Powered by Deep Web Technologies
Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Instructions apply to Internet Explorer and may vary for other browsers. SYRACUSE UNIVERSITY  

E-Print Network [OSTI]

page. Select the Term for which to search. Enter class search criteria, most commonly the Course ...........................................5 Class Search ...................................................6 Introduction Syracuse University) roster. You can also search for classes in Faculty Center. Log in to MySlice Go to myslice.syr.edu. You

Mather, Patrick T.

2

Beat Browser  

E-Print Network [OSTI]

Beat Browser is a music browsing environment that delivers immediate audio feedback while browsing arbitrarily large music collections. The goal of Beat Browser is to give users a sense of exploring "live" and continuous ...

Goldenson, Jeffrey D

2007-01-01T23:59:59.000Z

3

Recommended Browsers for ConnectCarolina This document lists the officially supported browsers and operating systems for ConnectCarolina.  

E-Print Network [OSTI]

browser If that does not work, contact the Help Desk at 919-962-HELP or at help.unc.edu Internet Explorer internet files (http://help.unc.edu/help/how-to-clear-web-browsers- cache-and-cookies/ ) · Restart your under Tools in the browser bar for more information. #12;

McLaughlin, Richard M.

4

Threat Insight Quarterly Browser Exploitation  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

5

UCSC cancer genomics browser.  

Science Journals Connector (OSTI)

...Chicago, IL Abstract 5087: UCSC Cancer Genomics Browser 2.0 Jingchun Zhu 1 Brian Craft...and analyze that data. The UCSC Cancer Genomics Browser (https://genome-cancer...enhances the interpretability of the cancer genomics information. UCSC Cancer Genomics Browser...

J Zhu; JZ Sanborn; T Wang; F Hsu; S Benz; C Szeto; L Esserman; D Haussler

2009-01-15T23:59:59.000Z

6

Web Browser Interface (WBUI)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OSCARS and Future Tech OSCARS Standard and Open Grid Forum OSCARS Developers Community Web Browser Interface (WBUI) Web Service Interface (API) Read More... Fasterdata IPv6...

7

Web Browser Interface (WBUI)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Browser Interface (WBUI) Browser Interface (WBUI) Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Web Browser Interface (WBUI) 1. Login Before you can access the server you must login using the user name that

8

Browser to Browser Media Streaming with HTML5  

E-Print Network [OSTI]

Browser to Browser Media Streaming with HTML5 Antony J.R. Meyn Kongens Lyngby 2012 IMM-M.Sc.-2012 this challenge. Peer-to-peer streaming is a viable alternative model that is highly scalable and can meet is a part of double-degree Erasmus Mundus Master in Security and Mobile Computing (NordSecMob), which in my

9

Web browser security update effectiveness  

Science Journals Connector (OSTI)

We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome's silent update mechanism to Opera's update requiring a full re-installation. We use anonymized logs from Google's world wide distributed ...

Thomas Duebendorfer; Stefan Frei

2009-09-01T23:59:59.000Z

10

MyEmployeeInfo Help Sheet (rev 01/05) 1) Please select a web browser from your desktop. We recommend the following browsers based on the  

E-Print Network [OSTI]

may find the icon browser on the desktop or from the Start menu (generally in the bottom left corner) under Programs. Internet Explorer Icon Firefox icon Safari icon Konqueror 2) In the address field) Channel Controls (i.e. Section Headings) Focus / Un-focus The focus icon will hide the rest

11

Electricity Data Browser | Open Energy Information  

Open Energy Info (EERE)

Data Browser Data Browser Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Electricity Data Browser Agency/Company /Organization: U.S. Energy Information Administration Sector: Energy Resource Type: Software/modeling tools User Interface: Website Website: www.eia.gov/electricity/data/browser/ Web Application Link: www.eia.gov/electricity/data/browser/ Language: English Electricity Data Browser Screenshot References: EIA[1] EIA Today In Energy[2] Logo: Electricity Data Browser Use to find generation, fuel consumption, sales, revenue and average price time series, and even drill down to the plant level data. Overview The U.S. Energy Information Administration recently posted an electricity data browser to show generation, consumption, fossil fuel receipts, stockpiles, retail sales, and electricity prices. The data appear on an

12

Stronger password authentication using browser extensions  

Science Journals Connector (OSTI)

We describe a browser extension, PwdHash, that transparently produces a different password for each site, improving web password security and defending against password phishing and other attacks. Since the browser extension applies a cryptographic hash ...

Blake Ross; Collin Jackson; Nick Miyake; Dan Boneh; John C. Mitchell

2005-07-01T23:59:59.000Z

13

COMIB: Composite Icon Browser for Multimedia Databases  

Science Journals Connector (OSTI)

COMIB (COMposite Icon Browser) is a graphical user interface for ... multimedia objects simultaneously in a screen using composite icons, that may be thumbnails of the several...

Jaehyuk Cha

1996-01-01T23:59:59.000Z

14

Modeling the World from Internet Photo Collections  

Science Journals Connector (OSTI)

There are billions of photographs on the Internet, comprising the largest and most diverse photo collection ever assembled. How can computer vision researchers exploit this imagery? This paper explores this question from the standpoint of 3D scene modeling ... Keywords: 3D navigation, 3D scene analysis, Internet imagery, Photo browsers, Structure from motion

Noah Snavely; Steven M. Seitz; Richard Szeliski

2008-11-01T23:59:59.000Z

15

COMIB: COMposite Icon Browser for multimedia databases  

Science Journals Connector (OSTI)

COMIB(COMposite Icon Browser) is a graphical user interface for...composite icons, that may be thumbnails of the several nested attribute values of those objects. Users can specify these attributes with a mouse w...

Jaehyuk Cha; Sukho Lee

1996-11-01T23:59:59.000Z

16

Instructions for Web Browsers Make sure you have the latest version of your preferred web browser.  

E-Print Network [OSTI]

Instructions for Web Browsers Make sure you have the latest version of your preferred web browser Alternatively you can right click the web links and choose save target as to save the PDF form. Once downloaded for reference Alternatively you can right click the web link and choose save Link as to save the PDF file. Once

Millar, Andrew J.

17

Web Interfaces 1 Python Scripts in Browsers  

E-Print Network [OSTI]

Web Interfaces 1 Python Scripts in Browsers the web server Apache processing forms with Python scripts Python code to write HTML 2 Web Interfaces for the Determinant dynamic interactive forms passing, 28 October 2013 Scientific Software (MCS 507 L-27) web interfaces 28 October 2013 1 / 42 #12;Web

Verschelde, Jan

18

Comparative assembly hubs: Web-accessible browsers for comparative genomics  

Science Journals Connector (OSTI)

......GENOME ANALYSIS Comparative assembly hubs: Web-accessible browsers for comparative genomics...pipeline to easily generate collections of Web-accessible UCSC Genome Browsers interrelated...hub listed on the UCSC browser public hubs Web page. Contact: benedict@soe.ucsc......

Ngan Nguyen; Glenn Hickey; Brian J. Raney; Joel Armstrong; Hiram Clawson; Ann Zweig; Donna Karolchik; William James Kent; David Haussler; Benedict Paten

2014-12-01T23:59:59.000Z

19

Exploration tool for ObjTalk inheritance structures. The Browser  

SciTech Connect (OSTI)

The Browser is a tool for exploring hierarchical systems by providing visualizations of structure and content of the system's objects. The user must have some knowledge of ObjTalk in order to make use of the information provided by the Browser. The Browser uses the window-, menu- and icon-subsystem of the Wlisp environment. Inheritance hierarchies of ObjTalk classes can be shown using graphical representations. The definition of slots and methods can be inspected. 7 figs. (DWL)

Rathke, C.

1986-01-01T23:59:59.000Z

20

How To Setup EHSS Landing Page As Default Home Page For Internet...  

Energy Savers [EERE]

Internet Explorer How To Setup EHSS Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http:energy.govehss. Once the EHSS site...

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

How To Setup EA Landing Page As Default Home Page For Internet...  

Energy Savers [EERE]

Internet Explorer How To Setup EA Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http:energy.goviea. Once the EA site loads,...

22

Browser-based Software for Technology Transfer Judith Bishop  

E-Print Network [OSTI]

1 Browser-based Software for Technology Transfer Judith Bishop Jonathan de Halleux Nikolai Tillmann Technology transfer is typically viewed as being from academia to industry but it can indeed go in either Keywords Technology transfer, browser-based software, F#, Pex4Fun INTRODUCTION Technology transfer is most

Xie, Tao

23

Test Drive EIA's New Interactive Electricity Data Browser | Department of  

Broader source: Energy.gov (indexed) [DOE]

Test Drive EIA's New Interactive Electricity Data Browser Test Drive EIA's New Interactive Electricity Data Browser Test Drive EIA's New Interactive Electricity Data Browser April 6, 2012 - 4:27pm Addthis Check out EIA’s beta test site and leave your feedback. Check out EIA's beta test site and leave your feedback. April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs The Energy Information Administration (EIA) - the statistical and analytical agency within the Energy Department - recently launched an interactive electricity data browser on a test website that allows users to search in one location much of EIA's electricity data and to customize it to meet their information needs. As an experimental product, EIA is encouraging the public to submit

24

A Configurable Photo Browser Framework for Large Image Collections  

Science Journals Connector (OSTI)

Image collections are growing at an exponential rate due to the wide availability of inexpensive digital cameras and storage. Current browsers organize photos mostly chronologically, or according to manual tag...

Frode Eika Sandnes

2011-01-01T23:59:59.000Z

25

A progressive approach for cross-browser web data generation  

Science Journals Connector (OSTI)

A layout engine combines markup language (HTML, etc.) with formatting information (CSS, etc.), and displays the combined contents on the screen. It is commonly used for many existing web development applications and web browsers. Especially, web development applications use layout engine to confirm the impact on the layout of web editing results to achieve what you see is what you get (WYSIWYG). At present, different layout engines are adopted by various web development applications and web browsers. As there is not a uniform algorithm adopted by layout engine, the results displayed by web development applications are not necessarily consistent with the display on the web browsers. In addition, the results displayed by web development applications depend on layout engines. Hence, it is difficult to edit the common web contents since it cannot objectively reflect the result on web browsers. In this paper, we propose a progressive WYSIWYG solution, by completely separating web layout design from web data editing to generate cross-browser web data. Our proposed approach does not use layout engine, and thus can avoid the disadvantages mentioned above.

