 94305 Electron transfer, or the act of moving an electron from one place to another, is amongst the simplest of chemical processes, yet certainly one of the most critical. The process of efficiently and controllably moving electrons around is one of the primary regulation mechanisms in biology. Without stringent control of electrons in living organisms, life could simply not exist. For example, photosynthesis and nitrogen fixation (to name but two of the most well-known biochemical activities) are driven by electron transfer processes. It is unsurprising, therefore, that much effort has been placed on understanding the fundamental principles that control and define the simple act of adding and/or removing electrons from chemical species.

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

NETL: Technology Transfer - History of Technology Transfer  

History of Technology Transfer Technology transfer differs from providing services or products (e.g., acquisition) and financial assistance (e.g., ...

82

California Energy Efficiency Evaluation Protocols | Building...  

NLE Websites -- All DOE Office Websites (Extended Search)

bpCaliforniaEnergyEfficiencyEvaluationProtocols.pdf Document Details Affiliation: California Public Utilities Commission Focus: Adoption Compliance Building Type: Commercial...

83

Transportation Protocols Working Group First Conference Call...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

84

Field Monitoring Protocol: Heat Pump Water Heaters  

NLE Websites -- All DOE Office Websites (Extended Search)

Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson National Renewable Energy Laboratory C.E. Hancock Mountain Energy...

85

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

86

Capture Effect of Randomly Addressed Polling Protocol  

Science Conference Proceedings (OSTI)

The capture effect, discussed in this paper, is generally considered to enhance the systems performance in a wireless network. This paper also considers the Randomly Addressed Polling (RAP) protocol in the presence of a fading mobile radio ... Keywords: capture effect, noiseless, randomly addressed polling protocol

Jiang-Whai Dai

1999-06-01T23:59:59.000Z

87

Security protocols, properties, and their monitoring  

Science Conference Proceedings (OSTI)

This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties ... Keywords: language-based security, monitoring of history-based properties, runtime verification, security automata, security protocols, temporal logic

Andreas Bauer; Jan Juerjens

2008-05-01T23:59:59.000Z

88

Proof-Based design of security protocols  

Science Conference Proceedings (OSTI)

We consider the refinement-based process for the development of security protocols. Our approach is based on the Event B refinement, which makes proofs easier and which makes the design process faithfull to the structure of the protocol as the designer ...

Nazim Benaissa; Dominique Mry

2010-06-01T23:59:59.000Z

89

RTP Control Protocol Extended Reports (RTCP XR)  

Science Conference Proceedings (OSTI)

This document defines the Extended Report (XR) packet type for the RTP Control Protocol (RTCP), and defines how the use of XR packets can be signaled by an application if it employs the Session Description Protocol (SDP). XR packets are composed of ...

T. Friedman; R. Caceres; A. Clark

2003-11-01T23:59:59.000Z

90

Scaling HEP to Web size with RESTful protocols: The frontier example  

SciTech Connect

The World-Wide-Web has scaled to an enormous size. The largest single contributor to its scalability is the HTTP protocol, particularly when used in conformity to REST (REpresentational State Transfer) principles. High Energy Physics (HEP) computing also has to scale to an enormous size, so it makes sense to base much of it on RESTful protocols. Frontier, which reads databases with an HTTP-based RESTful protocol, has successfully scaled to deliver production detector conditions data from both the CMS and ATLAS LHC detectors to hundreds of thousands of computer cores worldwide. Frontier is also able to re-use a large amount of standard software that runs the Web: on the clients, caches, and servers. I discuss the specific ways in which HTTP and REST enable high scalability for Frontier. I also briefly discuss another protocol used in HEP computing that is HTTP-based and RESTful, and another protocol that could benefit from it. My goal is to encourage HEP protocol designers to consider HTTP and REST whenever the same information is needed in many places.

Dykstra, Dave; /Fermilab

2011-01-01T23:59:59.000Z

91

House Simulation Protocols Report | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Buildings » Building America » House Simulation Residential Buildings » Building America » House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

92

Routing Protocols and Concepts, CCNA Exploration Companion Guide  

Science Conference Proceedings (OSTI)

Routing Protocols and Concepts CCNA Exploration Companion Guide Routing Protocols and Concepts, CCNA Exploration Companion Guide is the official supplemental textbook for the Routing Protocols and Concepts course in the Cisco Networking Academy CCNA ...

Rick Graziani; Allan Johnson

2007-12-01T23:59:59.000Z

93

Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project  

SciTech Connect

This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

1996-03-01T23:59:59.000Z

94

Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA  

E-Print Network (OSTI)

The IEEE 802.15.4 is a wireless standard introduced for low power, low cost wireless communication with moderate data rates. In the next few years, it is expected that Low Rate Wireless Personal Area Networks (LR-WPAN) will be used in a wide variety of embedded applications, including home automation, industrial sensing and control, environmental monitoring and sensing. In these applications, numerous embedded devices running on batteries are distributed in an area communicating via wireless radios. This work presents a method which can be used for comparing current consumption of wireless data transfer embedded systems. This paper implements a small subset of the IEEE 802.15.4 protocol to achieve a point to point communication. The implemented protocol uses 802.15.4 MAC compliant data and acknowledgment packets. Current consumption is measured while doing one data packet transmission. Measurements are compared with existing work. IEEE 802.15.4 protocol implementation is done using Verilog language. Code impl...

Bhat, Naagesh S

2012-01-01T23:59:59.000Z

95

Overview of the InterGroup protocols  

SciTech Connect

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

2001-03-01T23:59:59.000Z

96

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

97

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Name The Greenhouse Gas Protocol Initiative: Allocation...

98

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service...

99

High Performance Computing Data Center Metering Protocol | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

100

Event:GHG Protocol Latin America and Caribbean Regional Training...  

Open Energy Info (EERE)

GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol...

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Kyoto Protocol Response (Alabama) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

102

The Kyoto Protocol and developing countries  

E-Print Network (OSTI)

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

103

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

104

NREL Test-to-Failure Protocol (Presentation)  

DOE Green Energy (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

105

A decision maker for transport protocol configuration  

Science Conference Proceedings (OSTI)

This paper proposes an approach, called Protocol Configuration Decision Maker, for TCP to dynamically adapt to a network environment. The proposed mechanism monitors the network condition with parameters like loss rate. Then it consults a knowledge ...

Jae-Hyun Hwang; Jin-Hee Choi; Chuck Yoo

2006-05-01T23:59:59.000Z

106

Making sensornet MAC protocols robust against interference  

Science Conference Proceedings (OSTI)

Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external interference on state-of-the-art sensornet MAC protocols. Our experiments ...

Carlo Alberto Boano; Thiemo Voigt; Nicolas Tsiftes; Luca Mottola; Kay Rmer; Marco Antonio Ziga

2010-02-01T23:59:59.000Z

107

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

108

Entanglement Distillation Protocols and Number Theory  

E-Print Network (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

109

Transferring Data at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transferring Data Advice and Overview NERSC provides many facilities for storing data and performing analysis. However, transfering data - whether over the wide area network...

110

Jefferson Lab Technology Transfer  

What is Technology Transfer at Jefferson Lab? The transfer of technology (intellectual property) developed at JLab to the private sector is an ...

111

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

112

Transition from Legacy Protocols to IEC 61850  

Science Conference Proceedings (OSTI)

Implementation of International Electrotechnical Commission (IEC) standard 61850, Substation Automation, within a utility is not necessarily easy or straightforward, especially when it is carried out within existing substations. During the transition, it is usually necessary to operate with both older devices supporting only legacy protocols and new, intelligent electronic devices, which now come with the IEC 61850 protocol. Both must coexist for a certain period in a substation ...

2012-12-31T23:59:59.000Z

113

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

114

The security of Ping-Pong protocol  

E-Print Network (OSTI)

Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

Jian-Chuan Tan; An Min Wang

2008-08-28T23:59:59.000Z

115

Accelerating the transfer in Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

Accelerating the transfer in Technology Transfer Accelerating the transfer in Technology Transfer Community Connections: Our link to Northern New Mexico Communities Latest Issue:Dec. 2013 - Jan. 2014 All Issues » submit Accelerating the transfer in Technology Transfer Express Licensing fast tracks commercialization. May 1, 2013 Division Leader Dave Pesiri Division Leader Dave Pesiri. Contact Editor Linda Anderman Email Community Programs Office Kurt Steinhaus Email Express Licensing program To better serve its partners, one of the first improvements the Lab's Technology Transfer Division (TT) has made is through its new Express Licensing initiative. Standardized license agreements and fee structures will remove long and complicated negotiations and decrease the time required to get patented Lab technology and software into the hands of

116

Collaborative Hypertext Editing in Mobile Environment  

Science Conference Proceedings (OSTI)

Collaborative editing systems allow multiple users toedit the same set of documents collaboratively over the computernetworks synchronously or asynchronously. Althoughthey face technical challenges similar to those addressedin the literature of distributed ...

Raymond K. Wong

2004-01-01T23:59:59.000Z

117

User evaluation of automatically generated semantic hypertext ...  

Science Conference Proceedings (OSTI)

... This paper is an interim report on our efforts to ... The work reported on here forms part of our ... the 1977 amendments to the Federal Coal Mine Health ...

118

Clustering hypertext with applications to web searching  

Science Conference Proceedings (OSTI)

Keywords: cluster annotation, feature combination, high-dimensional data, hyperlinks, sparse data, toric k-means algorithm, vector space model

Dharmendra S. Modha; W. Scott Spangler

2000-05-01T23:59:59.000Z

119

Strategy for Verifying Security Protocols with Unbounded Message Size  

Science Conference Proceedings (OSTI)

We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy ... Keywords: automatic strategies, flaw detection, intruder model, security protocols, verification

Y. Chevalier; L. Vigneron

2004-04-01T23:59:59.000Z

120

Towards automated design of MAC protocols for underwater wireless networks  

Science Conference Proceedings (OSTI)

We present a framework for the automated design of MAC protocols for underwater acoustic wireless networks. We formulate a protocol optimization problem in which the exchange of control packets is explicitly modeled. A protocol optimization program generates ... Keywords: automation, mac, network, wireless underwater protocol

Volkan Rodoplu; Amir Aminzadeh Gohari; Wei Tang

2008-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

122

The queue protocol: a deadlock-free, homogeneous, non-two-phase locking protocol  

Science Conference Proceedings (OSTI)

The M-pitfall protocol (MPP) is the most general homogeneous non-two-phase locking protocol which supports shared and exclusive locks. It has two major disadvantages: it is not deadlock-free and it has the paradoxical property that concurrency is often ...

Udo Kelter

1988-03-01T23:59:59.000Z

123

A class-chest for deriving transport protocols  

SciTech Connect

Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

Strayer, W.T.

1996-10-01T23:59:59.000Z

124

Interpolation of recurrence and hashing entanglement distillation protocols  

E-Print Network (OSTI)

We construct new entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method how entanglement-assisted distillation protocols can be converted into non-entanglement-assisted protocols with the same yield.

Karl Gerd H. Vollbrecht; Frank Verstraete

2004-04-20T23:59:59.000Z

125

Interpolation of recurrence and hashing entanglement distillation protocols  

Science Conference Proceedings (OSTI)

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

126

Routing Protocols to Maximize Battery Efficiency  

E-Print Network (OSTI)

In this paper we propose a routing protocol for wireless ad hoc networks whose nodes are largely battery powered. The battery capacity of the nodes is viewed as a common resource of the system and its use is to be optimized. Results from a previous study on battery management have shown that: (1) pulsed current discharge outperforms constant current discharge, (2) battery capacity can be improved by using a bursty discharge pattern due to charge recovery effects that take place during idle periods, (3) given a certain value of current drawn off the battery, higher current impulses degrade battery performance, even if the percentage of higher current impulses is relatively small. We develop a network protocol based on these findings. This protocol favors routes whose links have a low energy cost. We also distribute multihop traffic in a manner that allows all nodes a good chance to recover their battery energy reserve.

Carla F. Chiasserini; Ramesh R. Rao

2000-01-01T23:59:59.000Z

127

NERSC's Data Transfer Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transfer Nodes Data Transfer Nodes Data Transfer Nodes Overview The data transfer nodes are NERSC servers dedicated to performing transfers between NERSC data storage resources such as HPSS and the NERSC Global Filesystem (NGF), and storage resources at other sites including the Leadership Computing Facility at ORNL (Oak Ridge National Laboratory). These nodes are being managed (and monitored for performance) as part of a collaborative effort between ESnet, NERSC, and ORNL to enable high performance data movement over the high-bandwidth 10Gb ESnet wide-area network (WAN). Restrictions In order to keep the data transfer nodes performing optimally for data transfers, we request that users restrict interactive use of these systems to tasks that are related to preparing data for transfer or are directly

128

Test Purpose Generation for Timed Protocol Testing  

Science Conference Proceedings (OSTI)

Test purposes are requirements, usually constructed by hand, which aim at testing critical properties on implementations. These ones are then used by testing methods to generate test cases. Writing them manually is a heavy task, this is why we propose ... Keywords: Timed protocols, conformance testing, test purpose, testability

Sbastien Salva; Antoine Rollet

2009-07-01T23:59:59.000Z

129

Self-Protecting Session Initiation Protocol Stack  

Science Conference Proceedings (OSTI)

We present the Self-Protecting Session Initiation Protocol Stack capable of recognizing malicious SIP messages and protecting itself in high-load conditions. The stack model is based on the two-step processing and uses hash lookup tables and cellular ... Keywords: Cellular automata, Denial of Service, SIP, Self-protecting

Zoran Rusinovic; Nikola Bogunovic

2008-09-01T23:59:59.000Z

130

On communication protocols for tactical navigation assistance  

Science Conference Proceedings (OSTI)

Using tactical navigation systems is popular for military as well as search and rescue applications. For such applications, the significance of the tactical navigation systems arises especially when groups with the same goal move together on the terrain. ... Keywords: C-TRAMAF, Gossip-based ad hoc routing, N-Gossip, communication protocols, cross layer, digital battlefield, tactical navigation

Evren Onem; H. Birkan Yilmaz; Fatih Alagz; Tuna Tugcu

2008-02-01T23:59:59.000Z

131

Symbolic protocol analysis for monoidal equational theories  

Science Conference Proceedings (OSTI)

We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved ...

Stphanie Delaune; Pascal Lafourcade; Denis Lugiez; Ralf Treinen

2008-02-01T23:59:59.000Z

132

A Simulation Model of the DOCSIS Protocol  

Science Conference Proceedings (OSTI)

The number of households and businesses using hybrid fiber coaxial cable networks for Internet access is rapidly approaching 40 million in the United States. The cable industry has standardized on a single medium access control (MAC) and physical layer ... Keywords: Data Over Cable Service Interface Specification (DOCSIS), Simulation methods, Transmission Control Protocol (TCP) performance, broadband access, hybrid fiber coaxial cable networks

Jim Martin; James Westall

2007-02-01T23:59:59.000Z

133

Measurement Protocols for Optimized Fuel Assembly Tags  

Science Conference Proceedings (OSTI)

This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

Gerlach, David C.; Mitchell, Mark R.; Reid, Bruce D.; Gesh, Christopher J.; Hurley, David E.

2008-11-01T23:59:59.000Z

134

Power-Save Protocols Corey Andalora  

E-Print Network (OSTI)

rate, etc. Outputs Average routing time per packet Overall power consumption of network #12;Project-84, July 2001. #12;BECA Nodes independently transition to the idle state and back to the sleep state. WhenOff By One Power-Save Protocols Corey Andalora Keith Needels #12;Agenda Topic explanation Problem

Kaminsky, Alan

135

Community-Aware Scheduling Protocol for Grids  

Science Conference Proceedings (OSTI)

Much work has been done to exploit the effectiveness and efficiency of job scheduling upon distributed computationalresources. With regard to existing resource topology and administrative constraints, scheduling approaches are designed ... Keywords: Community-Aware Scheduling Protocol, CASP, Grid, Scheduling, SmartGRID, MaGate

Ye Huang; Amos Brocco; Nik Bessis; Pierre Kuonen; Beat Hirsbrunner

2010-04-01T23:59:59.000Z

136

Interaction protocols for cross-organisational workflows  

Science Conference Proceedings (OSTI)

Workflow technologies are widely used in industry and commerce to assist in the specification, execution and completion of well defined processes within organisations. As industrial and commercial relations have evolved, based on advances on information ... Keywords: Cross-organisational workflows, Hierarchical Petry nets, Interaction protocols, Knowledge-based systems, Workflow integration

FlVio Soares CorrA Da Silva; Mirtha Lina FernNdez Venero; Diego Mira David; Mohammad Saleem; Paul W. H. Chung

2013-01-01T23:59:59.000Z

137

Calibrating embedded protocols on asynchronous systems  

Science Conference Proceedings (OSTI)

Embedding is a method of projecting one topology into another. In one-to-one node embedding, paths in the target topology correspond to links in the original topology. A protocol running on the original topology can be modified to be executed on a target ... Keywords: Asynchronous system, Channel system, Distributed system, Fault tolerance, Graph embedding, Transient fault, Virtual topology

Yukiko Yamauchi; Doina Bein; Toshimitsu Masuzawa; Linda Morales; I. Hal Sudborough

2010-05-01T23:59:59.000Z

138

Russia's role in the Kyoto Protocol  

E-Print Network (OSTI)

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

139

Federal Laboratory Technology Transfer  

Science Conference Proceedings (OSTI)

... Department of Energy (DOE) ... and business development involved in successful technology transfer. 8. Government-industry interactions. ...

2012-11-14T23:59:59.000Z

140

SRNL - Technology Transfer - Home  

Technology Transfer. Research and Development Savannah River Nuclear Solutions, LLC (SRNS) scientists and engineers develop technologies designed to improve ...

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Tech Transfer Report 2000  

Science Conference Proceedings (OSTI)

Page 1. Summary Report on Federal Laboratory Technology Transfer FY 2003 Activity Metrics and Outcomes 2004 Report ...

2010-07-27T23:59:59.000Z

142

Developmental issues in environmental reporting protocols  

SciTech Connect

In this paper, we review the policy differences and associated reporting and verification protocols between three energy and/or environmental reporting programs in the United States, specifically the Conservation Verification Protocols (CVP) - a voluntary set of procedures for reporting acid rain reductions from energy conservation, the Greenhouse Gas Voluntary Reporting Program (GGVRP) to acknowledge greenhouse gas-reducing activities, and a national database on energy efficiency programs (DEEP) an informational database on utility demand-side management (DSM) programs. The most important lesson learned in developing these reporting programs is that the accuracy of the program for reporting energy savings activities is dependent upon both the estimation and verification protocols used in the program and the mapping procedures used to generate emission impacts from energy savings. Additionally, the types of protocols that may be used in the program depend upon who is participating in the program. The free market can also be a useful tool in determining how much money reporting entities want to spend on energy savings and emissions reductions estimation and verification protocols by placing a dollar value on atmospheric emissions. After such programs are implemented, the program managers should ensure that an iterative, quality control process is utilized. The reporters of such information must be made aware that their numbers will be reviewed carefully and will be questioned for accuracy. Finally, the accuracy and confidence of the reported information should be reviewed on a periodic basis to ensure that the goals and expectations of the program and the reporting entities are being met.

Schrock, D.W.; Stoops, J.L. [Pacific Northwest Lab., Richland, WA (United States); Meier, A.K.; Vine, E.L. [Lawrence Berkeley Lab., CA (United States); Solomon, B.D. [Environmental Protection Agency (United States)

1994-08-01T23:59:59.000Z

143

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

144

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

145

Heat transfer system  

DOE Patents (OSTI)

A heat transfer system for a nuclear reactor is described. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

Not Available

1980-03-07T23:59:59.000Z

146

Heat transfer system  

DOE Patents (OSTI)

A heat transfer system for a nuclear reactor. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

McGuire, Joseph C. (Richland, WA)

1982-01-01T23:59:59.000Z

147

A compositional logic for proving security properties of protocols  

Science Conference Proceedings (OSTI)

We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public-key cryptography. The logic, designed around a process calculus with actions for each possible ...

Nancy Durgin; John Mitchell; Dusko Pavlovic

2003-07-01T23:59:59.000Z

148

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

149

Configuring Networks and Devices with Simple Network Management Protocol (SNMP)  

Science Conference Proceedings (OSTI)

This document is written for readers interested in the Internet Standard Management Framework and its protocol, the Simple Network Management Protocol (SNMP). In particular, it offers guidance in the effective use of SNMP for configuration management. ...

M. MacFaden; D. Partain; J. Saperia; W. Tackabury

2003-04-01T23:59:59.000Z

150

Teapot: language support for writing memory coherence protocols  

Science Conference Proceedings (OSTI)

Recent shared-memory parallel computer systems offer the exciting possibility of customizing memory coherence protocols to fit an application's semantics and sharing patterns. Custom protocols have been used to achieve message-passing performance---while ...

Satish Chandra; Brad Richards; James R. Larus

1996-05-01T23:59:59.000Z

151

Quorum-Oriented Multicast Protocols for Data Replication  

E-Print Network (OSTI)

this paper we have presented a family of quorum multicast protocols, called naive, reschedule, retry, and count. We have shown that these protocols provide good availability while using fewer messages and requiring less latency than a simple multicast

H. Garcia-molina; Darrell Long; Richard A. Golding; R. M. Metcalfe

1991-01-01T23:59:59.000Z

152

Transfer Credit Approval Form For Transfer Terms and Exchange Programs  

E-Print Network (OSTI)

Transfer Credit Approval Form For Transfer Terms and Exchange Programs CONTINUED Student/transfer term is not a Dartmouth-sponsored program. ______ The regulations for exchange/transfer terms of the COI will review my transfer term application and I may only receive Dartmouth credit for a transfer

Myers, Lawrence C.

153

Exploring Virtual Network Selection Algorithms in DSM Cache Coherence Protocols  

E-Print Network (OSTI)

lines in the modified state. In a home-based directory protocol, every cache line is assigned a home

Heinrich, Mark

154

Investigating the limits of randomized benchmarking protocols  

E-Print Network (OSTI)

In this paper, we analyze the performance of randomized benchmarking protocols on gate sets under a variety of realistic error models that include systematic rotations, amplitude damping, leakage to higher levels, and 1/f noise. We find that, in almost all cases, benchmarking provides better than a factor-of-two estimate of average error rate, suggesting that randomized benchmarking protocols are a valuable tool for verification and validation of quantum operations. In addition, we derive new models for fidelity decay curves under certain types of non-Markovian noise models such as 1/f and leakage errors. We also show that, provided the standard error of the fidelity measurements is small, only a small number of trials are required for high confidence estimation of gate errors.

