National Library of Energy BETA

Sample records for information outlines key

  1. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  2. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  3. Solar Energy Plan of Development Outline | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing Capacity forSilicium deEnergy InformationDepot IncHome JumpLLCPlan of

  4. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  5. ABILITYguidance information advice key dates ENGINEERING

    E-Print Network [OSTI]

    Grant, P. W.

    from us, career advice, and useful information on planning your future career whilst at university Department for a Power and Water Utility Company Mechanical Engineering graduate PLANNING YOUR CAREER like to develop their own business. Support is provided with business planning, company registration

  6. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  7. The 2012 General Assembly has ratified HB 950--the state Budget Bill for FY13. Section 25 of the Budget Bill outlines most of the key changes to salaries and benefits, which are summarized below.

    E-Print Network [OSTI]

    Gopalakrishnan, K.

    of the Budget Bill outlines most of the key changes to salaries and benefits, which are summarized below. 1.2% Legislative Salary Increase I. EPA (Faculty and Non-Faculty Employees Exempt from the State Personnel Act) Salary increase guidelines for EPA employees will be approved at the August 10 th meeting of the UNC

  8. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  9. BUFFERED WELL FIELD OUTLINES

    U.S. Energy Information Administration (EIA) Indexed Site

    OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS The VBA Code below builds oil & gas field boundary outlines (polygons) from buffered wells (points). Input well points layer must be a...

  10. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  11. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  12. FOI Key message 22/12/04 The Freedom of Information (Scotland) Act 2002

    E-Print Network [OSTI]

    Painter, Kevin

    The Freedom of Information (Scotland) Act, 2002, (FOI) provides important new rights of access to information from the University FOI co-ordinator. There are limited exemptions from the right to access informationFOI Key message 22/12/04 The Freedom of Information (Scotland) Act 2002 What everyone needs to know

  13. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  14. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  15. Key words Science of information, spatio-temporal, semantic and structural information, Darwin channel, noisy constrained capacity.

    E-Print Network [OSTI]

    Szpankowski, Wojciech

    Key words ­ Science of information, spatio-temporal, semantic and structural information, Darwin W. Lafayette, IN 47907, U.S.A. spa@cs.purdue.edu FACETS OF INFORMATION IN COMMUNICATIONS Abstract Information permeates every corner of our lives and shapes our universe. Understand- ing and harnessing

  16. COURSE OUTLINE 1. Calendar Information

    E-Print Network [OSTI]

    Course Coordinator Section Name Phone Office Email Dr. Yingxu Wang 403 220-6141 ICT 542 yingxu Email L01 Dr. Yingxu Wang 403 220-6141 ICT 542 yingxu@ucalgary.ca L02 Dr. Vassil S. Dimitrov 403 210

  17. COURSE OUTLINE Management 3313

    E-Print Network [OSTI]

    COURSE OUTLINE Management 3313 Developing Leadership Skills Online Syllabus Faculty: Andrew L Classroom): http://oc.okstate.edu Administrative contact: CEPD Distance Learning Office, 108 Gundersen, cepd, the focus will be on self- management and interpersonal concepts as opposed to organizational leadership

  18. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  19. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14 Are you starting a full-time course at university or college in the autumn? · Find out what student finance is available to you finance. Apply online by 31 May 2013. · Giving Student Finance England your UK passport number and your

  20. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13

    E-Print Network [OSTI]

    Oakley, Jeremy

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  1. BUFFERED WELL FIELD OUTLINES

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium MarketingYear Jan Feb Mar OIL & GAS FIELD

  2. MERIT Pump/Probe Data OutlineOutline

    E-Print Network [OSTI]

    McDonald, Kirk

    MERIT Pump/Probe Data Analysis OutlineOutline The pump/probe program Particle detector response correction Pump/probe analysis results NFMCC Collaboration Meeting , LBNL, January 26, 2009 Ilias Efthymiopoulos - CERN #12;The pump/probe program #12;The pump/probe program Use of the CERN PS flexibility

  3. Outline:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access toOctoberConsumption (MillionOther EnergyTheOur Team NameMaps-N

  4. Outline:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access toOctoberConsumption (MillionOther EnergyTheOur Team

  5. Outline:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access toOctoberConsumption (MillionOther EnergyTheOur Team ν scattering

  6. Outline

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield MunicipalTechnical Report:Speeding access toSmall Reactor for Deep Space ExplorationLBNL-55574 A Review

  7. Outline of the talk Statistics on Graphs, Exponential Formula and

    E-Print Network [OSTI]

    Poinsot, Laurent

    Outline of the talk Statistics on Graphs, Exponential Formula and Combinatorial Physics G and Complexity" Laurent Poinsot Statistics on Graphs, Exponential Formula and Combinatorial Physics #12;Exponential Formula : Informal Version Ingredients for the exponential formula Partial commutative monoids

  8. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  9. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

  10. Microsoft Word - CADD Outline .doc

    National Nuclear Security Administration (NNSA)

    further information."** All Final Documents must include an Appendix with the Nevada Division of Environmental Protection Comment Response Sheets Library Distribution List ** Note...

  11. Engineering Economy Outline IE 305-Part 1

    E-Print Network [OSTI]

    Vardeman, Stephen B.

    Engineering Economy Outline IE 305-Part 1 Stephen B. Vardeman ISU Fall 2013 Stephen B. Vardeman (ISU) Engineering Economy Outline Fall 2013 1 / 53 #12;THE Basics The very basic notion that governs) Engineering Economy Outline Fall 2013 2 / 53 #12;Solving for P The (N

  12. Volume 37 - 2006: GEOSCIENCE INFORMATION: KEYS TO DISCOVERY - Proceedings of the 41st Meeting of the Geoscience Information Society 

    E-Print Network [OSTI]

    GeoScience Information Society

    2006-01-01

    Overexploitation of wildlife is a leading threat to biodiversity in tropical Africa. Effective management requires integrating information on the extent of exploitation, distribution, and status of exploited species. I ...

  13. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    Chappell, James M

    2012-01-01

    The idealized Kish-Sethuraman (KS) cipher is known to offer perfect information theoretical security with classical physical means. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a three and four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a classical physical realization having benefits in increased security with reduced complexity.

  14. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    James M. Chappell; Derek Abbott

    2012-12-31

    The idealized Kish-Sethuraman (KS) cipher is theoretically known to offer perfect security through a classical information channel. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a physical realization having benefits in increased security with reduced complexity.

  15. Quantum logic. A brief outline Karl Svozil #

    E-Print Network [OSTI]

    Svozil, Karl

    evidence of the quantum world. We give a brief outline of quantum logic, and some of its algebraic outline of its nonclassical aspects; in particular violations of Boole­Bell type consistency constraints and algebraic order of events from empirical facts. This is very different from the ``classical'' logical

  16. Electromagnetic Field Theory Fall 2014 Course Outline

    E-Print Network [OSTI]

    Haimovich, Alexander

    ECE 620 Electromagnetic Field Theory Fall 2014 Course Outline Instructor: Dr. Gerald Whitman Text of electromagnetic phenomena that vary sinusoidally in time. Course Learning Outcome: Students will learn fundamental knowledge of ac electromagnetic theory, which is needed for a broad spectrum of electrical engineering

  17. Course Outline Psychology 501 Advanced Personality

    E-Print Network [OSTI]

    Hopfinger, Joseph B.

    theorists of the twentieth century and integrating what we know about their personal livesCourse Outline Psychology 501 Advanced Personality Sample Syllabus Assigned Text: Monte & Sollod and external situations control our behavior? · Are there reliable clusters of personality types among us

  18. Design with Advanced Ceramics Course Outline

    E-Print Network [OSTI]

    New South Wales, University of

    MATS4002 Design with Advanced Ceramics Course Outline Session 1, 2015 School of Materials Science 11 March Ferroelectric Ceramics and their Applications (DW) 3 17 March 18 March Piezoelectric Ceramics (DW) 4 24 March 25 March Electro-optic Ceramics and Fibre-Optic Sensors (DW) 5 31 March 1 April

  19. Outline PhD Research Plan D-ERDW PhD Research Plan Outline

    E-Print Network [OSTI]

    Gilli, Adrian

    Outline PhD Research Plan D-ERDW PhD Research Plan ­ Outline Doctoral students compile a research (PhD Research Proposal Defense). Final approval is by the doctoral committee of the department or economic need. 2 PhD thesis Explain the main question you want to answer. Connect it with current state

  20. Motivation and Outline PAW OEP Formalism and Implementation

    E-Print Network [OSTI]

    Holzwarth, Natalie

    Motivation and Outline PAW OEP Formalism and Implementation Conclusion Implementation #12;Motivation and Outline PAW OEP Formalism and Implementation Conclusion Motivation and Outline Motivation 1 The optimized effective potential (OEP) or exact exchange (EXX) formalism is a method which can

  1. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  2. Microsoft Word - SAFER Outline.doc

    National Nuclear Security Administration (NNSA)

    information."** Other reports or information as appropriate. All FINAL Documents must include an Appendix with the NDEP Comment Response Sheets Library Distribution List **Note...

  3. Quantum information technology with Sagnac interferometer: Interaction-free measurement, quantum key distribution and quantum secret sharing

    E-Print Network [OSTI]

    Wellington Alves de Brito; Rubens Viana Ramos

    2007-06-08

    The interferometry of single-photon pulses has been used to implement quantum technology systems, like quantum key distribution, interaction-free measurement and some other quantum communication protocols. In most of these implementations, Mach-Zehnder, Michelson and Fabry-Perot interferometers are the most used. In this work we present optical setups for interaction-free measurement, quantum key distribution and quantum secret sharing using the Sagnac interferometer. The proposed setups are described as well the quantum protocols using them are explained.

  4. Texas 4-H Horse Project Teaching Outlines 

    E-Print Network [OSTI]

    Howard, Jeff W.; Johnson, Ken; Mason, Vanessa; Mitchell, Julianne

    2000-06-15

    Department, and Vanessa Mason, former Extension Assis- tant in Animal Science State Horse Office. Editorial contributions were made by Doug Householder and Pete Gibbs, Extension Horse Specialists. III CONTENTS The Digestive System of the Horse 1 Feeding... Management 30 minutes THE DIGESTIVE SYSTEM OF THE HORSE Subject Matter Outline Youth should be able to: a73 Identify the digestive system of the horse a73 List the parts of the foregut and hindgut a73 Recognize the functions of each compartment a73 Identify...

  5. City of Long Beach This page outlines solar PV incentives, financing mechanisms, permitting process, and

    E-Print Network [OSTI]

    ) Programs o Commercial PACE · The Los Angeles County PACE program offers funding for nonresidential solarCity of Long Beach This page outlines solar PV incentives, financing mechanisms, permitting process;Find an Installer · Qualified contractors are your key to getting the most productive solar energy

  6. City of Santa Monica This page outlines solar PV incentives, financing mechanisms, permitting process, and interconnection

    E-Print Network [OSTI]

    ) Programs o Commercial PACE · The Los Angeles County PACE program offers funding for nonresidential solarCity of Santa Monica This page outlines solar PV incentives, financing mechanisms, permitting contractors are your key to getting the most productive solar energy system for your home or business. o

  7. Microsoft Word - CAP Outline.doc

    National Nuclear Security Administration (NNSA)

    further information." ** All Final Documents must include an Appendix with the Nevada Division of Environmental Protection Comment Response Sheets Library Distribution List ** Note...

  8. Microsoft Word - CADD CAP Outline.doc

    National Nuclear Security Administration (NNSA)

    for further information. All Final Documents must include an Appendix with the Nevada Division of Environmental Protection Comment Response Sheets Library Distribution List ** Note...

  9. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  10. Power Line Plan of Development Outline | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975) |Texas:Pottawattamie County,River,Generating Inc Jump to:Line

  11. Motivation and Outline Hatree-Fock Theory and KLI Approximation

    E-Print Network [OSTI]

    Holzwarth, Natalie

    Motivation and Outline Hatree-Fock Theory and KLI Approximation Frozen core orbital approximation March 24, 2011 Xiao Xu, N. A. W. Holzwarth PAW + HF & KLI #12;Motivation and Outline Hatree-Fock Theory of HF and KLI Conclusion Outline 1 Motivation of this work: Why? orbital dependent functionals + PAW 2

  12. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  13. Data Management Plan (outline) The Data Management Plan (DMP) for a proposal is a two-page document that

    E-Print Network [OSTI]

    Data Management Plan (outline) The Data Management Plan (DMP to the funder's Data Policy and (2) how the investigator plans to manage the data should cover the following topics: 1. Information about the data · Describe

  14. Phase 2 CASL Unlimited Access Report Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformance and DebuggingPeterof Petroleum4Phase 1 of

  15. Phase 2 CASL Unlimited Access Report Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformance and DebuggingPeterof Petroleum4Phase 1 of43-000

  16. Phase 2 CASL Unlimited Access Report Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformance and DebuggingPeterof Petroleum4Phase 1

  17. Phase 2 CASL Unlimited Access Report Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/OPerformance and DebuggingPeterof Petroleum4Phase

  18. MPLP Curriculum Outline Defining Ourselves and Our Work

    E-Print Network [OSTI]

    Riley, Shawn J.

