Powered by Deep Web Technologies
Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Fermilab Leadership Institute Integrating Internet, Instruction and  

NLE Websites -- All DOE Office Websites (Extended Search)

Fermilab Leadership Institute Integrating Fermilab Leadership Institute Integrating Internet, Instruction and Curriculum Online Materials Projects ACT Program Information Example ACT Class Page Example LInC Class Page Please sign up here to be notified of future LInC program opportunities. Fermilab LInC Online is creating a cadre of educational leaders who effectively integrate technology in their classrooms to support engaged learning student investigations on real-world issues. Participants range from classroom teachers and technology coordinators through library media specialists, who create engaged learning projects that incorporate the best uses of technology. The new Fermilab LInC ACT course guides teachers through the process of evaluating, selecting and customizing an inquiry-based online project to

2

Design and evaluation of an internet-based personalized instructional system for social psychology  

Science Conference Proceedings (OSTI)

Two iterations of an Internet-based Personalized System of Instruction (PSI) course are described. The course was designed to capitalize on the unique advantages of the PSI system while using the Internet to overcome some of its noted administrative ...

Erica Davis Blann; Donald A. Hantula

2004-01-01T23:59:59.000Z

3

Integrating multiple internet directories by instance-based learning  

E-Print Network (OSTI)

Finding desired information on the Internet is becoming increasingly difficult. Internet directories such as Yahoo!, which organize web pages into hierarchical categories, provide one solution to this problem; however, such directories are of limited use because some bias is applied both in the collection and categorization of pages. We propose a method for integrating multiple Internet directories by instance-based learning. Our method provides the mapping of categories in order to transfer documents from one directory to another, instead of simply merging two directories into one. We present herein an effective algorithm for determining similar categories between two directories via a statistical method called the k-statistic. In order to evaluate the proposed method, we conducted experiments using two actual Internet directories, Yahoo! and Google. The results show that the proposed method achieves extensive improvements relative to both the Naive Bayes and Enhanced Naive Bayes approaches, without any text analysis on documents. 1

Ryutaro Ichise; Hiedeaki Takeda; Shinichi Honiden

2003-01-01T23:59:59.000Z

4

Integrating GIS, Archeology, and the Internet.  

Science Conference Proceedings (OSTI)

At the Idaho National Engineering and Environmental Laboratory's (INEEL) Cultural Resource Management Office, a newly developed Data Management Tool (DMT) is improving management and long-term stewardship of cultural resources. The fully integrated system links an archaeological database, a historical database, and a research database to spatial data through a customized user interface using ArcIMS and Active Server Pages. Components of the new DMT are tailored specifically to the INEEL and include automated data entry forms for historic and prehistoric archaeological sites, specialized queries and reports that address both yearly and project-specific documentation requirements, and unique field recording forms. The predictive modeling component increases the DMT’s value for land use planning and long-term stewardship. The DMT enhances the efficiency of archive searches, improving customer service, oversight, and management of the large INEEL cultural resource inventory. In the future, the DMT will facilitate data sharing with regulatory agencies, tribal organizations, and the general public.

Sera White; Brenda Ringe Pace; Randy Lee

2004-08-01T23:59:59.000Z

5

Next Generation Integrated Environment for Collaborative Work Across Internets  

Science Conference Proceedings (OSTI)

We are now well-advanced in our development, prototyping and deployment of a high performance next generation Integrated Environment for Collaborative Work. The system, aimed at using the capability of ESnet and Internet2 for rapid data exchange, is based on the Virtual Room Videoconferencing System (VRVS) developed by Caltech. The VRVS system has been chosen by the Internet2 Digital Video (I2-DV) Initiative as a preferred foundation for the development of advanced video, audio and multimedia collaborative applications by the Internet2 community. Today, the system supports high-end, broadcast-quality interactivity, while enabling a wide variety of clients (Mbone, H.323) to participate in the same conference by running different standard protocols in different contexts with different bandwidth connection limitations, has a fully Web-integrated user interface, developers and administrative APIs, a widely scalable video network topology based on both multicast domains and unicast tunnels, and demonstrated multiplatform support. This has led to its rapidly expanding production use for national and international scientific collaborations in more than 60 countries. We are also in the process of creating a 'testbed video network' and developing the necessary middleware to support a set of new and essential requirements for rapid data exchange, and a high level of interactivity in large-scale scientific collaborations. These include a set of tunable, scalable differentiated network services adapted to each of the data streams associated with a large number of collaborative sessions, policy-based and network state-based resource scheduling, authentication, and optional encryption to maintain confidentiality of inter-personal communications. High performance testbed video networks will be established in ESnet and Internet2 to test and tune the implementation, using a few target application-sets.

Harvey B. Newman

2009-02-24T23:59:59.000Z

6

An integrated model of traffic, geography and economy in the Internet  

E-Print Network (OSTI)

Modeling Internet growth is important both for understanding the current network and to predict and improve its future. To date, Internet models have typically attempted to explain a subset of the following characteristics: network structure, traffic flow, geography, and economy. In this paper we present a discrete, agent-based model, that integrates all of them. We show that the model generates networks with topologies, dynamics, and (more speculatively) spatial distributions that are similar to the Internet.

Holme, Petter; Forrest, Stephanie

2008-01-01T23:59:59.000Z

7

INSTRUCTIONS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INSTRUCTIONS" INSTRUCTIONS" "* Spreadsheet is protected without a password. To unprotect, go to ." "* Project characteristic factors are listed at the end of this spreadsheet, and its values can be modified. If modified, please document accordingly." "* Spreadsheet is protected for entry only in the yellow highlighted cells allowing for up to 10 projects and/or a project with 10 FY spend profiles." "* For project characteristics except PV and PF, please select from the cell's pull down list." "* The general outputs are in the gray highlighted cells." "INPUT (instructions - enter data only in yellow highlighted cells)" "general information",,,,"project characteristics",,,,,,,,,,"comments"

8

Integrating Numerical Computation into the Modeling Instruction Curriculum  

E-Print Network (OSTI)

We describe a way to introduce physics high school students with no background in programming to computational problem-solving experiences. Our approach builds on the great strides made by the Modeling Instruction reform curriculum. This approach emphasizes the practices of "Developing and using models" and "Computational thinking" highlighted by the NRC K-12 science standards framework. We taught 9th-grade students in a Modeling-Instruction-based physics course to construct computational models using the VPython programming environment. Numerical computation within the Modeling Instruction curriculum provides coherence among the curriculum's different force and motion models, links the various representations which the curriculum employs, and extends the curriculum to include real-world problems that are inaccessible to a purely analytic approach.

Caballero, Marcos D; Aiken, John M; Douglas, Scott S; Scanlon, Erin M; Thoms, Brian; Schatz, Michael F

2012-01-01T23:59:59.000Z

9

Information in Place: Integrating Sustainability into Information Literacy Instruction  

E-Print Network (OSTI)

Task Force. (2009). Library Information Literacy Curriculum.Research Libraries. (2004). Information literacy competencyInformation in Place: Integrating Sustainability into

Stark, Megan R

2011-01-01T23:59:59.000Z

10

Instructions for Web VPN Connectivity  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Instructions for WebVPN Connectivity October 2010 2 Requirements Web Browser (Internet Explorer, Firefox, Safari, MSN Explorer, etc.) Internet Connection (Preferably Broadband)...

11

Integrated mobile GIS and wireless internet map servers for environmental monitoring and management  

E-Print Network (OSTI)

ABSTRACT: With the progress of mobile GIS technology there is a great potential for adopting wireless communications and Internet mapping services for regional environmental management programs and natural habitat conservation. This paper provides an overview of a NASA-funded research project that focuses on the development of mobile GIS tools and wireless Internet Map Server (IMS) services to facilitate environmental monitoring and management tasks. By developing and testing wireless web-based map/image servers, mobile GIS applications, and global positional systems (GPS), this research created an integrated software/hardware infrastructure for a prototype mobile GIS application. The mobile GIS prototype allows multiple resource managers and park rangers to access large-size, remotely sensed images and GIS layers from a portable web server mounted in a vehicle. Users can conduct real-time spatial data updates and/or submit changes back to the web server over the wireless local area network (WLAN). This paper discusses in general the major components of mobile GIS, their current technological limitations, and potential problems during implementation. Key research agenda for mobile GIS are identified with suggestions for future research and development.

Ming-hsiang Tsou

2004-01-01T23:59:59.000Z

12

1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2004  

E-Print Network (OSTI)

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

Kocur, George

13

1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2002  

E-Print Network (OSTI)

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

Kocur, George

14

An integrated system to remote monitor and control anaerobic wastewater treatment plants through the internet  

E-Print Network (OSTI)

and manages the problem. Keywords Anaerobic digestion, automation, control, fault detection and isolationAn integrated system to remote monitor and control anaerobic wastewater treatment plants through of the anaerobic wastewater treatment plants that do not benefit from a local expert in wastewater treatment

Bernard, Olivier

15

Internet Fish  

E-Print Network (OSTI)

I have invented "Internet Fish," a novel class of resource-discovery tools designed to help users extract useful information from the Internet. Internet Fish (IFish) are semi-autonomous, persistent information brokers; ...

LaMacchia, Brian A.

1996-08-01T23:59:59.000Z

16

Research challenges towards the Future Internet  

Science Conference Proceedings (OSTI)

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture ... Keywords: Cognitive networks, Data and communication security, Future internet, Green networking, Internet architecture and protocols, Optical networks, System security, Wireless networks

Marco Conti; Song Chong; Serge Fdida; Weijia Jia; Holger Karl; Ying-Dar Lin; Petri Mähönen; Martin Maier; Refik Molva; Steve Uhlig; Moshe Zukerman

2011-12-01T23:59:59.000Z

17

InstructIons  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

InstructIons InstructIons for AccessIng fedconnect PostIngs The registration process requires multiple steps prior to submission, so please plan in advance as late applications will not be accepted. Note that for some applications, a Letter of Intent must be filed prior to the final deadline. To access the complete postings, follow the below steps: 1. Go to https://www.FedConnect.net/ 2. Click on "Search Public Opportunities" 3. Select "Reference Number" in the Search Criteria drop down box and then enter the Reference Number of the funding opportunity you are interested in (DE-FOA-XXXXXXX), followed by clicking the "Search" button 4. Click on the appropriate link after search results are displayed

18

Instructions for the Supporting Statement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

C:\Documents and Settings\loganla\Local Settings\Temporary Internet Files\Content.Outlook\UZP4FQGA\Instructions for the Supporting C:\Documents and Settings\loganla\Local Settings\Temporary Internet Files\Content.Outlook\UZP4FQGA\Instructions for the Supporting Statementrev-includes BH table.doc General Instructions A Supporting Statement must accompany each request for approval of a collection of information. The Supporting Statement must be prepared in the format described below. If an item is not applicable, provide a brief explanation. When Item 17 of the OMB 83-I is checked "YES", Section B of the Supporting Statement must be completed. OMB reserves the right to require the submission of additional information with respect to any request for approval. Instructions for the Supporting Statement Each request for OMB approval of an information collection must include a Supporting

19

LITERATURE SEARCH TUTORIAL Open Internet Browser  

E-Print Network (OSTI)

://www.ncbi.nlm.nih.gov/entrez/query.fcgi · To search PubMed--fill in search box enter search terms, or enter author name, or journal titles--see instructions written below search box. To obtain detailed instructions on how to enter items, click on blueLITERATURE SEARCH TUTORIAL · Open Internet Browser · Go to http

Dratz, Edward A.

20

KMD Search Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

KMD Search Instructions KMD Search Instructions KMD Search Instructions Using the Document Database KMD Logo In this search form you can search the title and abstract of documents that have been stored in an SQL database. The more key words that are entered by the user will allow a more focused search (e.g. Appalachian Basin Shale Gas drilling) and return the most relevant results with the most recent date. This database includes oil and gas documents from the CD/DVD library, the NETL Internet site, the NETL Project Management Information System (ProMIS), the Tulsa Project Office, and links to hardcopy documents currently available from the NETL library. Links to relevant offsite documents from the Office of Science and Technical Information (OSTI) are also included. Restricted Characters in searches

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

FINAL DEMAND FORECAST FORMS AND INSTRUCTIONS FOR THE 2007  

E-Print Network (OSTI)

CALIFORNIA ENERGY COMMISSION FINAL DEMAND FORECAST FORMS AND INSTRUCTIONS FOR THE 2007 INTEGRATED Table of Contents General Instructions for Demand Forecast Submittals.............................................................................. 4 Protocols for Submitted Demand Forecasts

22

WEB RESOURCE: Central Internet Database - TMS  

Science Conference Proceedings (OSTI)

May 15, 2007 ... Topic Title: WEB RESOURCE: Central Internet Database Topic Summary: DOE. Integrates waste management and cleanup data from multiple ...

23

Instructions for WebVPN Connectivity  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Instructions for WebVPN Connectivity Instructions for WebVPN Connectivity November 2013 Requirements * Web Browser (Internet Explorer, Firefox, Safari, Internet Explorer, etc.) * Internet Connection (Preferably Broadband) * RSA Token or HSPD12 Smart Card Background The clientless WebVPN connectivity option being offered by the OCIO significantly enhances the speed as well as the interoperability between different operating systems/Internet service providers (ISP) which results in an improved overall user experience when using VPN services to access corporate applications remotely. WebVPN allows a remote user to access Outlook Web Access, Citrix Workplace Environment (CWE), and other web-based applications from any computer with an Internet connection, with no requirement for additional software to be downloaded and installed to the remote machine.

24

Internet 0  

E-Print Network (OSTI)

The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

Krikorian, Raffi Chant, 1978-

2004-01-01T23:59:59.000Z

25

IoT-IMS Communication Platform for Future Internet  

Science Conference Proceedings (OSTI)

In recent years, Internet of Things (IoT) and Cloud Computing are the hottest issues of Future Internet. However, there is a lack of common fabric for integrating IoT and Cloud. In telecommunications, the IMS (IP Multimedia Subsystem), based on the All-IP ... Keywords: Cloud Computing, Future Internet, IP Multimedia Subsystem, Internet of Things, Next Generation Network

Chi-Yuan Chen; Yuh-Shyan Chen; Han-Chieh Chao; Tin-Yu Wu; Chun-I Fan; Jiann-Liang Chen; Jenq-Muh Hsu

2011-10-01T23:59:59.000Z

26

Components of Internet GIS  

E-Print Network (OSTI)

Internet GIS: a research field A research and application area that utilize Internet and other Internetworking systems to facilitate:

Imad Abugessaisa; M. Tsou

2007-01-01T23:59:59.000Z

27

Antikerezeption im Internet.  

E-Print Network (OSTI)

??Die Dissertation 'Antikerezeption im Internet' untersucht, wie das Wissen über die Antike im Medium Internet erscheint. Zunächst wird mit Rekurs auf die konstruktivistische Systemtheorie ein… (more)

Bechthold-Hengelhaupt, Tilman

2012-01-01T23:59:59.000Z

28

Record Sheet For The Internet  

NLE Websites -- All DOE Office Websites (Extended Search)

Record Sheet for Internet Information Student Names Brief Description of Information Internet URL...

29

Reviewer Instructions:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Reviewer Instructions: Reviewer Instructions: 1. All review comments to be provided electronically using this review form. 2. Focus the review on substantive issues within your disciplinary, regulatory, or policy area. 3. Look only at the portions relevant to your agency and the land under your management. The individual land management agencies will be amending land use plans or issuing a Record of Decision, so please don't alter the other agencies' roles and responsibilities. 4. Target the review on the adequacy and reasonableness of text and analyses within your disciplinary, regulatory, or policy area. Please be aware that this is a programmatic EIS. 5. All comments should be as specific as possible. Comments such as "text unclear" or "expand" do not provide sufficient

30

Integrating Technology into Classroom Instruction.  

E-Print Network (OSTI)

??Technology has become increasingly saturated into the very fabric of students' daily lives. They are exposed to and use technology in every facet of their… (more)

Ritzenthaler, Mark D.

2009-01-01T23:59:59.000Z

31

Strategy formulation by internet entrepreneurs.  

E-Print Network (OSTI)

??[Truncated abstract] Poor strategy development by Internet entrepreneurs has been linked to the failure of Internet firms. Unfortunately, little is known about successful Internet entrepreneurs… (more)

Mahadim, Batiah

2011-01-01T23:59:59.000Z

32

Dynamic Instruction Fusion  

E-Print Network (OSTI)

SANTA CRUZ DYNAMIC INSTRUCTION FUSION A thesis submitted in4 2.2 Instruction Fusion & Complex10 3.1 Fusion Selection

Lee, Ian

2012-01-01T23:59:59.000Z

33

Reading Comprehension - Internet Safety  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Safety Twenty hours days weeks years ago, kids in school had never even heard of the internet. Now, I'll bet you can't find a single person in your school who...

34

Internet Control Architecture for Internet-Based Personal Robot  

Science Conference Proceedings (OSTI)

This paper proposes a novel direct internet control architecture for internet-based personal robot, which is insensitive to the inherent internet time delay. The personal robot can be controlled using a simulator provided at a local site. Since the internet ... Keywords: internet control, internet interface, personal robot, remote control, telerobotics

Kuk-Hyun Han; Sinn Kim; Yong-Jae Kim; Jong-Hwan Kim

2001-03-01T23:59:59.000Z

35

Impact of Internet Literacy, Internet Addiction Symptoms, and Internet Activities on Academic Performance  

Science Conference Proceedings (OSTI)

This study examines the interrelationships among Internet literacy, Internet addiction symptoms, Internet activities, and academic performance. Data were gathered from a probability sample of 718 children and adolescents, aged 9-19, in Hong Kong, using ... Keywords: Internet activities, Internet addiction symptoms, Internet literacy, academic performance, adolescents and children

Louis Leung; Paul S. N. Lee

2012-11-01T23:59:59.000Z

36

Synthesis of application specific instruction sets  

E-Print Network (OSTI)

An instruction set serves as the interface between hardware and software in a computer system. In an application specific environment, the system per-formance can be improved by designing an instruction set that matches the characteristics of hardware and the application. We present a systematic approach to generate application-specific instruction sets so that software applications can be efficiently mapped to a given pipelined microarchitec-ture. The approach synthesizes instruction sets from application bench-marks, given a machine model, an objective function, and a set of design constraints. In addition, assembly code is generated to show how the benchmarks can be compiled with the synthesized instruction set. The problem of designing instruction sets is formulated as a modified schedul-ing problem. A binary tuple is proposed to model the semantics of instruc-tions and integrate the instruction formation process into the scheduling process. A simulated annealing scheme is used to solve for the schedules. Experiments have shown that the approach is capable of synthesizing pow-erful instructions for modern pipelined micro-processors, and running with reasonable time and a modest amount of memory for large applications.

Ing-jer Huang

1995-01-01T23:59:59.000Z

37

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

38

Document Control Template-Instruction  

NLE Websites -- All DOE Office Websites (Extended Search)

2ADocument Control Template - Instruction.doc Page 1 of 6 EOTA - Business Instruction Document Title: Document Control Template - Instruction Document Number: F-002 Rev. A...

39

Internet Users’ Glossary  

E-Print Network (OSTI)

Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them. Acknowledgements This document is the work of the User Glossary Working Group of the

G. Malkin; Xylogics Inc; T. Laquey Parker

1993-01-01T23:59:59.000Z

40

Central Internet Database (CID)  

Office of Environmental Management (EM)

RADCM-13 Reports Central Internet Database CID Photo Banner RADCM-13 Archived Reports By State California Adobe PDF Document Colorado Adobe PDF Document Idaho Adobe PDF Document...

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Internet Banking System Prototype  

E-Print Network (OSTI)

Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained through Internet Banking may mirror products and services offered through other bank delivery channels. In this paper, Internet Banking System Prototype has been proposed in order to illustrate the services which is provided by the Bank online services.

Alnaqeib, Rami; Jalab, Hamid A; Zaidan, M A; Hmood, Ali K

2010-01-01T23:59:59.000Z

42

2011Form EIA-902 Instructions  

U.S. Energy Information Administration (EIA) Indexed Site

FORM EIA-902 ANNUAL GEOTHERMAL HEAT PUMP SHIPMENTS REPORT GENERAL INFORMATION AND INSTRUCTIONS I. Purpose Form EIA-902 is designed to provide the data necessary for the U.S. Energy Information Administration (EIA), a part of the U.S. Department of Energy (DOE), to carry out its responsibilities tracking heat pump shipments in the geothermal heat pump industry and reporting information concerning the size and status of the industry. The data collected will be published in the Renewable Energy Annual and also be available through EIA's Internet site at http://www.eia.gov/fuelrenewable.html. II. Who Should Respond to This Survey This report is mandatory and required pursuant to the authority granted to the Department of Energy (DOE) by the Federal Energy Information Administration Act of 1974 (Public Law 93-

43

of Internet-based Capabilities References: See Attachment 1  

E-Print Network (OSTI)

responsible and effective use of Internet-based capabilities, including social networking services (SNS). This policy recognizes that Internet-based capabilities are integral to operations across the Department of Defense. This DTM is effective immediately; it will be converted to a new

unknown authors

2012-01-01T23:59:59.000Z

44

Accountable internet protocol (aip)  

Science Conference Proceedings (OSTI)

This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding ... Keywords: accountability, address, internet architecture, scalability, security

David G. Andersen; Hari Balakrishnan; Nick Feamster; Teemu Koponen; Daekyeong Moon; Scott Shenker

2008-08-01T23:59:59.000Z

45

Internet of Food  

Science Conference Proceedings (OSTI)

Today, more and more "things" have an IP identity and thus are able to communicate with each other though the Internet. According to the definition of WIKIPEDIA [1], The IP identity of things (or Internet of Things), refers to uniquely identifiable objects ...

Jean-Paul Kouma; Li Liu

2011-10-01T23:59:59.000Z

46

Depleted UF6 Internet Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

DUF6 Guide DU Uses DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home Internet Resources Depleted UF6 Internet Resources Links...

47

Photovoltaic system planning tool with internet access  

Science Conference Proceedings (OSTI)

This paper presents advanced planning models integrated into a GIS-computational tool, based on a Geographic Information System, for evaluating solar energy resources, selecting the most suitable photovoltaic technology, and calculating the cost associated ... Keywords: distributed generation planning, internet GIS services, photovoltaic systems

I. J. Ramírez-Rosado; P. J. Zorzano-Santamaría; L. A. Fernández-Jiménez; E. García-Garrido

2007-01-01T23:59:59.000Z

48

Instructions for Accessing SIS  

Science Conference Proceedings (OSTI)

... Launch an Internet Browser session. Click “Tools”, and “Options”. Click the “Advanced” tab. Scroll to the bottom of the “Settings” box. ...

2011-01-07T23:59:59.000Z

49

Internet Topology over Time  

E-Print Network (OSTI)

There are few studies that look closely at how the topology of the Internet evolves over time; most focus on snapshots taken at a particular point in time. In this paper, we investigate the evolution of the topology of the Autonomous Systems graph of the Internet, examining how eight commonly-used topological measures change from January 2002 to January 2010. We find that the distributions of most of the measures remain unchanged, except for average path length and clustering coefficient. The average path length has slowly and steadily increased since 2005 and the average clustering coefficient has steadily declined. We hypothesize that these changes are due to changes in peering policies as the Internet evolves. We also investigate a surprising feature, namely that the maximum degree has changed little, an aspect that cannot be captured without modeling link deletion. Our results suggest that evaluating models of the Internet graph by comparing steady-state generated topologies to snapshots of the real data ...

Edwards, Benjamin; Stelle, George; Forrest, Stephanie

2012-01-01T23:59:59.000Z

50

Airborne Internet : market & opportunity  

E-Print Network (OSTI)

The purpose of this thesis to evaluate the opportunity for service provider entry and of the airborne internet, to analyze the disruptive impact technology used by AirCell and AeroSat has had on the development of an ...

Bhadouria, Anand

2007-01-01T23:59:59.000Z

51

ERIP application instructions  

SciTech Connect

This report provides background information and instructions to assist applicants in writing Energy-Related Inventions Program (ERIP) applications. Initial feedback fro usage for the new instructions shows that the best instructions would not be read and followed by all applicants. Applications from more than thirty applicants who have received the new instructions indicated that few had read the instructions. Based on this feedback, the instructions have been further revised to include a title page and table of contents. A warning was also added to advise applicants of the potential penalty of delayed review if these instructions are not followed. This revision was intended to address the possibility that some applicants did not see or bother to follow the instructions which followed the background information about ERIP. Included are two examples of ERIP applications which have been prepared for handout at workshops or mailing to applicants. Writing of example applications was time consuming and more difficult than expected for several reasons: (1) Full disclosures can be lengthy, very detailed, and technical. This contrasts with the desire to prepare examples which are comparatively short and easy for the non-technical person to read. (2) Disclosures contain confidential information which should not be published. (3) It is difficult to imagine that applicants will study examples when they do not bother to read the basic instructions.

Watt, D.M.

1992-01-02T23:59:59.000Z

52

Characterizing internet scams through underground infrastructure infiltration  

E-Print Network (OSTI)

Charac- terizing Internet Scam Hosting Infrastructure. In2010. [29] Ironport. 2008 Internet Security Trends. http://DrugRevenue) emerge as major Internet threats. http://

Kanich, Christopher William

2012-01-01T23:59:59.000Z

53

Graph Algorithms in the Internet Age  

E-Print Network (OSTI)

given expected degrees. Internet Mathematics, 1(1), 2003. [law relationships of the internet topology. SIGCOMM, pagesto generate annotated internet topologies. SIGCOMM, pages [

Stanton, Isabelle Lesley

2012-01-01T23:59:59.000Z

54

RFP Instructions to Offerors  

NLE Websites -- All DOE Office Websites (Extended Search)

ITO (Rev. 10.1, 2/27/13) Instructions to Offerors ITO (Rev. 10.1, 2/27/13) Instructions to Offerors Dated 5-24-13 RFP No. 241314 Page 1 of 17 Los Alamos National Security, LLC (LANS) Los Alamos National Laboratory (LANL) REQUEST FOR PROPOSAL INSTRUCTIONS TO OFFERORS TABLE OF CONTENTS No. Title Page 1. GENERAL (Mar 2012)...................................................................................................................... 2 2. AMENDMENT OF SOLICITATION (Mar 2012) ............................................................................... 2 3. PREPARATION AND SUBMISSION OF PROPOSALS (Feb 2013 - Deviation) ............................. 2 4. BASIS OF AWARD - BEST VALUE (Mar 2012) ............................................................................. 7 5. OTHER AWARD CONSIDERATIONS (Mar 2012) ........................................................................ 10

55

Internet Evolution and Social Impact  

E-Print Network (OSTI)

Earlier HomeNet publications reported small but reliable negative effects of using the Internet on measures of social involvement and psychological well-being among new Internet users in a sample of Pittsburgh families in 1995--1996. The effects were called a "paradox" because participants in the sample used the Internet heavily for communication, which typically has positive effects on well-being. Since that first study, the Internet changed markedly, giving people much greater choice of contacts, activities, and information.

Sara Kiesler; Robert Kraut; Jonathon Cummings; Vicki Helgeson; Anne Crawford

2002-01-01T23:59:59.000Z

56

An intermittent energy internet architecture  

Science Conference Proceedings (OSTI)

We examine how to re-design the Internet for an energy-constrained future powered by diffuse, intermittent, and expensive power sources. We consider the types of constraints this might place upon the Internet architecture and the manner in which important ... Keywords: energy, internet architecture

Barath Raghavan; David Irwin; Jeannie Albrecht; Justin Ma; Adam Streed

2012-05-01T23:59:59.000Z

57

IPS - Secure Internet Payment System  

Science Conference Proceedings (OSTI)

There are a number of questions one might ask about security of money transactions on the Internet. A first question might be: "Why do we need to protect money transaction on the Internet?" The Internet is an insecure and unreliable communication medium ...

