Powered by Deep Web Technologies
Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

2

Kyoto Protocol Response (Alabama) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

3

The Kyoto Protocol and developing countries  

E-Print Network (OSTI)

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

4

Russia's role in the Kyoto Protocol  

E-Print Network (OSTI)

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

5

Kyoto Protocol: Enforcement Prohibitions (West Virginia) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Climate Policies The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the residential, commercial,

6

Kyoto Protocol Act of 1998 (Illinois) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) < Back Eligibility State/Provincial Govt Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Program Info State Illinois Program Type Climate Policies Environmental Regulations Provider Illinois Pollution Control Board Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse effects of climate change which in whole or in part reduces emissions of greenhouse gases, as those gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors. In the absence of

7

The Cost of Kyoto Protocol Targets: The Case of Japan  

E-Print Network (OSTI)

This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

Paltsev, Sergey.

8

Multi-gas assessment of the Kyoto protocol  

E-Print Network (OSTI)

The Kyoto Protocol is an international agreement aimed at limiting emissions of several greenhouse gases (GHGs; specifically: CO2, CH4, N2O, PFCs, HFCs, and SF6), and allows credit for approved sinks for CO2. It does not ...

Reilly, John M.; Prinn, Ronald G.; Harnisch, Jochen.; Fitzmaurice, Jean.; Jacoby, Henry D.; Kicklighter, David W.; Stone, Peter H.; Sokolov, Andrei P.; Wang, Chien.

9

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

10

The effects on developing countries of the Kyoto Protocol and CO? emissions trading  

E-Print Network (OSTI)

This paper examines the effect of the Kyoto Protocol on developing economies using marginal abatement curves generated by MIT's Emissions Prediction and Policy Assessment model (EPPA). In particular, the paper addresses ...

Ellerman, A. Denny.; Jacoby, Henry D.; Decaux, Annelène.

11

Energy Efficient Service Delivery in Clouds in Compliance with the Kyoto Protocol  

E-Print Network (OSTI)

Cloud computing is revolutionizing the ICT landscape by providing scalable and efficient computing resources on demand. The ICT industry - especially data centers, are responsible for considerable amounts of CO2 emissions and will very soon be faced with legislative restrictions, such as the Kyoto protocol, defining caps at different organizational levels (country, industry branch etc.) A lot has been done around energy efficient data centers, yet there is very little work done in defining flexible models considering CO2. In this paper we present a first attempt of modeling data centers in compliance with the Kyoto protocol. We discuss a novel approach for trading credits for emission reductions across data centers to comply with their constraints. CO2 caps can be integrated with Service Level Agreements and juxtaposed to other computing commodities (e.g. computational power, storage), setting a foundation for implementing next-generation schedulers and pricing models that support Kyoto-compliant CO2 trading ...

Lucanin, Drazen; Mastelic, Toni; Brandic, Ivona

2012-01-01T23:59:59.000Z

12

A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?  

E-Print Network (OSTI)

EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

Bugnion, Véronique.; Reiner, David M.

13

Impacts of the Kyoto protocol on U.S. energy markets and economic activity  

SciTech Connect

The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

NONE

1998-10-01T23:59:59.000Z

14

Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol  

Gasoline and Diesel Fuel Update (EIA)

2 2 Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol July 1999 Energy Information Administration Office of Integrated Analysis and Forecasting U.S. Department of Energy Washington, DC 20585 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy position of the Department of Energy or of any other organization. Service Reports are prepared by the Energy Information Administration upon special request and are based on assumptions specified by the requester. Preface The analysis in this report was undertaken at the request of the Committee on Science of the U.S.

15

Kyoto's Unfinished Business  

E-Print Network (OSTI)

The authors offer a provisional assessment of where the Kyoto negotiations have left the climate change issue. They present a few widely divergent assesments of what the Kyoto Protocol on Climate Change will accomplish, ...

Jacoby, Henry D.; Prinn, Ronald G.; Schmalensee, Richard.

16

kyoto1.htm  

Gasoline and Diesel Fuel Update (EIA)

THE COMMITTEE ON SCIENCE THE COMMITTEE ON SCIENCE U.S. HOUSE OF REPRESENTATIVES OCTOBER 9, 1998 At the request of the House of Representatives' Committee on Science, the Energy Information Administration has completed a detailed study of the potential, carbon-related impacts of the Kyoto Protocol on the price of energy in the United States and on the overall economy. The uncertainties involved in such an analysis are many, not the least of which is ambiguity about how much carbon emissions from energy use would actually have to be reduced in the United States versus how much of the Kyoto Protocol requirement could be met by other factors, such as reduced emissions from other greenhouse gases and international emissions trading. For this reason, further studies will clearly be needed.

17

Japanese nuclear power and the Kyoto agreement  

E-Print Network (OSTI)

We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

18

The evolution of a climate regime: Kyoto to Marrakech  

E-Print Network (OSTI)

At meetings in Bonn and Marrakech in 2001, the Conference of the Parties to the Framework Convention on Climate Change broke through an impasse on the detailed provisions needed to allow the Kyoto Protocol to enter into ...

Babiker, Mustafa H.M.; Jacoby, Henry D.; Reilly, John M.; Reiner, David M.

19

EIA - Forecasts and Analysis of Energy Data  

Gasoline and Diesel Fuel Update (EIA)

G: Key Assumptions for the IEO2005 Kyoto Protocol Case G: Key Assumptions for the IEO2005 Kyoto Protocol Case Energy-Related Emissions of Greenhouse Gases The System for the Analysis of Global energy Markets (SAGE)—the model used by the Energy Information Administration (EIA) to prepare the International Energy Outlook 2005 (IEO2005) mid-term projections—does not include non-energy-related emissions of greenhouse gases, which are estimated at about 15 to 20 percent of total greenhouse gas emissions, based on inventories submitted to the United Nations Framework Convention on Climate Change (UNFCCC). SAGE models global energy supply and demand and, therefore, does not address agricultural and other non-energy-related emissions. EIA implicitly assumes that percentage reductions of non-energy-related emissions and their associated abatement costs will be similar to those for energy-related emissions. Non-energy-related greenhouse gas emissions are likely to grow faster than energy-related emissions; however, the marginal abatement costs for non-energy-related greenhouse gas emissions are not known and cannot be estimated reliably. In SAGE, each region’s emissions reduction goal under the Kyoto Protocol is based only on the corresponding estimate of that region’s energy-related carbon dioxide emissions, as determined by EIA data. It is assumed that the required reductions will also be proportionately less than if all gases were included.

20

Implementing the UN Kyoto Protocol: Clean Development Mechanism...  

NLE Websites -- All DOE Office Websites (Extended Search)

(Sustainable Energy Advisors) report on Chinese CDM activities, based on their related energy efficiency consulting activities undertaken for clients including the World Bank,...

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Control of CO2 Emissions of China under Kyoto Protocol  

Science Conference Proceedings (OSTI)

the paper explores the major factors that affect CO2 emissions by the analysis for time-series of China since Chinese innovation and opening. The analysis concludes that there is no inverse-U curve between economic development and CO2 emissions. The ...

Zhao Yong

2009-10-01T23:59:59.000Z

22

John Cahn to Receive 2011 Kyoto Prize For Fundamental ...  

Science Conference Proceedings (OSTI)

John Cahn to Receive 2011 Kyoto Prize For Fundamental Contributions to Materials Science. For Immediate Release: June 24, 2011. ...

2011-06-27T23:59:59.000Z

23

John Cahn to Receive 2011 Kyoto Prize for Fundamental ...  

Science Conference Proceedings (OSTI)

John Cahn to Receive 2011 Kyoto Prize for Fundamental Contributions to Materials Science. From NIST Tech Beat: July 6, 2011. ...

2011-07-06T23:59:59.000Z

24

GraduateScho ol of Energy Science, Kyoto University  

E-Print Network (OSTI)

GraduateScho ol of Energy Science, Kyoto University GraduateScho ol of Energy Science, Kyoto University The Department of Socio-Environmental Energy Science aims to establish ideal energy systems. For this purpose, various energy problems are systematically analyzed from sociological, political, economical

Takada, Shoji

25

Kyoto-Related Fossil-Fuel CO2 Emission Totals  

NLE Websites -- All DOE Office Websites (Extended Search)

Kyoto-Related Emissions Kyoto-Related Emissions Kyoto-Related Fossil-Fuel CO2 Emission Totals DOI: 10.3334/CDIAC/ffe.007_V2012 world map Kyoto-Related Fossil-Fuel CO2 Emission Totals Year Annex B Countries Non Annex B Countries Fossil-Fuel CO2 Emissions (million metric tonnes C) Bunkers (million metric tonnes C) Fossil-Fuel CO2 Emissions (million metric tonnes C) Bunkers (million metric tonnes C) 1990 3894 90 2111 46 1991 3801 94 2299 38 1992 3750 109 2263 44 1993 3685 107 2339 48 1994 3656 107 2469 54 1995 3681 110 2570 59 1996 3704 111 2657 72 1997 3727 114 2737 74 1998 3746 118 2698 82 1999 3678 124 2718 90 2000 3725 130 2821 90 2001 3781 120 2936 92 2002 3764 128 3013 94 2003 3853 123 3347 98 2004 3888 135 3683 107 2005 3933 142 3926 106

26

http://www.kyoto-u.ac.jp/ja 22 22  

E-Print Network (OSTI)

://www.kyoto-u.ac.jp/en Integrated Human Studies Integrated Human Studies Letters Letters Education Educational Sciences Law Economics Economics and Management Science Science Medicine Medical Science (6) Human Health Sciences Pharmaceutical Sciences Pharmaceutical Sciences Pharmacy (6) Engineering Global Engineering, Architecture

Takada, Shoji

27

http://www.kyoto-u.ac.jp/ja 22 22  

E-Print Network (OSTI)

://www.kyoto-u.ac.jp/en Integrated Human Studies Integrated Human Studies Letters Letters Education Educational Sciences Law Economics Economics and Management Science Science Medicine Medical Science (6) Human Health Sciences Pharmaceutical Sciences Sciences for Drug Discovery Pharmacy (6) Engineering Global Engineering, Architecture

Takada, Shoji

28

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network (OSTI)

the deployment of renewable power generation in the U.S.240nations to shift power generation bases to sustainable low-of fos- sil fuel fired power generation facilities, is

Ferrey, Steven

2010-01-01T23:59:59.000Z

29

Measuring Emissions Against an Alternative Future: Fundamental Flaws in the Structure of the Kyoto Protocol's  

E-Print Network (OSTI)

with over 80 CDM and renewable energy professionals involved in CDM project development, including project in renewable energy and hydropower development in India. It also draws on analysis of the UNEP Risoe CDM registered hydro projects in China. This paper presents the following findings: The majority of CDM projects

Kammen, Daniel M.

30

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network (OSTI)

Seeking Phaseout of Coal-Fired Plants, 39 ENV'Tr Rvr'. (BNA)built more new coal-fired power plants than Britain-the seat

Ferrey, Steven

2010-01-01T23:59:59.000Z

31

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network (OSTI)

are from combustion of fossil fuels. 114 A fossil fuelparticularly from fossil-fuel sources, is very likely to beJacobson, Control of Fossil-Fuel Particulate Black Carbon

Ferrey, Steven

2010-01-01T23:59:59.000Z

32

Impacts of the Kyoto Protocol on U.S. Energy Markets and Economic...  

Gasoline and Diesel Fuel Update (EIA)

Economic Activity October 1998 Energy Information Administration Office of Integrated Analysis and Forecasting U.S. Department of Energy Washington, DC 20585 This report was...

33

Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information  

Open Energy Info (EERE)

Kyoto: Think Global, Act Local (K:TGAL) Kyoto: Think Global, Act Local (K:TGAL) Jump to: navigation, search Name Kyoto: Think Global, Act Local (K:TGAL) Agency/Company /Organization Netherlands Development Cooperation Sector Land, Climate Topics GHG inventory Website http://www.communitycarbonfore Program Start 2003 Program End 2009 References K:TGAL[1] Kyoto: Think Global, Act Local (K:TGAL) Screenshot "Kyoto: Think Global, Act Local (K:TGAL) is a research and capacity building program, financed by the Netherlands Development Cooperation, it is investigating the possibilities and potential for Community Based Forest Management of existing natural forest to be included as an eligible carbon mitigation activity under international climate change agreements in the future, particularly under REDD policy. The program involves research teams

34

An Aerosol Climatology at Kyoto: Observed Local Radiative Forcing and Columnar Optical Properties  

Science Conference Proceedings (OSTI)

In order to evaluate the radiative effect of the atmospheric aerosol at Kyoto, Japan, surface solar irradiance and columnar aerosol optical properties were observed in the period between September 1998 and December 2001. The aerosol optical ...

Takahiro Yabe; Robert Höller; Susumu Tohno; Mikio Kasahara

2003-06-01T23:59:59.000Z

35

PROTOCOLS MANUAL  

NLE Websites -- All DOE Office Websites (Extended Search)

as your end-user's. For instance, if you always issue the same set of commands when you enter SPIRES, you can assemble the commands in a protocol and add it, with your account as...

36

Annual Report of the Institute for Frontier Medical Sciences Kyoto University  

E-Print Network (OSTI)

Annual Report of the Institute for Frontier Medical Sciences Kyoto University #12;#12;Institute for Frontier Medical Sciences 1 2 3 4 5 6 #12;#12;Institute for Frontier Medical Sciences 1 #12;Annual Report 2011 2 #12;Institute for Frontier Medical Sciences #12;Annual Report 2011 3 #12;Institute for Frontier

Takada, Shoji

37

Role of Bioenergy in the Kyoto Protocol, in the EU-ETS and in future Climate Agreements  

E-Print Network (OSTI)

in existing plants (co-firing) is already competitive with other fuels at a CO2 price of about 20 Euros

38

NFS version 4 Protocol  

Science Conference Proceedings (OSTI)

NFS (Network File System) version 4 is a distributed file system protocol which owes heritage to NFS protocol versions 2 [RFC1094] and 3 [RFC1813]. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2000-12-01T23:59:59.000Z

39

Delta Coherence Protocols: The Home Update Protocol  

SciTech Connect

We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

Williams, C.; Reynolds, P.F.; de Supinoki, B.

2000-07-21T23:59:59.000Z

40

Kyoto Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Center for Reliable Electric Power Transmission Center for Reliable Electric Power Transmission Alan Mantooth, University of Arkansas 1 1 National Center for Reliable Electric Power Transmission A Center for Advanced Power Electronics Dr. H. Alan Mantooth, Director Dr. Simon Ang, Associate Director Dr. Juan Carlos Balda, Associate Director Dr. Roy McCann, Associate Director University of Arkansas - Fayetteville http://ncrept.eleg.uark.edu Silicon Carbide Research for Reliable Electric Power: Design and Test National Center for Reliable Electric Power Transmission Alan Mantooth, University of Arkansas 2 Research advanced power electronic solutions for grid- connected applications Fault currents continue to rise in urban centers and the use of FCLs provides an attractive way to extend the useful life of

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Kyoto Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: V gs,S5 ; Channel 2: V gs,S6 ; Channel 3: V XFMR,S ; Channel 4: I SourceInductor Energy Storage Current RES Current Both currents are positive, showing that both sources...

42

Econophysics on Real Economy -The First Decade of the Kyoto Econophysics Group-  

E-Print Network (OSTI)

Research activities of Kyoto Econophysics Group is reviewed. Strong emphasis has been placed on real economy. While the initial stage of research was a first high-definition data analysis on personal income, it soon progressed to firm dynamics, growth rate distribution and establishment of Pareto's law and Gibrat's law. It then led to analysis and simulation of firm dynamics on economic network. Currently it covers a wide rage of dynamics of firms and financial institutions on complex network, using Japanese large-scale network data, some of which are not available in other countries. Activities of this group for publicising and promoting understanding of econophysics is also reviewed.

Aoyama, Hideaki; Ikeda, Yuichi; Iyetomi, Hiroshi; Souma, Wataru

2010-01-01T23:59:59.000Z

43

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network (OSTI)

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil. This fact alone tells us that oil is a finite resource, which in turn means that it is subject to depletion1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict

Keeling, Stephen L.

44

Commercial Buildings Communications protocols  

Science Conference Proceedings (OSTI)

There are many automation and control protocols in use in commercial building and residential sectors today. For both commercial building and residential sectors there are several thousand manufacturers throughout the world that supply end-use electrical appliances and other building fixtures that communicate using these automation and control protocols. Some of these protocols are based on open standards (for example, BACnet, DALI) while others are semi-proprietary (for example, Zigbee, LonWorks, Modbus...

2008-05-15T23:59:59.000Z

45

House Simulation Protocols Report  

Energy.gov (U.S. Department of Energy (DOE))

Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and...

46

Web Recency Maintenance Protocol  

Science Conference Proceedings (OSTI)

In this paper, we propose a new protocol namely Web Recency Maintenance Protocol (WRMP) that employs "push" mechanism to maintain the currency of the World Wide Web (WWW) at Search Engine (SE) site. As of this writing SEs are adopting "pull" technology, ...

K. Satya Sai Prakash; S. V. Raghavan

2002-12-01T23:59:59.000Z

47

Office Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Oversight » Safety & Emergency Management Evaluations Services » Oversight » Safety & Emergency Management Evaluations » Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

48

SCADA protocol vulnerabilities  

Science Conference Proceedings (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

49

The SUPDUP Protocol  

E-Print Network (OSTI)

The SUPDUP protocol provides for login to a remote system over a network with terminal-independent output, so that only the local system need know how to handle the user's terminal. It offers facilities for graphics and ...

Stallman, Richard M.

1983-07-01T23:59:59.000Z

50

Optimal protocols for nonlocality distillation  

Science Conference Proceedings (OSTI)

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

51

Efficient Data Transfer Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

52

APS Protocol for  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

53

Accountable internet protocol (aip)  

Science Conference Proceedings (OSTI)

This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding ... Keywords: accountability, address, internet architecture, scalability, security

David G. Andersen; Hari Balakrishnan; Nick Feamster; Teemu Koponen; Daekyeong Moon; Scott Shenker

2008-08-01T23:59:59.000Z

54

Protocols from perceptual observations  

Science Conference Proceedings (OSTI)

This paper presents a cognitive vision system capable of autonomously learning protocols from perceptual observations of dynamic scenes. The work is motivated by the aim of creating a synthetic agent that can observe a scene containing interactions between ... Keywords: Autonomous learning, Cognitive vision, Inductive logic programming, Spatio-temporal reasoning, Symbol grounding, Unsupervised clustering

Chris J. Needham; Paulo E. Santos; Derek R. Magee; Vincent Devin; David C. Hogg; Anthony G. Cohn

2005-09-01T23:59:59.000Z

55

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

56

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol  

Energy.gov (U.S. Department of Energy (DOE))

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol (November 1985, Rev. 1)

57

Securing Block Storage Protocols over IP  

Science Conference Proceedings (OSTI)

This document discusses how to secure block storage and storage discovery protocols running over IP (Internet Protocol) using IPsec and IKE (Internet Key Exchange). Threat models and security protocols are developed for iSCSI (Internet Protocol Small ...

B. Aboba; J. Tseng; J. Walker; V. Rangan; F. Travostino

2004-04-01T23:59:59.000Z

58

Appraisal Process Protocols, Independent Oversight - November...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Protocols, Independent Oversight - November 2012 Appraisal Process Protocols, Independent Oversight - November 2012 November 2012 Updated Independent Oversight...

59

Energy Efficiency Savings Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

60

Protocols and Systems Services  

E-Print Network (OSTI)

Current data-centers rely on TCP/IP over Fast- and Gigabit-Ethernet for data communication even within the cluster environment for costeffective designs, thus limiting their maximum capacity. Together with raw performance, such data-centers also lack in efficient support for intelligent services, such as requirements for caching documents, managing limited physical resources, load-balancing, controlling overload scenarios, and prioritization and QoS mechanisms, that are becoming a common requirement today. On the other hand, the System Area Network (SAN) technology is making rapid advances during the recent years. Besides high performance, these modern interconnects are providing a range of novel features and their support in hardware (e.g., RDMA, atomic operations, QoS support). In this paper, we address the capabilities of these current generation SAN technologies in addressing the limitations of existing data-centers. Specifically, we present a novel framework comprising of three layers (communication protocol support, data-center service primitives and advanced data-center services) that work together to tackle the issues associated with existing data-centers. We also present preliminary results in the various aspects of the framework, which demonstrate close to an order of magnitude performance benefits achievable by our framework as compared to existing data-centers in several cases.

Balaji Vaidyanathan Narravula; P. Balaji; K. Vaidyanathan; S. Narravula; H. -w. Jin; D. K. Panda

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Don't optimize existing protocols, design optimizable protocols  

Science Conference Proceedings (OSTI)

As networks grow in size and complexity, network management has become an increasingly challenging task. Many protocols have tunable parameters, and optimization is the process of setting these parameters to optimize an objective. In recent years, optimization ...

Jiayue He; Jennifer Rexford; Mung Chiang

2007-07-01T23:59:59.000Z

62

Network File System (NFS) version 4 Protocol  

Science Conference Proceedings (OSTI)

The Network File System (NFS) version 4 is a distributed filesystem protocol which owes heritage to NFS protocol version 2, RFC 1094, and version 3, RFC 1813. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2003-04-01T23:59:59.000Z

63

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; L. Masinter; P. Leach; T. Berners-Lee

1999-06-01T23:59:59.000Z

64

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; T. Berners-Lee

1997-01-01T23:59:59.000Z

65

Effects of Synoptic-scale Wind under the Typical Summer Pressure Pattern on the Mesoscale High-Temperature Events in the Osaka and Kyoto Urban Areas in Japan by the WRF model  

Science Conference Proceedings (OSTI)

The actual conditions of the mesoscale summer high temperatures (HT) recorded in Osaka-Kyoto urban area in Japan were investigated by using our observation network. The daytime temperatures observed on ten HT events in this area were the highest ...

Yuya Takane; Yukitaka Ohashi; Hiroyuki Kusaka; Yoshinori Shigeta; Yukihiro Kikegawa

66

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocols Report This image shows a cover of a report titled "Building America House Simulation Protocols." The Building America logo is shown in the lower left corner of...

67

Simulatable security for quantum protocols  

E-Print Network (OSTI)

The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a larger one. Recently, these methods have received much attention in the quantum cryptographic community. We give a short introduction to simulatable security in general and proceed by sketching the many different definitional choices together with their advantages and disadvantages. Based on the reactive simulatability modelling of Backes, Pfitzmann and Waidner we then develop a quantum security model. By following the BPW modelling as closely as possible, we show that composable quantum security definitions for quantum protocols can strongly profit from their classical counterparts, since most of the definitional choices in the modelling are independent of the underlying machine model. In particular, we give a proof for the simple composition theorem in our framework.

Dominique Unruh

2004-09-18T23:59:59.000Z

68

Formal apparatus for measurement of lightweight protocols  

Science Conference Proceedings (OSTI)

Lightweight protocols are an important topic in the area of computer communications. With the proliferation of security services not only ordinary communication protocols, but also cryptographic protocols, i.e. security services, have become a subject ... Keywords: Lightweight protocols, Security, Security services metrics, Standardization, Ubiquitous computing

Denis Tr?ek; Damjan Kova?

2009-02-01T23:59:59.000Z

69

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

70

Summary Protocol: Identification, Characterization, Designation, Remedial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

71

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

72

FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL  

E-Print Network (OSTI)

the SCADA networks protocols. Here the critical features of some common SCADA protocols will be presented

Dutertre, Bruno

73

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

74

IPv6 Advanced Protocols Implementation  

Science Conference Proceedings (OSTI)

This book is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not ...

Qing Li; Jinmei Tatuya; Keiichi Shima

2007-04-01T23:59:59.000Z

75

Cryptographic voting protocols: a systems perspective  

Science Conference Proceedings (OSTI)

Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software ...

Chris Karlof; Naveen Sastry; David Wagner

2005-07-01T23:59:59.000Z

76

Improving Accelerated Weathering Protocols to Anticipate ...  

Science Conference Proceedings (OSTI)

... Step # Water Spray Irradiance ... water sprays during the dark cycle augmented with numerous shorter sprays ? New Protocol correctly ...

2013-04-19T23:59:59.000Z

77

Independent Oversight Appraisal Process Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

78

Independent Oversight Appraisal Process Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

79

Former Worker Program Medical Protocol | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medical Protocol Former Worker Program Medical Protocol April 2013 The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which...

80

Deriving Efficient Cache Coherence Protocols Through Refinement  

Science Conference Proceedings (OSTI)

We address the problem of developing efficient cache coherence protocols for use in distributed systems implementing distributed shared memory (DSM) using message passing. A serious drawback of traditional approaches to this problem is that the users ... Keywords: DSM protocols, communication protocols, refinement

Ratan Nalumasu; Ganesh Gopalakrishnan

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Effective Protocols for Mobile Communications and Networking  

SciTech Connect

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

82

Analyzing the effect of routing protocols on media access control protocols in radio networks  

SciTech Connect

We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

83

California Energy Efficiency Evaluation Protocols | Building...  

NLE Websites -- All DOE Office Websites (Extended Search)

bpCaliforniaEnergyEfficiencyEvaluationProtocols.pdf Document Details Affiliation: California Public Utilities Commission Focus: Adoption Compliance Building Type: Commercial...

84

Transportation Protocols Working Group First Conference Call...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

85

Field Monitoring Protocol: Heat Pump Water Heaters  

NLE Websites -- All DOE Office Websites (Extended Search)

Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson National Renewable Energy Laboratory C.E. Hancock Mountain Energy...