Jin Zhu; Yoshiyori Urano; Hidenori Nakazato; Qun Jin

2014-01-01T23:59:59.000Z

26

Internet Sampler  

E-Print Network [OSTI]

Gnat (gnatkip) wrote, 2006-08-23 16:36:00 Art: Internet Sampler Title: Internet Sampler Media: Excel, Photoshop, Crosstitch.com Caption Maker, alphabet by Carrie's Creations, graphics from Windows, IE, and Firefox Notes: An illustration... the manner of the pioneers. At the top Ill set my most oft- uttered prayer: Thank you, internet, for letting me observe so many crazy people from a safe distance." Since I first read that line, there have been so many occasions when I've been reminded...

2006-08-23T23:59:59.000Z

27

Internet 0  

E-Print Network [OSTI]

The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

Krikorian, Raffi Chant, 1978-

2004-01-01T23:59:59.000Z

28

The Photo News Flusher: A Photo-News Clustering Browser  

E-Print Network [OSTI]

The Photo News Flusher: A Photo-News Clustering Browser Tatsuya Iyota and Keiji Yanai Department photo news articles based on both textual features of articles and image features of news photos for a personal news database which is built by accumulating Web photo news articles. The system provides two

Yanai, Keiji

29

XQuery in the Browser Technical Report, ETH Zurich, November 2007  

E-Print Network [OSTI]

XQuery in the Browser Technical Report, ETH Z¨urich, November 2007 Ghislain Fourny ETH Z¨urich gfourny@inf.ethz.ch Donald Kossmann ETH Z¨urich donaldk@inf.ethz.ch Tim Kraska ETH Z¨urich tim.kraska@inf.ethz.ch Markus Pilman ETH Z¨urich mpilman@student.ethz.ch Daniela Florescu Oracle dana

Kraska, Tim

30

Recommended Browsers for ConnectCarolina This document lists the officially supported browsers and operating systems for ConnectCarolina.  

E-Print Network [OSTI]

and operating systems for ConnectCarolina. You can download the supported browsers here: https at this time) Operating system: Windows 7 and above Windows XP and Vista are NOT recommended Firefox 21 (Windows) Operating system: Windows 7 and above Windows XP and Vista are NOT recommended Safari (Macintosh

Lieb, Jason

31

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API #12;pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API #12;pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API #12;pdfcrowd.comopen in browser PRO

32

Updated Browser Requirements Effective Monday, November 10th  

E-Print Network [OSTI]

this update to ensure business continuity. If you have any questions, please contact the campus IT Help Desk the following steps: 1. Open Internet Explorer and click Tools. 2. Click Internet Options. #12;3. Click: Phone: 978-934-4357 (ext. 4-HELP) or help@uml.edu #12;

Massachusetts at Lowell, University of

33

Review: Wireless Internet Handbook  

Science Journals Connector (OSTI)

......Review: Wireless Internet Handbook Reviewed by Harry Agius Wireless Internet Handbook Borko Furht, Mohammad Ilyas...the book. In fairness it does improve after the fifth chapter...Wireless Internet Handbook Borko Furht, Mohammad Ilyas......

Harry Agius

2004-07-01T23:59:59.000Z

34

Trends in Internet Marketing.  

E-Print Network [OSTI]

??Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the (more)

Panchanathan, Nitin

2005-01-01T23:59:59.000Z

35

GenomeView: a next-generation genome browser Thomas Abeel1,2,3,  

E-Print Network [OSTI]

GenomeView: a next-generation genome browser Thomas Abeel1,2,3, *, Thomas Van Parys1,2 , Yvan Saeys GenomeView, a stand-alone genome browser specifically designed to visualize and manipulate a multitude of genomics data. GenomeView enables users to dynamically browse high volumes of aligned short-read data

Gent, Universiteit

36

Effective Browsing and Serendipitous Discovery with an Experience-Infused Browser  

E-Print Network [OSTI]

Effective Browsing and Serendipitous Discovery with an Experience-Infused Browser Sudheendra Hangal explore how this recall can be leveraged during web browsing. We have built a system called the Experience-Infused, an experience-infused browser can enhance the effect of a user noticing personally relevant terms on a page

Pratt, Vaughan

37

Internet Topology Benoit Donnet  

E-Print Network [OSTI]

Internet Topology Discovery Benoit Donnet INL Seminar - 06-07/07/2011 1 1 #12;INL Seminar - Internet Topology Discovery 2 2 #12;INL Seminar - Internet Topology Discovery Agenda 3 · Background Probing - MERLIN · Power Law - Problem - L2 vs. L3 · Conclusion 3 #12;INL Seminar - Internet Topology

Bonaventure, Olivier

38

Abstract A33: Exploring pediatric cancer genomics with the UCSC Cancer Genomics Browser  

Science Journals Connector (OSTI)

...October 2014 meeting-abstract Pediatric Cancer Genomics and Epigenomics Pediatric Cancer Genomics and Epigenomics: Poster Presentations - Proffered...Abstract A33: Exploring pediatric cancer genomics with the UCSC Cancer Genomics Browser Melissa...

Melissa Cline; Olena Morozova; Teresa Swatloski; Brian Craft; Mary Goldman; David Haussler; Jingchun Zhu

2014-10-15T23:59:59.000Z

39

Abstract A33: Exploring pediatric cancer genomics with the UCSC Cancer Genomics Browser  

Science Journals Connector (OSTI)

...University of California, Santa Cruz, CA. The UCSC Cancer Genomics Browser (https://genome-cancer.ucsc.edu) is a set of web-based tools to display, investigate and analyze cancer genomics data and associated clinical data. Experimental quantities...

Melissa Cline; Olena Morozova; Teresa Swatloski; Brian Craft; Mary Goldman; David Haussler; Jingchun Zhu

2014-10-15T23:59:59.000Z

40

TERRORISM TRUMPS INTERNET ACCESS  

Science Journals Connector (OSTI)

TERRORISM TRUMPS INTERNET ACCESS ... The regulation is in response to fears that terrorists will be able to punch into the Internet and gather theoretical accident information that the government requires for environmental purposes. ...

JEFF JOHNSON

2000-07-03T23:59:59.000Z

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

42

Surfing the internet with a BCI mouse  

Science Journals Connector (OSTI)

In this paper, we present a new web browser based on a two-dimensional (2D) braincomputer interface (BCI) mouse, where our major concern is the selection of an intended target in a multi-target web page. A real-world web page may contain tens or even hundreds of targets, including hyperlinks, input elements, buttons, etc. In this case, a target filter designed in our system can be used to exclude most of those targets of no interest. Specifically, the user filters the targets of no interest out by inputting keywords with a P300-based speller, while keeps those containing the keywords. Such filtering largely facilitates the target selection task based on our BCI mouse. When there are only several targets in a web page (either an original sparse page or a target-filtered page), the user moves the mouse toward the target of interest using his/her electroencephalographic signal. The horizontal movement and vertical movement are controlled by motor imagery and P300 potential, respectively. If the mouse encounters a target of no interest, the user rejects it and continues to move the mouse. Otherwise the user selects the target and activates it. With the collaboration of the target filtering and a series of mouse movements and target selections/rejections, the user can select an intended target in a web page. Based on our browser system, common navigation functions, including history rolling forward and backward, hyperlink selection, page scrolling, text input, etc, are available. The system has been tested on seven subjects. Experimental results not only validated the efficacy of the proposed method, but also showed that free internet surfing with a BCI mouse is feasible.

Tianyou Yu; Yuanqing Li; Jinyi Long; Zhenghui Gu

2012-01-01T23:59:59.000Z

43

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Inferring Company Structure from Limited Available Information. Enter the Article Password: ... Search, Browse the Repository Submit Update Policies

44

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Update Entry. Open versus closed loop capacity equilibria in electricity markets under perfect and oligopolistic competition. Enter the Article Password:.

45

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Linearized augmented Lagrangian and alternating direction methods for nuclear norm minimization. Enter the Article Password: If you forgot your password,...

46

ENERGY EFFICIENT INTERNET INFRASTRUCTURE  

E-Print Network [OSTI]

. D R A F T October 27, 2010, 11:34pm D R A F T #12;2 ENERGY EFFICIENT INTERNET INFRASTRUCTURE FigureCHAPTER 1 ENERGY EFFICIENT INTERNET INFRASTRUCTURE Weirong Jiang, Ph.D.1 , and Viktor K. Prasanna]. In other words, an IP address may match multiple prefixes, but only the longest D R A F T October 27, 2010

Prasanna, Viktor K.

47

Internet Performance Measurement Collaborators  

E-Print Network [OSTI]

Internet Performance Measurement Collaborators Cross Industry Working Team (XIWT) High Performance of the timestamp mechanism in the ANS Surveyor Probe device FY98 · GITS Internet Performance Measurement Toolkit developed FY99 · GITS measurement systems deployed in the field FY00 Goal To advance the state of the art

48

Dynamic pharming attacks and locked same-origin policies for web browsers  

Science Journals Connector (OSTI)

We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim's browser malicious Javascript, which then exploits DNS rebinding vulnerabilities and the name-based ... Keywords: pharming, same-origin policy, web authentication

Chris Karlof; Umesh Shankar; J. D. Tygar; David Wagner

2007-10-01T23:59:59.000Z

49

The Multi-Principal OS Construction of the Gazelle Web Browser Helen J. Wang  

E-Print Network [OSTI]

distrusting web site principals. Nevertheless, no existing browsers, including new architectures like IE 8-based OS the exclusive control to manage the protection of all sys- tem resources among web site principals kernel is an operating system that exclusively manages resource protection and sharing across web site

Hunt, Galen

50

Toward A Secure and Usable Cloud-based Password Manager for Web Browsers  

E-Print Network [OSTI]

on different websites. Password manager, particularly Browser-based Password Manager (BPM), is one of the most, we propose a novel Cloud-based Storage-Free BPM (CSF-BPM) design to achieve a high level of security with the desired confidentiality, integrity, and availability properties. We have implemented a CSF-BPM system

Yue, Chuan

51

Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays  

Science Journals Connector (OSTI)

Displays based on organic light-emitting diode (OLED) technology are appearing on many mobile devices. Unlike liquid crystal displays (LCD), OLED displays consume dramatically different power for showing different colors. In particular, OLED displays ... Keywords: OLED display, web browser, color transformation, low power.