    MPLP Curriculum Outline Defining Ourselves and Our Work Introduction of Fellows Determine Personal Leadership Style Review Program Goals and Curriculum Establish and Share Individual Goals Understanding

  19. Introduction This Guidance Note provides advice and information on how to address historic

    E-Print Network [OSTI]

    and other sources of information at the end of this Guidance Note.) As outlined above, historic environmentIntroduction This Guidance Note provides advice and information on how to address historic of whether or not a particular project requires formal planning permission. Key documents are: n England

  20. Project Information by Key Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeedingProgramExemptions |(Conference) | SciTechProject Gnome Double Beta

  1. Outlining a scholarly workbench publication and data as a continuum

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Outlining a scholarly workbench ­ publication and data as a continuum Laurent Romary INRIA viewed from the point of view of research repositories · Publication repositories ­ Where do we stand · A multidisciplinary field ­ Publications: importance of conferences, long- standing culture of publication

  2. Physics 112 Thermodynamics and Statistical Physics Winter 2000 COURSE OUTLINE

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Physics 112 Thermodynamics and Statistical Physics Winter 2000 COURSE OUTLINE TOPIC READINGS 1 and probability theory can be found in Chapter 16 of Mathematical Methods in the Physical Sciences, by Mary L

  3. Outline for Linear Equations and Inequalities of 2 variables

    E-Print Network [OSTI]

    charlotb

    2010-04-15

    Outline for Linear Equations and Inequalities of 2 variables. A. 1. Substitute any value for x in the equation and solve for y. This results in a point (x, y). OR.

  4. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  5. VISA DEEMED EXPORT QUESTIONNAIRE -Background Information and Key Definitions First-time users: Please do not complete the Visa Deemed Export Questionnaire until you have read the following material.

    E-Print Network [OSTI]

    Bordenstein, Seth

    VISA DEEMED EXPORT QUESTIONNAIRE - Background Information and Key Definitions First-time users: Please do not complete the Visa Deemed Export Questionnaire until you have read the following material. Repeat users of the Visa Deemed Export Questionnaire: Continue to Page 3 Introduction: The revised Form I

  6. Chronological outlines of American literature, 1894-1914

    E-Print Network [OSTI]

    Cannady, Ada

    1915-05-15

    CHRONOLOGICAL OUTLINES OF AMERICAN LITERATURE 1894 - 1914 fey Ada Cannady, A. B., College of Emporia, 1914. A thesis submitted to the Department of English and the Faculty of the Graduate School In partial ful- fillnent of the requirements... for the Master's de- gree . May 15, 1915. PREFACE. In attempting to outline the work done by Amer- ican writers during the past twenty-one years, my de- sire has been to place before the students of American Literature, in as brief and concise a form...

  7. Page | 1 Managed Print Project Outline Pull Printing

    E-Print Network [OSTI]

    Glasgow, University of

    in power and reductions in total print volume. 2. Reduce costs by implementing a cost the completion of these initiatives. The UK government's introduction of the Carbon Reduction Commitments (CRC.0 Project Outline Following a number of pilot exercises, the University is preparing to move to new printing

  8. OUTLINE FOR Chapter 5 AERODYNAMICS (W4-2-1)

    E-Print Network [OSTI]

    Leu, Tzong-Shyng "Jeremy"

    Vortex Filament Vortex line Vortex filament: a infinitesimal vortex tube. Vortex tube Reference: "Low Vortex in 3D Airfoil / Lifting Line theory 4 #12;2013/6/3 3 INDUCED VELOCITY, EFFECTIVE ANGLE OF ATTACK4_2_4) OUTLINE FOR Chapter 5 AERODYNAMICS (W4-3-1) #12;2013/6/3 5 Helmholtz Vortex Theorem

  9. Master's programme in Electric Power Engineering Programme outline

    E-Print Network [OSTI]

    Lagergren, Jens

    of a power system with long transmission lines.The thesis defence took place at KTH in 1928.) Thus, afterMaster's programme in Electric Power Engineering Programme outline This programme consists three subject areas, namely: 1. Electric power systems (focusing on power system dynamics, stability

  10. COURSE OUTLINE EE 4PM4 Electrical Power Systems

    E-Print Network [OSTI]

    Haykin, Simon

    COURSE OUTLINE EE 4PM4 Electrical Power Systems Academic Year 2014-15; Term 2; Jan. to May 2015 systems. To gain an appreciation of electrical power system protection techniques. Define and qualify issues relating to electrical power quality and the impact thereof on plant and customer loads. To study

  11. Nuclear Graphite -Fission Reactor Brief Outline of Experience and

    E-Print Network [OSTI]

    McDonald, Kirk

    Nuclear Graphite - Fission Reactor Brief Outline of Experience and Understanding Professor Barry J Marsden and Dr. Graham N Hall Nuclear Graphite Research Group The University of Manchester 20 March 201313 9PL Tel: +44 (0) 161 275 4399, barry.marsden@manchester.ac.uk #12;Overview · Nuclear Graphite

  12. 1. Introduction This paper outlines the developments we have

    E-Print Network [OSTI]

    Thornton, John

    1. Introduction This paper outlines the developments we have made to our Robot Soccer Team since the team susceptible to both goals scored from the opposition as well as goals caused from the ball behaviours. This has been implemented in the form of a finite-state machine and has provided the team

  13. Geography 5: People and Earth's Ecosystems Lecture Outline

    E-Print Network [OSTI]

    , and Smart Growth" 2 Population growth Health Air pollution Water Food and agriculture Waste Energy 3 Outline fires often create a tremendous amount of air pollution in Third World cities. · Access to clean water · Average U.S. driver spends 443 hours per year (~55 workdays!) behind the wheel. · Traffic congestion costs

  14. O'Leary outlines policy views at confirmation hearing

    SciTech Connect (OSTI)

    Simpson, J.

    1993-02-15

    In her confirmation hearing, Secretary O'Leary outlined her views on various controversial issues. Among these were management of Yucca Mountain and the search for a nuclear waste repository, research on alternative fuels, encouragement of the use of renewable energy sources, and her views on intergrated resource planning.

  15. Outline of Quantum Mechanics William G. Faris 1

    E-Print Network [OSTI]

    Ueltschi, Daniel

    Contents Outline of Quantum Mechanics William G. Faris 1 Inequalities for Schr¨odinger Operators 141 Remarks on the Additivity Conjectures for Quantum Channels Christopher King 177 On the Static mechanics and bring clarity to certain mathematics that has been moti- vated by this field. This too

  16. Recent Flare Studies at NJIT Outline of Studies

    E-Print Network [OSTI]

    continuum brightening (white-light flares) Black-light solar flares (BLFs; Henoux et al. 1990): electron flares. - Solar limb in D3, showing a narrow, bright band above the photosphere between 1000 and 2500 km3/28/2014 1 Recent Flare Studies at NJIT Lecture 10 Outline of Studies Black Light Flares Moreton

  17. outline 2014/09/30 1 Introduction to Physical

    E-Print Network [OSTI]

    outline 2014/09/30 1 Ocean 620 Introduction to Physical Oceanography Fall, 2014 Niklas Schneider substantial sections on biology and chemistry, this book gives an introduction to PO that is thorough, concise list is subject to change, both as to content and as to order of the topics. 1. Why does ocean physics

  18. Geography 5: People and Earth's Ecosystems Lecture Outline

    E-Print Network [OSTI]

    Incinerators, cont'd · Refuse-Derived Fuel - Refuse is sorted to remove recyclable and unburnable materials waste" 2 Outline: 1. Solid waste and how we dispose of it 2. Shrinking the waste stream 3. Hazardous and toxic wastes 3 U.S. produces ~11 B tons solid waste annually · ~1/2 is agricultural waste (crop residues

  19. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  20. Office of Information Technology UC Irvine IT Update

    E-Print Network [OSTI]

    Grossman, Emily

    of IT service operations outlined in ITIL (Information Technology Infrastructure Library). Ø Research

  1. Outline History Basic Theory Research Future Accelerators References Brief Overview of Wakefield

    E-Print Network [OSTI]

    Budker, Dmitry

    Outline History Basic Theory Research Future Accelerators References Brief Overview of Wakefield Overview of Wakefield Acceleration #12;Outline History Basic Theory Research Future Accelerators References of Wakefield Acceleration #12;Outline History Basic Theory Research Future Accelerators References Wakefield

  2. Supplementary Figure 1 Steen Supplementary Figure 1. Pseudocode outlining of the computational algorithm. Pseudocode

    E-Print Network [OSTI]

    Gunawardena, Jeremy

    Supplementary Figure 1 Steen Supplementary Figure 1. Pseudocode outlining of the computational algorithm. Pseudocode outlining the main steps of our procedure for detecting unannotated translation

  3. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  4. 2013 W.B. Powell Slide 1 Lecture outline

    E-Print Network [OSTI]

    Powell, Warren B.

    controllable information class which constrains the system. ­ (3) An information class that costs money" can sometimes be arbitrary. "Resources" Taxicab Hotel room Student Aircraft Pilot Drilling machine

  5. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  6. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  7. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  8. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  9. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-06-11

    Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

  10. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  11. North York (Yonge Street) building outlines with heights, clutter data, DEM, contours and places

    E-Print Network [OSTI]

    Title: North York (Yonge Street) building outlines with heights, clutter data, DEM, contours heights, contours, building outlines, landmarks, points of interest Restrictions: Data is licensed for use@yorku.ca) Citation: RMSI. "[North York (Yonge Street) building outlines with heights, clutter data, DEM, contours

  12. Downtown Toronto building outlines with heights, clutter data, DEM, contours and places

    E-Print Network [OSTI]

    Title: Downtown Toronto building outlines with heights, clutter data, DEM, contours and places Data, building outlines, landmarks, points of interest Restrictions: Data is licensed for use of York University. "[Downtown Toronto building outlines with heights, clutter data, DEM, contours and places]" [electronic

  13. 60Dr. Gregory A. Dorais, NASA Ames Research Center Dr. David Kortenkamp, NASA Johnson Space Center NASA HCA Applications OutlineNASA HCA Applications Outline

    E-Print Network [OSTI]

    Kortenkamp, David

    60Dr. Gregory A. Dorais, NASA Ames Research Center Dr. David Kortenkamp, NASA Johnson Space Center NASA HCA Applications OutlineNASA HCA Applications Outline l 3T Control Architecture ­ architecture Satellite Assistant (under development) #12;61Dr. Gregory A. Dorais, NASA Ames Research Center Dr. David

  14. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  15. MARQUETTE UNIVERSITY GRADUATE SCHOOL OUTLINE/PROPOSAL FOR DISSERTATION, THESIS,

    E-Print Network [OSTI]

    Sanders, Matthew

    are involved in your research, you must also receive approval from the Office of Research Compliance (ORC) prior to initiating your research. The ORC requires you to submit the necessary protocol forms for review and approval of your research. For more information about this process, refer to the ORC Web site

  16. SMOOTH OIL & GAS FIELD OUTLINES MADE FROM BUFFERED WELLS

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price toStocks 2009CubicAnalysis &V 1997

  17. NISTIR 7298 Glossary of Key Information

    E-Print Network [OSTI]

    . For planning and transition purposes, Federal agencies may wish to closely follow the development of these new, technical, and physical standards and guidelines for the cost-effective security and privacy of other than. Since draft documents are not stable, we do not refer to terms/definitions in them. Each entry

  18. MENINGOCOCCAL DISEASE INFORMATION OVERVIEW/KEY POINTS

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    and in the community? You can help prevent the spread of illnesses by: Covering your mouth and nose when coughing or sneezing. Cover your mouth and nose with a tissue when coughing or sneezing. It may prevent those around