86

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

87

Capture Effect of Randomly Addressed Polling Protocol  

Science Conference Proceedings (OSTI)

The capture effect, discussed in this paper, is generally considered to enhance the system‘s performance in a wireless network. This paper also considers the Randomly Addressed Polling (RAP) protocol in the presence of a fading mobile radio ... Keywords: capture effect, noiseless, randomly addressed polling protocol

Jiang-Whai Dai

1999-06-01T23:59:59.000Z

88

Security protocols, properties, and their monitoring  

Science Conference Proceedings (OSTI)

This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties ... Keywords: language-based security, monitoring of history-based properties, runtime verification, security automata, security protocols, temporal logic

Andreas Bauer; Jan Juerjens

2008-05-01T23:59:59.000Z

89

Proof-Based design of security protocols  

Science Conference Proceedings (OSTI)

We consider the refinement-based process for the development of security protocols. Our approach is based on the Event B refinement, which makes proofs easier and which makes the design process faithfull to the structure of the protocol as the designer ...

Nazim Benaissa; Dominique Méry

2010-06-01T23:59:59.000Z

90

RTP Control Protocol Extended Reports (RTCP XR)  

Science Conference Proceedings (OSTI)

This document defines the Extended Report (XR) packet type for the RTP Control Protocol (RTCP), and defines how the use of XR packets can be signaled by an application if it employs the Session Description Protocol (SDP). XR packets are composed of ...

T. Friedman; R. Caceres; A. Clark

2003-11-01T23:59:59.000Z

91

House Simulation Protocols Report | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Buildings » Building America » House Simulation Residential Buildings » Building America » House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

92

Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol  

E-Print Network (OSTI)

in technologies to convert cellulose-based raw materials into biofuels or renewable energy standards that provide crops from the food supply to biofuel raw materials was responsi- ble for the huge increase. Or so to his myriad duties, in recognition of the growing importance of cellulose as a raw material

93

Routing Protocols and Concepts, CCNA Exploration Companion Guide  

Science Conference Proceedings (OSTI)

Routing Protocols and Concepts CCNA Exploration Companion Guide Routing Protocols and Concepts, CCNA Exploration Companion Guide is the official supplemental textbook for the Routing Protocols and Concepts course in the Cisco Networking Academy CCNA ...

Rick Graziani; Allan Johnson

2007-12-01T23:59:59.000Z

94

Overview of the InterGroup protocols  

SciTech Connect

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

2001-03-01T23:59:59.000Z

95

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

96

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Name The Greenhouse Gas Protocol Initiative: Allocation...

97

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service...

98

High Performance Computing Data Center Metering Protocol | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

99

Event:GHG Protocol Latin America and Caribbean Regional Training...  

Open Energy Info (EERE)

GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol...

100

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

NREL Test-to-Failure Protocol (Presentation)  

DOE Green Energy (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

102

A decision maker for transport protocol configuration  

Science Conference Proceedings (OSTI)

This paper proposes an approach, called Protocol Configuration Decision Maker, for TCP to dynamically adapt to a network environment. The proposed mechanism monitors the network condition with parameters like loss rate. Then it consults a knowledge ...

Jae-Hyun Hwang; Jin-Hee Choi; Chuck Yoo

2006-05-01T23:59:59.000Z

103

Making sensornet MAC protocols robust against interference  

Science Conference Proceedings (OSTI)

Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external interference on state-of-the-art sensornet MAC protocols. Our experiments ...

Carlo Alberto Boano; Thiemo Voigt; Nicolas Tsiftes; Luca Mottola; Kay Römer; Marco Antonio Zúñiga

2010-02-01T23:59:59.000Z

104

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

105

Entanglement Distillation Protocols and Number Theory  

E-Print Network (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

106

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

107

Transition from Legacy Protocols to IEC 61850  

Science Conference Proceedings (OSTI)

Implementation of International Electrotechnical Commission (IEC) standard 61850, “Substation Automation,” within a utility is not necessarily easy or straightforward, especially when it is carried out within existing substations. During the transition, it is usually necessary to operate with both older devices supporting only legacy protocols and new, intelligent electronic devices, which now come with the IEC 61850 protocol. Both must coexist for a certain period in a substation ...

2012-12-31T23:59:59.000Z

108

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

109

The security of Ping-Pong protocol  

E-Print Network (OSTI)

Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

Jian-Chuan Tan; An Min Wang

2008-08-28T23:59:59.000Z

110

Strategy for Verifying Security Protocols with Unbounded Message Size  

Science Conference Proceedings (OSTI)

We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy ... Keywords: automatic strategies, flaw detection, intruder model, security protocols, verification

Y. Chevalier; L. Vigneron

2004-04-01T23:59:59.000Z

111

Towards automated design of MAC protocols for underwater wireless networks  

Science Conference Proceedings (OSTI)

We present a framework for the automated design of MAC protocols for underwater acoustic wireless networks. We formulate a protocol optimization problem in which the exchange of control packets is explicitly modeled. A protocol optimization program generates ... Keywords: automation, mac, network, wireless underwater protocol

Volkan Rodoplu; Amir Aminzadeh Gohari; Wei Tang

2008-09-01T23:59:59.000Z

112

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

113

The queue protocol: a deadlock-free, homogeneous, non-two-phase locking protocol  

Science Conference Proceedings (OSTI)

The M-pitfall protocol (MPP) is the most general homogeneous non-two-phase locking protocol which supports shared and exclusive locks. It has two major disadvantages: it is not deadlock-free and it has the paradoxical property that concurrency is often ...

Udo Kelter

1988-03-01T23:59:59.000Z

114

A class-chest for deriving transport protocols  

SciTech Connect

Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

Strayer, W.T.

1996-10-01T23:59:59.000Z

115

Interpolation of recurrence and hashing entanglement distillation protocols  

E-Print Network (OSTI)

We construct new entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method how entanglement-assisted distillation protocols can be converted into non-entanglement-assisted protocols with the same yield.

Karl Gerd H. Vollbrecht; Frank Verstraete

2004-04-20T23:59:59.000Z

116

Interpolation of recurrence and hashing entanglement distillation protocols  

Science Conference Proceedings (OSTI)

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

117

Routing Protocols to Maximize Battery Efficiency  

E-Print Network (OSTI)

In this paper we propose a routing protocol for wireless ad hoc networks whose nodes are largely battery powered. The battery capacity of the nodes is viewed as a common resource of the system and its use is to be optimized. Results from a previous study on battery management have shown that: (1) pulsed current discharge outperforms constant current discharge, (2) battery capacity can be improved by using a bursty discharge pattern due to charge recovery effects that take place during idle periods, (3) given a certain value of current drawn off the battery, higher current impulses degrade battery performance, even if the percentage of higher current impulses is relatively small. We develop a network protocol based on these findings. This protocol favors routes whose links have a low energy cost. We also distribute multihop traffic in a manner that allows all nodes a good chance to recover their battery energy reserve.

Carla F. Chiasserini; Ramesh R. Rao

2000-01-01T23:59:59.000Z

118

Test Purpose Generation for Timed Protocol Testing  

Science Conference Proceedings (OSTI)

Test purposes are requirements, usually constructed by hand, which aim at testing critical properties on implementations. These ones are then used by testing methods to generate test cases. Writing them manually is a heavy task, this is why we propose ... Keywords: Timed protocols, conformance testing, test purpose, testability

Sébastien Salva; Antoine Rollet

2009-07-01T23:59:59.000Z

119

Self-Protecting Session Initiation Protocol Stack  

Science Conference Proceedings (OSTI)

We present the Self-Protecting Session Initiation Protocol Stack capable of recognizing malicious SIP messages and protecting itself in high-load conditions. The stack model is based on the two-step processing and uses hash lookup tables and cellular ... Keywords: Cellular automata, Denial of Service, SIP, Self-protecting

Zoran Rusinovic; Nikola Bogunovic

2008-09-01T23:59:59.000Z

120

On communication protocols for tactical navigation assistance  

Science Conference Proceedings (OSTI)

Using tactical navigation systems is popular for military as well as search and rescue applications. For such applications, the significance of the tactical navigation systems arises especially when groups with the same goal move together on the terrain. ... Keywords: C-TRAMAF, Gossip-based ad hoc routing, N-Gossip, communication protocols, cross layer, digital battlefield, tactical navigation

Evren Onem; H. Birkan Yilmaz; Fatih Alagöz; Tuna Tugcu

2008-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Symbolic protocol analysis for monoidal equational theories  

Science Conference Proceedings (OSTI)

We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved ...

Stéphanie Delaune; Pascal Lafourcade; Denis Lugiez; Ralf Treinen

2008-02-01T23:59:59.000Z

122

A Simulation Model of the DOCSIS Protocol  

Science Conference Proceedings (OSTI)

The number of households and businesses using hybrid fiber coaxial cable networks for Internet access is rapidly approaching 40 million in the United States. The cable industry has standardized on a single medium access control (MAC) and physical layer ... Keywords: Data Over Cable Service Interface Specification (DOCSIS), Simulation methods, Transmission Control Protocol (TCP) performance, broadband access, hybrid fiber coaxial cable networks

Jim Martin; James Westall

2007-02-01T23:59:59.000Z

123

Measurement Protocols for Optimized Fuel Assembly Tags  

Science Conference Proceedings (OSTI)

This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

Gerlach, David C.; Mitchell, Mark R.; Reid, Bruce D.; Gesh, Christopher J.; Hurley, David E.

2008-11-01T23:59:59.000Z

124

Power-Save Protocols Corey Andalora  

E-Print Network (OSTI)

rate, etc. Outputs Average routing time per packet Overall power consumption of network #12;Project-84, July 2001. #12;BECA Nodes independently transition to the idle state and back to the sleep state. WhenOff By One Power-Save Protocols Corey Andalora Keith Needels #12;Agenda Topic explanation Problem

Kaminsky, Alan

125

Community-Aware Scheduling Protocol for Grids  

Science Conference Proceedings (OSTI)

Much work has been done to exploit the effectiveness and efficiency of job scheduling upon distributed computational––resources. With regard to existing resource topology and administrative constraints, scheduling approaches are designed ... Keywords: Community-Aware Scheduling Protocol, CASP, Grid, Scheduling, SmartGRID, MaGate

Ye Huang; Amos Brocco; Nik Bessis; Pierre Kuonen; Beat Hirsbrunner

2010-04-01T23:59:59.000Z

126

Interaction protocols for cross-organisational workflows  

Science Conference Proceedings (OSTI)

Workflow technologies are widely used in industry and commerce to assist in the specification, execution and completion of well defined processes within organisations. As industrial and commercial relations have evolved, based on advances on information ... Keywords: Cross-organisational workflows, Hierarchical Petry nets, Interaction protocols, Knowledge-based systems, Workflow integration

FláVio Soares CorrêA Da Silva; Mirtha Lina FernáNdez Venero; Diego Mira David; Mohammad Saleem; Paul W. H. Chung

2013-01-01T23:59:59.000Z

127

Calibrating embedded protocols on asynchronous systems  

Science Conference Proceedings (OSTI)

Embedding is a method of projecting one topology into another. In one-to-one node embedding, paths in the target topology correspond to links in the original topology. A protocol running on the original topology can be modified to be executed on a target ... Keywords: Asynchronous system, Channel system, Distributed system, Fault tolerance, Graph embedding, Transient fault, Virtual topology

Yukiko Yamauchi; Doina Bein; Toshimitsu Masuzawa; Linda Morales; I. Hal Sudborough

2010-05-01T23:59:59.000Z

128

TOSHIYUKI SUGAWA ## KYOTO UNIVERSITY Abstract. ###############################  

E-Print Network (OSTI)

. ############################### ##### ############ 1. ###### R # ##### ######### R ##### (1=2, 1=2)-## oeR # R ### ####### ##### R ######## z = z(p) : U ! V C #### oeR = oeR (z)|dz| ###### oeR (z) # V = z(U) ####################### Remark. #### oeR (z) ### z ################### ####### ########## #################### ('ff: Uff

Sugawa, Toshiyuki

129

Developmental issues in environmental reporting protocols  

SciTech Connect

In this paper, we review the policy differences and associated reporting and verification protocols between three energy and/or environmental reporting programs in the United States, specifically the Conservation Verification Protocols (CVP) - a voluntary set of procedures for reporting acid rain reductions from energy conservation, the Greenhouse Gas Voluntary Reporting Program (GGVRP) to acknowledge greenhouse gas-reducing activities, and a national database on energy efficiency programs (DEEP) an informational database on utility demand-side management (DSM) programs. The most important lesson learned in developing these reporting programs is that the accuracy of the program for reporting energy savings activities is dependent upon both the estimation and verification protocols used in the program and the mapping procedures used to generate emission impacts from energy savings. Additionally, the types of protocols that may be used in the program depend upon who is participating in the program. The free market can also be a useful tool in determining how much money reporting entities want to spend on energy savings and emissions reductions estimation and verification protocols by placing a dollar value on atmospheric emissions. After such programs are implemented, the program managers should ensure that an iterative, quality control process is utilized. The reporters of such information must be made aware that their numbers will be reviewed carefully and will be questioned for accuracy. Finally, the accuracy and confidence of the reported information should be reviewed on a periodic basis to ensure that the goals and expectations of the program and the reporting entities are being met.

Schrock, D.W.; Stoops, J.L. [Pacific Northwest Lab., Richland, WA (United States); Meier, A.K.; Vine, E.L. [Lawrence Berkeley Lab., CA (United States); Solomon, B.D. [Environmental Protection Agency (United States)

1994-08-01T23:59:59.000Z

130

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

131

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

132

A compositional logic for proving security properties of protocols  

Science Conference Proceedings (OSTI)

We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public-key cryptography. The logic, designed around a process calculus with actions for each possible ...

Nancy Durgin; John Mitchell; Dusko Pavlovic

2003-07-01T23:59:59.000Z

133

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

134

Configuring Networks and Devices with Simple Network Management Protocol (SNMP)  

Science Conference Proceedings (OSTI)

This document is written for readers interested in the Internet Standard Management Framework and its protocol, the Simple Network Management Protocol (SNMP). In particular, it offers guidance in the effective use of SNMP for configuration management. ...

M. MacFaden; D. Partain; J. Saperia; W. Tackabury

2003-04-01T23:59:59.000Z

135

Teapot: language support for writing memory coherence protocols  

Science Conference Proceedings (OSTI)

Recent shared-memory parallel computer systems offer the exciting possibility of customizing memory coherence protocols to fit an application's semantics and sharing patterns. Custom protocols have been used to achieve message-passing performance---while ...

Satish Chandra; Brad Richards; James R. Larus

1996-05-01T23:59:59.000Z

136

Quorum-Oriented Multicast Protocols for Data Replication  

E-Print Network (OSTI)

this paper we have presented a family of quorum multicast protocols, called naive, reschedule, retry, and count. We have shown that these protocols provide good availability while using fewer messages and requiring less latency than a simple multicast

H. Garcia-molina; Darrell Long; Richard A. Golding; R. M. Metcalfe

1991-01-01T23:59:59.000Z

137

Exploring Virtual Network Selection Algorithms in DSM Cache Coherence Protocols  

E-Print Network (OSTI)

lines in the modified state. In a home-based directory protocol, every cache line is assigned a home

Heinrich, Mark

138

Investigating the limits of randomized benchmarking protocols  

E-Print Network (OSTI)

In this paper, we analyze the performance of randomized benchmarking protocols on gate sets under a variety of realistic error models that include systematic rotations, amplitude damping, leakage to higher levels, and 1/f noise. We find that, in almost all cases, benchmarking provides better than a factor-of-two estimate of average error rate, suggesting that randomized benchmarking protocols are a valuable tool for verification and validation of quantum operations. In addition, we derive new models for fidelity decay curves under certain types of non-Markovian noise models such as 1/f and leakage errors. We also show that, provided the standard error of the fidelity measurements is small, only a small number of trials are required for high confidence estimation of gate errors.

Jeffrey M. Epstein; Andrew W. Cross; Easwar Magesan; Jay M. Gambetta

2013-08-13T23:59:59.000Z

139

An Evaluation of UDP Transport Protocols  

Science Conference Proceedings (OSTI)

Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

Carter, S

2004-12-21T23:59:59.000Z

140

A Protocol for Quantum Energy Distribution  

E-Print Network (OSTI)

A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

Masahiro Hotta

2008-03-11T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Building America House Simulation Protocols (Revised)  

Science Conference Proceedings (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

142

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network (OSTI)

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

143

A lightweight, high performance communication protocol for grid computing  

Science Conference Proceedings (OSTI)

This paper describes a lightweight, high-performance communication protocol for the high-bandwidth, high-delay networks typical of computational Grids. One unique feature of this protocol is that it incorporates an extremely accurate classification mechanism ... Keywords: Bayesian analysis, Classification mechanisms, Grid computing, High-performance communication protocols, High-performance networking

Phillip M. Dickens

2010-03-01T23:59:59.000Z

144

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

145

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

146

Building Technologies Office: Open-Protocol Platform for Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Open-Protocol Platform Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project to someone by E-mail Share Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Facebook Tweet about Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Twitter Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Google Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Delicious Rank Building Technologies Office: Open-Protocol Platform for

147

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks  

E-Print Network (OSTI)

This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

Yu, Hong

2012-01-01T23:59:59.000Z

148

View-Oriented Update Protocol with Integrated Diff for View-based Consistency  

E-Print Network (OSTI)

with a traditional diff-based protocol and an existing home-based protocol. Experimen- tal results demonstrate the performance of the proposed protocol is significantly better than the diff-based protocol and the home-based

Werstein, Paul

149

A protocol for instruction stream processing  

E-Print Network (OSTI)

The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. In this paper, we are concerned with the case where the processing takes place remotely. We describe a protocol to deal with the case where the behaviour produced by an instruction sequence under execution leads to the generation of a stream of instructions to be processed and a remote execution unit handles the processing of that stream of instructions.

Bergstra, J A

2009-01-01T23:59:59.000Z

150

Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared  

E-Print Network (OSTI)

Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared Memory Protocols. The protocol com- bines the advantages of homeless and home-based protocols. During lock synchronization a home-based page-based memory update using the invalidation coherence protocol. The protocol is called

Werstein, Paul

151

World Carbon Emissions, 1990, 2010, and 2020  

U.S. Energy Information Administration (EIA)

•Even if the Annex I countries were to reach the emissions levels specified under the Kyoto Climate Change Protocol, ...

152

The Pilgrim: A New Consistency Protocol for Distributed Shared Memory  

E-Print Network (OSTI)

We propose a new consistency protocol for distributed shared memory (DSM) where different shared objects are replicated at each site. This protocol was developed for the cooperative platform called CAliF: Cooperative Application Framework. This system uses the DSM to allow programmers to share objects or variables without having to manage the exchange. We present an algorithm which uses the token technique. The token is data structure which contains the updates of shared data. These data are carried through the ring on the token, named Pilgrim. Pilgrim protocol provides both reliable consistency and guaranteed performance according to the type of application described. The protocol is discussed and proved, and we demonstrate its qualities. Key words: consistency protocol, cooperative work, distributed shared memory, virtual ring. 1 Introduction In this paper, we propose a new consistency protocol for distributed shared memory (DSM) where different shared objects are replicated at eac...

H. Guyennet; J-c. Lapayre; M. Tréhel

1997-01-01T23:59:59.000Z

153

The Greenhouse Gas Protocol Initiative: Sector Specific Tools | Open Energy  

Open Energy Info (EERE)

Gas Protocol Initiative: Sector Specific Tools Gas Protocol Initiative: Sector Specific Tools Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Sector Specific Tools Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Industry, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity[1] The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion[2] The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources[3]

154

An object-oriented implementation of the Xpress Transfer Protocol  

SciTech Connect

Object-oriented design principles map well onto protocol implementations because protocols essentially manipulate two structures - packets and the states of the endpoints. In this paper the authors describe an implementation of the Xpress Transfer Protocol as a user space daemon written in C++. The object-oriented model forces the programmer to properly place functionality and information ownership. The model facilitates porting to various platforms and greatly eases the task of building data delivery services.

Strayer, W.T.; Gray, S.; Cline, R.E. Jr.

1994-10-01T23:59:59.000Z

155

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Stationary Combustion Guidance[1] The Greenhouse Gas Protocol tool for stationary combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

156

APPENDIX J: STATEMENT OF COMPLIANCE WITH DOE SEISMICITY PROTOCOL  

NLE Websites -- All DOE Office Websites (Extended Search)

compliance with the "Protocol for Induced Seismicity Associated with Enhanced Geothermal Systems". Calpine Corporation and other Geysers geothermal operators have long been...

157

Decentralized Decision-making and Protocol Design for Recycled ...  

E-Print Network (OSTI)

Nov 14, 2006 ... Optimization Online. Decentralized Decision-making and Protocol Design for Recycled Material Flows. I-Hsuan Hong (ihong ***at*** ...

158

Protocol, Appraisal Process Guide - April 2008 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Guide - April 2008 Protocol, Appraisal Process Guide - April 2008 April 2008 Emergency Management Oversight Appraisal Process Guide Emergency Management Oversight...

159

Analysis of limiting information characteristics of quantum-cryptography protocols  

SciTech Connect

The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

Sych, D V; Grishanin, Boris A; Zadkov, Viktor N [Department of Physics, M.V. Lomonosov Moscow State University, Moscow (Russian Federation)

2005-01-31T23:59:59.000Z

160

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks  

Science Conference Proceedings (OSTI)

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks. Yiyang Li • Jianxia Ning • Zhengyuan Xu •. Srikanth V. Krishnamurthy • Gang Chen. Ó Springer ...

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

DOE Transportation Protocols Topic Group Conference Call Summary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

162

DOE Transportation Protocols Topic Group Summary of Second Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

163

The Greenhouse Gas Protocol Initiative: Measurement and Estimation...  

Open Energy Info (EERE)

a quantitative and qualitative estimation of uncertainty associated with a GHG inventory. Overview The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a...

164

MAC and Routing Protocols for Mobile Underwater Acoustic Sensor Swarms  

E-Print Network (OSTI)

Pressure Routing for Underwater Sensor Networks . . . . . .of Aloha Protocols for Underwater Acoustic Sensor Networks.Critical Applications in Underwater Sensor Networks. In

Noh, Young Tae

2012-01-01T23:59:59.000Z

165

Communication Protocols and Data Standards for Energy-Related...  

NLE Websites -- All DOE Office Websites (Extended Search)

Development Contact Us Department Contacts Media Contacts Communication Protocols and Data Standards for Energy-Related Purposes Speaker(s): Bruce Nordman Date: January 13,...

166

Qubit-string-based bit commitment protocols with physical security  

E-Print Network (OSTI)

Several kinds of qubit-string-based(QS-based) bit commitment protocols are presented, and a definition of information-theoretic concealing is given. All the protocols presented here are proved to be secure under this definition. We suggest an attack algorithm to obtain the local unitary transformation introduced in no-go theorem, which is used to attack the binding condition, then study the security of our QS-based bit commitment protocols under this attack via introducing a new concept "physical security of protocol". At last we present a practical QS-based bit commitment scheme against channel loss and error.

Li Yang; Chong Xiang; Bao Li

2010-11-23T23:59:59.000Z

167

AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AVIATION BOARD OF DIRECTORS AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS The Department of Energy strives to manage its Aviation Program toward the highest standards of safety, efficiency, fairness in contracting, preservation of competition in the private sector, open communication, prudent property management, and the best examples of resource management. Toward these ends, the Department has established a management structure led by a Board of Directors comprising active Federal employee aviation managers from the Department. AUTHORITY: The following authorities serve as basis for this structure and system: Office of Management and Budget Circular A-126, FMR 102.33, DEAR 109, DOE Order 440.2B, Aviation Management Review Team Report, March 1999, and Secretary of Energy Appointment and Delegation of Authority, April 15, 1999.

168

High Performance Computing Data Center Metering Protocol  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance High Performance Computing Data Center Metering Protocol Prepared for: U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Federal Energy Management Program Prepared by: Thomas Wenning Michael MacDonald Oak Ridge National Laboratory September 2010 ii Introduction Data centers in general are continually using more compact and energy intensive central processing units, but the total number and size of data centers continues to increase to meet progressive computing requirements. In addition, efforts are underway to consolidate smaller data centers across the country. This consolidation is resulting in a growth of high-performance computing facilities (i.e. - supercomputers) which consume large amounts of energy to support the numerically intensive

169

A simulation of the FASTBUS protocols  

E-Print Network (OSTI)

FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. Its applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator.

Booth, A W

1981-01-01T23:59:59.000Z

170

Building America House Simulation Protocols (Revised)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

House House Simulation Protocols Robert Hendron and Cheryn Engebrecht National Renewable Energy Laboratory Revised October 2010 Prepared by the National Renewable Energy Laboratory For the U.S. Department of Energy Building Technologies Program ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process,

171

A scalable wireless routing protocol secure against route truncation attacks  

Science Conference Proceedings (OSTI)

Wireless routing protocols allow transmitting nodes to have some knowledge of the topology in order to decide when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of any network, it is a lucrative ...

Amitabh Saxena; Ben Soh

2010-05-01T23:59:59.000Z

172

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

173

Cryptography and game theory: designing protocols for exchanging information  

Science Conference Proceedings (OSTI)

The goal of this paper is finding fair protocols for the secret sharing and secure multiparty computation (SMPC) problems, when players are assumed to be rational. It was observed by Halpern and Teague (STOC 2004) that protocols with bounded number of ...

Gillat Kol; Moni Naor

2008-03-01T23:59:59.000Z

174

A Protocol for Multimedia CDMA Personal Communication Networks  

Science Conference Proceedings (OSTI)

In this paper, a joint CDMA/TDMA protocol has been proposed for integrated video-phone/voice/data traffic in personal communication networks (PCN). The videophone service is implemented according to H.261 standard. The concept of dynamic boundary ... Keywords: CDMA, MAC, multimedia, personal communication networks, protocol

P. Xie; E. Gunawan; B. H. Soong; C. B. Soh

2000-09-01T23:59:59.000Z

175

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

176

Internet Printing Protocol/1.1: Model and Semantics  

Science Conference Proceedings (OSTI)

This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document ...