Jeffrey M. Epstein; Andrew W. Cross; Easwar Magesan; Jay M. Gambetta

2013-08-13T23:59:59.000Z

155

Building America House Simulation Protocols (Revised)  

Science Conference Proceedings (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

156

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network (OSTI)

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

157

A lightweight, high performance communication protocol for grid computing  

Science Conference Proceedings (OSTI)

This paper describes a lightweight, high-performance communication protocol for the high-bandwidth, high-delay networks typical of computational Grids. One unique feature of this protocol is that it incorporates an extremely accurate classification mechanism ... Keywords: Bayesian analysis, Classification mechanisms, Grid computing, High-performance communication protocols, High-performance networking

Phillip M. Dickens

2010-03-01T23:59:59.000Z

158

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

159

ATM Forum signalling protocols and their interworking  

Science Conference Proceedings (OSTI)

The ATM Forum is a key body which has been developing specifications for asynchronous transfer mode (ATM) technology over the past six years. It has produced a number of signalling specifications covering the user network interface, the inter-carrier ...

N. J. P. Cooper

1998-04-01T23:59:59.000Z

160

Fuel transfer system  

DOE Patents (OSTI)

A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool.

Townsend, Harold E. (Campbell, CA); Barbanti, Giancarlo (Cupertino, CA)

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Technology Transfer: About the Technology Transfer Department  

NLE Websites -- All DOE Office Websites (Extended Search)

About the Technology Transfer and Intellectual Property Management About the Technology Transfer and Intellectual Property Management Department The Technology Transfer Department helps move technologies from the Lab to the marketplace to benefit society and the U. S. economy. We accomplish this through developing and managing an array of partnerships with the private and public sectors. What We Do We license a wide range of cutting-edge technologies to companies that have the financial, R & D, manufacturing, marketing, and managerial capabilities to successfully commercialize Lab inventions. In addition, we manage lab-industry research partnerships, ensure that inventions receive appropriate patent or copyright protection, license technology to start-up companies, distribute royalties to the Lab and to inventors and serve as

162

NREL: Technology Transfer - About Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

About Technology Transfer About Technology Transfer Through technology partnerships, NREL seeks to reduce private sector risk and enable investment in the adoption of renewable energy and energy efficiency technologies. The transfer of these technologies to the marketplace helps displace oil, reduce carbon emissions, and increase U.S. industry competitiveness. Principles NREL develops and implements technology partnerships based on the standards established by the following principles: Balancing Public and Private Interest Form partnerships that serve the public interest and advance U.S. Department of Energy goals. Demonstrate appropriate stewardship of publicly funded assets, yielding national benefits. Provide value to the commercial partner. Focusing on Outcomes Develop mutually beneficial collaborations through processes, which are

163

Memristive Transfer Matrices  

E-Print Network (OSTI)

An electrical analysis is performed for a memristor crossbar array integrated with operational amplifiers including the effects of parasitic or contact resistances. It is shown that the memristor crossbar array can act as a transfer matrix for a multiple input-multiple output signal processing system. Special cases of the transfer matrix are described related to reconfigurable analog filters, waveform generators, analog computing, and pattern similarity. Keywords: transfer matrix, memristor, analog electronics, crossbar, operational amplifier, reconfigurable electronics

Mouttet, Blaise

2010-01-01T23:59:59.000Z

164

Jefferson Lab Technology Transfer  

This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser. Concerns? Technology Transfer.

165

NETL: Technology Transfer - DOE  

Home > Technology Transfer. ... and cheaper to design future power plants. ... we welcome the opportunity to build mutually beneficial partnerships with industry, ...

166

NREL: Technology Transfer - Contacts  

National Renewable Energy Laboratory Technology Transfer Contacts. Here you'll find contact information and resources to help answer any questions you may have about ...

167

SRNL - Technology Transfer - Ombudsman  

... complete fairness in the transfer of federally funded technologies into the marketplace for the benefit of the U.S. economy.

168

Partnerships and Technology Transfer  

Economic Development Overview. ORNL's Partnerships Staff works with a number of partners in the region, State, and across the nation to help transfer ORNL-developed ...

169

MATERIALS TRANSFER AGREEMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

MTAXX-XXX 1 MATERIAL TRANSFER AGREEMENT for Manufacturing Demonstration Facility and Carbon Fiber Technology Facility In order for the RECIPIENT to obtain materials, the RECIPIENT...

170

Convection Heat Transfer  

Science Conference Proceedings (OSTI)

...Heat-Transfer Equations, Fundamentals of Modeling for Metals Processing, Vol 22A, ASM Handbook, ASM International, 2009, p 625??658...

171

Heat transfer dynamics  

Science Conference Proceedings (OSTI)

As heat transfer technology increases in complexity, it becomes more difficult for those without thermal dynamics engineering training to choose between competitive heat transfer systems offered to meet their drying requirements. A step back to the basics of heat transfer can help professional managers and papermakers make informed decisions on alternative equipment and methods. The primary forms of heat and mass transfer are reviewed with emphasis on the basics, so a practical understanding of each is gained. Finally, the principles and benefits of generating infrared energy by combusting a gaseous hydrocarbon fuel are explained.

Smith, T.M. (Marsden, Inc., Pennsauken, NJ (United States))

1994-08-01T23:59:59.000Z

172

Facility Survey & Transfer  

Energy.gov (U.S. Department of Energy (DOE))

As DOE facilities become excess, many that are radioactively and/or chemically contaminated will become candidate for transfer to DOE-EM for deactivation and decommissioning.

173

Technology Transfer: For Industry  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Licensing Berkeley Lab Technologies Partnering with Berkeley Lab Contact Us Receive Customized Tech Alerts Tech Transfer Site Map Last updated: 09172009...

174

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

175

Building Technologies Office: Open-Protocol Platform for Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Open-Protocol Platform Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project to someone by E-mail Share Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Facebook Tweet about Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Twitter Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Google Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Delicious Rank Building Technologies Office: Open-Protocol Platform for

176

View-Oriented Update Protocol with Integrated Diff for View-based Consistency  

E-Print Network (OSTI)

with a traditional diff-based protocol and an existing home-based protocol. Experimen- tal results demonstrate the performance of the proposed protocol is significantly better than the diff-based protocol and the home-based

Werstein, Paul

177

Protocol for laboratory research on degradation, interaction, and fate of wastes disposed by deep-well injection: Final report  

Science Conference Proceedings (OSTI)

The objective of this research investigation was to develop a laboratory protocol for use in determining degradation, interaction, and fate of organic wastes disposed in deep subsurface reservoirs via disposal wells. Knowledge of the ultimate fate of deep-well disposed wastes is important because provisions of the Resource Conservation and Recovery Act (RCRA) require that by August 1988, the Environmental Protection Agency (EPA) must show that the disposal of specified wastes by deep-well injection is safe to human health and the environment, or the practice must be stopped. The National Institute for Petroleum and Energy Research (NIPER) developed this protocol primarily by transferring some of its expertise and knowledge of laboratory protocol relevant to improved recovery of petroleum. Phenol, because it is injected into deep, subsurface reservoirs for disposal, was selected for study by the EPA. Phenol is one waste product that has been injected into the Frio formation; therefore, a decision was made to use phenol and sedimentary rock from the Frio formation for a series of laboratory experiments to demonstrate the protocol. This study investigates the adsorption properties of a specific reservoir rock which is representative of porous sedimentary geologic formations used as repositories for hazardous organic wastes. The developed protocol can be used to evaluate mobility, adsorption, and degradation of an organic hazardous waste under simulated subsurface reservoir conditions. 22 refs., 13 figs., 16 tabs.

Collins, A.G.; Crocker, M.E.

1987-12-01T23:59:59.000Z

178

Knowledge transfer frameworks  

Science Conference Proceedings (OSTI)

While theories abound concerning knowledge transfer in organisations, little empirical work has been undertaken to assess any possible relationship between repositories of knowledge and those responsible for the use of knowledge. This paper develops ... Keywords: hybrid approach, knowledge administration, knowledge management, knowledge storage, knowledge transfer framework

Sajjad M Jasimuddin; Nigel Connell; Jonathan H Klein

2012-05-01T23:59:59.000Z

179

Transfers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transfers Transfers Transfers Transfer means a change of an employee, from one Federal government branch (executive, legislative, judicial) to another or from one agency to another without a break in service of 1 full work day. Below are a few tips to better assist you when you transer agencies: If you have any dependents you must complete a standard Form 2809 during new employee orientation as this information does not transfer over automatically. You will not be able to change your coverage until open season or a life changing event occurs. At the time of new employee orientation you must provide your most recent leave and earning statement (LES) so that your leave may be updated accordingly. If you do not provide us with this document it will take approximately 6 weeks before your annual and sick leave is updated.

180

Data Transfer Examples  

NLE Websites -- All DOE Office Websites (Extended Search)

» Data Transfer Examples » Data Transfer Examples Data Transfer Examples Moving data to Projectb Projectb is where data should be written from jobs running on the cluster or Gpints. There are intermediate files or bad results from a run that didn't work out that don't need to be saved. By running these jobs in the SCRATCH areas, these files will be deleted for you by the puge. If you run in the SANDBOX, you will have to clean up after yourselves. Batch Scheduled Transfers Use any queues to schedule jobs that move data to Projectb. A basic transfer script is here: kmfagnan@genepool12 ~ $ cat data_to_projb.sh #!/bin/bash -l #$ -N data2projb /projectb/scratch// kmfagnan@genepool12 ~ $ qsub data_to_projb.sh

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Multinucleon transfer reactions  

SciTech Connect

The development of higher energies and better resolution in heavy-ion beams has led to a resurgence of interest in transfer reactions at energies well above the Coulomb barrier. Direct reactions with heavy ions are discussed in some detail. Heavy-ion reactions open up the possibility of new methods of spectroscopy, e.g., elastic transfer. Differential cross sections for heavy-ion ' transfer reactions are often featureless; however, some data show diffractive effects. The high angular momenta associated with recoil effects in heavy-ion reactions can be exploited to perform selective spectroscopy on light nuclei. Although most heavy-iontransfer data suggest that reactions proceed in a direct fashion, recent experiments indicate the presence of second-order multistep processes. Correlated nucleon transfer and transfer of many nucleons (e.g., (12C, alpha )) are also being investigated. (20 figures, 3 tables, 93 references) (RWR)

Scott, D.K.

1973-08-01T23:59:59.000Z

182

A protocol for instruction stream processing  

E-Print Network (OSTI)

The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. In this paper, we are concerned with the case where the processing takes place remotely. We describe a protocol to deal with the case where the behaviour produced by an instruction sequence under execution leads to the generation of a stream of instructions to be processed and a remote execution unit handles the processing of that stream of instructions.

Bergstra, J A

2009-01-01T23:59:59.000Z

183

Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared  

E-Print Network (OSTI)

Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared Memory Protocols. The protocol com- bines the advantages of homeless and home-based protocols. During lock synchronization a home-based page-based memory update using the invalidation coherence protocol. The protocol is called

Werstein, Paul

184

Technology transfer 1994  

SciTech Connect

This document, Technology Transfer 94, is intended to communicate that there are many opportunities available to US industry and academic institutions to work with DOE and its laboratories and facilities in the vital activity of improving technology transfer to meet national needs. It has seven major sections: Introduction, Technology Transfer Activities, Access to Laboratories and Facilities, Laboratories and Facilities, DOE Office, Technologies, and an Index. Technology Transfer Activities highlights DOE`s recent developments in technology transfer and describes plans for the future. Access to Laboratories and Facilities describes the many avenues for cooperative interaction between DOE laboratories or facilities and industry, academia, and other government agencies. Laboratories and Facilities profiles the DOE laboratories and facilities involved in technology transfer and presents information on their missions, programs, expertise, facilities, and equipment, along with data on whom to contact for additional information on technology transfer. DOE Offices summarizes the major research and development programs within DOE. It also contains information on how to access DOE scientific and technical information. Technologies provides descriptions of some of the new technologies developed at DOE laboratories and facilities.

1994-01-01T23:59:59.000Z

185

Creating A Model HTTP Server Program Using java  

E-Print Network (OSTI)

HTTP Server is a computer programs that serves webpage content to clients. A webpage is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a computer screen. This information is usually in HTML format, and may provide navigation to other webpage's via hypertext links. WebPages may be retrieved from a local computer or from a remote HTTP Server. WebPages are requested and served from HTTP Servers using Hypertext Transfer Protocol (HTTP). WebPages may consist of files of static or dynamic text stored within the HTTP Server's file system. Client-side scripting can make WebPages more responsive to user input once in the client browser. This paper encompasses the creation of HTTP server program using java language, which is basically supporting for HTML and JavaScript.

Veerasamy, Bala Dhandayuthapani

2010-01-01T23:59:59.000Z

186

The Pilgrim: A New Consistency Protocol for Distributed Shared Memory  

E-Print Network (OSTI)

We propose a new consistency protocol for distributed shared memory (DSM) where different shared objects are replicated at each site. This protocol was developed for the cooperative platform called CAliF: Cooperative Application Framework. This system uses the DSM to allow programmers to share objects or variables without having to manage the exchange. We present an algorithm which uses the token technique. The token is data structure which contains the updates of shared data. These data are carried through the ring on the token, named Pilgrim. Pilgrim protocol provides both reliable consistency and guaranteed performance according to the type of application described. The protocol is discussed and proved, and we demonstrate its qualities. Key words: consistency protocol, cooperative work, distributed shared memory, virtual ring. 1 Introduction In this paper, we propose a new consistency protocol for distributed shared memory (DSM) where different shared objects are replicated at eac...

H. Guyennet; J-c. Lapayre; M. Trhel

1997-01-01T23:59:59.000Z

187

The Greenhouse Gas Protocol Initiative: Sector Specific Tools | Open Energy  

Open Energy Info (EERE)

Gas Protocol Initiative: Sector Specific Tools Gas Protocol Initiative: Sector Specific Tools Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Sector Specific Tools Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Industry, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity[1] The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion[2] The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources[3]

188

Technology Transfer Summit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agenda as of April 9, 2012 Agenda as of April 9, 2012 Technology Transfer Summit April 16, 2012 IMC - Trinity Ballroom 4 8:00 - 8:10 Welcome & Introduction Pete Tseronis, DOE Chief Technology Officer 8:10 - 8:50 Accelerating Transfer Within an Innovation Ecosystem Debra M. Amidon, Founder and Chief Strategist, ENTOVATION International, and Author, The Innovation SuperHighway 8:50 - 9:20 Tech Transfer - Predicaments, Perplexities, and Possible Panaceas Rex Northen, Executive Director, Cleantech Open 9:20 - 9:50 A Systems Approach to Innovation Mike Schwenk, Vice President and Director Technology Deployment and Outreach, Pacific Northwest National Laboratory (PNNL) 9:50 - 10:15 DOE's Online Tech Transfer Ecosystem - aka...Stop Building Moai! Robert Bectel, Senior Policy Advisor / Chief Technology Officer

189

VOLUNTARY LEAVE TRANSFER PROGRAM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VOLUNTARY LEAVE TRANSFER PROGRAM VOLUNTARY LEAVE TRANSFER PROGRAM (Eligible employees are listed at the end of this narrative) Under the Voluntary Leave Transfer Program you can apply, based on a medical emergency, to receive annual leave donated by other employees. A medical emergency is generally defined as a medical condition of the employee or family member that is likely to keep you (the employee) away from work and cause a loss of pay of at least 24 hours. You are required to submit an Office of Personnel Management (OPM) Form 630, Application to Become A Leave Recipient Under the Voluntary Leave Transfer Program, through your supervisor to be considered for the program. The application must include an explanation of the reason the donation is needed (including a brief description of the

190

Technology Transfer: Success Stories  

NLE Websites -- All DOE Office Websites (Extended Search)

Lawrence Berkeley National Laboratory masthead A-Z Index Berkeley Lab masthead U.S. Department of Energy logo Phone Book Jobs Search Tech Transfer Tech Index For Industry For...

191

Multiscale photosynthetic exciton transfer  

E-Print Network (OSTI)

Photosynthetic light harvesting provides a natural blueprint for bioengineered and biomimetic solar energy and light detection technologies. Recent evidence suggests some individual light harvesting protein complexes (LHCs) and LHC subunits efficiently transfer excitons towards chemical reaction centers (RCs) via an interplay between excitonic quantum coherence, resonant protein vibrations, and thermal decoherence. The role of coherence in vivo is unclear however, where excitons are transferred through multi-LHC/RC aggregates over distances typically large compared with intra-LHC scales. Here we assess the possibility of long-range coherent transfer in a simple chromophore network with disordered site and transfer coupling energies. Through renormalization we find that, surprisingly, decoherence is diminished at larger scales, and long-range coherence is facilitated by chromophoric clustering. Conversely, static disorder in the site energies grows with length scale, forcing localization. Our results suggest s...

Ringsmuth, A K; Stace, T M; 10.1038/nphys2332

2012-01-01T23:59:59.000Z

192

Transfer reactions at ATLAS  

NLE Websites -- All DOE Office Websites (Extended Search)

Transfer reactions before, and with, HELIOS Or - "...seems like an awful lot of work just to do (d,p)..." Congratulations ATLAS Happy 25 th Prologue: Long before ATLAS... 11...

193

Technology Transfer Awards 2012  

Science Conference Proceedings (OSTI)

EPRI's 2012 Technology Transfer Awards recognize the leaders and the innovators who have transferred research into applied results. The 2012 award winners have shown exceptional application of EPRI research and technology to solve a problem of size and significance, to champion a technology both within their companies and across the industry, to drive progress in the electricity sector, and to provide meaningful benefits for stakeholders and for society.

2013-01-23T23:59:59.000Z

194

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Stationary Combustion Guidance[1] The Greenhouse Gas Protocol tool for stationary combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

195

APPENDIX J: STATEMENT OF COMPLIANCE WITH DOE SEISMICITY PROTOCOL  

NLE Websites -- All DOE Office Websites (Extended Search)

compliance with the "Protocol for Induced Seismicity Associated with Enhanced Geothermal Systems". Calpine Corporation and other Geysers geothermal operators have long been...

196

Decentralized Decision-making and Protocol Design for Recycled ...  

E-Print Network (OSTI)

Nov 14, 2006 ... Optimization Online. Decentralized Decision-making and Protocol Design for Recycled Material Flows. I-Hsuan Hong (ihong ***at***...

197

Protocol, Appraisal Process Guide - April 2008 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Guide - April 2008 Protocol, Appraisal Process Guide - April 2008 April 2008 Emergency Management Oversight Appraisal Process Guide Emergency Management Oversight...

198

Analysis of limiting information characteristics of quantum-cryptography protocols  

SciTech Connect

The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

Sych, D V; Grishanin, Boris A; Zadkov, Viktor N [Department of Physics, M.V. Lomonosov Moscow State University, Moscow (Russian Federation)

2005-01-31T23:59:59.000Z

199

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks  

Science Conference Proceedings (OSTI)

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks. Yiyang Li Jianxia Ning Zhengyuan Xu . Srikanth V. Krishnamurthy Gang Chen. Springer...

200

DOE Transportation Protocols Topic Group Conference Call Summary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

DOE Transportation Protocols Topic Group Summary of Second Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

202

The Greenhouse Gas Protocol Initiative: Measurement and Estimation...  

Open Energy Info (EERE)

a quantitative and qualitative estimation of uncertainty associated with a GHG inventory. Overview The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a...

203

MAC and Routing Protocols for Mobile Underwater Acoustic Sensor Swarms  

E-Print Network (OSTI)

Pressure Routing for Underwater Sensor Networks . . . . . .of Aloha Protocols for Underwater Acoustic Sensor Networks.Critical Applications in Underwater Sensor Networks. In

Noh, Young Tae

2012-01-01T23:59:59.000Z

204

Communication Protocols and Data Standards for Energy-Related...  

NLE Websites -- All DOE Office Websites (Extended Search)

Development Contact Us Department Contacts Media Contacts Communication Protocols and Data Standards for Energy-Related Purposes Speaker(s): Bruce Nordman Date: January 13,...

205

Qubit-string-based bit commitment protocols with physical security  

E-Print Network (OSTI)

Several kinds of qubit-string-based(QS-based) bit commitment protocols are presented, and a definition of information-theoretic concealing is given. All the protocols presented here are proved to be secure under this definition. We suggest an attack algorithm to obtain the local unitary transformation introduced in no-go theorem, which is used to attack the binding condition, then study the security of our QS-based bit commitment protocols under this attack via introducing a new concept "physical security of protocol". At last we present a practical QS-based bit commitment scheme against channel loss and error.

Li Yang; Chong Xiang; Bao Li

2010-11-23T23:59:59.000Z

206

Multiscale photosynthetic exciton transfer  

E-Print Network (OSTI)

Photosynthetic light harvesting provides a natural blueprint for bioengineered and biomimetic solar energy and light detection technologies. Recent evidence suggests some individual light harvesting protein complexes (LHCs) and LHC subunits efficiently transfer excitons towards chemical reaction centers (RCs) via an interplay between excitonic quantum coherence, resonant protein vibrations, and thermal decoherence. The role of coherence in vivo is unclear however, where excitons are transferred through multi-LHC/RC aggregates over distances typically large compared with intra-LHC scales. Here we assess the possibility of long-range coherent transfer in a simple chromophore network with disordered site and transfer coupling energies. Through renormalization we find that, surprisingly, decoherence is diminished at larger scales, and long-range coherence is facilitated by chromophoric clustering. Conversely, static disorder in the site energies grows with length scale, forcing localization. Our results suggest sustained coherent exciton transfer may be possible over distances large compared with nearest-neighbour (n-n) chromophore separations, at physiological temperatures, in a clustered network with small static disorder. This may support findings suggesting long-range coherence in algal chloroplasts, and provides a framework for engineering large chromophore or quantum dot high-temperature exciton transfer networks.

A. K. Ringsmuth; G. J. Milburn; T. M. Stace

2012-06-14T23:59:59.000Z

207

NREL: Technology Transfer - Ombuds - National Renewable Energy ...  