  19. Sharing Information Is Key to Solving

    E-Print Network [OSTI]

    of Area 41 Think Tank at Texas A&M TTI, TxDOT Team Up to Test Connected-Vehicle Technology Researcher TEXAS TRANSPORTATION VOL. 51 NO. 1 2015 The Cost of Progress tti.tamu.edu Patching the Oil Patch #12 Exit Signs for Tunnels 11 Transportation Is Primary Focus of Area 41 Think Tank at Texas A&M 12 Sharing

  20. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EAInvervar Hydro JumpHuariKeewatinKenya: Energy

  1. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  2. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  3. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  4. PERCENT FEDERAL LAND FOR OIL/GAS FIELD OUTLINES

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price toStocks 2009Cubic Foot) Year JanYear Jan FebPERCENT FEDERAL

  5. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  6. Outline Motivation Theory Validation Application Conclusions Correlation screening in high dimension

    E-Print Network [OSTI]

    Tourneret, Jean-Yves

    Outline Motivation Theory Validation Application Conclusions Correlation screening in high dimension Alfred Hero University of Michigan - Ann Arbor June 14, 2011 1 / 45 #12;Outline Motivation Theory Validation Application Conclusions 1 Motivation 2 Theory 3 Validation 4 Application 5 Conclusions 2 / 45 #12

  7. Title: York University building outlines with heights and clutter (land use) data Data Creator /

    E-Print Network [OSTI]

    Title: York University building outlines with heights and clutter (land use) data Data Creator(s): April 2010 Updates: N/A Abstract: Data consists of: 3D Building Outlines in the York University Keele. Clutter data categories include: 1 Inland Water 2 Open 3 Low tree density 4 High Tree density 5 Buildings

  8. School of Architecture Strategic Plan Outline page 1 School of Architecture

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    School of Architecture Strategic Plan Outline ­ page 1 School of Architecture Montana State University Strategic Planning Document Condensed Outline May 24, 2013 School of Architecture Vision Recognizing that architecture is a basic human need, we strive to play an essential and innovative role

  9. NEURAL PCA NETWORK FOR LUNG OUTLINE RECONSTRUCTION IN VQ SCAN IMAGES

    E-Print Network [OSTI]

    Serpen, Gursel

    NEURAL PCA NETWORK FOR LUNG OUTLINE RECONSTRUCTION IN VQ SCAN IMAGES G. Serpen1 , Ph. D., R. Iyer1 system takes the digitized ventilation-perfusion scan images of lungs as input, identify a template according to the size and shape of the lungs and thereby approximate and reconstruct the outline of the lung

  10. Applied Mathematics 4611F page 1 of 2 Course Outline 2013-14 Dr. Z. Krougly

    E-Print Network [OSTI]

    Krougly, Zinovi

    projects and a presentation. Course Outline by Topical Areas: Basic C++, Fundamental Types and Basic Modeling, Environmental Science, etc. Method of Evaluation: 5% Assignment 1 ­ September 30, 2013 5 Senate Academic Handbook has specified that the following points should be added to all course outlines

  11. Applied Mathematics 4611F page 1 of 2 Course Outline 2012-13 Prof. Z. Krougly

    E-Print Network [OSTI]

    Krougly, Zinovi

    assignments, two projects and a presentation. Course Outline by Topical Areas: · Basic C++, Fundamental Types in Physics, Biomedicine, Economics, Financial Modeling, Environmental Science, etc. Method of Evaluation: 5 Course Outlines: The UWO Senate Academic Handbook has specified that the following points should be added

  12. Course Outline and General Information Courses: THE DYNAMIC EARTH GEOL1340

    E-Print Network [OSTI]

    Chakhmouradian, Anton

    . Gravity. Earth's magnetic field. Heat flow. Ocean floor 2 & 18 Origin of the oceans. Sea floor and transportation. Types and rate of weathering. Origin and evolution of soils. Types of soils. Sedimentary rocks 9

  13. FINAL PROJECT INFORMATION SHEET Prepare Outline of the Project By: Nov 9th

    E-Print Network [OSTI]

    Jackson, Trachette L.

    to your classmates. Your pre- sentation should be a condensed version of your paper. I will expect to you talk and give a polished presentation as you are now the expert on your particular topic and must

  14. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  15. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  16. May 31-June 1, 2001 A. R. Raffray, et al., Assessment of Dry Chamber Walls as Preliminary Step in Defining Key Processes for Chamber Clearing Code 1

    E-Print Network [OSTI]

    Raffray, A. René

    in Defining Key Processes for Chamber Clearing Code 3 Outline of Presentation · Chamber Wall Options ­ Thermal in Defining Key Processes for Chamber Clearing Code 7 Temporal Distribution of Energy Depositions from Photons in Defining Key Processes for Chamber Clearing Code 1 Assessment of Dry Chamber Wall Configurations

  17. CLASIC OUTLINE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransenBusinessInitialRadiological Surveys atCLAMR

  18. Plan Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access| DepartmentPeerFederal FleetUp inrdPilotWriting

  19. Plan Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access| DepartmentPeerFederal FleetUp inrdPilotWritingEXTERNAL VERSION

  20. City of Anaheim This page outlines solar PV incentives, financing mechanisms, permitting process, and

    E-Print Network [OSTI]

    City of Anaheim This page outlines solar PV incentives, financing mechanisms, permitting process Apply for local permits Install your PV system Arrange for your PV system to be interconnected to your

  1. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving Basic NERSCKey Staff Dr. Grace M. Bochenek,

  2. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesofPublications The NREL windTeacher Programs PhotoVoyles PurdueNSR

  3. Projected refined product balances in key Latin American countries: A preliminary examination

    SciTech Connect (OSTI)

    NONE

    1996-06-01

    Over the years, the East-West Center (EWC) has developed considerable expertise in refinery modeling, especially in the area of forecasting product balances for countries, given planned capacity changes, changes in product demand, changes in crude slates, and changes in product specifications. This expertise has been applied on an ongoing basis to the major refiners in the Middle East and the Asia-Pacific region, along with the US West Coast as region in its own right. Refinery modeling in these three areas has been ongoing for nearly 15 years at the Center, and the tools and information sources are now well developed. To date, the EWC has not applied these tools to Latin America. Although research on Latin America has been an ongoing area of concern at the Center in recent years, the information gathered to date is still not of the level of detail nor quality available for other areas. The modeling efforts undertaken in this report are of a ``baseline`` nature, designed to outline the major issues, attempt a first cut at emerging product balances, and, above all, to elicit commentary from those directly involved in the oil industry in the key countries modeled. Our experience in other regions has shown that it takes a few years dialogue with refiners and government planner in individual countries to develop a reliable database, as well as the insights into operational constraints and practices that make accurate modeling possible. This report is no more than a first step down the road.

  4. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  5. 12 Tips to Pave the Way for a Graceful Exit 1. Get organized by capturing and keeping track of key loan information, such as your lender or loan servicer, balance,

    E-Print Network [OSTI]

    loan information, such as your lender or loan servicer, balance, repayment status, interest rate, loan all of your lenders and servicers informed of where you are and how to contact you. You're responsible

  6. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  7. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  8. City of Palmdale This page outlines solar PV incentives, financing mechanisms, permitting process, and

    E-Print Network [OSTI]

    ) Programs o Commercial PACE · The Los Angeles County PACE program offers funding for nonresidential solarCity of Palmdale This page outlines solar PV incentives, financing mechanisms, permitting process solar energy system for your home or business. o Typically solar installers will: Locate financing

  9. BSc Biological Sciences Course Outline 1. Awarding institution The Royal Veterinary College

    E-Print Network [OSTI]

    Daley, Monica A.

    underpins an individual discipline or subject area. · Cognate sciences. · The political, social and economic1 BSc Biological Sciences Course Outline 1. Awarding institution The Royal Veterinary College 2. Final award Bachelor of Science 5. Programme Title Biological Sciences 6. Date of First Intake 2014 7

  10. BSc Bioveterinary Sciences Course Outline 1. Awarding institution The Royal Veterinary College

    E-Print Network [OSTI]

    Daley, Monica A.

    an individual discipline or subject area. · Cognate sciences. · The political, social and economic context1 BSc Bioveterinary Sciences Course Outline 1. Awarding institution The Royal Veterinary College 2. Final award Bachelor of Science 5. Programme Title Bioveterinary Sciences 6. Date of First Intake 2002 7

  11. COURSE OUTLINE PHYSICS 111 FALL 2009 PHYS 111 HOME PAGE: http://web.njit.edu/~opyrchal

    E-Print Network [OSTI]

    COURSE OUTLINE PHYSICS 111 FALL 2009 PHYS 111 HOME PAGE: http://web.njit.edu/~opyrchal FACULTY: Halina Opyrchal: 454 Tiernan, opyrchal@adm.njit.edu, http://web.njit.edu/~opyrchal Haimin Wang: 460@adm.njit.edu, http://web.njit.edu/~fayngold Camelia Prodan: 480 Tiernan, cprodan@adm.njit.edu, http://web

  12. Physics 171 General Relativity, Black Holes and Cosmology Fall 2014 Course Outline

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Physics 171 General Relativity, Black Holes and Cosmology Fall 2014 Course Outline Topic Reading 1. Introduction to Tensors Chapter 10 of Boas 2. Covariance of Physical Laws Chapter 2.1 3. Special Relativity. For an introduction to tensors, please review Chapter 10 of Mary L. Boas, Mathematical Methods in the Physical

  13. CHEMICAL ENGINEERING This Graduate Student Handbook outlines the policies and procedures followed by the Department

    E-Print Network [OSTI]

    Thompson, Michael

    CHEMICAL ENGINEERING HANDBOOK 2015/16 #12;This Graduate Student Handbook outlines the policies and procedures followed by the Department of Chemical Engineering with respect to Graduate Studies. All students, which have been created with the Department of Chemical Engineering, are specified in this Handbook

  14. OUTLINE OF DATA SOURCES, MAY 1933 LANDAREAS OCEAN AREAS SOURCES OF DATA

    E-Print Network [OSTI]

    ~ecldeallydv- en.but when Drmnt weather is rewrted: Base map descdptIon N used when coverage mbsing "round i#12;#12;#12;OUTLINE OF DATA SOURCES, MAY 1933 LANDAREAS OCEAN AREAS SOURCES OF DATA Area Bource National dfdeordogiguc dc Efance. 2 Daily Weather Report, Egypt. 3 Monthly Meteorological Bulletin, Nanking

  15. Short Outline of Readings for Geog. 549 Chapter 1. Introduction -Watersheds and Water: Essential Resources

    E-Print Network [OSTI]

    James, L. Allan

    Short Outline of Readings for Geog. 549 Chapter 1. Introduction - Watersheds and Water: Essential Resources PART ONE - ENVIRONMENTAL ASPECTS OF WATER RESOURCES Section I. Physical Hydrology Chapter 2. History of the Hydrologic Cycle and Water Properties (omitted) Chapter 3. Atmospheric Water and Global

  16. Degree Requirements for Real Estate, Bachelor of Science Suggested Curriculum Outline

    E-Print Network [OSTI]

    Hammack, Richard

    Degree Requirements for Real Estate, Bachelor of Science Suggested Curriculum Outline Fall Semester of Argument 3 FIRE 305 Principles of Real Estate 3 Business General Education elective 3 SCMA 301 Business Marketing Principles 3 FIRE 325 Real Estate Law 3 SCMA 302 Business Statistics II 3 INFO 360 Business

  17. COURSE OUTLINE FOR Elec Eng 4PL4 -Energy Systems and Management Academic

    E-Print Network [OSTI]

    Haykin, Simon

    Generation: different types of conventional power stations and related major plant; renewable sourcesCOURSE OUTLINE FOR Elec Eng 4PL4 - Energy Systems and Management Academic Year 2014-15; Term 1 to consumers, to the final supply and cost regimes for electrical energy. The design and performance of large

  18. UMass Lowell MSA Curriculum outline Students with undergraduate non-accounting business degrees

    E-Print Network [OSTI]

    Massachusetts at Lowell, University of

    UMass Lowell MSA Curriculum outline Students with undergraduate non-accounting business degrees Credits Prerequisite undergraduate courses (5 courses required): 1 60.301 Intermediate Accounting I (60.202 Managerial Accounting) 3 60.302 Intermediate Accounting II (60.301 Intermediate Accounting I ) 3 60.321 Cost

  19. 5Health and Safety Policy General OutlineStatement of Responsibilities for Health and Safety

    E-Print Network [OSTI]

    Haase, Markus

    5Health and Safety Policy General OutlineStatement of Responsibilities for Health and Safety Every member of the University community has a responsibility to achieve good health and safety practice Statement (see p.4) which sets out the University's commitment to health and safety 2. as an identified set

  20. Wireless LANs: outline wireless 802.11 and WiFi.

    E-Print Network [OSTI]

    Biagioni, Edoardo S.