Mian Dong; Lin Zhong

2012-05-01T23:59:59.000Z

52

Development of a user-friendly system for image processing of electron microscopy by integrating a web browser and PIONE with Eos  

Science Journals Connector (OSTI)

......of electron microscopy by integrating a web browser and PIONE with Eos Takafumi Tsukamoto...expert for CUI. Thus we extended Eos to a web system independent of OS with graphical user interfaces (GUI) by integrating web browser. Advantage to use web browser is......

Takafumi Tsukamoto; Takuo Yasunaga

2014-11-01T23:59:59.000Z

53

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Board for Physics  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Astronomy and Astrophysics& Devendra.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Electrodynamics I Numerical Methods

Udgaonkar, Jayant B.

54

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Board for Physics  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Courses #12;pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API;pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Reading Courses

Udgaonkar, Jayant B.

55

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Update Entry. Optimization of Demand Response Through Peak Shaving. Enter the Article Password: If you forgot your password, select your e-mail address:.

56

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Robust Unit Commitment Problem with Demand Response and Wind Energy. Enter the Article Password: If you forgot your password, select your e-mail address...

57

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Robustified Reserve Modelling for Wind Power Integration in Ramp-Based Unit Commitment. Enter the Article Password: If you forgot your password, select your

58

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Large-Scale Linear Programming Techniques for the Design of Protein Folding Potentials. Enter the Article Password: If you forgot your password, select your...

59

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Ancestral Benders' Cuts and Multi-term Disjunctions for Mixed-Integer Recourse Decisions in ... Enter the Article Password: ... Search, Browse the Repository.

60

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Linear-quadratic control problem with a linear term on semiinfinite interval:theory and applications. Enter the Article Password: ... Search, Browse the Repository.

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Robust mid-term power generation management. Enter the Article Password: If you forgot your password, ... Search, Browse the Repository Submit Update

62

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

A three-term conjugate gradient method with sufficient descent property for unconstrained ... Enter the Article Password: ... Search, Browse the Repository.

63

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

... of Gas Supply Contracts with Take-or-pay Clauses in the Brazilian Long-term Energy Planning. Enter the Article Password: ... Search, Browse the Repository.

64

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Update Entry. A nonlinear optimization package for long-term hydrothermal coordination. Enter the Article Password: ... Search, Browse the Repository Submit

65

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization. Enter the Article Password: If you forgot your password, select...

66

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Solving large scale polynomial convex problems on \\ell_1/nuclear norm balls by randomized first-order algorithms. Enter the Article Password: If you forgot your...

67

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Sensitivity analysis for the outages of nuclear power plants. Enter the Article Password: If you forgot your password, select your e-mail address: kengy.barty@

68

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Finding approximately rank-one submatrices with the nuclear norm and l1 norm. Enter the Article Password: If you forgot your password, select your e-mail...

69

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

Nuclear norm minimization for the planted clique and biclique problems. Enter the Article Password: If you forgot your password, select your e-mail address:.

70

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

An Implementable Proximal Point Algorithmic Framework for Nuclear Norm Minimization. Enter the Article Password: If you forgot your password, select your

71

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

An accelerated proximal gradient algorithm for nuclear norm regularized least squares problems. Enter the Article Password: If you forgot your password, select

72

Optimization Online - Enter Your Password to Continue  

E-Print Network [OSTI]

An Optimization Approach to the Design of Multi-Size Heliostat fields. Enter the Article Password: If you forgot your password, select your e-mail address:.

73

Login Help | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Login Help Login Help SharePoint Are you remembering to enter your username like this: anl\username? The "anl\" prefix is required. Internet Explorer If your Argonne account has been renamed (that is, your username has been changed), and you are using Internet Explorer as your browser, you may need to delete an existing, outdated security certificate as follows: In Internet Explorer, go to Tools -> Internet Options -> Content -> Certificates -> Personal. Select the certificate with the old username (issued by ANLIssuingCAv010) and click the "Remove" button. Clear the browser cache, close all browser windows, and restart the browser. Firefox In Firefox, clear the browser cache and cookies, close all browser windows, and restart the browser.

74

Sustainable Internet Architecture PROJECT DESCRIPTION  

E-Print Network [OSTI]

Sustainable Internet Architecture PROJECT DESCRIPTION 1 Introduction The Internet currently plays that the problems in the current Internet architecture stem from its lack of sustainability which impedes future de of challenges. Numerous research studies on a new Internet architecture (e.g., [16, 37, 48, 54, 55]) have

Kuzmanovic, Aleksandar

75

Internet Users' Glossary  

Science Journals Connector (OSTI)

There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them.

G. Malkin

1996-08-01T23:59:59.000Z

76

AIR QUALITY: Control Enters New Phase  

Science Journals Connector (OSTI)

AIR QUALITY: Control Enters New Phase ... Federal enforcement of air pollution is about to enter a new, more technically sophisticated, phase. ... Now air pollution control moves into the criteria and standards period, when numbers eventually will be the basis for enforcement and the country becomes zoned into 32 air quality regions. ...

1968-08-05T23:59:59.000Z

77

Please enter the characters - DOE Directives, Delegations, and...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Please enter the characters by Diane Johnson Please enter the characters Listen to audio for this captcha...

78

Visualize energy APIs with a new OpenEI browser | OpenEI Community  

Open Energy Info (EERE)

Visualize energy APIs with a new OpenEI browser Visualize energy APIs with a new OpenEI browser Home > Groups > Developer Rmckeel's picture Submitted by Rmckeel(297) Contributor 31 August, 2012 - 12:54 APIs Big Data cleanweb data OpenEI OpenEI has created a simple way to see energy APIs available to developers. See commercial and free energy APIs such as NREL's developer network, Genability, 3TIER, OpenEI APIs and more! Click here to get started. Want to see this energy API data crowd-sourced and updated on OpenEI? Let us know by commenting on this blog entry! Currently, we have a static spreadsheet (available for download at the app) that we are keeping updated manually. Thanks to ProgrammableWeb.com for initial data - as a thanks, we are currently linking to ProgrammableWeb from each API entry so

79

Enteric bacteria in aerobically digested sludge.  

Science Journals Connector (OSTI)

...Research Article Enteric bacteria in aerobically digested sludge. S R Farrah G Bitton Indicator bacteria, Salmonella...aerobic bacteria were determined in samples of undigested sludge and sludge that had been treated by one or two stages of aerobic...

S R Farrah; G Bitton

1984-04-01T23:59:59.000Z

80

Enter Keyword(s) Today's Ecology Top  

E-Print Network [OSTI]

Enter Keyword(s) Today's Ecology Top News OMG's Business Ecology Initiative BEI Reaches 250 Member Advertisement Ecology Topics Botany Climate Research Ecology Environment Environmental Microbiology Environmental Monitoring Environmental Research Fisheries Research Marine Biology Meteorology Molecular Ecology

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Integrated Internet collaboration  

Science Journals Connector (OSTI)

...e-commerce, Intranet, remote collaboration...and other new technologies. They should be...being realized. Technologies, such as INSP...Internet and intranet computing allows...e-commerce, Intranet, remote collaboration...and other new technologies. They should be...

Dimitri Bevc; Alexander M. Popovici

82

Service Oriented Internet Jaideep Chandrashekar  

E-Print Network [OSTI]

propose a novel, overlay based Service Oriented Internet architecture that is meant to serve as a flexible elsewhere. In this paper, we describe a new architecture -- the "Service Oriented Internet" or SOI, whichService Oriented Internet Jaideep Chandrashekar ¡ , Zhi-Li Zhang ¡ , Zhenhai Duan ¡ , and Y

Duan, Zhenhai

83

Distributed Internet Security and Measurement  

E-Print Network [OSTI]

BGP (the Internet's interdomain routing protocol). It introduces Pretty Good BGP, an anomaly detection#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science Internet Security and Measurement by Josh Karlin ABSTRACT OF DISSERTATION Submitted in Partial Fulfillment

Forrest, Stephanie

84

Internet-Enabled Supply ChainsInternet-Enabled Supply Chains Quan Z. Sheng, University of Adelaide  

E-Print Network [OSTI]

89 Internet-Enabled Supply ChainsInternet-Enabled Supply Chains Quan Z. Sheng, University of the Internet-enabled Supply Chain 89 Key Supply Chain Processes and the Internet 89 Impacts of Internet-Enabled Supply Chains 92 Enabling Technologies for Internet-Enabled Supply Chain Management 92 Internet-based EDI

Sheng, Michael

85

Manhattan Project: Enter the Army, 1942  

Office of Scientific and Technical Information (OSTI)

Army parade, Los Alamos ENTER THE ARMY Army parade, Los Alamos ENTER THE ARMY (1942) Events > Difficult Choices, 1942 More Uranium Research, 1942 More Piles and Plutonium, 1942 Enter the Army, 1942 Groves and the MED, 1942 Picking Horses, November 1942 Final Approval to Build the Bomb, December 1942 The decision to proceed with planning for the production of enriched uranium and of plutonium led directly to the involvement of the Army, specifically the Corps of Engineers. President Roosevelt had approved Army involvement on October 9, 1941, and Vannevar Bush had arranged for Army participation at S-1 meetings beginning in March 1942. The need for security suggested placing the S-1 program within one of the armed forces, and the construction expertise of the Corps of Engineers made it the logical choice to build the production facilities envisioned in the Conant report of May 23.