National Renewable Energy Laboratory Technology Transfer Technology Transfer Ombuds. NREL's Technology Transfer Ombuds offers an informal process to ...

208

ITL Staff Members Receive Tech Transfer Award  

Science Conference Proceedings (OSTI)

ITL Staff Members Receive Tech Transfer Award. ... Regional "Excellence in Technology Transfer" Award for ... the process of transferring a technology ...

2010-10-05T23:59:59.000Z

209

Jefferson Lab Technology Transfer - JLab  

What is Technology Transfer at Jefferson Lab? The transfer of technology (intellectual property) developed at JLab to the private sector is an important element of ...

210

AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AVIATION BOARD OF DIRECTORS AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS The Department of Energy strives to manage its Aviation Program toward the highest standards of safety, efficiency, fairness in contracting, preservation of competition in the private sector, open communication, prudent property management, and the best examples of resource management. Toward these ends, the Department has established a management structure led by a Board of Directors comprising active Federal employee aviation managers from the Department. AUTHORITY: The following authorities serve as basis for this structure and system: Office of Management and Budget Circular A-126, FMR 102.33, DEAR 109, DOE Order 440.2B, Aviation Management Review Team Report, March 1999, and Secretary of Energy Appointment and Delegation of Authority, April 15, 1999.

211

High Performance Computing Data Center Metering Protocol  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance High Performance Computing Data Center Metering Protocol Prepared for: U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Federal Energy Management Program Prepared by: Thomas Wenning Michael MacDonald Oak Ridge National Laboratory September 2010 ii Introduction Data centers in general are continually using more compact and energy intensive central processing units, but the total number and size of data centers continues to increase to meet progressive computing requirements. In addition, efforts are underway to consolidate smaller data centers across the country. This consolidation is resulting in a growth of high-performance computing facilities (i.e. - supercomputers) which consume large amounts of energy to support the numerically intensive

212

A simulation of the FASTBUS protocols  

E-Print Network (OSTI)

FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. Its applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator.

Booth, A W

1981-01-01T23:59:59.000Z

213

Building America House Simulation Protocols (Revised)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

House House Simulation Protocols Robert Hendron and Cheryn Engebrecht National Renewable Energy Laboratory Revised October 2010 Prepared by the National Renewable Energy Laboratory For the U.S. Department of Energy Building Technologies Program ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process,

214

Quantum state transfer through a spin chain in a multiexcitation subspace  

SciTech Connect

We investigate the quality of quantum state transfer through a uniformly coupled antiferromagnetic spin chain in a multiexcitation subspace. The fidelity of state transfer using multiexcitation channels is found to compare well with communication protocols based on the ground state of a spin chain with ferromagnetic interactions. Our numerical results support the conjecture that the fidelity of state transfer through a multiexcitation subspace only depends on the number of initial excitations present in the chain and is independent of the excitation ordering. Based on these results, we describe a communication scheme which requires little effort for preparation.

Wang, Zhao-Ming [Department of Physics, Ocean University of China, Qingdao; Ma, Rui-Song [Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China; Bishop, Clifford A [ORNL; Gu, Yong-Jian [Department of Physics, Ocean University of China, Qingdao

2012-01-01T23:59:59.000Z

215

A scalable wireless routing protocol secure against route truncation attacks  

Science Conference Proceedings (OSTI)

Wireless routing protocols allow transmitting nodes to have some knowledge of the topology in order to decide when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of any network, it is a lucrative ...

Amitabh Saxena; Ben Soh

2010-05-01T23:59:59.000Z

216

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

217

Cryptography and game theory: designing protocols for exchanging information  

Science Conference Proceedings (OSTI)

The goal of this paper is finding fair protocols for the secret sharing and secure multiparty computation (SMPC) problems, when players are assumed to be rational. It was observed by Halpern and Teague (STOC 2004) that protocols with bounded number of ...

Gillat Kol; Moni Naor

2008-03-01T23:59:59.000Z

218

A Protocol for Multimedia CDMA Personal Communication Networks  

Science Conference Proceedings (OSTI)

In this paper, a joint CDMA/TDMA protocol has been proposed for integrated video-phone/voice/data traffic in personal communication networks (PCN). The videophone service is implemented according to H.261 standard. The concept of dynamic boundary ... Keywords: CDMA, MAC, multimedia, personal communication networks, protocol

P. Xie; E. Gunawan; B. H. Soong; C. B. Soh

2000-09-01T23:59:59.000Z

219

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

220

Internet Printing Protocol/1.1: Model and Semantics  

Science Conference Proceedings (OSTI)

This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document ...

R. Herriot; R. deBry; S. Isaacson; P. Powell / T. Hastings

2000-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

HLP: a next generation inter-domain routing protocol  

Science Conference Proceedings (OSTI)

It is well-known that BGP, the current inter-domain routing protocol, has many deficiencies. This paper describes a hybrid link-state and path-vector protocol called HLP as an alternative to BGP that has vastly better scalability, isolation and convergence ... Keywords: BGP, convergence, inter-domain routing, scalability

Lakshminarayanan Subramanian; Matthew Caesar; Cheng Tien Ee; Mark Handley; Morley Mao; Scott Shenker; Ion Stoica

2005-08-01T23:59:59.000Z

222

Energy-Efficient Networking Energy-Aware Routing Protocol  

E-Print Network (OSTI)

from to a physical server in another DC, when, the second DC has access to the renewable energy sourcesEnergy-Efficient Networking Energy-Aware Routing Protocol Minimum Power Topology Energy-Aware Admission Control Management of Resources in the Liquid Network Summary Energy Efficient Protocols in Self

Tobagi, Fouad

223

Statistical estimation of the quality of quantum-tomography protocols  

SciTech Connect

We present a complete methodology for testing the performances of quantum tomography protocols. The theory is validated by several numerical examples and by the comparison with experimental results achieved with various protocols for whole families of polarization states of qubits and ququarts including pure, mixed, entangled, and separable.

Bogdanov, Yu. I.; Bukeev, I. D. [Institute of Physics and Technology, Russian Academy of Sciences, 117218, Moscow (Russian Federation); Brida, G.; Genovese, M.; Shurupov, A. P. [INRIM, Strada delle Cacce 91 I-10135, Torino (Italy); Kravtsov, K. S. [Prokhorov General Physics Institute, Russian Academy of Sciences, Moscow, 119991 (Russian Federation); Kulik, S. P.; Soloviev, A. A. [Faculty of Physics, Moscow State University, 119992, Moscow (Russian Federation); Moreva, E. V. [Moscow National Research Nuclear University ' ' MEPHI' ' , 115409, Moscow (Russian Federation)

2011-10-15T23:59:59.000Z

224

Sound Multi-party Business Protocols for Service Networks  

E-Print Network (OSTI)

on the transitions. The states of the protocol are mapped to states in the DFA, and the protocol evolves transitions. All transitions outgoing the initial state are message-based, and their associated time to the considerations stated in Section 2.1 regarding when a transition can be traversed according to its time condition

Politécnica de Madrid, Universidad

225

Self-stabilizing multicast protocols for ad hoc networks  

Science Conference Proceedings (OSTI)

We propose two distributed algorithms to maintain respectively the minimum weight spanning tree (MST) based multi-cast tree and the shortest path (SPST) multi-cast tree in a given ad hoc network for a given multi-cast group; our algorithms are fault ... Keywords: convergence, distributed system, fault tolerance, multi-cast protocol, self-stabilizing protocol, system graph

Sandeep K. S. Gupta; Pradip K. Srimani

2003-01-01T23:59:59.000Z

226

Performance evaluation of Atomic Commit Protocols for mobile transactions  

Science Conference Proceedings (OSTI)

The commitment of a distributed transaction is ensured with the use of an Atomic Commit Protocol (ACP). Due to their great importance for transaction systems, the recent advances in mobile computing development have renewed the interest in the ... Keywords: atomic commit protocols, mobile ACPs, mobile databases, mobile networks, mobile transaction processing, performance evaluation, simulation, wireless networks

Nadia Nouali-Taboudjemat; Lynda Boukantar; Habiba Drias

2007-08-01T23:59:59.000Z

227

Analysis of DSR protocol in event-B  

Science Conference Proceedings (OSTI)

This paper presents an incremental formal development of the Dynamic Source Routing (DSR) protocol in Event-B. DSR is a reactive routing protocol, which finds a route for a destination on demand, whenever communication is needed. Route discovery is an ... Keywords: abstract model, ad hoc network, event-b, event-driven approach, proof-based development, refinement

Dominique Mry; Neeraj Kumar Singh

2011-10-01T23:59:59.000Z

228

On the Security of the Ping-Pong Protocol  

E-Print Network (OSTI)

We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

Kim Bostroem; Timo Felbinger

2007-08-22T23:59:59.000Z

229

A hierarchical multicast protocol in mobile IPv6 networks  

Science Conference Proceedings (OSTI)

In this paper, we propose a hierarchical multicast protocol in Mobile IPv6 networks (HMoM), which utilizes the advantages of hierarchical mobility management in handling unicast routing. The multicast agent is selected dynamically and can be located ... Keywords: Mobile IP, Mobile multicast, Protocol, Routing

Ping Wang; Yunze Cai; Jinjie Huang; Xiaoming Xu

2006-12-01T23:59:59.000Z

230

NREL: Technology Transfer - Webmaster  

NLE Websites -- All DOE Office Websites (Extended Search)

Webmaster Webmaster To report any problems on or ask a question about the NREL Technology Transfer Web site, you may contact the Webmaster using the online form below. If you have a question or concern that's not related to this Web site, please see our list of contacts for assistance. To contact the Webmaster, please provide your name, e-mail address, and message below. When you are finished, click "Send Message." NOTE: If you enter your e-mail address incorrectly, we will be unable to reply. Your name: Your email address: Your message: Send Message Printable Version Technology Transfer Home About Technology Transfer Technology Partnership Agreements Licensing Agreements Nondisclosure Agreements Research Facilities Commercialization Programs Success Stories News

231

NREL: Technology Transfer - Ombuds  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Transfer Ombuds Technology Transfer Ombuds NREL's Technology Transfer Ombuds offers an informal process to help resolve issues and concerns regarding the laboratory's technology partnership, patent, and licensing activities. As a designated neutral party, our ombuds provides confidential, resolution-focused services. Through the ombuds process, we encourage collaborative techniques such as mediation to facilitate the speedy and low-cost resolution of complaints and disputes, when appropriate. The NREL Ombuds does not: Handle contract negotiation or other legal issues Act as a decision maker or draw conclusions Investigate or make formal recommendations on findings of fact. The ombuds also does not replace, override, or influence formal review or appeal mechanisms, or serve as an intermediary when legal action is

232

Partnerships and Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooperative Research and Development Agreement Cooperative Research and Development Agreement visualization scientist A Cooperative Research and Development Agreement (CRADA) is a mechanism whereby non-federal entities (industry, universities, non-profits, etc.) can collaborate with federal laboratories on research and development projects. CRADAs are specifically technology transfer agreements; technologies developed under CRADAs are expected to be transferred to the private sector for commercial exploitation, either by the non-federal partner or another licensee of such technologies. CRADAs were authorized by the Stevenson-Wydler Technology Innovation Act of 1980 (Public Law 96-480); the authority for government-owned, contractor-operated laboratories such as ORNL to enter into CRADAs was granted by the National Competitiveness Technology Transfer Act of 1989

233

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

234

Protective Force Protocols for ESS Supported Performance Tests and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protective Force Protocols for ESS Supported Performance Tests and Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 This document presents the protocols and ROE to be followed for both limited-scope and large-scale FOF performance tests. It sets forth basic procedures and responsibilities for planning, conducting, and evaluating such tests. The intent is to provide a standard framework to govern the conduct of such tests in connection with Independent Oversight inspections at NNSA and ESE sites and to ensure consistent approaches for all other FOF applications, approaches designed to enable program management to compare results from site to site. Protective Force Protocols for ESS Supported Performance Tests and

235

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Leads - May 2011 Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

236

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

237

Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols  

E-Print Network (OSTI)

In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of energy consumed and time spent. These protocols majorly focus on the optimization performed by expanding ring search algorithm to control the flooding generated by the mechanism of blind flooding. So, we have modeled the energy consumed and time spent per packet both for route discovery and route maintenance. The proposed framework is evaluated in NS-2 to compare performance of the chosen routing protocols.

Javaid, Nadeem; Javaid, Akmal; Malik, Shahzad A

2011-01-01T23:59:59.000Z

238

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory pragmas and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

239

Technology Transfer: Available Technologies  

NLE Websites -- All DOE Office Websites (Extended Search)

Software and Information Technologies Software and Information Technologies Algorithm for Correcting Detector Nonlinearites Chatelet: More Accurate Modeling for Oil, Gas or Geothermal Well Production Collective Memory Transfers for Multi-Core Processors Energy Efficiency Software EnergyPlus:Energy Simulation Software for Buildings Tools, Guides and Software to Support the Design and Operation of Energy Efficient Buildings Flexible Bandwidth Reservations for Data Transfer Genomic and Proteomic Software LABELIT - Software for Macromolecular Diffraction Data Processing PHENIX - Software for Computational Crystallography Vista/AVID: Visualization and Allignment Software for Comparative Genomics Geophysical Software Accurate Identification, Imaging, and Monitoring of Fluid Saturated Underground Reservoirs

240

Applied heat transfer  

Science Conference Proceedings (OSTI)

Heat transfer principles are discussed with emphasis on the practical aspects of the problems. Correlations for heat transfer and pressure drop from several worldwide sources for flow inside and outside of tubes, including finned tubes are presented, along with design and performance calculations of heat exchangers economizers, air heaters, condensers, waste-heat boilers, fired heaters, superheaters, and boiler furnaces. Vibration analysis for tube bundles and heat exchangers are also discussed, as are estimating gas-mixture properties at atmospheric and elevated pressures and life-cycle costing techniques. (JMT)

Ganapathy, V.

1982-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Technology transfer issue  

Science Conference Proceedings (OSTI)

Testimony by Lawrence J. Brady, Commerce Assistant Secretary for Trade Administration, at Congressional hearings on the national security issues of technology transfers to the Soviet Union identified steps the US needs to take to deal effectively with the problem. These steps include an understanding of how the Soviet Union has and will benefit militarily by acquiring Western technology and efforts to work with other countries, counterintelligence agencies, and industries to stem the flow of technological information. Brady outlined changes in technology development that complicate the enforcement of transfer rules, and emphasized the importance of a close relationship between the business community and the Commerce Department. (DCK)

Jacobson, C.

1982-05-31T23:59:59.000Z

242

RADCAL Operations Manual Radiation Calibration Laboratory Protocol  

SciTech Connect

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

Bogard, J.S.

1998-12-01T23:59:59.000Z

243

SRNL - Technology Transfer - Ombudsman  

NLE Websites -- All DOE Office Websites (Extended Search)

Ombudsman Ombudsman Ombudsman Program Policy The Department of Energy and its management and operating contractors (M & O Contractors) engaging in technology partnership activities, share a mutual objective to ensure complete fairness in the transfer of federally funded technologies into the marketplace for the benefit of the U.S. economy. This includes an interest in open lines of communication and the early identification of issues, complaints and disputes between contractors and their existing or potential partners. The Technology Transfer Ombudsman Program provides an independent point of contact for concerns about technology transfer i SRS Sign ssues, complaints and disputes. The mission of the Ombudsman Program is to elevate to the appropriate SRNS officials the information needed to identify and resolve problems thereby improving satisfaction with SRNS practices and reducing the occasion for formal disputes and litigation. The Ombudsman will not be involved in the merits of cases that are the subject of ongoing dispute resolution or litigation, or investigation incidents thereto. The Ombudsman is not established to be a super-administrator, re-doing what specialized officials have already done. Rather, the Ombudsman is to ensure that appropriate SRNS officials consider all pertinent information when deciding the company's position on a technology transfer complaint. To request forms or acquire additional information contact: Michael Wamstad, 803-725-3751 or mike.wamstad@srs.gov.

244

Protocol for maximizing energy savings and indoor environmental quality  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for maximizing energy savings and indoor environmental quality Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Title Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Publication Type Journal Article LBNL Report Number LBNL-6147E Year of Publication 2013 Authors Noris, Federico, William W. Delp, Kimberly Vermeer, Gary Adamkiewicz, Brett C. Singer, and William J. Fisk Journal Energy and Buildings Volume 61 Pagination 378-386 Date Published 06/2013 Keywords apartments, buildings, costs, energy, indoor environmental quality, Protocol, retrofits, Selection Abstract The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

245

How to Implement a Protocol for Babel RMI  

Science Conference Proceedings (OSTI)

RMI support in Babel has two main goals: transparency & flexibility. Transparency meaning that the new RMI features are entirely transparent to existing Babelized code; flexibility meaning the RMI capability should also be flexible enough to support a variety of RMI transport implementations. Babel RMI is a big success in both areas. Babel RMI is completely transparent to already Babelized implementation code, allowing painless upgrade, and only very minor setup changes are required in client code to take advantage of RMI. The Babel RMI transport mechanism is also extremely flexible. Any protocol that implements Babel's minimal, but complete, interface may be used as a Babel RMI protocol. The Babel RMI API allows users to select the best protocol and connection model for their application, whether that means a WebServices-like client-server model for use over a WAP, or a faster binary peer-to-peer protocol for use on different nodes in a leadership-class supercomputer. Users can even change protocols without recompiling their code. The goal of this paper is to give network researchers and protocol implementors the information they need to develop new protocols for Babel RMI. This paper will cover both the high-level interfaces in the Babel RMI API, and the low level details about how Babel RMI handles RMI objects.

Kumfert, G; Leek, J

2006-03-30T23:59:59.000Z

246

Analysing the WAP class 2 wireless transaction protocol using coloured Petri nets  

Science Conference Proceedings (OSTI)

Coloured Petri nets (CPNs) are used to specify and analyse the Class 2 Wireless Transaction Protocol (WTP). The protocol provides a reliable request/response service to the Session layer in the Wireless Application Protocol (WAP) architecture. When only ...

Steven Gordon; Jonathan Billington

2000-06-01T23:59:59.000Z

247

Kyoto Protocol: Enforcement Prohibitions (West Virginia) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Climate Policies The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the residential, commercial,

248

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

249

Internet voting protocol based on implicit data security  

E-Print Network (OSTI)

This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security of votes depends on multiple servers such that each vote is divided into partitions and these partitions are distributed among the servers, all of which need to be brought together to reconstruct the votes. Such a protocol has potential applications in bargaining and electronic commerce.

Parakh, Abhishek

2010-01-01T23:59:59.000Z

250

Quantum discord as a resource in quantum protocols  

E-Print Network (OSTI)

We show quantum discord to be a resource in quantum information processing. This is accomplished by proving a relation between quantum discord and the yield of the quantum protocols. Our results are derived by studying the fully quantum Slepian-Wolf protocol -- a unification of all bipartite, unidirectional and memoryless quantum communication protocols -- in the presence of noise. As examples, we elucidate the significance of quantum discord in quantum teleportation, superdense coding, and entanglement distillation. Finally, we provide the first quantitative relation between quantum discord and the query complexity of quantum computations.

Madhok, Vaibhav

2012-01-01T23:59:59.000Z

251

FACILITY SURVEY & TRANSFER Facility Survey & Transfer Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SURVEY & TRANSFER SURVEY & TRANSFER Facility Survey & Transfer Overview Transfer Activities Checklist Pre-Survey Information Request Survey Report Content Detailed Walkdown Checklist Walkdown Checklist Clipboard Aids S & M Checklist Survey Report Example - Hot Storage Garden Survey Report Example - Tritium System Test Assembly Survey Report Example - Calutron Overview As DOE facilities become excess, many that are radioactively and/or chemically contaminated will become candidate for transfer to DOE-EM for deactivation and decommissioning. Requirements and guidance for such transfers are contained in:  DOE Order 430.1B Chg. 2, REAL PROPERTY & ASSET MANAGEMENT  DOE Guide 430.1-5, TRANSITION IMPLEMENTATION GUIDE The transfer process is illustrated in the Transfer Process figure. The purpose here is to provide examples of methods and

252

Technology Transfer: Site Map  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Site Map About Us About Technology Transfer Contact Us Available Technologies Advanced Materials Biofuels Biotechnology and Medicine Developing World Energy Environmental Technologies Imaging and Lasers Ion Sources and Beam Technologies Nanotechnology and Microtechnology Software and Information Technology For Industry Licensing Overview Frequently Asked Questions Partnering with Berkeley Lab Licensing Interest Form Receive New Tech Alerts For Researchers What You Need to Know and Do The Tech Transfer Process Forms Record of Invention (Word doc -- please do not use earlier PDF version of the form) Software Disclosure and Abstract (PDF, use Adobe Acrobat or Adobe Reader 9 and up ONLY to complete the form) Policies Conflict of Interest Outside Empolyment Export Control FAQs for Researchers

253

Technology Transfer Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced Research Projects Agency-Energy (ARPA-E) Advanced Research Projects Agency-Energy (ARPA-E) Oil & Gas Technology Transfer Initiatives USEFUL LINKS Association of University Technology Managers (AUTM) Federal Laboratory Consortium (FLC) FLC Technology Locator Feedback Contact us about Tech Transfer: Mary.McManmon@science.doe.gov Mary McManmon, 202-586-3509 link to Adobe PDF Reader link to Adobe Flash player Reports Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set Autoinduction Autoinduction System The award winning Overnight Express(tm) Autoinduction System developed at BNL simplifies protein production in the widely used T7 gene expression system. Decontamination Foam-based decontamination

254

NREL: Technology Transfer - Events  

NLE Websites -- All DOE Office Websites (Extended Search)

Events Events February 2014 NASEO Energy Outlook Conference February 4 - 7, 2014 Washington , DC Add to calendar Printable Version Technology Transfer Home About Technology Transfer Technology Partnership Agreements Licensing Agreements Nondisclosure Agreements Research Facilities Commercialization Programs Success Stories News Contacts Did you find what you needed? Yes 1 No 0 Thank you for your feedback. Would you like to take a moment to tell us how we can improve this page? Submit We value your feedback. Thanks! We've received your feedback. Something went wrong. Please try again later. NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. NREL U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Alliance for Sustainable Energy, LLC

255

A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications  

E-Print Network (OSTI)

These protocols waste energy through radio switching, idlePacket-based protocols also waste energy through neighborrouting table may be a waste of energy. In this instance, a

Ramanathan, Nithya; Yarvis, Mark D; Chhabra, Jasmeet; Kushalnagar, Nandakishore; Krishnamurthy, Lakshman; Estrin, D

2005-01-01T23:59:59.000Z

256

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

257

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: GHG Uncertainty Guide[1] The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a quantitative and qualitative estimation of uncertainty associated with a

258

SSO password-based multi-server authentication protocol  

Science Conference Proceedings (OSTI)

User's password verification information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password verification information is distributed between ...