R. Herriot; R. deBry; S. Isaacson; P. Powell / T. Hastings

2000-09-01T23:59:59.000Z

177

HLP: a next generation inter-domain routing protocol  

Science Conference Proceedings (OSTI)

It is well-known that BGP, the current inter-domain routing protocol, has many deficiencies. This paper describes a hybrid link-state and path-vector protocol called HLP as an alternative to BGP that has vastly better scalability, isolation and convergence ... Keywords: BGP, convergence, inter-domain routing, scalability

Lakshminarayanan Subramanian; Matthew Caesar; Cheng Tien Ee; Mark Handley; Morley Mao; Scott Shenker; Ion Stoica

2005-08-01T23:59:59.000Z

178

Energy-Efficient Networking Energy-Aware Routing Protocol  

E-Print Network (OSTI)

from to a physical server in another DC, when, the second DC has access to the renewable energy sourcesEnergy-Efficient Networking Energy-Aware Routing Protocol Minimum Power Topology Energy-Aware Admission Control Management of Resources in the Liquid Network Summary Energy Efficient Protocols in Self

Tobagi, Fouad

179

Statistical estimation of the quality of quantum-tomography protocols  

SciTech Connect

We present a complete methodology for testing the performances of quantum tomography protocols. The theory is validated by several numerical examples and by the comparison with experimental results achieved with various protocols for whole families of polarization states of qubits and ququarts including pure, mixed, entangled, and separable.

Bogdanov, Yu. I.; Bukeev, I. D. [Institute of Physics and Technology, Russian Academy of Sciences, 117218, Moscow (Russian Federation); Brida, G.; Genovese, M.; Shurupov, A. P. [INRIM, Strada delle Cacce 91 I-10135, Torino (Italy); Kravtsov, K. S. [Prokhorov General Physics Institute, Russian Academy of Sciences, Moscow, 119991 (Russian Federation); Kulik, S. P.; Soloviev, A. A. [Faculty of Physics, Moscow State University, 119992, Moscow (Russian Federation); Moreva, E. V. [Moscow National Research Nuclear University ' ' MEPHI' ' , 115409, Moscow (Russian Federation)

2011-10-15T23:59:59.000Z

180

Sound Multi-party Business Protocols for Service Networks  

E-Print Network (OSTI)

on the transitions. The states of the protocol are mapped to states in the DFA, and the protocol evolves transitions. All transitions outgoing the initial state are message-based, and their associated time to the considerations stated in Section 2.1 regarding when a transition can be traversed according to its time condition

Politécnica de Madrid, Universidad

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Self-stabilizing multicast protocols for ad hoc networks  

Science Conference Proceedings (OSTI)

We propose two distributed algorithms to maintain respectively the minimum weight spanning tree (MST) based multi-cast tree and the shortest path (SPST) multi-cast tree in a given ad hoc network for a given multi-cast group; our algorithms are fault ... Keywords: convergence, distributed system, fault tolerance, multi-cast protocol, self-stabilizing protocol, system graph

Sandeep K. S. Gupta; Pradip K. Srimani

2003-01-01T23:59:59.000Z

182

Performance evaluation of Atomic Commit Protocols for mobile transactions  

Science Conference Proceedings (OSTI)

The commitment of a distributed transaction is ensured with the use of an Atomic Commit Protocol (ACP). Due to their great importance for transaction systems, the recent advances in mobile computing development have renewed the interest in the ... Keywords: atomic commit protocols, mobile ACPs, mobile databases, mobile networks, mobile transaction processing, performance evaluation, simulation, wireless networks

Nadia Nouali-Taboudjemat; Lynda Boukantar; Habiba Drias

2007-08-01T23:59:59.000Z

183

Analysis of DSR protocol in event-B  

Science Conference Proceedings (OSTI)

This paper presents an incremental formal development of the Dynamic Source Routing (DSR) protocol in Event-B. DSR is a reactive routing protocol, which finds a route for a destination on demand, whenever communication is needed. Route discovery is an ... Keywords: abstract model, ad hoc network, event-b, event-driven approach, proof-based development, refinement

Dominique Méry; Neeraj Kumar Singh

2011-10-01T23:59:59.000Z

184

On the Security of the Ping-Pong Protocol  

E-Print Network (OSTI)

We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

Kim Bostroem; Timo Felbinger

2007-08-22T23:59:59.000Z

185

A hierarchical multicast protocol in mobile IPv6 networks  

Science Conference Proceedings (OSTI)

In this paper, we propose a hierarchical multicast protocol in Mobile IPv6 networks (HMoM), which utilizes the advantages of hierarchical mobility management in handling unicast routing. The multicast agent is selected dynamically and can be located ... Keywords: Mobile IP, Mobile multicast, Protocol, Routing

Ping Wang; Yunze Cai; Jinjie Huang; Xiaoming Xu

2006-12-01T23:59:59.000Z

186

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

187

Protective Force Protocols for ESS Supported Performance Tests and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protective Force Protocols for ESS Supported Performance Tests and Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 This document presents the protocols and ROE to be followed for both limited-scope and large-scale FOF performance tests. It sets forth basic procedures and responsibilities for planning, conducting, and evaluating such tests. The intent is to provide a standard framework to govern the conduct of such tests in connection with Independent Oversight inspections at NNSA and ESE sites and to ensure consistent approaches for all other FOF applications, approaches designed to enable program management to compare results from site to site. Protective Force Protocols for ESS Supported Performance Tests and

188

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Leads - May 2011 Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

189

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

190

Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols  

E-Print Network (OSTI)

In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of energy consumed and time spent. These protocols majorly focus on the optimization performed by expanding ring search algorithm to control the flooding generated by the mechanism of blind flooding. So, we have modeled the energy consumed and time spent per packet both for route discovery and route maintenance. The proposed framework is evaluated in NS-2 to compare performance of the chosen routing protocols.

Javaid, Nadeem; Javaid, Akmal; Malik, Shahzad A

2011-01-01T23:59:59.000Z

191

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

192

RADCAL Operations Manual Radiation Calibration Laboratory Protocol  

SciTech Connect

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

Bogard, J.S.

1998-12-01T23:59:59.000Z

193

Protocol for maximizing energy savings and indoor environmental quality  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for maximizing energy savings and indoor environmental quality Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Title Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Publication Type Journal Article LBNL Report Number LBNL-6147E Year of Publication 2013 Authors Noris, Federico, William W. Delp, Kimberly Vermeer, Gary Adamkiewicz, Brett C. Singer, and William J. Fisk Journal Energy and Buildings Volume 61 Pagination 378-386 Date Published 06/2013 Keywords apartments, buildings, costs, energy, indoor environmental quality, Protocol, retrofits, Selection Abstract The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

194

How to Implement a Protocol for Babel RMI  

Science Conference Proceedings (OSTI)

RMI support in Babel has two main goals: transparency & flexibility. Transparency meaning that the new RMI features are entirely transparent to existing Babelized code; flexibility meaning the RMI capability should also be flexible enough to support a variety of RMI transport implementations. Babel RMI is a big success in both areas. Babel RMI is completely transparent to already Babelized implementation code, allowing painless upgrade, and only very minor setup changes are required in client code to take advantage of RMI. The Babel RMI transport mechanism is also extremely flexible. Any protocol that implements Babel's minimal, but complete, interface may be used as a Babel RMI protocol. The Babel RMI API allows users to select the best protocol and connection model for their application, whether that means a WebServices-like client-server model for use over a WAP, or a faster binary peer-to-peer protocol for use on different nodes in a leadership-class supercomputer. Users can even change protocols without recompiling their code. The goal of this paper is to give network researchers and protocol implementors the information they need to develop new protocols for Babel RMI. This paper will cover both the high-level interfaces in the Babel RMI API, and the low level details about how Babel RMI handles RMI objects.

Kumfert, G; Leek, J

2006-03-30T23:59:59.000Z

196

Analysing the WAP class 2 wireless transaction protocol using coloured Petri nets  

Science Conference Proceedings (OSTI)

Coloured Petri nets (CPNs) are used to specify and analyse the Class 2 Wireless Transaction Protocol (WTP). The protocol provides a reliable request/response service to the Session layer in the Wireless Application Protocol (WAP) architecture. When only ...

Steven Gordon; Jonathan Billington

2000-06-01T23:59:59.000Z

197

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

198

Internet voting protocol based on implicit data security  

E-Print Network (OSTI)

This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security of votes depends on multiple servers such that each vote is divided into partitions and these partitions are distributed among the servers, all of which need to be brought together to reconstruct the votes. Such a protocol has potential applications in bargaining and electronic commerce.

Parakh, Abhishek

2010-01-01T23:59:59.000Z

199

Quantum discord as a resource in quantum protocols  

E-Print Network (OSTI)

We show quantum discord to be a resource in quantum information processing. This is accomplished by proving a relation between quantum discord and the yield of the quantum protocols. Our results are derived by studying the fully quantum Slepian-Wolf protocol -- a unification of all bipartite, unidirectional and memoryless quantum communication protocols -- in the presence of noise. As examples, we elucidate the significance of quantum discord in quantum teleportation, superdense coding, and entanglement distillation. Finally, we provide the first quantitative relation between quantum discord and the query complexity of quantum computations.

Madhok, Vaibhav

2012-01-01T23:59:59.000Z

200

A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications  

E-Print Network (OSTI)

These protocols waste energy through radio switching, idlePacket-based protocols also waste energy through neighborrouting table may be a waste of energy. In this instance, a

Ramanathan, Nithya; Yarvis, Mark D; Chhabra, Jasmeet; Kushalnagar, Nandakishore; Krishnamurthy, Lakshman; Estrin, D

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

202

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: GHG Uncertainty Guide[1] The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a quantitative and qualitative estimation of uncertainty associated with a

203

SSO password-based multi-server authentication protocol  

Science Conference Proceedings (OSTI)

User's password verification information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password verification information is distributed between ...

Sandeep K. Sood; Anil K. Sarje; Kuldip Singh

2012-07-01T23:59:59.000Z

204

Open-Protocol Platform for Commercial Building Operations and Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Open-Protocol Platform for Commercial Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm The U.S. Department of Energy (DOE) is currently conducting research into an open-protocol platform for commercial buildings and an algorithm to manage energy use. Project Description This project seeks to develop a situational analysis algorithm that characterizes the classes and capabilities of existing building automation and energy information systems, as well as the types of commercial buildings that typically use each class of equipment. Project Partners Research is being undertaken by DOE and Navigant Consulting. Project Goals The goal is to use the situational analysis algorithm to determine whether

205

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Refrigerant Guide[1] The Greenhouse Gas Protocol tool for refrigeration is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

206

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Climate Focus Area: - Central Plant, Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: CHP Guidance v1.0[1] The Greenhouse Gas Protocol tool for allocation of GHG emissions from a combined heat and power (CHP) plant is a free Excel spreadsheet calculator

207

Nuclear Energy Protocol for Research Isotopes Owen Lowe  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol for Protocol for Research Isotopes Owen Lowe Office of Isotopes for Medicine and Science Office of Nuclear Energy, Science and Technology April 16, 2002 Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology Lowe/April16_02 NEPRI to NERAC.ppt (2) Nuclear Energy Protocol For Research Isotopes Nuclear Energy Protocol For Research Isotopes Why NEPRI? 6 NEPRI implements DOE funding priorities for fiscal year 2003 6 NEPRI will * Bring order to DOE's responses to requests for research isotopes * Introduce a high-quality peer review to the selection of research isotopes * Enable DOE to concentrate on operating its unique isotope production facilities Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology

208

Protocol to co-operation agreement with Iran  

E-Print Network (OSTI)

A Co-operation Agreement between CERN and Iran will be signed in the coming weeks within the framework of the decisions taken by the Committee of Council and Council in June 1989. In view of implementing this Agreement, a Protocol between CERN and the International Scientific Meetings Office of the Ministry of Science of the Islamic Republic of Iran has been drawn up. It concerns the participation of scientific Institutions of Iran in the CMS Collaboration where CERN is acting on behalf of this Collaboration. This Protocol incorporates the agreement between CMS and ISMO on the Iranese contribution. It does not involve any financial commitment for CERN. The Protocol mainly addresses the status of the Iranese scientists at CERN, the supply by ISMO of the support tables for CMS, as well as the usual provisions concerning delivery and customs, guarantees, responsibilities, intellectual property and disputes. This Protocol is submitted to the Finance Committee for information.

2001-01-01T23:59:59.000Z

209

Toward a Standardized Metadata Protocol for Urban Meteorological Networks  

Science Conference Proceedings (OSTI)

With the growing number and significance of urban meteorological networks (UMNs) across the world, it is becoming critical to establish a standard metadata protocol. Indeed, a review of existing UMNs indicate large variations in the quality, quantity, and ...

Catherine L. Muller; Lee Chapman; C.S.B. Grimmond; Duick T. Young; Xiao-Ming Cai

2013-08-01T23:59:59.000Z

210

TDM MAC protocol design and implementation for wireless mesh networks  

Science Conference Proceedings (OSTI)

We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multi-hop wireless mesh networks using a programmable wireless platform. Extensive research has been devoted to optimal scheduling algorithms for ...

Dimitrios Koutsonikolas; Theodoros Salonidis; Henrik Lundgren; Pascal LeGuyadec; Y. Charlie Hu; Irfan Sheriff

2008-12-01T23:59:59.000Z

211

A Study of Transport Protocols for Wide Area Scientific Applications  

SciTech Connect

This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

Vishal Misra

2011-03-01T23:59:59.000Z

212

Implementation of a cluster based routing protocol for mobile networks  

Science Conference Proceedings (OSTI)

We show the implementation and the simulation results of a hierarchical, cluster based routing protocol for mobile ad hoc networks using Parallel Virtual Machine (PVM). The network represented by a graph is partitioned into clusters by a graph ...

Geoffrey Marshall; Kayhan Erciyes

2005-05-01T23:59:59.000Z

213

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

214

Typhoon: a reliable data dissemination protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

We present Typhoon, a protocol designed to reliably deliver large objects to all the nodes of a wireless sensor network (WSN). Typhoon uses a combination of spatially-tuned timers, prompt retransmissions, and frequency diversity to reduce contention ...

Chieh-Jan Mike Liang; R?zvan Mus?loiu-E.; Andreas Terzis

2008-01-01T23:59:59.000Z

215

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 USChina Electric Vehicle Initiative Meeting August 23-24, 2012...

216

A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.  

E-Print Network (OSTI)

A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

Van Dyke, Aaron R. (Aaron Robert)

2009-01-01T23:59:59.000Z

217

Exploiting home automation protocols for load monitoring in smart buildings  

Science Conference Proceedings (OSTI)

Monitoring and controlling electrical loads is crucial for demand-side energy management in smart grids. Home automation (HA) protocols, such as X10 and Insteon, have provided programmatic load control for many years, and are being widely deployed in ...

David Irwin; Sean Barker; Aditya Mishra; Prashant Shenoy; Anthony Wu; Jeannie Albrecht

2011-11-01T23:59:59.000Z

218

A Simple Protocol to Communicate Channels over Channels  

Science Conference Proceedings (OSTI)

In this paper we present the communication protocol that we use to implement first class channels. Ordinary channels allow data communication (like CSP/Occam); first class channels allow communicating channel ends over a channel. This enables processes ...

Henk L. Muller; David May

1998-09-01T23:59:59.000Z

219

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

220

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Electricity Heat, and Steam Purchase Guidance v1.2[1] The Greenhouse Gas Protocol tool for purchased electricity is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Office of Safety and Emergency Management Evaluations Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

<: iisS Offlct of Hulth , S.ftly ind St curity OFFICE OF SAFETY AND EMERGENCY MANAGEMENT EVALUATIONS PROTOCOL FOR THE DEVELOPMENT AND MAINTENANCE OF CRITERIA AND REVIEW APPROACH...

222

Protocol for Laboratory Testing of SCR Catalyst: 2nd Edition  

Science Conference Proceedings (OSTI)

With the widespread deployment of selective catalytic NOx reduction (SCR) throughout the U.S. fleet of coal fired utility boilers, there was a need to establish standardized protocols to test catalyst. In 2006, EPRI issued a protocol that provided a uniform basis for testing SCR catalyst. In 2007, a wide range of industry representatives, including members of the Post-Combustion NOx Control Program, catalyst vendors, an independent catalyst testing laboratory, a catalyst reconditioner, and a provider of ...

2007-12-21T23:59:59.000Z

223

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network (OSTI)

ASHRAE, CIBSE and USGBC are developing a standardized, consistent set of protocols to facilitate the comparison of the measured performance of buildings, especially those claimed to be green, sustainable, and/or high performance. Such protocols are needed because claims of high performance cannot be credible without such standardized protocols being applied consistently in the U.S. as well as internationally. The protocols will identify what is to be measured, how it is to be measured (instrumentation and spatial resolution), and how often it is to be measured. They will address both the use and reporting of the measured data, as well as appropriate benchmarks for each of the following characteristics: Energy Use (site, and source), Indoor Environmental Quality (IEQ)-Thermal Comfort, IEQ-Indoor Air Quality, IEQ-Lighting/ Daylighting Quality, IEQ-Acoustics and Water Use. The primary users of the protocols document will be building owners and facility managers, rating and labeling system developers, government officials, as well as architects and design engineers. To date, a scoping document has been developed, an extensive literature review has been performed (available on ASHRAE’s web site), and a committee formed to write the protocols, which are intended for publication in January 2009.

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

2008-10-01T23:59:59.000Z

224

BGP-S: a protocol for terrestrial and satellite network integration in network layer  

Science Conference Proceedings (OSTI)

To accomplish network layer integration of terrestrial and satellite IP networks, special exterior gateway protocols are needed. In this work, a new exterior gateway protocol called Border Gateway Protocol-Satellite version (BGP-S) is introduced that ... Keywords: BGP-4, IP-based routing, exterior gateway protocol, satellite networks

Eylem Ekici; Chao Chen

2004-09-01T23:59:59.000Z

225

Performance optimization of the go-back-N ARQ protocols over broadcast channels  

Science Conference Proceedings (OSTI)

Keywords: broadcast channels, go-back-N ARQ, performance optimization, point-to-multipoint communication, protocols

Jonathan L. Wang; John A. Silvester

1991-09-01T23:59:59.000Z

226

Proof of Security of a High-Capacity Quantum Key Distribution Protocol  

E-Print Network (OSTI)

We prove the security of a high-capacity quantum key distribution protocol over noisy channels. By using entanglement purification protocol, we construct a modified version of the protocol in which we separate it into two consecutive stages. We prove their securities respectively and hence the security of the whole protocol.

Xiao-Wei Zhang; Kai Wen; Gui Lu Long

2005-12-25T23:59:59.000Z

227

RadNet: Open network protocol for radiation data  

SciTech Connect

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

228

Transportation Protocols Working Group First Conference Call March 1, 1999  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocols Working Group First Conference Call March 1, 1999 Protocols Working Group First Conference Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 3:00 p.m. Eastern time on Monday March 1, 1999. The session was led by Mona Williams, DOE/NTP-Albuquerque. Other participants included Bill Lemeshewsky, DOE/RW; Ellen Ott, DOE/GC; Elizabeth Helvey, JK Research Associates; Chris Wells, SSEB; Lisa Sattler, CSG-MW, Elissa Turner, DOE/RW; Chris Wentz, New Mexico; Carl Guidice, DOE/EM; Jim Cruickshank, DOE/EM, Elmer Naples, DOE/NR; Fred Butterfield, DOE/EM; and Alex Thrower, UETC. Ms. Williams first indicated that notes from the Jacksonville meeting had been prepared and circulated for comment. She asked if there were

229

Protocol, Required Reading - June 2012 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Required Reading - June 2012 Required Reading - June 2012 Protocol, Required Reading - June 2012 June 2012 Protocol for Required Reading The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing the Office of Safety and Emergency Management Evaluations (HS-45) required reading program. The required reading program provides a methodology to ensure that the HS-45 staff members are informed and up-to-date with Department of Energy (DOE), the Office of Health, Safety and Security (HSS), and office-specific requirements, processes, and guidance as well as to support continuous improvement. The required reading program will also be used to supplement staff training. This required reading program is based on DOE 0 422.1 Conduct of Operations Attachment 2, Appendix A and DOE-STD-1033-92 Guide to

230

Protocol, Development and Maintenance of Criteria and Review Approach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Development and Maintenance of Criteria and Review Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents The purpose of this protocol is to establish the requirements and responsibilities for the development and maintenance of Criteria and Review Approach Documents (CRADs) used by the Office of Safety and Emergency Management Evaluations (HS-45). The HS-45 CRADS are carefully selected, modified (if required), and referenced in HS-45 appraisal plans. These plans are used to provide an outline of the activities planned to assess the effectiveness of safety and emergency management processes and

231

Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy  

Open Energy Info (EERE)

Greenhouse Gas Regional Inventory Protocol (GRIP) Website Greenhouse Gas Regional Inventory Protocol (GRIP) Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Greenhouse Gas Regional Inventory Protocol (GRIP) Website Focus Area: Other Crosscutting Topics: Potentials & Scenarios Website: www.getagriponemissions.com/index-cycle.html Equivalent URI: cleanenergysolutions.org/content/greenhouse-gas-regional-inventory-pro Language: English Policies: Deployment Programs DeploymentPrograms: "Lead by Example" is not in the list of possible values (Audit Programs, Demonstration & Implementation, Green Power/Voluntary RE Purchase, High Performance Buildings, Industry Codes & Standards, Project Development, Public Tenders, Procurement, & Lead Examples, Public-Private Partnerships, Retrofits, Ride Share, Bike Share, etc., Technical Assistance, Training & Education, Voluntary Appliance & Equipment Labeling, Voluntary Industry Agreements) for this property.

232

Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Hazard Nuclear Facility Project Oversight - November High Hazard Nuclear Facility Project Oversight - November 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 November 2012 Protocol for High Hazard Nuclear Facility Project Oversight The purpose of this protocol is to establish the requirements and responsibilities for managing and conducting Office of Health, Safety and Security (HSS) independent oversight of high-hazard nuclear facility projects. As part of the Department of Energy's (DOE) self regulatory framework for safety and security, DOE Order 227.1, Independent Oversight Program, assigns HSS the responsibility for implementing an independent oversight program. It also requires the HSS Office of Enforcement and Oversight to conduct independent evaluations of safety and security. This

233

Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations  

SciTech Connect

In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

1996-12-31T23:59:59.000Z

234

Protocol, Test Inspectors Guide - March 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Test Inspectors Guide - March 2008 Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide Emergency Management Limited Scope Performance Tests Inspectors Guide provides detailed information and tools to assist inspectors assigned to evaluate the capabilities and performance of emergency responders in DOE/NNSA. Although this guide is designed specifically for the HS-63 inspector, it is made available to the field and may be useful to field element and facility contractor personnel who conduct surveys or self-assessments of emergency management programs. Protocol, Test Inspectors Guide - March 2008 More Documents & Publications Protocol, Appraisal Process Guide - April 2008 Independent Oversight Review, Los Alamos National Laboratory - April 2012

235

DOE Transportation Protocols Topic Group Conference Call Summary May 13,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TEC/WG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the status of U.S. Department of Energy (DOE) transportation protocols currently under development, and related issues. Participants on the call included: Mona Williams, DOE National Transportation Program-Albuquerque; Ken Niles, Oregon representative, Western Interstate Energy Board; Phillip Paull, Council of State Governments-Northeastern Conference; Ron Ross, Western Governors' Association; Lisa Sattler, Council of State Governments-Midwestern Office; Alex Thrower, Urban Energy & Transportation Corporation (UETC); and Elissa Turner, DOE-Office of Civilian Radioactive Waste Management.

236

DOE Transportation Protocols Topic Group Jacksonville, Florida January 20,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Jacksonville, Florida January 20, Jacksonville, Florida January 20, 1999 Meeting Notes and Action Items: The first meeting of the Transportation External Coordination Working Group (TEC/WG) Department of Energy (DOE) Transportation Protocols Topic Group was held at the Radisson Riverwalk Hotel in Jacksonville, FL on January 20, 1999. Mona Williams, Director of DOE's National Transportation Program, Albuquerque Office, welcomed the participants and asked them to introduce themselves (a list of participants with affiliations and addresses is attached). Following the roundtable introductions, Ms. Williams briefly stated the meeting's purpose, which was to discuss the process of protocols development and how review and input from TEC/WG participants could enhance

237

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or  

Open Energy Info (EERE)

Transport or Transport or Mobil Sources Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Transportation, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically from mobile combustion sources, including vehicles under the direct control

238

Protocol, Inspection Criteria - April 23, 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection Criteria - April 23, 2008 Inspection Criteria - April 23, 2008 Protocol, Inspection Criteria - April 23, 2008 April 23, 2008 Inspection Criteria, Activities, and Lines of Inquiry, April 23, 2008 Emergency planning includes the identification of hazards and threats. A hazards survey is the qualitative portion of the hazards identification process. It briefly describes the potential impacts of emergency events or conditions and summarizes the planning and preparedness requirements that apply. If determined to be required, an EPHA includes the identification and characterization of hazardous materials specific to a facility/site, analyses of potential accidents or events, and evaluation of potential consequences. Protocol, Inspection Criteria - April 23, 2008 More Documents & Publications

239

An experiment using Mec: Eurotri, Physical Layer Protocol Implemented Version  

E-Print Network (OSTI)

This work describes a part of a cooperation between LaBRI and Schlumberger Industries for developping eletricity meters. This part deals with the design and the conception of communication protocols to provide a distributed kernel with safe rendezvous primitives. The implemented version of the protocol is detailed and its safety proven using Mec. Contents 1 Industrial Environment 2 2 Hardware and Inter-Processor Communication 2 2.1 Physical Aspects : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2 Potential Problems and Solutions : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.1 Loss of data due to polling rate : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.2 Loss or spontaneous creation of data on the line : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 3 2.2.3 Transmission errors : : : : : : : : : : : : : : : : : : : : :...