86

Enter Date: Enter NVLAP Lab Code: NIST HANDBOOK 150-10 CHECKLIST  

E-Print Network [OSTI]

Enter Date: Enter NVLAP Lab Code: NIST HANDBOOK 150-10 CHECKLIST EFFICIENCY OF ELECTRIC MOTORS prescribed in NIST Handbook 150-10, Efficiency of Electric Motors. The Test Method Review Summary, which is used to review the laboratory's ability to perform Efficiency of Electric Motors test methods

87

https://doyouliveunited.org 1. Enter you user ID  

E-Print Network [OSTI]

Search' button. 7. Enter you search terms for the agency of your choice and click on `Search'. #12;httpshttps://doyouliveunited.org 1. Enter you user ID: your email address Enter your password: welcome be different then the options listed here. 5. For a payroll pledge, enter the amount per pay or the total

88

Diploma in Management Internet Business concentration  

E-Print Network [OSTI]

, telecommunications, the internet and the Web as well as a good understanding of consumer behaviour. Our internet1 Diploma in Management Internet Business concentration Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part

Pientka, Brigitte

89

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Board for Physics  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Aspects of Field Theory S. Trivedi

Udgaonkar, Jayant B.

90

1. The Internet 1-1 Chapter 1: The Internet  

E-Print Network [OSTI]

1. The Internet 1-1 Chapter 1: The Internet References: · Rainer Klute: Das World Wide Web. Addison with TCP/IP. Prentice Hall, 1988, ISBN 0134701887. · W. Richard Stevens: TCP Illustrated, Vol. 1. Addison-Wesley, 1994, ISBN 0201633469. · W. Richard Stevens: UNIX Network Programming, Vol. 1, 2nd Ed. Prentice Hall

Brass, Stefan

91

Studying Brazil-Nut Effect History Line using Disk-Formed Objects, Scanner, and Web Browser  

E-Print Network [OSTI]

Grains configuration snapshots of Brazil-nut effect (BNE) in two-dimension are physically modeled using disk-formed objects, e.g., buttons and magnetic pin. These BNE configurations are artificially designed to mimic the real ones observed in experiments. A computer scanner is used to capture the configurations. Obtained images are then digitized using web browser running a HTML equipped with a JavaScript code, which is built mainly only for this work. From digitization process all grains positions (granular bed and intruder) are obtained, which is later analyzed using the simplest model, i.e., potential energy. Since the minimum energy principle (MEP) suggests that a closed system should go to its state with minimum internal energy, our BNE system must also obey it. Evolution of only the intruder seems to violate MEP but not for the whole system. Grains compaction plays important role, so that the system can achieve its configuration with minimum potential energy.

Sparisoma Viridi; Siti Nurul Khotimah; Novitrian; Widayani; Luman Haris; Dimas Praja Purwa Aji

2014-08-07T23:59:59.000Z

92

Characterizing internet scams through underground infrastructure infiltration  

E-Print Network [OSTI]

the symp- toms of abuse on the Internet. Through interposingInternet as a medium for communication and commerce has attracted many actors who abuseAbuse Working Group (MAAWG) in 2009, estimate that 29% and 12%, respectively, of Internet

Kanich, Christopher William

2012-01-01T23:59:59.000Z

93

TiDi Browser: A Novel Photo Browsing Technique for Mobile Gerald Biebera, Christian Tominskib, and Bodo Urbanb  

E-Print Network [OSTI]

TiDi Browser: A Novel Photo Browsing Technique for Mobile Devices Gerald Biebera, Christian's digital photos can be tagged with information about when and where they were taken. On stationary computers, this information is often used to drive photo browsing. This is not the case for mobile devices

Tominski, Christian

94

Asymmetric responses, risk seeking and internet bubble  

Science Journals Connector (OSTI)

We measure internet bubbles to verify the existence and evaporation of the internet bubble in early 2000. Then, we compare investor responses to internet stocks with those to traditional stocks to find how the internet bubble formed. Empirical results confirm that the internet bubble existed between 1998 and 1999, but began to evaporate in early 2000. Further, we find that the internet bubble formed due to investors' irrational overreaction to internet firms' positive outlooks and underreaction to internet firms' negative outlooks relative to their reactions to traditional firms. This finding supports our hypotheses that asset bubbles formed due to investors' extreme risk-seeking asymmetric responses to good and bad information.

Jaehan Koh; Bin Wang; Lai C. Liu; Kai S. Koong

2010-01-01T23:59:59.000Z

95

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

96

Some basic troubleshooting suggestions for Students when using Respondus LockDown Browser  

E-Print Network [OSTI]

have contacted the Help Desk or Blackboard Support. 10. The #1 help call from students to Blackboard up Internet Explorer. Go to > Tools > Compatibility View Settings > make sure all boxes are UNchecked. URL for download: http://www.respondus.com/lockdown/download.php?id=745639734 8. Submit a Help Ticket

97

JChem:? Java Applets and Modules Supporting Chemical Database Handling from Web Browsers  

Science Journals Connector (OSTI)

JChem is a tool for creating web applications that access chemical structures and corporate data in a database over the Internet or in Intranets. ... Among other characteristics, MarvinView can magnify structures in a separate window, display textual information along with molecules, and rotate structures in 3D. ...

Ferenc Csizmadia

2000-01-25T23:59:59.000Z

98

Research challenges towards the Future Internet  

Science Journals Connector (OSTI)

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture ... Keywords: Cognitive networks, Data and communication security, Future internet, Green networking, Internet architecture and protocols, Optical networks, System security, Wireless networks

Marco Conti; Song Chong; Serge Fdida; Weijia Jia; Holger Karl; Ying-Dar Lin; Petri Mhnen; Martin Maier; Refik Molva; Steve Uhlig; Moshe Zukerman

2011-12-01T23:59:59.000Z

99

Enter a Service Request 2012 Northwestern University 1  

E-Print Network [OSTI]

in FAMIS Self Service. How to log in? Contact the Help Desk for security access to FAMIS. Additional for billing capital and R&R projects. You cannot use this tool to edit Work Orders (WO) or creating child Work Orders. You would not use this tool to enter estimates or projects, or to enter SRs already entered

Shull, Kenneth R.

100

Internet Engineering Task Force S. Floyd INTERNET-DRAFT E. Kohler  

E-Print Network [OSTI]

Internet Engineering Task Force S. Floyd INTERNET-DRAFT E. Kohler Intended status: Informational draft-irtf-tmrg-tools-05.txt Status of this Memo By submitting this Internet-Draft, each author 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas

Floyd, Sally

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Graduate Certificate in Internet Business Looking for a Career in Internet Business?  

E-Print Network [OSTI]

, telecommunications, the internet and the Web as well as a good understanding of consumer behaviour. Our internet1 Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part

Pientka, Brigitte

102

Internet Engineering Task Force INTERNET-DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force INTERNET-DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne draft Status of this Memo This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also

Lennox, Jonathan

103

Substance abuse precedes internet addiction  

Science Journals Connector (OSTI)

Abstract The purpose of the current study was to evaluate possible overlapping substance abuse and internet addiction in a large, uniformly sampled population, ranging in age from 13 to 18years. Participants (N=73,238) in the current study were drawn from the 6th Korea Youth Risk Behavior Web-based Survey (KYRBWS-V) for students from 400 middle schools and 400 high schools in 16 cities within South Korea. Of adolescent internet users, 85.2% were general users (GU), 11.9% were users with potential risk for internet addiction (PR), and 3.0% were users with high risk for internet addiction (HR). There was a difference in the number of students with alcohol drinking among the GU, PR, and HR groups (20.8% vs 23.1% vs 27.4%). There was a difference in the number of students who smoked among the GS, PR, and HR groups (11.7% vs 13.5% vs 20.4%). There was a difference in the number of students with drug use among the GU, PR, and HR groups (1.7% vs 2.0% vs 6.5%). After adjusting for sex, age, stress, depressed mood, and suicidal ideation, smoking may predict a high risk for internet addiction (OR=1.203, p=0.004). In addition, drug use may predict a high risk for internet addiction (OR=2.591, pinternet addiction have vulnerability for addictive behaviors, co-morbid substance abuse should be evaluated and, if found, treated in adolescents with internet addiction.

Young Sik Lee; Doug Hyun Han; Sun Mi Kim; Perry F. Renshaw

2013-01-01T23:59:59.000Z

104

Using Gopher on the Internet  

SciTech Connect (OSTI)

This report is a complication of vugraphs with respect to the use of Gopher on Internet. There are viewgraphs on using Gopher at the University of California at Santa Cruz. Examples of other Internet Gopher servers around the world are given. Also discussed is the Library of Congress Gopher and JUGHEAD which is an acronym for Jonzy`s Universal Gopher Hierarchy Excavation And Display.

Davidoff, G.

1994-04-01T23:59:59.000Z

105

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Board for Physics  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject? Try out the HTML to PDF API Phase transition and Critical Phenomenon Mustansir Barma barma Spring 2004

Udgaonkar, Jayant B.

106

Chronic radiation enteritis: A community hospital experience  

SciTech Connect (OSTI)

A retrospective study was undertaken to evaluate the operative management of patients with chronic radiation enteropathy. Thirty-eight affected patients from 1974 to 1986 were reviewed. Patients with recurrent cancer responsible for symptoms were excluded. Seventy-one percent of patients presented with bowel obstruction. Twenty-one patients were treated with bowel resection, while 17 were treated with a bypass procedure or diverting ostomy alone. Overall morbidity was 45%, and postoperative mortality was 16%. Patients in the bypass group were significantly older than those in the resection group (70.3 vs. 55.5 years, P = .024), suggesting that age may have been a determinant of the procedure performed. In our study there was no difference in outcome based on preexisting vascular disease, tumor site, type of procedure performed, or radiation dose. We conclude that resection is the procedure of choice in cases of chronic radiation enteritis requiring surgery except in cases with dense adhesions when enteroenterostomal bypass is a viable alternative.