Sandeep K. Sood; Anil K. Sarje; Kuldip Singh

2012-07-01T23:59:59.000Z

259

Kyoto Protocol Act of 1998 (Illinois) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) < Back Eligibility State/Provincial Govt Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Program Info State Illinois Program Type Climate Policies Environmental Regulations Provider Illinois Pollution Control Board Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse effects of climate change which in whole or in part reduces emissions of greenhouse gases, as those gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors. In the absence of

260

Open-Protocol Platform for Commercial Building Operations and Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Open-Protocol Platform for Commercial Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm The U.S. Department of Energy (DOE) is currently conducting research into an open-protocol platform for commercial buildings and an algorithm to manage energy use. Project Description This project seeks to develop a situational analysis algorithm that characterizes the classes and capabilities of existing building automation and energy information systems, as well as the types of commercial buildings that typically use each class of equipment. Project Partners Research is being undertaken by DOE and Navigant Consulting. Project Goals The goal is to use the situational analysis algorithm to determine whether

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Refrigerant Guide[1] The Greenhouse Gas Protocol tool for refrigeration is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

262

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Climate Focus Area: - Central Plant, Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: CHP Guidance v1.0[1] The Greenhouse Gas Protocol tool for allocation of GHG emissions from a combined heat and power (CHP) plant is a free Excel spreadsheet calculator

263

Nuclear Energy Protocol for Research Isotopes Owen Lowe  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol for Protocol for Research Isotopes Owen Lowe Office of Isotopes for Medicine and Science Office of Nuclear Energy, Science and Technology April 16, 2002 Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology Lowe/April16_02 NEPRI to NERAC.ppt (2) Nuclear Energy Protocol For Research Isotopes Nuclear Energy Protocol For Research Isotopes Why NEPRI? 6 NEPRI implements DOE funding priorities for fiscal year 2003 6 NEPRI will * Bring order to DOE's responses to requests for research isotopes * Introduce a high-quality peer review to the selection of research isotopes * Enable DOE to concentrate on operating its unique isotope production facilities Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology

264

Protocol to co-operation agreement with Iran  

E-Print Network (OSTI)

A Co-operation Agreement between CERN and Iran will be signed in the coming weeks within the framework of the decisions taken by the Committee of Council and Council in June 1989. In view of implementing this Agreement, a Protocol between CERN and the International Scientific Meetings Office of the Ministry of Science of the Islamic Republic of Iran has been drawn up. It concerns the participation of scientific Institutions of Iran in the CMS Collaboration where CERN is acting on behalf of this Collaboration. This Protocol incorporates the agreement between CMS and ISMO on the Iranese contribution. It does not involve any financial commitment for CERN. The Protocol mainly addresses the status of the Iranese scientists at CERN, the supply by ISMO of the support tables for CMS, as well as the usual provisions concerning delivery and customs, guarantees, responsibilities, intellectual property and disputes. This Protocol is submitted to the Finance Committee for information.

2001-01-01T23:59:59.000Z

265

Toward a Standardized Metadata Protocol for Urban Meteorological Networks  

Science Conference Proceedings (OSTI)

With the growing number and significance of urban meteorological networks (UMNs) across the world, it is becoming critical to establish a standard metadata protocol. Indeed, a review of existing UMNs indicate large variations in the quality, quantity, and ...

Catherine L. Muller; Lee Chapman; C.S.B. Grimmond; Duick T. Young; Xiao-Ming Cai

2013-08-01T23:59:59.000Z

266

TDM MAC protocol design and implementation for wireless mesh networks  

Science Conference Proceedings (OSTI)

We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multi-hop wireless mesh networks using a programmable wireless platform. Extensive research has been devoted to optimal scheduling algorithms for ...

Dimitrios Koutsonikolas; Theodoros Salonidis; Henrik Lundgren; Pascal LeGuyadec; Y. Charlie Hu; Irfan Sheriff

2008-12-01T23:59:59.000Z

267

A Study of Transport Protocols for Wide Area Scientific Applications  

SciTech Connect

This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

Vishal Misra

2011-03-01T23:59:59.000Z

268

Implementation of a cluster based routing protocol for mobile networks  

Science Conference Proceedings (OSTI)

We show the implementation and the simulation results of a hierarchical, cluster based routing protocol for mobile ad hoc networks using Parallel Virtual Machine (PVM). The network represented by a graph is partitioned into clusters by a graph ...

Geoffrey Marshall; Kayhan Erciyes

2005-05-01T23:59:59.000Z

269

The Cost of Kyoto Protocol Targets: The Case of Japan  

E-Print Network (OSTI)

This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

Paltsev, Sergey.

270

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

271

Typhoon: a reliable data dissemination protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

We present Typhoon, a protocol designed to reliably deliver large objects to all the nodes of a wireless sensor network (WSN). Typhoon uses a combination of spatially-tuned timers, prompt retransmissions, and frequency diversity to reduce contention ...

Chieh-Jan Mike Liang; R?zvan Mus?loiu-E.; Andreas Terzis

2008-01-01T23:59:59.000Z

272

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 USChina Electric Vehicle Initiative Meeting August 23-24, 2012...

273

A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.  

E-Print Network (OSTI)

A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

Van Dyke, Aaron R. (Aaron Robert)

2009-01-01T23:59:59.000Z

274

Exploiting home automation protocols for load monitoring in smart buildings  

Science Conference Proceedings (OSTI)

Monitoring and controlling electrical loads is crucial for demand-side energy management in smart grids. Home automation (HA) protocols, such as X10 and Insteon, have provided programmatic load control for many years, and are being widely deployed in ...

David Irwin; Sean Barker; Aditya Mishra; Prashant Shenoy; Anthony Wu; Jeannie Albrecht

2011-11-01T23:59:59.000Z

275

A Simple Protocol to Communicate Channels over Channels  

Science Conference Proceedings (OSTI)

In this paper we present the communication protocol that we use to implement first class channels. Ordinary channels allow data communication (like CSP/Occam); first class channels allow communicating channel ends over a channel. This enables processes ...

Henk L. Muller; David May

1998-09-01T23:59:59.000Z

276

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

277

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Electricity Heat, and Steam Purchase Guidance v1.2[1] The Greenhouse Gas Protocol tool for purchased electricity is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

278

Office of Safety and Emergency Management Evaluations Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

<: iisS Offlct of Hulth , S.ftly ind St curity OFFICE OF SAFETY AND EMERGENCY MANAGEMENT EVALUATIONS PROTOCOL FOR THE DEVELOPMENT AND MAINTENANCE OF CRITERIA AND REVIEW APPROACH...

279

Advanced Technology and Knowledge Transfer  

Science Conference Proceedings (OSTI)

This paper reports on a specific food and agribusiness industry project, employing new technological capabilities to better transfer expert knowledge. Knowledge transfer and technical support are key components of this project. VisIT, which stands for ...

Geetanjali Tandon; Steven T. Sonka

2003-01-01T23:59:59.000Z

280

Protocol for Laboratory Testing of SCR Catalyst: 2nd Edition  

Science Conference Proceedings (OSTI)

With the widespread deployment of selective catalytic NOx reduction (SCR) throughout the U.S. fleet of coal fired utility boilers, there was a need to establish standardized protocols to test catalyst. In 2006, EPRI issued a protocol that provided a uniform basis for testing SCR catalyst. In 2007, a wide range of industry representatives, including members of the Post-Combustion NOx Control Program, catalyst vendors, an independent catalyst testing laboratory, a catalyst reconditioner, and a provider of ...

2007-12-21T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

NREL: Technology Transfer - Licensing Agreements  

National Renewable Energy Laboratory Technology Transfer Licensing Agreements. Through licensing agreements, NREL provides industry with an opportunity to ...

282

Heat Transfer Fluids Containing Nanoparticles  

commercial and industrial heat-transfer applications. ... Refrigeration and other cooling systems Nuclear reactors Aerospace Defense Grinding and ...

283

Argonne TDC: Material Transfer Agreements  

Material Transfer Agreements. Materials produced by researchers at Argonne National Laboratory are often of interest to the private sector.

284

LANL | Partnering | Material Transfer Agreement  

Contacts Event Calendar Maps Organization Phonebook Policy Center Emergency. NEWS. LIBRARY. JOBS. Technology Transfer, TT . Division Home; About Us; ...

285

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network (OSTI)

ASHRAE, CIBSE and USGBC are developing a standardized, consistent set of protocols to facilitate the comparison of the measured performance of buildings, especially those claimed to be green, sustainable, and/or high performance. Such protocols are needed because claims of high performance cannot be credible without such standardized protocols being applied consistently in the U.S. as well as internationally. The protocols will identify what is to be measured, how it is to be measured (instrumentation and spatial resolution), and how often it is to be measured. They will address both the use and reporting of the measured data, as well as appropriate benchmarks for each of the following characteristics: Energy Use (site, and source), Indoor Environmental Quality (IEQ)-Thermal Comfort, IEQ-Indoor Air Quality, IEQ-Lighting/ Daylighting Quality, IEQ-Acoustics and Water Use. The primary users of the protocols document will be building owners and facility managers, rating and labeling system developers, government officials, as well as architects and design engineers. To date, a scoping document has been developed, an extensive literature review has been performed (available on ASHRAEs web site), and a committee formed to write the protocols, which are intended for publication in January 2009.

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

2008-10-01T23:59:59.000Z

286

Technology Transfer Reporting Form | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Transfer Reporting Form Technology Transfer Reporting Form Technology Transfer Reporting Form More Documents & Publications DOE F 3230.6A Technology Partnership...

287

Tech Transfer Summit Agenda | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tech Transfer Summit Agenda Tech Transfer Summit Agenda Tech Transfer Technology Summit Agenda 4.9.12.pdf More Documents & Publications Risk Management II Summit Agenda Special...

288

HIGEE Mass Transfer  

E-Print Network (OSTI)

Distillation, absorption, and gas stripping have traditionally been performed in tall columns utilizing trays or packing. Columns perform satisfactorily, but have characteristics which may be disadvantages in some applications: Large size, particularly height; high weight; high cost of installation; difficulty in modularization; foaming for certain systems; must be vertical, especially for trayed towers; large liquid inventory; difficulty in modifying column internals once installed; start up time to reach steady state conditions in excessive. Many of these disadvantages can be overcome by use of HIGEE, an innovative vapor-liquid mass transfer system which utilizes a rotating bed of packing to achieve high efficiency separations, and consequent reduction in size and weight.

Mohr, R. J.; Fowler, R.

1986-06-01T23:59:59.000Z

289

Manipulator mounted transfer platform  

DOE Patents (OSTI)

This invention is comprised of a transfer platform for the conveyance of objects by a manipulator includes a bed frame and saddle clamp secured along an edge of the bed fame and adapted so as to secure the bed frame to a horizontal crosspiece of the manipulator. The platform may thus move with the manipulator in a reciprocal linear path defined by a guide rail. A bed insert may be provided for the support of conveyed objects and a lifting bail may be provided to permit the manipulator arm to install the bed frame upon the crosspiece under remote control. 5 figs.

Dobbins, J.C.; Hoover, M.A.; May, K.W.; Ross, M.J.

1988-10-12T23:59:59.000Z

290

Manipulator mounted transfer platform  

Science Conference Proceedings (OSTI)

A transfer platform for the conveyance of objects by a manipulator includes a bed frame and saddle clamp secured along an edge of the bed frame and adapted so as to secure the bed frame to a horizontal crosspiece of the manipulator. The platform may thus move with the manipulator in a reciprocal linear path defined by a guide rail. A bed insert may be provided for the support of conveyed objects and a lifting bail may be provided to permit the manipulator arm to install the bed frame upon the crosspiece under remote control.

Dobbins, James C. (Idaho Falls, ID); Hoover, Mark A. (Idaho Falls, ID); May, Kay W. (Idaho Falls, ID); Ross, Maurice J. (Pocatello, ID)

1990-01-01T23:59:59.000Z

291

Manipulator mounted transfer platform  

Science Conference Proceedings (OSTI)

The patent describes in a manipulator system for use in hazardous environments including a manipulator adapted for reciprocal movement upon a guide device, a transfer platform. It comprises: a bed frame defining a generally horizontal bed projecting outwardly from the manipulator; and frame mounting means securing the bed frame to the manipulator in a generally cantilevered fashion, thereby essentially minimizing the structure necessary to support the platform outwardly of the manipulator while enhancing operator visibility of the platform and the manipulator during use of the manipulator system.

Dobbins, J.C.; Hoover, M.A.; May, K.W.; Ross, M.J.

1990-01-23T23:59:59.000Z

292

Parallel data transfer network controlled by a dynamically reconfigurable serial network  

DOE Patents (OSTI)

This patent is a real time high density data communication system designed to operate efficiently in a dynamically configurable, multiprocessor parallel processing environment. In this design a serial communication network is utilized to disseminate commands from a master processor to the slave processors, to control transmission of high density data, to effect communication protocol, and to monitor the status of each slave processor. A parallel channel communication network is utilized in conjunction with two triple port memories at each processor node in the system to efficiently transmit high density data for sustained or burst intervals without having to interleave communication control messages. Each processor node includes a transputer, a digital signal processor, a parallel transfer controller. A very low software overhead time for starting and ending the transfer of data is incurred using this design in contrast with a scalable coherent interface system in which 25% of transmission time is devoted to the communication protocol.

Crosetto, D.B.

1992-01-01T23:59:59.000Z

293

An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model  

E-Print Network (OSTI)

Cryptography's importance in our everyday lives continues to grow in our increasingly digital world. Oblivious transfer (OT) has long been a fundamental and important cryptographic primitive since it is known that general two-party cryptographic tasks can be built from this basic building block. Here we show the experimental implementation of a 1-2 random oblivious transfer (ROT) protocol by performing measurements on polarization-entangled photon pairs in a modified entangled quantum key distribution system, followed by all of the necessary classical post-processing including one-way error correction. We successfully exchange a 1,366 bits ROT string in ~3 min and include a full security analysis under the noisy storage model, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of using today's quantum technologies to implement secure two-party protocols.

C. Erven; N. Ng; N. Gigov; R. Laflamme; S. Wehner; G. Weihs

2013-08-23T23:59:59.000Z

294

Interline transfer CCD camera  

DOE Patents (OSTI)

An interline CCD sensing device for use in a camera system, includes an imaging area sensitive to impinging light, for generating charges corresponding to the intensity of the impinging light. Sixteen independent registers R1 - R16 sequentially receive the interline data from the imaging area, corresponding to the generated charges. Sixteen output amplifiers S1 - S16 and sixteen ports P1 - P16 for sequentially transferring the interline data, one pixel at a time, in order to supply a desired image transfer speed. The imaging area is segmented into sixteen independent imaging segments A1 - A16, each of which corresponds to one register, on output amplifier, and one output port. Each one of the imaging segments A1 - A16 includes an array of rows and columns of pixels. Each pixel includes a photogate area, an interline CCD channel area, and an anti-blooming area. The anti-blooming area is, in turn, divided into an anti-blooming barrier and an anti-blooming drain.

Prokop, M.S.; McCurnin, T.W.; Stump, C.J.; Stradling, G.L.

1993-12-31T23:59:59.000Z

295

Polarization transfer NMR imaging  

DOE Patents (OSTI)

A nuclear magnetic resonance (NMR) image is obtained with spatial information modulated by chemical information. The modulation is obtained through polarization transfer from a first element representing the desired chemical, or functional, information, which is covalently bonded and spin-spin coupled with a second element effective to provide the imaging data. First and second rf pulses are provided at first and second frequencies for exciting the imaging and functional elements, with imaging gradients applied therebetween to spatially separate the nuclei response for imaging. The second rf pulse is applied at a time after the first pulse which is the inverse of the spin coupling constant to select the transfer element nuclei which are spin coupled to the functional element nuclei for imaging. In a particular application, compounds such as glucose, lactate, or lactose, can be labeled with .sup.13 C and metabolic processes involving the compounds can be imaged with the sensitivity of .sup.1 H and the selectivity of .sup.13 C.

Sillerud, Laurel O. (Los Alamos, NM); van Hulsteyn, David B. (Santa Fe, NM)

1990-01-01T23:59:59.000Z

296

BGP-S: a protocol for terrestrial and satellite network integration in network layer  

Science Conference Proceedings (OSTI)

To accomplish network layer integration of terrestrial and satellite IP networks, special exterior gateway protocols are needed. In this work, a new exterior gateway protocol called Border Gateway Protocol-Satellite version (BGP-S) is introduced that ... Keywords: BGP-4, IP-based routing, exterior gateway protocol, satellite networks

Eylem Ekici; Chao Chen

2004-09-01T23:59:59.000Z

297

Performance optimization of the go-back-N ARQ protocols over broadcast channels  

Science Conference Proceedings (OSTI)

Keywords: broadcast channels, go-back-N ARQ, performance optimization, point-to-multipoint communication, protocols

Jonathan L. Wang; John A. Silvester

1991-09-01T23:59:59.000Z

298

Proof of Security of a High-Capacity Quantum Key Distribution Protocol  

E-Print Network (OSTI)

We prove the security of a high-capacity quantum key distribution protocol over noisy channels. By using entanglement purification protocol, we construct a modified version of the protocol in which we separate it into two consecutive stages. We prove their securities respectively and hence the security of the whole protocol.

Xiao-Wei Zhang; Kai Wen; Gui Lu Long

2005-12-25T23:59:59.000Z

299

Heisenberg Spin Bus as a Robust Transmission Line for Perfect State Transfer  

E-Print Network (OSTI)

We study the protocol known as quantum state transfer for a strongly coupled antiferromagnetic spin chain or ring (acting as a spin bus), with weakly coupled external qubits. By treating the weak coupling as a perturbation, we find that perfect state transfer (PST) is possible when second order terms are included in the expansion. We also show that PST is robust against variations in the couplings along the spin bus and between the bus and the qubits. As evidence of the quantum interference which mediates PST, we show that the optimal time for PST can be smaller with larger qubit separations, for an even-size chain or ring.

Sangchul Oh; Lian-Ao Wu; Yun-Pil Shim; Mark Friesen; Xuedong Hu

2011-02-03T23:59:59.000Z

300

About Technology Transfer - National Renewable Energy ...  

National Renewable Energy Laboratory Technology Transfer About Technology Transfer. Through technology partnerships, NREL seeks to reduce private sector risk and ...

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Heat transfer. [heat transfer roller employing a heat pipe  

SciTech Connect

A heat transfer roller embodying a heat pipe is disclosed. The heat pipe is mounted on a shaft, and the shaft is adapted for rotation on its axis.

Sarcia, D.S.

1978-05-23T23:59:59.000Z

302

Prospects for Money Transfer Models  

E-Print Network (OSTI)

Recently, in order to explore the mechanism behind wealth or income distribution, several models have been proposed by applying principles of statistical mechanics. These models share some characteristics, such as consisting of a group of individual agents, a pile of money and a specific trading rule. Whatever the trading rule is, the most noteworthy fact is that money is always transferred from one agent to another in the transferring process. So we call them money transfer models. Besides explaining income and wealth distributions, money transfer models can also be applied to other disciplines. In this paper we summarize these areas as statistical distribution, economic mobility, transfer rate and money creation. First, money distribution (or income distribution) can be exhibited by recording the money stock (flow). Second, the economic mobility can be shown by tracing the change in wealth or income over time for each agent. Third, the transfer rate of money and its determinants can be analyzed by tracing t...

Wang, Y; Xi, N; Wang, Yougui; Ding, Ning; Xi, Ning

2005-01-01T23:59:59.000Z

303

Frame Heat Transfer Research  

NLE Websites -- All DOE Office Websites (Extended Search)

Developing Low-Conductance Window Frames: Capabilities and Developing Low-Conductance Window Frames: Capabilities and Limitations of Current Window Heat Transfer Design Tools Arild Gustavsen 1,* , Dariush Arasteh 2 , Bjørn Petter Jelle 3,4 , Charlie Curcija 5 and Christian Kohler 2 1 Department of Architectural Design, History and Technology, Norwegian University of Science and Technology, Alfred Getz vei 3, NO-7491 Trondheim, Norway 2 Windows and Daylighting Group, Lawrence Berkeley National Laboratory, 1 Cyclotron Road Mail Stop 90R3111, Berkeley, CA 94720- 8134, USA 3 Department of Civil and Transport Engineering, Norwegian University of Science and Technology, Høgskoleringen 7A, NO-7491 Trondheim, Norway 4 Department of Building Materials and Structures, SINTEF Building and Infrastructure, Høgskoleringen 7B,NO-7465 Trondheim, Norway

304

Technology Transfer Reporting Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

form is to be completed by the TTO for individual inquiry/case activity during the quarter as required form is to be completed by the TTO for individual inquiry/case activity during the quarter as required by the Technology Transfer Commercialization Act of 2000. Mouse over definitions and descriptions appear over text/check boxes where appropriate. After completing this form, click on the submit button. *If you have no TTO activity for the quarter, please fill in your name, FY and quarter, lab or facility and check the box "No Quarterly Activity". Initial Ombuds Contact: ____________________ Type: Inquiry Case Ombuds Name: __________________________ Time Spent: (Hours) ______________ Final Ombuds Involvement: _________________ Laboratory or Facility: AMES ANL BNL LBNL INL KCP LANL NREL LLNL NBL NETL PNNL NNSS ORNL PXSO SRNL

305

NREL: Technology Transfer - Contacts  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts Contacts Here you'll find contact information and resources to help answer any questions you may have about NREL's technology transfer and commercialization opportunities. Agreement for Commercializing Technology For more information about NREL's agreements for commercializing technology, contact Anne Miller, 303-384-7353. Financial and Funding Assistance NREL does not provide financial or funding assistance for any research projects. If you're a startup company, small business, or an inventor, visit the following Web sites: Grants.gov Small Business Administration. Industry Growth Forum Visit the NREL Industry Growth Forum website or contact Kate Cheesbrough for more information about this event. Investors and Entrepreneurs For more information about NREL's Innovation and Entrepreneurship Center,

306

Transfer and Archive Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Management Please remove ALL data from /house! Do you still have data in /house/homedirs? Do you know if you have data in /house/homedirs? Please check now and make a plan for moving that data to the archiver or one of the NERSC file systems (for more information on these filesystems go to File storage and I/O). Moving data from house to DnA The DnA file system is primarily for finished projects, data that is ready to be archived, or data that is shared between groups. It is mounted read-only on the cluster, but you can write to directories on this file system in a few ways: Data Transfer Nodes until December 1, 2013 (examples here) xfer queue on the Genepool cluster until December 1, 2013 (examples here) Moving data from house to Projectb Projectb is where compute jobs run and output both intermediate files as

307

HEAT TRANSFER METHOD  

DOE Patents (OSTI)

A method is given for increasing burn-out heat fluxes under nucleate boiling conditions in heat exchanger tubes without incurring an increase in pumping power requirements. This increase is achieved by utilizing a spinning flow having a rotational velocity sufficient to produce a centrifugal acceleration of at least 10,000 g at the tube wall. At this acceleration the heat-transfer rate at burn out is nearly twice the rate which can be achieved in a similar tube utilizing axial flow at the same pumping power. At higher accelerations the improvement over axial flow is greater, and heat fluxes in excess of 50 x 10/sup 6/ Btu/hr/sq ft can be achieved.