Zoran Djuric

2005-04-01T23:59:59.000Z

58

Internet geolocation: Evasion and counterevasion  

Science Conference Proceedings (OSTI)

Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to ... Keywords: Internet geolocation, Tor, adversarial environment, anonymizing network, evasion

James A. Muir; Paul C. Van Oorschot

2009-12-01T23:59:59.000Z

59

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 29, 2007 INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" i Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

60

Evaluating Our Instruction: Surveys  

E-Print Network (OSTI)

you put in; and as the grandest mill in the world will not extract wheat flour from peascod, so pagesEvaluating Our Instruction: Surveys Mathematics may be compared to a mill of exquisite workmanship

Maryland at College Park, University of

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Executive Order 13423 Implementing Instructions  

Energy.gov (U.S. Department of Energy (DOE))

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423“Strengthening Federal Environmental, Energy, and Transportation Management”

62

(for Gene Recognition Analysis Internet Link),  

NLE Websites -- All DOE Office Websites (Extended Search)

5 6/1/2011 5 6/1/2011 6.6 Speeding Up the Process of Gene Discovery The human genome contains information that could be used to prevent birth defects and treat or cure devastating diseases, but it is written in a language that scientists are only beginning to understand. To help decipher the code, Ed Uberbacher and colleagues at Oak Ridge National Laboratory combined cutting- edge computer technology with their knowledge of human biology to develop GRAIL (for Gene Recognition Analysis Internet Link), a "thinking" computer program that imitates the human learning process as it searches for genetic meaning. GRAIL and successor software programs can rapidly identify key instructions in genes from within vast stretches of DNA that appear to be meaningless-a critical contribution to the

63

Så kommer vi alltid in på internet; Everything concerns internet.  

E-Print Network (OSTI)

?? Internet har i över 20 år påverkat samhällets förutsättningar, så även skolans arbetssätt och undervisningssituation. Förändringarna i samhällssektorn avspeglar sig inte minst i samhällskunskapsämnet… (more)

Dahlström, Täpp Ida

2013-01-01T23:59:59.000Z

64

2011 Form EIA-63A Instructions  

U.S. Energy Information Administration (EIA) Indexed Site

U. S. DEPARTMENT OF ENERGY U. S. DEPARTMENT OF ENERGY Form Approved U.S. ENERGY INFORMATION ADMINISTRATION OMB No. 1905-0196 Washington, DC 20585 Expires: 12/31/2013 FORM EIA-63A ANNUAL SOLAR THERMAL COLLECTOR/REFLECTOR SHIPMENTS REPORT GENERAL INFORMATION AND INSTRUCTIONS I. Purpose Form EIA-63A is designed to provide the data necessary for the U.S. Energy Information Administration (EIA), a part of the U.S. Department of Energy (DOE), to carry out its responsibilities tracking collector/reflector shipments in the solar thermal industry and reporting information concerning the size and status of the industry. The data collected will be published in the Renewable Energy Annual and also be available through EIA's Internet site at http://www.eia.gov/fuelrenewable.html.

65

Internet Support for Engaged Learning  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Support for Student Engagement in Science Skills and strategies students need to be successful today and in the future are effectively taught through engagement in...

66

Central Internet Database (CID) Home  

Office of Environmental Management (EM)

Banner Welcome to the updated Central Internet Database (CID) The CID is a gateway to waste management and facility information from current and archived Department of Energy...

67

Internet Security Glossary, Version 2  

E-Print Network (OSTI)

not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007).

R. Shirey

2006-01-01T23:59:59.000Z

68

From the internet of computers to the internet of things  

Science Conference Proceedings (OSTI)

This paper discusses the vision, the challenges, possible usage scenarios and technological building blocks of the "Internet of Things". In particular, we consider RFID and other important technological developments such as IP stacks and web servers ... Keywords: RFID, internet of things, smart objects, wireless sensor networks

Friedemann Mattern; Christian Floerkemeier

2010-01-01T23:59:59.000Z

69

Internet voting: structural governance principles for election cyber security in democratic nations  

Science Conference Proceedings (OSTI)

In Europe, the U.S., and Asia, political and market forces seek expanded use of the Internet for voting and election administrative functions. Governmental responses have differed, but commonly governments omit qualified computer security experts from ... Keywords: assurance, cybersecurity, elections, governance, integrity, internet, mitigations, security, threats, transparency, voting

Candice Hoke

2010-12-01T23:59:59.000Z

70

Auction-based Bandwidth Allocation Mechanisms for Wireless Future Internet  

E-Print Network (OSTI)

An important aspect of the Future Internet is the efficient utilization of (wireless) network resources. In order for the - demanding in terms of QoS - Future Internet services to be provided, the current trend is evolving towards an "integrated" wireless network access model that enables users to enjoy mobility, seamless access and high quality of service in an all-IP network on an "Anytime, Anywhere" basis. The term "integrated" is used to denote that the Future Internet wireless "last mile" is expected to comprise multiple heterogeneous geographically coexisting wireless networks, each having different capacity and coverage radius. The efficient management of the wireless access network resources is crucial due to their scarcity that renders wireless access a potential bottleneck for the provision of high quality services. In this paper we propose an auction mechanism for allocating the bandwidth of such a network so that efficiency is attained, i.e. social welfare is maximized. In particular, we propose a...

Dramitinos, Emmanouil

2010-01-01T23:59:59.000Z

71

Internet governance: A personal perspective  

Science Conference Proceedings (OSTI)

Internet governance is one of the hot issues that emerged during the World Summit on the Information Society (WSIS) in Tunis November 2005. The discussions did not start then but much earlier. This article gives an overview of the International Telecommunciation ... Keywords: ITU, WSIS, governance, internet

Houlin Zhao

2007-01-01T23:59:59.000Z

72

ORISE: Instructional Design and Development  

NLE Websites -- All DOE Office Websites (Extended Search)

Instructional Design and Development Instructional Design and Development The Oak Ridge Institute for Science and Education (ORISE) works with government agencies and organizations to create customized training and instructional design programs, from traditional classroom teaching to online education. ORISE uses a multi-step process to define the instructional design and development needs. Our process includes: Defining the target audience and objectives Designing and developing the program and materials Piloting, delivering and managing the training Evaluating the final product Whether a small- or large-scale effort, ORISE helps determine the most effective approach based on needs and resources, which may include: Collaborative experiences Interactive simulations Self-paced tutorials Guided instructions

73

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

74

Step by Step Instructions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Step by Step Instructions Step by Step Instructions For Completing An Information Collection Request 1. A determination must be made if a Federal entity has an Information Collection Request (ICR). To assist in making that determination, the Paperwork Reduction Act (PRA)states the following: The PRA requires each Federal agency to seek and obtain Office of Management and Budget (OMB) approval before undertaking a collection of information directed to ten or more people of the general public, including federal contractors, or continuing a collection for which the OMB approval and validity of the OMB control number are about to expire. 2. Once it's been determined that a program has an ICR, the program works with their Headquarters Point of Contact (POC) and prepare a 60-day Federal

75

INTERNET PRIVACY, IG-0493 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home INTERNET PRIVACY, IG-0493 INTERNET PRIVACY, IG-0493 Recently enacted appropriations law required agency Inspectors General to report within 60 days on the collection...

76

LIBRARY TUTORIAL 1. Open Internet  

E-Print Network (OSTI)

. Search PubMed--fill in search box enter search terms, or enter author name, or journal titles--see instructions written below search box. To obtain detailed instructions on how to enter items, click on blue://www.lib.montana.edu and click on JOURNALIST. Enter the journal name and go. It will give you a listing of the journals

Dratz, Edward A.

77

ISReal: an open platform for semantic-based 3D simulations in the 3D internet  

Science Conference Proceedings (OSTI)

We present the first open and cross-disciplinary 3D Internet research platform, called ISReal, for intelligent 3D simulation of realities. Its core innovation is the comprehensively integrated application of semantic Web technologies, semantic services, ...

Patrick Kapahnke; Pascal Liedtke; Stefan Nesbigall; Stefan Warwas; Matthias Klusch

2010-11-01T23:59:59.000Z

78

Architecture of participation : the realization of the Semantic Web, and Internet OS  

E-Print Network (OSTI)

The Internet and World Wide Web (WWW) is becoming an integral part of our daily life and touching every part of the society around the world including both well-developed and developing countries. The simple technology and ...

Lau, Shelley

2008-01-01T23:59:59.000Z

79

SSH - Secure Login Connections over the Internet  

E-Print Network (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or threekey triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection. 1 Introduction The Internet has become the most economical means for communication between two remote sites. Its uses include comm...

Tatu Ylonen Ssh; Tatu Ylonen; Tatu Ylonen

1996-01-01T23:59:59.000Z

80

SSH - Secure Login Connections over the Internet  

E-Print Network (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or threekey triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection. 1 Introduction The Internet has become the most economical means for communication between two remote sites. Its uses include commun...

Tatu Ylönen

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

of Internet-based Capabilities References: See Attachment 1  

E-Print Network (OSTI)

responsible and effective use of Internet-based capabilities, including social networking services (SNS). This policy recognizes that Internet-based capabilities are integral to operations across the Department of Defense. This DTM is effective immediately; it will be converted to a new DoD issuance. This DTM shall expire effective 1 March, 2011 January 2012. Applicability. This DTM applies to: • OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector

unknown authors

2011-01-01T23:59:59.000Z

82

Automated Personalization of Internet News  

Science Conference Proceedings (OSTI)

A systems approach to the automatic and adaptive personalization of Internet news is described. Implemented on the client side as a lightweight, transparent software system, this approach is based on implicit user feedback, thereby preserving privacy ...

Aditya V. Sunderam

2002-05-01T23:59:59.000Z

83

Legal aspects of Internet governance reform  

Science Conference Proceedings (OSTI)

The Internet has moved on from its early almost lawless nature. There are now multiple organisations and legal aspects associated with Internet governance. Whether the issue on the Internet is network security, intellectual property rights (IPRs), e-commerce, ... Keywords: ICANN, WGIG, WSIS, cybercrime, framework, governance, internet, law, reform, treaty

David Satola

2007-01-01T23:59:59.000Z

84

Integrated dense array and transect MT surveying at dixie valley...  

Open Energy Info (EERE)

2007 DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Integrated dense array and transect MT surveying at dixie valley geothermal...

85

Performance Evaluation of a Decoded Instruction Cache for Variable Instruction Length Computers  

Science Conference Proceedings (OSTI)

A Decoded INstruction Cache (DINC) is a buffer between the instruction decoder and other instruction pipeline stages. In this paper, we explain how techniques that reduce the branch penalty on a DINC, can improve CPU performance. We also analyze the ... Keywords: UNIX applications., buffer storage, computer architecture, decoded instruction cache, instruction decoder, instruction length distribution, instruction pipeline stages, performance evaluation, trace driven simulations, variable instruction length computers

G. D. Intrater; I. Y. Spillinger

1994-10-01T23:59:59.000Z

86

Learning to interpret natural language instructions  

Science Conference Proceedings (OSTI)

This paper addresses the problem of training an artificial agent to follow verbal instructions representing high-level tasks using a set of instructions paired with demonstration traces of appropriate behavior. From this data, a mapping from instructions ...

Monica Babe?-Vroman; James MacGlashan; Ruoyuan Gao; Kevin Winner; Richard Adjogah; Marie desJardins; Michael Littman; Smaranda Muresan

2012-06-01T23:59:59.000Z

87

NETL: Energy Analysis - Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Analysis Analysis Instructions Using the Database In this search form you can search using the following tools: Title and Synopsis/Keywords Author Program/Technology Publication Type Publication Date Title and Synopsis/Keywords Enter as many keywords as needed but remember that all keywords would have to be included within the Title/Synopsis to receive a return. Select the KEYWORD SEARCH checkbox if you want it to return on any word. For greater returns, limit the amount of keywords entered per search. Use the plus sign (+) to search for a multi-word phrase. For example, to find the phrase "2010 Coal Database", enter "2010+Coal+Database". This will return results that contain matches on this three word phrase. Author It is best to search on an author's last name since first name might be stored as initials or an abbreviation such as Tom or Thomas.

88

Form EIA-861 Instructions  

U.S. Energy Information Administration (EIA) Indexed Site

ANNUAL ELECTRIC POWER ANNUAL ELECTRIC POWER INDUSTRY REPORT Form EIA-861 OMB No. 1905-0129 Approval Expires: 12/31/2015 Burden: 9 Hours NOTICE: This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For further information concerning sanctions and data protections see the provisions on sanctions and the provisions concerning the confidentiality of information in the instructions. Title 18 U.S.C. 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction.

89

Form EIA-861 Instructions  

U.S. Energy Information Administration (EIA) Indexed Site

ANNUAL ELECTRIC POWER ANNUAL ELECTRIC POWER INDUSTRY REPORT INSTRUCTIONS FORM EIA-861 OMB No. 1905-0129 Approval Expires: 12/31/2015 Burden: 9.0 hrs PURPOSE Form EIA-861 collects information on the status of electric power industry participants involved in the generation, transmission, and distribution of electric energy in the United States, its territories, and Puerto Rico. The data from this form are used to accurately maintain the EIA list of electric utilities, to draw samples for other electric power surveys, and to provide input for the following EIA reports: Electric Power Monthly, Monthly Energy Review, Electric Power Annual, Annual Energy Outlook, and Annual Energy Review. The data collected on this form are used to monitor the current status and trends of the electric power industry and to evaluate the future

90

Internet Slang and China's Social Culture: A Case Study of Internet Users in Guiyang.  

E-Print Network (OSTI)

??The number of Chinese Internet users has surpassed 300,000 people over the past decade, and the Internet boom has brought with it an upsurge in… (more)

Draggeim, Alexandra V

2013-01-01T23:59:59.000Z

91

Internet Data Analysis for the Undergraduate Statistics Curriculum  

E-Print Network (OSTI)

Haythornthwaite edts. (2002). The Internet in Everyday Life.Where Mathematics meets the Internet. Notices of the AMS,Internet Data Analysis for the Undergraduate Statitics

Juana Sanchez; Yan He

2011-01-01T23:59:59.000Z

92

Internet ware cloud computing :Challenges  

E-Print Network (OSTI)

After decades of engineering development and infrastructural investment, Internet connections have become commodity product in many countries, and Internet scale "cloud computing" has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internet ware Cloud Computing is termed as the next big thing in the modern corporate world. Apart from the present day software and technologies, cloud computing will have a growing impact on enterprise IT and business activities in many large organizations. This paper provides an insight to cloud computing, its impacts and discusses various issues that business organizations face while implementing cloud computing. Further, it recommends various strategies that organizations need to adopt while migrating to cloud computing. The purpose of this paper is to develop an understanding of cloud computing in the modern world and its impact on organizations and businesse...

Qamar, S; Singh, Mrityunjay

2010-01-01T23:59:59.000Z

93

Internet Data logging and Display  

E-Print Network (OSTI)

The current energy savings technology relies on conventional data logging systems, in which two major barriers exist. Formost is the fact that retrieving the energy data is not convenient, and the cost of the data logging equipment is high. The solution presented here is to accomplish these goals is to include a miniature web server in a remote-logging module, which we designed as part of our device. Thus allowing data to be accessed more frequently, via the Internet. As it currently stands, the state of California in the United States is experiencing power grid problems as residential and industrial energy demands increase. If an energy savings program is to be implemented, then an energy monitoring strategy must also devised. Our Internet appliance provides a solution, and this paper summarizes our implementation details and provides a computer screen-capture of the data being posted onto the Internet.

Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

2001-01-01T23:59:59.000Z

94

Instructions for the Supporting Statement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

C:Documents and SettingsloganlaLocal SettingsTemporary Internet FilesContent.OutlookUZP4FQGAInstructions for the Supporting Statementrev-includes BH table.doc General...

95

Sustaining the Internet with hyperbolic mapping  

E-Print Network (OSTI)

The Internet infrastructure is severely stressed. Rapidly growing overhead associated with the primary function of the Internet---routing information packets between any two computers in the world---causes concerns among Internet experts that the existing Internet routing architecture may not sustain even another decade; parts of the Internet have started sinking into black holes already. Here we present a method to map the Internet to a hyperbolic space. Guided with the constructed map, which we release with this paper, Internet routing exhibits scaling properties close to theoretically best possible, thus resolving serious scaling limitations that the Internet faces today. Besides this immediate practical viability, our network mapping method can provide a different perspective on the community structure in complex networks.

Boguna, Marian; Krioukov, Dmitri

2010-01-01T23:59:59.000Z

96

Internet Politics: Resist, Die, or Exploit?  

E-Print Network (OSTI)

In this paper, we disclose and explain Internet politics, an “invisible hand ” that inherently affects Internet research. We show that it could cause significant underutilization of constructive research ideas and a vicious cycle of bias in mainstream research ideas. However, we also expose that it is possible to gradually alleviate effects of the Internet politics by well understanding it. To this end, we propose Internet politics analysis, a systematic approach that can potentially well address the research dilemmas caused by the Internet politics. In addition, we propose a simple but effective model for the Internet politics which can significantly facilitate the Internet politics analysis. As a result, it may lead to dramatic gains for the future Internet research.

Leiwen Deng; Ar Kuzmanovic

2008-01-01T23:59:59.000Z

97

Coping with Internet channel conflict  

Science Conference Proceedings (OSTI)

If you do not sell your products directly over the Internet, people will go to your competitors who do, while if you do sell your products directly, your distributors and dealers will desert you and only carry products from manufacturers who do not compete ...

Younghwa Lee; Zoonky Lee; Kai R. T. Larsen

2003-07-01T23:59:59.000Z

98

Comparison shopping on the internet  

Science Conference Proceedings (OSTI)

Though comparison shopping is used widely by online shoppers, very little research exists about how comparison shoppers differ from those who are not involved in comparison shopping. A survey of 208 US consumers identified comparison shoppers, both on ... Keywords: USA, United States, comparison shopping, consumer attitudes, e-commerce, e-shopping, e-tailing, electronic commerce, electronic retailing, factors, internet, online shopping

Michael Klassen; Pola Gupta; Matthew P. Bunker

2009-05-01T23:59:59.000Z

99

Instruction scheduling and executable editing  

Science Conference Proceedings (OSTI)

Modern microprocessors offer more instruction-level parallelism than most programs and compilers can currently exploit. The resulting disparity between a machine's peak and actual performance, while frustrating for computer architects and chip manufacturers, ...

Eric Schnarr; James R. Larus

1996-12-01T23:59:59.000Z

100

Study of Proposed Internet Congestion Control Algorithms*  

Science Conference Proceedings (OSTI)

... Algorithms* Kevin L. Mills, NIST (joint ... Page 2. Study of Proposed Internet Congestion Control Algorithms – Mills et al. Innovations ...

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

The Evolution of International Internet Telephony  

E-Print Network (OSTI)

International Internet Telephony has been evolving since its introduction in 1996. In 1996, the typical player was

McGarty, Terrence

102

Internet market strategies: Antecedents and implications  

Science Conference Proceedings (OSTI)

The Web is a new market channel that has become a serious alternative to traditional channels. At present, there is little strategy analysis available to guide a company's decision about its involvement in the internet market. In this paper, we differentiate ... Keywords: Creative pricing policies, IMS model, Internet competition, Internet market, Mixed strategy, Pure strategy, Resource-based theory, Traditional markets

Jaeki Song; Fatemeh Mariam Zahedi

2006-03-01T23:59:59.000Z

103

Toward a Framework for Assessing Internet Channels  

Science Conference Proceedings (OSTI)

The emergence of the Internet has forced a large number of firms to introduce Internet-based channels of distribution into existing distribution systems to market their products. In multiple channels context, there has been a call for better performance ... Keywords: Internet channels, strategic profit model (SPM), analytic network process (ANP), performance evaluation

Hung-Jen Tu; Chia-Yang Wong

2010-05-01T23:59:59.000Z

104

Commercial Internet filters: Perils and opportunities  

Science Conference Proceedings (OSTI)

Organizations are becoming increasingly aware of Internet abuse in the workplace. Such abuse results in loss of workers' productivity, network congestion, security risks, and legal liabilities. To address this problem, organizations have started to adopt ... Keywords: Internet abuse, Internet filters, Text classification, Text mining

Chen-Huei Chou; Atish P. Sinha; Huimin Zhao

2010-03-01T23:59:59.000Z

105

Workshop on internet economics (WIE2011) report  

Science Conference Proceedings (OSTI)

The second Workshop on Internet Economics [2], hosted by CAIDA and Georgia Institute of Technology on December 1-2, 2011, brought together network technology and policy researchers with providers of commercial Internet facilities and services (network ... Keywords: economics, internet, network management

kc claffy

2012-03-01T23:59:59.000Z

106

Security of internet-connected computer networks  

Science Conference Proceedings (OSTI)

The security of computer networks connected to the internet is an important, vital and hotly contested real-world issue. Once the computer networks get connected to the internet, the number of attacks, their strength and intensity grow exponentially. ... Keywords: attack detection, attacks, computer networks, digital signature, incidents, internet, network security, security breaches, security policy

I. Tutanescu; E. Sofron; M. Ali

2010-02-01T23:59:59.000Z

107

Robustness provided by internet monitoring systems  

Science Conference Proceedings (OSTI)

Internet applications such as Wealth Management Banking Programs require a very high degree of robustness. To attain this continuous testing - that is monitoring the systems over a period of time - is suggested. The preparation of an appropriate site-monitoring ... Keywords: continuous testing, internet, internet offering, monitoring systems, requirements, robustness, site monitoring, soft launch, test environment, testing recommendation, transitional state

Barry Dellar

2002-01-01T23:59:59.000Z

108

E-Filing Instructions for Natural Gas Authorizations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Natural Gas Regulation » E-Filing Instructions for Services » Natural Gas Regulation » E-Filing Instructions for Natural Gas Authorizations E-Filing Instructions for Natural Gas Authorizations This section of the web site allows you to submit applications to the Department of Energy (DOE) online for the importation and exportation of natural gas from and to Canada and Mexico, the importation of liquefied natural gas (LNG) from various international sources and for the export of LNG from Canada and Mexico. This internet application process should, in most cases, provide you with an authorization within ten working days after receiving the document containing legal signature. General terms, conditions, and restrictions of the e-online filings process are: Term of the authorization is for two (2) years, referred to as a

109

Mobile Internet iPhone + iTouch Desktop Internet  

E-Print Network (OSTI)

www.morganstanley.com/techresearch Morgan Stanley does and seeks to do business with companies covered in Morgan Stanley Research. As a result, investors should be aware that the firm may have a conflict of interest that could affect the objectivity of Morgan Stanley Research. Investors should consider Morgan Stanley Research as only a single factor in making their investment decision. For analyst certification and other important disclosures, refer to the Disclosure Section, located at the end of this report. Internet Trends Outline

unknown authors

2010-01-01T23:59:59.000Z

110

User Empowerment in the Internet of Things  

E-Print Network (OSTI)

This paper focuses on the characteristics of two big triggers that facilitated wide user adoption of the Internet: Web 2.0 and online social networks. We detect brakes for reproduction of these events in Internet of things. To support our hypothesis we first compare the difference between the ways of use of the Internet with the future scenarios of Internet of things. We detect barriers that could slow down apparition of this kind of social events during user adoption of Internet of Things and we propose a conceptual framework to solve these problems.

Munjin, Dejan

2011-01-01T23:59:59.000Z

111

Characterizing Internet Worm Infection Structure  

E-Print Network (OSTI)

Internet worm infection continues to be one of top security threats. Moreover, worm infection has been widely used by botnets to recruit new bots and construct P2P-based botnets. In this work, we attempt to characterize the network structure of Internet worm infection and shed light on the micro-level information of "who infects whom." Our work quantifies the infection ability of individual hosts and reveals the key characteristics of the underlying topologies formed by worm infection, i.e., the number of children and the generation of the Internet worm infection family tree. Specifically, we first analyze the infection tree of a wide class of worms, for which a new victim is compromised by each existing infected host with equal probability. We find that the number of children has asymptotically a geometric distribution with parameter 0.5. We also discover that the generation follows closely a Poisson distribution and the average path length of the worm infection family tree increases approximately logarithmi...

Wang, Qian; Chen, Chao

2010-01-01T23:59:59.000Z

112

Development of online instructional resources for Earth system science education: An example of current practice from China  

Science Conference Proceedings (OSTI)

Educators around the world are striving to make science more accessible and relevant to students. Online instructional resources have become an integral component of tertiary science education and will continue to grow in influence and importance over ... Keywords: Earth system science, Evaluation, Instructional resource, Online learning

Shaochun Dong; Shijin Xu; Xiancai Lu

2009-06-01T23:59:59.000Z

113

References ? Internet GIS: Distributed Geographic Information Services for the Internet and Wireless Networks. By Zhong-Ren Peng, Ming-Hsiang Tsou. 1  

E-Print Network (OSTI)

Mobile GIS is the expansion of a (GIS) from the office to the field. A mobile GIS enables field based personnel to capture, store, update, manipulate, analyze, and display geographic information. Mobile GIS integrates one or more of the following technologies: ?Mobile devices. ?Global Positioning Systems (GPS). ?Wireless communications for Internet GIS access.

Imad Abugessaisa

2007-01-01T23:59:59.000Z

114

Wireless connection instructions -Windows This document outlines the procedure for setting up Windows7, Vista or XP to use the College wireless network. It assumes  

E-Print Network (OSTI)

Wireless connection instructions - Windows This document outlines the procedure for setting up Windows7, Vista or XP to use the College wireless network. It assumes that you have already connected your Wireless Networks window Registering your computer Start your web browser, ie. Internet Explorer Your

Goldschmidt, Christina

115

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS: ï‚· An EITS provided Exchange email account ï‚· A DOE issued HSPD-12 badge ï‚· DOEnet or Internet access and a supported web browser ï‚· A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

116

Internet Media Types and the Web  

E-Print Network (OSTI)

draft-masinter-mime-web-info-00 This document describes some of the ways in which parts of the MIME system, originally designed for electronic mail, have been used in the web, and some of the ways in which those uses have resulted in difficulties. This informational document is intended as background and justification for a companion Best Current Practice which makes some changes to the registry of Internet Media Types and other specifications and practices, in order to facilitate Web application design and standardization. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at

L. Masinter

2010-01-01T23:59:59.000Z

117

Maurer computers for pipelined instruction processing†  

Science Conference Proceedings (OSTI)

We model micro-architectures with non-pipelined instruction processing and pipelined instruction processing using Maurer machines, basic thread algebra and program algebra. We show that stored programs are executed as intended with these micro-architectures. ...

J. a. Bergstra; C. a. Middelburg

2008-04-01T23:59:59.000Z

118

FORMS AND INSTRUCTIONS FOR SUBMITTING ELECTRIC  

E-Print Network (OSTI)

CALIFORNIA ENERGY COMMISSION FORMS AND INSTRUCTIONS FOR SUBMITTING ELECTRIC TRANSMISSION Instructions for Electric Transmission Forms ............................................................. 6 Electric transmission, transmission corridor, data request. #12;1 Background The California Energy

119

Instructions for Grant and Loan Recipients  

Energy.gov (U.S. Department of Energy (DOE))

DOE Supplemental Instructions for OMB Section 1512 Quarterly reporting through FederalReporting.gov for Grant and Loan Recipients

120

Regulation and Censorship of the Internet.  

E-Print Network (OSTI)

??The Internet is probably one of the greatest inventions of mankind and one of the best things that happened in my generation. It has become… (more)

Okeke, Innocent

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Practice of Internet Marketing in Destination Branding.  

E-Print Network (OSTI)

??This study provides information about destination branding and the effect of Internet marketing on tourism. Tourism branding generates interest in a destination as well as,… (more)

Duong, Linh

2012-01-01T23:59:59.000Z

122

EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE.  

E-Print Network (OSTI)

??The current internet architecture allows hosts to send arbitrary IP packets across a network, which may not reflect valid source address information. IP spoofing and… (more)

Maaz, Khan

2011-01-01T23:59:59.000Z

123

Evaluation and testing of internet firewalls  

Science Conference Proceedings (OSTI)

In this article we propose a testing methodology for evaluating Internet firewalls and apply it to compare two popular firewalls. Copyright © 1999 John Wiley & Sons, Ltd.

Khalid Al-Tawil; Ibrahim A. Al-Kaltham

1999-05-01T23:59:59.000Z

124

Internet, the Web, and Mathematical Science - CECM  

E-Print Network (OSTI)

The dominant mechanism, recently, for distribution of electronic preprints have ... On a simpler level, from the days of the first-generation Internet, before the web ...

125

Internet Engineering Task Force KK Ramakrishnan ...  

Science Conference Proceedings (OSTI)

... Engineering Task Force KK Ramakrishnan INTERNET DRAFT AT&T Labs Research draft-kksjf-ecn-00.txt Sally Floyd LBNL November 1997 ...