Fenner, M.N.; Sheehan, P.; Nanavati, P.J.; Ross, D.S. (Southern Illinois Univ. School of Medicine, Springfield (USA))

1989-08-01T23:59:59.000Z

107

Alexithymia and internet abuse in young adults  

Science Journals Connector (OSTI)

Problematic internet use has become a growing concern in recent years due to expanded access and dependence on the internet. This study examined the relationship between alexithymia and internet abuse in a sample of young adults (165 males and 650 females). Participants completed the Internet Addiction Test (IAT) and the TAS-20. The alexithymic group (n=105) scored significantly higher than the non-alexithymic group (n=532) on all of the IAT scales: withdrawal scale, F(1,632)=31.21, pinternet abuse and emphasize the need to address these underlying vulnerabilities when treating internet abuse.

R.N. Taylor; R. Koerber; J.D.A. Parker; S.B. Maitland

2014-01-01T23:59:59.000Z

108

DOE/Mitsubishi Enter Consent Decree Dismissing Claims of Certification...  

Broader source: Energy.gov (indexed) [DOE]

May 7, 2010, DOE entered into a Consent Decree with Mitsubishi Electric & Electronics, USA Inc. dismissing alleged energy efficiency certification violations in return for a...

109

A Handy Internet Politics Measurement Note Internet Politcs Measurement Measurement and analysis on the Internet politics through  

E-Print Network [OSTI]

A Handy Internet Politics Measurement Note Internet Politcs Measurement ­ Measurement and analysis on the Internet politics through case studies on (i) well-known but failed technical ideas in history, (ii........................................................................................................4 Abuse of Censorship-free Speech, "Human Search Engine" (China) ...............................4

Kuzmanovic, Aleksandar

110

Public Health Policy For Internet Cigarette Retailers  

E-Print Network [OSTI]

Internet cigarette retailers to avoid local cigarette prices); see also National Household Survey on Drug Abuse,Internet cigarette retailers to avoid local cigarette prices); see also National Household Survey on Drug Abuse,

Banthin, Christopher

2005-01-01T23:59:59.000Z

111

The Evolution of International Internet Telephony  

E-Print Network [OSTI]

International Internet Telephony has been evolving since its introduction in 1996. In 1996, the typical player was

McGarty, Terrence

112

Internet Engineering Task Force Individual Submission INTERNET-DRAFT J. Lennox, J. Rosenberg, H. Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force Individual Submission INTERNET-DRAFT J. Lennox, J. Rosenberg, H Gateway Interface for SIP Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

113

Very large conferences on the Internet: the Internet Multimedia Conferencing Architecture.  

E-Print Network [OSTI]

components still in a nascent stage. 1 Introduction The Internet is not currently very good at carry­ ingVery large conferences on the Internet: the Internet Multimedia Conferencing Architecture. M In this paper we provide an overview of multimedia conferencing on the Internet. The protocols men­ tioned

Handley, Mark

114

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation  

E-Print Network [OSTI]

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation Louis Saint Louis, MO 63130 jain@cse.wustl.edu Abstract-- The basic ideas of the Internet architecture switching. Is this the way we would design the Internet if we were to start it now? This paper is an attempt

Jain, Raj

115

Research and the Internet connection  

Science Journals Connector (OSTI)

... to cut funding for fusion research by a third. The Princeton Plasma Physics Laboratory (PPPL) says that the loss of one quarter of its staff means that collaboration with ... means that collaboration with researchers at other universities over the Internet has become "essential". PPPL recently began transmitting sound and video from the control room of its Tokamak Fusion Test ...

Declan Butler

1996-04-04T23:59:59.000Z

116

Internet Data logging and Display  

E-Print Network [OSTI]

. The solution presented here is to accomplish these goals is to include a miniature web server in a remote-logging module, which we designed as part of our device. Thus allowing data to be accessed more frequently, via the Internet. As it currently stands...

Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

2001-01-01T23:59:59.000Z

117

Timekeeping in the Interplanetary Internet  

E-Print Network [OSTI]

vehicles, retrieve data for later transmission to Earth · Spacecraft ­ transport orbiters and surface, network routing, ephemeris maintenance and general timekeeping #12;2-Aug-04 3 IPIN issues o Transmission Transmission speeds are highly variable, but in general far slower than Earth internet o Spacecraft position

Mills, David L.

118

Measuring Internet Performance: Challenges and Opportunities  

E-Print Network [OSTI]

Measuring Internet Performance: Challenges and Opportunities Rocky K. C. Chang Internet;Internet Infrastructure and Security Laboratory 2 #12;Measuring end-to-end performance · Source: Akamai's network performance comparison 3 #12;End-to-end network monitoring ... 4 #12;Why measuring network path

Chang, Rocky Kow-Chuen

119

The End of Internet Architecture Timothy Roscoe  

E-Print Network [OSTI]

back and asks a more radical question: is an internet ar- chitecture a good thing at all? Are weThe End of Internet Architecture Timothy Roscoe National ICT Australia, Sydney Intel Research have seen considerable publishing activ- ity in the area of "internet architecture". This paper steps

Roscoe, Timothy

120

Applying Quantitative Marketing Techniques to the Internet  

E-Print Network [OSTI]

. Blattberg and Deighton [1991] laid out a good framework for Internet marketing in their articleApplying Quantitative Marketing Techniques to the Internet by Alan L. Montgomery Carnegie Mellon with clickstream data. I illustrate these four modeling techniques and discuss their potential for solving Internet

Faloutsos, Christos

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Modeling Internet Topology Dynamics Hamed Haddadi  

E-Print Network [OSTI]

graphs. Generation of the topology of the Internet calls for a model that achieves a good balance betweenModeling Internet Topology Dynamics Hamed Haddadi University College London Steve Uhlig Delft and inference, there still exists ambiguity about the real nature of the Internet AS and router level topol- ogy

Haddadi, Hamed

122

EVALUATION OF EVIDENCE IN INTERNET AUCTION  

E-Print Network [OSTI]

allegations about the sale of counterfeit goods at Internet auction sites. Also, it applies a Bayesian- livering the goods that are offered for sale. As a result, Internet auction fraud is the most common type of Internet auction fraud in Hong Kong related to the sale of counterfeit goods (i.e., goods bear- ing false

Overill, Richard E.

123

Future Internet Infrastructures for FI Prototyping  

E-Print Network [OSTI]

++ Fraunhofer Institute FOKUS, Berlin ++ www.fokus.fraunhofer.de/go/innovation ++ 11­2009 #12;Future Internet Berlin AV de- partment (Architektur für Vermittlungskno- ten). Part of the Fraunhofer innovation clusFuture Internet Infrastructures for FI Prototyping NGN Evolution toward Future Internet Fraunhofer

Wichmann, Felix

124

OxCORT v4 Quick Guide Student Guide To OxCORT  

E-Print Network [OSTI]

into the field below. Topic ­ To search for reports relating to a particular topic enter one or all the words roles: · Student role Topics · How To Access OxCORT pg 1 · Viewing Reports pg 2 - Searching for reportsCORT 1. Open your web browser (internet explorer, firefox or similar). 2. Enter the address www

Oxford, University of

125

NNSA enters into strategic partnership to promote cybersecurity | National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

enters into strategic partnership to promote cybersecurity | National enters into strategic partnership to promote cybersecurity | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA enters into strategic partnership to promote cybersecurity NNSA enters into strategic partnership to promote cybersecurity Posted By Bob Osborn, NNSA Associate Administrator for Information

126

Entering Invoices Through the Vendor Inquiry Payment Electronic Reporting  

Broader source: Energy.gov (indexed) [DOE]

Entering Invoices Through the Vendor Inquiry Payment Electronic Entering Invoices Through the Vendor Inquiry Payment Electronic Reporting System (VIPERS) Entering Invoices Through the Vendor Inquiry Payment Electronic Reporting System (VIPERS) The purpose of this document is to provide an overview of the process to submit invoices electronically to the Oak Ridge Financial Service Center (ORFSC) and interface them into STARS using the Vendor Inquiry Payment Electronic Reporting System (VIPERS). It is recommended that the plan outlined below be used by Department of Energy vendors to submit electronic invoices and to check status of outstanding invoice payments. Entering Invoices Through the Vendor Inquiry Payment Electronic Reporting System (VIPERS) More Documents & Publications Smart Grid Investment Grant Invoice Template and Instructions

127

DOE/Mitsubishi Enter Consent Decree Dismissing Claims of Certification  

Broader source: Energy.gov (indexed) [DOE]

DOE/Mitsubishi Enter Consent Decree Dismissing Claims of DOE/Mitsubishi Enter Consent Decree Dismissing Claims of Certification Violations DOE/Mitsubishi Enter Consent Decree Dismissing Claims of Certification Violations May 7, 2010 - 12:41pm Addthis On May 7, 2010, DOE entered into a Consent Decree with Mitsubishi Electric & Electronics, USA Inc. dismissing alleged energy efficiency certification violations in return for a $5000 voluntary contribution that will be made on Mitsubishi's behalf by the Air-Conditioning, Heating and Refrigeration Institute (AHRI). This will resolve the case initiated on April 21, 2010, against Mitsubishi. After issuing a Notice of Proposed Civil Penalty alleging that Mitsubishi had failed to submit certification reports for some models of air conditioners and heat pumps, DOE discovered Mitsubishi

128

TH.D. STUDENT PROFILES 2006 Entering Class  

E-Print Network [OSTI]

TH.D. STUDENT PROFILES 2006 Entering Class Jeff Conklin-Miller Primary Concentration: Theology ecclesiology, drawing on insights of John Howard Yoder, Rowan Williams, and the Wesleyan tradition. Tommy

Reif, John H.