    Wireless LANs: outline wireless 802.11 and WiFi. 802.11 security: WEP, 802.11i, WPA, WPA2. networking security wireless ad-hoc and mesh networks #12;ISM bands to operate most radios, a license availability of the 2.4GHz ISM band, many applications have been developed for it #12;Wireless 802.11/Wi

  1. Applied Mathematics 4611F page 1 of 2 Course Outline 2011-12 Prof. Z. Krougly

    E-Print Network [OSTI]

    Krougly, Zinovi

    by Topical Areas: Basic C++, Fundamental Types and Basic Operators Functions, Recursion, Iteration in Physics, Biology, Finance and Environmental Science. Method of Evaluation: 5% Assignment 1 ­ September 26 Outlines: The UWO Senate Academic Handbook has specified that the following points should be added to all

  2. Applied Mathematics 4611F page 1 of 3 Course Outline 2014-15

    E-Print Network [OSTI]

    Krougly, Zinovi

    -Oriented Programming and C++ Basic C++, Fundamental Types and Basic Operators Functions, Recursion, Iteration Modeling, Environmental Science, etc. * is a combined undergraduate/graduate course #12;Applied Mathematics Course Outlines: The UWO Senate Academic Handbook has specified that the following points should be added

  3. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  4. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  5. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  6. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  7. New and Underutilized Technology: High Bay LED Lighting

    Broader source: Energy.gov [DOE]

    The following information outlines key deployment considerations for high bay LED lighting within the Federal sector.

  8. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  9. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  10. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  11. Energy Efficient IT IT for Energy Efficiency Clean Energy Generation Emissions Accounting Policy Considerations At Microsoft, we see information technology (IT) as a key tool to help address the daunting en-

    E-Print Network [OSTI]

    Narasayya, Vivek

    Energy Efficient IT IT for Energy Efficiency Clean Energy Generation Emissions Accounting Policy in energy conservation and integration of more renewable and zero-carbon energy sources into our economy. Microsoft envisions a clean energy ecosystem where information technology: · Empowers people

  12. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  13. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  14. Compressed Natural Gas (Rev 09/14) DRAFT Page 1 of 14 Examination Procedure Outline (EPO) for

    E-Print Network [OSTI]

    EPO No. 28 Compressed Natural Gas (Rev 09/14) DRAFT Page 1 of 14 Examination Procedure Outline (EPO) for Compressed Natural Gas (CNG) Retail Motor-Fuel Dispensers It is recommended that this outline be followed as minimum criteria for examining retail motor-fuel dispensers used to measure compressed natural gas. Non

  15. Outline Directed polymers Log-gamma polymer KPZ equation Fluctuation exponents for certain 1+1 dimensional

    E-Print Network [OSTI]

    Seppäläinen, Timo

    Outline Directed polymers Log-gamma polymer KPZ equation Fluctuation exponents for certain 1+1 dimensional directed polymers Timo Sepp¨al¨ainen Department of Mathematics University of Wisconsin-Madison MSRI December 2010 Fluctuation exponents for polymers 1/36 #12;Outline Directed polymers Log

  16. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  17. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  18. Outlining the Local Void with the Parkes HI ZOA and Galactic Bulge Surveys

    E-Print Network [OSTI]

    Renee C. Kraan-Korteweg; Nebiha Shafi; Baerbel Koribalski; Lister Staveley-Smith; Peter Buckland; Patricia A. Henning; Anthony P. Fairall

    2007-10-09

    The Parkes deep HI ZOA survey has been extended between 2002 and 2004 towards higher latitudes in the Galactic Bulge region. This area of extreme star crowding and high extinction levels remains impenetrable at any other waveband regime. Preliminary results of the 3 dimensional distribution based on the combined HI-surveys are presented. We focus on the extent and "content" of the Local Void as outlined by these HI surveys, followed by a preliminary discussion of the properties of the few galaxies detected in the Local Void.

  19. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  20. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  1. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  2. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  3. Key Blog Distillation: Ranking Aggregates

    E-Print Network [OSTI]

    Macdonald, C.; Ounis, I.

    Macdonald,C. Ounis,I. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA, October 26-30, 2008 ACM Press

  4. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  5. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  6. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  7. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  8. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  9. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  10. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  11. Present status of the Bevalac and design outline of proposed medical accelerator

    SciTech Connect (OSTI)

    Gough, R.A.

    1986-03-01

    The Bevalac currently supports a strong and diverse program of scientific research with beams of relativistic heavy ions in the Biomedical and Nuclear Sciences. These programs utilize ions throughout the Periodic Table that range in energy from a few MeV to 2 GeV/nucleon, including radioactive secondary beams, such as neon-19. This paper first provides a brief overview of the Bevalac, its present operational status and the accelerator improvement program, followed by a rationale for the proposed construction of a hospital-based modern synchrotron dedicated to applications in Biomedicine, including the radiotherapeutic treatment of cancer and other human disorders. An outline of the proposed design for the new machine is given, including discussion of the design philosophy, a review of major accelerator components, and the expected performance and operating characteristics.

  12. Aanbevolen achtergrondliteratuur met veel opgaven (en oplossingen): Frank Ayres: (Schaum's Outline of Theory and Problems of) Calculus.

    E-Print Network [OSTI]

    Batina, Lejla

    : (Schaum's Outline of Theory and Problems of) Calculus. McGraw-Hill Companies, 1999, 578 p., ISBN rationale getallen Q) een deelverzameling van R waar tussen elk paar van punten uit D overaftelbaar veel

  13. Introduction to Information Theory

    E-Print Network [OSTI]

    Belohlavek, Radim

    Introduction to Information Theory and Its Applications Radim Belohl´avek Dept. Computer Science providing introduction to Information Theory. Radim Belohl´avek, Introduction to Information Theory and Its Applications 1 #12;Information Theory: What and Why · information: one of key terms in our society

  14. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  15. Cricos Provider Code: 00098G Copyright 2015 -School of Mathematics and Statistics, UNSW COURSE OUTLINE

    E-Print Network [OSTI]

    Blennerhassett, Peter

    Information about the course Course Authority: Dr Zhi Guo Lecturer: Dr Zhi Guo, RC-4066, e-mail: zhi.guo

  16. Motivation : Information Work and Money Understanding entropy

    E-Print Network [OSTI]

    Cockshott, W. Paul

    Motivation : Information Work and Money Understanding entropy Our Results/Contribution Babbage,University of Glasgow SICSA Conf, 2011 Author, WPC Information and production #12;Motivation : Information Work and Money Understanding entropy Our Results/Contribution Outline 1 Motivation : Information Work and Money

  17. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  18. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof EnergyY-12 NationalNOHydrogenWebmaster ToEnergyBSM -AJEDI

  19. ECDLP on GPU State Key Laboratory of Information Security

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with NVIDIA's Compute Unified Device Architecture (CUDA) technology([3], [4]). [5] gave some description, relies on. And many efforts are dedicate to solve this problem. In recent days, GPU technology develops trend in high-performance computing. While multi-core CPUs generally exploit the task level parallelism

  20. Energy Information: The Key to Cost-Effective Conservation 

    E-Print Network [OSTI]

    McBride, J. R.; Flanagan, D. E.

    1998-01-01

    This paper analyzes the cost-effectiveness- simple payback, Net Present Value (NPV) and Return on Investment (ROI) -of permanently installed energy consumption monitoring equipment used as the basis for applying value-added engineering services...

  1. Road Blocks Yield Key Information about a Catalyst | The Ames...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in a catalytic reaction known as hydroamination. Understanding a multi-step catalytic mechanism is like a solving a puzzle where you can't see the pieces. However, you can add your...

  2. Key Biscayne, Florida: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering, Ohio:

  3. Key Mobility Challenges in Indian Cities | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering, Ohio:Mobility

  4. Key West, Florida: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering, Ohio:MobilityFlorida:

  5. Key World Energy Statistics-2010 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,

  6. LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: EnergyKulpsville, Pennsylvania: EnergyContact Us < LEDSGP‎ |

  7. City of Key West, Florida (Utility Company) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLCLtdEllsworth,Hoisington,Kasota, Minnesota (Utility Company)Florida

  8. LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View NewGuam:onItronKanoshKetchikanKlondikeKunBLEDSLEDSGP/Transportation

  9. AKARI IRC survey of the Large Magellanic Cloud: Outline of the survey and initial results

    E-Print Network [OSTI]

    Yoshifusa Ita; Takashi Onaka; Daisuke Kato; Toshihiko Tanabe; Itsuki Sakon; Hidehiro Kaneda; Akiko Kawamura; Takashi Shimonishi; Takehiko Wada; Fumihiko Usui; Bon-Chul Koo; Mikako Matsuura; Hidenori Takahashi; Yoshikazu Nakada; Tetsuo Hasegawa; Motohide Tamura

    2008-08-22

    We observed an area of 10 deg^2 of the Large Magellanic Cloud using the Infrared Camera on board AKARI. The observations were carried out using five imaging filters (3, 7, 11, 15, and 24 micron) and a dispersion prism (2 -- 5 micron, $\\lambda / \\Delta\\lambda$ $\\sim$ 20) equipped in the IRC. This paper describes the outline of our survey project and presents some initial results using the imaging data that detected over 5.9x10^5 near-infrared and 6.4x10^4 mid-infrared point sources. The 10 $\\sigma$ detection limits of our survey are about 16.5, 14.0, 12.3, 10.8, and 9.2 in Vega-magnitude at 3, 7, 11, 15, and 24 micron, respectively. The 11 and 15 micron data, which are unique to AKARI IRC, allow us to construct color-magnitude diagrams that are useful to identify stars with circumstellar dust. We found a new sequence in the color-magnitude diagram, which is attributed to red giants with luminosity fainter than that of the tip of the first red giant branch. We suggest that this sequence is likely to be related to the broad emission feature of aluminium oxide at 11.5 micron. The 11 and 15 micron data also indicate that the ([11] - [15]) micron color of both oxygen-rich and carbon-rich red giants once becomes blue and then turns red again in the course of their evolution, probably due to the change in the flux ratio of the silicate or silicon carbide emission feature at 10 or 11.3 micron to the 15 micron flux.

  10. Information Protection of

    E-Print Network [OSTI]

    Thompson, Michael

    information #12;3 Key FIPPA Principles · ACCESS · Right of access to university records · For the most part and disposal of personal information by institution in its activities · Right to access and request correction of own personal information · Right to complain to Information and Privacy Commissioner when privacy

  11. Secure Key Management in the Cloud Ivan Damgrd1, Thomas P. Jakobsen1,,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Key Management in the Cloud Ivan Damgård1, Thomas P. Jakobsen1,, Jesper Buus Nielsen1 of assistance from outside the cloud when doing the transition. We study the levels of security one can on their practical performance. Keywords: Information security, cloud computing, cloud cryptography, secure key man

  12. Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and 192, 256-bit key AES for TOP SECRET information [19]. In the last ten years AES has been subject 197 [18]. In June 2003 the US government has approved the use of 128, 192, 256 bit key AES for SECRET block. We concatenate four such local collisions together and add another 6-round trail on top in order

  13. OCN-GG 644 syllabus only.xls Sediment Geochemistry (OCN/GG 644) Course Outline --Spring 2015

    E-Print Network [OSTI]

    OCN-GG 644 syllabus only.xls Sediment Geochemistry (OCN/GG 644) Course Outline -- Spring 2015 Date to be covered 14-Jan W 2 Components and Distribution of Marine Sediment Types 19-Jan M -- Holiday: MLK Day 21-Jan W 3 Physical Properties of Sediments, Sediment Accumulation Rates and Sediment Transport Processes

  14. EXAMPLE CURRICULUM OUTLINE FOR B.A. MAJOR IN ENVIRONMENTAL GEOLOGY For matriculants entering in odd-numbered years

    E-Print Network [OSTI]

    Turc, Catalin

    EXAMPLE CURRICULUM OUTLINE FOR B.A. MAJOR IN ENVIRONMENTAL GEOLOGY For matriculants entering in odd) SOPHMORE (Even Years) EEPS 110, Physical Geology (3)b EEPS 119, Geology Laboratory (1) PHYS 115 Geology (3) c EEPS 391, Senior Project (2) STAT 201, Basic Statistics for Social and Life Sciences (3

  15. EXAMPLE CURRICULUM OUTLINE FOR B.A. MAJOR IN ENVIRONMENTAL GEOLOGY For matriculants entering in even-numbered years

    E-Print Network [OSTI]

    Turc, Catalin

    EXAMPLE CURRICULUM OUTLINE FOR B.A. MAJOR IN ENVIRONMENTAL GEOLOGY For matriculants entering Activities (0) SOPHMORE (odd years) EEPS 110, Physical Geology (3)b EEPS 119, Geology Laboratory (1) PHYS 115 of Biology (3) STAT 201, Basic Statistics for Social and Life Sciences (3) EEPS 220, Environmental Geology (3

  16. Seat Belt Use Policy Outline the policy regarding use of seat belt in University of Michigan (U-M) vehicles.

    E-Print Network [OSTI]

    Kirschner, Denise

    Seat Belt Use Policy Objective Outline the policy regarding use of seat belt in University belt when operating a U-M vehicle. 2. Operators are also required to ensure that all occupants are adhering to the seat belt use laws when operating a U-M vehicle. 3. State of Michigan seat belt laws

  17. Research and Scholarly Misconduct Policy Outline for an Inquiry/Investigation Report for ORI

    E-Print Network [OSTI]

    Capogna, Luca

    may suggest a different approach. 1. Background Include sufficient background information to ensure This section should detail the facts leading to the institutional inquiry, including a description allegations that arose during the inquiry/investigation. The source and basis for each allegation or issue

  18. Cryptographic security of the quantum key distribution from the triangle inequality

    E-Print Network [OSTI]

    Pawel Kurzynski; Marcin Markiewicz; Dagomir Kaszlikowski

    2014-09-22

    We show that the Csiszar-Korner sufficient condition for secure cryptographic key generation with the help of quantum theory can be easily derived using the triangle inequality for an information-theoretic distance.