2009-08-19T23:59:59.000Z

126

Instructional Transaction Theory - An Introduction  

E-Print Network (OSTI)

Instructional transactions are instructional algorithms, patterns of learner interactions, usually far more complex than a single display and a single response, which have been designed to enable the learner to acquire a certain kind of knowledge or skill. Different kinds of knowledge and skill would require different kinds of transactions. The necessary set of these instructional transactions are designed and programmed once, like other computer applications such as spread sheets. They can then be used with different content topics as long as these topics are of a similar kind of knowledge or skill. A transaction shell is the structure of a transaction identifying the interactions, parameters, and knowledge representation needed for a given class of transactions. A transaction shell is a piece of computer code that, when delivered to a student via an appropriate delivery system, causes a transaction to occur. A transaction shell consists of two subsystems: an authoring environment and a delivery environment. The users of the authoring environment are subject matter experts and instructors; the users of the delivery environment are students. The authoring environment has a knowledge acquisition system and a transaction configuration system. The knowledge acquisition system queries a subject matter expert concerning the knowledge and skill required by the enterprise. This information is organized and stored in a knowledge base. The transaction configuration system enables the instructor, or designer, to provide values for a wide range of instructional parameters. These parameters control the nature of the interactions with the learner. Instructional parameters enable a given transaction shell to be customized for a particular student population, learning environment, ...

M. David Merrill; Zhongmin Li; Mark K. Jones

1990-01-01T23:59:59.000Z

127

Clean Power for the Internet  

E-Print Network (OSTI)

Data centers have been increasingly large users of energy over the past 10 years. With the rapid increase in Internet use, these facilities continue to be built, stressing the local electricity grids with their immense energy needs, and typically with the backup support of diesel generators belching pollution into the sky. The extent of these impacts is unknown. The change in market dynamics in the year 2001 resulted in a slower growth rate in data centers, as it did with the rest of the Internet industry, but it opened up an opportunity for incorporating energy efficient technologies into the design of power delivery to these buildings. More energy-efficient design will ease pressure on the electric grid and also decrease pollution in these areas, many of which are already areas of pollution non-attainment. This paper discusses the air quality impact of data centers, their impact on the electric grid, and the possibility of using clean distributed energy resources (DER) to meet their power reliability and quantity needs. Current DER installation and its success in maintaining the needed reliability are reviewed. The environmental and economic impact of the use of DER in these buildings are also reviewed and ways to overcome the potential barriers to this technology are discussed.

Brown, E.; Elliott, R. N.; Shipley, A.

2002-04-01T23:59:59.000Z

128

MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 09-026- Responsible and Effective Use of Internet-based Capabilities References: See Attachment 1  

E-Print Network (OSTI)

responsible and effective use of Internet-based capabilities, including social networking services (SNS). This policy recognizes that Internet-based capabilities are integral to operations across the Department of Defense. This DTM is effective immediately; it will be converted to a new DoD issuance within 180 days. Applicability. This DTM applies to:

unknown authors

2010-01-01T23:59:59.000Z

129

A protocol for instruction stream processing  

E-Print Network (OSTI)

The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. In this paper, we are concerned with the case where the processing takes place remotely. We describe a protocol to deal with the case where the behaviour produced by an instruction sequence under execution leads to the generation of a stream of instructions to be processed and a remote execution unit handles the processing of that stream of instructions.

Bergstra, J A

2009-01-01T23:59:59.000Z

130

Why the Internet is so 'small'?  

E-Print Network (OSTI)

During the last three decades the Internet has experienced fascinating evolution, both exponential growth in traffic and rapid expansion in topology. The size of the Internet becomes enormous, yet the network is very `small' in the sense that it is extremely efficient to route data packets across the global Internet. This paper provides a brief review on three fundamental properties of the Internet topology at the autonomous systems (AS) level. Firstly the Internet has a power-law degree distribution, which means the majority of nodes on the Internet AS graph have small numbers of links, whereas a few nodes have very large numbers of links. Secondly the Internet exhibits a property called disassortative mixing, which means poorly-connected nodes tend to link with well-connected nodes, and vice versa. Thirdly the best-connected nodes, or the rich nodes, are tightly interconnected with each other forming a rich-club. We explain that it is these structural properties that make the global Internet so 'small'.

Zhou, Shi

2010-01-01T23:59:59.000Z

131

Internet governance on a dollar a day  

Science Conference Proceedings (OSTI)

The submissions of ICANN and ISOC to the WSIS suggested Internet governance was purely about technical standardisation, addresses, domains and some service-related issues. Under this definition, there is little for poor people to worry about. At the ... Keywords: WGIG, WSIS, access, developing countries, development, internet

Charles Kenny

2007-01-01T23:59:59.000Z

132

The energy and emergy of the internet  

Science Conference Proceedings (OSTI)

Recent years have seen a flurry of energy-efficient networking research. But does decreasing the energy used by the Internet actually save society much energy? To answer this question, we estimate the Internet's energy consumption. We include embodied ... Keywords: consumption, emergy, energy, sustainability

Barath Raghavan; Justin Ma

2011-11-01T23:59:59.000Z

133

Modeling the World from Internet Photo Collections  

Science Conference Proceedings (OSTI)

There are billions of photographs on the Internet, comprising the largest and most diverse photo collection ever assembled. How can computer vision researchers exploit this imagery? This paper explores this question from the standpoint of 3D scene modeling ... Keywords: 3D navigation, 3D scene analysis, Internet imagery, Photo browsers, Structure from motion

Noah Snavely; Steven M. Seitz; Richard Szeliski

2008-11-01T23:59:59.000Z

134

Trinocular: Understanding Internet Reliability Through Adaptive Probing  

E-Print Network (OSTI)

and human factors cause Internet outages--from big events like Hurricane Sandy in 2012 and the Egyptian, increasing In- ternet "background radiation" by less than 0.7%. Trinocular is also predictable and precise require little traffic, a single machine can track 3.4M /24 IPv4 blocks, all of the Internet currently

Heidemann, John

135

Measuring the evolution of internet peering agreements  

Science Conference Proceedings (OSTI)

There is much interest in studying the structure and evolution of the Internet at the Autonomous System (AS) level. However, limitations of public data sources in detecting settlement-free peering links meant that prior work focused almost exclusively ... Keywords: autonomous systems, economics, internet topology, peering

Amogh Dhamdhere; Himalatha Cherukuru; Constantine Dovrolis; Kc Claffy

2012-05-01T23:59:59.000Z

136

Parasitism and Internet auction fraud: An exploration  

Science Conference Proceedings (OSTI)

Most research on Internet auction fraud focuses exclusively on the relationship between the con-artist and victim. However, the con-artist and victim are situated in an ecology comprising the auction house, police, and auction community. This paper employs ... Keywords: Auction fraud, Internet crime, Metaphor, Parasitism

Cecil Eng Huang Chua; Jonathan Wareham

2008-10-01T23:59:59.000Z

137

Document Control Template-Instruction_Screen Shot  

NLE Websites -- All DOE Office Websites (Extended Search)

3_ADocument Control Template - Instruction_Screen Shot.doc_Screen ShotPage 1 of 6 3_ADocument Control Template - Instruction_Screen Shot.doc_Screen ShotPage 1 of 6 EOTA - Business Instruction Document Title: Document Control Template - Instruction-Screen Shot Document Number: F-003 Rev. A Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: P-001, Document Control Process Notify of Changes: EOTA Employees Referenced Document(s): N/A F-003_ADocument Control Template - Instruction_Screen Shot.doc_Screen ShotPage 2 of 6 Revision History: Rev. Description of Change A Initial Release B C D E F-003_ADocument Control Template - Instruction_Screen Shot.doc_Screen ShotPage 3 of 6 EOTA - Business Instruction Document Title: DocTitle Document Number:

138

In Pursuit of Privacy on a Public Internet  

E-Print Network (OSTI)

In Pursuit of Privacy on a Public Internet by Marc MendoncaUser privacy on the Internet has been an increasing concernof Privacy on a Public Internet A thesis submitted in

Mendonca, Marc

2012-01-01T23:59:59.000Z

139

Privacy Preservation Technologies in Internet of Things  

E-Print Network (OSTI)

Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

Sen, Jaydip

2010-01-01T23:59:59.000Z

140

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

142

Use of XML and Java for collaborative petroleum reservoir modeling on the Internet  

Science Conference Proceedings (OSTI)

The GEMINI (Geo-Engineering Modeling through INternet Informatics) is a public-domain, web-based freeware that is made up of an integrated suite of 14 Java-based software tools to accomplish on-line, real-time geologic and engineering reservoir modeling. ... Keywords: GEMINI, Java, Petroleum web-based software, Reservoir modeling, Web start, XML

John Victorine; W. Lynn Watney; Saibal Bhattacharya

2005-11-01T23:59:59.000Z

143

Automated tools to implement and test Internet systems in reconfigurable hardware  

Science Conference Proceedings (OSTI)

Tools have been developed to automatically integrate and test networking systems in reconfigurable hardware. These tools dynamically generate circuits for Field Programmable Gate Arrays (FPGAs). A library of hardware-accelerated modules has been developed ... Keywords: Field Programmable Gate Array (FPGA), Internet, firewall, network intrusion detection and prevention, networks, reconfigurable hardware, tools

John W. Lockwood; Chris Neely; Chris Zuver; Dave Lim

2003-07-01T23:59:59.000Z

144

Internet Kiosks in Rural India: What Influences Success?#  

E-Print Network (OSTI)

effects. Internet Kiosks in Rural India: What Influences62. Internet Kiosks in Rural India: What Influences Success?2005), Enabling ICT for Rural India, Project Report,

Kendall, Jake; Singh, Nirvikar

2007-01-01T23:59:59.000Z

145

DOE Site Facility Management Contracts Internet Posting | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Facility Management Contracts Internet Posting DOE Site Facility Management Contracts Internet Posting DOE-NNSA Site Facility Mgmt Contracts AUG 2013.pdf More Documents &...

146

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

147

from Savannah River Nuclear Solutions, LLC NEWS Internet Food...  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Food Service for SRS Employees Sought Greater Aiken-Augusta area food service companies are invited to consider providing meal ordering via the internet for delivery to...

148

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

149

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution...

150

The Locational Determinants of Internet Usage in Asia and Nepal.  

E-Print Network (OSTI)

??This study examines the relationship between internet development and various socio- economic factors that are assumed to affect internet infrastructure development decision. The data collected… (more)

Chand, Smriti

2011-01-01T23:59:59.000Z

151

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service...

152

Future Internet Architecture and Cyber-assisted Energy Efficiency...  

NLE Websites -- All DOE Office Websites (Extended Search)

Louis Host: Raj Kettimuthu Despite their huge differences, the Internet and the power grid share similar delivery patterns in the sense that the Internet delivers information...

153

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

154

IETF Internet-Draft Intended status: Informational  

E-Print Network (OSTI)

Towards an Information-Centric Internet with more Things draft-kutscher-icn-iwmt-00 The Internet is already made of things. However, we expect there to be many more less-capable things, such as sensors and actuators, connected to the Internet in years to come. In parallel, Internet applications are more and more being used to perform operations on named (information) objects, and various Information-Centric Networking (ICN) approaches are being researched in order to allow such applications to work effectively at scale and with various forms of mobility and in networking environments that are more challenging than a traditional access network and data center. In this position paper, we outline some benefits that may accrue, and issues that arise, should the Internet, with many more things, make use of the ICN approach to networking and we argue that ICN concepts should be considered when planning for increases in the number of things connected to the Internet. Status of this Memo This Internet-Draft is submitted in full conformance with the

D. Kutscher; S. Farrell

2011-01-01T23:59:59.000Z

155

Internal Patent Instructions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Internal Patent Instructions Internal Patent Instructions Internal Patent Instructions The internal patent instructions (IPIs) were originally established as a means for providing a common reference source to all patent counsel offices on centralized instructions, as stated in the memorandum, Establishment of ERDA Internal Patent Instructions (IPI), dated, July 29, 1977. The IPIs will now be made available through this URL site and will be reviewed annually during the month of June. The field offices are encouraged to submit comments or suggestions for improving or updating the IPIs for the listed categories or for proposing draft IPIs that may prove beneficial. Claims and Litigation No documents available. Contracts and Contract Administration Electronic Lab Notebooks (2/14/03) Background Rights in Patents and Inventions (9/18/04)

156

Instructions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 11 Transmission Planning in the ERCOT Interconnection Warren Lasher Manager, Long-Term Planning and Policy Department of Energy Electricity Advisory Committee 2 October 20, 2011 The ERCOT Region is one of 3 NERC grid interconnections. The ERCOT grid has: * 75% of Texas land * 85% of Texas load * 40,500 miles of transmission lines * 550+ generation units * 68,294 MW peak demand (set 8/3/2011) 1,106 MW of Asynchronous Tie Capacity (820 MW with Eastern Interconnection) 2,877 MW of generation can switch between ERCOT and the Eastern interconnection The ERCOT Interconnection 3 October 20, 2011 The ERCOT wholesale generation market is an "energy-only" market ERCOT administers day-ahead and real- time markets for energy and ancillary services

157

Instructions  

Science Conference Proceedings (OSTI)

... 56, rad, radian. 57, kg/m³, kilogram per cubic meter. 58, g/cm³, grams per cubic centimeter. 59, kg/L, kilograms per liter. 60, m/s, meters per second. ...

2013-05-21T23:59:59.000Z

158

Instructions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Other, 2% Wind , 12% Installed Capacity - 2010 Nuclear, 13% Coal, 40% Natural Gas, 38% Hydro, Biomass, Other, 1% Wind , 8% Energy Produced - 2010 4 October 20, 2011 The Current...

159

EIA-782B EXCLUSIONARY LIST INSTRUCTIONS  

U.S. Energy Information Administration (EIA) Indexed Site

782B EXCLUSIONARY LIST INSTRUCTIONS 782B EXCLUSIONARY LIST INSTRUCTIONS The 2011 Exclusionary List has been updated for your use in preparing Form EIA-782B, "Resellers'/Retailers'Monthly Petroleum Product Sales Report." As required under the "General Instructions" for this form, respondents are to exclude all sales to refiners and gas plant operators represented on the list. When using this list, please note the

160

ENERGY STAR Industrial Plant Certification: Instructions for...  

NLE Websites -- All DOE Office Websites (Extended Search)

Senior care resources Small business resources State and local government resources ENERGY STAR Industrial Plant Certification: Instructions for applying This document...

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

TMS PostScript Instruction: Microsoft Windows  

Science Conference Proceedings (OSTI)

Please note that these instructions were built using Microsoft Windows 2000 ... This guide is designed to help authors using the Windows operating system to ...

162

Overview and Principles of Internet Traffic Engineering  

Science Conference Proceedings (OSTI)

This memo describes the principles of Traffic Engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks, and to provide a common basis for the development ...

D. Awduche; A. Chiu; A. Elwalid; I. Widjaja; X. Xiao

2002-05-01T23:59:59.000Z

163

Analytical Study on Internet Banking System  

E-Print Network (OSTI)

The Internet era is a period in the information age in which communication and commerce via the Internet became a central focus for businesses, consumers, government, and the media. The Internet era also marks the convergence of the computer and communications industries and their associated services and products. Nowadays, the availability of the Internet make it widely used for everyday life. In order to led business to success, the business and specially the services should provide comfort use to its costumer. The bank system is one of the most important businesses who may use the website. The using for the web-based systems should contain special requirements to achieve the business goal. Since that the paper will present the functional and non-functional for the web-based banking system.

AlAbdullah, Fadhel S; Alnaqeib, Rami; Jalab, Hamid A; Zaidan, A A; Zaidan, B B

2010-01-01T23:59:59.000Z

164

NIRA : a new Internet routing architecture  

E-Print Network (OSTI)

(cont.) mechanism, a user only needs to know a small region of the Internet in order to select a route to reach a destination. In addition, a novel route representation and packet forwarding scheme is designed such that a ...

Yang, Xiaowei, 1974-

2004-01-01T23:59:59.000Z

165

Central Internet Database (CID) Contact Us  

Office of Environmental Management (EM)

Contact Us Central Internet Database CID Photo Banner Contact Us DOE Contact: Doug Tonkay Phone: (301) 903-7212 Email: douglas.tonkay@em.doe.gov Last ReviewedUpdated 3252011...

166

Some Internet Architectural Guidelines and Philosophy  

Science Conference Proceedings (OSTI)

This document extends RFC 1958 by outlining some of the philosophical guidelines to which architects and designers of Internet backbone networks should adhere. We describe the Simplicity Principle, which states that complexity is the primary mechanism ...

R. Bush; D. Meyer

2002-12-01T23:59:59.000Z

167

The Internet — past, present and future  

Science Conference Proceedings (OSTI)

This paper charts the transformation of the Internet from its military and academic origins to its current status as a global network for multimedia information publishing and retrieval. It explains the basic technologies that have enabled this transformation ...

S. P. Sim; S. Rudkin

1997-04-01T23:59:59.000Z

168

Balance of Power: Dynamic Thermal Management for Internet Data Centers  

Science Conference Proceedings (OSTI)

The advent of Internet-based applications and their resulting multitier distributed architecture has changed the focus of design for large-scale Internet computing. Internet server applications execute in a horizontally scalable topology across hundreds ... Keywords: dynamic thermal management, thermal-load balancing, Internet data center, row-wise and regional thermal management, thermal policies

Ratnesh K. Sharma; Cullen E. Bash; Chandrakant D. Patel; Richard J. Friedrich; Jeffrey S. Chase

2005-01-01T23:59:59.000Z

169

Using standard Internet Protocols and applications in space  

Science Conference Proceedings (OSTI)

This paper discusses approaches for using standard Internet technologies to meet the communication needs of future space missions. It summarizes work done by the Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC since 1997. That ... Keywords: Internet in space, Internet space missions, Space communication protocols, Space shuttle STS-107, Spacecraft networking

Keith Hogie; Ed Criscuolo; Ron Parise

2005-04-01T23:59:59.000Z

170

Internet of Things: Applications and Challenges in Technology and Standardization  

Science Conference Proceedings (OSTI)

The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and ... Keywords: Internet of Things (IoT), Interoperability, Network protoocl, Privacy, Security, Wireless networks

Debasis Bandyopadhyay; Jaydip Sen

2011-05-01T23:59:59.000Z

171

The Internet Ecosystem- The Potential for Discrimination  

E-Print Network (OSTI)

The Federal Communication Commission is considering rules enforcing “network neutrality ” and legislation proposing similar goals have been discussed in Congress. The goals of the proposed regulation and legislation are preserve an “open Internet”, but are specifically directed toward access networks, or the first link that directly connects users to the Internet. We argue that preserving open competition in a host of “higher level” Internet services is equally if not more important, but since the rate of technology innovation typically out-paces the need for regulation, there is no need to impose regulation at this time. Using specific examples focused on the “visible Internet ” as well as new services and applications that enable rapid innovation, we argue that the Internet has fostered a history of technological and business solutions that overcome what seems to be certain market dominance. A key enabler of these changes is the emergence of technologies that lower the barrier for entry in developing and deploying new services. We argue that regulators should be aware of the potential for anti-competitive practices, but should carefully consider the effects of regulation on the full Internet ecosystem. We

Dirk Grunwald

2010-01-01T23:59:59.000Z

172

Test Laboratory Instructions (Updated 2/12)  

E-Print Network (OSTI)

Test Laboratory Instructions (Updated 2/12) In California, manufacturers of State- and federally Energy Commission (Energy Commission). This reported data must come from an approved test laboratory performing the test procedure prescribed by law for the appliance. These instructions will walk you through

173

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Washington. The requirements in the 2009 Washington. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 6 Ferry Pend Oreille Okanogan Stevens

174

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

skylights that will meet the requirements of the 2009 IECC for residential buildings as it relates to Texas. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements.

175

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

New Jersey. The New Jersey. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Bergen Hunterdon Mercer Morris

176

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Oregon. The requirements in the 2009 Oregon. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Baker Lake Benton Lane Clackamas Lincoln

177

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Minnesota. The Minnesota. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 7 Aitkin Grant Mahnomen Roseau

178

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Colorado. The Colorado. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 7 Clear Creek Lake Routt Grand Mineral San Juan

179

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Vermont. The requirements in the 2009 Vermont. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 6 Addison Bennington Caledonia

180

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Kentucky. The requirements in the 2009 Kentucky. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 4 Adair Edmonson Knox Nicholas Allen Elliott Larue Ohio

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Iowa. The requirements in the 2009 IECC Iowa. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 6 Allamakee Clay Hancock Palo Alto Black Hawk Clayton Hardin Plymouth

182

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Pennsylvania. The requirements in the Pennsylvania. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 6 Cameron Elk Potter Tioga Clearfield McKean Susquehanna Wayne

183

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Alabama. The Alabama. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 3 Autauga Dallas Marengo Barbour De Kalb Marion

184

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

California. The California. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 6 Alpine Mono IECC CLIMATE ZONE 5

185

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Georgia. The Georgia. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 4 Banks Fannin Habersham Rabun White

186

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Arkansas. The Arkansas. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 4 Baxter Fulton Newton Benton Izard Searcy

187

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Louisiana. The Louisiana. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 3 Bienville Franklin Red River Bossier Grant Richland

188

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Indiana. The Indiana. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Adams Franklin Madison St. Joseph

189

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Illinois. The Illinois. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Adams Edgar Lake Piatt Boone Ford Lee Pike

190

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Florida. The Florida. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 2 Alachua Hardee Orange Baker Hendry Osceola

191

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

South Dakota. The requirements in the South Dakota. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 6 Aurora Faulk McPherson Beadle Grant Meade

192

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Ohio. The requirements Ohio. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Allen Fayette Lorain Preble Ashland Franklin Lucas Putnam

193

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Tennessee. The requirements in the 2009 Tennessee. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 4 Anderson Franklin Loudon Scott

194

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Mississippi. The Mississippi. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 3 Adams Itawamba Pike Alcorn Jasper Pontotoc

195

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Maine. The requirements in the 2009 Maine. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 7 Aroostook IECC CLIMATE ZONE 6 Androscoggin

196

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

New Mexico. The New Mexico. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Catron San Juan Colfax San Miguel

197

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Delaware. The Delaware. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 4 Kent New Castle Sussex

198

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

West Virginia. The requirements in the West Virginia. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Barbour Lewis Raleigh Brooke Marion Randolph

199

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

North Carolina. The North Carolina. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Alleghany Avery Watauga

200

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Michigan. The Michigan. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 7 Baraga Houghton Luce Schoolcraft

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

New York. The New York. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 6 Allegany Franklin Montgomery Sullivan

202

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

meet meet the requirements of the 2009 IECC for residential buildings as it relates to Alaska. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements.

203

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Wisconsin. The Wisconsin. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 7 Ashland Forest Price Bayfield Iron Sawyer

204

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

IECC for residential buildings as it relates to Virginia. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 4

205

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Oklahoma. The Oklahoma. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 4 Beaver Cimarron Texas IECC CLIMATE ZONE 3

206

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Rhode Island. The Rhode Island. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Bristol Kent Newport Providence

207

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Utah. The requirements Utah. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 6 Box Elder Morgan Cache Rich Carbon Summit

208

Step-by-Step Instructions  

NLE Websites -- All DOE Office Websites (Extended Search)

Kansas. The requirements in the 2009 Kansas. The requirements in the 2009 IECC are the same for windows used in new buildings, remodeling & additions to existing buildings, and as replacements of existing windows. Step-by-Step Instructions 1. Using the climate zone map or table, match the jurisdiction to the appropriate IECC climate zone. Use the "IECC Prescriptive Window Energy Efficiency Requirements" (on the back of this sheet) to determine the window performance requirements associated with the climate zone. 2. Construct the home with windows that have area weighted average U-factor and SHGC values less than or equal to the values for the climate zone and meet the code maximum air leakage requirements. IECC CLIMATE ZONE 5 Cheyenne Hamilton Osborne Sherman

209

Internet Use and Political Engagement: The Role of E-Campaigning as a Pathway to Online Political Participation  

E-Print Network (OSTI)

Information Poverty, and the Internet. Cambridge: Cambridgeparticipations and the internet: assessing effects, causalthe Representativeness of Internet Political Participation’,

Cantijoch, Marta; Cutts , David; Gibson, Rachel

2013-01-01T23:59:59.000Z

210

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

211

Competencies of expert web-based instruction designers.  

E-Print Network (OSTI)

??Web-based instruction has been increasingly accepted in education, business and industry, military and government, healthcare and other sectors as a dominant means to deliver instruction… (more)

Chen, Yonghui

2012-01-01T23:59:59.000Z

212

POLICY BULLETIN: POL-5- Declassification Instruction "25X1-human"  

Energy.gov (U.S. Department of Energy (DOE))

Provides instructions on the appropriate action to take when classification guide topics or source documents cite "25X1-human" declassification instructions.

213

Smart Grid Investment Grant Invoice Template and Instructions...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Invoice Template and Instructions Smart Grid Investment Grant Invoice Template and Instructions The purpose of this document is to provide a template with sample information for...

214

DOE Releases Filing Instructions for Federal Risk Insurance for...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Filing Instructions for Federal Risk Insurance for New Nuclear Power Plants DOE Releases Filing Instructions for Federal Risk Insurance for New Nuclear Power Plants December 21,...

215

Rethinking biology instruction : the application of DNR-based instruction to the learning and teaching of biology  

E-Print Network (OSTI)

Ed. ). (1999). Modern biology. Austin, TX: Holt, RinehartCHAPTER 2: THE DNR INSTRUCTIONAL PRINCIPLES AND BIOLOGYCurrent biology instruction takes a prescriptive approach to

Maskiewicz, April Lee

2006-01-01T23:59:59.000Z

216

Can Emergency Medicine Residents Reliably Use the Internet to Answer Clinical Questions?  

E-Print Network (OSTI)

Google as a diagnostic aid: internet based study. BMJ. 2006;Engine Watch. Estimated Internet pages. Search Engine WatchResidents Reliably Use the Internet to Answer Clinical

Krause, Richard; Moscati, Ronald; Halpern, Shravanti; Schwartz, Diane G.; Abbas, June

2011-01-01T23:59:59.000Z

217

International Spanish/English Internet Smoking Cessation Trial Yields 20% Abstinence Rates at 1 Year  

E-Print Network (OSTI)

trial . Journal of Medical Internet Research , 10 , e36 .Journal of Medical Internet Research , 7 , e2 . Eysenbach ,Journal of Medical Internet Research , 7 , e11 . Feil , E.

Muñoz, Ricardo F.; Barrera, Alinne Z.; Delucchi, Kevin; Penilla, Carlos; Torres, Leandro D.; Pérez-Stable, Eliseo J.

2009-01-01T23:59:59.000Z

218

Internet Resource Pricing Models, Mechanisms, and Methods  

E-Print Network (OSTI)

With the fast development of video and voice network applications, CDN (Content Distribution Networks) and P2P (Peer-to-Peer) content distribution technologies have gradually matured. How to effectively use Internet resources thus has attracted more and more attentions. For the study of resource pricing, a whole pricing strategy containing pricing models, mechanisms and methods covers all the related topics. We first introduce three basic Internet resource pricing models through an Internet cost analysis. Then, with the evolution of service types, we introduce several corresponding mechanisms which can ensure pricing implementation and resource allocation. On network resource pricing methods, we discuss the utility optimization in economics, and emphasize two classes of pricing methods (including system optimization and entities' strategic optimizations). Finally, we conclude the paper and forecast the research direction on pricing strategy which is applicable to novel service situation in the near future.

He, Huan; Liu, Ying

2011-01-01T23:59:59.000Z

219

Generating and executing programs for a floating point single instruction multiple data instruction set architecture  

DOE Patents (OSTI)

Mechanisms for generating and executing programs for a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA) are provided. A computer program product comprising a computer recordable medium having a computer readable program recorded thereon is provided. The computer readable program, when executed on a computing device, causes the computing device to receive one or more instructions and execute the one or more instructions using logic in an execution unit of the computing device. The logic implements a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA), based on data stored in a vector register file of the computing device. The vector register file is configured to store both scalar and floating point values as vectors having a plurality of vector elements.

Gschwind, Michael K

2013-04-16T23:59:59.000Z

220

EIA-782C Exclusionary list instructions  

U.S. Energy Information Administration (EIA) Indexed Site

C Exclusionary list instructions 1 C Exclusionary list instructions 1 August 2013 EIA-782C Exclusionary List Instructions The 2013 Exclusionary List has been updated for your use in preparing Form EIA-782C, "Monthly Report of Prime Supplier Sales of Petroleum Products Sold for Local Consumption." As required under the "General Instructions" for this form, respondents are to exclude sales to all companies and their subsidiaries represented on this Exclusionary List. The purpose of the EIA-782C survey is to measure sales of selected petroleum products in the states where they are consumed; that is, the survey attempts to estimate demand at the state level. In order to avoid double-counting, the survey has been designed so that respondents, consisting of "prime suppliers," report only sales to local distributors,

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

EIA-782A Exclusionary List Instructions  

U.S. Energy Information Administration (EIA) Indexed Site

A Exclusionary list instructions 1 A Exclusionary list instructions 1 August 2013 EIA-782A Exclusionary List Instructions The 2013 Exclusionary List has been updated for your use in preparing Form EIA- 782A, "Refiners'/Gas Plant Operators' Monthly Petroleum Product Sales Report." As required under the "General Instructions" for this form, respondents are to exclude all sales to refiners and gas plant operators represented on the list. When using this list, please note the following: * Exclude all sales made to companies and their subsidiaries represented on this Exclusionary List, starting with reference month August 2013. * If sales are made to a company with a name substantially similar to one on this list, it may be assumed that the companies are related and those sales

222

Instructional strategies that leverage mobile, handheld computers  

Science Conference Proceedings (OSTI)

Mobile, handheld computing provides teachers and students with unprecedented, new opportunities for teaching and learning. To use these devices effectively, however, teachers need to employ instructional strategies that leverage the affordances of the ...