129

Textbook Adoption Application Guide Entering the Application ..................................................................................... 2  

E-Print Network [OSTI]

allows you to search for your assigned course(s) by: Term, Location, Academic Department, Course NumberTextbook Adoption Application Guide Entering the Application ............................................................................................................ 3 Search with Academic Criteria

Sura, Philip

130

PHOTO OPTION CURRICULUM (FOR STUDENTS ENTERING FALL, 2011 OR LATER)  

E-Print Network [OSTI]

PHOTO OPTION CURRICULUM (FOR STUDENTS ENTERING FALL, 2011 OR LATER) NOTE ON REVERSE. GATE REQUIREMENTS FOR PHOTO OPTION: FILM 100IH ­ Introduction to Film)..................................................................3 PHOTO OPTION REQUIREMENTS (GATE REQUIRED FOR MOST COURSES): PHOT 255

Dyer, Bill

131

Entering Invoices Through the Vendor Inquiry Payment Electronic Reporting  

Broader source: Energy.gov (indexed) [DOE]

Entering Invoices Through the Vendor Inquiry Payment Electronic Entering Invoices Through the Vendor Inquiry Payment Electronic Reporting System (VIPERS) Entering Invoices Through the Vendor Inquiry Payment Electronic Reporting System (VIPERS) The purpose of this document is to provide an overview of the process to submit invoices electronically to the Oak Ridge Financial Service Center (ORFSC) and interface them into STARS using the Vendor Inquiry Payment Electronic Reporting System (VIPERS). It is recommended that the plan outlined below be used by Department of Energy vendors to submit electronic invoices and to check status of outstanding invoice payments. Entering Invoices Through the Vendor Inquiry Payment Electronic Reporting System (VIPERS) More Documents & Publications Smart Grid Investment Grant Invoice Template and Instructions

132

DOE/Mitsubishi Enter Consent Decree Dismissing Claims of Certification  

Broader source: Energy.gov (indexed) [DOE]

DOE/Mitsubishi Enter Consent Decree Dismissing Claims of DOE/Mitsubishi Enter Consent Decree Dismissing Claims of Certification Violations DOE/Mitsubishi Enter Consent Decree Dismissing Claims of Certification Violations May 7, 2010 - 12:41pm Addthis On May 7, 2010, DOE entered into a Consent Decree with Mitsubishi Electric & Electronics, USA Inc. dismissing alleged energy efficiency certification violations in return for a $5000 voluntary contribution that will be made on Mitsubishi's behalf by the Air-Conditioning, Heating and Refrigeration Institute (AHRI). This will resolve the case initiated on April 21, 2010, against Mitsubishi. After issuing a Notice of Proposed Civil Penalty alleging that Mitsubishi had failed to submit certification reports for some models of air conditioners and heat pumps, DOE discovered Mitsubishi

133

internet of things | OpenEI Community  

Open Energy Info (EERE)

internet of things Home No Battery Wearables Description: Wearable IT and communication devices that don't require a battery. This group is for discussion about innovations in...

134

Traditional marketing vs. Internet marketing. A comparison.  

E-Print Network [OSTI]

?? Title: Traditional marketing vs. Internet marketing: A comparison Problem: Marketing is an important strategy for businesses and it contains numerous effective tools. Traditional marketing (more)

Varfan, Mona

2008-01-01T23:59:59.000Z

135

Diploma in Internet Business Technology 1 McGill University  

E-Print Network [OSTI]

of programming, databases, networks, telecommunications, the internet and the Web as well as a good understandingDiploma in Internet Business Technology 1 McGill University Diploma in Internet Business Technology Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have

Pientka, Brigitte

136

WHAT IS ADOBE CONNECT? Adobe Connect is a browser-based web conferencing tool used by instructors at the Carey Business School. It may be used for  

E-Print Network [OSTI]

. If problems passing the test persist, contact the Carey IT Help Desk (410) 234-9380 or Carey. ADOBE® CONNECTTM QUICK START GUIDE Student Edition 1 2 3 4 Need Help? Contact the IT Help Desk 410WHAT IS ADOBE CONNECT? Adobe Connect is a browser-based web conferencing tool used by instructors

von der Heydt, Rüdiger

137

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Board for Physics  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject version Are you a developer? Try out the HTML to PDF API Astronomy and Astrophysics& D version Are you a developer? Try out the HTML to PDF API Courses Instructor(s) e-mail Quantum Mechanics II

Udgaonkar, Jayant B.

138

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Board for Physics  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Are you a developer? Try out the HTML to PDF API Astronomy and Astrophysics& A. Ray akr Nuclear Physics& R a developer? Try out the HTML to PDF API Courses Instructor(s) e-mail Quantum Mechanics II@$* Deepak Dhar

Udgaonkar, Jayant B.

139

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Board for Physics  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject version Are you a developer? Try out the HTML to PDF API Topics in Theoretical Physics Kedar Damle a developer? Try out the HTML to PDF API Admission SBP-guidelines Events Courses Contact SBP-members SBP Home

Udgaonkar, Jayant B.

140

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Share Facebook Tw itter Share StumbleUpon Email  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Share a developer? Try out the HTML to PDF API MORE INFORMATION ARBORETUM PLANT SALE ARBORETUM PLANT SALE Where a developer? Try out the HTML to PDF API well drilling boom 1 month, 1 week ago "Normal" irrigation can make

Pasternack, Gregory B.

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject Board for Physics  

E-Print Network [OSTI]

pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Subject the HTML to PDF API Astronomy and Astrophysics& D. Narasimha/D. Ojha dna/ojha Nuclear Physics& Indranil a developer? Try out the HTML to PDF API Courses Instructor(s) e-mail Quantum Mechanics II@$* Sunil Mukhi

Udgaonkar, Jayant B.

142

http://www.salon.com/news/feature/2007/03/28/wind/print.html To print this page, select "Print" from the File menu of your browser  

E-Print Network [OSTI]

, and least known, source of wind power is that generated by offshore wind turbines. A newly released study" from the File menu of your browser Gone with the wind The rich may be moaning about wind turbines -- and the coal industry -- to build the nation's largest offshore wind park. By Katherine Ellison Mar. 28, 2007

Firestone, Jeremy

143

Confessions of an Internet alautun, Maya glyph  

E-Print Network [OSTI]

Confessions of an Internet Timekeeper alautun, Maya glyph David L. Mills University of Delaware http://www.eecis.udel.edu/~mills mailto:mills@udel.edu 14-Feb-07 1 #12;On the Internet cultural algorithms, timekeeping and growing pains. ­ Along the way I developed an obsession to wind every computer

Mills, David L.

144

The Internet of Things: A survey  

Science Journals Connector (OSTI)

This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, ... Keywords: Internet of Things, Pervasive computing, RFID systems

Luigi Atzori; Antonio Iera; Giacomo Morabito

2010-10-01T23:59:59.000Z

145

Page 1 of 4 Housing Internet Services  

E-Print Network [OSTI]

of Technology #12;Page 2 of 4 Introduction to Curtin Internet Services Internet services from Housing Guide). Access to the Curtin INTRANET (Curtin web pages remains free) Choose an alternative external is provided in setting up your account or choosing an ISP. Access to the Curtin INTRANET (Curtin web pages

146

An Intermittent Energy Internet Architecture Barath Raghavan  

E-Print Network [OSTI]

's energy infrastructure and will likely include significant de- ployment of intermittent renewable energyAn Intermittent Energy Internet Architecture Barath Raghavan ICSI David Irwin UMass Jeannie-design the Internet for an energy- constrained future powered by diffuse, intermittent, and expensive power sources

Shenoy, Prashant

147

Enter data into Portfolio Manager | ENERGY STAR Buildings & Plants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Enter data into Portfolio Manager Enter data into Portfolio Manager Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Learn the benefits Get started Use Portfolio Manager The new ENERGY STAR Portfolio Manager How Portfolio Manager helps you save The benchmarking starter kit Identify your property type Enter data into Portfolio Manager The data quality checker How Portfolio Manager calculates metrics

148

Green academy helps researchers enter the marketplace | Department of  

Broader source: Energy.gov (indexed) [DOE]

Green academy helps researchers enter the marketplace Green academy helps researchers enter the marketplace Green academy helps researchers enter the marketplace March 29, 2010 - 11:07am Addthis Andrew Hargadon teaches a workshop at Green Technology Entrepreneurship Academy in Incline Village, Nevada.
| Photo Courtesy of University of California, Davis Andrew Hargadon teaches a workshop at Green Technology Entrepreneurship Academy in Incline Village, Nevada.
| Photo Courtesy of University of California, Davis Stephen Graff Former Writer & editor for Energy Empowers, EERE Before wading into the green energy sector, there are crucial things every budding entrepreneur should know: think like an investor, know your customer, and prove your research is going to solve a problem. To the business-savvy this advice may seem obvious, but for the

149

Better Buildings Federal Award 2013 Guidelines for Entering | Department of  

Broader source: Energy.gov (indexed) [DOE]

2013 Guidelines for Entering 2013 Guidelines for Entering Better Buildings Federal Award 2013 Guidelines for Entering October 7, 2013 - 4:40pm Addthis Have Questions? A list of frequently asked questions contains answers to a variety of Better Buildings Federal Award queries. The Better Buildings Federal Award recognizes the Federal Government's highest-performing buildings through a competition to reduce annual energy intensity (Btu per square foot of facility space) on a year-over-year basis. The winner is the Federal building that reduces its energy intensity the most as compared to the previous year. Selecting Applicants Agencies should consider nominating a building based on how well it expects the building to perform in 2013 as compared to 2012, taking into account a wide range of innovative or comprehensive energy management practices being

150

E-Print Network 3.0 - aptamers selectively enter Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

selectively enter Search Powered by Explorit Topic List Advanced Search Sample search results for: aptamers selectively enter Page: << < 1 2 3 4 5 > >> 1 Analysis of Selection...

151

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote...  

Broader source: Energy.gov (indexed) [DOE]

26: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability...