  19. Properties and performance of the IEEE 802.11b complementary-code-key signal sets

    E-Print Network [OSTI]

    Royster, Thomas C., IV

    We describe similarities and differences between complementary-code-key (CCK) modulation and modulation that is derived from biorthogonal signals, and we present performance results and other information that may be useful ...

  20. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  1. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  2. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  3. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  4. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  5. Electric And Electromagnetic Outline Of The Mount Somma-Vesuvius Structural

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH Jump to:Providence,NewInformation at Santa Fe, NewSetting | Open

  6. New report from White House outlines largest problems facing United States

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsourceII Jump to:Information 3rd congressional district:York/IncentivesNew look

  7. MICROBOONE PHYSICS Ben Carls Fermilab MicroBooNE Physics Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion to localPartnershipMEMORANDUM OFCRYOGENICS:PHYSICS

  8. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  9. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  10. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  11. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  12. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  13. The Handbook of Information Security 25. Routers and Switches The Handbook of Information Security

    E-Print Network [OSTI]

    Dommel, Hans-Peter

    The Handbook of Information Security 25. Routers and Switches 1 The Handbook of Information Security John Wiley & Sons Chapter 25. Routers and Switches Mar 31, 2005 - FINAL VERSION - #12;The Handbook of Information Security 25. Routers and Switches 2 OUTLINE INTRODUCTION Principles of Routing and Switching

  14. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  15. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  16. Page 1 of 2 Policy Name: Information Technology (IT) Security

    E-Print Network [OSTI]

    Carleton University

    Page 1 of 2 Policy Name: Information Technology (IT) Security Originating/Responsible Department Information Officer (CIO) Policy: Information Technology (IT) Security Purpose: The purpose of this Policy is to outline Carleton University's approach to campus- wide IT security for networks, enterprise information

  17. integrated Wireless Information Network (iWIN) Lab A Robust Boundary Detection

    E-Print Network [OSTI]

    Wu, Hongyi

    · Related work · Motivation · Coconut algorithm · Simulation · Conclusion #12;integrated Wireless;integrated Wireless Information Network (iWIN) Lab OUTLINE · Introduction · Coconut algorithm · Coarse · Conclusion #12;integrated Wireless Information Network (iWIN) Lab COCONUT ALGORITHM · Coarse Boundary Surface

  18. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  19. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  20. Program Information Night Leon Wegner

    E-Print Network [OSTI]

    Saskatchewan, University of

    Program Information Night Leon Wegner Professor and Head Dept. of Civil and Geological Engineering March 3, 2015 #12;Welcome to ... Civil Engineering ... It's everywhere you look #12;Presentation Outline Civil engineering ­ the discipline Types of work ­ GE 101 presentation extended Areas

  1. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  2. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  3. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  4. LAMINAR: PRACTICAL FINE-GRAINED DECENTRALIZED INFORMATION

    E-Print Network [OSTI]

    Witchel, Emmett

    LAMINAR: PRACTICAL FINE-GRAINED DECENTRALIZED INFORMATION FLOW CONTROL (DIFC) Indrajit Roy, Donald} {} Information flow in a lattice #12;In this talk: Laminar A practical way to provide end-to-end security guarantees. #12;Outline Comparison with current DIFC systems Laminar: programming model Design: PL + OS

  5. Web Information Retrieval Author Preprint for Web

    E-Print Network [OSTI]

    Hawking, David

    indexes is often called `the hidden web', `the deep web', or `web dark matter' (Bailey et al., 2000). 2Web Information Retrieval Author Preprint for Web Nick Craswell and David Hawking 18 April 2009 1 Introduction This chapter outlines some distinctive characteristics of web information re- trieval, starting

  6. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  7. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-08-31

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  8. No-Switching Quantum Key Distribution using Broadband Modulated Coherent Light

    E-Print Network [OSTI]

    Andrew M. Lance; Thomas Symul; Vikram Sharma; Christian Weedbrook; Timothy C. Ralph; Ping Koy Lam

    2005-10-28

    We realize an end-to-end no-switching quantum key distribution protocol using continuous-wave coherent light. We encode weak broadband Gaussian modulations onto the amplitude and phase quadratures of light beams at the Shannon's information limit. Our no-switching protocol achieves high secret key rate via a post-selection protocol that utilizes both quadrature information simultaneously. We establish a secret key rate of 25 Mbits/s for a lossless channel and 1 kbit/s, per 17 MHz of detected bandwidth, for 90% channel loss. Since our scheme is truly broadband, it can potentially deliver orders of magnitude higher key rates by extending the encoding bandwidth with higher-end telecommunication technology.

  9. Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution

    E-Print Network [OSTI]

    Jian-Yu Guan; Zhu Cao; Yang Liu; Guo-Liang Shen-Tu; Jason S. Pelc; M. M. Fejer; Cheng-Zhi Peng; Xiongfeng Ma; Qiang Zhang; Jian-Wei Pan

    2015-05-29

    In quantum key distribution (QKD), the bit error rate is used to estimate the information leakage and hence determines the amount of privacy amplification --- making the final key private by shortening the key. In general, there exists a threshold of the error rate for each scheme, above which no secure key can be generated. This threshold puts a restriction on the environment noises. For example, a widely used QKD protocol --- BB84 --- cannot tolerate error rates beyond 25%. A new protocol, round-robin differential phase shifted (RRDPS) QKD, essentially removes this restriction and can in principle tolerate more environment disturbance. Here, we propose and experimentally demonstrate a passive RRDPS QKD scheme. In particular, our 500 MHz passive RRDPS QKD system is able to generate a secure key over 50 km with a bit error rate as high as 29%. This scheme should find its applications in noisy environment conditions.

  10. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  11. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  12. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  13. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  14. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  15. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  16. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  17. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  18. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  19. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  20. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  1. Understanding information seeking behavior through network traffic analysis

    E-Print Network [OSTI]

    Weaver, Cyrus-Charles

    2008-01-01

    Many of today's information workers use the Internet as a valuable first-choice source for new knowledge. As such, Internet based information seeking is a key part of how information workers find information. This study ...

  2. Contract Management Plan Outline

    Energy Savers [EERE]

    of all necessary actions for effective contracting, ensuring compliance with the terms of the contract, and safeguarding the interests of the United States in its...

  3. Process Metallurgy Course Outline

    E-Print Network [OSTI]

    New South Wales, University of

    -6 8 Reactor design 6 Midsession exam Week 6-7 8 Blast furnace ironmaking 7-8 Assignment 9 Reactions in the blast furnace 9 10 Development of the blast furnace ironmaking to decrease carbon footprint 9 11 Alternative ironmaking processes 10 12 Steelmaking: Bessemer and BOS processes, Electric arc furnace 10-11 13

  4. COURSE OUTLINE Stochastic Processes

    E-Print Network [OSTI]

    Smith, Robert L.

    ; the Poisson process; renewal theory; Markov chains; and some continuous state models including Brownian motion.umich.edu COURSE DESCRIPTION: This is a basic course in stochastic processes with emphasis on model building to Probability Models, Academic Press, latest. REFERENCES: Cinlar, E., Introduction to Stochastic Processes

  5. Lecture outline Classification

    E-Print Network [OSTI]

    Terzi, Evimaria

    ;Naïve Bayes Classifier: Example · X' = (HomeOwner = No, MaritalStatus = Married, Income=120K) · Need on training data · Test phase: ­ For test record X', compute the class Y' that maximizes the posterior probability Pr(Y'|X') Wednesday, October 30, 13 #12;Bayes Classification: Example X'=(Home Owner=No, Marital

  6. Lecture outline Classification

    E-Print Network [OSTI]

    Terzi, Evimaria

    Classification: Example X'=(Home Owner=No, Marital Status=Married, AnnualIncome=120K) Compute: Pr(Yes|X'), Pr discretize? #12;Naïve Bayes Classifier: Example · X' = (HomeOwner = No, MaritalStatus = Married, Income=120K: ­ For test record X', compute the class Y' that maximizes the posterior probability Pr(Y'|X') #12;Bayes

  7. Process Metallurgy Course Outline

    E-Print Network [OSTI]

    New South Wales, University of

    ................................................................................................... 7 Course Objective To develop an understanding of principles of metallurgical processes, reactor-mixed reactors. Tracer additions. Chemical performance of a metallurgical reactor. Principles of metallurgical of metallurgical reactors, batch and continuous, plug flow and well-mixed ideal reactors. Tracer additions. 4 6

  8. Summer Outline of Topics

    E-Print Network [OSTI]

    User

    2015-05-04

    25.1 Counting Units Fast: circumference, area, and surface area formulas. 29. 25.2 Measurement of Area and Volume volume formulas. 30. 26.1 Special Topics

  9. COURSE OUTLINE Physics 777

    E-Print Network [OSTI]

    : An introduction to plasma physics and magnetohydrodynamics for advanced graduate students. Applications to Solar, Holland Frances F. Chen Introduction to Plasma Physics 1984, Plenum, New York Week 1: Review of Solar Physics Priest Chapter 1 Week 2: Introduction Chen Chapters 1, 2 and 7 --Plasma Parameters --Single

  10. Root cause outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a COTS solution existed, and that it would be relatively simple to install compared to building a system in-house. Other transmission utilities had purchased COTS software for...

  11. poster40outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAboutXu Named|Got Solitons? SUpdated: 04/20/10Instantiating apftp

  12. poster50outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAboutXu Named|Got Solitons? SUpdated: 04/20/10Instantiating apftp

  13. poster70outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAboutXu Named|Got Solitons? SUpdated: 04/20/10Instantiating apftp

  14. poster90outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAboutXu Named|Got Solitons? SUpdated: 04/20/10Instantiating apftp

  15. Root cause outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis of Protein Structures PrintRooftop DiagnosticianRoomWPSS Root

  16. Individual Report Outline

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield MunicipalTechnical Report:Speeding accessby aLED Street LightingFrom theHighI _ _1motion in

  17. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  18. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  19. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  20. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  1. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  2. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  3. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  4. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  5. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  6. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  7. Financial Management: The Key to Farm-Firm Business Management 

    E-Print Network [OSTI]

    Pena, Jose G.; Klinefelter, Danny A.

    2008-10-17

    want to succeed need to de- velop a farm/ranch business plan that outlines, in detail, how they plan to generate a profit and manage business risks. They should start by outlining specific business/personal goals and objectives and preparing... should be kept from the time the plan is implemented. Financial statements and cash flow projections with ?what if? analysis should be prepared and adjusted as often as necessary to analyze risks and keep the plan on track. Successful business...