C. Norris; E. Soloway

2007-06-01T23:59:59.000Z

223

Compilation techniques for short-vector instructions  

E-Print Network (OSTI)

Multimedia extensions are nearly ubiquitous in today's general-purpose processors. These extensions consist primarily of a set of short-vector instructions that apply the same opcode to a vector of operands. This design ...

Larsen, Samuel (Samuel Barton), 1975-

2006-01-01T23:59:59.000Z

224

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

225

An Internet multicast system for the stock market  

Science Conference Proceedings (OSTI)

We are moving toward an international, 24-hour, distributed, electronic stock exchange. The exchange will use the global Internet, or internet technology. This system is a natural application of multicast because there are a large number of receivers ... Keywords: multicast

2001-08-01T23:59:59.000Z

226

Cognitive processing differences between frequent and infrequent Internet users  

Science Conference Proceedings (OSTI)

The Internet is rapidly transforming a range of human activities; socio-cognitive theory assumes that engagement in transformed activities, over time, transforms human cognition. Four hundred and six college students completed four modified cognitive ... Keywords: Cognition, Internet use

G. M. Johnson

2008-09-01T23:59:59.000Z

227

E-Lections: Voting Behavior and the Internet  

E-Print Network (OSTI)

comments and suggestions. We further thank Deutsche Telekom AG for providing data on the voice telephony network and IVW for providing data on newspaper circulation. E-Lections: Voting Behavior and the Internet This paper analyses the effect of information disseminated by the Internet on voting behavior. We address endogeneity in Internet availability by exploiting regional and technological peculiarities of the preexisting voice telephony network that hinder the roll-out of fixed-line broadband infrastructure for high-speed Internet. We find small negative effects of Internet availability on voter turnout, and no evidence that the Internet systematically benefits single parties. Robustness tests including placebo estimations from the pre-Internet era confirm our results. We relate differences in the Internet effect between national and local elections to a crowding out of national but not local newspapers. JEL Codes: Keywords:

Oliver Falck; Robert Gold; Stephan Heblich; Acknowledgments We; Sascha Becker; Nina Czernich; Rob Fairlie; Ronny Freier; Tarjei Havnes; Jed Kolko; Fabian Waldinger; Ludger Woessmann

2012-01-01T23:59:59.000Z

228

The Research of Internet Shopping Customer Value Model  

Science Conference Proceedings (OSTI)

The existing empirical study of Internet shopping in literature, mostly concerned about the interaction relationship of retailer and customer, few scholars study the process of transactions between customers and other services suppliers, by assaying ... Keywords: Internet Shopping, Stakeholders, Customer Value

Xiao-bin Liu; Ming-qing Qiu

2010-05-01T23:59:59.000Z

229

Yrityksen internet-markkinoinnin kehittämissuunnitelma case Intersport Megastore Länsikeskus Turku.  

E-Print Network (OSTI)

??Tämän opinnäytetyön aiheena oli Internet-markkinoinnin kehittäminen Intersport Megastore Länsikeskukselle. Tutkimuksessa käydään läpi yleisimmät Internet-markkinoinnin muodot perinteisistä mainosbannereista aina uusimpiin muotoihin kuten sosiaaliseen mediaan. Tutkimuksessa on… (more)

Lehto, Juha

2011-01-01T23:59:59.000Z

230

Ghost at the machine : Internet addiction and compulsive computer use  

E-Print Network (OSTI)

Technology use-particularly the use of the Internet-is a pervasive component of modem society. The Internet has changed the way we work and the way we play, creating new possibilities for self expression and communication. ...

VanCott, Rachel Diane

2008-01-01T23:59:59.000Z

231

CAPRI: A Common Architecture for Distributed Probabilistic Internet Fault Diagnosis  

E-Print Network (OSTI)

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J.

2007-06-04T23:59:59.000Z

232

The dynamics of Internet publishing on the computer book industry  

E-Print Network (OSTI)

The Internet has been a disruptive force for many industries, but perhaps none more so than in the publishing business. While many segments of the publishing industry have made attempts to use the Internet to augment or ...

Allen, Robbie (Robbie C.)

2006-01-01T23:59:59.000Z

233

Fighting Internet Auction Fraud: An Assessment and Proposal  

Science Conference Proceedings (OSTI)

Although online auctions constitute one of the most successful Internet business models, auction fraud has become the largest component of all Internet fraud. Traditional government organizations have joined auction businesses in trying to develop new ...

Cecil Eng Huang Chua; Jonathan Wareham

2004-10-01T23:59:59.000Z

234

On the Module of Internet Banking System  

E-Print Network (OSTI)

Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days. The success of the business depends on its flexibility, availability and security. Since that the web-based systems should have a special way to design the system and implement it. Nowadays, the Internet Banking System widely used and the banks looking to provide the best quality system with highly available, fast response, secure and safe to use. The Unified Modelling Language (UML) is the uniquely language which is used to analyse and design any system. In this paper, the UML diagrams has been proposed to illustrate the design phase for any banking system. The authors, presented two types of architecture which is u...

Alanazi, Hamdan O; Hmood, Ali K; Zaidan, M A; Al-Nabhani, Yahya

2010-01-01T23:59:59.000Z

235

Live Video Scheduling in Differentiated Services Internet  

Science Conference Proceedings (OSTI)

Future Internet services will be judged to a large degree by the efficient deployment of real-time applications. The issue of utilisation is especially central for the economic introduction of live video in packet switching networks; at the same time, ...

Themistoklis Rapsomanikis

2000-09-01T23:59:59.000Z

236

User and network interplay in internet telemicroscopy  

Science Conference Proceedings (OSTI)

Remote access of electron microscopes over the Internet (i.e., Telemicroscopy) is a unique network-dependent immersive multimedia application. It demands high-resolution (2D and 3D) video image transfers with simultaneous real-time mouse and keyboard ...

Prasad Calyam; Nathan Howes; Abdul Kalash; Mark Haffner

2007-10-01T23:59:59.000Z

237

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network (OSTI)

. http://docs.info.apple.com/article.html?artnum=303411 BEA Systems - 2007 Daylight Savings Time ChangesIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Shellcode Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The 2007 Daylight

238

On inferring and characterizing internet routing policies  

Science Conference Proceedings (OSTI)

Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although a significant number of studies have been focused on the Internet topology, ... Keywords: BGP, routing policies, traffic engineering

Feng Wang; Lixin Gao

2003-10-01T23:59:59.000Z

239

Antitrust Analysis for the Internet Upstream Market: a BGP Approach  

E-Print Network (OSTI)

IXPs are independent organizations composed by Internet Service Providers, where they can route their traffic in a cost effective and technically efficient way. 4 These data were obtained for research purposes from the London Internet Exchange Point... , and UUNET played a major role in transporting packets across the Internet. Cossa (2000) considered a dataset from Boardwatch magazine Internet Service Providers Directory, 1999’s edition, showing the breakdown of 8,950 backbone connections from 5...

D'Ignazio, Alessio; Giovannetti, Emanuele

2006-03-14T23:59:59.000Z

240

Management of the Future Internet: Status and Challenges  

Science Conference Proceedings (OSTI)

The 4th IEEE/IFIP International Workshop on Management of the Future Internet (ManFI 2012) was held on April 16, 2012 in Maui, USA. This report summarizes the keynotes, presentations and discussions in ManFI 2012 and provides a high-level view of ideas, ... Keywords: Autonomic networking, Future Internet, Future Internet management, Management architecture, Network management, OpenFlow-based Future Internet architectures

Filip Turck; Yoshiaki Kiriha; James Won-Ki Hong

2012-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Humanities and Arts: Sharing Center Stage on the Internet  

Science Conference Proceedings (OSTI)

This document is designed primarily for individuals who have limited knowledge of, or experience with, the Internet.

J. Max; W. Stickle

1997-10-01T23:59:59.000Z

242

Algorithms for Large-Scale Internet Measurements  

E-Print Network (OSTI)

As the Internet has grown in size and importance to society, it has become increasingly difficult to generate global metrics of interest that can be used to verify proposed algorithms or monitor performance. This dissertation tackles the problem by proposing several novel algorithms designed to perform Internet-wide measurements using existing or inexpensive resources. We initially address distance estimation in the Internet, which is used by many distributed applications. We propose a new end-to-end measurement framework called Turbo King (T-King) that uses the existing DNS infrastructure and, when compared to its predecessor King, obtains delay samples without bias in the presence of distant authoritative servers and forwarders, consumes half the bandwidth, and reduces the impact on caches at remote servers by several orders of magnitude. Motivated by recent interest in the literature and our need to find remote DNS nameservers, we next address Internet-wide service discovery by developing IRLscanner, whose main design objectives have been to maximize politeness at remote networks, allow scanning rates that achieve coverage of the Internet in minutes/hours (rather than weeks/months), and significantly reduce administrator complaints. Using IRLscanner and 24-hour scan durations, we perform 20 Internet-wide experiments using 6 different protocols (i.e., DNS, HTTP, SMTP, EPMAP, ICMP and UDP ECHO). We analyze the feedback generated and suggest novel approaches for reducing the amount of blowback during similar studies, which should enable researchers to collect valuable experimental data in the future with significantly fewer hurdles. We finally turn our attention to Intrusion Detection Systems (IDS), which are often tasked with detecting scans and preventing them; however, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast stealth techniques that can remain virtually undetectable at large-scale. To address these questions, we propose a novel model for the windowexpiration rules of popular IDS tools (i.e., Snort and Bro), derive the probability that existing scan patterns (i.e., uniform and sequential) are detected by each of these tools, and prove the existence of stealth-optimal patterns.

Leonard, Derek Anthony

2010-12-01T23:59:59.000Z

243

Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe  

E-Print Network (OSTI)

In this article we propose a method for measuring internet connection stability which is fast and has negligible overhead for the process of its complexity. This method finds a relative value for representing the stability of internet connections and can also be extended for aggregated internet connections. The method is documented with help of a real time implementation and results are shared. This proposed measurement scheme uses HTTP GET method for each connections. The normalized responses to identified sites like gateways of ISPs, google.com etc are used for calculating current link stability. The novelty of the approach is that historic values are used to calculate overall link stability. In this discussion, we also document a method to use the calculated values as a dynamic threshold metric. This is used in routing decisions and for load-balancing each of the connections in an aggregated bandwidth pipe. This scheme is a very popular practice in aggregated internet connections.

M, Vipin

2009-01-01T23:59:59.000Z

244

MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 09-026- Responsible and Effective Use of Internet-based Capabilities References: See Attachment 1  

E-Print Network (OSTI)

responsible and effective use of Internet-based capabilities, including social networking services (SNS). This policy recognizes that Internet-based capabilities are integral to operations across the Department of Defense. This DTM is effective immediately; it will be converted to a new DoD issuance within 180 days. Applicability. This DTM applies to: • OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector

unknown authors

2010-01-01T23:59:59.000Z

245

Traffic characterization and internet usage in rural Africa  

Science Conference Proceedings (OSTI)

While Internet connectivity has reached a significant part of the world's population, those living in rural areas of the developing world are still largely disconnected. Recent efforts have provided Internet connectivity to a growing number of remote ... Keywords: internet usage, interviews, rural networks

David L. Johnson; Veljko Pejovic; Elizabeth M. Belding; Gertjan van Stam

2011-03-01T23:59:59.000Z

246

Quantifying video-QoE degradations of internet links  

Science Conference Proceedings (OSTI)

With the proliferation of multimedia content on the Internet, there is an increasing demand for video streams with high perceptual quality. The capability of present-day Internet links in delivering high-perceptual-quality streaming services, however, ... Keywords: digital video broadcasting, internet, quality of experience (QoE)

Mukundan Venkataraman; Mainak Chatterjee

2012-04-01T23:59:59.000Z

247

The emerging Internet governance mosaic: connecting the pieces  

Science Conference Proceedings (OSTI)

The report highlights key Internet governance issues raised in relation to the authors' three-tier typology. The distinctive design and governance characteristics that underpin the global Internet phenomenon are then outlined, to indicate valuable governance ... Keywords: Internet, cyberspace, governance, multi-stakeholder, policy

William H. Dutton; Malcolm Peltu

2007-01-01T23:59:59.000Z

248

Assessing the Security of a CleanSlate Internet Architecture  

E-Print Network (OSTI)

designed a clean­slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, withoutAssessing the Security of a Clean­Slate Internet Architecture Gowtham Boddapati # John Day clean­ slate internet architectures. Our own investigations into the fundamental principles

Texas at Arlington, University of

249

Instruction Packing for a 32-bit Stack-Based Processor  

E-Print Network (OSTI)

Abstract- This work proposed a design and development of a 32-bit stack-based processor for embedded systems. A reference processor has a 32-bit stack-based instruction set. This work proposed a technique of instruction packing which packs several instructions into one 32-bit instruction unit. Therefore, the instruction size is reduced. The result of the experiment shows that the proposed technique achieves around 30 % reduction in code size.

Witcharat Lertteerawattana; Tanes Jedsadawaranon; Prabhas Chongstitvatana

2007-01-01T23:59:59.000Z

250

Snap: Robust Tool for Internet-wide Operating System Fingerprinting  

E-Print Network (OSTI)

Different approaches have been developed for TCP/IP fingerprinting, but none of these approaches is suited for Internet-wide fingerprinting. In this work, we develop approaches that rigorously tackle the issue of noise and packet loss while carrying out Internet-wide fingerprinting. We then carry out an Internet-wide scan to determine the distribution of different operating systems on the Internet. The results of our scan indicate that there are approximately 8.9 million publicly accessible web-servers on the Internet running Linux, while there are nearly 9.6 million web-servers with different embedded operating systems.

Nandwani, Ankur Bharatbhushan

2010-12-01T23:59:59.000Z

251

Internet- versus Telephone-based Local Outbreak Investigations  

E-Print Network (OSTI)

We compared 5 locally conducted, Internet-based outbreak investigations with 5 telephone-based investigations. Internet-based surveys required less completion time, and response rates were similar for both investigation methods. Participant satisfaction with Internet-based surveys was high. Although the Internet has been increasingly used in epidemiologic research, its use for investigation of infectious disease outbreaks has been less frequently described. Most reports of Internet-based outbreak investigations have described large, single outbreaks conducted by national or state public health agencies. Examples of reported Internet-based outbreak investigations include a communitywide norovirus outbreak in Finland, a communitywide Cryptosporidium outbreak in Kansas, a multistate Salmonella outbreak, and a conjunctivitis outbreak at a university (1–4). These reports noted several advantages of Internet use, including reductions in resource use, workload, and time required for survey completion and data entry (1–4). However, these advantages are not generally quantified in outbreak reports. Moreover, Internetbased outbreak investigations are seldom reported from the local health department level, where resources are often constrained compared with those of state and national agencies. We offer an analysis of several small Internetbased outbreak investigations conducted at the local level. We describe response rates to Internet-based surveys with and without telephone follow-up, the time needed to complete Internet-based outbreak surveys in comparison with traditional telephone surveys, participant satisfaction with Internet-based surveys, and differences in Internet-based outbreak investigations based on the respondents ’ setting: professional versus household.

Tista S. Ghosh; Jennifer L. Patnaik; Nisha B. Alden; Richard L. Vogt

2006-01-01T23:59:59.000Z

252

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

253

A Model of the Fresh Internet  

E-Print Network (OSTI)

Previous models of the Web graph have highlighted some interesting properties, but have failed to describe the behavior of new content, especially how links to newly created pages appear. We experimentally study new Internet content using real-world data collected at Yandex (Russia's most popular search engine) and then we propose a new model of the Web graph, which reflects the behavior of such new content. We show through a set of experiments that this model realistically predicts the personalized PageRank and the diameter of new Internet content, something already existing models did not do. This model can be used for crawling, for example to define and tune crawl policies to improve the freshness of a search engine's index.

Lefortier, Damien; Samosvat, Egor

2012-01-01T23:59:59.000Z

254

Hybrid Trust Model for Internet Routing  

E-Print Network (OSTI)

The current Internet is based on a fundamental assumption of reliability and good intent among actors in the network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle for Internet communication. In order to improve the trustworthiness and reliability of the network infrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach, trust model is defined by combining voting and recommendation to direct trust estimation for neighbour routers located in different autonomous systems. We illustrate the impact of our approach with cases that demonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of a distrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and direct trust in a rectangular grid of 15*15 nodes (autonomous systems) with a randomly connected topology.

Rantala, Pekka; Isoaho, Jouni

2011-01-01T23:59:59.000Z

255

Integrating Renewable Energy Using Data Analytics Systems: Challenges and Opportunities  

E-Print Network (OSTI)

Integrating Renewable Energy Using Data Analytics Systems: Challenges and Opportunities Andrew and intermittent nature of many renewable energy sources makes integrating them into the electric grid challenging-following loads adjust their power consumption to match the avail- able renewable energy supply. We show Internet

California at Berkeley, University of

256

Hermes: an integrated CPU/GPU microarchitecture for IP routing  

Science Conference Proceedings (OSTI)

With the constantly increasing Internet traffic and fast changing network protocols, future routers have to simultaneously satisfy the requirements for throughput, QoS, flexibility, and scalability. In this work, we propose a novel integrated CPU/GPU ... Keywords: CPU/GPU integration, QoS, software router

Yuhao Zhu; Yangdong Deng; Yubei Chen

2011-06-01T23:59:59.000Z

257

Internet and political communication - Macedonian case  

E-Print Network (OSTI)

Analysis how to use Internet influence to the process of political communication, marketing and the management of public relations, what kind of online communication methods are used by political parties, and to assess satisfaction, means of communication and the services they provide to their partys voters (people) and other interest groups and whether social networks can affect the political and economic changes in the state, and the political power of one party.

Emruli, Sali

2011-01-01T23:59:59.000Z

258

Security Survey of Internet Browsers Data Managers  

E-Print Network (OSTI)

The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

Boja, Catalin

2011-01-01T23:59:59.000Z

259

Fermilab LInC Project Examples  

NLE Websites -- All DOE Office Websites (Extended Search)

following projects were created as homework during a Leadership Institute Integrating Internet, Curriculum, and Instruction course. Elementary School Projects - Grades K-2 Middle...

260

Correlated Resource Models of Internet End Hosts  

E-Print Network (OSTI)

Understanding and modelling resources of Internet end hosts is essential for the design of desktop software and Internet-distributed applications. In this paper we develop a correlated resource model of Internet end hosts based on real trace data taken from the SETI@home project. This data covers a 5-year period with statistics for 2.7 million hosts. The resource model is based on statistical analysis of host computational power, memory, and storage as well as how these resources change over time and the correlations between them. We find that resources with few discrete values (core count, memory) are well modeled by exponential laws governing the change of relative resource quantities over time. Resources with a continuous range of values are well modeled with either correlated normal distributions (processor speed for integer operations and floating point operations) or log-normal distributions (available disk space). We validate and show the utility of the models by applying them to a resource allocation ...

Heien, Eric M; David, Anderson

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Microsoft Word - formeia8a_instructions_final  

U.S. Energy Information Administration (EIA) Indexed Site

Coal Stocks Report - Annual Page 1 Form Approved OMB No. 1905-0167 Expires: 06/30/2014 Burden: 1.0 Hours General Instructions: A. PURPOSE. This survey collects coal stocks data from U.S. coal brokers, coal traders and coal terminals. Information on coal stocks is collected to provide Congress with basic statistics concerning consumer use as required by the Federal Energy Administration Act of 1974 (FEAA) (P.L. 93-275), as amended. These data appear in the Annual Coal Report, the Quarterly Coal Report, and the Monthly Energy Review. In addition, the U.S. Energy Information Administration uses the data in short-term and long-term models such as the Short-Term Integrated Forecasting System (STIFS) and the National Energy Modeling System (NEMS) Coal Market Module. The forecast data also

262

Instructions for WebVPN Connectivity  

Energy.gov (U.S. Department of Energy (DOE))

The clientless WebVPN connectivity option being offered by the OCIO significantly enhances the speed as well as the interoperability between different operating systems/Internet service providers (ISP) which results in an improved overall user experience when using VPN services to access corporate applications remotely.

263

Systems integration and collaboration in architecture, engineering, construction, and facilities management: A review  

Science Conference Proceedings (OSTI)

With the rapid advancement of information and communication technologies, particularly Internet and Web-based technologies during the past 15 years, various systems integration and collaboration technologies have been developed and deployed to different ...

Weiming Shen; Qi Hao; Helium Mak; Joseph Neelamkavil; Helen Xie; John Dickinson; Russ Thomas; Ajit Pardasani; Henry Xue

2010-04-01T23:59:59.000Z

264

Designing effective step-by-step assembly instructions  

Science Conference Proceedings (OSTI)

We present design principles for creating effective assembly instructions and a system that is based on these principles. The principles are drawn from cognitive psychology research which investigated people's conceptual models of assembly and effective ... Keywords: assembly instructions, visualization

Maneesh Agrawala; Doantam Phan; Julie Heiser; John Haymaker; Jeff Klingner; Pat Hanrahan; Barbara Tversky

2003-07-01T23:59:59.000Z

265

Web>clicker Instructions web>clicker  

E-Print Network (OSTI)

Web>clicker Instructions web>clicker · As an instructor, you will operate web>clicker the same as your original i>clicker software. You simply need to enable web>clicker in "My Settings". · i>clicker remotes and web>clicker will work in the same classroom (e.g., students can use physical clickers

Peterson, Blake R.

266

Yale ME Turbine Test cell instructions Background  

E-Print Network (OSTI)

Yale ME Turbine Test cell instructions Background: The Turbine Technologies Turbojet engine combustion gas backflow into the lab space. Test Cell preparation: 1. Turn on Circuit breakers # 16 of the turbine and check a few items: o Open keyed access door on rear of Turbine enclosure o Check Jet A fuel

Haller, Gary L.

267

Early Science Instruction Addressing Fundamental Issues  

E-Print Network (OSTI)

Commentary Early Science Instruction Addressing Fundamental Issues David Klahr Carnegie Mellon (Vol. Eds.), Handbook of child psychology: Vol. 4. Child psychology in practice (6th ed.). New York acquisition in foundational domains. In W. Damon (Series Ed.) & D. Kuhn & R.S. Siegler (Vol. Eds.), Handbook

Klahr, David

268

CALIFORNIA INSTITUTE OF TECHNOLOGY Application Instructions  

E-Print Network (OSTI)

CALIFORNIA INSTITUTE OF TECHNOLOGY Application Instructions REQUIREMENTS AND ADMISSION CRITERIA of the Dean of Graduate Studies, California Institute of Technology, Mail Code 23087, 1200 E. California Blvd the property of the California Institute of Technology. No materials will be returned to the applicant

Greer, Julia R.

269

TMS Proceedings Manuscript Instructions: One-Column Format  

Science Conference Proceedings (OSTI)

TMS ENERGY INITIATIVES · KNOWLEDGE RESOURCE CENTER · MATERIALS ... Formatting Guide (PDF) This file contains basic formatting instructions for ...

270

The Unintended Consequences of Internet Diffusion: Evidence from Malaysia  

E-Print Network (OSTI)

Job Market Paper Can the internet promote democratization by weakening government control of the media? To examine this question, I develop a model where internet penetration decreases incumbent party vote share by greatly increasing the cost of buying off the media. I test the model against evidence from Malaysia, where the incumbent coalition lost its 40 year monopoly on power in 2008. I use data matching IP addresses with physical locations to construct a measure of internet growth in Malaysia from 2004 to 2008. Using an instrumental variable approach, I find that areas with higher internet penetration experience higher turnout, higher turnover and tighter races, with the Internet accounting for a third of the 10 % swing against the incumbent party in 2008. In fact, the results suggest that in the absence of the internet, the opposition would not have achieved its historic upset in the 2008 elections.

Luke Miner; Greg Fischer; Alan Manning; George Michaelson; Kian Ming Ong; Yeong-chuan Lim; Henry Overman; Steve Pischke; Danny Quah; Ramasamy Ramach; Yasuyuki Sawada; Ibrahim Suffian; Dr. Fadhlullah Suhaimi

2011-01-01T23:59:59.000Z

271

Instruction scheduling using MAX-MIN ant system optimization  

Science Conference Proceedings (OSTI)

Instruction scheduling is a fundamental step for mapping an application to a computational device. It takes a behavioral application specification and produces a schedule for the instructions onto a collection of processing units. The objective is to ... Keywords: MAX-MIN ant system, force-directed scheduling, instruction scheduling, list scheduling

Gang Wang; Wenrui Gong; Ryan Kastner

2005-04-01T23:59:59.000Z

272

Minimizing Bank Selection Instructions for Partitioned Memory Architectures  

E-Print Network (OSTI)

selection instructions. The main idea is that we introduce two controlling variables Pu and Qu for every upon exit. Depending on the values of Pu and Qu we insert bank selection instructions according is performed. Other- 5 #12;wise they return the cost cu of a bank selection instruction. n-costu(Pu) = ( cu

Burgstaller, Bernd

273

Flexible Hardware Acceleration for Instruction-Grain Program Monitoring  

Science Conference Proceedings (OSTI)

Instruction-grain program monitoring tools, which check and analyze executing programs at the granularity of individual instructions, are invaluable for quickly detecting bugs and security attacks and then limiting their damage (via containment and/or ... Keywords: Log-Based Architectures, LBA, Instruction-grain Program Monitoring, Hardware Acceleration, Inheritance Tracking, Idempotent Filter, Metadata-TLB, Lifeguards

Shimin Chen; Michael Kozuch; Theodoros Strigkos; Babak Falsafi; Phillip B. Gibbons; Todd C. Mowry; Vijaya Ramachandran; Olatunji Ruwase; Michael Ryan; Evangelos Vlachos

2008-06-01T23:59:59.000Z

274

Accurate Instruction Pre-scheduling in Dynamically Scheduled Processors  

Science Conference Proceedings (OSTI)

The role of the instruction scheduler is to supply instructions to functional units in a timely manner so as to avoid data and structural hazards. Current schedulers are based on the broadcast of result register numbers to all instructions waiting in ...

Woojin Choi; Seok-Jun Park; Michel Dubois

2009-04-01T23:59:59.000Z

275

What is the Internet doing for and to you?  

Science Conference Proceedings (OSTI)

Many HEP sites have been participating in a project to monitor end-to-end Internet performance. A few sites have acted as central collection, analysis and report generation points for the large amount of data generated. The reports are useful for short term trouble identification, long term projections, and the evaluation of Internet services. The work is illustrated by examples of both detailed and more general Internet performance.

Cottrell, R.L.A.; Logg, C.A. [Stanford Linear Accelerator Center, Menlo Park, CA (United States); Martin, D.E. [Fermi National Accelerator Center, Batavia, IL (United States). HEP Network Resource Center

1997-06-01T23:59:59.000Z

276

NSIT Computer Time Services: Internet Time Service (ITS) ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 250-59 NIST Computer Time Services: Internet Time Service (ITS), Automated Computer Time Service (ACTS), ...

2012-09-16T23:59:59.000Z

277

EDI MOVES FROM THE VAN TO THE INTERNET  

Science Conference Proceedings (OSTI)

... 6. Nash, Kim S., "Internet EDI on horizon: users worry that steep do-it-yourself security costs may spoil the view." Computerworld. ...

1996-10-28T23:59:59.000Z

278

Communication and information: alternative uses of the Internet in households  

Science Conference Proceedings (OSTI)

Keywords: Email, Internet, World Wide Web, computer-mediated communication, family communication, interpersonal communication, online services, social impact, technology adoption, user studies

Robert Kraut; Tridas Mukhopadhyay; Janusz Szczypula; Sara Kiesler; William Scherlis

1998-01-01T23:59:59.000Z

279

A New Addressing and Forwarding Architecture for the Internet.  

E-Print Network (OSTI)

??The current Internet routing and addressing architecture is facing a serious scalability problem. The default free zone (DFZ) routing table size grows at an increasing… (more)

Guo, Cong

2011-01-01T23:59:59.000Z

280

Impact of the Internet on Tourism and Hospitality in Kenya.  