Gambill, W.R.; Greene, N.D.

1960-08-30T23:59:59.000Z

308

Technology transfer 1995  

Science Conference Proceedings (OSTI)

Technology Transfer 1995 is intended to inform the US industrial and academic sectors about the many opportunities they have to form partnerships with the US Department of Energy (DOE) for the mutual advantage of the individual institutions, DOE, and the nation as a whole. It also describes some of the growing number of remarkable achievements resulting from such partnerships. These partnership success stories offer ample evidence that Americans are learning how to work together to secure major benefits for the nation--by combining the technological, scientific, and human resources resident in national laboratories with those in industry and academia. The benefits include more and better jobs for Americans, improved productivity and global competitiveness for technology-based industries, and a more efficient government laboratory system.

Not Available

1995-01-01T23:59:59.000Z

309

Transportation Protocols Working Group First Conference Call March 1, 1999  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocols Working Group First Conference Call March 1, 1999 Protocols Working Group First Conference Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 3:00 p.m. Eastern time on Monday March 1, 1999. The session was led by Mona Williams, DOE/NTP-Albuquerque. Other participants included Bill Lemeshewsky, DOE/RW; Ellen Ott, DOE/GC; Elizabeth Helvey, JK Research Associates; Chris Wells, SSEB; Lisa Sattler, CSG-MW, Elissa Turner, DOE/RW; Chris Wentz, New Mexico; Carl Guidice, DOE/EM; Jim Cruickshank, DOE/EM, Elmer Naples, DOE/NR; Fred Butterfield, DOE/EM; and Alex Thrower, UETC. Ms. Williams first indicated that notes from the Jacksonville meeting had been prepared and circulated for comment. She asked if there were

310

Protocol, Required Reading - June 2012 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Required Reading - June 2012 Required Reading - June 2012 Protocol, Required Reading - June 2012 June 2012 Protocol for Required Reading The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing the Office of Safety and Emergency Management Evaluations (HS-45) required reading program. The required reading program provides a methodology to ensure that the HS-45 staff members are informed and up-to-date with Department of Energy (DOE), the Office of Health, Safety and Security (HSS), and office-specific requirements, processes, and guidance as well as to support continuous improvement. The required reading program will also be used to supplement staff training. This required reading program is based on DOE 0 422.1 Conduct of Operations Attachment 2, Appendix A and DOE-STD-1033-92 Guide to

311

Protocol, Development and Maintenance of Criteria and Review Approach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Development and Maintenance of Criteria and Review Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents The purpose of this protocol is to establish the requirements and responsibilities for the development and maintenance of Criteria and Review Approach Documents (CRADs) used by the Office of Safety and Emergency Management Evaluations (HS-45). The HS-45 CRADS are carefully selected, modified (if required), and referenced in HS-45 appraisal plans. These plans are used to provide an outline of the activities planned to assess the effectiveness of safety and emergency management processes and

312

Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy  

Open Energy Info (EERE)

Greenhouse Gas Regional Inventory Protocol (GRIP) Website Greenhouse Gas Regional Inventory Protocol (GRIP) Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Greenhouse Gas Regional Inventory Protocol (GRIP) Website Focus Area: Other Crosscutting Topics: Potentials & Scenarios Website: www.getagriponemissions.com/index-cycle.html Equivalent URI: cleanenergysolutions.org/content/greenhouse-gas-regional-inventory-pro Language: English Policies: Deployment Programs DeploymentPrograms: "Lead by Example" is not in the list of possible values (Audit Programs, Demonstration & Implementation, Green Power/Voluntary RE Purchase, High Performance Buildings, Industry Codes & Standards, Project Development, Public Tenders, Procurement, & Lead Examples, Public-Private Partnerships, Retrofits, Ride Share, Bike Share, etc., Technical Assistance, Training & Education, Voluntary Appliance & Equipment Labeling, Voluntary Industry Agreements) for this property.

313

Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Hazard Nuclear Facility Project Oversight - November High Hazard Nuclear Facility Project Oversight - November 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 November 2012 Protocol for High Hazard Nuclear Facility Project Oversight The purpose of this protocol is to establish the requirements and responsibilities for managing and conducting Office of Health, Safety and Security (HSS) independent oversight of high-hazard nuclear facility projects. As part of the Department of Energy's (DOE) self regulatory framework for safety and security, DOE Order 227.1, Independent Oversight Program, assigns HSS the responsibility for implementing an independent oversight program. It also requires the HSS Office of Enforcement and Oversight to conduct independent evaluations of safety and security. This

314

Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations  

SciTech Connect

In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

1996-12-31T23:59:59.000Z

315

Protocol, Test Inspectors Guide - March 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Test Inspectors Guide - March 2008 Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide Emergency Management Limited Scope Performance Tests Inspectors Guide provides detailed information and tools to assist inspectors assigned to evaluate the capabilities and performance of emergency responders in DOE/NNSA. Although this guide is designed specifically for the HS-63 inspector, it is made available to the field and may be useful to field element and facility contractor personnel who conduct surveys or self-assessments of emergency management programs. Protocol, Test Inspectors Guide - March 2008 More Documents & Publications Protocol, Appraisal Process Guide - April 2008 Independent Oversight Review, Los Alamos National Laboratory - April 2012

316

Jefferson Lab Technology Transfer - JLab  

Grants and cooperative agreements are entered into solely by the government with a recipient whereby money or property is transferred to the recipient to support ...

317

MOLTEN SALT HEAT TRANSFER FLUID  

thermal energy storage tanks Sandia has developed a heat transfer fluid (HTF) for use at elevated temperatures that has a lower freezing point

318

Handbook of heat transfer fundamentals  

SciTech Connect

This handbook is on the fundamentals of heat transfer. It provides coverage on conduction, convection, and radiation and on thermophysical properties of materials.

Rohsenow, W.M.; Hartnett, J.P.; Ganic, E.N.

1985-01-01T23:59:59.000Z

319

Partnerships and Technology Transfer - ORNL  

Carbon Fiber Consortium; Oak Ridge Science and Technology Park; Contact; Staff; Oak Ridge National Laboratory. Partnerships and Technology Transfer. User Facilities ...

320

NREL: Technology Transfer - Nondisclosure Agreements  

Technology Transfer ... Experience suggests that the fastest means to reach an agreement is through direct communications to create understanding and agree on actions. 1.

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Technology Transfer | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

by facilitating development, transfer, and use of federally owned or originated technology to industry for public benefit and to leverage DOE resources through partnering with...

322

Electrohydrodynamically enhanced condensation heat transfer.  

E-Print Network (OSTI)

??In a condenser the thickness of the liquid condensate film covering the cooled surface constitutes a resistance to the heat transfer. By establishing a non (more)

Wawzyniak, Markus

2012-01-01T23:59:59.000Z

323

Ombuds Services for Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

To learn about other Laboratory resources for businesses, please go to: BusinessTech Transfer Small Business Office Community Outreach Procurement, Vendor Information For...

324

Fostering Technology Transfer and Entrepreneurship  

Science Conference Proceedings (OSTI)

... agencies to take steps to enhance successful technology innovation networks ... is one of the partners working with NIST to foster tech transfer and its ...

2013-08-16T23:59:59.000Z

325

Theory of Spin Transfer Torque  

Science Conference Proceedings (OSTI)

... In the phenomenon known as spin transfer torque, a current can give a jolt to thin magnetic layers sandwiched between nonmagnetic materials. ...

2013-06-28T23:59:59.000Z

326

NREL: Technology Transfer Home Page  

The National Renewable Energy Laboratory (NREL) works with industry and organizations to transfer renewable energy and energy efficiency technologies into the ...

327

Partnering Today: Technology Transfer Highlights  

THE LLNL TECHNOLOGY COMPANY PRODUCTS Partnering Today: Technology Transfer Highlights 10 Ametek-Ortec: High-precision Radiation Detectors ORTEC, a unit of AMETEK, is ...

328

DOE Transportation Protocols Topic Group Conference Call Summary May 13,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TEC/WG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the status of U.S. Department of Energy (DOE) transportation protocols currently under development, and related issues. Participants on the call included: Mona Williams, DOE National Transportation Program-Albuquerque; Ken Niles, Oregon representative, Western Interstate Energy Board; Phillip Paull, Council of State Governments-Northeastern Conference; Ron Ross, Western Governors' Association; Lisa Sattler, Council of State Governments-Midwestern Office; Alex Thrower, Urban Energy & Transportation Corporation (UETC); and Elissa Turner, DOE-Office of Civilian Radioactive Waste Management.

329

DOE Transportation Protocols Topic Group Jacksonville, Florida January 20,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Jacksonville, Florida January 20, Jacksonville, Florida January 20, 1999 Meeting Notes and Action Items: The first meeting of the Transportation External Coordination Working Group (TEC/WG) Department of Energy (DOE) Transportation Protocols Topic Group was held at the Radisson Riverwalk Hotel in Jacksonville, FL on January 20, 1999. Mona Williams, Director of DOE's National Transportation Program, Albuquerque Office, welcomed the participants and asked them to introduce themselves (a list of participants with affiliations and addresses is attached). Following the roundtable introductions, Ms. Williams briefly stated the meeting's purpose, which was to discuss the process of protocols development and how review and input from TEC/WG participants could enhance

330

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or  

Open Energy Info (EERE)

Transport or Transport or Mobil Sources Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Transportation, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically from mobile combustion sources, including vehicles under the direct control

331

Protocol, Inspection Criteria - April 23, 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection Criteria - April 23, 2008 Inspection Criteria - April 23, 2008 Protocol, Inspection Criteria - April 23, 2008 April 23, 2008 Inspection Criteria, Activities, and Lines of Inquiry, April 23, 2008 Emergency planning includes the identification of hazards and threats. A hazards survey is the qualitative portion of the hazards identification process. It briefly describes the potential impacts of emergency events or conditions and summarizes the planning and preparedness requirements that apply. If determined to be required, an EPHA includes the identification and characterization of hazardous materials specific to a facility/site, analyses of potential accidents or events, and evaluation of potential consequences. Protocol, Inspection Criteria - April 23, 2008 More Documents & Publications

332

An experiment using Mec: Eurotri, Physical Layer Protocol Implemented Version  

E-Print Network (OSTI)

This work describes a part of a cooperation between LaBRI and Schlumberger Industries for developping eletricity meters. This part deals with the design and the conception of communication protocols to provide a distributed kernel with safe rendezvous primitives. The implemented version of the protocol is detailed and its safety proven using Mec. Contents 1 Industrial Environment 2 2 Hardware and Inter-Processor Communication 2 2.1 Physical Aspects : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2 Potential Problems and Solutions : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.1 Loss of data due to polling rate : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.2 Loss or spontaneous creation of data on the line : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 3 2.2.3 Transmission errors : : : : : : : : : : : : : : : : : : : : :...

Didier Egay Paul; Alain Griffault; Jean-pierre Radoux

1994-01-01T23:59:59.000Z

333

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

334

Urban Sewage Delivery Heat Transfer System (2): Heat Transfer  

E-Print Network (OSTI)

The thimble delivery heat-transfer (TDHT) system is one of the primary modes to utilize the energy of urban sewage. Using the efficiency-number of transfer units method ( ), the heat-transfer efficiencies of the parallel-flow and reverse-flow TDTH forms are analyzed and the calculation formulas and characteristic are also given. The results indicate that the efficiency of the parallel-flow form is greater than that of the reverse-flow, so the TDTH system must choose the parallel-flow form. The distance-load ratio (DLR) is defined and the minimum DLR is obtained by the technical and economic feasibility analysis. The paper will provide references for heat-transfer calculation and schematic determination of urban sewage cool or heat source applied delivery heat transfer methods.

Zhang, C.; Wu, R.; Li, X.; Li, G.; Zhuang, Z.; Sun, D.

2006-01-01T23:59:59.000Z

335

Cooper pair transfer in nuclei  

E-Print Network (OSTI)

The second order DWBA implementation of two-particle transfer direct reactions which includes simultaneous and successive transfer, properly corrected by non-orthogonality effects is tested with the help of controlled nuclear structure and reaction inputs against data spanning the whole mass table, and showed to constitute a quantitative probe of nuclear pairing correlations.

G. Potel; A. Idini; F. Barranco; E. Vigezzi; R. A. Broglia

2013-04-09T23:59:59.000Z

336

Microsoft Word - Protocol for HSS Site Leads.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Safety and Emergency Management Evaluations Protocol for Site Leads May 2011 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose .....................................................................................................................1 2.0 Applicability ............................................................................................................1 3.0 Requirements ...........................................................................................................1 4.0 Responsibilities ........................................................................................................2 5.0 References ................................................................................................................4

337

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

338

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

339

Hello again: Stabilization of the Hello protocol in OSPF  

Science Conference Proceedings (OSTI)

The Hello protocol in OSPF allows each router in a network to check whether it can exchange messages with neighboring routers in its network. This check is carried out by making each router periodically send hello messages to every neighboring router ...

Jorge A. Cobb; Mohamed G. Gouda; Deepinder Sidhu

2005-01-01T23:59:59.000Z

340

Laboratory Protocol to Demonstrate Equivalency for Plant Wastewater Cotreatment  

Science Conference Proceedings (OSTI)

Adding chemical metal-cleaning wastes to ash ponds can be an inexpensive, effective method for removing contaminant metals from both wastes and ponds.This proposed laboratory protocol defines steps for determining the usefulness of ash pond comixing on a case-by-case basis and for demonstrating the equivalency of comixing with dedicated waste treatment, as required by EPA.

1987-08-26T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Minimalist object oriented service discovery protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper presents a new Service Discovery Protocol (SDP) suitable for Wireless Sensor Networks (WSN). The restrictions that are imposed by ultra low-cost sensor and actuators devices (basic components of a WSN) are taken into account to reach a minimal ...

D. Villa; F. J. Villanueva; F. Moya; F. Rincn; J. Barba; J. C. Lpez

2007-05-01T23:59:59.000Z

342

Modelling protocols for multiagent interaction by F-logic  

Science Conference Proceedings (OSTI)

This paper proposes a method to represent agent Unified Modelling Language (AUML) in logic form using F-logic that provides deductive capability and uniform knowledge integration base. The AUML is used to differentiate relevant interaction more precisely ... Keywords: AUML, F-logic, interaction protocols, message route, multiagent system

Hong Feng Lai

2007-12-01T23:59:59.000Z

343

Synapse: a scalable protocol for interconnecting heterogeneous overlay networks  

Science Conference Proceedings (OSTI)

This paper presents Synapse, a scalable protocol for information retrieval over the inter-connection of heterogeneous overlay networks. Applications on top of Synapse see those intra-overlay networks as a unique inter-overlay network. Scalability in ... Keywords: information retrieval, overlay networks, peer-to-peer

Luigi Liquori; Cdric Tedeschi; Laurent Vanni; Francesco Bongiovanni; Vincenzo Ciancaglini; Bojan Marinkovi?

2010-05-01T23:59:59.000Z

344

Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''  

E-Print Network (OSTI)

Biomolecular free energy profiles by a shooting?umbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

Schlick, Tamar

345

Man-in-the-middle in tunnelled authentication protocols  

Science Conference Proceedings (OSTI)

John Ioannidis: I have to interrupt here and be even more offensive than usual. But you are using the worst rackets in industry as a justification for what you're doing. There are all sorts of people just generating garbage protocols, a couple ...

N. Asokan

2003-04-01T23:59:59.000Z

346

Distributed Network Protocol (DNP3) Security Interoperability Testing 2012  

Science Conference Proceedings (OSTI)

This project encourages the adoption of the Distributed Network Protocol (DNP3) Secure Authentication specification through three approaches:Supporting development and review of the specification by industry experts in supervisory control and data acquisition (SCADA) and cryptographyAligning the specification with international standards performing similar functions, so that there is a common industry-wide approach to SCADA securityDeveloping ...

2012-12-31T23:59:59.000Z

347

Protocols for processes: programming in the large for open systems  

Science Conference Proceedings (OSTI)

The modeling and enactment of business processes is being recognized as key to modern information managment. The expansion of Web services has increased the attention given to processes, because processes are how services are composed and put to good ... Keywords: business processes, interaction protocols, open systems

Munindar P. Singh; Amit K. Chopra; Nirmit Desai; Ashok U. Mallya

2004-12-01T23:59:59.000Z

348

An efficient synchronisation protocol for wireless sensor network  

Science Conference Proceedings (OSTI)

Time synchronisation is a critical topic in wireless sensor networks for its wide applications, such as data fusion, TDMA scheduling and cooperated sleeping, etc. In this paper, we present an Accurate Time Synchronisation (ATS) protocol based on ... Keywords: WSNs, drift, linear least squares, offset, time synchronisation, wireless networks, wireless sensor networks

Liusheng Huang; Hongli Xu; Yingyu Wan; Junmin Wu; Hong Li

2007-04-01T23:59:59.000Z

349

Moving routing protocols to the user space in MANET middleware  

Science Conference Proceedings (OSTI)

Mobile Ad Hoc Network (MANET) middleware must be aware of the underlying multi-hop topology to self-adapt and to improve its communication efficiency. For this reason, many approaches rely on specific cross-layer communications to interact with the network ... Keywords: Group communication, Middleware, Mobile Ad Hoc Networks, Routing protocols

Pedro Garca Lpez; Ral Gracia Tinedo; Josep M. Bans Alsina

2010-09-01T23:59:59.000Z

350

The intergroup protocols: Scalable group communication for the internet  

SciTech Connect

Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

Berket, K.

2000-11-01T23:59:59.000Z

351

Packet Drop Avoidance for High-speed network transmission protocol  

SciTech Connect

As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

Jin, Guojun

2004-05-01T23:59:59.000Z

352

Using standard Internet Protocols and applications in space  

Science Conference Proceedings (OSTI)

This paper discusses approaches for using standard Internet technologies to meet the communication needs of future space missions. It summarizes work done by the Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC since 1997. That ... Keywords: Internet in space, Internet space missions, Space communication protocols, Space shuttle STS-107, Spacecraft networking

Keith Hogie; Ed Criscuolo; Ron Parise

2005-04-01T23:59:59.000Z

353

A lightweight idempotent messaging protocol for faulty networks  

Science Conference Proceedings (OSTI)

As parallel machines scale to one million nodes and beyond, it becomes increasingly difficult to build a reliable network that is able to guarantee packet delivery. Eventually large systems will need to employ fault-tolerant messaging protocols that ... Keywords: block-structured traces, idempotence, source-reliable messaging

Jeremy Brown; J. P. Grossman; Tom Knight

2002-08-01T23:59:59.000Z

354

A faster distributed protocol for constructing a minimum spanning tree  

Science Conference Proceedings (OSTI)

This paper studies the problem of constructing a minimum-weight spanning tree (MST) in a distributed network. This is one of the most important problems in the area of distributed computing. There is a long line of gradually improving protocols ...

Michael Elkin

2004-01-01T23:59:59.000Z

355

Cross-platform protocol development for sensor networks: lessons learned  

Science Conference Proceedings (OSTI)

Protocols for sensor networks are commonly coupled to the specific operating system (OS), for instance TinyOS, involving some drawbacks. First, programmers must learn OS architecture, programming guidelines, sometimes a new programming language, etc. ... Keywords: cross-platform, embedded systems, sensor networks

Marcin Brzozowski; Hendrik Salomon; Krzysztof Piotrowski; Peter Langendoerfer

2011-05-01T23:59:59.000Z

356

Parallel and concurrent security of the HB and HB+ protocols  

Science Conference Proceedings (OSTI)

Juels andWeis (building on prior work of Hopper and Blum) propose and analyze two shared-key authentication protocols - HB and HB+ - whose extremely low computational cost makes them attractive for low-cost devices such as radio-frequency ...

Jonathan Katz; Ji Sun Shin

2006-05-01T23:59:59.000Z

357

Private Session Initiation Protocol (SIP) Extensions for Media Authorization  

Science Conference Proceedings (OSTI)

This document describes the need for Quality of Service (QoS) and media authorization and defines a Session Initiation Protocol (SIP) extension that can be used to integrate QoS admission control with call signaling and help guard against denial of ...

W. Marshall

2003-01-01T23:59:59.000Z

358

Multi-gas assessment of the Kyoto protocol  

E-Print Network (OSTI)

The Kyoto Protocol is an international agreement aimed at limiting emissions of several greenhouse gases (GHGs; specifically: CO2, CH4, N2O, PFCs, HFCs, and SF6), and allows credit for approved sinks for CO2. It does not ...

Reilly, John M.; Prinn, Ronald G.; Harnisch, Jochen.; Fitzmaurice, Jean.; Jacoby, Henry D.; Kicklighter, David W.; Stone, Peter H.; Sokolov, Andrei P.; Wang, Chien.