  8. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  9. Hacking on decoy-state quantum key distribution system with partial phase randomization

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang

    2014-07-15

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum+weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  10. College of Communication and Information LIS Library and Information Science

    E-Print Network [OSTI]

    MacAdam, Keith

    ) Developmentoflibrariesandbooksfromearliesttimetothepresentwithspecialreferencetotheirrelationshiptocontemporarysocial, economic, cultural and political trends. Emphasis is given to American library and book historyCollege of Communication and Information LIS Library and Information Science KEY: # = new course of information (both utilitarian and aesthetic) in contemporary society, and to the role played by libraries

  11. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  12. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  13. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  14. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  15. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  16. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  17. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  18. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  19. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  20. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  1. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  2. PUBLIC INFORMATION AND INPUT ON WIPP

    E-Print Network [OSTI]

    PUBLIC INFORMATION AND INPUT ON WIPP Get The Information You Need 1. Check the EPA Website, Fact Sheets and Issue Papers. EPA will make sure that key information is available on its WIPP Website. EPA the EPA WIPP Information Line at 1-800-331-WIPP (1-800-331-9477) to obtain information on upcoming events

  3. E#cient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    E#cient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell Information.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef­ ficient than

  4. A new key recovery attack on the ANSI retail MAC Chris J. Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

  5. Title: Information theory Reference: 13791

    E-Print Network [OSTI]

    Overill, Richard E.

    environment or communicates with others. One of the fundamental tenets of information theory a spate of publications appeared applying information theory to many aspects of music analysisTitle: Information theory Reference: 13791 Sort key: informationtheory Version: 3.0 Revision

  6. Model curriculum outline for Alternatively Fueled Vehicle (AFV) automotive technician training in light and medium duty CNG and LPG

    SciTech Connect (OSTI)

    1997-04-01

    This model curriculum outline was developed using a turbo-DACUM (Developing a Curriculum) process which utilizes practicing experts to undertake a comprehensive job and task analysis. The job and task analysis serves to establish current baseline data accurately and to improve both the process and the product of the job through constant and continuous improvement of training. The DACUM process is based on the following assumptions: (1) Expert workers are the best source for task analysis. (2) Any occupation can be described effectively in terms of tasks. (3) All tasks imply knowledge, skills, and attitudes/values. A DACUM panel, comprised of six experienced and knowledgeable technicians who are presently working in the field, was given an orientation to the DACUM process. The panel then identified, verified, and sequenced all the necessary job duty areas and tasks. The broad duty categories were rated according to relative importance and assigned percentage ratings in priority order. The panel then rated every task for each of the duties on a scale of 1 to 3. A rating of 3 indicates an {open_quotes}essential{close_quotes} task, a rating of 2 indicates an {open_quotes}important{close_quotes} task, and a rating of 1 indicates a {open_quotes}desirable{close_quotes} task.

  7. LIBRARY AND INFORMATION SERVICES DIVISION Current References

    E-Print Network [OSTI]

    LIBRARY AND INFORMATION SERVICES DIVISION Current References (92 -1) ,..... .. , ... ........,., ECOSYSTEMS OF THE FLORIDA KEYS · A Bibliography U. S. DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration National Environmental Satellite, Data, and Information Service National Oceanographic Data Center

  8. An efficient public key infrastructure revocation mechanism 

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01

    ) was designed by Micali to improve upon the CRL method. "Unlike CRLs, each CRS is a short and individualized piece of information for a given certificate. " [8] This method adds two new values to the certificate, a "YES" (denoted Y) value and a "NO" (denoted...

  9. Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ) the first globally scalable, post quan- tum secure, symmetric key based platform for provisioning IdM, key] are based on the same problems and so are also at risk. Iden- tification of a trustworthy post quantum

  10. Motivation Two spectral preconditioners Recombination issue Using Spectral Information to Precondition

    E-Print Network [OSTI]

    1 Motivation Two spectral preconditioners Recombination issue Using Spectral Information #12;2 Motivation Two spectral preconditioners Recombination issue #12;3 Motivation Two spectral preconditioners Recombination issue Outline 1 Motivation 2 Two spectral preconditioners 3 Recombination issue #12

  11. Keys to Access: Argonne-INCREASE partnership opens doors to collaboration |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey

  12. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  13. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  14. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  15. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  16. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  17. Value of Information spreadsheet

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Trainor-Guitton, Whitney

    This spreadsheet represents the information posteriors derived from synthetic data of magnetotellurics (MT). These were used to calculate value of information of MT for geothermal exploration. Information posteriors describe how well MT was able to locate the "throat" of clay caps, which are indicative of hidden geothermal resources. This data is full explained in the peer-reviewed publication: Trainor-Guitton, W., Hoversten, G. M., Ramirez, A., Roberts, J., Júlíusson, E., Key, K., Mellors, R. (Sept-Oct. 2014) The value of spatial information for determining well placement: a geothermal example, Geophysics.

  18. Value of Information spreadsheet

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Trainor-Guitton, Whitney

    2014-05-12

    This spreadsheet represents the information posteriors derived from synthetic data of magnetotellurics (MT). These were used to calculate value of information of MT for geothermal exploration. Information posteriors describe how well MT was able to locate the "throat" of clay caps, which are indicative of hidden geothermal resources. This data is full explained in the peer-reviewed publication: Trainor-Guitton, W., Hoversten, G. M., Ramirez, A., Roberts, J., Júlíusson, E., Key, K., Mellors, R. (Sept-Oct. 2014) The value of spatial information for determining well placement: a geothermal example, Geophysics.

  19. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  20. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  1. Energy Unit lecture outline & graphics Fritz Stahr Tues 1/21/03 -Transportation of Energy & Energy of Transportation an intricate link

    E-Print Network [OSTI]

    Energy Unit lecture outline & graphics ­ Fritz Stahr Tues 1/21/03 - Transportation of Energy & Energy of Transportation ­ an intricate link - history of settlement & industry largely due to transportation and energy supplies - initial towns on rivers or by sea where ships could service cargo as water

  2. Sediment Geochemistry (OCN/GG 644) Course Outline --Fall 2015 Introduction and Fundamentals: General Diagenesis, Organic Matter Diagenesis, Mineral Precipitation & Dissolution

    E-Print Network [OSTI]

    Sediment Geochemistry (OCN/GG 644) Course Outline -- Fall 2015 Date Day Lectu re # Topic Components and Distribution of Marine Sediment Types 1-Sep Tu 3 Physical Properties of Sediments, Sediment Accumulation Rates and Sediment Transport Processes 3-Sep Th 4 Physical Properties of Sediments, Sediment

  3. ADVERTISING POLICY The following policy outlines the usage and advertising procedures for the digital signage displays, banners, table tents and other

    E-Print Network [OSTI]

    Walker, Lawrence R.

    ADVERTISING POLICY The following policy outlines the usage and advertising procedures Services (SUES) General Reservation Policy. Additional policies may apply per the specifics of the event/advertisement. A. All advertising-related decisions will be managed by the SUES office. Advertising includes

  4. [1] H. P. Hsu, Schaum's outline series: theory and problem of analog and digital communications. New York: McGraw-Hill, 1993.

    E-Print Network [OSTI]

    Kovintavewat, Piya

    [1] H. P. Hsu, Schaum's outline series: theory and problem of analog and digital communications and Tables. McGraw-Hill, 3rd edition, 2008. [10] M. H. Hayes, Statistical digital signal processing communications: fundamentals and applications. Prentice Hall, 2nd-edition, 2001. [13] J. G. Proakis, Digital

  5. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  6. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  7. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  8. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  9. Outline Introduction Literature Review Electric Power Supply Chains Empirical Examples Conclusions An Integrated Electric Power Supply Chain and Fuel

    E-Print Network [OSTI]

    Nagurney, Anna

    An Integrated Electric Power Supply Chain and Fuel Market Network Framework: Theoretical Modeling with Empirical review An integrated electric power supply chain and fuel market network framework Empirical case study primary energy (Energy Information Administration (2000, 2005)) Deregulation Wholesale market Bilateral

  10. Explosives performance key to stockpile stewardship

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah Evan-5 Beamline

  11. Information systems definition architecture

    SciTech Connect (OSTI)

    Calapristi, A.J.

    1996-06-20

    The Tank Waste Remediation System (TWRS) Information Systems Definition architecture evaluated information Management (IM) processes in several key organizations. The intent of the study is to identify improvements in TWRS IM processes that will enable better support to the TWRS mission, and accommodate changes in TWRS business environment. The ultimate goals of the study are to reduce IM costs, Manage the configuration of TWRS IM elements, and improve IM-related process performance.

  12. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors

    E-Print Network [OSTI]

    Vladyslav C. Usenko; Laszlo Ruppert; Radim Filip

    2014-12-18

    Secure quantum key distribution with multimode Gaussian entangled states and multimode homodyne detectors is proposed. In general the multimode character of both the sources of entanglement and the homodyne detectors can cause a security break even for a perfect channel when trusted parties are unaware of the detection structure. Taking into account the multimode structure and potential leakage of information from a homodyne detector reduces the loss of security to some extent. We suggest the symmetrization of the multimode sources of entanglement as an efficient method allowing us to fully recover the security irrespectively to multimode structure of the homodyne detectors. Further, we demonstrate that by increasing the number of the fluctuating but similar source modes the multimode protocol stabilizes the security of the quantum key distribution. The result opens the pathway towards quantum key distribution with multimode sources and detectors.

  13. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  14. Coexistence of high-bit-rate quantum key distribution and data on optical fiber

    E-Print Network [OSTI]

    K. A. Patel; J. F. Dynes; I. Choi; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

    2012-11-30

    Quantum key distribution (QKD) uniquely allows distribution of cryptographic keys with security verified by quantum mechanical limits. Both protocol execution and subsequent applications require the assistance of classical data communication channels. While using separate fibers is one option, it is economically more viable if data and quantum signals are simultaneously transmitted through a single fiber. However, noise-photon contamination arising from the intense data signal has severely restricted both the QKD distances and secure key rates. Here, we exploit a novel temporal-filtering effect for noise-photon rejection. This allows high-bit-rate QKD over fibers up to 90 km in length and populated with error-free bidirectional Gb/s data communications. With high-bit rate and range sufficient for important information infrastructures, such as smart cities and 10 Gbit Ethernet, QKD is a significant step closer towards wide-scale deployment in fiber networks.

  15. Ethics and Information Technology 4: 19, 2002. 2002 Kluwer Academic Publishers. Printed in the Netherlands.

    E-Print Network [OSTI]

    Floridi, Luciano

    foundation, IE. Key words: computer ethics, information and communication technology, information ethics approach; CE ­ computer ethics; IA ­ innovative approach; ICT ­ information and communication technologiesEthics and Information Technology 4: 1­9, 2002. © 2002 Kluwer Academic Publishers. Printed

  16. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  17. Information On a New Track

    E-Print Network [OSTI]

    Oakleaf, Megan

    of Museum and Library Services is the primary source of federal support for the nation's 123,000 libraries key concepts. Types of information (sources) selected directly relate to concepts or answer research. Types of information (sources) selected relate to concepts or answer research question. Defines

  18. University of Hawai`i Strategic Plan for Information Technology 2000

    E-Print Network [OSTI]

    Olsen, Stephen L.

    of information technology as recurring costs that include stable budgets for computers, software, maintenanceUniversity of Hawai`i Strategic Plan for Information Technology 2000 Executive Summary This Strategic Plan for Information Technology outlines the vision and planning context for moving forward

  19. Gaussian Quadrature Inference for Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2015-04-21

    We propose the Gaussian quadrature inference (GQI) method for multicarrier continuous-variable quantum key distribution (CVQKD). A multicarrier CVQKD protocol utilizes Gaussian subcarrier quantum continuous variables (CV) for information transmission. The GQI framework provides a minimal error estimate of the quadratures of the CV quantum states from the discrete, measured noisy subcarrier variables. GQI utilizes the fundamentals of regularization theory and statistical information processing. We characterize GQI for multicarrier CVQKD, and define a method for the statistical modeling and processing of noisy Gaussian subcarrier quadratures. We demonstrate the results through the adaptive multicarrier quadrature division (AMQD) scheme. We define direct GQI (DGQI), and prove that it achieves a theoretical minimal magnitude error. We introduce the terms statistical secret key rate and statistical private classical information, which quantities are derived purely by the statistical functions of GQI. We prove the secret key rate formulas for a multiple access multicarrier CVQKD via the AMQD-MQA (multiuser quadrature allocation) scheme. The GQI and DGQI frameworks can be established in an arbitrary CVQKD protocol and measurement setting, and are implementable by standard low-complexity statistical functions, which is particularly convenient for an experimental CVQKD scenario.