E-Print Network (OSTI)

??This thesis gives an insight into the importance of the use of the Internet in tourism and hospitality industries in Kenya. The aim of this… (more)

Njung'e, Mercyanne

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Automatisierte Wahl von Kommunikationsprotokollen für das heutige und zukünftige Internet.  

E-Print Network (OSTI)

??Das erfolgreiche Internet basiert auf einer großen Anzahl unterschiedlicher Kommunikationsprotokolle. Diese erfüllen wesentliche Aufgaben, wie Adressierung, Datentransport oder sichere Kommunikation. Wählt man die richtigen Protokolle… (more)

Völker, Lars

2012-01-01T23:59:59.000Z

282

The regulation of internet interconnection : assessing network market power  

E-Print Network (OSTI)

Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, ...

Maida, Elisabeth M. (Elisabeth Marigo)

2013-01-01T23:59:59.000Z

283

What You Don't Know About the Internet  

Science Conference Proceedings (OSTI)

... different from disseminating the information through a home page on the World Wide Web. Another very important consideration on the Internet is security.

284

Proactive techniques for correct and predictable Internet routing  

E-Print Network (OSTI)

The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

Feamster, Nicholas G. (Nicholas Greer), 1979-

2006-01-01T23:59:59.000Z

285

Internet Banking in Greece: Development, Evaluation and Perspectives.  

E-Print Network (OSTI)

??Revolutionary developments in marketing, information and communications technology continue to transform the banking and financial industry. Distribution of banking services through the Internet is an… (more)

Papandreou, Andreas-Nikolaos

2006-01-01T23:59:59.000Z

286

Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence  

Science Conference Proceedings (OSTI)

Internet deception threatens the sustainability of Internet commerce because it undermines trust. This paper investigates the deceptive tactics available on the Internet and some of the factors that make them more or less likely to be adopted. An established ... Keywords: Computer Crime, Electronic Commerce, Information Security, Internet Deception, Internet Fraud

Stefano Grazioli; Sirkka L. Jarvenpaa

2003-06-01T23:59:59.000Z

287

Classroom Observations of Instructional Practices and Technology Use by Elementary School Teachers and Students in an Ethnically-and Economically-Diverse School District  

E-Print Network (OSTI)

The purpose of this study was to observe pre-kindergarten through fifth-grade public school classrooms to examine differences among instructional practices and technology use by teachers, students and the overall classroom. The current study differed from and built upon previous classroom observational research in a number of major ways. First, the observational data examined both student and teacher technology use and the availability of technology in the classroom. Second, authentic classroom behaviors were examined in relation to technology use; specifically, behaviors related to the impact of technology use on student engagement as well as differences among technology use in classrooms and differences by student socio-economic status. Finally, unlike previous studies, this study focused specifically on pre-kindergarten through fifth-grade classrooms from the same large public school district that was diverse by both socio-economic status (SES) and by student ethnicity. Overall, the results of this study suggest that technology has not been adequately implemented into the observed classrooms. Technology was available but was not used to a great extent. When technology was implemented, teachers were primarily observed using it to present material and students were observed using it almost exclusively for basic skills activities. This low-level of technology integration occurred in elementary schools of a high performing school district which had a technology plan in place, a low student to computer ratio, and 100 percent of the classrooms had Internet access. Furthermore, only 15 percent of teachers were observed integrating technology to a great extent; however, students in these classrooms were observed on task significantly more frequently than students in classrooms where technology was observed less or not at all. On the other hand, students were observed off task significantly more in classrooms where either no technology integration was observed or where it was only observed a moderate amount. These findings support and build upon previous observational studies. There is still a need, however, for strong, empirical research to be conducted to further examine the use of technology in elementary classrooms.

Rollins, Kayla Braziel

2011-08-01T23:59:59.000Z

288

In Search of Copyright’s Lost Ark: Interpreting the Right to Distribute in the Internet Age  

E-Print Network (OSTI)

photographs posted on internet website implicated Playboy's§ 512 in holding that an Internet provider which serves,Statutory Damages in the Internet Age (in process) (

Menell, Peter S

2010-01-01T23:59:59.000Z

289

Scalability in instructional method specification: An experiment-directed approach  

E-Print Network (OSTI)

: An intelligent tutoring system (ITS) is, in principle, well suited for instructional experimentation as the automated environment allows for controlled variation of variables. These variables, aspects of the instructional and domain models, can be varied by replacing parts representing these aspects by other parts. However, if ITSs are to be used as vehicles for instructional experimentation the architecture, the knowledge representation, and the authoring environment should fulfil additional requirements. This paper discusses the requirements for experimentation-directed ITSs, the shell for ITS development and the scalable instructional method specification (SIMS) paradigm. Keywords: Authoring Language, Computer programming, Experimental Study, Instructional Design Environment, Intelligent Tutoring Systems, Object-Oriented Design. Contents 1 Introduction 2 Instructional experimentation with computers 2.1 Need for instructional experimentation 2.2 Opportunities of experimentatio...

Hein P. M. Krammer; Jan Bosch; Sanne Dijkstra

1993-01-01T23:59:59.000Z

290

Laboratory Shuttle Bus Routes: Instructions for Bicyclists  

NLE Websites -- All DOE Office Websites (Extended Search)

Instructions for Bicyclists Instructions for Bicyclists Front bike rack image Rear bike rack image Front bike rack Rear bike rack Bicyclists are required to wear helmets while riding at the Berkeley Lab. LBNL buses are equipped with bicycle racks in the front and rear of the bus. Use bicycle rack at your own risk. Berkeley Lab does not assume liability for damage to your bicycle. If you experience difficulties, or notice the bicycle rack is not working properly, please notify the bus operator and/or contact the bus supervisor at 486-4165 or email busservices@lbl.gov and/or post your comments with specific information on the Operations Suggestion box. Loading a bicycle on the bus: Prepare your bicycle for loading by: removing water bottles, pumps and other loose items that could fall off while the bus is in motion.

291

Classified Reading Room Instructions/Guidelines  

NLE Websites -- All DOE Office Websites (Extended Search)

Classified Reading Room Instructions/Guidelines Classified Reading Room Instructions/Guidelines * Reading Room Points of Contact: Milesha Grier, (202) 586-8210, milesha.gier@nnsa.doe.gov Reading Room Location: DOE Forrestal Building, 1000 Independence Ave., Washington, D.C. Room 4A-045, 4 th Floor, "A" Corridor, Behind Glass Doors, dial 6-8210 Reading Room Availability: By Appointment - Reading Room will be available until RFP Closes except (12/5/11 thru 12/16/11, December 23, January 2, 2012 and January 16, 2012). Reading Room Hours: Morning, 9:00 a.m. - 11:30 a.m.; and Afternoon 1:00 p.m. - 3:30 p.m. Reading Room Will Accommodate: Up to 5-6 people * All personnel must: a. submit a formal Intent to Bid IAW Section L of the RFP, via email to: SEB1@doeal.gov

292

Laboratory Shuttle Bus Routes: Instructions for Riders  

NLE Websites -- All DOE Office Websites (Extended Search)

Instructions for Riders Instructions for Riders Shuttle stops are marked with this sign: Bus sign image Tips for riders: When you see a shuttle bus approaching WAVE AT THE DRIVER so the driver knows you want to board the bus For safety reasons, shuttle bus drivers can only pick-up and drop-off passengers at designated stops. Shuttle services are for Berkeley Lab employee and guest use only. All riders are required to show ID when boarding off-site buses. Acceptable ID's are: LBNL badge, UC Berkeley student and faculty ID badge, DOE badge, or UCOP badge. Guests are required to present a visitor bus pass, email, or permission from Lab host, written on official letterhead. See Site Access for more information. As you board, tell the driver the building number of your destination. The driver will be able to assist you with directions.

293

TRUPACT-II Operating and Maintenance Instructions  

SciTech Connect

The purpose of this document is to provide the technical requirements for preparation for use, operation, inspection, and maintenance of a Transuranic Package Transporter Model II (TRUPACT-II) Shipping Package and directly related components. This document complies with the minimum requirements as specified in the TRUPACT-II Safety Analysis Report for Packaging (SARP) and Nuclear Regulatory Commission (NRC) Certificate of Compliance (C of C) 9218. In the event there is a conflict between this document and the TRUPACT-II SARP, the TRUPACT-II SARP shall govern. TRUPACT-II C of C number 9218 states, ''... each package must be prepared for shipment and operated in accordance with the procedures described in Chapter 7.0, Operating Procedures, of the application.'' It further states, ''... each package must be tested and maintained in accordance with the procedures described in Chapter 8.0, Acceptance Tests and Maintenance Program of the application.'' Chapter 9 of the TRUPACT-II SARP charges the Westinghouse Electric Corporation Waste Isolation Division (WID) with assuring that the TRUPACT-II is used in accordance with the requirements of the C of C. To meet this requirement and verify consistency of operations when loading and unloading the TRUPACT-II on the trailer, placing a payload in the packaging, unloading the payload from the packaging, or performing maintenance, the U.S. Department of Energy Carlsbad Area Office (U.S. DOE/CAO) finds it necessary to implement the changes that follow. This TRUPACT-II maintenance document represents a change to previous philosophy regarding site specific procedures for the use of the TRUPACT-II. This document details the instructions to be followed to consistently operate and maintain the TRUPACT-II. The intent of these instructions is to ensure that all users of the TRUPACT-II follow the same or equivalent instructions. Users may achieve this intent by any of the following methods: (1) Utilizing these instructions as is, or (2) Attaching a site-specific cover page/letter to this document stating that these are the instructions to be used at their location, or (3) Sites may prepare their own document using the steps in this document word-for-word, in-sequence, including Notes and Cautions. Site specific information may be included as deemed necessary. Submit the document to WID National TRU Programs for approval. Any revision made subsequent to WID TRU Program's approval shall be reviewed and approved by WID TRU Programs. A copy of the approval letter from WID National TRU Programs should be available for audit purposes. Users shall develop site-specific procedures addressing leak testing, preoperational activities, quality assurance, hoisting and rigging, and radiation health physics to be used in conjunction with the instructions contained in this document. Users desiring to recommend changes to this document may submit their recommendations to the WID National TRU Programs for evaluation. If approved, the change(s) will be incorporated into this document for use by all TRUPACT-II users. User sites will be audited to this document to ensure compliance within one year from the effective date of this revision. This document discusses operating instructions, required inspections and maintenance for the following: TRUPACT-II packaging, and Miscellaneous packaging, special tools, and equipment. Packaging and payload handling equipment and transport trailers have been specifically designed for use with the TRUPACT-II Packaging. This document discusses the required instructions for use of the following equipment in conjunction with the TRUPACT-II Packaging: TRUPACT-II Mobile Loading Unit (MLU), Adjustable Center-of-Gravity Lift Fixture (ACGLF), and TRUPACT-II Transport Trailer. Attachment E contains the various TRUPACT-II packaging interface control drawings, leak-test and vent-port tool drawings, ACGLF drawings, and tie-down drawings that identify the various system components.

Westinghouse Electric Corporation, Waste Isolation Division

1999-12-31T23:59:59.000Z

294

Representing Instructional Material for Scenario-Based Guided-Discovery Courseware  

Science Conference Proceedings (OSTI)

The focus of this paper is to discuss paradigms for learning that are based on sound principles of human learning and cognition, and to discuss technical challenges that must be overcome in achieving this research goal through instructional system design (ISD) approaches that are cost-effective as well as conformant with today's interactive multimedia instruction standards. Fundamental concepts are to: engage learners to solve real-world problems (progress from simple to complex); relate material to previous experience; demonstrate what is to be learned using interactive, problem-centered activities rather than passive exposure to material; require learners to use their new knowledge to solve problems that demonstrate their knowledge in a relevant applied setting; and guide the learner with feedback and coaching early, then gradually withdraw this support as learning progresses. Many of these principles have been put into practice by employing interactive learning objects as re-usable components of larger, more integrated exercises. A challenge is to make even more extensive use of interactive, scenario-based activities within a guided-discovery framework. Because the design and construction of interactive, scenario-based learning objects and more complex integrated exercises is labor-intensive, this paper explores the use of interactive learning objects and associated representation schema for instructional content to facilitate development of tools for creating scenario-based, guided-discovery courseware.

Greitzer, Frank L.; Merrill, M. DAVID.; Rice, Douglas M.; Curtis, Darren S.

2004-12-06T23:59:59.000Z

295

The broadband bonus: Estimating broadband Internet's economic value  

Science Conference Proceedings (OSTI)

How much economic value did broadband Internet create? Despite the importance of this question for national policy, no research has estimated broadband's incremental contribution to U.S. GDP by calibrating against historical adoption and incorporating ... Keywords: Broadband, Economic value, Internet, Surplus

Shane Greenstein; Ryan C. McDevitt

2011-08-01T23:59:59.000Z

296

Internet Printing Protocol/1.1: Model and Semantics  

Science Conference Proceedings (OSTI)

This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document ...

R. Herriot; R. deBry; S. Isaacson; P. Powell / T. Hastings

2000-09-01T23:59:59.000Z

297

Forecasting broadband Internet adoption on trains in Belgium  

Science Conference Proceedings (OSTI)

Thanks to the massive success of mobile access devices such as netbooks or Apple's iPhone 3G, Internet on the move has become one of the prominent features of today's information society. With the emergence of wireless and mobile communication networks, ... Keywords: Railroad industry, Segmentation forecasting, User-centric research, Wireless Internet services

Tom Evens; Dimitri Schuurman; Lieven De Marez; Gino Verleye

2010-02-01T23:59:59.000Z

298

Online Harassment in Context: Trends From Three Youth Internet  

E-Print Network (OSTI)

Objective: The current study examines an increase in youth online harassment over the last decade in order to better explore the implications of the trend for prevention initiatives. Method: The Youth Internet Safety Surveys (YISSs) involved 3 crosssectional, nationally representative telephone surveys of 4,561 youth Internet users,

Lisa M. Jones; Kimberly J. Mitchell; David Finkelhor; Lisa M. Jones; Kimberly J. Mitchell; David Finkelhor

2012-01-01T23:59:59.000Z

299

Associating Internet usage with depressive behavior among college students  

E-Print Network (OSTI)

Abstract — Depression is a mental health problem affecting a large population of college students. Since college students are active users of the Internet today, investigating associations between symptoms of depression and Internet usage has been an active area of research. While existing studies do provide critical insights, they are limited due to the fact that Internet usage of subjects is characterized by means of self-reported surveys only. In this paper, we report our findings on a month long experiment conducted at Missouri University of Science and Technology on associating depressive symptoms among college students and Internet usage using real Internet data collected continuously, unobtrusively and preserving privacy. In our study, 216 undergraduates were surveyed for depressive symptoms using the CES-D scale. We then collected their on-campus Internet usage via Cisco NetFlow records. Subsequent analysis revealed that several Internet usage features like average packets per flow, peer-to-peer (octets, packets and duration), chat octets, mail (packets and duration), ftp duration, and remote file octets exhibit a statistically significant correlation with depressive symptoms. Additionally, Mann-Whitney U-tests revealed that average packets per flow, remote file octets, chat (octets, packets and duration) and flow duration entropy demonstrate statistically significant differences in the mean values across groups with and without depressive symptoms. To the best of our knowledge, this is the first study that associates depressive symptoms among college students with continuously collected real Internet data.

Raghavendra Kotikalapudi; Frances Montgomery; Donald Wunsch

2012-01-01T23:59:59.000Z

300

Controlling access to the Internet: The role of filtering  

Science Conference Proceedings (OSTI)

Controlling access to the Internet by means of filtering software has become a growth industry in the U.S. and elsewhere. Its use has increased as the mandatory response to the current plagues of society, namely, pornography, violence, hate, and ... Keywords: Internet, United States, ethics, filters, free speech, laws, libraries

R. S. Rosenberg

2001-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

ICTs and Internet adoption in China's tourism industry  

Science Conference Proceedings (OSTI)

The fast development of information communication technologies (ICTs) and the expansion of the Internet have changed industry structures around the world. New technologies have been adopted in the tourism industry in Europe and America for more than ... Keywords: China, ICT, Internet, Tourism

Jennifer Xiaoqiu Ma; Dimitrios Buhalis; Haiyan Song

2003-12-01T23:59:59.000Z

302

Vehicular networks and the future of the mobile internet  

Science Conference Proceedings (OSTI)

The first DARPA experiment with wireless mobile Internet - the Packet Radio Network or PRNET - was completely independent of the infrastructure. This model was consistent with DARPA military goals as the PRNET was designed to support tactical operations ... Keywords: Mobile Internet, VANET, Vehicular network, Wireless network architecture

Mario Gerla; Leonard Kleinrock

2011-02-01T23:59:59.000Z

303

Understanding and modeling the internet topology: economics and evolution perspective  

Science Conference Proceedings (OSTI)

In this paper, we seek to understand the intrinsic reasons for the well-known phenomenon of heavy-tailed degree in the Internet AS graph and argue that in contrast to traditional models based on preferential attachment and centralized optimization, the ... Keywords: autonomous systems, clustering coefficient, degree distribution, internet topology, random walk, wealth evolution

Xiaoming Wang; Dmitri Loguinov

2010-02-01T23:59:59.000Z

304

Farm management systems and the Future Internet era  

Science Conference Proceedings (OSTI)

Smart/precision farming systems are expected to play an important role in improving farming activities. During the past years, sophisticated farm management systems have emerged to replace outdated complex and monolithic farm systems and software tools. ... Keywords: Farm management system, Future Internet, Generic enablers, Internet of Things

Alexandros Kaloxylos; Robert Eigenmann; Frederick Teye; Zoi Politopoulou; Sjaak Wolfert; Claudia Shrank; Markus Dillinger; Ioanna Lampropoulou; Eleni Antoniou; Liisa Pesonen; Huether Nicole; Floerchinger Thomas; Nancy Alonistioti; George Kormentzas

2012-11-01T23:59:59.000Z

305

Internet use and personal empowerment of hearing-impaired adolescents  

Science Conference Proceedings (OSTI)

The Internet has become an ordinary and widely accepted alternative social environment-known as cyberspace-in which many people take part in numerous activities. For the hearing-impaired, cyberspace provides extra benefits for two basic reasons: means ... Keywords: Adolescents, Empowerment, Hearing-impaired, Internet, Well-being

Azy Barak; Yael Sadovsky

2008-09-01T23:59:59.000Z

306

Identity based architecture for secure communication in future internet  

Science Conference Proceedings (OSTI)

We propose to enhance the Next Generation Internet by creating a secure and scalable communication infrastructure that mirrors the structure of the real world: people talk to people, objects, objects between themselves and, in general, entities denoted ... Keywords: digital identity, identity-to-identity, next generation internet, overlay network

Antonio F. Gomez-Skarmeta; Pedro Martinez-Julia; Joao Girao; Amardeo Sarma

2010-10-01T23:59:59.000Z

307

Evolution of internet address space deaggregation: myths and reality  

Science Conference Proceedings (OSTI)

Internet routing table size growth and BGP update churn are two prominent Internet scaling issues. There is widespread belief in a high and fast growing number of ASs that deaggregate prefixes, e.g., due to multi-homing and for the purpose of traffic ... Keywords: address deaggregation, routing table growth, traffic engineering, update churn

Luca Cittadini; Wolfgang Muhlbauer; Steve Uhlig; Randy Bush; Pierre Francois; Olaf Maennel

2010-10-01T23:59:59.000Z

308

Assessing the Security of a Clean-Slate Internet Architecture  

E-Print Network (OSTI)

Assessing the Security of a Clean-Slate Internet Architecture Gowtham Boddapati John Day Ibrahim Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate a comprehensive approach to security. Most recently, there have been attempts to design clean- slate internet

Texas at Arlington, University of

309

Understanding the Internet: A Guide for Materials Scientists and ...  

Science Conference Proceedings (OSTI)

Archie, the first Internet-wide archive index, allows users to search for files by name and .... Terminal access meant that users had to enter different commands for each .... One of the oldest and still best guides to the Internet, both in terms of ...

310

The diffusion of the Internet: A cross-country analysis  

Science Conference Proceedings (OSTI)

This paper analyzes the process of Internet diffusion across the world using a panel of 214 countries during the period 1990-2004. Countries are classified as low- or high-income and it is shown that the diffusion process is characterized by a different ... Keywords: Digital divide, Internet, Network externalities, O14, O33, O57, S-shape curve, Technological diffusion

Luis Andrés; David Cuberes; Mame Diouf; Tomás Serebrisky

2010-06-01T23:59:59.000Z

311

End-to-end routing behavior in the internet  

Science Conference Proceedings (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

2006-10-01T23:59:59.000Z

312

End-to-end routing behavior in the Internet  

Science Conference Proceedings (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

1996-08-01T23:59:59.000Z

313

DOE site facility mgt contracts Internet Posting 5-2-11.xlsx...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

site facility mgt contracts Internet Posting 5-2-11.xlsx DOE site facility mgt contracts Internet Posting 5-2-11.xlsx DOE site facility mgt contracts Internet Posting 5-2-11.xlsx...

314

Review: Oral Tradition and the Internet: Pathways of the Mind by John Miles Foley  

E-Print Network (OSTI)

Oral tradition and the Internet: Pathways of the mind.Oral Tradition and the Internet: Pathways of the Mind, bybook, Oral Tradition and the Internet: Pathways of the Mind,

Litwin, Rory B

2013-01-01T23:59:59.000Z

315

Internet Self-Injury Forums as Communities of Social-Cognitive Literacy Practice  

E-Print Network (OSTI)

K. Y. A. (2004). The Internet and social life. Annual ReviewThe Oxford handbook of Internet psychology (pp. 223-236).Sage. Ess, C. (2007). Internet research ethics. In A. N.

Brett, Jeremy

2010-01-01T23:59:59.000Z

316

Influences, usage, and outcomes of Internet health information searching: Multivariate results from the Pew surveys  

E-Print Network (OSTI)

Journal of Medical Internet Research, 4(1), e2. Crow, G. ,Journal of Medical Internet Research, 5(2):e10. Retrieved onJournal of Medical Internet Research, 5(3), e21.

Rice, Ronald E

2006-01-01T23:59:59.000Z

317

Report of the national workshop on internet voting: issues and research agenda  

Science Conference Proceedings (OSTI)

As use of the Internet in commerce, education and personal communication has become common, the question of Internet voting in local and national elections naturally arises. In addition to adding convenience and precision, some believe that Internet ...

C. D. Mote, Jr.

2000-05-01T23:59:59.000Z

318

Life Cycle Environmental Assessment of the Internet: The Benefits and  

NLE Websites -- All DOE Office Websites (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Thomas McKone This seminar starts by providing a short introduction to the field of Environmental Life Cycle Assessment (LCA) through a practical example of packaging. It will then develop the case of the Life Cycle Benefits and Impacts of the Internet; raising the different scientific challenges that LCA faces to provide relevant results for innovative technologies.--The rapid development of the Internet and the related potential impacts on and benefits for the environment deserves attention. The infrastructure that supports a university's use of the Internet has been comprehensively

319

Randomness Quality of CI Chaotic Generators: Applications to Internet Security  

E-Print Network (OSTI)

Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.

Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

2011-01-01T23:59:59.000Z

320

Darknet-Based Inference of Internet Worm Temporal Characteristics  

E-Print Network (OSTI)

Internet worm attacks pose a significant threat to network security and management. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms from the observations of Darknet or network telescopes that monitor a routable but unused IP address space. Under the framework of Internet worm tomography, we attempt to infer Internet worm temporal behaviors, i.e., the host infection time and the worm infection sequence, and thus pinpoint patient zero or initially infected hosts. Specifically, we introduce statistical estimation techniques and propose method of moments, maximum likelihood, and linear regression estimators. We show analytically and empirically that our proposed estimators can better infer worm temporal characteristics than a naive estimator that has been used in the previous work. We also demonstrate that our estimators can be applied to worms using different scanning strategies such as random scanning and localized scanning.

Wang, Qian; Chen, Chao

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Integrated Surface Geophysical Methods for Characterization of the Naval  

Open Energy Info (EERE)

Integrated Surface Geophysical Methods for Characterization of the Naval Integrated Surface Geophysical Methods for Characterization of the Naval Air Warfare Center, New Jersey Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Integrated Surface Geophysical Methods for Characterization of the Naval Air Warfare Center, New Jersey Author USGS Published Publisher Not Provided, 2013 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Integrated Surface Geophysical Methods for Characterization of the Naval Air Warfare Center, New Jersey Citation USGS. Integrated Surface Geophysical Methods for Characterization of the Naval Air Warfare Center, New Jersey [Internet]. 2013. [updated 2013/01/03;cited 2013/11/22]. Available from: http://water.usgs.gov/ogw/bgas/toxics/NAWC-surface.html

322

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

323

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Archived Data Dictionary Archived Data Dictionary Central Internet Database CID Photo Banner Archived Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Stream Disposition Quantity* EM Corp - The quantity of material or waste dispositioned for the stream during a specified year or range of years. Annual Stream Inventory Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be stored as of a particular year or range of years. Annual Stream Source Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be generated new, generated as process outputs (secondary), or added through a receipt from another DOE or non-DOE site, in a particular year or range of years.

324

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Data Dictionary Data Dictionary Central Internet Database CID Photo Banner Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Disposition WIMS - Planned disposition quantity (total volume of container, as disposed, in m3) reported for each year: FY08 through FY50. B C Chemical Name TRI - (Form R - Part II - Section 1.2) The name of the toxic chemical that has been released and/or transferred during the reporting year. Listed toxic chemicals are those chemicals on the list in Committee Print Number 99-169 of the Senate Committee on Environment and Public Works, titled "Toxic Chemicals Subject to Section 313 of the Emergency Planning and Community Right-To-Know Act of 1986" (42 U.S.C. 11023). Currently, there are over 600 toxic chemicals included on the list subject to reporting.

325

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

326

Integrated Building Management System (IBMS) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Management System Building Management System (IBMS) Integrated Building Management System (IBMS) The U.S. Department of Energy (DOE) is currently conducting research into an integrated building management system (IBMS). Project Description This project seeks to develop an open integration framework that allows multivendor systems to interoperate seamlessly using internet protocols. The applicant will create an integrated control platform for implementing new integrated control strategies and to enable additional enterprise control applications, such as demand response. The project team seeks to develop several strategies that take advantage of the sensors and functionality of heating, ventilation, and air conditioning (HVAC); security; and information and communication technologies (ICT) subsystems;

327

DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11.pdf...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

.pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11.pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11.pdf More Documents & Publications DOEMajorSiteFacilityCon...

328

DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11(1).pdf...  

NLE Websites -- All DOE Office Websites (Extended Search)

(1).pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf More Documents & Publications...

329

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

330

An Examination of Internet Pornography Usage Among Male Students at Evangelical Christian Colleges.  

E-Print Network (OSTI)

?? Internet pornography access among male students at Evangelical Christian colleges presents two dilemmas. First, Internet pornography access is institutionally prohibited based on a Biblical… (more)

Chelsen, Paul Olaf

2011-01-01T23:59:59.000Z

331

Internet as Teenager In Higher Education: Rapid Growth, Transformation, Uncertain but Bright Future  

E-Print Network (OSTI)

Internet is challenging higher education. Perhaps the mostMatkin, INTERNET AS TEENAGER IN HIGHER EDUCATION Notes “Chronicle of Higher Education,” “E-Learning: Successes and

Matkin, Gary

2007-01-01T23:59:59.000Z

332

Rethinking the Design of the Internet: End to End Arguements vs. the Brave New World  

E-Print Network (OSTI)

This paper looks at the Internet and the changing set of requirements for the Internet that are 8oriented towards the consumer, and used for a

Clark, David

333

On the behaviours produced by instruction sequences under execution  

E-Print Network (OSTI)

The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. The increasingly occurring case where the processing takes place remotely involves the generation of a stream of instructions to be processed and a remote execution unit that handles the processing of this stream of instructions. We use process algebra to describe the behaviours produced by instruction sequences under execution and to describe two protocols implementing these behaviours in the case of remote processing. We also show that all finite-state behaviours considered in process algebra can be produced by instruction sequences under execution.

Bergstra, J A

2011-01-01T23:59:59.000Z

334

Strategic motive of introducing Internet channels in a supply chain  

E-Print Network (OSTI)

Rapid advances of information technology in recent years have enabled both the manufacturers and the retailers to operate their own Internet channels. In this paper, we investigate the interaction between the capabilities of introducing the Internet channels, the pricing strategies, and the channel structure. We classify consumers into two segments: Grocery shoppers attach a higher utility from purchasing through the physical channel, whereas a priori Internet shoppers prefer purchasing online. We find that when the Internet shoppers are either highly profitable or fairly unimportant, the manufacturer prefers to facilitate the channel separation either through his own Internet channel or the retailer’s. In the intermediate region, however, the manufacturer encroaches the grocery shoppers and steals the demand from the retailer’s physical channel. With horizontal competition between retailers, a priori symmetric retailers may adopt different channel strategies as a stable market equilibrium. The manufacturer may willingly give up his Internet channel and leverage on the retailer competition. When the manufacturer sells through an online e-tailer, Internet shoppers may be induced to purchase through the physical channel. This reverse encroachment strategy emerges because selling through the e-tailer leads to a more severe double marginalization problem.