152

Unraveling Internet identities : accountability & anonymity at the application layer  

E-Print Network [OSTI]

Both anonymity and accountability play crucial roles in sustaining the Internet's functionality, however there is a common misconception that increasing the anonymity of Internet identities necessitates diminishing their ...

Wolff, Josephine Charlotte Paulina

2012-01-01T23:59:59.000Z

153

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

154

Krypton-filled light bulbs enter consumer market  

Science Journals Connector (OSTI)

Duro-Test Corp., North Bergen, N.J., this month began marketing a krypton-filled bulb and Westinghouse Electric will enter the market this fall. ... Its lower heat conductivity reduces energy loss from the filament, allowing the filament to run hotter and the glass jacket to run cooler. ...

1968-06-24T23:59:59.000Z

155

Sir --Venezuela has entered 2003 deadlocked in a dangerous political  

E-Print Network [OSTI]

Sir -- Venezuela has entered 2003 deadlocked in a dangerous political confrontation and a general to preserve Venezuela's science and its natural environment, which is rich in biodiversity. We ask for Scientific Research, PO Box 21827, Caracas 1020A, Venezuela correspondence NATURE |VOL 421 |30 JANUARY 2003

Chapman, Clark R.

156

Enteric Protozoa in the Developed World: a Public Health Perspective  

Science Journals Connector (OSTI)

...and T Roberts. 2009. The economics of enteric infections: human...in rainwater harvesting. Desalination 248 :118-124. 186. Henriques-Gil...processes: a critical review. Desalination 250 :236-248. 368. Shoff...N .January 2007. The economics of climate change: the Stern...

Stephanie M. Fletcher; Damien Stark; John Harkness; John Ellis

2012-07-01T23:59:59.000Z

157

Building internet trust: signalling through trustmarks  

Science Journals Connector (OSTI)

Consumers' concerns about privacy, security, and control of personal information highlight the importance of trust in building marketing relationships in the computer-mediated environment. Internet firms have begun posting third-party certifications, labelled ??trustmarks?, as signals of reliability, credibility, and general trustworthiness. This paper integrates the literatures on signalling theory and trust, and makes extensions to the internet. It identifies and categorises sets of internet signals, highlighting the critical role of trustmarks in the computer-mediated environment. It develops a series of propositions related to the effectiveness of trustmarks, including variables such as source and culture. Lastly, it provides direction for future research.

K. Damon Aiken; Ben S. Liu; Robert D. Mackoy; Gregory E. Osland

2004-01-01T23:59:59.000Z

158

Internet growth: Myth and reality, use and abuse Andrew Odlyzko  

E-Print Network [OSTI]

Internet growth: Myth and reality, use and abuse Andrew Odlyzko AT&T Labs ­ Research amo@research.att.com http://www.research.att.com/¸amo Abstract Actual Internet traffic growth rates of 100 percent per year to Internet growth claim astronomical rates of increase; the usual phrase is that ``Internet traffic

Odlyzko, Andrew M.

159

Internet growth: Myth and reality, use and abuse Andrew Odlyzko  

E-Print Network [OSTI]

Internet growth: Myth and reality, use and abuse Andrew Odlyzko AT&T Labs - Research amo@research.att.com http://www.research.att.com/ amo Abstract Actual Internet traffic growth rates of 100 percent per year to Internet growth claim astronomical rates of increase; the usual phrase is that "Internet traffic

Odlyzko, Andrew M.

160

Internet video streaming using 3-D SPIHT  

E-Print Network [OSTI]

several years. Video streaming involves video compression, protocols selection for streaming media, client/receiver buffer management and packet loss recovery. This thesis documents a new Internet video streaming system based on the state-of-the-art 3-D...

Jiang, Jianhong

2012-06-07T23:59:59.000Z

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Towards an Energy-Efficient Internet  

Science Journals Connector (OSTI)

Global telecommunications consume a small but growing fraction of the worlds electricity supply. We examine the key contributors to energy consumption in the Internet and examine some...

Tucker, Rodney S

162

Instructions on Entering Publications into the APS Database  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Methods to enter user publications into the APS publication database Methods to enter user publications into the APS publication database The APS Publications Database is a searchable compendium of information on results from research at the APS, and the official source for listings of APS-related publications. It is the source for reports to APS review and advisory committees (including the APS Scientific Advisory Committee); the U.S. Department of Energy; and other government agencies. Maintaining complete and up-to-date records is of great importance to the facility and its users. Please note that the database is also the repository for dissertations, abstracts, awards, and invited talks. In this way, we hope to build a comprehensive record of information about research at the APS. We appreciate your help in keeping this important database current, and

163

INTERNET-DRAFT draft-goyal-diffserv-afstdy-00 February 2000 Internet Engineering Task Force Mukul Goyal  

E-Print Network [OSTI]

INTERNET-DRAFT draft-goyal-diffserv-afstdy-00 February 2000 Internet Engineering Task Force Mukul Goyal Internet Draft Arian Durresi Expires: August 2000 Raj Jain Chunlei Liu The Ohio State University February 2000 Performance Analysis of Assured Forwarding Status of Memo This document is an Internet

Jain, Raj

164

Emergency Endovascular 'Bridge' Treatment for Iliac-Enteric Fistula  

SciTech Connect (OSTI)

Aortic aneurysm has been reported to be the dominant cause of primary iliac-enteric fistula (IEF) in >70% of cases [1]; other less common causes of primary IEF include peptic ulcer, primary aortitis, pancreatic pseudocyst, or neoplastic erosion into an adjacent artery [2, 3]. We describe an unusual case of IEF managed with a staged approach using an endovascular stent-graft as a 'bridge' in the emergency setting to optimize the next elective definitive excision of the lesion.

Franchin, Marco [Varese University Hospital, University of Insubria, Department of Surgical Sciences, General Surgery 1, School of Medicine (Italy); Tozzi, Matteo; Piffaretti, Gabriele, E-mail: gabriele.piffaretti@uninsubria.it [Varese University Hospital, University of Insubria, Department of Surgical Sciences, Vascular Surgery, School of Medicine (Italy); Carrafiello, Gianpaolo [Varese University Hospital, University of Insubria, Department of Radiology, Interventional Radiology, School of Medicine (Italy); Castelli, Patrizio [Varese University Hospital, University of Insubria, Department of Surgical Sciences, Vascular Surgery, School of Medicine (Italy)

2011-10-15T23:59:59.000Z

165

Internet Engineering Task Force Individual Submission INTERNET-DRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

-lennox-sip-reg-payload-01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

166

Internet-based supply chain management: using the Internet to revolutionize your business  

Science Journals Connector (OSTI)

The Internet has emerged in the recent past as a dynamic medium for channeling transactions between customers and firms in virtual marketplace. In particular, the World Wide Web has emerged as a powerful new channel for supply chain, rendering many intermediaries ... Keywords: Business-to-business, Internet, Supply chain, Supply chain management

Zillur Rahman

2003-12-01T23:59:59.000Z

167

Influences, usage, and outcomes of Internet health information searching: Multivariate results from the Pew surveys  

E-Print Network [OSTI]

INFLUENCES, USAGE, AND OUTCOMES OF INTERNET HEALTHR.E. (2006). Influences, usage, and outcomes of InternetSeeking, p-3 INFLUENCES, USAGE, AND OUTCOMES OF INTERNET

Rice, Ronald E

2006-01-01T23:59:59.000Z

168

Manhattan Project: The War Enters Its Final Phase, 1945  

Office of Scientific and Technical Information (OSTI)

American troops approaching the beach, D-Day, June 6, 1944. THE WAR ENTERS ITS FINAL PHASE American troops approaching the beach, D-Day, June 6, 1944. THE WAR ENTERS ITS FINAL PHASE (1945) Events > Dawn of the Atomic Era, 1945 The War Enters Its Final Phase, 1945 Debate Over How to Use the Bomb, Late Spring 1945 The Trinity Test, July 16, 1945 Safety and the Trinity Test, July 1945 Evaluations of Trinity, July 1945 Potsdam and the Final Decision to Bomb, July 1945 The Atomic Bombing of Hiroshima, August 6, 1945 The Atomic Bombing of Nagasaki, August 9, 1945 Japan Surrenders, August 10-15, 1945 The Manhattan Project and the Second World War, 1939-1945 Harry Truman being sworn in as president, April 12, 1945. On April 12, 1945, only weeks before Germany's unconditional surrender on May 7, President Franklin Roosevelt died suddenly in Warm Springs, Georgia. Vice President Harry S. Truman, a veteran of the United States Senate, was now president. Truman had not been privy to many of Roosevelt's internal policy deliberations and had to be briefed extensively in his first weeks in office. One of these briefings, provided by Secretary of War Henry Stimson on April 25, concerned S-1 (the Manhattan Project). Stimson, with Leslie Groves present during part of the meeting, traced the history of the Manhattan Project, summarized its status, and detailed the timetable for testing and combat delivery. Truman asked numerous questions during the forty-five minute meeting and made it clear that he understood the relevance of the atomic bomb to upcoming diplomatic and military initiatives.

169

Cryptography and the Internet: lessons and challenges  

SciTech Connect (OSTI)

The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising new questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.

McCurley, K.S.

1996-12-31T23:59:59.000Z

170

Effect of an infection control programme in enteral feeding bacterial contamination in nursing homes  

Science Journals Connector (OSTI)

This study was to investigate the effectiveness of an Infection Control Programme (ICP) in knowledge and practice of enteral feeding of nursing home staff, and to explore any enteral feed contamination and correl...

SSK Ho; MMY Tse; MV Boost

2011-06-01T23:59:59.000Z

171

E-Print Network 3.0 - acute radiation enteritis Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: tissues. Other types of radiation do some harm to normal tissues as they enter and exit the tumor area... . Proton radiation has an entering dose but no exit dose of...

172

Coal Data Browser  

Gasoline and Diesel Fuel Update (EIA)

Energy in Brief How much U.S. electricity is generated from renewable energy? Shale in the United States How dependent are we on foreign oil? What is the role of...