Didier Egay Paul; Alain Griffault; Jean-pierre Radoux

1994-01-01T23:59:59.000Z

240

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Microsoft Word - Protocol for HSS Site Leads.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Safety and Emergency Management Evaluations Protocol for Site Leads May 2011 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose .....................................................................................................................1 2.0 Applicability ............................................................................................................1 3.0 Requirements ...........................................................................................................1 4.0 Responsibilities ........................................................................................................2 5.0 References ................................................................................................................4

242

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

243

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

244

Hello again: Stabilization of the Hello protocol in OSPF  

Science Conference Proceedings (OSTI)

The Hello protocol in OSPF allows each router in a network to check whether it can exchange messages with neighboring routers in its network. This check is carried out by making each router periodically send hello messages to every neighboring router ...

Jorge A. Cobb; Mohamed G. Gouda; Deepinder Sidhu

2005-01-01T23:59:59.000Z

245

Laboratory Protocol to Demonstrate Equivalency for Plant Wastewater Cotreatment  

Science Conference Proceedings (OSTI)

Adding chemical metal-cleaning wastes to ash ponds can be an inexpensive, effective method for removing contaminant metals from both wastes and ponds.This proposed laboratory protocol defines steps for determining the usefulness of ash pond comixing on a case-by-case basis and for demonstrating the equivalency of comixing with dedicated waste treatment, as required by EPA.

1987-08-26T23:59:59.000Z

246

Minimalist object oriented service discovery protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper presents a new Service Discovery Protocol (SDP) suitable for Wireless Sensor Networks (WSN). The restrictions that are imposed by ultra low-cost sensor and actuators devices (basic components of a WSN) are taken into account to reach a minimal ...

D. Villa; F. J. Villanueva; F. Moya; F. Rincón; J. Barba; J. C. López

2007-05-01T23:59:59.000Z

247

Modelling protocols for multiagent interaction by F-logic  

Science Conference Proceedings (OSTI)

This paper proposes a method to represent agent Unified Modelling Language (AUML) in logic form using F-logic that provides deductive capability and uniform knowledge integration base. The AUML is used to differentiate relevant interaction more precisely ... Keywords: AUML, F-logic, interaction protocols, message route, multiagent system

Hong Feng Lai

2007-12-01T23:59:59.000Z

248

Synapse: a scalable protocol for interconnecting heterogeneous overlay networks  

Science Conference Proceedings (OSTI)

This paper presents Synapse, a scalable protocol for information retrieval over the inter-connection of heterogeneous overlay networks. Applications on top of Synapse see those intra-overlay networks as a unique inter-overlay network. Scalability in ... Keywords: information retrieval, overlay networks, peer-to-peer

Luigi Liquori; Cédric Tedeschi; Laurent Vanni; Francesco Bongiovanni; Vincenzo Ciancaglini; Bojan Marinkovi?

2010-05-01T23:59:59.000Z

249

Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''  

E-Print Network (OSTI)

Biomolecular free energy profiles by a shootingÃ?umbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

Schlick, Tamar

250

Man-in-the-middle in tunnelled authentication protocols  

Science Conference Proceedings (OSTI)

John Ioannidis: I have to interrupt here and be even more offensive than usual. But you are using the worst rackets in industry as a justification for what you're doing. There are all sorts of people just generating garbage protocols, a couple ...

N. Asokan

2003-04-01T23:59:59.000Z

251

Distributed Network Protocol (DNP3) Security Interoperability Testing 2012  

Science Conference Proceedings (OSTI)

This project encourages the adoption of the Distributed Network Protocol (DNP3) Secure Authentication specification through three approaches:Supporting development and review of the specification by industry experts in supervisory control and data acquisition (SCADA) and cryptographyAligning the specification with international standards performing similar functions, so that there is a common industry-wide approach to SCADA securityDeveloping ...

2012-12-31T23:59:59.000Z

252

Protocols for processes: programming in the large for open systems  

Science Conference Proceedings (OSTI)

The modeling and enactment of business processes is being recognized as key to modern information managment. The expansion of Web services has increased the attention given to processes, because processes are how services are composed and put to good ... Keywords: business processes, interaction protocols, open systems

Munindar P. Singh; Amit K. Chopra; Nirmit Desai; Ashok U. Mallya

2004-12-01T23:59:59.000Z

253

An efficient synchronisation protocol for wireless sensor network  

Science Conference Proceedings (OSTI)

Time synchronisation is a critical topic in wireless sensor networks for its wide applications, such as data fusion, TDMA scheduling and cooperated sleeping, etc. In this paper, we present an Accurate Time Synchronisation (ATS) protocol based on ... Keywords: WSNs, drift, linear least squares, offset, time synchronisation, wireless networks, wireless sensor networks

Liusheng Huang; Hongli Xu; Yingyu Wan; Junmin Wu; Hong Li

2007-04-01T23:59:59.000Z

254

Moving routing protocols to the user space in MANET middleware  

Science Conference Proceedings (OSTI)

Mobile Ad Hoc Network (MANET) middleware must be aware of the underlying multi-hop topology to self-adapt and to improve its communication efficiency. For this reason, many approaches rely on specific cross-layer communications to interact with the network ... Keywords: Group communication, Middleware, Mobile Ad Hoc Networks, Routing protocols

Pedro García López; Raúl Gracia Tinedo; Josep M. Banús Alsina

2010-09-01T23:59:59.000Z

255

The intergroup protocols: Scalable group communication for the internet  

SciTech Connect

Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

Berket, K.

2000-11-01T23:59:59.000Z

256

Packet Drop Avoidance for High-speed network transmission protocol  

SciTech Connect

As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

Jin, Guojun

2004-05-01T23:59:59.000Z

257

Using standard Internet Protocols and applications in space  

Science Conference Proceedings (OSTI)

This paper discusses approaches for using standard Internet technologies to meet the communication needs of future space missions. It summarizes work done by the Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC since 1997. That ... Keywords: Internet in space, Internet space missions, Space communication protocols, Space shuttle STS-107, Spacecraft networking

Keith Hogie; Ed Criscuolo; Ron Parise

2005-04-01T23:59:59.000Z

258

A lightweight idempotent messaging protocol for faulty networks  

Science Conference Proceedings (OSTI)

As parallel machines scale to one million nodes and beyond, it becomes increasingly difficult to build a reliable network that is able to guarantee packet delivery. Eventually large systems will need to employ fault-tolerant messaging protocols that ... Keywords: block-structured traces, idempotence, source-reliable messaging

Jeremy Brown; J. P. Grossman; Tom Knight

2002-08-01T23:59:59.000Z

259

A faster distributed protocol for constructing a minimum spanning tree  

Science Conference Proceedings (OSTI)

This paper studies the problem of constructing a minimum-weight spanning tree (MST) in a distributed network. This is one of the most important problems in the area of distributed computing. There is a long line of gradually improving protocols ...

Michael Elkin

2004-01-01T23:59:59.000Z

260

Cross-platform protocol development for sensor networks: lessons learned  

Science Conference Proceedings (OSTI)

Protocols for sensor networks are commonly coupled to the specific operating system (OS), for instance TinyOS, involving some drawbacks. First, programmers must learn OS architecture, programming guidelines, sometimes a new programming language, etc. ... Keywords: cross-platform, embedded systems, sensor networks

Marcin Brzozowski; Hendrik Salomon; Krzysztof Piotrowski; Peter Langendoerfer

2011-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Parallel and concurrent security of the HB and HB+ protocols  

Science Conference Proceedings (OSTI)

Juels andWeis (building on prior work of Hopper and Blum) propose and analyze two shared-key authentication protocols - HB and HB+ - whose extremely low computational cost makes them attractive for low-cost devices such as radio-frequency ...

Jonathan Katz; Ji Sun Shin

2006-05-01T23:59:59.000Z

262

Private Session Initiation Protocol (SIP) Extensions for Media Authorization  

Science Conference Proceedings (OSTI)

This document describes the need for Quality of Service (QoS) and media authorization and defines a Session Initiation Protocol (SIP) extension that can be used to integrate QoS admission control with call signaling and help guard against denial of ...

W. Marshall

2003-01-01T23:59:59.000Z

263

A survey on secure multipath routing protocols in WSNs  

Science Conference Proceedings (OSTI)

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on ... Keywords: Multipath routing, Secure multipath routing, Security, Wireless sensor networks

Eliana Stavrou; Andreas Pitsillides

2010-09-01T23:59:59.000Z

264

14MIB*ft* * * Kyoto Japan  

E-Print Network (OSTI)

Outline 1 Kinetic chemotaxis model 2 Goals and first results 3 Work in progress and future applications direction randomly, biased by chemical signal #12;Analysis on kinetic chemotaxis models using a functionalAnalysis on kinetic chemotaxis models using a functional analytic approach Analysis on kinetic

Sparks, Donald L.

265

Institute of Advanced Energy Kyoto University  

E-Print Network (OSTI)

-up materials and spill kits will be available at the dedicated fueling area. Tanks will not be "topped off than sediment, to storm water runoff: · Vehicle fluids, including oil, grease, petroleum and coolants will be cleaned off-site when possible. Residue from grinding or removal operations will be picked #12;Storm Water

Takada, Shoji

266

Summary of the Kyoto Report - Part I  

U.S. Energy Information Administration (EIA)

... goods and services rises, and consumption and employment decline. Hence the various cases affect the national economy to varying degrees.

267

Institute of Advanced Energy Kyoto University  

E-Print Network (OSTI)

-intensive or faster fiber carbonization processes, such as microwave or plasma processing. In addition to improved: Hydrogen production system based on centralized biomass gasification technology producing hydrogen

Takada, Shoji

268

Institute of Advanced Energy Kyoto University  

E-Print Network (OSTI)

to the chuck). Since ICP tools do not use microwave sources or magnets for collimating the plasma, they offerADVANCED PLASMA-ETCHING PROCESSES FOR DIELECTRIC MATERIALS IN VLSI TECHNOLOGY By JUAN JUAN WANG ....................................................................................... 22 2.4 Further Disscussion for Plasma Etching

Takada, Shoji

269

Simulation of a VPN implementation based on MPLS protocol, a case study: VPN-MPLS for MSN-AT  

Science Conference Proceedings (OSTI)

In this paper, we present the implementation of a Virtual Private Network (VPN) using a Multi-Protocol Label Switching (MPLS) protocol. Because this protocol is very promising, economically and technologically, we have adopted it as the basic protocol ... Keywords: MPLS, VPN, network, protocol, security

N. Djenane; A. Benaouda; S Harous

2009-12-01T23:59:59.000Z

270

To reach consensus using uninorm aggregation operator: A gossip-based protocol  

Science Conference Proceedings (OSTI)

Gossip-based protocols for group communication have attractive scalability and reliability properties. This paper presents a gossip-based protocol that enables agents to reach a consensus based on a specific uninorm aggregation operator. We theoretically ...

Zhixing Huang; Qiaoli Huang

2012-04-01T23:59:59.000Z

271

A generalized binding framework for the Low Level Reader Protocol (LLRP)  

E-Print Network (OSTI)

This Master of Engineering Thesis describes the design, implementation and testing of an XML binding framework for the RFID Low Level Reader Protocol (LLRP). LLRP is a recently released protocol which standardizes the ...

Poulopoulos, Dimitrios

2008-01-01T23:59:59.000Z

272

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

273

Design and Development of a Multi-Hop Routing Protocol for Distributed Sensing Applications  

E-Print Network (OSTI)

for various applications such as habitat monitoring, agriculture, nuclear reactor control, security, etc that draws on current protocol theories. The protocol uses a hybrid network structure to achieve scalability

Faloutsos, Christos

274

Advanced MAC protocol with energy-efficiency for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper proposes E2-MAC, a contention-based energy-efficient Medium Access Control (MAC) Protocol for wireless sensor networks. Energy efficiency is primary goal in wireless sensor networks. Existing MAC protocols for sensor networks attempt ...

Jae-Hyun Kim; Ho-Nyeon Kim; Seog-Gyu Kim; Seung-Jun Choi; Jai-Yong Lee

2005-01-01T23:59:59.000Z

275

Automated Formal Verification of the DHCP Failover Protocol Using Timeout Order Abstraction  

E-Print Network (OSTI)

In this paper, we present automated formal verification of the DHCP Failover protocol. We conduct bounded model-checking for the protocol using Timeout Order Abstraction (TO-Abstraction), a technique to abstract a given ...

Umeno, Shinya

276

Test and Evaluation Protocols for ANSI/IEEE N42 Standards  

Science Conference Proceedings (OSTI)

... The test and evaluation protocols provide data sheets for data collection of test results obtained when testing radiation detection instruments ...

2012-06-27T23:59:59.000Z

277

Disabling equational theories in unification for cryptographic protocol analysis through tagging  

E-Print Network (OSTI)

In this paper, we show a new tagging scheme for cryptographic protocol messages. Under this tagging, equational theories of operators such as exclusive-or, binary addition etc. are effectively disabled, when terms are unified. We believe that this result has a significant impact on protocol analysis and security, since unification is at the heart of symbolic protocol analysis. Hence, disabling equational theories in unification implies disabling them altogether in protocol analysis for most operators and theories.

Malladi, Sreekanth

2010-01-01T23:59:59.000Z

278

Trials BioMed Central Study protocol The Leeds Evaluation of Efficacy of Detoxification Study (LEEDS)  

E-Print Network (OSTI)

prisons project pilot study: protocol for a randomised controlled trial comparing dihydrocodeine and buprenorphine for opiate detoxification

Laura Sheard; Clive E Adams; Hany El-sayeh

2007-01-01T23:59:59.000Z

279

Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures  

DOE Green Energy (OSTI)

This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

Burgess, R.; Blake, C.; Tracy, C. E.

2008-09-01T23:59:59.000Z

280

Protocol, Qualification Standard for the Site Lead Program - May 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Qualification Standard for the Site Lead Program - May Qualification Standard for the Site Lead Program - May 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011 May 2011 Qualification Standard for the Site Lead Program This Qualification Standard establishes common functional area competency requirements for personnel assigned as Site Leads in the Office of Safety and Emergency Management Evaluations. Satisfactory and documented completion of the competency requirements contained in this Standard ensures that employees possess the minimum requisite competence to fulfill their functional area duties and responsibilities. This Standard is integrated with existing qualification standards developed by DOE in accordance with DOE Order 426.1, Federal Technical Capability. Protocol, Qualification Standard for the Site Lead Program - May 2011

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

US and Chinese EV US and Chinese EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 US/China Electric Vehicle Initiative Meeting August 23-24, 2012 Boston, MA 1 Argonne National Laboratory 2 Idaho National Laboratory 3 CATARC A Comparison of US and Chinese Battery Testing Protocols  Battery testing is a time-consuming and costly process  There are parallel testing efforts, such as those in the US and China  These efforts may be better leveraged through international collaboration  The collaboration may establish standardized, accelerated testing procedures and will allow battery testing organizations to cooperate in the analysis of the resulting data  In turn, the collaboration may accelerate electric vehicle development and

282

Parameterized Verification of Safety Properties in Ad Hoc Network Protocols  

E-Print Network (OSTI)

We summarize the main results proved in recent work on the parameterized verification of safety properties for ad hoc network protocols. We consider a model in which the communication topology of a network is represented as a graph. Nodes represent states of individual processes. Adjacent nodes represent single-hop neighbors. Processes are finite state automata that communicate via selective broadcast messages. Reception of a broadcast is restricted to single-hop neighbors. For this model we consider a decision problem that can be expressed as the verification of the existence of an initial topology in which the execution of the protocol can lead to a configuration with at least one node in a certain state. The decision problem is parametric both on the size and on the form of the communication topology of the initial configurations. We draw a complete picture of the decidability and complexity boundaries of this problem according to various assumptions on the possible topologies.

Delzanno, Giorgio; Zavattaro, Gianluigi; 10.4204/EPTCS.60.4

2011-01-01T23:59:59.000Z

283

SEEC- Regional Energy Baselines and Measurement and Verification Protocols  

E-Print Network (OSTI)

The Southern Energy Efficiency Center (SEEC) was established to substantially increase the deployment of high-performance “beyond-code” buildings across the southern region of the U.S, funded by the U.S. Department of Energy (DOE) Building Technologies Program and is administered by the National Energy Technology Laboratory. During its first 18-month phase, to address efficiency goals of states, utilities, and various energy-efficiency programs; project efforts include defining the baseline energy patterns within the project region and the measurement and verification (M&V) protocols for use in determining the efficiency improvements SEEC, state and USDOE efforts with respect to that baseline. This work is defined under the SEEC Subtask 3.1 Define Regional Baselines and Measurement & Verification Protocols. This report presents preliminary deliverables of this subtask developed and documented by the Energy Systems Laboratory (ESL) for use by the SEEC member state region.

Kim, H.; Haberl, J. S.; Verdict, M.

2009-03-01T23:59:59.000Z

284

An adaptive synchronization protocol for parallel discrete event simulation  

SciTech Connect

Simulation, especially discrete event simulation (DES), is used in a variety of disciplines where numerical methods are difficult or impossible to apply. One problem with this method is that a sufficiently detailed simulation may take hours or days to execute, and multiple runs may be needed in order to generate the desired results. Parallel discrete event simulation (PDES) has been explored for many years as a method to decrease the time taken to execute a simulation. Many protocols have been developed which work well for particular types of simulations, but perform poorly when used for other types of simulations. Often it is difficult to know a priori whether a particular protocol is appropriate for a given problem. In this work, an adaptive synchronization method (ASM) is developed which works well on an entire spectrum of problems. The ASM determines, using an artificial neural network (ANN), the likelihood that a particular event is safe to process.

Bisset, K.R.

1998-12-01T23:59:59.000Z

285

Protocols for conducting Environmental Management Assessments of DOE organizations  

SciTech Connect

To assess the effectiveness of DOE`s environmental programs, the Office of Environmental Audit conducts Environmental Management Assessments of DOE programs and facilities. These assessments take a broad programmatic view of environmental systems which may cover multiple sites. The focus of the assessment is on the infrastructure, systems, programs, and tools to manage environmental issues, not on the compliance issues themselves. Protocols have been developed to assist in the conduct of Environmental Management Assessments. The protocols are, based on and serve as implementing guidelines for the Environmental Management Section of ``Performance Objectives and Criteria for Conducting DOE Environmental Audits`` (DOE/EH-022). They are intended to provide guidance to the Assessment Team in conducting these reviews.

1993-08-01T23:59:59.000Z

286

Licklider Transmission Protocol- Security Extensions Status of This Memo  

E-Print Network (OSTI)

This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. IESG Note This RFC is not a candidate for any level of Internet Standard. It represents the consensus of the Delay Tolerant Networking (DTN) Research Group of the Internet Research Task Force (IRTF). It may be considered for standardization by the IETF in the future, but the IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. See RFC 3932 for more information.

S. Farrell; M. Ramadas; S. Burleigh

2008-01-01T23:59:59.000Z

287

Guidelines for Designing Effective Energy Information Feedback Pilots: Research Protocols  

Science Conference Proceedings (OSTI)

Enhanced and timely information regarding consumers electricity use and costs, known as feedback, may significantly influence their behavior across a broad spectrum of usage and acquisition decisions. Such information feedback has become increasingly important in light of widespread investments in Smart Grid technologies. This report identifies protocols for three phases of energy information feedback pilotsresearch design, analysis, and reportingalong with three example applications. When used as the co...

2010-04-23T23:59:59.000Z

288

Standard Language Protocols for Photovoltaic and Storage Grid Integration  

Science Conference Proceedings (OSTI)

In mid-2009, a collaborative industry project was formed to address communication integration of distributed photovoltaic and storage systems. The project was designed to engage stakeholders from inverter manufacturers, system integrators, communication system providers, and utilities. These stakeholders have been working together to identify a set of common functions that can be supported by advanced grid-tied inverters. Standardized communication protocols are being developed to exercise these function...

2010-05-14T23:59:59.000Z

289

A control protocol of finite dimensional quantum systems  

E-Print Network (OSTI)

An exact and analytic control protocol of two types of finite dimensional quantum systems is proposed. The system can be drive to an arbitrary target state using cosine classical fields in finite cycles. The control parameters which are time periods of interaction between systems and control fields in each cycles are connected with the probability amplitudes of target states via triangular functions and can be determined analytically.

Jianju Tang; H. C. Fu

2012-12-11T23:59:59.000Z

290

A formal model of rational exchange and its application to the analysis of Syverson's protocol  

Science Conference Proceedings (OSTI)

We propose a formal model of rational exchange and exchange protocols in general, which is based on game theory. In this model, an exchange protocol is represented as a set of strategies in a game that is played by the protocol parties and the network ...

Levente Buttyán; Jean-Pierre Hubaux; Srdjan ?apkun

2004-05-01T23:59:59.000Z

291

A Methodology for SIP and SOAP Integration Using Application-Specific Protocol Conversion  

Science Conference Proceedings (OSTI)

In recent years, the ubiquitous demands for cross-protocol application access are driving the need for deeper integration between SIP and SOAP. In this article we present a novel methodology for integrating these two protocols. Through an analysis of ... Keywords: Protocol conversion, SIP, SOAP, design concepts, middleware, specialized application languages

Goran Delac; Ivan Budiselic; Ivan Zuzak; Ivan Skuliber; Tomislav Stefanec

2012-11-01T23:59:59.000Z

292

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

293

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory  

E-Print Network (OSTI)

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory Byung and home-based Lazy Release Consistency (LRC) protocols which are used to implement Distributed Shared on homeless and home-based LRC protocols. We compared the performance between Tread- Marks, which uses

Huang, Zhiyi

294

Performance analysis of session initiation protocol based call set-up over satellite-UMTS network  

Science Conference Proceedings (OSTI)

Session Initiation Protocol (SIP) has been selected as the official end-to-end signalling protocol for establishing multimedia sessions in the IP-based Universal Mobile Telecommunication Systems (UMTS) network. Since a satellite component has been identified ... Keywords: Radio link control acknowledged mode, Satellite UMTS, Session initiation protocol, Session set-up

Victor Y. H. Kueh; Rahim Tafazolli; Barry G. Evans

2005-07-01T23:59:59.000Z

295

CONFab: component based optimization of WSN protocol stacks using deployment feedback  

Science Conference Proceedings (OSTI)

Wireless sensor networks are characterized by a large number of non-standardized protocols and varying application requirements. This creates need for a systematic approach to rapidly design and optimize deployment specific protocol stacks. We employ ... Keywords: components-based design, deployment feedback, knowledge base, ontology, protocol stack composition

Junaid Ansari; Elena Meshkova; Wasif Masood; Arham Muslim; Janne Riihijärvi; Petri Mähönen

2012-10-01T23:59:59.000Z

296

Verified implementations of the information card federated identity-management protocol  

Science Conference Proceedings (OSTI)

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity ... Keywords: CardSpace, cryptographic protocol verification, federated identity management, verified implementations, web services security

Karthikeyan Bhargavan; Cédric Fournet; Andrew D. Gordon; Nikhil Swamy

2008-03-01T23:59:59.000Z

297

Supporting bursty traffic in wireless sensor networks through a distributed advertisement-based TDMA protocol (ATMA)  

Science Conference Proceedings (OSTI)

Nodes in wireless sensor networks (WSNs) are battery powered and oftentimes deployed in remote and hostile locations. Energy conservation is, therefore, one of the primary goals of MAC protocols designed for these networks. Contention-based protocols ... Keywords: Bursty traffic, Data advertisements, Hybrid, MAC protocol, TDMA, WSN

Surjya Ray; Ilker Demirkol; Wendi Heinzelman

2013-05-01T23:59:59.000Z

298

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks  

E-Print Network (OSTI)

A medium access control (MAC) protocol is developed for wireless multimedia networks based on frequency division duplex (FDD) wideband code division multiple access (CDMA). In this protocol, the received power levels of simultaneously transmitting users are controlled by a minimum-power allocation algorithm such that the heterogeneous bit error rates (BERs) of multimedia traffic are guaranteed. With minimumpower allocation, a multimedia wideband CDMA generalized processor sharing (GPS) scheduling scheme is proposed. It provides fair queueing to multimedia traffic with different QoS constraints. It also takes into account the limited number of code channels for each user and the variable system capacity due to interference experienced by users in a CDMA network. The admission of real-time connections is determined by a new effective bandwidth connection admission control (CAC) algorithm in which the minimum-power allocation is also considered. Simulation results show that the new MAC protocol guarantees QoS requirements of both real-time and non-real-time traffic in an FDD wideband CDMA network.

Xudong Wang

2003-01-01T23:59:59.000Z

299

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. González Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

300

Protocols for implementing DOE authorized release of radioactive scrap metals  

SciTech Connect

A process to implement the US Department of Energy`s (DOE) policy for authorized release of radioactive materials from DOE facilities is provided in the Draft Handbook for Controlling Release for Reuse or Recycle of Property Containing Residual Radioactive Material, published by DOE in 1997 and distributed to DOE field offices for interim use and implementation. The authorized release of such property is intended to permit its beneficial use across the entire DOE complex. A computerized management tool--P2Pro(RSM)--has been developed to aid in carrying out the release process for radioactive metals. It contains protocols for the authorized release process and relevant information to facilitate the evaluation of scrap metals for reuse and recycle. The P2Pro(RSM) protocols provide DOE and its contractors with an effective, user-friendly tool for managing authorized release activities P2Pro(RSM) is designed to be used in the Windows{sup {trademark}} environment. The protocols incorporate a relational database coupled with a graphic-user interface to guide the user through the appropriate steps so authorized release limits can be developed. With the information provided in the database, an as-low-as-reasonably-achievable (ALARA) optimization process can be easily set up and run for up to 10 alternatives for disposition of radioactive scrap metals. The results of the ALARA optimization process can be printed in a series of reports and submitted as part of the application for the authorized release of the radioactive scrap metals.

Chen, S.Y.; Arnish, J.; Kamboj, S.; Nieves, L.A. [Argonne National Lab., IL (United States). Environmental Assessment Div.