359

A survey on secure multipath routing protocols in WSNs  

Science Conference Proceedings (OSTI)

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on ... Keywords: Multipath routing, Secure multipath routing, Security, Wireless sensor networks

Eliana Stavrou; Andreas Pitsillides

2010-09-01T23:59:59.000Z

360

Argonne TDC: Material Transfer Agreements  

NLE Websites -- All DOE Office Websites (Extended Search)

Material Transfer Agreements Material Transfer Agreements Materials produced by researchers at Argonne National Laboratory are often of interest to the private sector. Depending on the circumstances under which the material was developed, such material may be transferred to industry for a number of reasons (e.g., testing, feasibility studies, etc.). This transfer is usually temporary and can initiate a more formal working arrangement. At this time, TDC, in conjunction with Argonne's Legal Department, provides such agreements on an as-needed basis. If you would like to acquire material produced by Argonne researchers during the course of a federally funded research project, please contact TDC or fill out a Material Transfer Agreement request form. Printed or electronically downloaded copies may become obsolete. Before using such a copy for work direction, employees must verify that it is current by comparing its revision number with that of the online version. Obsolete forms will be rejected.

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

362

Proceedings of the fifteenth ACM conference on Hypertext and hypermedia  

Science Conference Proceedings (OSTI)

We are delighted that this year the number of full paper submissions has been the highest for a number of years, with 104 full papers submitted, of which 24 were accepted, and 56 short papers from which 25 were accepted. As usual, papers were put through ...

Jim Whitehead; David De Roure

2004-08-01T23:59:59.000Z

363

Simulation of a VPN implementation based on MPLS protocol, a case study: VPN-MPLS for MSN-AT  

Science Conference Proceedings (OSTI)

In this paper, we present the implementation of a Virtual Private Network (VPN) using a Multi-Protocol Label Switching (MPLS) protocol. Because this protocol is very promising, economically and technologically, we have adopted it as the basic protocol ... Keywords: MPLS, VPN, network, protocol, security

N. Djenane; A. Benaouda; S Harous

2009-12-01T23:59:59.000Z

364

Prospects for Money Transfer Models  

E-Print Network (OSTI)

Summary. Recently, in order to explore the mechanism behind wealth or income distribution, several models have been proposed by applying principles of statistical mechanics. These models share some characteristics, such as consisting of a group of individual agents, a pile of money and a specific trading rule. Whatever the trading rule is, the most noteworthy fact is that money is always transferred from one agent to another in the transferring process. So we call them money transfer models. Besides explaining income and wealth distributions, money transfer models can also be applied to other disciplines. In this paper we summarize these areas as statistical distribution, economic mobility, transfer rate and money creation. First, money distribution (or income distribution) can be exhibited by recording the money stock (flow). Second, the economic mobility can be shown by tracing the change in wealth or income over time for each agent. Third, the transfer rate of money and its determinants can be analyzed by tracing the transferring process of each one unit of money. Finally, money creation process can also be investigated by permitting agents go into debts. Some future extensions to these models are anticipated to be structural improvement and generalized mathematical analysis.

Yougui Wang; Ning Ding; Ning Xi

2005-01-01T23:59:59.000Z

365

NREL: Technology Transfer Home Page  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Transfer Technology Transfer Search More Search Options Site Map The National Renewable Energy Laboratory (NREL) works with industry and organizations to transfer renewable energy and energy efficiency technologies into the marketplace. Working with Us We offer many opportunities and ways for you to partner with us. Learn more about our technology partnership agreements and services: Agreements for Commercializing Technology Cooperative Research and Development Agreements Technologies Available for Licensing Technology Partnerships Work for Others Research Facilities NREL follows its principles for establishing mutually beneficial technology partnerships. Through our commercialization programs, we work to stimulate the market for clean energy technologies and foster the growth of clean energy start-ups.

366

Engineering directed excitonic energy transfer  

E-Print Network (OSTI)

We provide an intuitive platform for engineering exciton transfer dynamics. We show that careful consideration of the spectral density, which describes the system-bath interaction, leads to opportunities to engineer the transfer of an exciton. Since excitons in nanostructures are proposed for use in quantum information processing and artificial photosynthetic designs, our approach paves the way for engineering a wide range of desired exciton dynamics. We carefully describe the validity of the model and use experimentally relevant material parameters to show counter-intuitive examples of a directed exciton transfer in a linear chain of quantum dots.

Perdomo, Alejandro

2010-01-01T23:59:59.000Z

367

To reach consensus using uninorm aggregation operator: A gossip-based protocol  

Science Conference Proceedings (OSTI)

Gossip-based protocols for group communication have attractive scalability and reliability properties. This paper presents a gossip-based protocol that enables agents to reach a consensus based on a specific uninorm aggregation operator. We theoretically ...

Zhixing Huang; Qiaoli Huang

2012-04-01T23:59:59.000Z

368

A generalized binding framework for the Low Level Reader Protocol (LLRP)  

E-Print Network (OSTI)

This Master of Engineering Thesis describes the design, implementation and testing of an XML binding framework for the RFID Low Level Reader Protocol (LLRP). LLRP is a recently released protocol which standardizes the ...

Poulopoulos, Dimitrios

2008-01-01T23:59:59.000Z

369

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

370

Design and Development of a Multi-Hop Routing Protocol for Distributed Sensing Applications  

E-Print Network (OSTI)

for various applications such as habitat monitoring, agriculture, nuclear reactor control, security, etc that draws on current protocol theories. The protocol uses a hybrid network structure to achieve scalability

Faloutsos, Christos

371

Advanced MAC protocol with energy-efficiency for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper proposes E2-MAC, a contention-based energy-efficient Medium Access Control (MAC) Protocol for wireless sensor networks. Energy efficiency is primary goal in wireless sensor networks. Existing MAC protocols for sensor networks attempt ...

Jae-Hyun Kim; Ho-Nyeon Kim; Seog-Gyu Kim; Seung-Jun Choi; Jai-Yong Lee

2005-01-01T23:59:59.000Z

372

Automated Formal Verification of the DHCP Failover Protocol Using Timeout Order Abstraction  

E-Print Network (OSTI)

In this paper, we present automated formal verification of the DHCP Failover protocol. We conduct bounded model-checking for the protocol using Timeout Order Abstraction (TO-Abstraction), a technique to abstract a given ...

Umeno, Shinya

373

Heat and moisture transfer through clothing  

E-Print Network (OSTI)

R. C. Eberhart (ed), Heat transfer in medicine and biology.Convective and radiative heat transfer coefficients for2008. Study of heat and moisture transfer within multi-layer

Voelker, Conrad; Hoffmann, Sabine; Kornadt, Oliver; Arens, Edward; Zhang, Hui; Huizenga, Charlie

2009-01-01T23:59:59.000Z

374

Los Alamos Lab: Technology Transfer | Home Page  

NLE Websites -- All DOE Office Websites (Extended Search)

Phone 505-665-9090 Address 2237 Trinity Dr., Bldg. 1 TA-00, Bldg. 1325 Map to TT (pdf) Tech Transfer Ombuds Technology Transfer The Laboratory's Technology Transfer Division...

375

Data Transfer Nodes Yield Results!  

NLE Websites -- All DOE Office Websites (Extended Search)

DTN DTN Data Transfer Nodes Yield Results August 1, 2011 | Tags: Accelerator Science, Data Transfer, ESnet Linda Vu, +1 510 495 2402, lvu@lbl.gov The ability to reliably move and share data around the globe is essential to scientific collaboration, that's why three Department of Energy (DOE) Scientific Computing Centers-Argonne and Oak Ridge Leadership Computing Facilities, and the National Energy Research Scientific Computing Center (NERSC)-have teamed up to focus on optimizing wide area network (WAN) transfers. This ongoing effort began several years ago when each site deployed dedicated transfer nodes (DTNs), optimized for carrying data between the DOE facilities. Today, engineers from each site continue to meet regularly with DOE's Energy Sciences Network staff (ESnet) to develop strategies

376

Test and Evaluation Protocols for ANSI/IEEE N42 Standards  

Science Conference Proceedings (OSTI)

... The test and evaluation protocols provide data sheets for data collection of test results obtained when testing radiation detection instruments ...

2012-06-27T23:59:59.000Z

377

Disabling equational theories in unification for cryptographic protocol analysis through tagging  

E-Print Network (OSTI)

In this paper, we show a new tagging scheme for cryptographic protocol messages. Under this tagging, equational theories of operators such as exclusive-or, binary addition etc. are effectively disabled, when terms are unified. We believe that this result has a significant impact on protocol analysis and security, since unification is at the heart of symbolic protocol analysis. Hence, disabling equational theories in unification implies disabling them altogether in protocol analysis for most operators and theories.

Malladi, Sreekanth

2010-01-01T23:59:59.000Z

378

Trials BioMed Central Study protocol The Leeds Evaluation of Efficacy of Detoxification Study (LEEDS)  

E-Print Network (OSTI)

prisons project pilot study: protocol for a randomised controlled trial comparing dihydrocodeine and buprenorphine for opiate detoxification

Laura Sheard; Clive E Adams; Hany El-sayeh

2007-01-01T23:59:59.000Z

379

Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures  

DOE Green Energy (OSTI)

This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

Burgess, R.; Blake, C.; Tracy, C. E.

2008-09-01T23:59:59.000Z

380

Contact NETL Technology Transfer Group  

NLE Websites -- All DOE Office Websites (Extended Search)

NETL Technology Transfer Group techtransfer@netl.doe.gov May 2012 Significance * Applicable to subcritical and supercritical air-fired boiler designs * Eliminates the need to mimic air-fired heat transfer characteristics in order to meet existing dry steam load demands * Reduces retrofit complexity, time, and cost Applications * Retrofitting of conventional air-fired boilers Opportunity Research is active on the patent-pending technology, titled "Temperature

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Protocol, Qualification Standard for the Site Lead Program - May 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Qualification Standard for the Site Lead Program - May Qualification Standard for the Site Lead Program - May 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011 May 2011 Qualification Standard for the Site Lead Program This Qualification Standard establishes common functional area competency requirements for personnel assigned as Site Leads in the Office of Safety and Emergency Management Evaluations. Satisfactory and documented completion of the competency requirements contained in this Standard ensures that employees possess the minimum requisite competence to fulfill their functional area duties and responsibilities. This Standard is integrated with existing qualification standards developed by DOE in accordance with DOE Order 426.1, Federal Technical Capability. Protocol, Qualification Standard for the Site Lead Program - May 2011

382

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

US and Chinese EV US and Chinese EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 US/China Electric Vehicle Initiative Meeting August 23-24, 2012 Boston, MA 1 Argonne National Laboratory 2 Idaho National Laboratory 3 CATARC A Comparison of US and Chinese Battery Testing Protocols  Battery testing is a time-consuming and costly process  There are parallel testing efforts, such as those in the US and China  These efforts may be better leveraged through international collaboration  The collaboration may establish standardized, accelerated testing procedures and will allow battery testing organizations to cooperate in the analysis of the resulting data  In turn, the collaboration may accelerate electric vehicle development and

383

Parameterized Verification of Safety Properties in Ad Hoc Network Protocols  

E-Print Network (OSTI)

We summarize the main results proved in recent work on the parameterized verification of safety properties for ad hoc network protocols. We consider a model in which the communication topology of a network is represented as a graph. Nodes represent states of individual processes. Adjacent nodes represent single-hop neighbors. Processes are finite state automata that communicate via selective broadcast messages. Reception of a broadcast is restricted to single-hop neighbors. For this model we consider a decision problem that can be expressed as the verification of the existence of an initial topology in which the execution of the protocol can lead to a configuration with at least one node in a certain state. The decision problem is parametric both on the size and on the form of the communication topology of the initial configurations. We draw a complete picture of the decidability and complexity boundaries of this problem according to various assumptions on the possible topologies.

Delzanno, Giorgio; Zavattaro, Gianluigi; 10.4204/EPTCS.60.4

2011-01-01T23:59:59.000Z

384

SEEC- Regional Energy Baselines and Measurement and Verification Protocols  

E-Print Network (OSTI)

The Southern Energy Efficiency Center (SEEC) was established to substantially increase the deployment of high-performance beyond-code buildings across the southern region of the U.S, funded by the U.S. Department of Energy (DOE) Building Technologies Program and is administered by the National Energy Technology Laboratory. During its first 18-month phase, to address efficiency goals of states, utilities, and various energy-efficiency programs; project efforts include defining the baseline energy patterns within the project region and the measurement and verification (M&V) protocols for use in determining the efficiency improvements SEEC, state and USDOE efforts with respect to that baseline. This work is defined under the SEEC Subtask 3.1 Define Regional Baselines and Measurement & Verification Protocols. This report presents preliminary deliverables of this subtask developed and documented by the Energy Systems Laboratory (ESL) for use by the SEEC member state region.

Kim, H.; Haberl, J. S.; Verdict, M.

2009-03-01T23:59:59.000Z

385

An adaptive synchronization protocol for parallel discrete event simulation  

SciTech Connect

Simulation, especially discrete event simulation (DES), is used in a variety of disciplines where numerical methods are difficult or impossible to apply. One problem with this method is that a sufficiently detailed simulation may take hours or days to execute, and multiple runs may be needed in order to generate the desired results. Parallel discrete event simulation (PDES) has been explored for many years as a method to decrease the time taken to execute a simulation. Many protocols have been developed which work well for particular types of simulations, but perform poorly when used for other types of simulations. Often it is difficult to know a priori whether a particular protocol is appropriate for a given problem. In this work, an adaptive synchronization method (ASM) is developed which works well on an entire spectrum of problems. The ASM determines, using an artificial neural network (ANN), the likelihood that a particular event is safe to process.

Bisset, K.R.

1998-12-01T23:59:59.000Z

386

Protocols for conducting Environmental Management Assessments of DOE organizations  

SciTech Connect

To assess the effectiveness of DOE`s environmental programs, the Office of Environmental Audit conducts Environmental Management Assessments of DOE programs and facilities. These assessments take a broad programmatic view of environmental systems which may cover multiple sites. The focus of the assessment is on the infrastructure, systems, programs, and tools to manage environmental issues, not on the compliance issues themselves. Protocols have been developed to assist in the conduct of Environmental Management Assessments. The protocols are, based on and serve as implementing guidelines for the Environmental Management Section of ``Performance Objectives and Criteria for Conducting DOE Environmental Audits`` (DOE/EH-022). They are intended to provide guidance to the Assessment Team in conducting these reviews.

1993-08-01T23:59:59.000Z

387

Licklider Transmission Protocol- Security Extensions Status of This Memo  

E-Print Network (OSTI)

This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. IESG Note This RFC is not a candidate for any level of Internet Standard. It represents the consensus of the Delay Tolerant Networking (DTN) Research Group of the Internet Research Task Force (IRTF). It may be considered for standardization by the IETF in the future, but the IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. See RFC 3932 for more information.

S. Farrell; M. Ramadas; S. Burleigh

2008-01-01T23:59:59.000Z

388

Guidelines for Designing Effective Energy Information Feedback Pilots: Research Protocols  

Science Conference Proceedings (OSTI)

Enhanced and timely information regarding consumers electricity use and costs, known as feedback, may significantly influence their behavior across a broad spectrum of usage and acquisition decisions. Such information feedback has become increasingly important in light of widespread investments in Smart Grid technologies. This report identifies protocols for three phases of energy information feedback pilotsresearch design, analysis, and reportingalong with three example applications. When used as the co...

2010-04-23T23:59:59.000Z

389

Standard Language Protocols for Photovoltaic and Storage Grid Integration  

Science Conference Proceedings (OSTI)

In mid-2009, a collaborative industry project was formed to address communication integration of distributed photovoltaic and storage systems. The project was designed to engage stakeholders from inverter manufacturers, system integrators, communication system providers, and utilities. These stakeholders have been working together to identify a set of common functions that can be supported by advanced grid-tied inverters. Standardized communication protocols are being developed to exercise these function...

2010-05-14T23:59:59.000Z

390

A control protocol of finite dimensional quantum systems  

E-Print Network (OSTI)

An exact and analytic control protocol of two types of finite dimensional quantum systems is proposed. The system can be drive to an arbitrary target state using cosine classical fields in finite cycles. The control parameters which are time periods of interaction between systems and control fields in each cycles are connected with the probability amplitudes of target states via triangular functions and can be determined analytically.

Jianju Tang; H. C. Fu

2012-12-11T23:59:59.000Z

391

A formal model of rational exchange and its application to the analysis of Syverson's protocol  

Science Conference Proceedings (OSTI)

We propose a formal model of rational exchange and exchange protocols in general, which is based on game theory. In this model, an exchange protocol is represented as a set of strategies in a game that is played by the protocol parties and the network ...

Levente Buttyn; Jean-Pierre Hubaux; Srdjan ?apkun

2004-05-01T23:59:59.000Z

392

A Methodology for SIP and SOAP Integration Using Application-Specific Protocol Conversion  

Science Conference Proceedings (OSTI)

In recent years, the ubiquitous demands for cross-protocol application access are driving the need for deeper integration between SIP and SOAP. In this article we present a novel methodology for integrating these two protocols. Through an analysis of ... Keywords: Protocol conversion, SIP, SOAP, design concepts, middleware, specialized application languages

Goran Delac; Ivan Budiselic; Ivan Zuzak; Ivan Skuliber; Tomislav Stefanec

2012-11-01T23:59:59.000Z

393

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory  

E-Print Network (OSTI)

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory Byung and home-based Lazy Release Consistency (LRC) protocols which are used to implement Distributed Shared on homeless and home-based LRC protocols. We compared the performance between Tread- Marks, which uses

Huang, Zhiyi

394

Performance analysis of session initiation protocol based call set-up over satellite-UMTS network  

Science Conference Proceedings (OSTI)

Session Initiation Protocol (SIP) has been selected as the official end-to-end signalling protocol for establishing multimedia sessions in the IP-based Universal Mobile Telecommunication Systems (UMTS) network. Since a satellite component has been identified ... Keywords: Radio link control acknowledged mode, Satellite UMTS, Session initiation protocol, Session set-up

Victor Y. H. Kueh; Rahim Tafazolli; Barry G. Evans

2005-07-01T23:59:59.000Z

395

CONFab: component based optimization of WSN protocol stacks using deployment feedback  

Science Conference Proceedings (OSTI)

Wireless sensor networks are characterized by a large number of non-standardized protocols and varying application requirements. This creates need for a systematic approach to rapidly design and optimize deployment specific protocol stacks. We employ ... Keywords: components-based design, deployment feedback, knowledge base, ontology, protocol stack composition

Junaid Ansari; Elena Meshkova; Wasif Masood; Arham Muslim; Janne Riihijrvi; Petri Mhnen

2012-10-01T23:59:59.000Z

396

Verified implementations of the information card federated identity-management protocol  

Science Conference Proceedings (OSTI)

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity ... Keywords: CardSpace, cryptographic protocol verification, federated identity management, verified implementations, web services security

Karthikeyan Bhargavan; Cdric Fournet; Andrew D. Gordon; Nikhil Swamy

2008-03-01T23:59:59.000Z

397

Supporting bursty traffic in wireless sensor networks through a distributed advertisement-based TDMA protocol (ATMA)  

Science Conference Proceedings (OSTI)

Nodes in wireless sensor networks (WSNs) are battery powered and oftentimes deployed in remote and hostile locations. Energy conservation is, therefore, one of the primary goals of MAC protocols designed for these networks. Contention-based protocols ... Keywords: Bursty traffic, Data advertisements, Hybrid, MAC protocol, TDMA, WSN

Surjya Ray; Ilker Demirkol; Wendi Heinzelman

2013-05-01T23:59:59.000Z

398

Method Of Transferring Strained Semiconductor Structures  

NLE Websites -- All DOE Office Websites (Extended Search)

Of Transferring Strained Semiconductor Structures Of Transferring Strained Semiconductor Structures Method Of Transferring Strained Semiconductor Structures The transfer of strained semiconductor layers from one substrate to another substrate involves depositing a multilayer structure on a substrate having surface contaminants. June 25, 2013 Method Of Transferring Strained Semiconductor Structures The transfer of strained semiconductor layers from one substrate to another substrate involves depositing a multilayer structure on a substrate having surface contaminants. Available for thumbnail of Feynman Center (505) 665-9090 Email Method Of Transferring Strained Semiconductor Structures The transfer of strained semiconductor layers from one substrate to another substrate involves depositing a multilayer structure on a substrate having

399

Smart Lawrence Berkeley National Laboratory Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

From Berkeley Lab to the Marketplace Smart Lawrence Berkeley National Laboratory Technology Transfer with Partner Lawrence Berkeley National Laboratory Technology Transfer at...

400

NREL: Technology Transfer - Webmaster - National Renewable ...  

National Renewable Energy Laboratory Technology Transfer Webmaster. To report any problems on or ask a question about the NREL Technology Transfer Web ...

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Technology Transfer Commercialization Act of 2000 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Transfer Commercialization Act of 2000 Technology Transfer Commercialization Act of 2000 PUBLIC LAW 106-404-NOV. 1, 2000 To improve the ability of Federal agencies to...

402

Heat Transfer Enhancement in Thermoelectric Power Generation.  

E-Print Network (OSTI)

??Heat transfer plays an important role in thermoelectric (TE) power generation because the higher the heat-transfer rate from the hot to the cold side of (more)

Hu, Shih-yung

2009-01-01T23:59:59.000Z

403

Fermilab | Office of Partnerships and Technology Transfer ...  

Quantum Diaries; Office of Partnerships and Technology Transfer. Feature. Tech Transfer at Fermilab. In an effort to fuel the economy and foster ...

404

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks  

E-Print Network (OSTI)

A medium access control (MAC) protocol is developed for wireless multimedia networks based on frequency division duplex (FDD) wideband code division multiple access (CDMA). In this protocol, the received power levels of simultaneously transmitting users are controlled by a minimum-power allocation algorithm such that the heterogeneous bit error rates (BERs) of multimedia traffic are guaranteed. With minimumpower allocation, a multimedia wideband CDMA generalized processor sharing (GPS) scheduling scheme is proposed. It provides fair queueing to multimedia traffic with different QoS constraints. It also takes into account the limited number of code channels for each user and the variable system capacity due to interference experienced by users in a CDMA network. The admission of real-time connections is determined by a new effective bandwidth connection admission control (CAC) algorithm in which the minimum-power allocation is also considered. Simulation results show that the new MAC protocol guarantees QoS requirements of both real-time and non-real-time traffic in an FDD wideband CDMA network.