Lu Hsiao; Ying-ju Chen

2012-01-01T23:59:59.000Z

335

SSH: secure login connections over the internet  

Science Conference Proceedings (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, ...

Tatu Ylönen

1996-07-01T23:59:59.000Z

336

Grid Integration  

SciTech Connect

Summarizes the goals and activities of the DOE Solar Energy Technologies Program efforts within its grid integration subprogram.

Not Available

2008-09-01T23:59:59.000Z

337

Microsoft Word - Final Instructions_20110425.docx  

U.S. Energy Information Administration (EIA) Indexed Site

1905-0194 1905-0194 Expiration Date: 10/31/2013 20110425 Instructions for Form EIA-1605 Voluntary Reporting of Greenhouse Gases Revised Pursuant to 10 CFR Part 300 Guidelines for Voluntary Greenhouse Gas Reporting U.S. Energy Information Administration U.S. Department of Energy November 18, 2010 U.S. Department of Energy U.S. Energy Information Administration Form EIA-1605 Voluntary Reporting of Greenhouse Gases Form Approved OMB No. 1905-0194 Expiration Date: 10/31/2013 November 18, 2010 Voluntary Reporting of Greenhouse Gases Table of Contents Introduction ................................................................................................................................1 What Is the Purpose of Form EIA-1605? .............................................................................1

338

2011 Form EIA-63B Instructions  

U.S. Energy Information Administration (EIA) Indexed Site

U. S. DEPARTMENT OF ENERGY Form Approved U.S. ENERGY INFORMATION ADMINISTRATION OMB No. 1905-0196 Washington, DC 20585 Expires: 12/31/2013 FORM EIA-63B ANNUAL PHOTOVOLTAIC CELL/MODULE SHIPMENTS REPORT GENERAL INFORMATION AND INSTRUCTIONS I. Purpose Form EIA-63B is designed to provide the data necessary for the U.S. Energy Information Administration (EIA), a part of the U.S. Department of Energy (DOE), to carry out its responsibilities tracking photovoltaic cell/module shipments in the photovoltaic industry and

339

Pricing the Internet - A visual 3-Dimensional Evaluation Model  

E-Print Network (OSTI)

We develop a novel visual approach to evaluating an Internet pricing scheme using a 3Dmetric model, which encompasses the dimensions of technical complexity, economic efficiency and social impact. We review the history of Internet pricing research over the last decade, summarizing the key features of the most significant models, and analyzing and evaluating them using our 3D model. Based on the analysis results, we address and discuss important factors that have inhibited the deployment of the reviewed models and suggest what might be future Internet pricing solutions.

Thuy T.T. Nguyen; Grenville J. Armitage

2003-01-01T23:59:59.000Z

340

APS Experiment Safety Approval System Instructions for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

form and Experiment Hazard Control Plan? Part VII: What If... APS Experiment Safety Approval System Instructions for Users version 2.0 January 21, 2005 Contacts...

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Informational Graphics and Sign Systems as Library Instruction Media  

E-Print Network (OSTI)

design process that are most critical in determining the system's instructionalsystem's instructional function, the library staff should carefully evaluate the design

Kupersmith, John

1980-01-01T23:59:59.000Z

342

Promoting Learning of Instructional Design via Overlay Design Tools  

E-Print Network (OSTI)

Design Rationale Systems .. 19 Educational & Instructionaldesign and evolution of this system, focusing on how it was crafted to help novice instructional

Carle, Andrew Jacob

2012-01-01T23:59:59.000Z

343

Vocabulary Development and Instruction: A Handbook for Primary Grade Teachers.  

E-Print Network (OSTI)

??ABSTRACT VOCABULARY DEVELOPMENT AND INSTRUCTION: A HANDBOOK FOR PRIMARY GRADE TEACHERS by Mary B. Alldrin Master of Arts in Education Reading/Language Arts Option California State… (more)

Alldrin, Mary B.

2011-01-01T23:59:59.000Z

344

Implementation strategies for effective change: a handbook for instructional leaders.  

E-Print Network (OSTI)

??The purpose of this study was to research, develop, and validate a handbook of effective strategies that an instructional leader can implement and that are… (more)

Aistrup, Shelley A.

2010-01-01T23:59:59.000Z

345

Ready-to-Sign Licensing Instructions - Industrial Partnerships ...  

Ready-to-Sign Licensing Instructions. Read the Notice for RTS License Agreement and complete Commercialization Information Form; Select a technology from the patents ...

346

Globalizing of technology module in contextualized language instruction.  

E-Print Network (OSTI)

??The module "Technology in Contextualized Language Instruction" provides models and insights into the ways in which teachers can use technology to connect their students and… (more)

Aglawe, Anjali A.

2011-01-01T23:59:59.000Z

347

Instructional JAVA modules based on molecular simulation - TMS  

Science Conference Proceedings (OSTI)

Nov 9, 2007 ... This website contains a selection of instructional JAVA modules designed to increase understanding of molecular simulations and molecular ...

348

Student attitude and learning outcomes of multimedia computer-assisted versus traditional instruction in basketball  

Science Conference Proceedings (OSTI)

The purpose of this study was to examine the effect of multimedia computer-assisted instruction (MCAI), traditional instruction (TI), and combined instruction (CI) methods on learning the skill of shooting in basketball. Additionally, a comparison of ... Keywords: Attitude, Basketball, Cognitive learning, Instructional technology, Multimedia software, Physical education, Traditional instruction

Nicholas Vernadakis; Eleni Zetou; Efi Tsitskari; Maria Giannousi; Efthimis Kioumourtzoglou

2008-09-01T23:59:59.000Z

349

Access and Delivery of Integrated Weld Process Models  

Science Conference Proceedings (OSTI)

Table 1   Software tools for integrated weld modeling...http://www.aws.org/wj/2008/05/wj200805/wj0508-36.pdf Desktop SORPAS http://www.swantec.com/sorpas.htm Desktop E-WeldPredictor http://calculations.ewi.org/VJP/ Internet...

350

Differentiated Instruction: Understanding the personal factors and organizational conditions that facilitate differentiated instruction in elementary mathematics classrooms  

E-Print Network (OSTI)

College  Press.   RTI  Action  Network.  Retrieved  July  Response  to  Intervention   (‘RTI’) 15  as  a  framework  instruction  using  a  RTI   framework.  I  was  

Abbati, Diana Guglielmo

2012-01-01T23:59:59.000Z

351

Standards as interdependent artifacts : the case of the Internet  

E-Print Network (OSTI)

This thesis has explored a new idea: viewing standards as interdependent artifacts and studying them with network analysis tools. Using the set of Internet standards as an example, the research of this thesis includes the ...

Hsieh, Mo-Han

2008-01-01T23:59:59.000Z

352

The Internet and the Millennium Problem (Year 2000)  

Science Conference Proceedings (OSTI)

The Year 2000 Working Group (WG) has conducted an investigation into the millennium problem as it regards Internet related protocols. This investigation only targeted the protocols as documented in the Request For Comments Series (RFCs). This investigation ...

P. Nesser, II

1999-06-01T23:59:59.000Z

353

Electricity "Used by the Internet": A Cautionary Tale  

NLE Websites -- All DOE Office Websites (Extended Search)

Electricity "Used by the Internet": A Cautionary Tale Speaker(s): Jonathan Koomey Date: April 13, 2000 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Julie Osborn In...

354

A human rights approach to the mobile internet  

E-Print Network (OSTI)

2. What is a human rights approach to communication?..............................................4 3. The empowering potential of the mobile internet....................................................6 a. Citizen journalism and peer to peer information sharing.....................................................6 b. Crowdsourcing.............................................................................................................7

Lisa Horner

2011-01-01T23:59:59.000Z

355

Life Cycle Environmental Assessment of the Internet: The Benefits...  

NLE Websites -- All DOE Office Websites (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90...

356

Taming the Internet for eBusiness Use  

Science Conference Proceedings (OSTI)

Many companies nowadays realise that secure Internet access is a precursor to joining the information superhighway. This paper outlines the solution that BT's Advanced Communications Engineering (ACE) directorate produced, in a joint effort with Concert ...

R. Davison

2000-04-01T23:59:59.000Z

357

Understanding senior executives' use of information technology and the internet  

Science Conference Proceedings (OSTI)

The Internet and information technology (IT) have received considerable attention from senior executives, yet they still have not committed themselves fully to these technologies. Consequently, they are not reaping the full benefits. Recent studies investigated ...

Guus G. M. Pijpers

2002-01-01T23:59:59.000Z

358

On attack causality in internet-connected cellular networks  

Science Conference Proceedings (OSTI)

The emergence of connections between telecommunications networks and the Internet creates significant avenues for exploitation. For example, through the use of small volumes of targeted traffic, researchers have demonstrated a number of attacks capable ...

Patrick Traynor; Patrick McDaniel; Thomas La Porta

2007-08-01T23:59:59.000Z

359

Internet Advertising: Market Structure and New Pricing Methods  

Science Conference Proceedings (OSTI)

In this paper the Internet advertising market is analyzed. Data and estimates confirm that the Web represents a real threat to television and newspapers. Therefore, the main characteristics of the advertising market are described in order to point out ...

Andrea Mangàni

2000-09-01T23:59:59.000Z

360

ESnet and Internet2 to launch next gen research network  

E-Print Network (OSTI)

"The Department of Energy's (DOE) Energy Sciences Network (ESnet) and Internet2 will deploy a high capacity nationwide network that will greatly enhance the capabilities of researchers across the country who participate in the DOE's scientific research efforts." (1 page)

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

A Two-bit Differentiated Services Architecture for the Internet  

Science Conference Proceedings (OSTI)

This document was originally submitted as an internet draft in November of 1997. As one of the documents predating the formation of the IETF's Differentiated Services Working Group, many of the ideas presented here, in concert with Dave Clark's subsequent ...

K. Nichols; V. Jacobson; L. Zhang

1999-07-01T23:59:59.000Z

362

The consumer Internet in South Korea : an American's perspective  

E-Print Network (OSTI)

This thesis will explore the consumer internet industry in South Korea from the perspective of an American with Western values and sensibilities. South Korea is widely considered to be one of the most connected and ...

Byun, Jeffrey

2008-01-01T23:59:59.000Z

363

Search and Product Differentiation at an Internet Shopbot  

E-Print Network (OSTI)

Price dispersion among commodity goods is typically attributed to consumer search costs. We explore the magnitude of consumer search costs using a data set obtained from a major Internet shopbot. For the median consumer, ...

Brynjolfsson, Erik

2004-03-05T23:59:59.000Z

364

An interoperable internet scale solution for RFID network security  

E-Print Network (OSTI)

Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for ...

Mao, Tingting

365

Teaching internet use to adult learners: The LANL experience  

Science Conference Proceedings (OSTI)

The Research library at Los Alamos National Laboratory has been teaching an Internet class to adult learners since May 1994. The class is a team effort, combining lecture/demo with hands-on practice using Gopher and the World Wide Web. What started out as a small short-term project has become a weekly class available to any Lab employee or associate. More than 250 people have been taught to find basic reference materials and to navigate the Internet on the Gopher and World Wide Web. The class is one of the first classes offered by the Research Library to be filled every month, and one Laboratory group has recommended that their staff attend this class in preparation for more advanced Internet and HTML classes as part of their group training. The success of this class spurred development by the Research Library of more specific subject classes using Internet resources, specifically business and general science resources.

Smith, S.; Comstock, D.

1995-12-01T23:59:59.000Z

366

OSTI Pact with Internet Archive Ensures Uninterrupted Research Access |  

Office of Scientific and Technical Information (OSTI)

Pact with Internet Archive Ensures Uninterrupted Research Access Pact with Internet Archive Ensures Uninterrupted Research Access E-print Network One sure thing about the World Wide Web: like the weather, it will change. Given this dynamic nature of the Web and the importance of preservation of scientific information in a digital environment, OSTI recently partnered with Internet Archive to ensure uninterrupted access to more than 1 million online research papers from the E-print Network. The DOE E-print Network is the largest collection that a federal institution has undertaken in an on-going effort to preserve their own documents and history through Archive-It. "As a result of the pioneering partnership between the Internet Archive and OSTI, we are ensuring long-term, continuous access to the growing body of cutting-edge

367

In Things We Trust? Towards trustability in the Internet of Things  

E-Print Network (OSTI)

This essay discusses the main privacy, security and trustability issues with the Internet of Things.

Hoepman, Jaap-Henk

2011-01-01T23:59:59.000Z

368

Architectures for the future networks and the next generation Internet: A survey  

Science Conference Proceedings (OSTI)

Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive ... Keywords: Future Internet architecture survey, Future Internet design (FIND), Future network architecture, Global Environment for Networking Innovations (GENI), Next generation Internet

Subharthi Paul; Jianli Pan; Raj Jain

2011-01-01T23:59:59.000Z

369

MEC-IDC: joint load balancing and power control for distributed Internet Data Centers  

Science Conference Proceedings (OSTI)

Internet Data Center (IDC) supports the reliable operations of many important Internet on-line services. As the demand on Internet services and cloud computing keep increasing in recent years, the power usage associated with IDC operations has been uprising ... Keywords: cyber-physical system, distributed internet data center, load balancing, power control

Lei Rao; Xue Liu; Marija Ilic; Jie Liu

2010-04-01T23:59:59.000Z

370

ASK-IT/A2L: Assessing student knowlede with instructional technology  

E-Print Network (OSTI)

The ASK-IT/Assessing-to-Learn (A2L) project is an attempt to bring a strategic approach to learning, instruction, and communication. ASK-IT/A2L seeks to integrate formative assessment and classroom response system use with physics instruction at both the high school and college levels. In this guide, we present a structure for discussing the new mindset students need in an ASK-IT/A2L classroom, consisting of twelve "habits of mind" for students to develop. To help teachers plan instruction, we present a model of five stages of cognitive development that most students need to follow to develop desirable knowledge and skills. We show how a typical lesson might be organized around "items," the smallest unit of ASK-IT/A2L lesson planning: questions, problems, or tasks given to students to work on individually or in groups. To help with item creation, we present our model-based design paradigm and suggest tips for avoiding common pitfalls and ways to match up cognitive goals with habits of mind. Finally, we apply ...

Dufresne, R J; Leonard, W J; Mestre, J P

2005-01-01T23:59:59.000Z

371

Integrating the Havana agent platform into the existing web infrastructure  

Science Conference Proceedings (OSTI)

Mobile software agents represent an ideal mechanism for dealing with information overload and disconnected computing. Currently, however, they are not integrated into the existing web infrastructure and therefore no websites are agent-enabled. Two ... Keywords: MAS, agent gateway, agent integration, agent-based systems, business incentives, disconnected computing, information overload, internet, mobile agents, multi-agent systems, security, software agents, web agents, web infrastructure

Qusay H. Mahmoud; Leslie Yu

2010-10-01T23:59:59.000Z

372

Evolution of the Internet k-dense structure  

E-Print Network (OSTI)

As the Internet AS-level topology grows over time, some of its structural properties remain unchanged. Such time- invariant properties are generally interesting, because they tend to reflect some fundamental processes or constraints behind Internet growth. As has been shown before, the time-invariant structural properties of the Internet include some most basic ones, such as the degree distribution or clustering. Here we add to this time-invariant list a non-trivial property - k-dense decomposition. This property is derived from a recursive form of edge multiplicity, defined as the number of triangles that share a given edge. We show that after proper normalization, the k- dense decomposition of the Internet has remained stable over the last decade, even though the Internet size has approximately doubled, and so has the k-density of its k-densest core. This core consists mostly of content providers peering at Internet eXchange Points, and it only loosely overlaps with the high-degree or high-rank AS core, con...

Orsini, Chiara; Lenzini, Luciano; Krioukov, Dmitri

2013-01-01T23:59:59.000Z

373

Williams instructional technology: summer students working on faculty projects  

Science Conference Proceedings (OSTI)

Williams Instructional Technology (WIT) is a summer technology intern program hosted by the Office for Information Technology at Williams College. The WIT program started in 1997 as part of an Andrew W. Mellon Foundation grant. The goals of the program ... Keywords: faculty, instructional technology, program, projects, students, summer, training, williams college, wit

Trevor Murphy

2007-10-01T23:59:59.000Z

374

DemoCut: generating concise instructional videos for physical demonstrations  

Science Conference Proceedings (OSTI)

Amateur instructional videos often show a single uninterrupted take of a recorded demonstration without any edits. While easy to produce, such videos are often too long as they include unnecessary or repetitive actions as well as mistakes. We introduce ... Keywords: demonstrations, how-to, instructions, tutorials, video

Pei-Yu Chi, Joyce Liu, Jason Linder, Mira Dontcheva, Wilmot Li, Bjoern Hartmann

2013-10-01T23:59:59.000Z

375

A DVS-based pipelined reconfigurable instruction memory  

Science Conference Proceedings (OSTI)

Energy consumption is of significant concern in battery operated embedded systems. In the processors of such systems, the instruction cache consumes a significant fraction of the total energy. One of the most popular methods to reduce the energy consumption ... Keywords: instruction cache, low power, reconfigurable memory

Zhiguo Ge; Tulika Mitra; Weng-Fai Wong

2009-07-01T23:59:59.000Z

376

Insolation integrator  

DOE Patents (OSTI)

An electric signal representative of the rate of insolation is integrated to determine if it is adequate for operation of a solar energy collection system.

Dougherty, John J. (Norristown, PA); Rudge, George T. (Lansdale, PA)

1980-01-01T23:59:59.000Z

377

Co-Synthesis of Instruction Sets and Microarchitectures  

E-Print Network (OSTI)

The design of an instruction set processor includes several related design tasks: instruction set design, microarchitecture design, and code generation. Although there have been automatic approaches for each individual task, the investigation of the interaction between these tasks still primarily relies on designers' experience and ingenuity. It is thus the goal of this research to develop formal models and algorithms to investigate such interaction systematically. This dissertation presents a two-phase co-synthesis approach to the problem. In the architectural level, given a set of application benchmarks and a pipeline structure, the ASIA (Automatic Synthesis of Instruction set Architecture) design automation system generates an instruction set and allocates hardware resources which best fit the applications, and, at the same time, maps the applications to assembly code with the synthesized instruction set. This approach formulates the codesign problem as a modified scheduling/allocat...

Ing-Jer Huang

1994-01-01T23:59:59.000Z

378

Microsoft Word - EIA-910 Instructions.doc  

U.S. Energy Information Administration (EIA) Indexed Site

Page 1 Page 1 U.S. DEPARTMENT OF ENERGY Form Approved ENERGY INFORMATION ADMINISTRATION OMB No. 1905-0175 Washington, DC 20585 Expiration Date: 02/28/2015 MONTHLY NATURAL GAS MARKETER SURVEY FORM EIA-910 INSTRUCTIONS PURPOSE The Energy Information Administration (EIA) Form EIA-910, "Monthly Natural Gas Marketer Survey," is used to collect information on natural gas sales from marketers in selected States that have active customer choice programs. The EIA is requesting information on the volume and revenue for natural gas commodity sales, and any receipts for distribution charges and taxes associated with the sale of natural gas. REPORTING REQUIREMENTS Form EIA-910 must be completed by all natural gas marketers with residential and/or commercial customers in the States of Georgia,

379

Microsoft Word - EIA-912 Instructions.doc  

U.S. Energy Information Administration (EIA) Indexed Site

ENERGY INFORMATION ADMINISTRATION Washington, DC 20585 Form Approved OMB No. 1905-0175 Expiration Date: 02/28/2015 EIA-912 WEEKLY UNDERGROUND NATURAL GAS STORAGE REPORT INSTRUCTIONS PURPOSE The Energy Information Administration (EIA) Form EIA-912, "Weekly Underground Natural Gas Storage Report," is used to collect information on weekly inventories of natural gas in underground storage facilities. Data are collected pursuant to the Federal Energy Administration (FEA) Act of 1974, Public Law 93- 275. This report is mandatory under the FEA Act. REPORTING REQUIREMENTS The EIA-912 must be completed by recipients of the Form EIA- 912. Companies receiving notification were statistically selected by the EIA from a listing of all underground natural gas storage

380

Microsoft Word - EIA-857 Instructions.doc  

U.S. Energy Information Administration (EIA) Indexed Site

Page 1 U.S. DEPARTMENT OF ENERGY Form Approved ENERGY INFORMATION ADMINISTRATION OMB No. 1905-0175 Washington, DC 20585 Expiration Date: 02/28/2015 MONTHLY REPORT OF NATURAL GAS PURCHASES AND DELIVERIES TO CONSUMERS FORM EIA-857 INSTRUCTIONS PURPOSE The Energy Information Administration (EIA) Form EIA-857, "Monthly Report of Natural Gas Purchases and Deliveries to Consumers," is designed to collect data on the quantity and cost of natural gas delivered to distribution systems and the quantity and revenue of natural gas delivered to end-use consumers by market sector, on a monthly basis by State. The data appear in the EIA publications, Monthly Energy Review, Natural Gas Annual, and Natural Gas Monthly. REPORTING REQUIREMENTS

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Microsoft Word - EIA-191 Instructions.doc  

U.S. Energy Information Administration (EIA) Indexed Site

Form Approved Form Approved ENERGY INFORMATION ADMINISTRATION OMB No. 1905-0175 Washington, DC 20585 Expiration Date: 02/28/2015 MONTHLY UNDERGROUND GAS STORAGE REPORT FORM EIA-191 INSTRUCTIONS PURPOSE The Energy Information Administration (EIA) Form EIA-191, "Monthly Underground Gas Storage Report," provides data on the operations of all active underground storage facilities. Data are collected pursuant to the Federal Energy Administration (FEA) Act of 1974, Public Law 93-275. This report is mandatory under the FEA Act. The data appear in the EIA publications Monthly Energy Review, Natural Gas Annual, and Natural Gas Monthly. REPORTING REQUIREMENTS All companies that operate underground natural gas storage fields in the United States must provide the information requested.

382

Supporting Instructional Assistants in an Elementary Learning Center Model: A Resource Handbook and Training Guide.  

E-Print Network (OSTI)

??Instructional assistants in special education classrooms fulfill a vital need to successfully support students with special needs. The problem with utilizing instructional assistants in the… (more)

Geminert, Mandy

2012-01-01T23:59:59.000Z

383

The Internet, Youth Safety and the Problem of “Juvenoia”  

E-Print Network (OSTI)

The internet and its associated electronic technologies have provoked a considerable wave of worry and anxiety among parents and policy makers worldwide in recent years. But in this discussion a very crucial distinction has not been sufficiently made. It is one thing to say that there are risks online. The research has clearly established the point that such perils exist, from online molesters and bullies, to exposure to problematic content. But where it is easy for people to jump beyond the evidence base is when they assert, not just that there are risks, but that the Internet is a risk-promoting environment or a specially risky environment. They imply that there are features of the Internet that increase risk for young people above what they already encounter or what they encounter in other environments, or what they used to encounter. It is hard to cite any research that as yet supports that notion. Yet, this is the narrative implicit in much of what is being written. Of course, writers generally preface their discussion of risks by talking about the benefits of the Internet, making the point that it has both risks and benefits. But then they go on to describe Internet dynamics that increase risks and that increase the potential for deviance or corruption.(Pellow, 2009) In a phrase, they assert that the Internet is a risk- and social problem “amplifier.” So, for example, the contention is, not just that they can encounter sexual exploiters online, but that the Internet makes it more likely that children will be sexually abused because it has made it so easy for molesters to find them.(U.S. House of Representatives- 109th Congress,

David Finkelhor; David Finkelhor

2011-01-01T23:59:59.000Z

384

DRAFT STAFF REPORT FORMS AND INSTRUCTIONS FOR  

E-Print Network (OSTI)

plans showing how demand for energy and annual peak load will be met by specific supply)............................................................. 20 Supply Form S-2: Energy Balance Table RESOURCE PLANS Prepared in Support of the 2013 Integrated Energy Policy Report

385

Distributed Multimodal Information Processing GroupINTERNET OF THINGS  

E-Print Network (OSTI)

Small and lightweight components become more and more powerful, and at the same time cheaper. This enables the augmentation of physical objects with digital technology (e.g., information processing, communication). The interconnection of such ‘intelligent ’ devices leads away from the classical internet of computers towards the ‘Internet of Things’. This development has a wide range of implications in the dimensions of technology, applications and society. A significant area of application areas will be influenced by the ‘Internet of Things’, from private households over mobility to research and industry. In this seminar, various aspects of the Internet of Things were investigated. In the technological domain, the underlying communication technologies and hardware was discussed and an overview of interaction techniques with intelligent objects was gained. Furthermore, an overview of application domains was given and, based on selected examples, deeper investigated, such as the Internet of Vehicles. Last but not least, also economical implications and potential business models were investigated. Each of the single chapters addresses a specific topic and presents fundamental research trends and developments. This

Eckehard Steinbach; Matthias Kranz; Anas Al-nuaimi; Stefan Diewald; Andreas Möller; Luis Roalter; Florian Schweiger (editors; Technische Universität München

2013-01-01T23:59:59.000Z

386

Internet Engineering Task Force (IETF) Request for Comments: 6521  

E-Print Network (OSTI)

This document describes a home agent-assisted route optimization functionality for the IPv4 Network Mobility Protocol. The function is designed to facilitate optimal routing in cases where all nodes are connected to a single home agent; thus, the use case is route optimization within a single organization or similar entity. The functionality enables the discovery of eligible peer nodes (based on information received from the home agent) and their network prefixes, and the establishment of a direct tunnel between such nodes. Status of This Memo This document is not an Internet Standards Track specification; it is published for examination, experimental implementation, and evaluation. This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at

A. Makela; J. Korhonen

2012-01-01T23:59:59.000Z

387

The cacheand-forward network architecture for efficient mobile content delivery services in the future internet  

E-Print Network (OSTI)

This paper presents a novel “cache-and-forward ” (CNF) protocol architecture for mobile content delivery services in the future Internet. The CNF architecture can be implemented as an overlay on top of the Internet Protocol (IP), or as a clean slate protocol for next-generation networks. CNF is based on the concept of store-and-forward routers with large storage, providing for opportunistic delivery to occasionally disconnected mobile users and for in-network caching of content. The proposed CNF protocol uses reliable hop-by-hop transfer of large data files between CNF routers in place of an end-to-end transport protocol like TCP. This approach makes it possible to serve mobile users with intermittent connectivity, while also mitigating selfinterference problems which arise in multi-hop wireless scenarios. Hop-by-hop transport is similarly useful in wired networks where router storage can help to smooth out link congestion bottlenecks which arise in TCP/IP networks. A second key feature of the CNF protocol is the integration of addressbased and content-based routing to support various content delivery modes that take advantage of in-network storage. An overview of the CNF architecture and major protocol components is given, and preliminary performance evaluation results are summarized to validate the main design principles.

Sanjoy Paul; Roy Yates; Dipankar Raychaudhuri; Jim Kurose

2008-01-01T23:59:59.000Z

388

Family factors in Internet addiction among Chinese youth: A review of English- and Chinese-language studies  

Science Conference Proceedings (OSTI)

Approximately 513 million Chinese citizens used the Internet in 2011, with adolescents reporting comparatively high levels of use. Although numerous studies (reviewed herein) indicate that Internet Addiction/Pathological Internet Use (IA/PIU) is endemic ... Keywords: Chinese youth, Family factors, Internet addiction, Pathological Internet Use, Review article

Wen Li, Eric L. Garland, Matthew O. Howard

2014-02-01T23:59:59.000Z

389

A Framework for Enabling Distributed Applications on the Internet  

E-Print Network (OSTI)

The last five years have seen the rapid rise in popularity of what we term internet distributed applications (IDAs). These are internet applications with which many users interact simultaneously. IDAs range from P2P file-sharing applications, to collaborative distributed computing projects, to massively multiplayer online games (MMOGs). Currently, there is no framework that combines IDAs collectively within a single context. We provide a basis for such a framework here. In considering IDAs collectively, we found that there was no generic description that had been applied to them as a group. We have therefore put forward such a description here. In our description, IDAs are functionality separated into three logic layers, which are designed and built individually. Each layer is represented by functionality on the software client running on each participating computer, which together comprise the overall IDA. The core contribution of this work is a framework, called the Internet Distributed Application Framewor...