1999-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Security analysis of the time-coding quantum key distribution protocols  

E-Print Network (OSTI)

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.

Thierry Debuisschert; Simon Fossier

2011-08-31T23:59:59.000Z

302

Addendum to the Building America House Simulation Protocols  

SciTech Connect

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

303

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

Science Conference Proceedings (OSTI)

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

304

Addendum to the Building America House Simulation Protocols  

SciTech Connect

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

305

Formal hardware specification languages for protocol compliance verification  

Science Conference Proceedings (OSTI)

The advent of the system-on-chip and intellectual property hardware design paradigms makes protocol compliance verification increasingly important to the success of a project. One of the central tools in any verification project is the modeling language, ... Keywords: Esterel, Heterogeneous Hardware Logic, Hierarchical Annotated Action Diagrams, Java, Lava, Live Sequence Charts, Message Sequence Charts, Objective VHDL, OpenVera, Property Specification Language, SpecC, Specification and Description Language, Statecharts, SystemC, SystemVerilog, The Unified Modeling Language, e, hardware monitors, timing diagrams

Annette Bunker; Ganesh Gopalakrishnan; Sally A. Mckee

2004-01-01T23:59:59.000Z

306

Entanglement Sharing Protocol via Quantum Error Correcting Codes  

E-Print Network (OSTI)

We introduce a new multiparty cryptographic protocol, which we call `entanglement sharing schemes', wherein a dealer retains half of a maximally-entangled bipartite state and encodes the other half into a multipartite state that is distributed among multiple players. In a close analogue to quantum secret sharing, some subsets of players can recover maximal entanglement with the dealer whereas other subsets can recover no entanglement (though they may retain classical correlations with the dealer). We find a lower bound on the share size for such schemes and construct two non-trivial examples based on Shor's $[[9,1,3

Ran Hee Choi; Ben Fortescue; Gilad Gour; Barry C. Sanders

2012-12-18T23:59:59.000Z

307

Protocol, Technical Qualification Program - October 22, 2003 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program - October 22, 2003 Technical Qualification Program - October 22, 2003 Protocol, Technical Qualification Program - October 22, 2003 October 22, 2003 Technical Qualification Program Procedure (OA-50-TQP-1) This procedure implements the Office of ES&H Evaluations Technical Qualification Program (TQP) per the criteria contained in DOE Manual 426.1-1 "Federal Technical Capability Manual". Key elements of the program include: identifying personnel required to participate in the TQP, identifying, developing, approving, revising and updating individual qualification requirements, evaluating staff members against the assigned Technical Qualification Standards and documenting the approval of equivalencies, establishing and updating individual development plans, training

308

A Comparative experimental study of media access protocols for wireless radio networks  

SciTech Connect

We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2) Performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the performance of a communication network, it will be important to study the entire protocol stuck as a single algorithmic construct; optimizing individual layers in the 7 layer OSI stack will not yield performance improvements beyond a point.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.)

2001-05-24T23:59:59.000Z

309

The self-describing data sets file protocol and Toolkit  

SciTech Connect

The Self-Describing Data Sets (SDDS) file protocol continues to be used extensively in commissioning the Advanced Photon Source (APS) accelerator complex. SDDS protocol has proved useful primarily due to the existence of the SDDS Toolkit, a growing set of about 60 generic commandline programs that read and/or write SDDS files. The SDDS Toolkit is also used extensively for simulation postprocessing, giving physicists a single environment for experiment and simulation. With the Toolkit, new SDDS data is displayed and subjected to complex processing without developing new programs. Data from EPICS, lab instruments, simulation, and other sources are easily integrated. Because the SDDS tools are commandline-based, data processing scripts are readily written using the user`s preferred shell language. Since users work within a UNIX shell rather than an application-specific shell or GUI, they may add SDDS-compliant programs and scripts to their personal toolkits without restriction or complication. The SDDS Toolkit has been run under UNIX on SUN OS4, HP-UX, and LINUX. Application of SDDS to accelerator operation is being pursued using Tcl/Tk to provide a GUI.

Borland, M.; Emery, L.

1995-12-31T23:59:59.000Z

310

Statement of Jay Hakes, Former EIA Administrator, Before the Energy and Natural Resources Committee, United States Senate  

Reports and Publications (EIA)

Discussion of the Energy Information Administration's (EIA) analysis of carbon emissions from energy and the potential impacts of the Kyoto Protocol.

Information Center

1999-03-25T23:59:59.000Z

311

Energy consumption of building 39; Energy consumption of building thirty-nine.  

E-Print Network (OSTI)

??The MIT community has embarked on an initiative to the reduce energy consumption and in accordance with the Kyoto Protocol. This thesis seeks to further… (more)

Hopeman, Lisa Maria

2007-01-01T23:59:59.000Z

312

Analysis of the Impacts of an Early Start for Compliance with the ...  

U.S. Energy Information Administration (EIA)

Office of Integrated Analysis and Forecasting ... Committee on Science, EIA analyzed the likely impacts of the Kyoto Protocol on U.S. energy prices, energy use,

313

VandenBygaart, A  

NLE Websites -- All DOE Office Websites (Extended Search)

under the United Nations Framework on Climate Change (UNFCC) and the Kyoto Protocol. Canada has datasets on SOC stocks in croplands, historical changes in SOC levels due to...

314

Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

Ahvar, Ehsan; Piran, Mohammad Jalil

2011-01-01T23:59:59.000Z

315

Effective algorithms and protocols for wireless networking: a topological approach  

E-Print Network (OSTI)

Much research has been done on wireless sensor networks. However, most protocols and algorithms for such networks are based on the ideal model Unit Disk Graph (UDG) model or do not assume any model. Furthermore, many results assume the knowledge of location information of the network. In practice, sensor networks often deviate from the UDG model significantly. It is not uncommon to observe stable long links that are more than five times longer than unstable short links in real wireless networks. A more general network model, the quasi unit-disk graph (quasi-UDG) model, captures much better the characteristics of wireless networks. However, the understanding of the properties of general quasi-UDGs has been very limited, which is impeding the design of key network protocols and algorithms. In this dissertation we study the properties for general wireless sensor networks and develop new topological/geometrical techniques for wireless sensor networking. We assume neither the ideal UDG model nor the location information of the nodes. Instead we work on the more general quasi-UDG model and focus on figuring out the relationship between the geometrical properties and the topological properties of wireless sensor networks. Based on such relationships we develop algorithms that can compute useful substructures (planar subnetworks, boundaries, etc.). We also present direct applications of the properties and substructures we constructed including routing, data storage, topology discovery, etc. We prove that wireless networks based on quasi-UDG model exhibit nice properties like separabilities, existences of constant stretch backbones, etc. We develop efficient algorithms that can obtain relatively dense planar subnetworks for wireless sensor networks. We also present efficient routing protocols and balanced data storage scheme that supports ranged queries. We present algorithmic results that can also be applied to other fields (e.g., information management). Based on divide and conquer and improved color coding technique, we develop algorithms for path, matching and packing problem that significantly improve previous best algorithms. We prove that it is unlikely for certain problems in operation science and information management to have any relatively effective algorithm or approximation algorithm for them.

Zhang, Fenghui

2008-08-01T23:59:59.000Z

316

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network (OSTI)

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Andrew Lutomirski; Scott Aaronson; Edward Farhi; David Gosset; Avinatan Hassidim; Jonathan Kelner; Peter Shor

2009-12-21T23:59:59.000Z

317

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network (OSTI)

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Lutomirski, Andrew; Farhi, Edward; Gosset, David; Hassidim, Avinatan; Kelner, Jonathan; Shor, Peter

2009-01-01T23:59:59.000Z

318

Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics  

E-Print Network (OSTI)

Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

Stewart, Frank J.

319

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

320

Validation of ice skating protocol to predict aerobic power in hockey players.  

E-Print Network (OSTI)

??Validation ofan Ice Skating Protocol to Predict Aerobic Power in Hockey Players In assessing the physiological capacity of ice hockey players, researchers have often reported… (more)

Petrella, Nicholas J.

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Automated Protocols Used by Labs | Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Notices Notices Automated Protocols Used by Labs Print page Print page Email page Email page DOE laboratories have two additional options for submitting data electronically to OSTI. They are: Batch Upload (Site-to-OSTI), and Harvesting (OSTI-to-Site). The XML DTD supporting Batch Upload specifies the same metadata that is used by the web-based AN 241.1. The main difference between web notice input and Harvesting upload is that the latter allows uploading of multiple records as a batch file. The web 241.1 is for single-record input only. Harvesting consists of three main phases: 1) Metadata mapping and technical development, 2) Testing, and 3) Production. The production phase is ongoing based on monitoring for quality control. Required Metadata Elements Author(s)

322

Microsoft Word - Assessment-C-SiteVisitProtocol  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ATTACHMENT C ATTACHMENT C DEPARTMENTAL EVALUATION AND SITE VISIT PROTOCOL 1. The Departmental Records Officer will provide in writing to the PRO a sixty day notice of intent to evaluate, along with recommended sites to be visited and areas to be examined. 2. The PRO will notify sites to be visited and coordinate mutually agreeable dates with the Departmental Records Officer. 3. The PRO will provide an overview of the organization's Records Management Program and make summaries of assessments available for review prior to the evaluation. 4. The PRO will highlight changes made to the program and future plans for improvement. 5. Field site visits may include the PRO and shall not exceed three days unless specified in writing. 6. Field sites will provide an overview of:

323

Addendum to the Building America House Simulation Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Addendum to the Building Addendum to the Building America House Simulation Protocols C. Engebrecht Metzger, E. Wilson, and S. Horowitz National Renewable Energy Laboratory December 2012 ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark,

324

DOE Transportation Protocols Topic Group Summary of Second Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary of Second Conference Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 11:00 a.m. Eastern time on Thursday, April 8, 1999. The session was led by Mona Williams, DOE/National Transportation Program (NTP)-Albuquerque. Other participants included Patricia Armijo, DOE/NTP-Albuquerque; Alex Thrower, Urban Energy & Transportation Corporation; Chris Wells, Southern States Energy Board; Elizabeth Helvey, JK Research Associates; Ken Niles, Oregon Office of Energy; Lisa Sattler, Council of State Governments-Midwestern Office; Laurel Cook, DOE/Naval Reactors (NR); Chris Wentz, New Mexico Department of Energy, Minerals and Natural Resources; Phillip Paull, Council of State Governments-Northeastern Conference; and

325

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

NLE Websites -- All DOE Office Websites (Extended Search)

USCAR FUEL CELL TECH TEAM USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May 26, 2010 Fuel cells, especially for automotive propulsion, must operate over a wide range of operating and cyclic conditions. The desired operating range encompasses temperatures from below the freezing point to well above the boiling point of water, humidity from ambient to saturated, and half-cell potentials from 0 to >1.5 volts. Furthermore, the anode side of the cell may be exposed to hydrogen and air during different parts of the driving and startup/shutdown cycles. The severity in operating conditions is greatly exacerbated by the transient and cyclic nature of

326

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4/12/10 4/12/10 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and consistent application of government contingency and contractor management reserve (MR) in the planning and execution of DOE capital asset projects in accordance with the requirements of DOE Order 413.3 and the Federal Acquisition Regulations (FARs). This guidance is consistent with Acquisition Letter 2009-01, "Management Reserve and Contingency," October 6, 2008 from the Office of Procurement and Assistance Management. Project contingency and MR are an integral part of the DOE capital asset project risk management process, providing project managers with the tools to respond to project risks and

327

Comparison of Bandwidth Usage: Service Location Protocol and Jini  

E-Print Network (OSTI)

Recently there has been an increase in the development of technologies for resource discovery, since for example, resources such as printers, mail boxes, memory space, and disk space are available in every network, ready to be used for any host. This has been caused, in part, by the growth in the popularity of portable devices such as laptops, PDAs, and cell phones which require configuration each time they attach to a new network segment. Since the configuration of such devices is tedious and sometimes complicated, there have been some attempts in past years to solve this problem, such as the DHCP approach. This paper focuses on the bandwidth analysis of two new approaches for dealing with resource discovery: the Service Location Protocol (SLP) and Jini. This work is particularly important since the communication among the devices is often wireless, whereas bandwidth is a limited resource. We present equations for characterizing the usage of bandwidth made by SLP and Jini, bas...

Javier Govea; Michel Barbeau

2000-01-01T23:59:59.000Z

328

A common protocol for agent-based social simulation  

E-Print Network (OSTI)

Traditional (i.e. analytical) modelling practices in the social sciences rely on a very well established, although implicit, methodological protocol, both with respect to the way models are presented and to the kinds of analysis that are performed. Unfortunately, computer-simulated models often lack such a reference to an accepted methodological standard. This is one of the main reasons for the scepticism among mainstream social scientists that results in low acceptance of papers with agent-based methodology in the top journals. We identify some methodological pitfalls that, according to us, are common in papers employing agent-based simulations, and propose appropriate solutions. We discuss each issue with reference to a general characterization of dynamic micro models, which encompasses both analytical and simulation models. In the way, we also clarify some confusing terminology. We then propose a three-stage process that could lead to the establishment of methodological standards in social and economic simulations.

Roberto Leombruni; Matteo Richiardi; Nicole J. Saam; Michele Sonnessa

2006-01-01T23:59:59.000Z

329

Protocols for Relay-Assisted Free-Space Optical Systems  

E-Print Network (OSTI)

We investigate transmission protocols for relay-assisted free-space optical (FSO) systems, when multiple parallel relays are employed and there is no direct link between the source and the destination. As alternatives to all-active FSO relaying, where all the available relays transmit concurrently, we propose schemes that select only a single relay to participate in the communication between the source and the destination in each transmission slot. This selection is based on the channel state information (CSI) obtained either from all or from some of the FSO links. Thus, the need for synchronizing the relays' transmissions is avoided and the slowly varying nature of the atmospheric channel is exploited. For both relay selection and all-active relaying, novel closed-form expressions for their outage performance are derived, assuming the versatile Gamma-Gamma channel model. Furthermore, based on the derived analytical results, the problem of allocating the optical power resources to the FSO links is addressed, ...

Chatzidiamantis, Nestor D; Kriezis, Emmanouil E; Karagiannidis, George K; Schober, Robert

2011-01-01T23:59:59.000Z

330

Addendum to the Building America House Simulation Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Addendum to the Building Addendum to the Building America House Simulation Protocols C. Engebrecht Metzger, E. Wilson, and S. Horowitz National Renewable Energy Laboratory December 2012 ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark,

331

FLIP: A flexible interconnection protocol for heterogeneous internetworking  

E-Print Network (OSTI)

This paper describes the Flexible Interconnection Protocol, or FLIP, whose main goal is to allow interconnection of heterogeneous devices with varying power, processing, and communication capabilities, ranging from simple sensors to more powerful computing devices such as laptops and desktops. The vision is that FLIP will be used to interconnect such devices forming clouds in the farthest branches/leaves of the Internet, while still providing connectivity with the existing IP-based Internet infrastructure. Through its flexible, customizable headers FLIP integrates just the functions required by a given application and that can be handled by the underlying device. Simple devices like sensors will benefit from incurring close to optimal overhead saving not only bandwidth, but, more importantly, energy. More sophisticated devices in the cloud can be responsible for implementing more complex functions like reliable/ordered data delivery, communication with other device clouds and with the IP infrastructure. FLIP is designed to provide a basic substrate on which to build network- and transport-level functionality. In heterogeneous environments, FLIP allows devices with varying capabilities to coexist and interoperate under the same network infrastructure. We present the basic design of FLIP and describe its implementation under Linux. We also report on FLIP’s performance when providing IPv4 and IPv6 as well as transport-layer functionality a la TCP and UDP. We show FLIP’s energy efficiency in different sensor network scenarios. For example, we use FLIP to implement the directed diffusion communication paradigm and obtain an improvement of 50 % in energy savings over an existing directed diffusion implementation. Finally, we showcase FLIP’s flexibility by demonstrating its ability to incorporate new protocol functions

Ignacio Solis; Katia Obraczka

2004-01-01T23:59:59.000Z

332

Protocols for Thermoluninescence and Optically Stimulated Luminescence Research at DOSAR  

SciTech Connect

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research at the Dosimetry Applications Research (DOSAR) facility complex. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and materials testing in a variety of radiation environments. Collaborations with the University of Tennessee-Knoxville (UTK) have also led to important contributions in the area of archaeometry, particularly as it relates to the use of radiation dosimetry to date archaeological artifacts. This manual is to serve as the primary instruction and operation manual for dosimetric and archaeometric research at DOSAR involving thermoluminescence (TL) and optically stimulated luminescence (OSL). Its purpose is to (1) provide protocols for common practices associated with the research, (2) outline the relevant organizational structure, (3) identify the Quality Assurance plan, and (4) describe all the procedures, operations, and responsibilities for safe and proper operation of associated equipment. Each person who performs research at DOSAR using TL/OSL equipment is required to read the latest revision of this manual and be familiar with its contents, and to sign and date the manual's master copy indicating that the manual has been read and understood. The TL/OSL Experimenter is also required to sign the manual after each revision to signify that the changes are understood. Each individual is responsible for completely understanding the proper operation of the TL/OSL equipment used and for following the guidance contained within this manual. The instructions, protocols, and operating procedures in this manual do not replace, supersede, or alter the hazard mitigation controls identified in the Research Safety Summary (''Thermoluminescence/Optically Stimulated Luminescence Dosimetry'') for this research, ORNL's Standards-Based Management System or any other official guidelines.

Bernal, SM

2004-10-11T23:59:59.000Z

333

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

334

LZfuzz: a fast compression-based fuzzer for poorly documented protocols  

E-Print Network (OSTI)

actual proprietary SCADA protocols in an isolated control network test environment, and was also SCADA protocols. Unfor- tunately, non-disclosure agreements prevent us from sharing the specific results Empirical results We developed our fuzzer, LZfuzz (pronounced "lazy-fuzz") for testing of plain text SCADA

335

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network (OSTI)

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

336

The past, present and future of protocol checking with CSP and FDR  

E-Print Network (OSTI)

AVoCS 2006 The past, present and future of protocol checking with CSP and FDR Bill Roscoe1 Oxford of these meetings was the development of the CSP model of cryptographic protocols, following Gavin Lowe's discovery the particular advantages of using a process algebra, and CSP in particular, for modelling cryptoprotocols

Paris-Sud XI, Université de

337

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network (OSTI)

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

338

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

339

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks  

E-Print Network (OSTI)

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last years but vulnerabilities of major or minor relevance have been identified in most of them. In 2008, Kim et al. [18] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance. In this paper, we analyze this protocol and we present a passive full disclosure attack, which allows an adversary to discover the long-term secret key of the tag. The presented attack is very relevant, since no security objectives are met in Kim et al.’s protocol. Then, design guidelines are introduced with the aim of facilitating protocol designers the stimulating task of designing secure and efficient schemes against relay attacks. Finally a new protocol, named Hitomi and inspired by [18], is designed conforming the guidelines proposed previously.

Pedro Peris-lopez; Julio C. Hern; Aikaterini Mitrokotsa; Juan M. E. Tapiador

2010-01-01T23:59:59.000Z

340

Designing Security Properties-Centric Communication Protocols using a Component-Based Approach  

Science Conference Proceedings (OSTI)

Numerous communication protocols have been designed offering a set of security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and security properties they ... Keywords: Communication Protocols, Component-based Approach, Electronic Document Transfer, Security Components, Security Properties

N. Nobelis; K. Boudaoud; C. Delettre; M. Riveill

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

An Efficient Multi-Channel MAC Protocol for Mobile Ad Hoc Networks  

Science Conference Proceedings (OSTI)

This paper proposes a novel multi-channel MAC protocol for mobile ad hoc networks that enables the nodes to transmit packets in distributed channels. In our protocol, the ATIM window is divided into two windows. The first window is called deciding channel ... Keywords: Ad hoc network, media access control (MAC), multi-channel

Wen-Hwa Liao; Wen-Chin Chung

2009-01-01T23:59:59.000Z

342

BUSpec: A framework for generation of verification aids for standard bus protocol specifications  

Science Conference Proceedings (OSTI)

A typical verification intellectual property (VIP) of a bus protocol such as ARM advanced micro-controller bus architecture (AMBA) or PCI consists of a set of assertions and associated verification aids such as test-benches, design-ware models and coverage ... Keywords: Assertion-based verification, Bus functional models, Protocol validation, Verification intellectual property

Bhaskar Pal; Ansuman Banerjee; Pallab Dasgupta; P. P. Chakrabarti

2007-04-01T23:59:59.000Z

343

Contextual and Applications-Aware Communications Protocol Design for Vehicle-to-Vehicle Communications  

Science Conference Proceedings (OSTI)

Cooperative vehicular ad-hoc networks are currently under development for improving traffic safety and efficiency. The strict requirements of traffic safety applications demand robust communication protocols that are able to efficiently operate under ... Keywords: Context-awareness, Cooperative protocols, Intelligent transportation systems, Vehicular ad-hoc networks

Miguel Sepulcre; Javier Gozalvez

2013-06-01T23:59:59.000Z

344

Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle  

E-Print Network (OSTI)

Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle Mirco Musolesi to a clean slate networking approach in the Haggle platform. The remainder of this paper is organised, 6, 2, 3]. In addition to routing protocol there is also a need for the provision of frameworks

Mascolo, Cecilia

345

On the (im)possibility of perennial message recognition protocols without public-key cryptography  

Science Conference Proceedings (OSTI)

A message recognition protocol (MRP) aims to exchange authenticated information in an insecure channel. During the initialization session of the protocol, the parties exchange some authenticated information which the adversary can passively observe. ... Keywords: Dolev-Yao model, message recognition, symmetric cryptography

Madeline González Muñiz; Peeter Laud

2011-03-01T23:59:59.000Z

346

Review: A survey and tutorial of wireless relay network protocols based on network coding  

Science Conference Proceedings (OSTI)

Ever since the wireless relay network (RN) was introduced, it has led to the discovery of several new protocols, which have been consistently improved by researchers to overcome many constraints such as throughput, capacity bound, symbol error rate, ... Keywords: Relay networks, Wireless network coding, Wireless relay protocols

Ahmed Hassan Mohammed; Bin Dai; Benxiong Huang; Muhammad Azhar; Guan Xu; Peng Qin; Shui Yu

2013-03-01T23:59:59.000Z

347

A prioritized battery-aware routing protocol for wireless ad hoc networks  

Science Conference Proceedings (OSTI)

It is a challenge area in the field of ad hoc networks to support prioritized routing for time sensitive applications, such as multimedia communications, IP telephony and interactive games. However the existing protocols did not consider the special ... Keywords: battery models, battery-awareness, energy efficiency, prioritized routing, routing protocols, wireless ad hoc networks

Chi Ma; Yuanyuan Yang

2005-10-01T23:59:59.000Z

348

QoS-Aware Self-adaptation of Communication Protocols in a Pervasive Service Middleware  

Science Conference Proceedings (OSTI)

Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols ... Keywords: pervasive computing, quality-of-service, self-management

Weishan Zhang; Klaus Marius Hansen; Joao Fernandes; Julian Schuette; Francisco Milagro Lardies

2010-12-01T23:59:59.000Z

349

Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol  

E-Print Network (OSTI)

In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

2010-03-11T23:59:59.000Z

350

RDMA read based rendezvous protocol for MPI over InfiniBand: design alternatives and benefits  

Science Conference Proceedings (OSTI)

Message Passing Interface (MPI) is a popular parallel programming model for scientific applications. Most high-performance MPI implementations use Rendezvous Protocol for efficient transfer of large messages. This protocol can be designed using either ... Keywords: InfiniBand, MPI, communication overlap

Sayantan Sur; Hyun-Wook Jin; Lei Chai; Dhabaleswar K. Panda

2006-03-01T23:59:59.000Z

351

A Performance Comparison of Homeless and Homebased Lazy Release Consistency Protocols in Software Shared Memory  

E-Print Network (OSTI)

A Performance Comparison of Homeless and Home­based Lazy Release Consistency Protocols in Software based on lazy release consistency. In particular, we compare the performance of Princeton's home­based most of their data were migratory, while the home­based protocol performed better for one. For this one

Hu, Y. Charlie

352

Transaction-based authentication and key agreement protocol for inter-domain VoIP  

Science Conference Proceedings (OSTI)

We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. The protocol operates on a transaction basis. Each transaction is defined as the set of operations ... Keywords: Authentication, DDoS Protection, Inter-domain VoIP, Synchronisation, VoIP security

Patrick Battistello; Joaquin Garcia-Alfaro; Cyril DeléTré

2012-09-01T23:59:59.000Z

353

SmartGossip: an improved randomized broadcast protocol for sensor networks  

Science Conference Proceedings (OSTI)

We investigate four performance metrics for randomized broadcast protocols on sensor networks: the fraction of nodes that receive the message (coverage), the number of first-time receivers per transmission (energy efficiency), the node-average normalized ... Keywords: SmartGossip, performance analysis, randomized protocols, sensor networks

Ananth V. Kini; Vilas Veeraraghavan; Nikhil Singhal; Steven Weber

2006-04-01T23:59:59.000Z

354

The communication protocol design of electro-hydraulic control system for hydraulic supports at coal mine  

Science Conference Proceedings (OSTI)

The electro-hydraulic control system for hydraulic supports is a multi embedded systems constitute a computer network system working in the coal mine harsh environment. Excellent hardware connection and fine communication protocol are the fundamental ... Keywords: AVR microcontroller, communication protocols, electro-hydraulic control, hydraulic support

Jingguo Wen; Zisheng Lian

2011-09-01T23:59:59.000Z

355

Improving Performance of Cluster Based Routing Protocol using Cross-Layer Design  

E-Print Network (OSTI)

The main goal of routing protocol is to efficiency delivers data from source to destination. All routing protocols are the same in this goal, but the way they adopt to achieve it is different, so routing strategy has an egregious role on the performance of an ad hoc network. Most of routing protocols proposed for ad hoc networks have a flat structure. These protocols expand the control overhead packets to discover or maintain a route. On the other hand a number of hierarchical-based routing protocols have been developed, mostly are based on layered design. These protocols improve network performances especially when the network size grows up since details about remote portion of network can be handled in an aggregate manner. Although, there is another approach to design a protocol called cross-layer design. Using this approach information can exchange between different layer of protocol stack, result in optimizing network performances. In this paper, we intend to exert cross-layer design to optimize Cluster B...