  20. Single photon continuous variable quantum key distribution based on energy-time uncertainty relation

    E-Print Network [OSTI]

    Bing Qi

    2006-02-20

    In previous quantum key distribution (QKD) protocols, information is encoded on either the discrete-variable of single-photon signal or continuous-variables of multi-photon signal. Here, we propose a new QKD protocol by encoding information on continuous-variables of a single photon. In this protocol, Alice randomly encodes her information on either the central frequency of a narrow-band single photon pulse or the time-delay of a broadband single photon pulse, while Bob randomly chooses to do either frequency measurement or time measurement. The security of this protocol rests on the energy-time uncertainty relation, which prevents Eve from simultaneously determining both frequency and time information with arbitrarily high resolution. In practice, this scheme may be more robust against various channel noises, such as polarization and phase fluctuations.

  1. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  2. A User Profile-based Approach for Personal Information Access: Shaping Your Information Portfolio

    E-Print Network [OSTI]

    King, Kuo Chin Irwin

    A User Profile-based Approach for Personal Information Access: Shaping Your Information Portfolio@cse.cuhk.edu.hk ABSTRACT In the spread of internet, internet-based information service business has started to become profitable. One of the key technologies is personalization. Successful internet information services must

  3. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  4. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  5. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  6. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  7. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  8. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  9. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  10. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  11. Summary of key directives governing permanent disposal in a geologic repository

    SciTech Connect (OSTI)

    Sands, S.C. III

    1993-11-01

    This document was developed in support of the Idaho National Engineering Laboratory (INEL) Spent Fuel and Waste Management Technology Development Program (SF&WMTDP). It is largely comprised of flow diagrams summarizing the key regulatory requirements which govern permanent disposal in a geologic repository. The key purposes are (1) to provide an easy and effective tool for referencing or cross referencing federal directives (i.e., regulations and orders), (2) to provide a method for examining the requirements in one directive category against the requirements in another, and (3) to list actions that must be taken to ensure directive compliance. The document is categorically broken down into a Transportation section and a Mined Geologic Disposal System (MGDS) section to ensure that the interrelationship of the entire disposal system is considered. The Transportation section describes the transportation packaging requirements, testing methods, and safety requirements imposed on fissile material shipments. The MGDS section encompasses technical aspects involved in siting, licensing, waste interaction with the container, container design features, physical characteristics of the surrounding environment, facility design features, barrier systems, safety features, criticality considerations, migration restrictions, implementation guidelines, and so forth. For purposes of illustration, the worst case scenario is outlined. It is important that the approaches and considerations contained in this document be integrated into the efforts of the SF&WMTDP so that every applicable aspect of the regulatory requirements can be evaluated to avoid investing large sums of money into projects that do not take into account all of the aspects of permanent waste disposal. Not until an overall picture and clear understanding of these regulations is established can a basis be developed to govern the direction of future activities of the SF&WMTDP.

  12. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  13. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  14. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  15. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  16. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  17. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  18. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  19. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  20. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  1. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  2. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  3. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  4. Physics from information

    E-Print Network [OSTI]

    Jae-Weon Lee

    2012-01-28

    This is an ongoing review on the idea that the phase space information loss at causal horizons is the key ingredient of major physical laws. Assuming that information is fundamental and the information propagates with finite velocity, one can find that basic physical laws such as Newton's second law and Einstein's equation simply describe the energy-information relation (dE=TdS) for matter or space time crossing causal horizons. Quantum mechanics is related to the phase space information loss of matter crossing the Rindler horizon, which explains why superluminal communication is impossible even with quantum entanglement. This approach also explains the origin of Jacobson's thermodynamic formalism of Einstein gravity and Verlinde's entropic gravity. When applied to a cosmic causal horizon, the conjecture can reproduce the observed dark energy and the zero cosmological constant. Quantum entanglement, path integral, and holography are also natural consequences of this theory.

  5. Word Sense Disambiguation using Static and Dynamic Sense Jong-Hoon Oh, and Key-Sun Choi

    E-Print Network [OSTI]

    Word Sense Disambiguation using Static and Dynamic Sense Vectors Jong-Hoon Oh, and Key-Sun Choi contextual information in training sense tagged data. Co-occurring words within a limited window-sized context support one sense among the semantically ambiguous ones of the word. This paper reports on word

  6. Information Dashboards

    SciTech Connect (OSTI)

    Shutkin, Amy; Shutkin, Amy; Shutkin, Amy

    2008-04-11

    "A dashboard is a visual interface that provides at-a-glance views into key measures relevant to a particular objective or business process." Key Attributes: Graphical to focus attention on key trends, comparisons and exceptions, Display only relevant data, Inherently contain predefined conclusions. Note: Collecting user requirements is KEYfrom'Excel 2007 Dashboards& Reports for Dummies' by Michael Alexander

  7. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  8. Information Technology for Energy and Maintenance Management 

    E-Print Network [OSTI]

    Villafana, L.; Federspiel, C.

    2003-01-01

    and application specific information about the building maintenance process. They could be designed with similar terms in the same query, producing a simplified thesaurus. A key advantage of using codified actions instead of trying to predict action similarity...

  9. Multiplexing scheme for simplified entanglement-based large-alphabet quantum key distribution

    E-Print Network [OSTI]

    Dada, Adetunmise C

    2015-01-01

    We propose a practical quantum cryptographic scheme which combines high information capacity, such as provided by high-dimensional quantum entanglement, with the simplicity of a two-dimensional Clauser-Horne-Shimony-Holt (CHSH) Bell test for security verification. By applying a state combining entanglement in a two-dimensional degree of freedom, such as photon polarization, with high-dimensional correlations in another degree of freedom, such as photon orbital angular momentum (OAM) or path, the scheme provides a considerably simplified route towards security verification in quantum key distribution (QKD) aimed at exploiting high-dimensional quantum systems for increased secure key rates. It also benefits from security against collective attacks and is feasible using currently available technologies.

  10. Key Parameters for Operator Diagnosis of BWR Plant Condition during a Severe Accident

    SciTech Connect (OSTI)

    Clayton, Dwight A.; Poore, III, Willis P.

    2015-01-01

    The objective of this research is to examine the key information needed from nuclear power plant instrumentation to guide severe accident management and mitigation for boiling water reactor (BWR) designs (specifically, a BWR/4-Mark I), estimate environmental conditions that the instrumentation will experience during a severe accident, and identify potential gaps in existing instrumentation that may require further research and development. This report notes the key parameters that instrumentation needs to measure to help operators respond to severe accidents. A follow-up report will assess severe accident environmental conditions as estimated by severe accident simulation model analysis for a specific US BWR/4-Mark I plant for those instrumentation systems considered most important for accident management purposes.

  11. Physics 218 General Information Winter 2015 Instructor: Howard Haber

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Physics 218 General Information Winter 2015 Instructor: Howard Haber Office: ISB, Room 326 Phone and Jean-Bernard Zuber #12;Physics 171 Advanced Quantum Field Theory Winter 2015 Course Outline Topic of particle physics Chapter 29 6. Introduction to Regularization and Renormalization Chapters 15.4, 16, 18 7

  12. Physics 218 General Information Winter 2015 Instructor: Howard Haber

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Physics 218 General Information Winter 2015 Instructor: Howard Haber O#ce: ISB, Room 326 Phone and Jean­Bernard Zuber #12; Physics 171 Advanced Quantum Field Theory Winter 2015 Course Outline Topic of particle physics Chapter 29 6. Introduction to Regularization and Renormalization Chapters 15.4, 16, 18 7

  13. Northwestern University Information Technology Your data. Your privacy. Your role.

    E-Print Network [OSTI]

    Ottino, Julio M.

    performance -- Keeping your computer secure with anti-virus software, active firewalls, application patches the practices outlined in this guide. Computer, Network, and Information Security at Northwestern University #12: The theft or physical loss of computer equipment known to hold files containing Social Security Numbers

  14. Physics 171 General Information Fall 2014 Instructor: Howard Haber

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Physics 171 General Information Fall 2014 Instructor: Howard Haber Office: ISB, Room 326 Phone;Physics 171 General Relativity, Black Holes and Cosmology Fall 2014 Course Outline Topic Reading 1. Introduction to Tensors Chapter 10 of Boas 2. Covariance of Physical Laws Chapter 2.1 3. Special Relativity

  15. Physics 5B General Information Winter 2009 Instructor: Howard Haber

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    : ISB, Room 288 Phone Number: 459-4106 E-mail: sharma@physics.ucsc.edu PHYSICS 5J: INTRODUCTION Introduction to Physics II Winter 2009 Brief Course Outline for Physics 5B Topic Reading 1. Fluids GiancoliPhysics 5B General Information Winter 2009 Instructor: Howard Haber Office: ISB, Room 326 Phone

  16. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  17. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  18. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  19. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  20. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  1. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  2. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  3. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  4. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  5. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  6. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  7. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  8. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  9. Rutgers University Libraries Information Literacy Goals and Outcome Expectations* General Goal Department Goals and Objectives

    E-Print Network [OSTI]

    Hanson, Stephen José

    Rutgers University Libraries Information Literacy Goals and Outcome Expectations* General Goal Department Goals and Objectives Students will determine the nature and extent of the information needed. Define and articulate the need for information. Identify key concepts and terms that describe

  10. Security Awareness Programs During orientation in September, students are informed of services offered by the University

    E-Print Network [OSTI]

    Escher, Christine

    Security Awareness Programs During orientation in September, students are informed of services. Video and slide presentations outline ways to maintain personal safety and residence hall security. Students are told about crime on campus and in surrounding neighborhoods. Similar information is presented

  11. LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History ViewInformation Actions(Redirected from Transportation Toolkit/Key

  12. LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History ViewInformation Actions(Redirected from Transportation Toolkit/KeyOpen

  13. Information Cartography 1 Information Cartography

    E-Print Network [OSTI]

    Old, L. John

    Information Cartography 1 Information Cartography · The use of Geographic Information Systems (GIS) to visualize non- geographic data · Utilizes Geographic Information Science to develop models and organize information--not an art form · Used to build information maps. Information maps consist of a landscape (base

  14. WORK INTEGRATED LEARNING IN THE FIELD OF INFORMATION TECHNOLOGY

    E-Print Network [OSTI]

    WORK INTEGRATED LEARNING IN THE FIELD OF INFORMATION TECHNOLOGY Work Integrated Learning (WIL for employers participating in WIL in the discipline of information technology. This is a field, where students thinking processes. Resource 3 - Information Technology #12;SOME KEY POINTS ABOUT WIL IN INFORMATION

  15. Determining the Link and Rate Popularity of Enterprise Process Information

    E-Print Network [OSTI]

    Ulm, Universität

    -oriented information logistics (POIL) to bridge this gap. POIL allows for the process-oriented and context the applicability of our approach. Key words: process-oriented information logistics, process information relevance specific process information with process tasks. However, this approach often fails due to high maintenance

  16. NATIONAL RENEWABLE ENERGY LABORATORY Outline

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICESpecialAPPENDIX FOrigin of Contamination inEnergy NARUCGreen NATIONAL

  17. BIOGRAPHICAL SKETCH Provide the following information for the Senior/key personnel and other significant contributors.

    E-Print Network [OSTI]

    Watkins, Joseph C.

    of Agriculture, Maquoketa, IA 08/92-06/93 Resident Assistant, Office of Student Affairs, Butler University

  18. BIOGRAPHICAL SKETCH Provide the following information for the key personnel and other significant contributors.

    E-Print Network [OSTI]

    Chisholm, Rex L.

    . and Stine, R.L., "Comparison of Tennis Grip Mechanics: Statistical Analysis and Projections," Contracted.B., "A Kinematic Analysis of the Tennis Serve: Establishment of a Biomechanical DataBase," Southeast, University of Kentucky, Lexington, KY. 1996 - 1998 Sales and Training Manager, Motion Analysis Corporation

  19. Road Blocks Yield Key Information about a Catalyst | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100NationalquestionnairesDrought-induced forestNovember 2012) PageRnnuRoad

  20. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  1. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  2. Using Key Performance Indicators to Manage Energy Costs 

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01

    ) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost...

  3. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  4. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-08-03

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.