McLaughlin, Mark Anthony

2011-01-01T23:59:59.000Z

390

Internet of Things: Applications and Challenges in Technology and Standardization  

E-Print Network (OSTI)

The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers,potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.

Bandyopadhyay, Debasis

2011-01-01T23:59:59.000Z

391

Battling the Internet Water Army: Detection of Hidden Paid Posters  

E-Print Network (OSTI)

We initiate a systematic study to help distinguish a special group of online users, called hidden paid posters, or termed "Internet water army" in China, from the legitimate ones. On the Internet, the paid posters represent a new type of online job opportunity. They get paid for posting comments and new threads or articles on different online communities and websites for some hidden purposes, e.g., to influence the opinion of other people towards certain social events or business markets. Though an interesting strategy in business marketing, paid posters may create a significant negative effect on the online communities, since the information from paid posters is usually not trustworthy. When two competitive companies hire paid posters to post fake news or negative comments about each other, normal online users may feel overwhelmed and find it difficult to put any trust in the information they acquire from the Internet. In this paper, we thoroughly investigate the behavioral pattern of online paid posters bas...

Chen, Cheng; Srinivasan, Venkatesh; Zhang, Xudong

2011-01-01T23:59:59.000Z

392

International energy efficiency and renewable energy resources on the Internet  

SciTech Connect

A variety of sources of information on energy efficiency and renewable energy technologies are available on the Internet`s World Wide Web. These resources are sponsored and maintained by a myriad of organizations across the country and world. One expeditious way to access these resources is by using the U.S. Department of Energy`s Energy Efficiency and Renewable Energy Network (EREN). This network is a user-friendly computer link to Internet based information on energy conservation and renewable energy technologies and techniques. Numerous international sources of information can be accessed through EREN including the International Energy Agency`s Centre for the Analysis and Dissemination of Demonstrated Energy Technologies (CADDET) and the Greenhouse Gas Technology Information Exchange (GREENTIE). CADDET`s Register of demonstrated energy technologies provides an extensive guide to energy efficient and renewable energy technologies, and GREENTIE`s Directory of supplier information helps users access technology providers and experts.

Brown, M.A. [Oak Ridge National Lab., TN (United States); Meyer, R.D. [USDOE, Washington, DC (United States)

1996-10-01T23:59:59.000Z

393

File:AlaskaTitleVApplicationSubmittalInstructions.pdf | Open Energy  

Open Energy Info (EERE)

AlaskaTitleVApplicationSubmittalInstructions.pdf AlaskaTitleVApplicationSubmittalInstructions.pdf Jump to: navigation, search File File history File usage File:AlaskaTitleVApplicationSubmittalInstructions.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 20 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:34, 1 November 2012 Thumbnail for version as of 11:34, 1 November 2012 1,275 × 1,650 (20 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

394

INSTRUCTION MANUAL--SNAP-7C ELECTRIC GENERATION SYSTEM  

SciTech Connect

A description of SNAP-7C isotope-fueled electric generation system is presented. The operational limits and transportation, handling, installation, and adjustment procedures are described. Maintenance instructions and emergency and safety precautions are included. (M.C.G.)

Blazek, E.

1961-10-01T23:59:59.000Z

395

ENGR 4060 Technology of Brazil Instructions for Provost's Scholarship Form  

E-Print Network (OSTI)

ENGR 4060 Technology of Brazil Instructions for Provost's Scholarship Form Enter the data in red Semester 11 Study Abroad Program: ENGR 4060: Technology of Brazil Program Destination: Brazil Program

396

Site-specific waste management instruction - radiological screening facility  

DOE Green Energy (OSTI)

This Site-Specific Waste Management Instruction provides guidance for managing waste generated from radiological sample screening operations conducted to support the Environmental Restoration Contractor`s activities. This document applies only to waste generated within the radiological screening facilities.

G. G. Hopkins

1997-12-31T23:59:59.000Z

397

Instructions for Accessing FedConnect Postings, June 30, 2009  

Energy.gov (U.S. Department of Energy (DOE))

Instructions for Accessing FedConnect Postings and applying for Federal grants including the Smart Grid Investment Grants awarded as part of the American Recovery and Reinvestment Act of 2009.

398

Identification and validation of cognitive design principles for automated generation of assembly instructions  

Science Conference Proceedings (OSTI)

Designing effective instructions for everyday products is challenging. One reason is that designers lack a set of design principles for producing visually comprehensible and accessible instructions. We describe an approach for identifying such design ... Keywords: assembly instructions, design principles, diagrams, spatial ability, visual instructions

Julie Heiser; Doantam Phan; Maneesh Agrawala; Barbara Tversky; Pat Hanrahan

2004-05-01T23:59:59.000Z

399

Nov. 6, 2001. DNA routines for Maple 7 Contents: 1) Instructions for ...  

E-Print Network (OSTI)

... Janeiro - UERJ - Brazil. *********************************************************** ********** 1) Instructions for Windows users 1) unzip dna.zip into any directory !

400

Custom-Instruction Synthesis for Extensible-Processor Platforms  

E-Print Network (OSTI)

Efficiency and flexibility are critical, but often conflicting, design goals in embedded system design. The recent emergence of extensible processors promises a favorable tradeoff between efficiency and flexibility, while keeping design turnaround times short. Current extensible processor design flows automate several tedious tasks, but typically require designers to manually select the parts of the program that are to be implemented as custom instructions. In this work, we describe an automatic methodology to select custom instructions to augment an extensible processor, in order to maximize its efficiency for a given application program. We demonstrate that the number of custom instruction candidates grows rapidly with program size, leading to a large design space, and that the quality (speedup) of custom instructions varies significantly across this space, motivating the need for the proposed flow. Our methodology features cost functions to guide the custom instruction selection process, as well as static and dynamic pruning techniques to eliminate inferior parts of the design space from consideration. Furthermore, we employ a two-stage process, wherein a limited number of promising instruction candidates are first short-listed using efficient selection criteria, and then evaluated in more detail through cycle-accurate instruction set simulation and synthesis of the corresponding hardware, to identify the custom instruction combinations that result in the highest program speedup or maximize speedup under a given area constraint. We have evaluated the proposed techniques using a state-of-the-art extensible processor platform, in the context of a commercial design flow. Experiments with several benchmark programs indicate that custom processors synthesized using automa...

Fei Sun; Student Member; Anand Raghunathan; Srivaths Ravi; Senior Member; Niraj K. Jha

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

NREL: Energy Systems Integration - Integrated Deployment Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Deployment Workshop Integrated Deployment Workshop The Energy Systems Integration Facility workshop, Integrated Deployment, was held August 21 - 23, 2012 at the National Renewable Energy Laboratory in Golden, Colorado. Each day of the workshop, which included a tour of the Energy Systems Integration Facility, focused on a different topic: Day 1: Utility-Scale Renewable Integration Day 2: Distribution-Level Integration Day 3: Isolated and Islanded Grid Systems The agenda and presentations from the workshop are below. Agenda Energy Systems Integration Facility Overview ESIF Technology Partnerships Integrated Deployment Model Integrated Deployment and the Energy Systems Integration Facility: Workshop Proceedings Printable Version Energy Systems Integration Home Research & Development

402

NREL: Energy Systems Integration - Energy Systems Integration...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Systems Integration Facility NREL's Energy Systems Integration Facility Garners LEED Platinum View the NREL Press Release. NREL's multistory Energy Systems Integration...

403

Intermittent exercise in response to nicotine cravings in the context of an internet-based smoking cessation program  

E-Print Network (OSTI)

F. (2007). A comparison of Internet and print-based physicalVlieland, T. P. M. (2007). Internet- based physical activityliterature. Journal of Medical Internet Research, 9(3), e26.

Linke, Sarah Elizabeth

2011-01-01T23:59:59.000Z

404

The Evolution of the Internet Community and the"Yet-to-Evolve" Smart Grid Community: Parallels and Lessons-to-be-Learned  

Science Conference Proceedings (OSTI)

The Smart Grid envisions a transformed US power distribution grid that enables communicating devices, under human supervision, to moderate loads and increase overall system stability and security. This vision explicitly promotes increased participation from a community that, in the past, has had little involvement in power grid operations -the consumer. The potential size of this new community and its member's extensive experience with the public Internet prompts an analysis of the evolution and current state of the Internet as a predictor for best practices in the architectural design of certain portions of the Smart Grid network. Although still evolving, the vision of the Smart Grid is that of a community of communicating and cooperating energy related devices that can be directed to route power and modulate loads in pursuit of an integrated, efficient and secure electrical power grid. The remaking of the present power grid into the Smart Grid is considered as fundamentally transformative as previous developments such as modern computing technology and high bandwidth data communications. However, unlike these earlier developments, which relied on the discovery of critical new technologies (e.g. the transistor or optical fiber transmission lines), the technologies required for the Smart Grid currently exist and, in many cases, are already widely deployed. In contrast to other examples of technical transformations, the path (and success) of the Smart Grid will be determined not by its technology, but by its system architecture. Fortunately, we have a recent example of a transformative force of similar scope that shares a fundamental dependence on our existing communications infrastructure - namely, the Internet. We will explore several ways in which the scale of the Internet and expectations of its users have shaped the present Internet environment. As the presence of consumers within the Smart Grid increases, some experiences from the early growth of the Internet are expected to be informative and pertinent.

McParland, Charles

2009-11-06T23:59:59.000Z

405

integr~1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 AUDIT REPORT THE U.S. DEPARTMENT OF ENERGY' S MANAGEMENT OF RESEARCH AND DEVELOPMENT INTEGRATION MARCH 1998 U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF AUDIT SERVICES DEPARTMENT OF ENERGY Washington, DC 20585 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Principal Deputy Inspector General SUBJECT: INFORMATION : Audit Report on "Audit of the Department of Energy's Management of Research and Development Integration" BACKGROUND The Congress, independent task forces, and advisory groups have pointed out the need for the Department to improve its integration of research and development (R&D) projects. In the past, R&D management was carried out by different program offices with the research being

406

CSP 550: Internet Programming Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and Paradigms, 2002.  

E-Print Network (OSTI)

CSP 550: Internet Programming Texts Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and SOAP 9 hours Total 45 hours Edited March 2006 (html, css checks) CSP 550: Internet Programming - CS

Heller, Barbara

407

Horses and Barn Doors: Evolution of Corporate Guidelines for Internet Usage  

Science Conference Proceedings (OSTI)

Intel's Internet usage policy evolved from paractically non-existant to explicitly defined - all in reaction to changing conditions and security threats. This paper covers the evolution of Intel Internet access policy, a continual struggle to close the ...

Sally Hambridge; Jeffrey C. Sedayao

1993-11-01T23:59:59.000Z

408

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

409

Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"  

E-Print Network (OSTI)

The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coal—the PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

Koomey, Jonathan G.

2008-01-01T23:59:59.000Z

410

Diffusion and Impacts of the Internet and E-Commerce: The Case of Denmark  

E-Print Network (OSTI)

1999 to 2000, the numbers of customers using the Internet to1999 to 2000, the numbers of customers using the Internet tolargest total number of online customers with 3.3 million

Bjorn-Andersen, Niels; Andersen, Kim Viborg

2004-01-01T23:59:59.000Z

411

Diffusion and Impacts of the Internet and E-Commerce in Japan  

E-Print Network (OSTI)

22 percent). Only a few companies (8 percent) have moved2003. A Cluster of Internet Companies in Tokyo—Review of Bit2001. Survey of Internet Companies in Tokyo. Tokyo: Fujitsu

Tachiki, Dennis; Hamaya, Satoshi; Yukawa, Koh

2004-01-01T23:59:59.000Z

412

An overview of the internet of underwater things  

Science Conference Proceedings (OSTI)

Approximately 71% of the Earth's surface is covered by ocean, a continuous body of water that is customarily divided into several principal oceans and smaller seas. Ocean temperatures determine climate and wind patterns that affect life on land. Freshwater ... Keywords: Applications, Architecture, Internet of underwater things, Research challenges

Mari Carmen Domingo

2012-11-01T23:59:59.000Z

413

BGP-lens: patterns and anomalies in internet routing updates  

Science Conference Proceedings (OSTI)

The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stability of Internet routing. Here we make two contributions: firstly we ... Keywords: BGP monitoring, anomalies, patterns, self-similarity

B. Aditya Prakash; Nicholas Valler; David Andersen; Michalis Faloutsos; Christos Faloutsos

2009-06-01T23:59:59.000Z

414

Zigbee-based Internet of Things in 3D Terrains  

Science Conference Proceedings (OSTI)

This paper focuses on the Zigbee-based Internet of Things (IoTs) in 3D terrains. A novel simulation model for IoT is proposed. The effects of various terrains, node's mobility and traffic loads are investigated in this study. Many comprehensive studies ...

Mu-Sheng Lin, Jenq-Shiou Leu, Kuen-Han Li, Jean-Lien C. Wu

2013-08-01T23:59:59.000Z

415

Acculturation to the global culture and internet adoption  

Science Conference Proceedings (OSTI)

Globalization is felt in most parts of the world and its effects on culture are becoming a topic of interest to society and in particular to the IS academic community. Our research addresses calls for research on the issue of globalization and its cultural ... Keywords: acculturation, dynamic view of culture, global culture, internet adoption, subjective norm, technology acceptance model, theory of reasoned action

Reem Ayouby; Anne-Marie Croteau; Louis Raymond

2012-11-01T23:59:59.000Z

416

The English literature researcher in the age of the Internet  

Science Conference Proceedings (OSTI)

This study explores the extent to which the information seeking behaviour of researchers active in the field of English Literature in the universities of the UK and the wider world has changed as a result of the developing electronic information revolution. ... Keywords: English literature, Internet, electronic information sources, humanities researchers, information seeking

David Ellis; Hanna Oldman

2005-02-01T23:59:59.000Z

417

A descriptive model of information problem solving while using internet  

Science Conference Proceedings (OSTI)

This paper presents the IPS-I-model: a model that describes the process of information problem solving (IPS) in which the Internet (I) is used to search information. The IPS-I-model is based on three studies, in which students in secondary and (post) ... Keywords: Learning strategies, Lifelong learning, Media in education

Saskia Brand-Gruwel; Iwan Wopereis; Amber Walraven

2009-12-01T23:59:59.000Z

418

Mitigating sampling error when measuring internet client IPv6 capabilities  

Science Conference Proceedings (OSTI)

Despite the predicted exhaustion of unallocated IPv4 addresses between 2012 and 2014, it remains unclear how many current clients can use its successor, IPv6, to access the Internet. We propose a refinement of previous measurement studies that mitigates ... Keywords: banner-ad-based measurement, ipv6 deployment

Sebastian Zander; Lachlan L.H. Andrew; Grenville Armitage; Geoff Huston; George Michaelson

2012-11-01T23:59:59.000Z

419

A Novel Cyber-Insurance for Internet Security  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

Pal, Ranjan; Psounis, Konstantinos

2011-01-01T23:59:59.000Z

420

REIMBURSEMENT FOR USE OF PRIVATE WIRELESS AND INTERNET CONNECTIVITY  

E-Print Network (OSTI)

To provide guidelines for Wildlife Services (WS) reimbursement for employees ’ use of personally-owned wireless telephones or internet connectivity to conduct official U.S. Government business. 2. REPLACEMENT HIGHLIGHTS This directive revises WS Directive 4.190.1 dated February 14, 2013.

unknown authors

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Assimilation of Internet-based purchasing applications within medical practices  

Science Conference Proceedings (OSTI)

The changing shape of the traditional buyer-supplier relationship between independent medical practices, or office-based physicians, and medical industry suppliers has prompted the proliferation of Internet-based purchasing applications. Healthcare informatics ... Keywords: Assimilation, Diffusion, Healthcare, IT performance, Supply chain management

Richard Klein

2012-05-01T23:59:59.000Z

422

The Chinese speech emotion interaction and recognition on internet  

Science Conference Proceedings (OSTI)

In this paper, we attempt to establish a communication environment of emotions and select six emotions---joy, surprise, anger, sadness, fear and neutral. With the speech recognition, the researcher analyzes the changes and reactions of emotions in speeches ... Keywords: internet emotion communication, online games, speech emotion recognition

Kuen-Meau Chen; Ming-Jen Wang; Hsueh-Wen Niu; Ku-Ching Chiang

2007-08-01T23:59:59.000Z

423

Internet requests for comments (RFCs) as scholarly publications  

Science Conference Proceedings (OSTI)

This note describes the various peer review processes applied to Internet Requests for Comments (RFCs) over a number of years, and suggests that these have been up to normal scholarly standards since at least 1992. The authors believe that these documents ... Keywords: request for comments, rfc

Brian E. Carpenter; Craig Partridge

2010-01-01T23:59:59.000Z

424

Proceedings of the 2013 conference on Internet measurement conference  

Science Conference Proceedings (OSTI)

Welcome to the 2013 edition of the Internet Measurement Conference. The 42 papers you will hear presented over the next three days represent some of the year's best work in network measurement and we hope you enjoy their contributions! This year the ...

Konstantina (Dina) Papagiannaki, Krishna Gummadi, Craig Partridge

2013-10-01T23:59:59.000Z

425

Renewable energy provisioning for ICT services in a future internet  

Science Conference Proceedings (OSTI)

As one of the first worldwide initiatives provisioning ICT (Information and Communication Technologies) services entirely based on renewable energy such as solar, wind and hydroelectricity across Canada and around the world, the GreenStar Network (GSN) ... Keywords: Mantychore FP7, future internet, green ICT, green star network

Kim Khoa Nguyen; Mohamed Cheriet; Mathieu Lemay; Bill St. Arnaud; Victor Reijs; Andrew Mackarel; Pau Minoves; Alin Pastrama; Ward Van Heddeghem

2011-01-01T23:59:59.000Z

426

Interconnecting Smart Objects with IP: The Next Internet  

Science Conference Proceedings (OSTI)

Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. Interconnecting Smart Objects with IP is the first book that takes a holistic approach to the revolutionary area of IP-based ...

Jean-Philippe Vasseur; Adam Dunkels

2010-06-01T23:59:59.000Z

427

Understanding the efficacy of deployed internet source address validation filtering  

Science Conference Proceedings (OSTI)

IP source address forgery, or "spoofing," is a long-recognized consequence of the Internet's lack of packet-level authenticity. Despite historical precedent and filtering and tracing efforts, attackers continue to utilize spoofing for anonymity, indirection, ... Keywords: filtering, ip spoofing, source address validation

Robert Beverly; Arthur Berger; Young Hyun; k claffy

2009-11-01T23:59:59.000Z

428

Should specific values be embedded in the internet architecture?  

Science Conference Proceedings (OSTI)

A fundamental disagreement in the Future Internet debate concerns architecture design and value. Should an architecture incorporate inherent values that have been widely accepted through societal debate or be adaptable once deployed to a wider range ... Keywords: architecture, control points, value set

Ian Brown; David D. Clark; Dirk Trossen

2010-11-01T23:59:59.000Z

429

Proceedings of the Re-Architecting the Internet Workshop  

Science Conference Proceedings (OSTI)

We are pleased to present the Proceedings of the 2010 Workshop on Re-Architecting the Internet (ReArch'10), which is held in conjunction with 6th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT). The program of ...

Bob Briscoe; Peter Steenkiste

2010-11-01T23:59:59.000Z

430

A Clean Slate Design of Internet's Congestion Control Algorithm  

E-Print Network (OSTI)

A Clean Slate Design of Internet's Congestion Control Algorithm Nandita Dukkipati (Collaborators. Slow additive increase means flows take a long time to acquire spare capacity 2. Unsustainable large delay 1 RT T p = 3/(2w2 ) #12;Explicit Control Protocol (XCP) · Proposed by Katabi et. al Sigcomm 2002

Duffy, Ken

431

HTTP: An Evolvable Narrow Waist for the Future Internet  

E-Print Network (OSTI)

personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. HTTP: An Evolvable Narrow Waist for the Future Internet

Lucian Popa; Patrick Wendell; Ali Ghodsi; Ion Stoica

2012-01-01T23:59:59.000Z

432

Internet News Aided Evaluation of China's Housing Market  

Science Conference Proceedings (OSTI)

China's housing (real estate) market is booming fast in the past decade and many researchers try to analyze the housing economy and propose measures to put it under control. In this work, we evaluate China's housing market from a novel view of Internet ... Keywords: housing market, real estate, public sentiment, web mining

Yue Wang; Beibei Lin; Tianmei Wang; Haifeng Li; Yuejin Zhang; Zhigang Zhang

2012-10-01T23:59:59.000Z

433

Providing signed content on the Internet by synthesized animation  

Science Conference Proceedings (OSTI)

Written information is often of limited accessibility to deaf people who use sign language. The eSign project was undertaken as a response to the need for technologies enabling efficient production and distribution over the Internet of sign language ... Keywords: Animation, HamNoSys, SiGML, avatar, deaf accessibility, scripting, sign language, virtual reality

J. R. Kennaway; J. R. W. Glauert; I. Zwitserlood

2007-09-01T23:59:59.000Z

434

Dynamic resource management of cloud-hosted internet applications  

Science Conference Proceedings (OSTI)

Internet is evolving toward service-oriented computing platforms (e.g., cloud computing platforms, such as Amazon EC2 and Microsoft Azure). In these platforms, service providers (owners of the platforms) offer resource pools by building multiple geo-distributed ...

Hangwei Qian / Michael Rabinovich

2012-01-01T23:59:59.000Z

435

Government Surveillance and Political Participation on the Internet  

Science Conference Proceedings (OSTI)

Although more is probably known about the causes of political participation than any other political behavior, the research program suffers in that it generally assumes citizens operate within an unproblematic surveillance context. This article argues ... Keywords: Internet, Michel Foucault, political participation, privacy, resistance, social control, surveillance

Brian S. Krueger

2005-11-01T23:59:59.000Z

436

The experimental literature of the internet: an annotated bibliography  

Science Conference Proceedings (OSTI)

The DARPA Internet is the most successful experiment in heterogeneous internetworking. It connects computer systems from almost every major vendor, using a wide variety of wide-area and local-area network technology, and is in continual use by thousands ...

Jeffrey C. Mogul

1989-01-01T23:59:59.000Z

437

Towards a dependable architecture for internet-scale sensing  

Science Conference Proceedings (OSTI)

The convergence of embedded sensors and pervasive high-performance networking is giving rise to a new class of distributed applications, which we refer to as Internet-scale sensing (ISS). ISS systems consist of a large number of geographically distributed ...

Rohan Narayana Murty; Matt Welsh

2006-11-01T23:59:59.000Z

438

The dark side of the Internet: Attacks, costs and responses  

Science Conference Proceedings (OSTI)

The Internet and Web technologies have originally been developed assuming an ideal world where all users are honorable. However, the dark side has emerged and bedeviled the world. This includes spam, malware, hacking, phishing, denial of service attacks, ... Keywords: Click fraud, Cyber warfare, Denial of service attack, Digital rights management, Hacking, Malware, Online frauds, Online gambling, Online piracy, Phishing, Spam

Won Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So

2011-05-01T23:59:59.000Z

439

Internet Engineering Task Force (IETF) Request for Comments: 5879  

E-Print Network (OSTI)

Heuristics for Detecting ESP-NULL Packets This document describes a set of heuristics for distinguishing IPsec ESP-NULL (Encapsulating Security Payload without encryption) packets from encrypted ESP packets. These heuristics can be used on intermediate devices, like traffic analyzers, and deep-inspection engines, to quickly decide whether or not a given packet flow is encrypted, i.e., whether or not it can be inspected. Use of these heuristics does not require any changes made on existing IPsec hosts that are compliant with RFC 4303. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at

T. Kivinen; Authentec Inc; D. Mcdonald

2010-01-01T23:59:59.000Z

440

Two decades of internet video streaming: A retrospective view  

Science Conference Proceedings (OSTI)

For over two decades, video streaming over the Internet has received a substantial amount of attention from both academia and industry. Starting from the design of transport protocols for streaming video, research interests have later shifted to the ... Keywords: HTTP streaming, P2P streaming, Video streaming, cloud computing, multicast, multimedia streaming, social media

Baochun Li, Zhi Wang, Jiangchuan Liu, Wenwu Zhu

2013-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Instructional design authoring support for the development of serious games and mixed reality training. Paper presented at Interservice/Industry Training, Simulation and Education Conference  

E-Print Network (OSTI)

A significant trend is underway to apply entertainment game technologies to training environments, the Serious Games movement. These training games will be delivered through traditional technologies such as desktop computers as well as mobile computers, embedded in operational equipment and mixed reality technologies. The design and development of effective training using these technologies is challenging. There is often deep conflict between ensuring that the desired instructional goals are met while at the same time staying true to key benefits of games for training––engagement, fun, and complexity of the training scenario. The unpredictability of games impedes control of training variables and poorly designed games may result in negative training effects. Yet, trainers realize that many current training systems and instructional methods are ineffective, lack real world complexity and are boring. There is a need to bridge the gap between proven simulation and other training systems, and gaming entertainment technologies. Authoring tools are needed to ensure these new systems are used effectively. Our team has been investigating how to develop an instructional design authoring tool that supports the entire process from identifying training requirements through the delivery of regular and embedded training. We developed the Simulation-game Instructional Systems Design (SG-ISD) Model which has been mapped to ensure it supports official Instructional Systems Development (ISD) processes for effective design while integrating game

Sonny E. Kirkley, Ph.D.; Steve Tomblin; Jamie Kirkley

2005-01-01T23:59:59.000Z

442

The Evolution of the Internet Community and the "Yet-to-Evolve" Smart Grid Community: Parallels and Lessons-to-be-Learned  

E-Print Network (OSTI)

The Evolution of the Internet Community and the “Yet-to-The Evolution of the Internet Community and the “Yet-to-Keywords: Smart Grid, Internet protocols, Internet ecosphere

McParland, Charles

2010-01-01T23:59:59.000Z

443

Integrated System  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Window System Our research activities in the field of high performance windows have led us to conclude that even by using high performance insulating glass units, low conductivity frames, and warm edge spacers, there are still untapped sources for improving energy efficiency in the design and use of residential windows. While such high performance windows are a dramatic improvement over conventional units, they do not reduce conductive losses through wall framing around the window, offer guarantees against excessive wall/window infiltration nor do they adapt to the daily and seasonal potentials for night insulation and summer shading. To meet this need, we have been working on the design, development, and prototyping of Integrated Window Systems (IWS) since 1993. Integrated Window Systems are a form of panelized construction where the wall panel includes an operable or fixed window sash, recessed night insulation, integral solar shading, and is built in a factory setting in order to minimize thermal short circuits and infiltration at joints. IWSs can be built in modular lengths to facilitate their installation with conventional wood frame stick construction or other forms of panelized construction.

444

Geography-based structural analysis of the Internet  

SciTech Connect

In this paper, we study some geographic aspects of the Internet. We base our analysis on a large set of geolocated IP hop-level session data (including about 300,000 backbone routers, 150 million end hosts, and 1 billion sessions) that we synthesized from a variety of different input sources such as US census data, computer usage statistics, Internet market share data, IP geolocation data sets, CAJDA's Skitter data set for backbone connectivity, and BGP routing tables. We use this model to perform a nationwide and statewide geographic analysis of the Internet. Our main observations are: (1) There is a dominant coast-to-coast pattern in the US Internet traffic. In fact, in many instances even if the end-devices are not near either coast, still the traffic between them takes a long detour through the coasts. (2) More than half of the Internet paths are inflated by 100% or more compared to their corresponding geometric straight-line distance. This circuitousness makes the average ratio between the routing distance and geometric distance big (around 10). (3) The weighted mean hop count is around 5, but the hop counts are very loosely correlated with the distances. The weighted mean AS count (number of ASes traversed) is around 3. (4) The AS size and the AS location number distributions are heavy-tailed and strongly correlated. Most of the ASes are medium sized and there is a wide variability in the geographic dispersion size (measured in terms of the convex hull area) of these ASes.