Jahanbakhsh, Kazem

2008-01-01T23:59:59.000Z

356

TREnD: a Timely, Reliable, Energy-efficient and Dynamic WSN Protocol for Control Applications  

E-Print Network (OSTI)

1 TREnD: a Timely, Reliable, Energy-efficient and Dynamic WSN Protocol for Control Applications for energy consumption. TREnD is implemented on a test-bed and compared to some existing protocols. In this paper, we develop TREnD1 , an energy-efficient The authors are with the ACCESS Linnaeus Center

357

My Home is My Bazaar - A Taxonomy and Classification of Current Wireless Home Network Protocols  

Science Conference Proceedings (OSTI)

Recent advances in wireless communication have produced a multitude of related protocols, leading to a growing market of products for home automation systems within energy management, elder care, etc. These systems are different from wired ones in terms ... Keywords: wireless networks, security, home automation, pervasive computing, protocols, taxonomy

Rune Torbensen; Klaus Marius Hansen; Theis Solberg Hjorth

2011-09-01T23:59:59.000Z

358

Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network  

Science Conference Proceedings (OSTI)

A Dynamic Host Configuration Protocol (DHCP) server is a well-known server deployed at a network to manage Internet Protocol (IP) addresses temporarily rentable to hosts in the network. Besides, a DHCP server provides hosts with important network information ... Keywords: AHCM, ARP, Autoconfiguration, Automatic host configuration, DHCP, Free IP address

Tzu-Chi Huang; Kuo-Chih Chu

2011-11-01T23:59:59.000Z

359

Core location-aided cluster-based routing protocol for mobile ad hoc networks  

Science Conference Proceedings (OSTI)

Instead of blindly searching for a route in the entire network, the location-based routing protocol uses the location information of mobile nodes to confine routing space into a smaller range that reduces routing overhead and broadcast storm. In this ... Keywords: GPS, MANET, cluster-based routing, geocasting, routing protocol

Tzay-Farn Shih; Hsu-Chun Yen

2006-07-01T23:59:59.000Z

360

Cell synchrony and chromosomal protocols for somatic cells of cotton gossypium hirsutum  

SciTech Connect

The intent of this pamphlet is to share information with others who are interested in useful protocols for cotton cytogenetics and cytology. The protocols described are a beginning effort and they are expected to be improved. All methods, results and data given pertain to cultivar MD 51ne. We are not satisfied with our results of in situ hybridization.

Van`t Hof, J.; Lamm, S.S.

1994-10-10T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Design and development of Ethernet-based storage area network protocol  

Science Conference Proceedings (OSTI)

In response to the trend of rapidly growing volume of and increasingly critical role played by data storage, there is a strong demand to share storage over network. In this paper, we present an Ethernet-based storage area network protocol, called HyperSCSI. ... Keywords: Ethernet, HyperSCSI, Network Storage, Protocol, SAN

Wilson Yong Hong Wang; Heng Ngi Yeo; Yao Long Zhu; Tow Chong Chong; Teck Yoong Chai; Luying Zhou; Jit Bitwas

2006-05-01T23:59:59.000Z

362

ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Emerging data streaming applications in Wireless Sensor Networks require reliable and energy-efficient Transport Protocols. Our recent Wireless Sensor Network deployment in the Burdekin delta, Australia, for water monitoring [T. Le Dinh, W. Hu, P. Sikka, ... Keywords: Energy-efficiency, Reliability, Transport protocol, Wireless Sensor Network

Tuan Le; Wen Hu; Peter Corke; Sanjay Jha

2009-05-01T23:59:59.000Z

363

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP  

E-Print Network (OSTI)

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP 1,2,3) P Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China) P 3) P( Network and Data Security Frequency Identification (RFID) is security and privacy. Many RFID authentication protocols have been

International Association for Cryptologic Research (IACR)

364

iTOUGH2 Universal Optimization Using the PEST Protocol  

Science Conference Proceedings (OSTI)

iTOUGH2 (http://www-esd.lbl.gov/iTOUGH2) is a computer program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis [Finsterle, 2007a, b, c]. iTOUGH2 contains a number of local and global minimization algorithms for automatic calibration of a model against measured data, or for the solution of other, more general optimization problems (see, for example, Finsterle [2005]). A detailed residual and estimation uncertainty analysis is conducted to assess the inversion results. Moreover, iTOUGH2 can be used to perform a formal sensitivity analysis, or to conduct Monte Carlo simulations for the examination for prediction uncertainties. iTOUGH2's capabilities are continually enhanced. As the name implies, iTOUGH2 is developed for use in conjunction with the TOUGH2 forward simulator for nonisothermal multiphase flow in porous and fractured media [Pruess, 1991]. However, iTOUGH2 provides FORTRAN interfaces for the estimation of user-specified parameters (see subroutine USERPAR) based on user-specified observations (see subroutine USEROBS). These user interfaces can be invoked to add new parameter or observation types to the standard set provided in iTOUGH2. They can also be linked to non-TOUGH2 models, i.e., iTOUGH2 can be used as a universal optimization code, similar to other model-independent, nonlinear parameter estimation packages such as PEST [Doherty, 2008] or UCODE [Poeter and Hill, 1998]. However, to make iTOUGH2's optimization capabilities available for use with an external code, the user is required to write some FORTRAN code that provides the link between the iTOUGH2 parameter vector and the input parameters of the external code, and between the output variables of the external code and the iTOUGH2 observation vector. While allowing for maximum flexibility, the coding requirement of this approach limits its applicability to those users with FORTRAN coding knowledge. To make iTOUGH2 capabilities accessible to many application models, the PEST protocol [Doherty, 2007] has been implemented into iTOUGH2. This protocol enables communication between the application (which can be a single 'black-box' executable or a script or batch file that calls multiple codes) and iTOUGH2. The concept requires that for the application model: (1) Input is provided on one or more ASCII text input files; (2) Output is returned to one or more ASCII text output files; (3) The model is run using a system command (executable or script/batch file); and (4) The model runs to completion without any user intervention. For each forward run invoked by iTOUGH2, select parameters cited within the application model input files are then overwritten with values provided by iTOUGH2, and select variables cited within the output files are extracted and returned to iTOUGH2. It should be noted that the core of iTOUGH2, i.e., its optimization routines and related analysis tools, remains unchanged; it is only the communication format between input parameters, the application model, and output variables that are borrowed from PEST. The interface routines have been provided by Doherty [2007]. The iTOUGH2-PEST architecture is shown in Figure 1. This manual contains installation instructions for the iTOUGH2-PEST module, and describes the PEST protocol as well as the input formats needed in iTOUGH2. Examples are provided that demonstrate the use of model-independent optimization and analysis using iTOUGH2.

Finsterle, S.A.

2010-07-01T23:59:59.000Z

365

Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM-HQ Review Field Self Assessment Site Specific QAP-QIP EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 This memorandum serves to transmit the Protocol for EM Review/Field Self-Assessment of Site-Specific QAP/QIP. The subject document is developed as part of continued efforts to ensure technical consistency, transparency, and clarity of QA requirements and expectations. Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 More Documents & Publications Protocol for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans SOPP-43, EM-23 Quality Assurance Oversight

366

Event:GHG Protocol Latin America and Caribbean Regional Training: How to  

Open Energy Info (EERE)

Protocol Latin America and Caribbean Regional Training: How to Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program: all day on 2011/08/29 Aug 29 - Sept 2: Bogota, Colombia This regional workshop will provide training for government agencies, business/industry associations and key NGOs on how to establish and implement national- or regional-level corporate greenhouse gas (GHG) emissions reporting programs and trainings. The workshop will include two parts: a training of trainers of corporate GHG accounting and reporting, and a corporate GHG program design course. Members of the Brazil GHG Protocol Program, the Mexico GHG Protocol

367

Subfreezing Start/Stop Protocol for an Advanced Metallic Open-Flowfield Fuel Cell Stack  

NLE Websites -- All DOE Office Websites (Extended Search)

Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Subfreezing Start/Stop Protocol for an Advanced Metallic Open Metallic Open Metallic Open Metallic Open- - - -Flowfield Flowfield Flowfield Flowfield Fuel Cell Stack Fuel Cell Stack Fuel Cell Stack Fuel Cell Stack Presented at: US DOE New Projects Kickoff Meeting Washington, DC 13-14 February 2007 Alternative Energy Efficient Simple Clean Today Alternative Energy Efficient Simple Clean Today Objective Objective Objective Objective This project will demonstrate a PEM fuel cell stack that is able to perform and start up in subfreezing conditions, respecting allowed energy budget, and showing limited impact at extreme temperatures over multiple

368

Homeless and homebased lazy release consistency protocols on distributed shared memory  

E-Print Network (OSTI)

This paper describes the comparison between homeless and home-based Lazy Release Consistency (LRC) protocols which are used to implement Distributed Shared Memory (DSM) in cluster computing. We present a performance evaluation of parallel applications running on homeless and home-based LRC protocols. We compared the performance between Tread-Marks, which uses homeless LRC protocol, and our home-based DSM system. We found that the home-based DSM system has shown better scalability than TreadMarks in parallel applications we tested. This poor scalability in the homeless protocol is caused by a hot spot and garbage collection, but we have shown that these factors do not affect the scalability of the home-based protocol.

Byung-hyun Yu; Zhiyi Huang; Stephen Cranefield; Martin Purvis

2004-01-01T23:59:59.000Z

369

On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels  

E-Print Network (OSTI)

The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransmission request (HARQ) protocol is revisited for a block-fading wire-tap channel, in which two legitimate users communicate over a block-fading channel in the presence of a passive eavesdropper who intercepts the transmissions through an independent block-fading channel. In this model, the transmitter obtains a 1-bit ACK/NACK feedback from the legitimate receiver via an error-free public channel. Both reliability and confidentiality of secure HARQ protocols are studied by the joint consideration of channel coding, secrecy coding, and retransmission protocols. In particular, the error and secrecy performance of repetition time diversity (RTD) and incremental redundancy (INR) protocols are investigated based on good Wyner code sequences, which ensure that the confidential message is decoded successfully by the legitimate receiver and is k...

Tang, Xiaojun; Spasojevic, Predrag; Poor, H Vincent

2007-01-01T23:59:59.000Z

370

EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.  

SciTech Connect

We empirically study the effect of mobility on the performance of protocols designed for wireless adhoc networks. An important ohjective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols was measured in terms of (i) latency, (ii) throughput, (iii) number of packels received, (iv) long term fairness and (v) number of control packets at the MAC layer level. Three different commonly studied routing protocols were used: AODV, DSR and LAR1. Similarly three well known MAC protocols were used: MACA, 802.1 1 and CSMA. The inair1 conclusion of our study include the following: 1. 'I'he performance of the: network varies widely with varying mobility models, packet injection rates and speeds; and can ba in fact characterized as fair to poor depending on the specific situation. Nevertheless, in general, it appears that the combination of AODV and 802.1 I is far better than other combination of routing and MAC protocols. 2. MAC layer protocols interact with routing layer protocols. This concept which is formalized using statistics implies that in general it is not meaningful to speak about a MAC or a routing protocol in isolation. Such an interaction leads to trade-offs between the amount of control packets generated by each layer. More interestingly, the results wise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. 3. Routing prolocols with distributed knowledge about routes are more suitable for networks with mobility. This is seen by comparing the performance of AODV with DSR or LAR scheme 1. In DSli and IAR scheme 1, information about a computed path is being stored in the route query control packct. 4. MAC layer protocols have varying performance with varying mobility models. It is not only speed that influences the performance but also node degree and connectivity of the dynamic network that affects the protocol performance. 'The main implication of OUI' work is that performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the pcrlormance of a communication network, it will be important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the 7 layer OS1 stilck will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as design of experinierits arzd aiialysis qf variance methods to characterize the interaction between the protocols, mobility patterns and speed. This allows us to mako much more informed conclusions about the performance of thc protocols than would have been possible by merely running these experiments and observing the data. These ideas are of independtmt interest and are applicable in other contexts wherein one experimentally analyzes algorithms.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.); Marathe, A. (Achla)

2001-01-01T23:59:59.000Z

371

SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013  

SciTech Connect

There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

Gordon Rueff; Lyle Roybal; Denis Vollmer

2013-01-01T23:59:59.000Z

372

Oak Ridge National Laboratory's Preparations for Additional Protocol Implementation  

SciTech Connect

The United States Additional Protocol (AP) with the International Atomic Energy Agency (IAEA) entered into force (EIF) January 6, 2009. In anticipation of the EIF, the Department of Energy (DOE) National Nuclear Security Administration Office of International Regimes and Agreements (NA-243) began the initial DOE AP data call on November 3, 2008. This paper describes the Oak Ridge National Laboratory's (ORNL's) preparation, organization, and development efforts to successfully implement the AP and complete the AP data call. ORNL had 35 days to identify declarable activities and finalize the declaration line items (DLIs) for submission to NA-243. To be able to respond within the required time frame, many preparation activities at ORNL were necessary, such as determining the AP coordinator (APC) and team roles; conducting site awareness training; creating the ORNL Standards-Based Management System (SBMS) procedure Reporting of Nuclear Fuel Cycle Activities; training personnel; and defining site implementation software tools. Identifying, updating, compiling, reviewing, and submitting the DLIs to NA-243 were all critical activities for successfully implementing the AP and completing the AP data call at ORNL.

McCowan, Janie [ORNL; Cain, Ronald A [ORNL

2009-01-01T23:59:59.000Z

373

Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting  

E-Print Network (OSTI)

We propose a family of sifting-less quantum-key-distribution protocols which use reverse-reconciliation, and are based on weak coherent pulses (WCPs) polarized along m different directions. When m=4, the physical part of the protocol is identical to most experimental implementations of BB84 and SARG04 protocols and they differ only in classical communications and data processing. We compute their total keyrate as function of the channel transmission T, using general information theoretical arguments and we show that they have a higher keyrate than the more standard protocols, both for fixed and optimized average photon number of the WCPs. When no decoy-state protocols (DSPs) are applied, the scaling of the keyrate with transmission is improved from T2 for BB84 to T^(1+1/(m-2)). If a DSP is applied, we show how the keyrates scale linearly with T, with an improvement of the prefactor by 75.96 % for m=4. High values of $ m $ allow to asymptotically approach the keyrate obtained with ideal single photon pulses. The fact that the keyrates of these sifting-less protocols are higher compared to those of the aforementioned more standard protocols show that the latter are not optimal, since they do not extract all the available secret key from the experimental correlations.

Fabio Grazioso; Frédéric Grosshans

2013-06-25T23:59:59.000Z

374

Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, and Myungchul Kim  

E-Print Network (OSTI)

Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, mckim}@icu.ac.kr Abstract - A method for testing multi-protocol implementation under test (IUT) with a single test suite has been proposed in the literature. It tests a multi-protocol IUT in an integrated way

Lee, Ben

375

MARK-OPT: A Concurrency Control Protocol for Parallel B-Tree Structures to Reduce the Cost of SMOs  

Science Conference Proceedings (OSTI)

In this paper, we propose a new concurrency control protocol for parallel B-tree structures capable reducing the cost of structure-modification-operation (SMO) compared to the conventional protocols such as ARIES/IM and INC-OPT. We call this protocol ... Keywords: B-tree, concurrency control, index, latch, parallel DB

Tomohiro Yoshihara; Dai Kobayashi; Haruo Yokota

2007-08-01T23:59:59.000Z

376

Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol  

SciTech Connect

To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

2013-07-01T23:59:59.000Z

377

Available at www.sciencedirect.com http://www.elsevier.com/locate/biombioe  

E-Print Network (OSTI)

raw materials and residues of the forest products industry Structure of the forest fund biomass 204 capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol Andrey for the conversion of boilers to biofuel using the procedures of the Kyoto Protocol. According to the developed

378

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

379

Bio-inspired energy-aware protocol design for cooperative wireless networks  

Science Conference Proceedings (OSTI)

In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol ...

Gian Paolo Perrucci; Puri Ardhy Anggraeni; Satya Ardhy Wardana; Frank H. P. Fitzek; Marcos D. Katz

2011-04-01T23:59:59.000Z

380

A survey of UNI signaling systems and protocols for ATM networks  

Science Conference Proceedings (OSTI)

The main aspect covered by signaling systems and protocols for ATM networks concerns the possibility to manage, maintain, and control a user-driven communication between arbitrary ATM end-systems connected to an ATM network. The tasks and procedures ...

Burkhard Stiller

1995-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols  

Science Conference Proceedings (OSTI)

No quantum key distribution (QKD) protocol has been proved fully secure. A remaining problem is the eavesdropper's ability to make coherent measurements on the joint properties of large composite systems. This problem has been recently solved by Yao ...

Dominic Mayers

1995-08-01T23:59:59.000Z

382

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

383

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

384

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

385

A negotiation protocol for multiple interdependent issues negotiation over energy exchange  

Science Conference Proceedings (OSTI)

We present a novel negotiation protocol to facilitate energy exchange between off-grid homes that are equipped with renewable energy generation and electricity storage. Our solution imposes additional constraints on negotiation such that it reduces a ...

Muddasser Alam; Alex Rogers; Sarvapali D. Ramchurn

2011-07-01T23:59:59.000Z

386

Cognitive factors in perspective-based reading (PBR): A protocol analysis study  

Science Conference Proceedings (OSTI)

The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the protocol analysis technique from cognitive science, the authors coded concurrent ...

Bryan Robbins; Jeff Carver

2009-10-01T23:59:59.000Z

387

Performance comparison of router assisted congestion control protocols: XCP vs. RCP  

Science Conference Proceedings (OSTI)

In the current Internet, network overload is prevented by the congestion control of the Transmission Control Protocol (TCP). The traditional TCP congestion control is an end-to-end mechanism that suffers from some inherent shortcomings. A design alternative ...

Magnus Proebster; Michael Scharf; Simon Hauger

2009-03-01T23:59:59.000Z

388

S4: small state and small stretch routing protocol for large wireless sensor networks  

Science Conference Proceedings (OSTI)

Routing protocols for wireless sensor networks must address the challenges of reliable packet delivery at increasingly large scale and highly constrained node resources. Attempts to limit node state can result in undesirable worst-case routing performance, ...

Yun Mao; Feng Wang; Lili Qiu; Simon S. Lam; Jonathan M. Smith

2007-04-01T23:59:59.000Z

389

Selective collision based medium access control protocol for proactive protection of privacy for RFID  

Science Conference Proceedings (OSTI)

RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our ...

JuSung Park; Jeonil Kang; DaeHun Nyang

2005-12-01T23:59:59.000Z

390

Evaluation of replacement protocols and modifications to TCP to enhance ASC Wide Area Network performance.  

SciTech Connect

Historically, TCP/IP has been the protocol suite used to transfer data throughout the Advanced Simulation and Computing (ASC) community. However, TCP was developed many years ago for an environment very different from the ASC Wide Area Network (WAN) of today. There have been numerous publications that hint of better performance if modifications were made to the TCP algorithms or a different protocol was used to transfer data across a high bandwidth, high delay WAN. Since Sandia National Laboratories wants to maximize the ASC WAN performance to support the Thor's Hammer supercomputer, there is strong interest in evaluating modifications to the TCP protocol and in evaluating alternatives to TCP, such as SCTP, to determine if they provide improved performance. Therefore, the goal of this project is to test, evaluate, compare, and report protocol technologies that enhance the performance of the ASC WAN.

Romero, Randy L. Jr.

2004-09-01T23:59:59.000Z

391

Protocols for wide-area data-intensive applications: design and performance issues  

Science Conference Proceedings (OSTI)

Providing high-speed data transfer is vital to various data-intensive applications. While there have been remarkable technology advances to provide ultra-high-speed network bandwidth, existing protocols and applications may not be able to fully utilize ...

Yufei Ren; Tan Li; Dantong Yu; Shudong Jin; Thomas Robertazzi; Brian L. Tierney; Eric Pouyoul

2012-11-01T23:59:59.000Z

392

Protocol for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this document is to present the review protocol and lines of inquiry (LOIs) that are used as basis for EM-HQ technical review and approval of site-specific QAP/QIPs.

393

Energy-efficient reservation-based medium access control protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

In Wireless Sensor Networks (WSNs), a robust and energy-efficient Medium Access Control (MAC) protocol is required for high energy efficiency in harsh operating conditions, where node and link failures are common. This paper presents the design of a ...

Mikko Kohvakka; Jukka Suhonen; Timo D. Hämäläinen; Marko Hännikäinen

2010-04-01T23:59:59.000Z

394

H-MAC: A Hybrid MAC Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

In this paper, we propose a hybrid medium access control protocol (H-MAC) for wireless sensor networks. It is based on the IEEE 802.11's power saving mechanism (PSM) and slotted aloha, and utilizes multiple slots dynamically to improve performance. Existing MAC protocols for sensor networks reduce energy consumptions by introducing variation in an active/sleep mechanism. But they may not provide energy efficiency in varying traffic conditions as well as they did not address Quality of Service (QoS) issues. H-MAC, the propose MAC protocol maintains energy efficiency as well as QoS issues like latency, throughput, and channel utilization. Our numerical results show that H-MAC has significant improvements in QoS parameters than the existing MAC protocols for sensor networks while consuming comparable amount of energy.

Mehta, S; 10.5121/ijcnc.2010.2208

2010-01-01T23:59:59.000Z

395

Protocols for multi-antenna ad-hoc wireless networking in interference environments  

E-Print Network (OSTI)

A fundamental question for the design of future wireless networks concerns the nature of spectrum management and the protocols that govern use of the spectrum. In the oligopoly model, spectrum is owned and centrally managed, ...

Hinton, Danielle A. (Danielle Ayodele), 1978-

2010-01-01T23:59:59.000Z

396

Striving for a Standard Protocol for Preconditioning or Stabilization of Polycrystalline Thin Film Photovoltaic Modules: Preprint  

DOE Green Energy (OSTI)

A protocol was devised for preconditioning polycrystalline CdTe and CIGS cell technologies under bias with light exposure or forward-bias currents at elevated temperatures and the results reported.

del Cueto, J. A.; Deline, C. A.; Albin, D. S.; Rummel, S. R.; Anderberg, A.

2009-07-01T23:59:59.000Z

397

Conventions for the use of the Session Description Protocol (SDP) for ATM Bearer Connections  

Science Conference Proceedings (OSTI)

This document describes conventions for using the Session Description Protocol (SDP) described in RFC 2327 for controlling ATM Bearer Connections, and any associated ATM Adaptation Layer (AAL). The AALs addressed are Type 1, Type 2 and Type 5. This ...

R. Kumar; M. Mostafa

2001-05-01T23:59:59.000Z

398

A user study design for comparing the security of registration protocols  

Science Conference Proceedings (OSTI)

We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. We discuss ethical and ecological validity challenges we faced in designing ...

Chris Karlof; J. D. Tygar; David Wagner

2008-04-01T23:59:59.000Z

399

ADV-MAC: Advertisement-Based MAC Protocol for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Several Medium Access Control (MAC) protocols have been proposed for wireless sensor networks with the objective of minimizing energy consumption. For example, Sensor-MAC (S-MAC) was proposed to reduce energy consumption by introducing a duty cycle. ...

Surjya Sarathi Ray; Ilker Demirkol; Wendi Heinzelman

2009-12-01T23:59:59.000Z

400

On-chip COMA cache-coherence protocol for microgrids of microthreaded cores  

Science Conference Proceedings (OSTI)

This paper describes an on-chip COMA cache coherency protocol to support the microthread model of concurrent program composition. The model gives a sound basis for building multi-core computers as it captures concurrency, abstracts communication and ...

Li Zhang; Chris Jesshope

2007-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

On-chip COMA Cache-coherence protocol for Microgrids of Microthreaded Cores  

E-Print Network (OSTI)

On-chip COMA Cache-coherence protocol for Microgrids of Microthreaded Cores Li Zhang Chris Jesshope and the development of a co-simulator to the Microgrid CMP emulator. 1 Introduction It is now widely accepted

Jesshope, Chris

402

The Importance of the Montreal Protocol in Protecting Earth’s Hydroclimate  

Science Conference Proceedings (OSTI)

The 1987 Montreal Protocol regulating emissions of chlorofluorocarbons (CFCs) and other ozone-depleting substances (ODSs) was motivated primarily by the harm to human health and ecosystems arising from increased exposure to ultraviolet-B (UV-B) ...

Yutian Wu; Lorenzo M. Polvani; Richard Seager

2013-06-01T23:59:59.000Z

403

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance- as claimed by their authors. The study of this recent protocol is the main subject of this paper. We present a passive full disclosure attack which allows an adversary-listening the public messages exchanged on the channel- to discover the long-term secret key of the tag. The presented attack is very relevant as it implies that none of the protocol security objectives are guaranteed. Additionally, we also show that the probability of a successful mafia fraud attack against the Reid et al. protocol [16] is bounded by (3/4) n and not by (7/8) n as Piramuthu states in [15].

unknown authors

2009-01-01T23:59:59.000Z

404

A Study of Channel Estimation and Postprocessing in Quantum Key Distribution Protocols  

E-Print Network (OSTI)

This thesis investigate the channel estimation and the postprocessing of the quantum key distribution protocols. In particular, we propose a new channel estimation procedure, in which we utilize the bit sequences transmitted and received by different bases, and a new postprocessing with two-way classical communication. Then, we show that the key generation rates of the QKD protocols with our channel estimation and/or our postprocessing are higher than those with conventional ones.