Xudong Wang

2003-01-01T23:59:59.000Z

405

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. Gonzlez Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

406

Protocols for implementing DOE authorized release of radioactive scrap metals  

SciTech Connect

A process to implement the US Department of Energy`s (DOE) policy for authorized release of radioactive materials from DOE facilities is provided in the Draft Handbook for Controlling Release for Reuse or Recycle of Property Containing Residual Radioactive Material, published by DOE in 1997 and distributed to DOE field offices for interim use and implementation. The authorized release of such property is intended to permit its beneficial use across the entire DOE complex. A computerized management tool--P2Pro(RSM)--has been developed to aid in carrying out the release process for radioactive metals. It contains protocols for the authorized release process and relevant information to facilitate the evaluation of scrap metals for reuse and recycle. The P2Pro(RSM) protocols provide DOE and its contractors with an effective, user-friendly tool for managing authorized release activities P2Pro(RSM) is designed to be used in the Windows{sup {trademark}} environment. The protocols incorporate a relational database coupled with a graphic-user interface to guide the user through the appropriate steps so authorized release limits can be developed. With the information provided in the database, an as-low-as-reasonably-achievable (ALARA) optimization process can be easily set up and run for up to 10 alternatives for disposition of radioactive scrap metals. The results of the ALARA optimization process can be printed in a series of reports and submitted as part of the application for the authorized release of the radioactive scrap metals.

Chen, S.Y.; Arnish, J.; Kamboj, S.; Nieves, L.A. [Argonne National Lab., IL (United States). Environmental Assessment Div.

1999-11-01T23:59:59.000Z

407

Technology_Transfer_Memo.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TechnologyTransferMemo.pdf TechnologyTransferMemo.pdf TechnologyTransferMemo.pdf More Documents & Publications PolicyStatementonTechnologyTransfer.pdf...

408

Comments on ORNL Tech transfer.txt - Notepad | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on ORNL Tech transfer.txt - Notepad Comments on ORNL Tech transfer.txt - Notepad Comments on ORNL Tech transfer.txt - Notepad More Documents & Publications TECHNOLOGY TRANSFER...

409

Transferability of Data Related to the Underground Test Area Project, Nevada Test Site, Nye County, Nevada: Revision 0  

SciTech Connect

This document is the collaborative effort of the members of an ad hoc subcommittee of the Underground Test Area (UGTA) Technical Working Group (TWG). The UGTA Project relies on data from a variety of sources; therefore, a process is needed to identify relevant factors for determining whether material-property data collected from other areas can be used to support groundwater flow, radionuclide transport, and other models within a Corrective Action Unit (CAU), and for documenting the data transfer decision and process. This document describes the overall data transfer process. Separate Parameter Descriptions will be prepared that provide information for selected specific parameters as determined by the U.S. Department of Energy (DOE) UGTA Project Manager. This document and its accompanying appendices do not provide the specific criteria to be used for transfer of data for specific uses. Rather, the criteria will be established by separate parameter-specific and model-specific Data Transfer Protocols. The CAU Data Documentation Packages and data analysis reports will apply the protocols and provide or reference a document with the data transfer evaluations and decisions.

Stoller-Navarro Joint Venture

2004-06-24T23:59:59.000Z

410

Canister Transfer System Description Document  

SciTech Connect

The Canister Transfer System receives transportation casks containing large and small disposable canisters, unloads the canisters from the casks, stores the canisters as required, loads them into disposal containers (DCs), and prepares the empty casks for re-shipment. Cask unloading begins with cask inspection, sampling, and lid bolt removal operations. The cask lids are removed and the canisters are unloaded. Small canisters are loaded directly into a DC, or are stored until enough canisters are available to fill a DC. Large canisters are loaded directly into a DC. Transportation casks and related components are decontaminated as required, and empty casks are prepared for re-shipment. One independent, remotely operated canister transfer line is provided in the Waste Handling Building System. The canister transfer line consists of a Cask Transport System, Cask Preparation System, Canister Handling System, Disposal Container Transport System, an off-normal canister handling cell with a transfer tunnel connecting the two cells, and Control and Tracking System. The Canister Transfer System operating sequence begins with moving transportation casks to the cask preparation area with the Cask Transport System. The Cask Preparation System prepares the cask for unloading and consists of cask preparation manipulator, cask inspection and sampling equipment, and decontamination equipment. The Canister Handling System unloads the canister(s) and places them into a DC. Handling equipment consists of a bridge crane/hoist, DC loading manipulator, lifting fixtures, and small canister staging racks. Once the cask has been unloaded, the Cask Preparation System decontaminates the cask exterior and returns it to the Carrier/Cask Handling System via the Cask Transport System. After the DC is fully loaded, the Disposal Container Transport System moves the DC to the Disposal Container Handling System for welding. To handle off-normal canisters, a separate off-normal canister handling cell is located adjacent to the canister transfer cell and is interconnected to the transfer cell by means of the off-normal canister transfer tunnel. All canister transfer operations are controlled by the Control and Tracking System. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal Waste Handling Building (WHB) support systems.

NONE

2000-10-12T23:59:59.000Z

411

Polarisation Transfer in Proton Compton Scattering at High Momentum Transfer  

DOE Green Energy (OSTI)

The Jefferson Lab Hall A experiment E99-114 comprised a series of measurements to explore proton Compton scattering at high momentum transfer. For the first time, the polarisation transfer observables in the p (~ 0 ~ p) reaction were measured in the GeV energy range, where it is believed that quark-gluon degrees of freedom begin to dominate. The experiment utilised a circularly polarised photon beam incident on a liquid hydrogen target, with the scattered photon and recoil proton detected in a lead-glass calorimeter and a magnetic spectrometer, respectively.

David Hamilton

2004-12-31T23:59:59.000Z

412

Security analysis of the time-coding quantum key distribution protocols  

E-Print Network (OSTI)

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.

Thierry Debuisschert; Simon Fossier

2011-08-31T23:59:59.000Z

413

Bio-Imaging Technology Transfer and Commercialization ...  

Science Conference Proceedings (OSTI)

Bio-Imaging Technology Transfer and Commercialization Showcase. For Immediate Release: August 25, 2009. ...

2010-12-29T23:59:59.000Z

414

NREL: Technology Transfer - President Obama Unveils Climate ...  

National Renewable Energy Laboratory Technology Transfer President Obama Unveils Climate Action Plan

415

Nanoscale heat transfer - from computation to experiment  

E-Print Network (OSTI)

Heat transfer can differ distinctly at the nanoscale from that at the macroscale. Recent advancement in

Luo, Tengfei

2013-04-09T23:59:59.000Z

416

Reaction mechanisms of pair transfer  

E-Print Network (OSTI)

The mechanisms of nuclear transfer reactions are described for the transfer of two nucleons from one nucleus to another. Two-nucleon overlap functions are defined in various coordinate systems, and their transformation coefficients given between coordinate systems. Post and prior couplings are defined for sequential transfer mechanisms, and it is demonstrated that the combination of `prior-post' couplings avoids non-orthogonality terms, but does not avoid couplings that do not have good zero-range approximations. The simultaneous and sequential mechanisms are demonstrated for the $^{124}$Sn(p,t)$^{122}$Sn reaction at 25 MeV using shell-model overlap functions. The interference between the various simultaneous and sequential amplitudes is shown.

Ian J. Thompson

2012-04-13T23:59:59.000Z

417

"S" Glass Manufacturing Technology Transfer  

SciTech Connect

A glass-ceramic-to metal sealing technology patented by Sandia National Laboratories, Albuquerque (SNLA) was developed by MRC-Mound for use in the manufacture of weapon components. Successful implementation attracted increasingly widespread weapon use of this technology. "S-glass" manufacturing technology was transferred to commercial vendors to ensure that weapons production schedules would be met in the coming years. Such transfer also provided sources of this fledgling technology for the Department of Defense (DOD), aerospace and other commercial uses. The steps involved in the technology transfer are described, from the initial cooperative development work of Sandia and Mound scientists and technologists to the final phase of qualifying commercial vendors for component manufacture.

Buckner, Dean, A.; McCollister, Howard, L.

1988-06-01T23:59:59.000Z

418

FAQs for Survey Forms 809 and 819  

Gasoline and Diesel Fuel Update (EIA)

9 and 819 9 and 819 EIA-809 (Weekly Oxygenate Report) How do I submit the form? There are four ways to submit the EIA-809 form. Secure File Transfer: https://signon.eia.doe.gov/upload/noticeoog.jsp The Secure File Transfer System uses the secure hypertext transfer protocol (HTTPS), an industry standard method to send information over the web using secure, encrypted processes. Electronic Filing Option: The PC Electronic Data Reporting Option (PEDRO) is a Windows-based application that will enable you to enter data interactively, import data from your own database, validate your data online, and transmit the encrypted data electronically to EIA via the Internet or a dial-up modem. To receive this free software call (202) 586-9659. Email: oog.surveys@eia.gov Fax forms to: (202) 586-1076

419

Technology transfer | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology transfer Technology transfer Technology available for licensing: CURLSNovember 21, 2013 Containment Unidirectional Resource Loading System expands flexibility of glove boxes and other containment systems. Read more about Technology available for licensing: CURLS Rhodobacter System for the Expression of Membrane Proteins Using photosynthetic bacteria (Rhodobacter) for the expression of heterologous membrane proteins Read more about Rhodobacter System for the Expression of Membrane Proteins Synthesizing Membrane Proteins Using In Vitro Methodology This in vitro, cell-free expression system caters to the production of protein types that are challenging to study: membrane proteins, membrane-associated proteins, and soluble proteins that require complex redox cofactors.

420

Addendum to the Building America House Simulation Protocols  

SciTech Connect

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

Science Conference Proceedings (OSTI)

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

422

Addendum to the Building America House Simulation Protocols  

SciTech Connect

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

423

Formal hardware specification languages for protocol compliance verification  

Science Conference Proceedings (OSTI)

The advent of the system-on-chip and intellectual property hardware design paradigms makes protocol compliance verification increasingly important to the success of a project. One of the central tools in any verification project is the modeling language, ... Keywords: Esterel, Heterogeneous Hardware Logic, Hierarchical Annotated Action Diagrams, Java, Lava, Live Sequence Charts, Message Sequence Charts, Objective VHDL, OpenVera, Property Specification Language, SpecC, Specification and Description Language, Statecharts, SystemC, SystemVerilog, The Unified Modeling Language, e, hardware monitors, timing diagrams

Annette Bunker; Ganesh Gopalakrishnan; Sally A. Mckee

2004-01-01T23:59:59.000Z

424

Entanglement Sharing Protocol via Quantum Error Correcting Codes  

E-Print Network (OSTI)

We introduce a new multiparty cryptographic protocol, which we call `entanglement sharing schemes', wherein a dealer retains half of a maximally-entangled bipartite state and encodes the other half into a multipartite state that is distributed among multiple players. In a close analogue to quantum secret sharing, some subsets of players can recover maximal entanglement with the dealer whereas other subsets can recover no entanglement (though they may retain classical correlations with the dealer). We find a lower bound on the share size for such schemes and construct two non-trivial examples based on Shor's $[[9,1,3

Ran Hee Choi; Ben Fortescue; Gilad Gour; Barry C. Sanders

2012-12-18T23:59:59.000Z

425

Protocol, Technical Qualification Program - October 22, 2003 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program - October 22, 2003 Technical Qualification Program - October 22, 2003 Protocol, Technical Qualification Program - October 22, 2003 October 22, 2003 Technical Qualification Program Procedure (OA-50-TQP-1) This procedure implements the Office of ES&H Evaluations Technical Qualification Program (TQP) per the criteria contained in DOE Manual 426.1-1 "Federal Technical Capability Manual". Key elements of the program include: identifying personnel required to participate in the TQP, identifying, developing, approving, revising and updating individual qualification requirements, evaluating staff members against the assigned Technical Qualification Standards and documenting the approval of equivalencies, establishing and updating individual development plans, training

426

NREL: Technology Transfer - 22nd Industry Growth Forum ...  

22nd Industry Growth Forum Presentations. ... Technology: Energy storage ... Technology Transfer Home; About Technology Transfer;

427

Resource Center Workforce SBIR/STTR Technology Transfer ...  

Science Conference Proceedings (OSTI)

... Students in Today's Global Marketplace Technology Transfer Benefits to Academia from Tech Transfer Partnerships RESOURCE CENTER ...

2013-08-21T23:59:59.000Z

428

A Comparative experimental study of media access protocols for wireless radio networks  

SciTech Connect

We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2) Performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the performance of a communication network, it will be important to study the entire protocol stuck as a single algorithmic construct; optimizing individual layers in the 7 layer OSI stack will not yield performance improvements beyond a point.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.)

2001-05-24T23:59:59.000Z

429

Semiclassical aspects of transfer reactions  

SciTech Connect

Semiclassical analysis of heavy ion induced transfer reactions are discussed for the quasielastic region. Some unique aspects of these reactions are shown, the variety of features which can be understood semiclassically is demonstrated, and some open problems are indicated. 28 refs., 16 figs. (LEW)

Bond, P.D.

1985-01-01T23:59:59.000Z

430

Submersible canned motor transfer pump  

DOE Patents (OSTI)

A transfer pump used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass therethrough, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank.

Guardiani, Richard F. (Ohio Township, Allegheny County, PA); Pollick, Richard D. (Sarver, PA); Nyilas, Charles P. (Monroeville, PA); Denmeade, Timothy J. (Lower Burrell, PA)

1997-01-01T23:59:59.000Z

431

NIH Technology Transfer Prepared by  

E-Print Network (OSTI)

Institutes of Health U.S. Department of Health & Human Services February 2013 #12;Table of Contents 2013 Federal Laboratory Consortium | National Award | Excellence in Technology Transfer Glybera®: First Gene.......................................................................................................................... 3 2012 National Institutes of Health | Inventors on NIH Patents Issued in FY 2012 Congratulations

Bandettini, Peter A.

432

The self-describing data sets file protocol and Toolkit  

SciTech Connect

The Self-Describing Data Sets (SDDS) file protocol continues to be used extensively in commissioning the Advanced Photon Source (APS) accelerator complex. SDDS protocol has proved useful primarily due to the existence of the SDDS Toolkit, a growing set of about 60 generic commandline programs that read and/or write SDDS files. The SDDS Toolkit is also used extensively for simulation postprocessing, giving physicists a single environment for experiment and simulation. With the Toolkit, new SDDS data is displayed and subjected to complex processing without developing new programs. Data from EPICS, lab instruments, simulation, and other sources are easily integrated. Because the SDDS tools are commandline-based, data processing scripts are readily written using the user`s preferred shell language. Since users work within a UNIX shell rather than an application-specific shell or GUI, they may add SDDS-compliant programs and scripts to their personal toolkits without restriction or complication. The SDDS Toolkit has been run under UNIX on SUN OS4, HP-UX, and LINUX. Application of SDDS to accelerator operation is being pursued using Tcl/Tk to provide a GUI.

Borland, M.; Emery, L.

1995-12-31T23:59:59.000Z

433

Data Transfer | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transfer Data Transfer The Blue Gene/P connects to other research institutions using a total of 20 GBs of public network connectivity. This allows scientists to transfer datasets to and from other institutions over fast research networks such as the Energy Science Network (ESNet) and the Metropolitan Research and Education Network (MREN). Data Transfer Node Overview Two data transfer nodes are available to all Intrepid users, that provide the ability to perform wide and local area data transfers. dtn01.intrepid.alcf.anl.gov (alias for gs1.intrepid.alcf.anl.gov) dtn02.intrepid.alcf.anl.gov (alias for gs2.intrepid.alcf.anl.gov) Data Transfer Utilities HSI/HTAR HSI and HTAR allow users to transfer data to and from HPSS Using HPSS on Intrepid GridFTP GridFTP provides the ability to transfer data between trusted sites such

434

Geo energy research and development: technology transfer  

DOE Green Energy (OSTI)

Sandia Geo Energy Programs related to geothermal, coal, oil and gas, and synfuel resources have provided a useful mechanism for transferring laboratory technologies to private industry. Significant transfer of hardware, computer programs, diagnostics and instrumentation, advanced materials, and in situ process understanding has occurred through US/DOE supported programs in the past five years. The text briefly reviews the technology transfer procedures and summarizes 32 items that have been transferred and another 20 technologies that are now being considered for possible transfer to industry. A major factor in successful transfer has been personal interactions between Sandia engineers and the technical staff from private industry during all aspects of the technology development.

Traeger, R.K.

1982-03-01T23:59:59.000Z

435

Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

Ahvar, Ehsan; Piran, Mohammad Jalil

2011-01-01T23:59:59.000Z

436

Effective algorithms and protocols for wireless networking: a topological approach  

E-Print Network (OSTI)

Much research has been done on wireless sensor networks. However, most protocols and algorithms for such networks are based on the ideal model Unit Disk Graph (UDG) model or do not assume any model. Furthermore, many results assume the knowledge of location information of the network. In practice, sensor networks often deviate from the UDG model significantly. It is not uncommon to observe stable long links that are more than five times longer than unstable short links in real wireless networks. A more general network model, the quasi unit-disk graph (quasi-UDG) model, captures much better the characteristics of wireless networks. However, the understanding of the properties of general quasi-UDGs has been very limited, which is impeding the design of key network protocols and algorithms. In this dissertation we study the properties for general wireless sensor networks and develop new topological/geometrical techniques for wireless sensor networking. We assume neither the ideal UDG model nor the location information of the nodes. Instead we work on the more general quasi-UDG model and focus on figuring out the relationship between the geometrical properties and the topological properties of wireless sensor networks. Based on such relationships we develop algorithms that can compute useful substructures (planar subnetworks, boundaries, etc.). We also present direct applications of the properties and substructures we constructed including routing, data storage, topology discovery, etc. We prove that wireless networks based on quasi-UDG model exhibit nice properties like separabilities, existences of constant stretch backbones, etc. We develop efficient algorithms that can obtain relatively dense planar subnetworks for wireless sensor networks. We also present efficient routing protocols and balanced data storage scheme that supports ranged queries. We present algorithmic results that can also be applied to other fields (e.g., information management). Based on divide and conquer and improved color coding technique, we develop algorithms for path, matching and packing problem that significantly improve previous best algorithms. We prove that it is unlikely for certain problems in operation science and information management to have any relatively effective algorithm or approximation algorithm for them.

Zhang, Fenghui

2008-08-01T23:59:59.000Z

437

NREL: Technology Transfer - Research Facilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Facilities Research Facilities Photo of Solar Energy Research Facility building at NREL. NREL's Solar Energy Research Facility is one of many world-class facilities available to public and private agencies. For developing commercially viable energy products, organizations may partner with NREL to use our state-of-the-art laboratories, and testing and user facilities. Visit NREL's Research Facilities Web site to learn more about them. We typically develop technology partnership agreements for using our facilities and/or working with our researchers. Printable Version Technology Transfer Home About Technology Transfer Technology Partnership Agreements Licensing Agreements Nondisclosure Agreements Research Facilities Commercialization Programs Success Stories News Contacts Did you find what you needed?

438

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network (OSTI)

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Andrew Lutomirski; Scott Aaronson; Edward Farhi; David Gosset; Avinatan Hassidim; Jonathan Kelner; Peter Shor

2009-12-21T23:59:59.000Z

439

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network (OSTI)

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Lutomirski, Andrew; Farhi, Edward; Gosset, David; Hassidim, Avinatan; Kelner, Jonathan; Shor, Peter

2009-01-01T23:59:59.000Z

440

Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics  

E-Print Network (OSTI)

Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

Stewart, Frank J.

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

442

Validation of ice skating protocol to predict aerobic power in hockey players.  

E-Print Network (OSTI)

??Validation ofan Ice Skating Protocol to Predict Aerobic Power in Hockey Players In assessing the physiological capacity of ice hockey players, researchers have often reported (more)

Petrella, Nicholas J.

2006-01-01T23:59:59.000Z

443

Submersible canned motor transfer pump  

DOE Patents (OSTI)

A transfer pump is described which is used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass there through, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank. 17 figs.

Guardiani, R.F.; Pollick, R.D.; Nyilas, C.P.; Denmeade, T.J.

1997-08-19T23:59:59.000Z

444

Enhanced heat transfer using nanofluids  

DOE Patents (OSTI)

This invention is directed to a method of and apparatus for enhancing heat transfer in fluids such as deionized water. ethylene glycol, or oil by dispersing nanocrystalline particles of substances such as copper, copper oxide, aluminum oxide, or the like in the fluids. Nanocrystalline particles are produced and dispersed in the fluid by heating the substance to be dispersed in a vacuum while passing a thin film of the fluid near the heated substance. The fluid is cooled to control its vapor pressure.

Choi, Stephen U. S. (Lisle, IL); Eastman, Jeffrey A. (Naperville, IL)

2001-01-01T23:59:59.000Z

445

Intermodal transfer of spent fuel  

Science Conference Proceedings (OSTI)

As a result of the international standardization of containerized cargo handling in ports around the world, maritime shipment handling is particularly uniform. Thus, handier exposure parameters will be relatively constant for ship-truck and ship-rail transfers at ports throughout the world. Inspectors' doses are expected to vary because of jurisdictional considerations. The results of this study should be applicable to truck-to-rail transfers. A study of the movement of spent fuel casks through ports, including the loading and unloading of containers from cargo vessels, afforded an opportunity to estimate the radiation doses to those individuals handling the spent fuels with doses to the public along subsequent transportation routes of the fuel. A number of states require redundant inspections and for escorts over long distances on highways; thus handlers, inspectors, escort personnel, and others who are not normally classified as radiation workers may sustain doses high enough to warrant concern about occupational safety. This paper addresses the question of radiation safety for these workers. Data were obtained during, observation of the offloading of reactor spent fuel (research reactor spent fuel, in this instance) which included estimates of exposure times and distances for handlers, inspectors and other workers during offloading and overnight storage. Exposure times and distance were also for other workers, including crane operators, scale operators, security personnel and truck drivers. RADTRAN calculational models and parameter values then facilitated estimation of the dose to workers during incident-free ship-to-truck transfer of spent fuel.