Kasiviswanathan, Shiva [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Yan, Guanhua [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

445

Age and Trust in the Internet: The Centrality of Experience and Attitudes Toward Technology in Britain  

Science Conference Proceedings (OSTI)

The authors describe changes in user's trust on the Internet in Britain between 2003 and 2009, and show how the relationship between age and trust can be explained by a combination of experience with the Internet and general attitudes toward technology. ... Keywords: Internet, replication, risk, technology attitudes, trust

Grant Blank; William H. Dutton

2012-05-01T23:59:59.000Z

446

An Empirical Analysis of User Content Generation and Usage Behavior on the Mobile Internet  

Science Conference Proceedings (OSTI)

We quantify how user mobile Internet usage relates to unique characteristics of the mobile Internet. In particular, we focus on examining how the mobile-phone-based content generation behavior of users relates to content usage behavior. The key objective ... Keywords: content generation, content usage, geographical mobility, identification, interdependence, mobile Internet, social networks

Anindya Ghose; Sang Pil Han

2011-09-01T23:59:59.000Z

447

Citywide mobile internet access using dense urban WiFi coverage  

Science Conference Proceedings (OSTI)

We investigate if it is feasible to use the WiFi coverage in urban areas for mobile Internet access and which type of applications can benefit from the Internet access provided by the already deployed WiFi Access Points (APs). Nowadays, most smartphones ... Keywords: mobile clients, mobile internet access, wifi, wireless networks

Maria Eugenia Berezin; Franck Rousseau; Andrzej Duda

2012-12-01T23:59:59.000Z

448

Is the Internet for Porn? An Insight Into the Online Adult Industry  

E-Print Network (OSTI)

Is the Internet for Porn? An Insight Into the Online Adult Industry Gilbert Wondracek1 , Thorsten Introduction "The Internet is for Porn" is the title of a satirical song that has been viewed several million at work. With a total worth of more than 97 billion USD in 2006 [14], the Internet porn industry yields

Kruegel, Christopher

449

Precursor or Sequela: Pathological Disorders in People with Internet Addiction Disorder  

E-Print Network (OSTI)

Background: This study aimed to evaluate the roles of pathological disorders in Internet addiction disorder and identify the pathological problems in IAD, as well as explore the mental status of Internet addicts prior to addiction, including the pathological traits that may trigger Internet addiction disorder. Methods and Findings: 59 students were measured by Symptom CheckList-90 before and after they became addicted to the Internet. A comparison of collected data from Symptom Checklist-90 before Internet addiction and the data collected after Internet addiction illustrated the roles of pathological disorders among people with Internet addiction disorder. The obsessive-compulsive dimension was found abnormal before they became addicted to the Internet. After their addiction, significantly higher scores were observed for dimensions on depression, anxiety, hostility, interpersonal sensitivity, and psychoticism, suggesting that these were outcomes of Internet addiction disorder. Dimensions on somatisation, paranoid ideation, and phobic anxiety did not change during the study period, signifying that these dimensions are not related to Internet addiction disorder. Conclusions: We can not find a solid pathological predictor for Internet addiction disorder. Internet addiction disorder may

Guangheng Dong; Qilin Lu; Hui Zhou; Xuan Zhao

2011-01-01T23:59:59.000Z

450

Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users  

Science Conference Proceedings (OSTI)

Every day dangerous criminals are targeting high net wealth members of our community as they venture onto the internet. Statements from twenty-nine community organizations and mature age internet users were analyzed using structured coding techniques ... Keywords: Criminal, Fraud, Internet, Mature, Phishing, Spear

Nigel Martin, John Rice

2013-01-01T23:59:59.000Z

451

Defending against an Internet-based attack on the physical world  

Science Conference Proceedings (OSTI)

We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide ... Keywords: Internet Threats, automated attacks, computer security, comuter security, cybercrime, internet threats

Simon Byers; Aviel D. Rubin; David Kormann

2002-11-01T23:59:59.000Z

452

TITLE: Multimedia Over the Internet DURATION: Half day (can be extended to full-day)  

E-Print Network (OSTI)

technologies. The fundamental technical concepts and principles of multimedia, Internet, and Web are presented. INFORMATION SUPERHIGHWAYS AND WORLD WIDE WEB - Fundamentals of Internet - Intranet and its operation - World Publishers). He recently completed three handbooks, to be published by the CRC Press, "Handbook of Internet

Furht, Borko

453

An advanced model of consumer attitudes toward advertising on the mobile internet  

Science Conference Proceedings (OSTI)

Advertising on the mobile internet is considered as an influential new marketing channel in the new future. So far technological limitations inhibit its optimised usage in Europe and the US, whereas in Japan constant access to the internet via mobile ... Keywords: Japan, consumer attitudes, consumer behaviour, m-advertising, m-marketing, mobile advertising, mobile communications, mobile internet, mobile marketing, structural equation modelling, value

Parissa Haghirian; Akihiro Inoue

2007-01-01T23:59:59.000Z

454

Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning  

Science Conference Proceedings (OSTI)

Internet Coordinates Systems (ICS) are used to predict Internet distances with limited measurements. However the precision of an ICS is degraded by the presence of Triangle Inequality Violations (TIVs). Simple methods have been proposed to detect TIVs, ... Keywords: Decision Trees, Internet Coordinate System, Supervised Learning, Triangle Inequality Violation

Yongjun Liao; Mohamed Ali Kaafar; Bamba Gueye; François Cantin; Pierre Geurts; Guy Leduc

2009-05-01T23:59:59.000Z

455

Network service abstractions for a mobility-centric future internet architecture  

Science Conference Proceedings (OSTI)

The increasing composition of mobile devices and mobile applications in the Internet requires us to revisit the traditional principles of fixed, host-centric communications, when designing a next-generation architecture. To support this major shift, ... Keywords: application programming interface, future internet architecture, internet, mobility, network services, trust

Francesco Bronzino, Kiran Nagaraja, Ivan Seskar, Dipankar Raychaudhuri

2013-10-01T23:59:59.000Z

456

The design of an autonomic communication element to manage future internet services  

Science Conference Proceedings (OSTI)

Future Internet services will have vastly different requirements than the current Internet. Manageability, which has been largely ignored, will have the dual role of controlling capital and operational expenditures as well as enabling agile reorganization ... Keywords: FOCALE, autonomic architecture, autonomic element, business driven, device management, future internet, management

John Strassner; Sung-Su Kim; James Won-Ki Hong

2009-09-01T23:59:59.000Z

457

Business Models for Monetizing Internet Applications and Web Sites: Experience, Theory, and Predictions  

Science Conference Proceedings (OSTI)

Almost all attempts to date to monetize Internet applications targeted at individuals have focused on natural extensions of traditional media or traditional retailing. Most are either some form of consumer-focused advertising or of consumer-focused e-commerce. ... Keywords: Business Models For The Internet, Future Of Online Advertising, Monetizing The Internet, Strategic Information Systems

Eric Clemons

2009-09-01T23:59:59.000Z

458

The 3rd workshop on active internet measurements (AIMS-3) report  

Science Conference Proceedings (OSTI)

On February 10-12, 2011, CAIDA hosted the third Workshop on Active Internet Measurements (AIMS-3) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshops. As with the previous two AIMS workshops, the goals were to further our ... Keywords: active measurement, internet measurement techniques, management techniques, validation

kc claffy

2011-07-01T23:59:59.000Z

459

The 5th workshop on active internet measurements (AIMS-5) report  

Science Conference Proceedings (OSTI)

On February 6-8, 2013, CAIDA hosted the fifth Workshop on Active Internet Measurements (AIMS-5) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshops. As with previous AIMS workshops, the goals were to further our understanding ... Keywords: active measurement, internet, validation

kc claffy

2013-07-01T23:59:59.000Z

460

Final Report on Internet Addressable Lightswitch  

Science Conference Proceedings (OSTI)

This report describes the work performed to develop and test a new switching system and communications network that is useful for economically switching lighting circuits in existing commercial buildings. The first section of the report provides the general background of the IBECS (Integrated Building Environmental Communications System) research and development work as well as the context for the development of the new switching system. The research and development effort that went into producing the first proof-of-concept (the IBECS Addressable Power Switch or APS) and the physical prototype of that concept is detailed in the second section. In the third section of the report, we detail the refined Powerline Carrier Based IBECS Title 24 Wall Switch system that evolved from the APS prototype. The refined system provided a path for installing IBECS switching technology in existing buildings that may not be already wired for light level switching control. The final section of the report describes the performance of the IBECS Title 24 Switch system as applied to a small demonstration in two offices at LBNL's Building 90. We learned that the new Powerline Carrier control systems (A-10 technology) that have evolved from the early X-10 systems have solved most of the noise problems that dogged the successful application of X-10 technologies in commercial buildings. We found that the new A-10 powerline carrier control technology can be reliable and effective for switching lighting circuits even in electrically noisy office environments like LBNL. Thus we successfully completed the task objectives by designing, building and demonstrating a new switching system that can provide multiple levels of light which can be triggered either from specially designed wall switches or from a digital communications network. By applying commercially available powerline carrier based technologies that communicate over the in-place lighting wiring system, this type of control can be economi cally installed even in existing buildings that were not wired for dual-level lighting.

Rubinstein, Francis; Pettler, Peter

2001-08-27T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

NALDA (Naval Aviation Logistics Data Analysis) CAI (computer aided instruction)  

SciTech Connect

Data Systems Engineering Organization (DSEO) personnel developed a prototype computer aided instruction CAI system for the Naval Aviation Logistics Data Analysis (NALDA) system. The objective of this project was to provide a CAI prototype that could be used as an enhancement to existing NALDA training. The CAI prototype project was performed in phases. The task undertaken in Phase I was to analyze the problem and the alternative solutions and to develop a set of recommendations on how best to proceed. The findings from Phase I are documented in Recommended CAI Approach for the NALDA System (Duncan et al., 1987). In Phase II, a structured design and specifications were developed, and a prototype CAI system was created. A report, NALDA CAI Prototype: Phase II Final Report, was written to record the findings and results of Phase II. NALDA CAI: Recommendations for an Advanced Instructional Model, is comprised of related papers encompassing research on computer aided instruction CAI, newly developing training technologies, instructional systems development, and an Advanced Instructional Model. These topics were selected because of their relevancy to the CAI needs of NALDA. These papers provide general background information on various aspects of CAI and give a broad overview of new technologies and their impact on the future design and development of training programs. The paper within have been index separately elsewhere.

Handler, B.H. (Oak Ridge K-25 Site, TN (USA)); France, P.A.; Frey, S.C.; Gaubas, N.F.; Hyland, K.J.; Lindsey, A.M.; Manley, D.O. (Oak Ridge Associated Universities, Inc., TN (USA)); Hunnum, W.H. (North Carolina Univ., Chapel Hill, NC (USA)); Smith, D.L. (Memphis State Univ., TN (USA))

1990-07-01T23:59:59.000Z

462

L'evoluzione di Internet e del Web marketing: l'uso di Internet da parte dei ristoranti della provincia di Lucca.  

E-Print Network (OSTI)

??La tesi tratta dell'evoluzione di Internet e del Web marketing dalla loro nascita ai giorni nostri. Il caso aziendale tratta invece lo studio sul campo… (more)

ORSUCCI, STEFANO

2013-01-01T23:59:59.000Z

463

Beneficial or adverse? Exploring the association between Internet content consumption and sexual identity among single gay men who use the Internet in Guangdong, China.  

E-Print Network (OSTI)

??The purpose of this research is to explore the relationship between homosexual identity and the Internet, using an online sample from Southern China. The goals… (more)

Huang, Liqi

2013-01-01T23:59:59.000Z

464

A Comparison of Education, Business, and Engineering Undergraduate Students’ Internet Use and their Experience, Confidence, and Competence in Using New Literacies of the Internet  

E-Print Network (OSTI)

This study explored beginning and advanced pre-service teachers’ Internet use and their experience, confidence, and competence in using new literacies of the Internet. In addition, this study compared the pre-service teachers to same-aged business and engineering students. Through using an online survey, this study recruited 1350 students from the various disciplines. This study conducted comparisons between a) underclassmen across the three majors, b) seniors across the majors, and c) underclassmen and seniors within the majors. This study found that as digital natives, education, business, and engineering students used the Internet frequently. However, they were relatively unfamiliar with using new literacies of the Internet during their high school and university educational experiences. Overall, the three majors’ students were confident but they were not competent in using new literacies of the Internet including locating and evaluating information on the Internet. Comparisons between and within the majors revealed that education underclassmen were less confident and competent than engineering underclassmen peers and senior education students in evaluating information on the Internet. Education seniors were comparable to business and engineering seniors in their confidence and competence in both locating and evaluating information on the Internet. The findings imply that teacher educators need to understand the weaknesses of their pre-service teachers and provide them with appropriate opportunities and training to know how to effectively use and furthermore teach new literacies of the Internet.

Kim, Su Yeon

2011-05-01T23:59:59.000Z

465

DOE-L.__ PROPOSAL PREPARATION INSTRUCTIONS - COVER LETTER AND  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

L.__ PROPOSAL PREPARATION INSTRUCTIONS - COVER LETTER AND L.__ PROPOSAL PREPARATION INSTRUCTIONS - COVER LETTER AND VOLUME I, OFFER AND OTHER DOCUMENTS (a) Instruction - Cover Letter. The cover letter shall include, but not be limited to, the following: (1) The solicitation number. (2) The name, address, telephone numbers, facsimile numbers, and electronic addresses of the Offeror. (3) A statement identifying any exceptions or deviations the Offeror is taking to the terms and conditions specified in the contract (Sections A through K of this solicitation, as amended). However, exceptions and/or deviations are not sought and the Government is under no obligation to enter into discussions. Exceptions or deviations may constitute a deficiency. (4) The names, titles, telephone numbers, facsimile numbers, and

466

Inside: Instruction selection/identification & design exploration for extensible processors  

E-Print Network (OSTI)

This paper presents the INSIDE system that rapidly searches the design space for extensible processors, given area and performance constraints of an embedded application, while minimizing the design turn-around-time. Our system consists of a) a methodology to determine which code segments are most suited for implementation as a set of extensible instructions, b) a heuristic algorithm to select pre-configured extensible processors as well as extensible instructions (library), and c) an estimation tool which rapidly estimates the performance of an application on a generated extensible processor. By selecting the right combination of a processor core plus extensible instructions, we achieve a performance increase on average of 2.03x (up to 7x) compared to the base processor core at a minimum hardware overhead of 25 % on average. 1.

Newton Cheung; Sri Parameswaran; Jörg Henkel

2002-01-01T23:59:59.000Z

467

Migrating Home Agents Towards Internet-scale Mobility Deployments  

E-Print Network (OSTI)

While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these technologies, in order to hide location changes of the mobile nodes from the rest of the Internet, a specific router called a home agent is used. However, this equipment generates resilience and performance issues such as protocol scalability and longer paths. In order to solve these problems, we describe and analyze a new concept called Home Agent Migration. The main feature of this solution is the distribution of home agents inside the current Internet topology to reduce distances to end-nodes. As is usually done for anycast routing, they advertise the same network prefix from different locations; moreover they also exchange information

Ryuji Wakikawa; Guillaume Valadon

2006-01-01T23:59:59.000Z

468

Modeling Internet-Scale Policies for Cleaning up Malware  

E-Print Network (OSTI)

An emerging consensus among policy makers is that interventions undertaken by Internet Service Providers are the best way to counter the rising incidence of malware. However, assessing the suitability of countermeasures at this scale is hard. In this paper, we use an agent-based model, called ASIM, to investigate the impact of policy interventions at the Autonomous System level of the Internet. For instance, we find that coordinated intervention by the 0.2%-biggest ASes is more effective than uncoordinated efforts adopted by 30% of all ASes. Furthermore, countermeasures that block malicious transit traffic appear more effective than ones that block outgoing traffic. The model allows us to quantify and compare positive externalities created by different countermeasures. Our results give an initial indication of the types and levels of intervention that are most cost-effective at large scale.

Hofmeyr, Steven; Forrest, Stephanie; Edwards, Benjamin; Stelle, George

2012-01-01T23:59:59.000Z

469

Application of Steganography for Anonymity through the Internet  

E-Print Network (OSTI)

In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.

Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe

2012-01-01T23:59:59.000Z

470

FY 2013 FRPC DATA REPORTING INSTRUCTIONS I. Background  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2013 FRPC DATA REPORTING INSTRUCTIONS I. Background Executive Order 13327, "Federal Real Property Asset Management" was created to promote the efficient and economical use of the Federal Government's real property assets. The E.O. established the interagency Federal Real Property Council (FRPC), established the role of the Senior Real Property Officer, and mandated the creation of a centralized real property database. This document provides instructions for populating the required data in FIMS so that the Department can report in accordance with the FY 2013 FRPC reporting requirements.

471

ENERGY STAR Industrial Plant Certification: Instructions for applying |  

NLE Websites -- All DOE Office Websites (Extended Search)

Industrial Plant Certification: Instructions for Industrial Plant Certification: Instructions for applying Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources

472

The degree and connectivity of Internet's scale-free topology  

E-Print Network (OSTI)

In this paper we theoretically and empirically study the degree and connectivity of the Internet's scale-free topology at the autonomous system (AS) level. The basic features of the scale-free network have influence on the normalization constant of the degree distribution p(k). We develop a mathematics model of the Internet's scale-free topology. On this model we theoretically get the formulas of the average degree, the ratios of the kmin-degree (minimum degree) nodes and the kmax-degree (maximum degree) nodes, the fraction of the degrees (or links) in the hands of the richer (top best-connected) nodes. We find the average degree is larger for smaller power-law exponent {\\lambda} and larger minimum or maximum degree. The ratio of the kmin-degree nodes is larger for larger {\\lambda} and smaller kmin or kmax. The ratio of the kmax-degree ones is larger for smaller {\\lambda} and kmax or larger kmin. The richer nodes hold most of the total degrees of the AS-level Internet topology. In addition, we reveal the rati...

Zhang, Lianming; Yu, Jianping; Wu, Xiangsheng

2011-01-01T23:59:59.000Z

473

The intergroup protocols: Scalable group communication for the internet  

SciTech Connect

Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

Berket, K.

2000-11-01T23:59:59.000Z

474

Integrating instructional and study materials to tailor a student-specific resource  

Science Conference Proceedings (OSTI)

Courses about various software engineering practices, e.g. testing and architecture, all ultimately relate to a process for applying the practice. We have used that process as the organizing principle for undergraduate and graduate software engineering ...

J. Yates Monteith; John D. McGregor

2011-05-01T23:59:59.000Z

475

Emergence of Cooperative Internet Server Sharing Among Internet Search Agents Caught in the n-Person Prisoner’s Dilemma Game  

Science Conference Proceedings (OSTI)

Information on the Internet can be collected by autonomous agents that send out queries to the servers that may have the information sought. From a single agent’s perspective, sending out as many queries as possible maximizes the chances of finding ... Keywords: n-Person Iterated Dilemma Game, Emergence of cooperation, Internet search agents, Multiagent systems

Jae C. Oh

2005-01-01T23:59:59.000Z

476

NREL: Energy Systems Integration - Energy Systems Integration...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Systems Integration Facility Newsroom The Energy Systems Integration Facility (ESIF) will be one of the only megawatt-scale test facilities in the United States that...

477

NREL: Transmission Grid Integration - Solar Integration National...  

NLE Websites -- All DOE Office Websites (Extended Search)

of the Western Wind and Solar Integration Study and Eastern Wind Integration and Transmission Study datasets greatly advanced the modeling of wind and solar power production...

478

NREL: Transmission Grid Integration - Wind Integration Datasets  

NLE Websites -- All DOE Office Websites (Extended Search)

Wind Integration Datasets The Wind Integration Datasets provide energy professionals with a consistent set of wind profiles for the eastern United States and the western United...

479

Adapting compilation techniques to enhance the packing of instructions into registers  

E-Print Network (OSTI)

The architectural design of embedded systems is becoming increasingly idiosyncratic to meet varying constraints regarding energy consumption, code size, and execution time. Traditional compiler optimizations are often tuned for improving general architectural constraints, yet these heuristics may not be as beneficial to less conventional designs. Instruction packing is a recently developed compiler/architectural approach for reducing energy consumption, code size, and execution time by placing the frequently occurring instructions into an Instruction Register File (IRF). Multiple IRF instructions are made accessible via special packed instruction formats. This paper presents the design and analysis of a compilation framework and its associated optimizations for improving the efficiency of instruction packing. We show that several new heuristics can be developed for IRF promotion, instruction selection, register re-assignment and instruction scheduling, leading to significant reductions in energy consumption, code size, and/or execution time when compared to results using a standard optimizing compiler targeting the IRF.

Stephen Hines; David Whalley; Gary Tyson

2006-01-01T23:59:59.000Z

480

Modeling Occurrences of Non-VFR Weather: A Case Study for Design of Flight Instruction Programs  

Science Conference Proceedings (OSTI)

Objective methods in which climatology is considered are needed in the design of flight instruction programs. Weather conditions less than the minimum (LM) thresholds designated for Minimum Instructional Visual Flight Rules (MIVFR) were defined ...

Thomas Q. Carney; Robert F. Dale

1981-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "integrating internet instruction" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Reading Between the Lines: Learning to Map High-level Instructions to Commands  

E-Print Network (OSTI)

In this paper, we address the task of mapping high-level instructions to commands in an external environment. Processing these instructions is challenging—they posit goals to be achieved without specifying the steps required ...

Branavan, Satchuthanan R.

482

ISMCS: an intelligent instruction sequence based malware categorization system  

Science Conference Proceedings (OSTI)

Recently, automated malware (e.g., viruses, backdoors, spyware, Trojans and worms) categorization methods and an industry-wide naming convention have been the computer security topics that are of great interest. Resting on the analysis of function based ... Keywords: instruction sequence, malware categorization, weighted subspace clustering

Kai Huang; Yanfang Ye; Qinshan Jiang

2009-08-01T23:59:59.000Z

483

Embedded DSP Processor Design: Application Specific Instruction Set Processors  

Science Conference Proceedings (OSTI)

This book provides design methods for Digital Signal Processors and Application Specific Instruction set Processors, based on the author's extensive, industrial design experience. Top-down and bottom-up design methodologies are presented, providing valuable ... Keywords: Circuits, Data Processing, Electricity, Microelectronics

Dake Liu

2008-05-01T23:59:59.000Z

484

Activity Theory to Guide Online Collaborative Learning Instructional Design  

Science Conference Proceedings (OSTI)

Learning Management Systems LMS are facing challenges to improve its traditional focus on individual learning towards social learning. Despite the great success in distributing learning materials and managing students, the availability of the read and ... Keywords: Activity Theory, Computer-Supported Collaborative Learning, Instructional Design, Knowledge Building, Learning Management System, Online Collaborative Learning, Qualitative Method, Quantitative Method, Teachers Training

Siti Rosni Mohamad Yusoff, Nor Azan Mat Zin

2012-04-01T23:59:59.000Z

485

Superscalar Instruction Execution in the 21164 Alpha Microprocessor  

E-Print Network (OSTI)

The 21164 is a new quad-issue, superscalar Alpha microprocessor that executes 1.2 billion instructions per second. Available this January, the 3OO-MHz,0.5-pm CMOS chip delivers an estimated 345/505 SPECint92/SPECfp92 performance. The design's high clock rate, low operational latency, and high-throughput/nonblocking memory systems contribute to this performance.

John H. Edmondson; Paul Rubinfeld; Ronald Preston; Vidya Rajagopalan

1995-01-01T23:59:59.000Z

486

Analogical Thinking Based Instruction Method in IT Professional Education  

Science Conference Proceedings (OSTI)

In designing a new teaching system, a challenging issue is how the system intelligently supports learners. This paper describes a methodology and a system design on the intelligent instruction support for software engineering education. For information ... Keywords: Analogical Thinking, Creativity Support System, E-learning, Engineering Education

Tokuro Matsuo; Takayuki Fujimoto

2010-07-01T23:59:59.000Z

487

Instructions Transferring PERS and OPSRP Accounts to the ORP  

E-Print Network (OSTI)

Instructions Rev 01/05 Transferring PERS and OPSRP Accounts to the ORP PERS/OPSRP Members Electing Plan (ORP), you need to decide whether to transfer your PERS member and/or OPSRP account(s) to the ORP/TRANSFER TO THE ORP If you transfer your PERS member account or OPSRP account(s) to the ORP, you need to provide

Lafferriere, Gerardo

488

INSTRUCTIONS FOR THE PREPARATION OF A LIST OF SCIENTIFIC PUBLICATIONS  

E-Print Network (OSTI)

, !!! -- 1 -- INSTRUCTIONS FOR THE PREPARATION OF A LIST OF SCIENTIFIC PUBLICATIONS . 1. Please submit 2 copies of your list. 2. Include all publications that are: a. Published b this is a letter to the editor, report etc. 4. If any of the above headings are not applicable to your publications

Shamir, Ron

489

Master of Social Work Program Application Instructions for Fall 2012  

E-Print Network (OSTI)

Master of Social Work Program Application Instructions for Fall 2012 Admission Admission to the Master of Social Work (MSW) program is limited to the Fall semester only. Application materials may-year program. The full-time MSW program is administered by the Department of Social Work and delivered

de Lijser, Peter

490

Master of Social Work Program Application Instructions for Fall 2011  

E-Print Network (OSTI)

Master of Social Work Program Application Instructions for Fall 2011 Admission Admission to the Master of Social Work (MSW) program is limited to the Fall semester only. Application materials may-year program. The full-time MSW program is administered by the Department of Social Work and delivered

de Lijser, Peter

491

Master of Social Work Program Application Instructions for Fall 2013  

E-Print Network (OSTI)

Master of Social Work Program Application Instructions for Fall 2013 Admission Admission to the Master of Social Work (MSW) program is limited to the Fall semester only. Application materials may by the Department of Social Work; all classes are conducted on Fullerton's main campus. The MSW program (3 year

de Lijser, Peter

492

TRUPACT-II procedures and maintenance instructions  

Science Conference Proceedings (OSTI)

The purpose of this document is to provide the technical requirements for operation, inspection and maintenance of a TRUPACT-II Shipping Package and directly related components. This document shall supply the minimum requirements as specified in the TRUPACT-II Safety Analysis Report for Packaging (SARP) and Certificate of Compliance (C of C) 9218. In the event there is a conflict between this document and the TRUPACT-II SARP (NRC Certificate of Compliance No. 9218), the TRUPACT-II SARP shall govern. This document details the operations, maintenance, repair, replacement of components, as well as the documentation required and the procedures to be followed to maintain the integrity of the TRUPACT-II container. These procedures may be modified for site use, but as a minimum all parameters and format listed herein must be included in any site modified version. For convenience and where applicable steps may be performed out of sequence. Packaging and payload handling equipment and transport trailers have been specifically designed for use with the TRUPACT-II Packaging. This document discusses the minimum required procedures for use of the adjustable center of gravity lift fixture and the TRUPACT-II transport trailer in conjunction with the TRUPACT-II Packaging.

NONE

1994-01-14T23:59:59.000Z

493

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

494

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

495

Price Dispersion on the Internet: Good Firms and Bad Firms  

E-Print Network (OSTI)

Abstract. Internet firms charge a wide range of prices for homogeneous products, and high-priced firms remain high-priced and low-priced firms remain low-priced over long periods. One explanation is that high-price firms are charging a premium for superior service. An alternative, price-dispersion explanation is that firms vary the prices for informed and uniformed consumers (Salop and Stiglitz, 1977) or serious shoppers and others (Wilde and Schwartz, 1979). The pricing pattern for a digital camera and a flatbed scanner is consistent with the price-dispersion model and inconsistent with the service-premium hypothesis. I.

Kathy Baylis; Jeffrey M. Perloff

2002-01-01T23:59:59.000Z

496

Internet voting protocol based on implicit data security  

E-Print Network (OSTI)

This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security of votes depends on multiple servers such that each vote is divided into partitions and these partitions are distributed among the servers, all of which need to be brought together to reconstruct the votes. Such a protocol has potential applications in bargaining and electronic commerce.

Parakh, Abhishek

2010-01-01T23:59:59.000Z

497

An Internet adoption framework for marketing by small business enterprises in developing countries.  

E-Print Network (OSTI)

??This study proposes an Internet adoption framework for marketing in small business enterprises, particularly in developing countries. The proposed framework could be incorporated as part… (more)

Mokhtar, Noor Fadhiha

2013-01-01T23:59:59.000Z

498

Gratification obtained from television shows on Internet TV and conventional TV.  

E-Print Network (OSTI)

??Television shows once available only on conventional TV in homes at specific days and times are now available via Internet TV in nearly any location,… (more)

Li, Nai-Se

2013-01-01T23:59:59.000Z

499

Adoption of the Internet in local sporting bodies : an innovation diffusion approach.  

E-Print Network (OSTI)

??The primary aim of this study was to determine the Internet applications being adopted within local sporting clubs and to determine the adoption factors that… (more)

Bingley, Scott

2011-01-01T23:59:59.000Z

500

The impact of the Internet on economic growth in upper-middle-income countries.  

E-Print Network (OSTI)

??The Internet affects economies by facilitating a faster and wider access to information, promoting competition in the markets, enhancing communication in terms of lower cost… (more)

Hadavand, Aboozar

2011-01-01T23:59:59.000Z