Shun Watanabe

2009-04-13T23:59:59.000Z

405

A test protocol to screen capacitors for radiation-induced charge loss.  

SciTech Connect

This report presents a test protocol for screening capacitors dielectrics for charge loss due to ionizing radiation. The test protocol minimizes experimental error and provides a test method that allows comparisons of different dielectric types if exposed to the same environment and if the same experimental technique is used. The test acceptance or screening method is fully described in this report. A discussion of technical issues and possible errors and uncertainties is included in this report also.

Zarick, Thomas Andrew; Hartman, E. Frederick

2008-09-01T23:59:59.000Z

406

Probabilistic DCS: An RFID reader-toreader anti-collision protocol  

E-Print Network (OSTI)

The wide adoption of Radio Frequency Identification (RFID) for applications requiring a large number of tags and readers makes critical the reader-to-reader collision problem. Various anticollision protocols have been proposed, but the majority require considerable additional resources and costs. Distributed Color System (DCS) is a state-of-the-art protocol based on time division, without noteworthy additional requirements. This paper presents the Probabilistic DCS (PDCS) reader-to-reader anticollision protocol which employs probabilistic collision resolution. Differently from previous time division protocols, PDCS allows multichannel transmissions, according to international RFID regulations. A theoretical analysis is provided in order to clearly identify the behavior of the additional parameter representing the probability. The proposed protocol maintains the features of DCS, achieving more efficiency. Theoretical analysis demonstrates that the number of reader-to-reader collisions after a slot change is decreased by over 30%. The simulation analysis validates the theoretical results, and shows that PDCS reaches better performance than state-of-the-art reader-to-reader anticollision protocols. Key words: RFID, reader-to-reader collision 1.

Renato Ferrero; Bartolomeo Montrucchio; Maurizio Rebaudengo

2010-01-01T23:59:59.000Z

407

Scaling HEP to Web size with RESTful protocols: The frontier example  

SciTech Connect

The World-Wide-Web has scaled to an enormous size. The largest single contributor to its scalability is the HTTP protocol, particularly when used in conformity to REST (REpresentational State Transfer) principles. High Energy Physics (HEP) computing also has to scale to an enormous size, so it makes sense to base much of it on RESTful protocols. Frontier, which reads databases with an HTTP-based RESTful protocol, has successfully scaled to deliver production detector conditions data from both the CMS and ATLAS LHC detectors to hundreds of thousands of computer cores worldwide. Frontier is also able to re-use a large amount of standard software that runs the Web: on the clients, caches, and servers. I discuss the specific ways in which HTTP and REST enable high scalability for Frontier. I also briefly discuss another protocol used in HEP computing that is HTTP-based and RESTful, and another protocol that could benefit from it. My goal is to encourage HEP protocol designers to consider HTTP and REST whenever the same information is needed in many places.

Dykstra, Dave; /Fermilab

2011-01-01T23:59:59.000Z

408

OPM Scheme Editor 2: A graphical editor for specifying object-protocol structures  

SciTech Connect

This document describes an X-window based Schema Editor for the Object-Protocol Model (OPM). OPM is a data model that supports the specification of complex object and protocol classes. objects and protocols are qualified in OPM by attributes that are defined over (associated with) value classes. Connections of object and protocol classes are expressed in OPM via attributes. OPM supports the specification (expansion) of protocols in terms of alternative and sequences of component (sub) protocols. The OPM Schema Editor allows specifying, displaying, modifying, and browsing through OPM schemas. The OPM Schema Editor generates an output file that can be used as input to an OPM schema translation tool that maps OPM schemas into definitions for relational database management systems. The OPM Schema Editor was implemented using C++ and the X11 based Motif toolkit, on Sun SPARCstation under Sun Unix OS 4.1. This document consists of the following parts: (1) A tutorial consisting of seven introductory lessons for the OPM Schema Editor. (2) A reference manual describing all the windows and functions of the OPM Schema Editor. (3) An appendix with an overview of OPM.

Chen, I-Min A.; Markowitz, V.M.; Pang, F.; Ben-Shachar, O.

1993-07-01T23:59:59.000Z

409

EIA - Forecasts and Analysis of Energy Data  

Gasoline and Diesel Fuel Update (EIA)

Preface Preface This report presents international energy projections through 2025, prepared by the Energy Information Administration, including outlooks for major energy fuels and associated carbon dioxide emissions. The International Energy Outlook 2005 (IEO2005) presents an assessment by the Energy Information Administration (EIA) of the outlook for international energy markets through 2025. U.S. projections appearing in IEO2005 are consistent with those published in EIAÂ’s Annual Energy Outlook 2005 (AEO2005), which was prepared using the National Energy Modeling System (NEMS). Although the IEO typically uses the same reference case as the AEO, IEO2005 has adopted the October futures case from AEO2005 as its reference case for the United States. The October futures case, which has an assumption of higher world oil prices than the AEO2005 reference case, now appears to be a more likely projection. The reference case prices will be reconsidered for the next AEO. Based on information available as of July 2005, the AEO2006 reference case will likely reflect world oil prices higher than those in the IEO2005 reference case.

410

EIA - Forecasts and Analysis of Energy Data  

Gasoline and Diesel Fuel Update (EIA)

The International Energy Outlook 2005 (IEO2005) presents an assessment by the Energy Information Administration (EIA) of the outlook for international energy markets through 2025. U.S. projections appearing in IEO2005 are consistent with those published in EIA's Annual Energy Outlook 2005 (AEO2005), which was prepared using the National Energy Modeling System (NEMS). The International Energy Outlook 2005 (IEO2005) presents an assessment by the Energy Information Administration (EIA) of the outlook for international energy markets through 2025. U.S. projections appearing in IEO2005 are consistent with those published in EIA's Annual Energy Outlook 2005 (AEO2005), which was prepared using the National Energy Modeling System (NEMS). Table of Contents Projection Tables Reference Case High Economic Growth Case Low Economic Growth Case Reference Case Projections by End-Use Sector and Region Projections of Oil Production Capacity and Oil Production in Three Cases Projections of Nuclear Generating Capacity Highlights World Energy and Economic Outlook Outlook for World Energy Consumption World Economic Outlook Alternative Growth Cases

411

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance - as claimed by their authors. The study of this rec...

Peris-Lopez, Pedro; Tapiador, J M E; van der Lubbe, Jan C A

2009-01-01T23:59:59.000Z

412

Application of the NREL Test-to-Failure Protocol for PV Modules  

DOE Green Energy (OSTI)

Initial results of application of the NREL Test-to-Failure Protocol are presented and discussed. Six commercially available multicrystalline Si-cell flat-plate modules were subjected to the protocol with controls. The samples were divided among three test sequences, (1) 1000 hours of 85C/85% relative humidity with positive or negative 600 V bias to the active layers with respect to the grounded frame, (2) -40/85C thermal cycling with electrical load at the rated module power, and (3) an alternating sequence between tests (1) and (2). Application of the protocol manifested in the acceleration of degradation mechanisms seen in the field including backsheet delamination, corrosion, bubble formation within the laminate, discoloration of the antireflective coating, and localized heating with degradation of the backsheet as a result of moisture ingress, corrosion, and concentrated current flow. Significant differences in performance after one round of the protocol are seen in damp heat depending on the polarity of the bias applied to the active layer (the short-circuited power leads of the module). The protocol is found to successfully accelerate module degradation mechanisms that have been observed in the field and will help to differentiate the performance and reliability of various module technologies.

Hacke, P.; Osterwald, C.; Trudell, D.; Terwilliger, K.; Bosco, N.; Oelak, E.; Kurtz, S.

2011-02-01T23:59:59.000Z

413

Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses  

E-Print Network (OSTI)

Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols obtain larger rates over increased distance. In this paper we investigate limits to error rate and signal losses that can be tolerated by future protocols and proofs.

Marcos Curty; Norbert Lütkenhaus

2004-11-05T23:59:59.000Z

414

ITC Filing of Operational Protocols - August 9, 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ITC Filing of Operational Protocols - August 9, 2011 ITC Filing of Operational Protocols - August 9, 2011 ITC Filing of Operational Protocols - August 9, 2011 These supplemental comments complete ITC's response to the comments filed in this proceeding in March, 2009 by the Midwest Independent Transmission System Operator, Inc., and the Independent Electricity System Operator of Ontario. The operational agreements required to complete ITC's application in this case are attached to the supplemental comments, and ITC respectfully requests that the application be approved as promptly as possible. DOE_Docket_No_PP-230-4_8-9-2011_Public.pdf More Documents & Publications Application for Presidential permit OE Docket No. PP-230-4 International Transmission Company: Comments and Supplemental Documents Application for Presidential Permit OE Docket No. PP-230-4 International

415

V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

2: Cisco ASA Software TFTP Protocol Inspection Denial of 2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - 4:00am Addthis PROBLEM: A vulnerability has been reported in Cisco ASA Software, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x, Cisco Adaptive Security Appliance (ASA) 9.x, Cisco ASA 5500-X Series Adaptive Security Appliances ABSTRACT: The vulnerability is reported in versions 8.4(5.7), 8.4(6), 9.0(2.3), 9.1(1.5), and 9.1(2.1). Other versions may also be affected. REFERENCE LINKS: Secunia Advisory SA54699 CVE-2013-3463 Cisco (CSCuh13899) IMPACT ASSESSMENT: Low DISCUSSION: A vulnerability has been reported in Cisco ASA Software, which can be

416

Protocol assessment issues in low duty cycle sensor networks: The switching energy  

E-Print Network (OSTI)

Energy assessment of MAC protocols for wireless sensor networks is generally based on the times of transmit, receive and sleep modes. The switching energy between two consecutive states is generally considered negligible with respect to them. Although such an assumption is valid for traditional wireless ad hoc networks, is this assumption valid also for low duty cycle wireless sensor networks? The primary objective of this work is to shed some light on relationships between node switching energy and node duty cycle over the total energy consumption. In order to achieve the target, initially, we revisit the energy spent in each state and transitions of three widespread hardware platforms for wireless sensor networks by direct measurements on the EYES node. Successively, we apply the values obtained to the SMAC protocol by using the OmNet++ simulator. The main reason for using SMAC is that it is the protocol normally used as a benchmark against other architectures proposed.

A. G. Ruzzelli; P. Cotan; G. M. P. O’Hare; R. Tynan; P. J. M Havinga

2006-01-01T23:59:59.000Z

417

H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

as appropriate. Consider using in solicitations involving M&O as appropriate. Consider using in solicitations involving M&O contracts, management of major facilities, and any acquisition which could involve the direct or indirect purchase of Information Technology equipment that uses Internet Protocol (IP) technology. DOE-H-__ COMPLIANCE WITH INTERNET PROTOCOL VERSION 6 (IPV6) IN ACQUIRING INFORMATION TECHNOLOGY (JULY 2011) This contract involves the acquisition of Information Technology (IT) that uses Internet Protocol (IP) technology. The Contractor agrees that (1) all deliverables that involve IT that uses IP (products, services, software, etc.) comply with IPv6 standards and interoperate with both IPv6 and IPv4 systems and products; and (2) it has IPv6 technical support for fielded product management, development and

418

Architectural Support for an Efficient Implementation of a Software-Only Directory Cache Coherence Protocol  

E-Print Network (OSTI)

Software-only directory cache coherence protocols emulate directory management by handlers executed on the compute processor in shared-memory multiprocessors. While their potential lies in lower implementation cost and complexity than traditional hardware-only directory protocols, the miss penalty for cache misses induced by application data accesses as well as directory accesses is a critical issue to address. In this paper, we study important support mechanisms for software-only directory protocols in the context of a processor node organization for a cache-coherent NUMA architecture. We find that it is possible to remove or hide software handler latency for local as well as remote read misses by adopting simple hardware support mechanisms. To further reduce the overhead of software handler execution, we study the effects of directory data caching. While this could pollute the caches, our results suggest that this effect is marginal and that software handler execution over...

Håkan Grahn; Per Stenström

1995-01-01T23:59:59.000Z

419

Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project  

SciTech Connect

This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

1996-03-01T23:59:59.000Z

420

Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA  

E-Print Network (OSTI)

The IEEE 802.15.4 is a wireless standard introduced for low power, low cost wireless communication with moderate data rates. In the next few years, it is expected that Low Rate Wireless Personal Area Networks (LR-WPAN) will be used in a wide variety of embedded applications, including home automation, industrial sensing and control, environmental monitoring and sensing. In these applications, numerous embedded devices running on batteries are distributed in an area communicating via wireless radios. This work presents a method which can be used for comparing current consumption of wireless data transfer embedded systems. This paper implements a small subset of the IEEE 802.15.4 protocol to achieve a point to point communication. The implemented protocol uses 802.15.4 MAC compliant data and acknowledgment packets. Current consumption is measured while doing one data packet transmission. Measurements are compared with existing work. IEEE 802.15.4 protocol implementation is done using Verilog language. Code impl...

Bhat, Naagesh S

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

The behavior of Wireless Sensor Networks (WSN) is nowadays widely analyzed. One of the most important issues is related to their energy consumption, as this has a major impact on the network lifetime. Another important application requirement is to ensure data sensing synchronization, which leads to additional energy consumption as a high number of messages is sent and received at each node. Our proposal consists in implementing a combined synchronization protocol based on the IEEE 1588 standard that was designed for wired networks and the PBS (Pairwise Broadcast Synchronization) protocol that was designed for sensor networks, as none of them is able to provide the needed synchronization accuracy for our application on its own. The main goals of our new synchronization protocol are: to ensure the accuracy of local clocks up to a tenth of a microsecond and to provide an important energy saving. Our results obtained using NS-2 (Network Simulator) show that the performance of our solution (IEEE 1588-PBS) matches...

Albu, Roxana; Thierry, Gayraud; Pascal, Berthou

2010-01-01T23:59:59.000Z

422

Distillation Protocols for Mixed States of Multilevel Qubits and the Quantum Renormalization Group  

E-Print Network (OSTI)

We study several properties of distillation protocols to purify multilevel qubit states (qudits) when applied to a certain family of initial mixed bipartite states. We find that it is possible to use qudits states to increase the stability region obtained with the flow equations to distill qubits. In particular, for qutrits we get the phase diagram of the distillation process with a rich structure of fixed points. We investigate the large-$D$ limit of qudits protocols and find an analytical solution in the continuum limit. The general solution of the distillation recursion relations is presented in an appendix. We stress the notion of weight amplification for distillation protocols as opposed to the quantum amplitude amplification that appears in the Grover algorithm. Likewise, we investigate the relations between quantum distillation and quantum renormalization processes.

M. A. Martin-Delgado; M. Navascues

2003-01-20T23:59:59.000Z

423

Proton Beam Therapy for Hepatocellular Carcinoma: A Comparison of Three Treatment Protocols  

Science Conference Proceedings (OSTI)

Background: Our previous results for treatment of hepatocellular carcinoma (HCC) with proton beam therapy revealed excellent local control with low toxicity. Three protocols were used to avoid late complications such as gastrointestinal ulceration and bile duct stenosis. In this study, we examined the efficacy of these protocols. Methods and Materials: The subjects were 266 patients (273 HCCs) treated by proton beam therapy at University of Tsukuba between January 2001 and December 2007. Three treatment protocols (A, 66 GyE in 10 fractions; B, 72.6 GyE in 22 fractions; and C, 77 GyE in 35 fractions) were used, depending on the tumor location. Results: Of the 266 patients, 104, 95, and 60 patients were treated with protocols A, B, and C, respectively. Seven patients with double lesions underwent two different protocols. The overall survival rates after 1, 3 and 5 years were 87%, 61%, and 48%, respectively (median survival, 4.2 years). Multivariate analysis showed that better liver function, small clinical target volume, and no prior treatment (outside the irradiated field) were associated with good survival. The local control rates after 1, 3, and 5 years were 98%, 87%, and 81%, respectively. Multivariate analysis did not identify any factors associated with good local control. Conclusions: This study showed that proton beam therapy achieved good local control for HCC using each of three treatment protocols. This suggests that selection of treatment schedules based on tumor location may be used to reduce the risk of late toxicity and maintain good treatment efficacy.

Mizumoto, Masashi; Okumura, Toshiyuki; Hashimoto, Takayuki [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Fukuda, Kuniaki [Department of Gastroenterology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Oshiro, Yoshiko; Fukumitsu, Nobuyoshi [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Abei, Masato [Department of Gastroenterology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Kawaguchi, Atsushi [Biostatistics Center, Kurume University, Fukuoka (Japan); Hayashi, Yasutaka; Ookawa, Ayako; Hashii, Haruko; Kanemoto, Ayae [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Moritake, Takashi [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Tohno, Eriko [Department of Diagnostic Radiology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Tsuboi, Koji [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Sakae, Takeji [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Sakurai, Hideyuki, E-mail: hsakurai@pmrc.tsukuba.ac.jp [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan)

2011-11-15T23:59:59.000Z

424

Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans  

Energy.gov (U.S. Department of Energy (DOE))

Review protocol and lines of inquiry that are used as basis for technical review and approval of site-specific quality assurance programs.

425

A Comprehensive study of a New Multipath Energy Aware Routing Protocol for Mobile Ad-hoc Networks  

E-Print Network (OSTI)

Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in critical environments (e.g. battlefields, disaster areas, etc.) The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing) protocol uses a load distribution policy in order to maximize network lifetime. The simulation results have shown the efficiency of the proposed protocol in comparison to DSR routing protocol in many difficult scenarios

Chettibi, Saloua

2009-01-01T23:59:59.000Z

426

Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2  

SciTech Connect

This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated many questions on the performance and operational cost of these buildings.

Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.; Rauch, Emily M.; Hathaway, John E.; Solana, Amy E.

2009-03-27T23:59:59.000Z

427

Modelling the Delay Distribution of Binary Spray and Wait Routing Protocol  

E-Print Network (OSTI)

This article proposes a stochastic model to obtain the end-to-end delay law between two nodes of a Delay Tolerant Network (DTN). We focus on the commonly used Binary Spray and Wait (BSW) routing protocol and propose a model that can be applied to homogeneous or heterogeneous networks (i.e. when the inter-contact law parameter takes one or several values). To the best of our knowledge, this is the first model allowing to estimate the delay distribution of Binary Spray and Wait DTN protocol in heterogeneous networks. We first detail the model and propose a set of simulations to validate the theoretical results.

Diana, Rémi

2011-01-01T23:59:59.000Z

428

Extending WS-Security to Implement Security Protocols for Web Services  

E-Print Network (OSTI)

Web services use tokens provided by the WS-Security standard to implement security protocols. We propose several extensions to the WS-Security standard, including name types, key and random number extensions. The extensions are used to implement existing protocols such as ISO9798, Kerberos or BAN-Lowe. The advantages of using these implementations rather than the existing, binary ones, are inherited from the advantages of using Web service technologies, such as extensibility and end-to-end security across multiple environments that do not support a connection-based communication.

Bela, Genge

2009-01-01T23:59:59.000Z

429

Measurement Protocol for GEC, ERF, and CUE | ENERGY STAR Buildings & Plants  

NLE Websites -- All DOE Office Websites (Extended Search)

Measurement Protocol for GEC, ERF, and CUE Measurement Protocol for GEC, ERF, and CUE Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources Success stories

430

Measurement Protocols for PUE and Updates on the Development of Other  

NLE Websites -- All DOE Office Websites (Extended Search)

Measurement Protocols for PUE and Updates on the Development of Measurement Protocols for PUE and Updates on the Development of Other Metrics, February 28, 2011 Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports

431

Research on memory access vulnerability analysis technique in SCADA protocol implementation  

Science Conference Proceedings (OSTI)

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA ... Keywords: SCADA protocol implementation, dynamic analysis, memory access vulnerability

Fang Lan; Wang Chunlei; He Ronghui

2010-07-01T23:59:59.000Z

432

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network (OSTI)

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money ...

Lutomirski, Andrew Michael

433

Performance Test Protocol for Evaluating Inverters Used in Grid-Connected  

E-Print Network (OSTI)

Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems....................................................................................................................................... 36 A1 Simplified Photovoltaic I-V Curve Model Inverters Used in Grid-Connected Photovoltaic Systems 1 Overview One measure of the maturity of an industry

434

Timer-based composition of fault-containing self-stabilizing protocols  

Science Conference Proceedings (OSTI)

One of the desired properties of distributed systems is self-adaptability against faults. Self-stabilizing protocols provide autonomous recovery from any finite number of transient faults. However, in practice, catastrophic faults rarely occur, while ... Keywords: Distributed system, Fault tolerance, Fault-containment, Hierarchical composition, Self-adaptability, Self-stabilization, Synchronizer, Timer

Yukiko Yamauchi; Sayaka Kamei; Fukuhito Ooshita; Yoshiaki Katayama; Hirotsugu Kakugawa; Toshimitsu Masuzawa

2010-05-01T23:59:59.000Z

435

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

436

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Perrig, Adrian

437

Design and Performance Evaluation of an Hybrid Reservation-Polling MAC Protocol for Power-Line  

E-Print Network (OSTI)

Units) in a low-voltage power grid, share the transmission capacity of the power-line network. To make of data. Since wires exist to every household connected to the low-voltage grid, PLC systems can provideDesign and Performance Evaluation of an Hybrid Reservation-Polling MAC Protocol for Power-Line

Tinnirello, Ilenia

438

CareVis: Integrated visualization of computerized protocols and temporal patient data  

Science Conference Proceedings (OSTI)

Objective: Currently, visualization support for patient data analysis is mostly limited to the representation of directly measured data. Contextual information on performed treatment steps is an important source to find reasons and explanations for certain ... Keywords: Clinical guidelines, Information visualization, Patient data, Protocol-based care, Temporal uncertainties, Treatment plans, User-centered design

Wolfgang Aigner; Silvia Miksch

2006-07-01T23:59:59.000Z

439

An optimal k-exclusion real-time locking protocol motivated by multi-GPU systems  

Science Conference Proceedings (OSTI)

Graphics processing units (GPUs) are becoming increasingly important in today's platforms as their growing generality allows for them to be used as powerful co-processors. In previous work, the authors showed that GPUs may be integrated into real-time ... Keywords: GPGPU, Global scheduling, Real-time systems, Semaphore protocols

Glenn A. Elliott; James H. Anderson

2013-03-01T23:59:59.000Z

440

Study of Heart and Renal Protection (SHARP) Final Protocol (Version 5: 12th  

E-Print Network (OSTI)

1 Study of Heart and Renal Protection (SHARP) Final Protocol (Version 5: 12th July 2005) DOES with pre-existing coronary heart disease, large-scale randomized trials have demonstrated that lowering LDL, arrhythmia, and heart failure) may not be as dependent on cholesterol levels. Finally, the long-term safety

Johnston, Michael

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Energy-efficient neighbor discovery protocol for mobile wireless sensor networks  

Science Conference Proceedings (OSTI)

Low energy consumption is a critical design requirement for most wireless sensor network (WSN) applications. Due to minimal transmission power levels, time-varying environmental factors and mobility of nodes, network neighborhood changes frequently. ... Keywords: Algorithm/protocol design and analysis, Low power design, Mobile computing, Wireless sensor networks

Mikko Kohvakka; Jukka Suhonen; Mauri Kuorilehto; Ville Kaseva; Marko Hännikäinen; Timo D. Hämäläinen

2009-01-01T23:59:59.000Z

442

Probabilistic DCS: An RFID reader-to-reader anti-collision protocol  

Science Conference Proceedings (OSTI)

The wide adoption of radio frequency identification (RFID) for applications requiring a large number of tags and readers makes critical the reader-to-reader collision problem. Various anti-collision protocols have been proposed, but the majority require ... Keywords: RFID, Reader-to-reader collision

Filippo Gandino; Renato Ferrero; Bartolomeo Montrucchio; Maurizio Rebaudengo

2011-05-01T23:59:59.000Z

443

Implementing Network File System Protocol for Highly Available Clustered Applications on Network Attached Storage  

Science Conference Proceedings (OSTI)

This paper introduces method for implementing NFS protocol for larger block/network packets transfer over to NAS [Network Attached Storage] from Highly Available clients. NAS storage scalability is habitually inadequate to the volume of the appliance. ... Keywords: NAS, NFS, RPC, RAID

K. J. Latesh Kumar

2013-09-01T23:59:59.000Z

444

Optimization of application QoS protocols for 3G/4G mobile networks  

Science Conference Proceedings (OSTI)

The importance of Quality of Service (QoS) provisioning has become one of the central issues of 3G/4G mobile network design and analysis. Mobile multimedia applications have high demands in terms of available network resources, equipment design and QoS ... Keywords: application, mobile networks, optimization, performance evaluation, protocols, quality of service

Gordana Gardaševic; Milojko Jevtovic; Philip Constantinou

2008-09-01T23:59:59.000Z

445

On performance evaluation of handling streaming traffic in IP networks using TFRC protocol  

Science Conference Proceedings (OSTI)

This paper deals with the performance evaluation of handling streaming traffic in IP best effort networks using TFRC protocol. In our studies we check and discuss an influence of video on demand traffic and different network conditions on TFRC congestion ... Keywords: IP network, TCP-friendly, best-effort, video on demand

Kacper Kurowski; Halina Tarasiuk

2008-05-01T23:59:59.000Z

446

Performance evaluation of low energy adaptive clustering hierarchy protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

Clustering of sensor nodes is an effective technique for achieving prolonged network lifetime, scalability, and load balancing. This paper focuses on the performance evaluation of the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol that can ... Keywords: clustering, energy consumption, network lifetime, wireless sensor networks

D. A. Vidhate; A. K. Patil; S. S. Pophale

2010-02-01T23:59:59.000Z

447

Demonstration Abstract: WARP A Flexible Platform for Clean-Slate Wireless Medium Access Protocol Design  

E-Print Network (OSTI)

Demonstration Abstract: WARP ­ A Flexible Platform for Clean-Slate Wireless Medium Access Protocol University Wireless Open-Access Research Platform (WARP) provides a high performance research tool for clean-slate provides a general environment for a clean-slate MAC/PHY de- velopment unlike other platforms which rely

Knightly, Edward W.