Neuhauser, K.S. (Sandia National Labs., Albuquerque, NM (United States)); Weiner, R.F. (Western Washington Univ., Bellingham, WA (United States))

1991-01-01T23:59:59.000Z

446

Transfer Rate vs. I/O Units  

NLE Websites -- All DOE Office Websites (Extended Search)

O Units Transfer Rate vs. IO Units These plots show the transfer rate from the IO benchmarks as a function of the number of elizaio units in use for each particular eliza at the...

447

Adaptive file transfers for diverse environments  

Science Conference Proceedings (OSTI)

This paper presents dsync, a file transfer system that can dynamically adapt to a wide variety of environments. While many transfer systems work well in their specialized ontext, their performance comes at the cost of generality, and they perform poorly ...

Himabindu Pucha; Michael Kaminsky; David G. Andersen; Michael A. Kozuch

2008-06-01T23:59:59.000Z

448

Please transfer ALL data off /house  

NLE Websites -- All DOE Office Websites (Extended Search)

Please transfer ALL data off house before 1212013 Please transfer ALL data off house September 3, 2013 by Kjiersten Fagnan (0 Comments) We are happy to announce that all the...

449

A Global Diagnostic of Interocean Mass Transfers  

Science Conference Proceedings (OSTI)

An objective and quantitative estimate of all mean annual interocean mass transfers together with a picture of the associated mean pathways is presented. The global ocean circulation transfers mass, heat, and salinity between the various ocean ...

B. Blanke; S. Speich; G. Madec; K. Ds

2001-06-01T23:59:59.000Z

450

Authorized Signature Title Asset Transfer Authorization  

E-Print Network (OSTI)

of CREF, simply indicate "TIAA-CREF" below. For all other transfers, please provide the company's address separate forms. (This form cannot be used for TIAA Basic RA transfers. Please contact TIAA for form F6969

McGaughey, Alan

451

N-Stream Approximations to Radiative Transfer  

Science Conference Proceedings (OSTI)

Schuster's two-stream approximation is first derived from Chandrasekhar's radiative transfer equation, and then generalized to an arbitrary number of streams. The resulting technique for solving the transfer equation that is similar to the ...

Charles Acquista; Frederick House; James Jafolla

1981-07-01T23:59:59.000Z

452

Power transfer through strongly coupled resonances  

E-Print Network (OSTI)

Using self-resonant coils in a strongly coupled regime, we experimentally demonstrate efficient non-radiative power transfer over distances of up to eight times the radius of the coils. We use this system to transfer 60W ...

Kurs, Andr

2007-01-01T23:59:59.000Z

453

Attn Technology Transfer Questions.txt - Notepad  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Attn Technology Transfer Questions.txt From: eschaput esandc@prodigy.net Sent: Monday, January 26, 2009 10:31 PM To: GC-62 Subject: Attn: Technology Transfer Questions We have...

454

Transfer in Reinforcement Learning via Shared Features  

E-Print Network (OSTI)

We present a framework for transfer in reinforcement learning based on the idea that related tasks share some common features, and that transfer can be achieved via those shared features. The framework attempts to capture ...

Konidaris, George

455

Automated Protocols Used by Labs | Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Notices Notices Automated Protocols Used by Labs Print page Print page Email page Email page DOE laboratories have two additional options for submitting data electronically to OSTI. They are: Batch Upload (Site-to-OSTI), and Harvesting (OSTI-to-Site). The XML DTD supporting Batch Upload specifies the same metadata that is used by the web-based AN 241.1. The main difference between web notice input and Harvesting upload is that the latter allows uploading of multiple records as a batch file. The web 241.1 is for single-record input only. Harvesting consists of three main phases: 1) Metadata mapping and technical development, 2) Testing, and 3) Production. The production phase is ongoing based on monitoring for quality control. Required Metadata Elements Author(s)

456

Microsoft Word - Assessment-C-SiteVisitProtocol  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ATTACHMENT C ATTACHMENT C DEPARTMENTAL EVALUATION AND SITE VISIT PROTOCOL 1. The Departmental Records Officer will provide in writing to the PRO a sixty day notice of intent to evaluate, along with recommended sites to be visited and areas to be examined. 2. The PRO will notify sites to be visited and coordinate mutually agreeable dates with the Departmental Records Officer. 3. The PRO will provide an overview of the organization's Records Management Program and make summaries of assessments available for review prior to the evaluation. 4. The PRO will highlight changes made to the program and future plans for improvement. 5. Field site visits may include the PRO and shall not exceed three days unless specified in writing. 6. Field sites will provide an overview of:

457

Addendum to the Building America House Simulation Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Addendum to the Building Addendum to the Building America House Simulation Protocols C. Engebrecht Metzger, E. Wilson, and S. Horowitz National Renewable Energy Laboratory December 2012 ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark,

458

DOE Transportation Protocols Topic Group Summary of Second Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary of Second Conference Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 11:00 a.m. Eastern time on Thursday, April 8, 1999. The session was led by Mona Williams, DOE/National Transportation Program (NTP)-Albuquerque. Other participants included Patricia Armijo, DOE/NTP-Albuquerque; Alex Thrower, Urban Energy & Transportation Corporation; Chris Wells, Southern States Energy Board; Elizabeth Helvey, JK Research Associates; Ken Niles, Oregon Office of Energy; Lisa Sattler, Council of State Governments-Midwestern Office; Laurel Cook, DOE/Naval Reactors (NR); Chris Wentz, New Mexico Department of Energy, Minerals and Natural Resources; Phillip Paull, Council of State Governments-Northeastern Conference; and

459

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

NLE Websites -- All DOE Office Websites (Extended Search)

USCAR FUEL CELL TECH TEAM USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May 26, 2010 Fuel cells, especially for automotive propulsion, must operate over a wide range of operating and cyclic conditions. The desired operating range encompasses temperatures from below the freezing point to well above the boiling point of water, humidity from ambient to saturated, and half-cell potentials from 0 to >1.5 volts. Furthermore, the anode side of the cell may be exposed to hydrogen and air during different parts of the driving and startup/shutdown cycles. The severity in operating conditions is greatly exacerbated by the transient and cyclic nature of

460

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4/12/10 4/12/10 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and consistent application of government contingency and contractor management reserve (MR) in the planning and execution of DOE capital asset projects in accordance with the requirements of DOE Order 413.3 and the Federal Acquisition Regulations (FARs). This guidance is consistent with Acquisition Letter 2009-01, "Management Reserve and Contingency," October 6, 2008 from the Office of Procurement and Assistance Management. Project contingency and MR are an integral part of the DOE capital asset project risk management process, providing project managers with the tools to respond to project risks and

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Comparison of Bandwidth Usage: Service Location Protocol and Jini  

E-Print Network (OSTI)

Recently there has been an increase in the development of technologies for resource discovery, since for example, resources such as printers, mail boxes, memory space, and disk space are available in every network, ready to be used for any host. This has been caused, in part, by the growth in the popularity of portable devices such as laptops, PDAs, and cell phones which require configuration each time they attach to a new network segment. Since the configuration of such devices is tedious and sometimes complicated, there have been some attempts in past years to solve this problem, such as the DHCP approach. This paper focuses on the bandwidth analysis of two new approaches for dealing with resource discovery: the Service Location Protocol (SLP) and Jini. This work is particularly important since the communication among the devices is often wireless, whereas bandwidth is a limited resource. We present equations for characterizing the usage of bandwidth made by SLP and Jini, bas...

Javier Govea; Michel Barbeau

2000-01-01T23:59:59.000Z

462

A common protocol for agent-based social simulation  

E-Print Network (OSTI)

Traditional (i.e. analytical) modelling practices in the social sciences rely on a very well established, although implicit, methodological protocol, both with respect to the way models are presented and to the kinds of analysis that are performed. Unfortunately, computer-simulated models often lack such a reference to an accepted methodological standard. This is one of the main reasons for the scepticism among mainstream social scientists that results in low acceptance of papers with agent-based methodology in the top journals. We identify some methodological pitfalls that, according to us, are common in papers employing agent-based simulations, and propose appropriate solutions. We discuss each issue with reference to a general characterization of dynamic micro models, which encompasses both analytical and simulation models. In the way, we also clarify some confusing terminology. We then propose a three-stage process that could lead to the establishment of methodological standards in social and economic simulations.

Roberto Leombruni; Matteo Richiardi; Nicole J. Saam; Michele Sonnessa

2006-01-01T23:59:59.000Z

463

Protocols for Relay-Assisted Free-Space Optical Systems  

E-Print Network (OSTI)

We investigate transmission protocols for relay-assisted free-space optical (FSO) systems, when multiple parallel relays are employed and there is no direct link between the source and the destination. As alternatives to all-active FSO relaying, where all the available relays transmit concurrently, we propose schemes that select only a single relay to participate in the communication between the source and the destination in each transmission slot. This selection is based on the channel state information (CSI) obtained either from all or from some of the FSO links. Thus, the need for synchronizing the relays' transmissions is avoided and the slowly varying nature of the atmospheric channel is exploited. For both relay selection and all-active relaying, novel closed-form expressions for their outage performance are derived, assuming the versatile Gamma-Gamma channel model. Furthermore, based on the derived analytical results, the problem of allocating the optical power resources to the FSO links is addressed, ...

Chatzidiamantis, Nestor D; Kriezis, Emmanouil E; Karagiannidis, George K; Schober, Robert

2011-01-01T23:59:59.000Z

464

Addendum to the Building America House Simulation Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Addendum to the Building Addendum to the Building America House Simulation Protocols C. Engebrecht Metzger, E. Wilson, and S. Horowitz National Renewable Energy Laboratory December 2012 ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark,

465

FLIP: A flexible interconnection protocol for heterogeneous internetworking  

E-Print Network (OSTI)

This paper describes the Flexible Interconnection Protocol, or FLIP, whose main goal is to allow interconnection of heterogeneous devices with varying power, processing, and communication capabilities, ranging from simple sensors to more powerful computing devices such as laptops and desktops. The vision is that FLIP will be used to interconnect such devices forming clouds in the farthest branches/leaves of the Internet, while still providing connectivity with the existing IP-based Internet infrastructure. Through its flexible, customizable headers FLIP integrates just the functions required by a given application and that can be handled by the underlying device. Simple devices like sensors will benefit from incurring close to optimal overhead saving not only bandwidth, but, more importantly, energy. More sophisticated devices in the cloud can be responsible for implementing more complex functions like reliable/ordered data delivery, communication with other device clouds and with the IP infrastructure. FLIP is designed to provide a basic substrate on which to build network- and transport-level functionality. In heterogeneous environments, FLIP allows devices with varying capabilities to coexist and interoperate under the same network infrastructure. We present the basic design of FLIP and describe its implementation under Linux. We also report on FLIPs performance when providing IPv4 and IPv6 as well as transport-layer functionality a la TCP and UDP. We show FLIPs energy efficiency in different sensor network scenarios. For example, we use FLIP to implement the directed diffusion communication paradigm and obtain an improvement of 50 % in energy savings over an existing directed diffusion implementation. Finally, we showcase FLIPs flexibility by demonstrating its ability to incorporate new protocol functions

Ignacio Solis; Katia Obraczka

2004-01-01T23:59:59.000Z

466

Protocols for Thermoluninescence and Optically Stimulated Luminescence Research at DOSAR  

SciTech Connect

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research at the Dosimetry Applications Research (DOSAR) facility complex. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and materials testing in a variety of radiation environments. Collaborations with the University of Tennessee-Knoxville (UTK) have also led to important contributions in the area of archaeometry, particularly as it relates to the use of radiation dosimetry to date archaeological artifacts. This manual is to serve as the primary instruction and operation manual for dosimetric and archaeometric research at DOSAR involving thermoluminescence (TL) and optically stimulated luminescence (OSL). Its purpose is to (1) provide protocols for common practices associated with the research, (2) outline the relevant organizational structure, (3) identify the Quality Assurance plan, and (4) describe all the procedures, operations, and responsibilities for safe and proper operation of associated equipment. Each person who performs research at DOSAR using TL/OSL equipment is required to read the latest revision of this manual and be familiar with its contents, and to sign and date the manual's master copy indicating that the manual has been read and understood. The TL/OSL Experimenter is also required to sign the manual after each revision to signify that the changes are understood. Each individual is responsible for completely understanding the proper operation of the TL/OSL equipment used and for following the guidance contained within this manual. The instructions, protocols, and operating procedures in this manual do not replace, supersede, or alter the hazard mitigation controls identified in the Research Safety Summary (''Thermoluminescence/Optically Stimulated Luminescence Dosimetry'') for this research, ORNL's Standards-Based Management System or any other official guidelines.

Bernal, SM

2004-10-11T23:59:59.000Z

467

NREL: Technology Transfer - Solar Policy and Program ...  

National Renewable Energy Laboratory Technology Transfer ... Unbiased analysis of economic and market impacts related to policy changes;

468

NREL: Technology Transfer - NREL Launches Renewable Energy ...  

The National Renewable Energy Laboratory's (NREL's) ... For more information about REopt, visit the new website. Printable Version. Technology Transfer Home;

469

Modelling Carbon with Transferable Empirical Potentials  

Science Conference Proceedings (OSTI)

Complexities associated with hybridization and anisotropy meant that transferable potentials for carbon were slow to emerge, lagging decades behind similar...

470

Energy Innovation Portal Bridging Technology Transfer ...  

Call the Energy Innovation Portal (the Portal) a Craigslist for technology transfer, aimed at entrepreneurs, investors, and corporate technology scouts.

471

NREL: Technology Transfer - Materials Exposure Testing Market ...  

National Renewable Energy Laboratory Technology Transfer Materials Exposure Testing Market Expands with Ultra-Accelerated Weathering System

472

PNNL: Doing Business - Technology Transfer Contacts  

Search PNNL. PNNL Home; About; Research; Publications; Jobs; News; Contacts; PNNL's Technology Transfer team represents more than a century of ...

473

Available Technologies: Heat Transfer Interface for Thermo ...  

Refrigeration systems; Internal combustion engines; ... The components of the technology could be used to improve heat transfer in industrial, ...

474

Argonne National Laboratory - Office of Technology Transfer  

argonne national laboratory's office of technology transfer offers licensable technologies developed at the Laboratory and oversees other agreements with research ...

475

NREL: Technology Transfer - Clean Energy Investors Directory  

National Renewable Energy Laboratory Technology Transfer NREL is no longer maintaining the Clean Energy Investors Directory due to widely accessible ...

476

Transfer function identification in power system applications  

Science Conference Proceedings (OSTI)

This paper presents an introduction to concepts and applications of transfer function identification in power systems. The paper begins with a brief introduction to transfer function identification methods using least-squares approaches and then discusses applications which include SVC's, model validation applications, and software validation. A comparison is also made between eigenvalues obtained from transfer function identification and small signal analysis. Methods for testing the validity of identified transfer functions are also discussed.

Smith, J.R.; Fatehi, F.; Woods, C.S. (Montana State Univ., Bozeman, MT (United States)); Hauer, J.F. (Bonneville Power Administration, Portland, OR (United States)); Trudnowski, D.J. (Battelle Pacific Northwest Labs., Richland, WA (United States))

1993-08-01T23:59:59.000Z

477

NREL: Technology Transfer - Commercialization Assistance Program  

National Renewable Energy Laboratory Technology Transfer Commercialization Assistance Program. The NREL Commercialization Assistance Program (NCAP) helps emerging ...

478

NREL: Technology Transfer - Agreements for Commercializing ...  

National Renewable Energy Laboratory Technology Transfer Agreements for Commercializing Technology. NREL uses Agreements for Commercializing Technology (ACT) when a ...

479

NREL: Technology Transfer - Cooperative Research and ...  

National Renewable Energy Laboratory Technology Transfer Cooperative Research and Development Agreements. NREL uses a cooperative research and development agreement ...

480

Partnering Today: Technology Transfer Highlights Reactive ...  

THE LLNL TECHNOLOGY COMPANY PRODUCT Partnering Today: Technology Transfer Highlights Reactive NanoTechnologies Inc.: Temperature-controlled Precision Bonding

Note: This page contains sample records for the topic "hypertext transfer protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Los Alamos Lab: Technology Transfer | Home Page  

Contacts Event Calendar Maps Organization Phonebook Policy Center Emergency. NEWS. LIBRARY. JOBS. Technology Transfer, TT . Division Home; About Us; Organization;

482

FY 2008 Summary Federal Tech Transfer  

Science Conference Proceedings (OSTI)

Summary Report on Federal Laboratory Technology Transfer FY2008. For Immediate Release: April 30, 2010. Contact: Cathleen ...

2013-06-26T23:59:59.000Z

483

Jefferson Lab Technology Transfer - Thomas Jefferson National ...  

JSA Invention Disclosure; Technology Transfer Issues (Ombudsman) Programs and Facilities. Free-Electron Laser Program (FEL) Applied Research Center ...

484

Heat Transfer & Alternative Energy Systems Group Staff ...  

Science Conference Proceedings (OSTI)

Heat Transfer and Alternative Energy Systems Group Staff. Staff Listing. Dr. William M. Healy, Leader, Supervisory Mechanical ...

2013-08-07T23:59:59.000Z

485

Sandia National Laboratories : Licensing/Technology Transfer  

Search; About Sandia; Mission Areas; Newsroom; Careers; Doing Business; Education; Contact Us; Licensing and Technology Transfer. IP Home; Search ...

486

NREL: Technology Transfer - NREL Electrode Innovation ...  

National Renewable Energy Laboratory Technology Transfer NREL Electrode Innovation Poised to Shake Up the Li-ion Battery Industry

487

NETL: Technology Transfer - Available Technologies for Partnership  

Technology Transfer Available Technologies for Partnership Software and Modeling. Month Posted. Partnership Opportunity. Patent Information. 12/2011: ...

488

Policy 1305 Cost Transfers Involving Sponsored Projects  

E-Print Network (OSTI)

Policy 1305 Cost Transfers Involving Sponsored Projects Responsible Office Office of Grant transfer of payroll and other direct costs associated with sponsored projects. Purpose of the Policy are responsible for ensuring that transfers of costs to sponsored projects which represent corrections of errors

489

Office of Technology Transfer TES MICROBOLOMETER IMPROVED  

E-Print Network (OSTI)

in key areas for UW TechTransfer. UW researchers, faculty and staff reported 335 innovations, which TechTransfer programs like the Technology Gap Innovation Fund and LaunchPad continue to demonstrate and dedication of an exceptional team assembled at UW TechTransfer. This past year we have added staff in key

Kemner, Ken

490

Understanding slow BGP routing table transfers  

Science Conference Proceedings (OSTI)

Researchers and network operators often say that BGP table transfers are slow. Despite this common knowledge, the reasons for slow BGP transfers are not well understood. This paper explains BGP table transfer delays by combining BGP messages collected ... Keywords: bgp, route propagation, routing convergence

Zied Ben Houidi; Mickael Meulle; Renata Teixeira

2009-11-01T23:59:59.000Z

491

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

492

Heat transfer via dropwise condensation on hydrophobic microstructured surfaces  

E-Print Network (OSTI)

Dropwise condensation has the potential to greatly increase heat transfer rates. Heat transfer coefficients by dropwise condensation and film condensation on microstructured silicon chips were compared. Heat transfer ...

Ruleman, Karlen E. (Karlen Elizabeth)

2009-01-01T23:59:59.000Z

493

TECHNOLOGY TRANSFER QUESTIONS..txt - Notepad | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TECHNOLOGY TRANSFER QUESTIONS..txt - Notepad TECHNOLOGY TRANSFER QUESTIONS..txt - Notepad TECHNOLOGY TRANSFER QUESTIONS..txt - Notepad More Documents & Publications Attn Technology...

494

TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY TRANSFERCOMMERCIALIZATION ACT OF 2000 TECHNOLOGY TRANSFER...

495

TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY...

496

Attn Technology Transfer Questions.txt - Notepad | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Attn Technology Transfer Questions.txt - Notepad Attn Technology Transfer Questions.txt - Notepad Attn Technology Transfer Questions.txt - Notepad More Documents & Publications...

497

HEAT TRANSFER IN UNDERGROUND HEATING EXPERIMENTS IN GRANITE, STRIPA, SWEDEN  

E-Print Network (OSTI)

Analysis of. Nonlinear Heat Transfer Problems." Report no.Berkeley, Ca. , APPENDIX A. HEAT TRANSFER BY CONDUCTION ANDMeeting, Technical Session on Heat Transfer in Nuclear Waste

Chan, T.

2010-01-01T23:59:59.000Z

498

Optimization of Phase Change Heat Transfer in Biporous Media  

E-Print Network (OSTI)

Aspectcs of Boiling Heat Transfer. PhD Thesis dissertation,Celled Foams. Numerical Heat Transfer, Vol. 54, issue 1,Dimensional Fluid Flow and Heat Transfer. Numerical Heat

Reilly, Sean

2013-01-01T23:59:59.000Z

499

Technology Transfer Ombudsman Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Technology Transfer Ombudsman Program Technology Transfer Ombudsman Program The Technology Transfer Commercialization Act of 2000, Public Law 106-404 (PDF) was enacted in November 2000. Pursuant to Section 11, Technology Partnerships Ombudsman, each DOE national laboratory and research facility has appointed a technology partnership ombudsman (ombuds). The role of the ombuds is prevention and early resolution of disputes between the lab and inventors or private companies over technology transfer issues such as infringement, intellectual property rights, royalties and licensing, etc. The Director, Office of Conflict Prevention and Resolution, coordinates this program and compiles data for quarterly reports. See the Department of Energy Technology Transfer Ombuds (PDF).

500

Dry Transfer Systems for Used Nuclear Fuel  

Science Conference Proceedings (OSTI)

The potential need for a dry transfer system (DTS) to enable retrieval of used nuclear fuel (UNF) for inspection or repackaging will increase as the duration and quantity of fuel in dry storage increases. This report explores the uses for a DTS, identifies associated general functional requirements, and reviews existing and proposed systems that currently perform dry fuel transfers. The focus of this paper is on the need for a DTS to enable transfer of bare fuel assemblies. Dry transfer systems for UNF canisters are currently available and in use for transferring loaded canisters between the drying station and storage and transportation casks.

Brett W. Carlsen; Michaele BradyRaap

2012-05-01T23:59:59.000Z