  5. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  6. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  7. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  8. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  9. Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2014-10-30

    We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

  10. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  11. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  12. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  13. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  14. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  15. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  16. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  17. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  18. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  19. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  20. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  1. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  2. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  3. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  4. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  5. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  6. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  7. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  8. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  9. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  10. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  11. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  12. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  13. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  14. Securing the information infrastructure for EV charging

    E-Print Network [OSTI]

    Poll, Erik

    Securing the information infrastructure for EV charging Fabian van den Broek1 , Erik Poll1 , and B for the information exchanges in the infrastructure for EV charging being tri- alled in the Netherlands, which. Key words: EV charging, congestion management, end-to-end security, smart grids 1 Introduction

  15. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  16. FINANCIAL INFORMATION 45 Information

    E-Print Network [OSTI]

    Xie,Jiang (Linda)

    for Tuition Purposes. Copies of the Manual are available for inspection in the Library and the Residency twelve (12) months immediately prior to classification as a resident for tuition purposes. In order meets their needs. Payment plan options and additional information can be found at http

  17. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Economy Summarizes latest findings on impact of specific parameters affecting ash-related diesel particulate filter performance degradation and information useful to...

  18. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  19. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  20. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  1. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  2. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  3. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  4. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  5. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  6. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  7. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  8. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  9. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  10. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  11. Mercury Information Clearinghouse

    SciTech Connect (OSTI)

    Chad A. Wocken; Michael J. Holmes; Dennis L. Laudal; Debra F. Pflughoeft-Hassett; Greg F. Weber; Nicholas V. C. Ralston; Stanley J. Miller; Grant E. Dunham; Edwin S. Olson; Laura J. Raymond; John H. Pavlish; Everett A. Sondreal; Steven A. Benson

    2006-03-31

    The Canadian Electricity Association (CEA) identified a need and contracted the Energy & Environmental Research Center (EERC) to create and maintain an information clearinghouse on global research and development activities related to mercury emissions from coal-fired electric utilities. With the support of CEA, the Center for Air Toxic Metals{reg_sign} (CATM{reg_sign}) Affiliates, and the U.S. Department of Energy (DOE), the EERC developed comprehensive quarterly information updates that provide a detailed assessment of developments in the various areas of mercury monitoring, control, policy, and research. A total of eight topical reports were completed and are summarized and updated in this final CEA quarterly report. The original quarterly reports can be viewed at the CEA Web site (www.ceamercuryprogram.ca). In addition to a comprehensive update of previous mercury-related topics, a review of results from the CEA Mercury Program is provided. Members of Canada's coal-fired electricity generation sector (ATCO Power, EPCOR, Manitoba Hydro, New Brunswick Power, Nova Scotia Power Inc., Ontario Power Generation, SaskPower, and TransAlta) and CEA, have compiled an extensive database of information from stack-, coal-, and ash-sampling activities. Data from this effort are also available at the CEA Web site and have provided critical information for establishing and reviewing a mercury standard for Canada that is protective of environment and public health and is cost-effective. Specific goals outlined for the CEA mercury program included the following: (1) Improve emission inventories and develop management options through an intensive 2-year coal-, ash-, and stack-sampling program; (2) Promote effective stack testing through the development of guidance material and the support of on-site training on the Ontario Hydro method for employees, government representatives, and contractors on an as-needed basis; (3) Strengthen laboratory analytical capabilities through analysis and quality assurance programs; and (4) Create and maintain an information clearinghouse to ensure that all parties can keep informed on global mercury research and development activities.

  12. PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme

    E-Print Network [OSTI]

    Lan, Pang-Chang; Lee, Chia-Han; Yeh, Ping-Cheng; Cheng, Chen-Mou

    2011-01-01

    In the literature, J.-P. Cheng et al. have proposed the MIMO-OFDM PHY integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and physical-layer network coding (PNC) to prevent eavesdroppers from learning the channel state information (CSI). Nevertheless, due to the use of multiple antennas for PNC at transmitter and beamforming at receiver, it is not possible to have spatial multiplexing nor use space-time codes in our previous MOPI scheme. In this paper, we propose a variant of the MOPI scheme, called P-MOPI, that works with a cryptographic cipher and utilizes precoding matrix index (PMI) as an efficient key-exchange mechanism. With channel sounding, the PMI is only known between the transmitter and the legal receiver. The shared key can then be used, e.g., as the seed to generate pseudo random bit sequences for securing subsequent transmissions using a stream cipher. By applying the same techniques at independ...

  13. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  14. Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01

    The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

  15. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  16. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  17. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  18. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  20. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  1. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  2. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  3. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  4. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  5. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  6. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  7. Ethics and Information Technology 3: 109112, 2001. 2001 Kluwer Academic Publishers. Printed in the Netherlands.

    E-Print Network [OSTI]

    De Montfort University

    Ethics and Information Technology 3: 109­112, 2001. © 2001 Kluwer Academic Publishers. Printed "disappear". Key words: applied ethics, computer ethics, cybernetics, global ethics, information ethics ­ which Wiener named `cybernetics'. With remarkable insight, Wiener combined the concepts of cybernetics

  8. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  9. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  10. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  11. Keys to Effective FatherChild Communication What is communication, and why is it such an integral part of family life? Communication, in the context

    E-Print Network [OSTI]

    Keys to Effective Father­Child Communication What is communication, and why is it such an integral part of family life? Communication, in the context of the family, simply refers to the exchange of verbal and non-verbal information between two or more family members. It is through communication

  12. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  13. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  14. The Impact of Information Technologies on Air Transportation

    E-Print Network [OSTI]

    Hansman, R. John

    The Air Transportation System and several key subsystems including the Aircraft, Airline, and Air Traffic Management are modeled as interacting control loops. The impact of Information Technologies on each of these subsystems ...

  15. Representing the Semantics of Geographic Information in Ontologies 

    E-Print Network [OSTI]

    Ou, Yang

    2007-08-15

    Currently, one of the key issues facing applications and integration of Geographic Information Systems is the lack of interoperability among various systems due to the diversity of data representations. The semantics of ...

  16. The Whitehorse Trough is an early Mesozoic marine sedimentary basin, which extends from southern Yukon to Dease Lake in British Columbia. This paper outlines the stratigraphy and structure, and characterises the overall petroleum

    E-Print Network [OSTI]

    Johnston, Stephen T.

    from southern Yukon to Dease Lake in British Columbia. This paper outlines the stratigraphy component of the stratigraphy. Potential petroleum traps are provided by antiforms, thrust faults article souligne la stratigraphie et la structure, et caractérise l'ensemble du potentiel des ressources

  17. for ISMIS91 The Roles of Artificial Intelligence in Information Systems

    E-Print Network [OSTI]

    Wiederhold, Gio

    1 for ISMIS­91 The Roles of Artificial Intelligence in Information Systems Gio Wiederhold Stanford are suitable for artificial intelligence approaches we outline an architectural structure for large systems. In that structure processing modules become specialized. We argue that artificial intelligence programs should

  18. CODATA Proceedings: Baveno, Italy, 2000 DATA MINING THROUGH INFORMATION ASSOCIATION: A Knowledge Discovery

    E-Print Network [OSTI]

    Zaki, Mohammed Javeed

    CODATA Proceedings: Baveno, Italy, 2000 DATA MINING THROUGH INFORMATION ASSOCIATION: A Knowledge. In this paper we outline some of the basic operating principles of a tool known as ``data mining'' which when which define social and economic progress has always existed in human history. The ``Stone Age'', ``Iron

  19. CODATA Proceedings: Baveno, Italy, 2000 DATA MINING THROUGH INFORMATION ASSOCIATION: A Knowledge Discovery

    E-Print Network [OSTI]

    Zaki, Mohammed Javeed

    CODATA Proceedings: Baveno, Italy, 2000 DATA MINING THROUGH INFORMATION ASSOCIATION: A Knowledge. In this paper we outline some of the basic operating principles of a tool known as "data mining" which when which define social and economic progress has always existed in human history. The "Stone Age", "Iron

  20. General Information

    National Nuclear Security Administration (NNSA)

    Site Waste Profile Sheet - Revision 0 - February 27, 2012 (Log No. 2012-048) A. Generator Information 1. Company name: ...

  1. Bounds on Information and the Security of Quantum Cryptography

    E-Print Network [OSTI]

    E. Biahm; T. Mor

    1997-01-08

    Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed states, and we find bounds on the information leaked to an eavesdropper. Our result suggests that quantum cryptography is ultimately secure.

  2. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  3. Training Management Information System

    SciTech Connect (OSTI)

    Rackley, M.P.

    1989-01-01

    The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

  4. Complex Networks - A Key to Understanding Brain Function

    SciTech Connect (OSTI)

    Olaf Sporns

    2008-01-23

    The brain is a complex network of neurons, engaging in spontaneous and evoked activity that is thought to be the main substrate of mental life.  How this complex system works together to process information and generate coherent cognitive states, even consciousness, is not yet well understood.  In my talk I will review recent studies that have revealed characteristic structural and functional attributes of brain networks, and discuss efforts to build computational models of the brain that are informed by our growing knowledge of brain anatomy and physiology.

  5. Complex Networks - A Key to Understanding Brain Function

    ScienceCinema (OSTI)

    Olaf Sporns

    2010-01-08

    The brain is a complex network of neurons, engaging in spontaneous and evoked activity that is thought to be the main substrate of mental life.  How this complex system works together to process information and generate coherent cognitive states, even consciousness, is not yet well understood.  In my talk I will review recent studies that have revealed characteristic structural and functional attributes of brain networks, and discuss efforts to build computational models of the brain that are informed by our growing knowledge of brain anatomy and physiology.

  6. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  7. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  8. NSTX Upgrade Project STRUCTURAL CALCULATION OF THE TF FLAG KEY

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    source of design information including computer program titles and revision levels.) 1] NSTX-CALC-13] NSTX Structural Design Criteria Document, I. Zatz [3] NSTX Design Point June 2010 http://www.pppl.gov/~neumeyer/NSTX_CSU/Design blade due to the OOP torque. 3.)The shear strength of the epoxy used to bond the CRES insert into the G

  9. (This page is intentionally blank) Key Messages ................................................................................................................................................. 2

    E-Print Network [OSTI]

    Crowther, Paul

    through growth and cost saving These themes are woven throughout the report. Box 1: Government growth priorities Industrial Strategy Offshore Wind Professional Business Services Information economy Agri 12 years. Now more than half of us live in cities and more than half the countryside is used

  10. Introduction Interactive visualizations are a key aspect for

    E-Print Network [OSTI]

    Pajarola, Renato B.

    . The basic tools to visualize statistical information are chart diagrams such as pie or bar charts figures, our system can displays several thousands of pie charts at the same time even with other scene.ifi.uzh.ch Figure 3: The figure shows the U.S. presidential election data of 2011 per county. The pie charts show

  11. Information Technology: American National Standard for Information

    E-Print Network [OSTI]

    Information Technology: American National Standard for Information Systems-- Data Format 500-275 Information Technology: American National Standard for Information Systems-- Data Format Coleman, and Patrice Yuh, Editors Sponsored by Information Access Division Information Technology

  12. Information Technology: American National Standard for Information

    E-Print Network [OSTI]

    Information Technology: American National Standard for Information Systems-- Data Format-271 Information Technology: American National Standard for Information Systems-- Data Format for the Interchange Sponsored by Information Access Division Information Technology Laboratory National Institute of Standards

  13. 7 Key Challenges for Visualization in Cyber Network Defense

    SciTech Connect (OSTI)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    2014-12-02

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  14. Membranes Key to Biorefinery Success | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion Measurement

  15. Energy Storage: The Key to a Reliable, Clean Electricity Supply |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergyInformationVulnerabilities to Climate ChangeAugustEnergy

  16. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  17. Information Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Science and Technology (ASIS&T) American Society for Indexing (ASI) Digital Library Federation (DLF) National Archives and Records Administration (NARA) Special...

  18. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  19. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  20. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  1. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  2. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  3. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  4. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  5. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  6. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  7. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  8. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  9. Proceedings of the ocean energy information dissemination workshop, December 1979

    SciTech Connect (OSTI)

    Petty, D.

    1980-04-01

    The workshop was held to discuss the status of marketing ocean energy information and to develop an understanding of information needs and how to satisfy them. Presentations were made by the Solar Energy Research Institute (SERI) staff and media consultants about the effective use of audio-visual and print products, the mass media, and audience needs. Industry and government representatives reported on current efforts in each of their communication programs and outlined future plans. Four target audiences (DOE contractors, researchers, influencers, and general public) were discussed with respect to developing priorities for projects to enhance the commercialization of ocean energy technology.

  10. Scheduling information broadcast in asymmetric environment 

    E-Print Network [OSTI]

    Hameed, Sohail

    1997-01-01

    that in such environments, the server should broadcast the information periodically. Many researchers have shown their interest in this area and their nature of work covers a broad horizon. The key to efficient broadcasting lies very much on the way the schedule...

  11. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  12. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  13. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  14. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  15. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  16. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  17. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  18. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  19. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  20. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security