448

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

449

An incrementally deployable energy efficient 802.15.4 MAC protocol (DEEP)  

Science Conference Proceedings (OSTI)

The IEEE 802.15.4 is a standard that specifies the physical layer and media access control for low data rate wireless personal area networks (WPANs). The standard is intended to provide connectivity to mobile devices with storage, energy, and communication ... Keywords: Backward compatible, Energy efficiency, IEEE 802.15.4, MAC protocols, Sensor networks

Marco Valero; Sang Shin Jung; Anu G. Bourgeois; Raheem Beyah

2012-09-01T23:59:59.000Z

450

An energy-efficient, transport-controlled MAC protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks (WSNs), one major cause of wasted energy is that the wireless network interface is always on to accept possible traffic. Many medium access control (MAC) protocols therefore adopted a periodic listen-and-sleep scheme to save ... Keywords: Congestion control, Medium access control, Transport control, Wireless sensor network

Jaesub Kim; Kyu Ho Park

2009-07-01T23:59:59.000Z

451

Coverage preserved optimal routing protocol for improving the quality of service in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor network, there are many hurdles takes place in providing quality of service routing to a desired level. The majority of routing protocols in wireless sensor networks concentrates only on energy efficiency as a prime factor, and only ... Keywords: cluster-head, coverage, energy efficiency, lifetime, multi-path routing, quality of service, self-scheduling

B. Paramasivan; K. Mohaideen Pitchai; D. Usha; S. Radha Krishnan

2009-11-01T23:59:59.000Z

452

Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final [report  

Science Conference Proceedings (OSTI)

Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards.

Not Available

1993-09-01T23:59:59.000Z

453

EECHE: energy-efficient cluster head election protocol for heterogeneous wireless sensor networks  

Science Conference Proceedings (OSTI)

A wireless sensor network with a large number of tiny sensor nodes can be used as an effective tool for gathering data in various situations. One of the major issues in wireless sensor network is developing an energy-efficient routing protocol which ... Keywords: clustering, energy efficient, heterogeneous, lifetime, sensor networks

Dilip Kumar; T. C. Aseri; R. B Patel

2009-01-01T23:59:59.000Z

454

Doses delivered to normal brain under different treatment protocols at Brookhaven National Laboratory  

SciTech Connect

As of October 31, 1996, 23 glioblastoma multiforme patients underwent BNCT under several treatment protocols at the Brookhaven Medical Research Reactor. For treatment planning and dosimetry purposes, these protocols may be divided into four groups. The first group comprises protocols that used an 8-cm collimator and allowed a peak normal brain dose of 10.5 Gy-Eq to avolume of 1 cm{sup 3} were the thermal neutron flux was maximal (even if it happened to be in the tumor volume). The second group differs from the first in that it allowed a peak normal brain dose of 12.6 Gy-Eq. The protocols of the third and fourth groups allowed the prescribed peak normal brain dose of 12.6 Gy-Eq to be outside of the tumor volume, used a 12-cm collimator and, respectively, uni- or bilateral irradiations. We describe the treatment planning procedures and report the doses delivered to various structures of the brain.

Capala, J.; Coderre, J.A.; Liu, H.B. [and others

1996-12-31T23:59:59.000Z

455

Test Protocol for System Compatibility of Single-Phase Battery Chargers for Electric Vehicles (SC-320)  

Science Conference Proceedings (OSTI)

This document defines procedures for performing comparisons of 240 V, single-phase residential battery chargers suitable for charging electric vehicles. The protocol describes methods for evaluating the charging characteristics, response to supply-side voltage variations, effects on supply-side power quality, and protection features of these charging devices.

1997-02-03T23:59:59.000Z

456

Test Protocol for System Compatibility of Three-Phase Battery Chargers for Electric Vehicles (SC-330)  

Science Conference Proceedings (OSTI)

This document defines procedures for performing comparisons of 480 V, three-phase battery chargers suitable for charging electric vehicles (EVs). The protocol describes methods for evaluating the charging characteristics, response to supply-side voltage variations, effects on supply-side power quality, and protection features of these charging devices.

1997-02-03T23:59:59.000Z

457

Advanced overview of version 2.0 of the open archives initiative protocol for metadata harvesting  

Science Conference Proceedings (OSTI)

This tutorial is a follow-on to "Introduction to the Open Archives Initiative Protocol for Metadata Harvesting" (OAI-PMH), given earlier the same day. It is appropriate for those who have completed the earlier tutorial or are already familiar with OAI-PMH. ... Keywords: OAI, OAI-PMH, harvesting, interoperability, metadata

Michael L. Nelson; Herbert Van de Sompel; Simeon Warner

2002-07-01T23:59:59.000Z

458

A new mobile state protocol for Distributed Oz M. Hadim & P. Van Roy  

E-Print Network (OSTI)

protocol uses a home­based scheme [14]. Each cell is associated with a fixed site, termed as its home site and manages the cell access. Home­based schemes are simple and easy to imple­ ment. They have been observed

Bonaventure, Olivier

459

Using network interface support to avoid asynchronous protocol processing in shared virtual memory systems  

Science Conference Proceedings (OSTI)

The performance of page-based software shared virtual memory (SVM) is still far from that achieved on hardware-coherent distributed shared memory (DSM) systems. The interrupt cost for asynchronous protocol processing has been found to be a key source ...

Angelos Bilas; Cheng Liao; Jaswinder Pal Singh

1999-05-01T23:59:59.000Z

460

An Intelligent Evaluation Model Based on the LEACH Protocol in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

This paper aims to introduce some key parameters for the tracking application in wireless sensor networks. In this work the LEACH protocol with J-sim simulation tool has been implemented, and consequently some useful trade-off analysis results among ... Keywords: J-sim, LEACH, EDCR, Evaluation Model

Ning Cao; Russell Higgs; Gregory M. P. O'Hare

2012-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Achievable throughput and service delay for imperfect cooperative retransmission MAC protocols  

Science Conference Proceedings (OSTI)

Cooperative retransmission medium access control protocols may be used in a cellular uplink setting to achieve a higher throughput than, say, slotted Aloha, while retaining the advantages of random channel access. When multiple nodes contend for channel ... Keywords: aloha, cooperative retransmission, medium access control

Steven Weber; Ananth V. Kini; Athina P. Petropulu

2008-10-01T23:59:59.000Z

462

An evolutionary framework for routing protocol analysis in wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless Sensor Networks (WSNs) are widely adopted for applications ranging from surveillance to environmental monitoring. While powerful and relatively inexpensive, they are subject to behavioural faults which make them unreliable. Due to the complex ... Keywords: anomaly detection, evolutionary algorithms, network efficiency, routing protocols, wireless sensor networks

Doina Bucur; Giovanni Iacca; Giovanni Squillero; Alberto Tonda

2013-04-01T23:59:59.000Z

463

An extensive study of slotted Aloha-based RFID anti-collision protocols  

Science Conference Proceedings (OSTI)

Radio frequency identification (RFID) is used to identify, track, and manage tagged animate or inanimate objects automatically using wireless communication technology. A serious concern faced by RFID technology is the collisions that occur among tag ... Keywords: Anti-collision protocols, EPCGlobal Class 1 Gen 2, Performance evaluation, RFID, Slotted Aloha

Vinod Namboodiri; Maheesha Desilva; Kavindya Deegala; Suresh Ramamoorthy

2012-09-01T23:59:59.000Z

464

The Internet of Things: Key Applications and Protocols, 2nd edition  

Science Conference Proceedings (OSTI)

An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the ...

Olivier Hersent; David Boswarthick; Omar Elloumi

2012-02-01T23:59:59.000Z

465

IP Telephony: Deploying VoIP Protocols and IMS Infrastructure, 2nd edition  

Science Conference Proceedings (OSTI)

All you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructureThis book provides a comprehensive and practical overview of the technology behind Internet ...

Olivier Hersent

2010-12-01T23:59:59.000Z

466

An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks  

Science Conference Proceedings (OSTI)

Primitive routing protocols for ad-hoc networks are ''power hungry'' and can therefore consume considerable amount of the limited amount of battery power resident in the nodes. Thus, routing in ad-hoc networks is very much energy-constrained. Continuous ... Keywords: Ad-hoc networks, Ant colony optimization, Energy-efficiency, Performance evaluation, Routing, Simulation

Sudip Misra; Sanjay K. Dhurandher; Mohammad S. Obaidat; Pushkar Gupta; Karan Verma; Prayag Narula

2010-11-01T23:59:59.000Z

467

Protocols for Monitoring Habitat Restoration Projects in the Lower Columbia River and Estuary  

SciTech Connect

Protocols for monitoring salmon habitat restoration projects are essential for the U.S. Army Corps of Engineers' environmental efforts in the Columbia River estuary. This manual provides state-of-the science data collection and analysis methods for landscape features, water quality, and fish species composition, among others.

Roegner, G. Curtis; Diefenderfer, Heida L.; Borde, Amy B.; Thom, Ronald M.; Dawley, Earl M.; Whiting, Allan H.; Zimmerman, Shon A.; Johnson, Gary E.

2008-04-25T23:59:59.000Z

468

A Scalable and Reliable Multicast Routing Protocol for Ad-hoc Wireless Networks  

Science Conference Proceedings (OSTI)

Multicasting is an essential service for ad-hoc wireless networks. In a multicasting environment with multiple senders, receivers or meeting members, traditional multicast routing protocols must pay great overhead for multiple multicast sessions. This ... Keywords: ad-hoc wireless networks, clustering, multicasting, routing, virtual backbone

C. R. Dow; J. H. Lin; K. T. Chen; S. C. Chen; S. F. Hwang

2005-09-01T23:59:59.000Z

469

Voice over Internet Protocol (VoIP) : the dynamics of technology and regulation  

E-Print Network (OSTI)

"What Voice over Internet Protocol (VoIP) is going to do is start to weaken the foundation of the way we've done things for 100 years...Congress already should be discussing the next telecom bill," said Federal Communications ...

Vaishnav, Chintan

2006-01-01T23:59:59.000Z

470

Modeling and Analyzing the Implementation of Latency-Insensitive Protocols Using the Polychrony Framework  

Science Conference Proceedings (OSTI)

As Globally Asynchronous and Locally Synchronous (GALS) based System-on-chip (SoC) are gaining importance, a special case of GALS when the global clocking is preserved, but the interconnect delays of multiple clock cycles are to be tolerated has also ... Keywords: SIGNAL language, clock hierarchy, endochrony, isochrony, latency-insensitive protocols, synchronous data flow graph

Bin Xue; Sandeep K. Shukla

2009-08-01T23:59:59.000Z

471

Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data  

E-Print Network (OSTI)

collisions are expensive in terms of latency and wasted bandwidth, (b) the load profiles which are triggeredAnalysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive for MAC performance analysis [1], [2], [3], (c) the maximum propagation delay could be potentially very

Roy, Sumit

472

Position-based cluster routing protocol for mobile ad hoc networks  

Science Conference Proceedings (OSTI)

Some of the proposed mobile ad hoc network routing algorithms require maintaining a global network state at each node. The global state is always an approximation of the current network state due to the non-negligible delay of propagating local state. ... Keywords: GPS, QoS, mobile ad hoc network, multicasting, position-based routing protocol

Chao-Cheng Shih; Tzay-Farn Shih

2006-07-01T23:59:59.000Z

473

Location-aware routing protocol with dynamic adaptation of request zone for mobile ad hoc networks  

Science Conference Proceedings (OSTI)

One possibility direction to assist routing in Mobile Ad Hoc Network (MANET) is to use geographical location information provided by positioning devices such as global positioning systems (GPS). Instead of searching the route in the entire network blindly, ... Keywords: GPS, MANET, location-aware, position-based, routing protocol

Tzay-Farn Shih; Hsu-Chun Yen

2008-06-01T23:59:59.000Z

474

Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

475

BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection  

Science Conference Proceedings (OSTI)

Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of the current botnet detection approaches work only on specific botnet command and control (C&C) protocols ...

Guofei Gu; Roberto Perdisci; Junjie Zhang; Wenke Lee

2008-07-01T23:59:59.000Z

476

A Novel Adaptive Home Migration Protocol in Home-based DSM  

E-Print Network (OSTI)

Home migration is used to tackle the home assignment problem in home-based software distributed shared memory systems. We propose an adaptive home migration protocol to optimize the single-writer pattern which occurs frequently in distributed applications. Our approach is unique in its use of a per-object threshold which is continuously adjusted to facilitate home migration decisions. This adaptive threshold is monotonously decreasing with increased likelihood that a particular object exhibits a lasting single-writer pattern. The threshold is tuned according to the feedback of previous home migration decisions at runtime. We implement this new adaptive home migration protocol in a distributed Java Virtual Machine that supports truly parallel execution of multi-threaded Java applications on clusters. The analysis and the experiments show that our new home migration protocol demonstrates both the sensitivity to the lasting single-writer pattern and the robustness against the transient single-writer pattern. In the latter case, the protocol inhibits home migration in order to reduce the home redirection overhead.

Weijian Fang Cho-Li; Cho-li Wang; Wenzhang Zhu; Francis C. M. Lau

2004-01-01T23:59:59.000Z

477

State of the art in protocol research for underwater acoustic sensor networks  

E-Print Network (OSTI)

Underwater networks of sensors have the potential to enable unexplored applications and to enhance our ability to observe and predict the ocean. In this paper, architectures for twodimensional and three-dimensional underwater sensor networks are proposed. A detailed overview on the current solutions for medium access control, network, and transport layer protocols is given and open research issues are discussed. I.

Ian F. Akyildiz; Dario Pompili; Tommaso Melodia

2007-01-01T23:59:59.000Z

478

State-of-the-art in protocol research for underwater acoustic sensor networks  

E-Print Network (OSTI)

In this paper, architectures for two-dimensional and three-dimensional underwater sensor networks are discussed. A detailed overview on the current solutions for medium access control, network, and transport layer protocols are given and open research issues are discussed. Categories and Subject Descriptors:

Ian F. Akyildiz; Dario Pompili; Tommaso Melodia

2006-01-01T23:59:59.000Z

479

On the Security of the Y-00 (AlphaEta) Direct Encryption Protocol  

E-Print Network (OSTI)

We review the current status of the AlphaEta direct encryption protocol. After describing AlphaEta, we summarize the main security claims made on it. We then describe recent attacks developed against it in the literature, and suggest security enhancements and future research directions based on our results.

Ranjith Nair; Horace P. Yuen

2007-02-09T23:59:59.000Z

480

Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions  

Science Conference Proceedings (OSTI)

Swarm intelligence is a relatively novel field. It addresses the study of the collective behaviors of systems made by many components that coordinate using decentralized controls and self-organization. A large part of the research in swarm intelligence ... Keywords: Ant colony routing, Bee-inspired routing, Routing protocols, Swarm intelligence, Wireless sensor networks

Muhammad Saleem; Gianni A. Di Caro; Muddassar Farooq

2011-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "ieo2005 kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Appendix to ISAB and ISRP Review of the Salmonid Field Protocols Handbook (ISAB&ISRP 2007-5)  

E-Print Network (OSTI)

Appendix to ISAB and ISRP Review of the Salmonid Field Protocols Handbook (ISAB&ISRP 2007-5) Specific Comments on Handbook Sections and Field Protocols Comments are given under the titles of the respective chapters, as outlined below. The page on which each chapter starts in the Handbook is also

482

A new busy signal-based MAC protocol supporting QoS for ad-hoc networks with hidden nodes  

Science Conference Proceedings (OSTI)

This article presents three versions of a novel MAC protocol for IEEE 802.11 ad-hoc networks called Busy Signal-based Mechanism turned On (BusySiMOn) (This is an extended version of our conference paper: [15]). The key idea of the proposed solution is ... Keywords: EDCA, Hidden nodes, MAC protocol, QoS, Wireless communications

Katarzyna Kosek-Szott; Marek Natkaniec; Andrzej R. Pach

2013-08-01T23:59:59.000Z

483

QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks  

Science Conference Proceedings (OSTI)

QoS (Quality of Service) guarantee is highly desirable for many service-oriented computer and network applications on the Internet. This paper focuses on the timeliness aspect of QoS, especially the end-to-end delay guarantee. Resource reSerVation Protocol ... Keywords: Quality of Service, end-to-end delay, network simulation, reservation and service protocol

Nong Ye; Xiaoyun Xu; Patrick Hurley

2008-12-01T23:59:59.000Z

484

A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks  

E-Print Network (OSTI)

Conserving power in mobile ad-hoc and sensor networks is a big challenge. Most of the nodes in these networks, in general, are battery powered, therefore, an efficient power saving protocol is required to extend the lifetime of such networks. A lot of work has been done and several protocols have been proposed to address this problem. Gossip based protocols, which are based on the results of percolation theory, significantly reduce power consumption with very little implementation overhead. However, not much work has been done to make gossiping battery aware. In this paper we introduce a simple gossip based battery aware sleep protocol. The protocol allows low battery nodes to sleep more, therefore, improves overall network lifetime.

Shukla, Ashish

2010-01-01T23:59:59.000Z

485

Publ. RIMS, Kyoto Univ. ** (2004), 000--000  

E-Print Network (OSTI)

on the Euclidean spaces (see [2, 4, 35, 38, 49] etc. for details). Thus, it is natural and important to search \\Gamma1 (t) t if h(C 3 R(x; y)) Ÿ t: (NLE(h)) ffl For A ae X, let TA be the first exit time from A, i) (E ; F) satisfies (UV D). (2) (E ; F) satisfies (UE(h)) and (NLE(h)). If we further assume

Kumagai, Takashi

486

Developing country effects of Kyoto-type emissions restrictions  

E-Print Network (OSTI)

Economic links among countries, through trade, will cause the effects of greenhouse-gas control measures taken by one set of nations to ripple through the international trade system, affecting countries that may not have ...

Babiker, Mustafa H.M.; Jacoby, Henry D.

487

Ris-R-1405(EN) Energy Technologies for Post Kyoto  

E-Print Network (OSTI)

separation membranes - increasing CO2 concentrations · storage of CO2 - storage capacities and techniques

488

Kyoto - End-Use Energy Demand (Residential & Commercial)  

U.S. Energy Information Administration (EIA)

... the convenience of natural gas heating and the decline in real oil and gas prices over the past decade have led many ... (compact fluorescent ...

489

The Kyoto-Marrakech System: a Strategic Assessment  

E-Print Network (OSTI)

of climate policy is a `widespread consensus' on the existing energy efficiency of the economy, characterised regions there is a common set of policy preferences from the emissions intensive and energy intensive, the American Council for an Energy Efficient Economy and the US Council for Energy Alternatives. Think tanks

490

2 Research Activities 2012 Kyoto, the University and the City  

E-Print Network (OSTI)

. Development of the first hydroelectric power plant and trams as well as Japan's first industrial exposition

Takada, Shoji

491

2 Research Activities 2012 Kyoto, the University and the City  

E-Print Network (OSTI)

first kindergarten and first public library. It also had the nation's first hydroelectric power plant

Takada, Shoji

492

2 Research Activities 2012 Kyoto: The University and the City  

E-Print Network (OSTI)

first kindergarten and first public library. It also had the nation's first hydroelectric power plant

Takada, Shoji

493

APS Protocols for Handling, Storage, and Disposal of Untreated Foreign Soil  

NLE Websites -- All DOE Office Websites (Extended Search)

APS Protocols for Handling, Storage, and Disposal of Untreated Foreign Soil APS Protocols for Handling, Storage, and Disposal of Untreated Foreign Soil and Regulated Domestic Soil Arrival of New Samples: Unpack shipping containers. Treat any ice/melted water immediately. Decontaminate any "blue ice" packets with 70% ethyl alcohol. Collect any loose soil from container and heat-treat immediately. Immediately decontaminate shipping containers. Heat-treat wooden, metal, or cardboard shipping containers (using lowest heat). Treat plastic containers and coolers with 70% ethyl alcohol. Storage of Samples: Store dry samples in the locked storage cabinet in Room 431Z021 until they can be delivered to the appropriate beamline for analysis. Label containers with origin and arrival date. Log samples into the APS Soil Inventory book maintained in 431Z021.

494

ESS 2012 Peer Review - Protocol for Measuring and Expressing Performance for ESS - Vilayanur Viswanathan, PNNL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol for Measuring and Expressing Protocol for Measuring and Expressing Performance for Energy Storage Systems D. Conover, V. Viswanathan, K. Bray and M. Kintner-Meyer (Pacific Northwest National Laboratory) D. Schoenwald, D. Rose, and S. Ferreira (Sandia National Laboratory) September 28, 2012 USDOE-OE ESS Peer Review Washington, DC Dr. Imre Gyuk - Energy Storage Program Manager, Office of Electricity Delivery and Energy Reliability Problem Statement The energy storage market is expanding, with a variety of storage technologies available The lack of a uniform way to evaluate energy storage system (ESS) performance is causing confusion in the market Without an accepted basis for comparing ESS performance, the application and use of storage technology will be hampered

495

Testing Protocols and Results: Airport Sound Program Experience and BPI-Resnet Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Testing Protocols & Results: Testing Protocols & Results: Airport Sound Program Experience and BPI/RESNET Development Spring 2012 Residential Energy Efficiency Stakeholder Meeting: Combustion Safety in Tight Houses Jim Fitzgerald Center for Energy and Environment Building Performance Institute Page 2  Weatherization, custom windows & central air conditioning  Attic insulation, wall insulation, and attic air sealing - borrowed specs from energy programs and used weatherization contractors  Average house leakage: 7.8 ACH50 before 5.4 ACH50 after MSP secret: this Airport Sound Program does weatherization work to reduce sound All Tightening of Existing Homes Can Affect Combustion Appliance Safety Tightening work was done on 3000 homes with no testing, what could possibly go wrong?

496

Cactus and Visapult: A case study of ultra-high performance distributed visualization using connectionless protocols  

SciTech Connect

This past decade has seen rapid growth in the size, resolution, and complexity of Grand Challenge simulation codes. Many such problems still require interactive visualization tools to make sense of multi-terabyte data stores. Visapult is a parallel volume rendering tool that employs distributed components, latency tolerant algorithms, and high performance network I/O for effective remote visualization of massive datasets. In this paper we discuss using connectionless protocols to accelerate Visapult network I/O and interfacing Visapult to the Cactus General Relativity code to enable scalable remote monitoring and steering capabilities. With these modifications, network utilization has moved from 25 percent of line-rate using tuned multi-streamed TCP to sustaining 88 percent of line rate using the new UDP-based transport protocol.

Shalf, John; Bethel, E. Wes

2002-05-07T23:59:59.000Z

497

Performance of Quantum Key Distribution Protocol with Dual-Rail Displaced Photon States  

E-Print Network (OSTI)

We propose a scheme for quantum key distribution (QKD) protocol with dual-rail displaced photon states. Displaced single photon states carry bit value of code which may be extracted while coherent states carry nothing and they only provide inconclusive outcome. Developed QKD protocol works with experimental attendant noise to observe presence of malicious Eve. Pulses with large amplitudes unlike conventional QKD relying on faint laser pulses are used that may approximate it to standard telecommunication communication and may show resistance to eavesdropping even in settings with high attenuation. Information leakage to the eavesdropper is determined from comparison of output distribution of the outcomes with ideal one that is defined by two additional inaccessible to nobody, saving for who sends the pulses, parameters. Robustness to some possible eavesdropping attacks is shown.

Sergey A. Podoshvedov

2009-05-13T23:59:59.000Z

498

Un protocole de routage \\`a basse consommation d'\\'energie pour les MANETs  

E-Print Network (OSTI)

Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in critical environments (e.g. battlefields, disaster areas, etc.). Energy consumption was considered for a long time equivalent to bandwidth consumption. However, recent works have shown that "energy" and "bandwidth" are substantially different metrics. Moreover, it was found that traditional routing policies such as "the shortest path" one can have a negative impact on energy consumption balance. Therefore, several new approaches have been proposed addressing energy efficiency explicitly. Our work is related to energy efficient routing for MANETs' problem. The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing) protocol is based on a load sharing strategy between mobile nodes in order to maximize network lifetime. To achieve this goal, we used mult...

Chettibi, Saloua

2009-01-01T23:59:59.000Z

499

On-chip COMA cache-coherence protocol for microgrids of microthreaded cores  

E-Print Network (OSTI)

This paper describes an on-chip COMA cache coherency protocol to support the microthread model of concurrent program composition. The model gives a sound basis for building multi-core computers as it captures concurrency, abstracts communication and identifies resources, such as processor groups explicitly and where mapping and scheduling is performed dynamically. The result is a model where binary compatibility is guaranteed over arbitrary numbers of cores and where backward binary compatibility is also assured. We present the design of a memory system with relaxed synchronisation and consistency constraints that matches the characteristics of this model. We exploit an on-chip COMA organisation, which provides a flexible and transparent partitioning between processors and memory. This paper describes the coherency protocol and consistency model and describes work undertaken on the validation of the model and the development of a co-simulator to the Microgrid CMP emulator. 1

Li Zhang; Chris Jesshope

2007-01-01T23:59:59.000Z

500

Field Test Protocol: Standard Internal Load Generation in Unoccupied Test Homes  

Science Conference Proceedings (OSTI)

This document describes a simple and general way to generate House Simulation Protocol (HSP)-consistent internal sensible and latent loads in unoccupied homes. It is newly updated based on recent experience, and provides instructions on how to calculate and set up the operational profiles in unoccupied homes. The document is split into two sections: how to calculate the internal load magnitude and schedule, and then what tools and methods should be used to generate those internal loads to achieve research goals.

Fang, X.; Christensen, D.; Barker, G.; Hancock, E.

2011-06-01T23:59:59.000Z