173

STEO Data Browser  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy in Brief How much U.S. electricity is generated from renewable energy? Shale in the United States How dependent are we on foreign oil? What is the role of...

174

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Broader source: Energy.gov (indexed) [DOE]

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

175

A text mining approach to Internet abuse detection  

Science Journals Connector (OSTI)

Many organizations have started to fight Internet abuse by setting up Internet usage policies (Siau et al. 2002), conducting management training (Young and Case 2004), and monitoring and blocking employees abuse

Chen-Huei Chou; Atish P. Sinha

2008-09-01T23:59:59.000Z

176

Ghost at the machine : Internet addiction and compulsive computer use  

E-Print Network [OSTI]

Technology use-particularly the use of the Internet-is a pervasive component of modem society. The Internet has changed the way we work and the way we play, creating new possibilities for self expression and communication. ...

VanCott, Rachel Diane

2008-01-01T23:59:59.000Z

177

The internet as a source of drugs of abuse  

Science Journals Connector (OSTI)

The Internet is a vital medium for communication, entertainment ... to the many positive functions served by the Internet, it also has been used to facilitate ... and then actually sellcontrolled substances over...

Robert F. Forman PhD; Douglas B. Marlowe JD; PhD

2006-01-01T23:59:59.000Z

178

Assessing mathematics automatically using computer algebra and the internet  

Science Journals Connector (OSTI)

......against the most obvious forms of student abuse exist within the system. Students are...evaluation of students' work over the internet provides the pragmatic educator with significant...Algebraic Computation (ISSAC2002), Internet Accessible Mathematical Computation 2002......

Chris Sangwin

2004-03-01T23:59:59.000Z

179

Economics of advertising: Emerging functions of Internet advertising  

Science Journals Connector (OSTI)

This paper intends to highlight the emerging force of the Internet as an advertising medium. The economic functions of Internet advertising are examined. Moreover, the paper aims to evaluate the relative impacts ...

Marcus Ling; Kevin Lawler; Norman McBain; Alfredo Moscardini

180

CAPRI: A Common Architecture for Distributed Probabilistic Internet Fault Diagnosis  

E-Print Network [OSTI]

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J.

2007-06-04T23:59:59.000Z

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

CAPRI : a common architecture for distributed probabilistic Internet fault diagnosis  

E-Print Network [OSTI]

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J. (George Janbing), 1979-

2007-01-01T23:59:59.000Z

182

Language Independent Icon-Based Interface for Accessing Internet  

Science Journals Connector (OSTI)

With the advancement of the information technology, Internet becomes an essential part in our every sphere of life. However, the benefits of Internet are limited to only educated people who can read and write in ...

Santa Maiti; Debasis Samanta; Satya Ranjan Das

2011-01-01T23:59:59.000Z

183

The Internet of Things Helping Utilities | OpenEI Community  

Open Energy Info (EERE)

The Internet of Things Helping Utilities Home > Groups > Smart Grid Dc's picture Submitted by Dc(107) Contributor 16 October, 2014 - 12:21 The Internet of Things (IoT) is helping...

184

How the Internet is influencing today's E&P business  

Science Journals Connector (OSTI)

...between. So, how can this technology tool be used to best advantage...management. The Internet (and Intranet) support and encourage knowledge...management. The Internet (and Intranet) support and encourage knowledge...Encouragetheuseandvalueofhigher end information, technology, and interpretation methodologies...

Jon Fuller; Joe Fay

185

Who's Who in the Internet: Biographies of IAB, IESG and IRSG Members  

Science Journals Connector (OSTI)

This FYI RFC contains biographical information about members of the Internet Activities Board (IAB), the Internet Engineering Steering Group (IESG) of the Internet Engineering Task Force (IETF), and the the Internet Research Steering Group (IRSG) of ...

G. Malkin

1992-05-01T23:59:59.000Z

186

Characterizing Internet Performance to Support Wide-area Application Development  

E-Print Network [OSTI]

-of-the-way places, like Islamabad (Pakistan) or Paramaribo (Suriname), not just the Internet covering the USA

Tanenbaum, Andrew S.

187

DipZoom: The Internet Measurements Marketplace  

E-Print Network [OSTI]

DipZoom: The Internet Measurements Marketplace (Position Paper) Michael Rabinovich, Sipat Triukose measurements. Unlike existing approaches that face a difficult challenge of building a measurement platform with suf- ficiently diverse measurements and measuring hosts, DipZoom offers a matchmaking service instead

Rabinovich, Michael "Misha"

188

New platforms of the violence in internet  

Science Journals Connector (OSTI)

Over the last few decades, some of the most defining sociological changes involve communications, especially in the permeation of information technologies and its effects in all areas of life. However, does this virtual world replicate the same problems ... Keywords: cyberculture, cybersex, cyberviolence, internet, new technologies

Mara del Mar Ramrez-Alvarado; Inmaculada Gordillo

2010-10-01T23:59:59.000Z

189

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network [OSTI]

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

190

Language of the Internet NAOMI S. BARON  

E-Print Network [OSTI]

processing to facilitate working on the Internet and the World Wide Web (1.3) Section 2 Linguistic Issues for Communicating via the Web 1 As with so many aspects of the computing world, the nature of the language of this chapter. #12;2 summarize the types of Web coding systems (4.1) present an overview of Web markup languages

Carlini, David

191

Dynamic, transparent Internet server replication using HYDRANET  

E-Print Network [OSTI]

) in the Internet. These agents will replicate the transport-level service access points of their origin servers and begin serving clients in the name of the origin server. A new protocol and application API was also developed that manages this service replication...

Dillon, Geoffrey A.

1998-01-01T23:59:59.000Z

192

Acoustic Lexemes for Organizing Internet Audio  

E-Print Network [OSTI]

Acoustic Lexemes for Organizing Internet Audio Michael A. Casey In this article, a method is proposed for automatic fine-scale audio description that draws inspiration from ontological sound automation of audio description at the level of sound objects for indexing and retrieving sound segments

Casey, Michael

193

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

194

Compact Routing on Internet-Like Graphs Dmitri Krioukov  

E-Print Network [OSTI]

Compact Routing on Internet-Like Graphs Dmitri Krioukov Email: dima@krioukov.net Kevin Fall Intel and simulation, we derive the stretch distribution of this routing scheme on Internet-like interdomain topologies that the average TZ stretch is quite low and virtually independent of . In particular, for the Internet interdomain

Yang, Xiaowei

195

Experimental Design of Worldwide Internet Voting System using PKI  

E-Print Network [OSTI]

easily participate in voting over the Internet. It is consid- ered as a good solution for the recent interest for Internet voting as a good solution to make voting more accessible and convenient, it is widely voting together with good e?ciency. In this research, we design Internet voting system us- ing public key

Kim, Kwangjo

196

Case Study: Interactive Visualization for Internet Security Soon Tee Teoh  

E-Print Network [OSTI]

] to communicate. A good way to un- derstand the behaviors and performance of the Internet is thus to collectCase Study: Interactive Visualization for Internet Security Soon Tee Teoh Kwan-Liu Ma S. Felix Wu North Carolina State University ABSTRACT Internet connectivity is defined by a set of routing protocols

California at Davis, University of

197

WEB N.0, THE NEW DEVELOPMENT TREND OF INTERNET  

E-Print Network [OSTI]

energy which can be equal to the mainstream market. The internet provides a good groundWEB N.0, THE NEW DEVELOPMENT TREND OF INTERNET Zhiguo Sun, Wensheng Wang Agricultural Information: This article analyzes the Internet basic theory, the network foundation environment and the user behavior

Boyer, Edmond

198

Pricing the Internet Jerey K. MacKie-Mason  

E-Print Network [OSTI]

. Currently, the several Internet backbone networks are public goods with exclusion: usage is essentially freePricing the Internet by Jerey K. MacKie-Mason Hal R. Varian University of Michigan April 1993 to the Internet," JFK School of Government, May 26­27 , 1993. We describe the technology and cost structure

Varian, Hal R.

199

Visualising Internet Traffic Data with Three-Dimensional Spherical Display  

E-Print Network [OSTI]

successful in this respect has proven to give good predictions about structural features of the InternetVisualising Internet Traffic Data with Three-Dimensional Spherical Display Ben Yip1 , Shea Goyette1 of visualising internet traffic data using the underlying spherical nature of the globe. The method uses data

Hong,Seokhee

200

Invited Talk: Mitigating the Effects of Internet Timing Faults  

E-Print Network [OSTI]

Invited Talk: Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways and the Internet. The usual approach to making such a connection is to install a gateway node which translates from Internet protocols to embedded field bus network protocols. Such connections raise obvious security

Koopman, Philip

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Internet Routing Resilience to Failures: Analysis and Implications  

E-Print Network [OSTI]

Internet Routing Resilience to Failures: Analysis and Implications Jian Wu Ying Zhang Z. Morley Mao Kang G. Shin University of Michigan ABSTRACT Internet interdomain routing is policy-driven, and thus phys- ical connectivity does not imply reachability. On average, routing on today's Internet works

Mao, Zhuoqing Morley

202

Modeling Internet Topology Kenneth L. Calvert, Georgia Tech  

E-Print Network [OSTI]

such as the Internet, has a strong bearing on many management and performance issues. Good models of the topologicalModeling Internet Topology Kenneth L. Calvert, Georgia Tech Matthew B. Doar, Ascom Nexion Ellen W aspects of locality and hierarchy present in the Internet. Two implemen­ tations that generate networks

Zegura, Ellen W.

203

Ethical implications of internet monitoring: A comparative study  

Science Journals Connector (OSTI)

Organizations have become increasingly concerned about employee use of the Internet for personal reasons while at work. Monitoring Internet usage has become more and more prevalent in the workplace. While there may be legitimate business functions such ... Keywords: Autonomy, Fairness, Internet monitoring, University, Workplace

Frances S. Grodzinsky; Andra Gumbus; Stephen Lilley

2010-09-01T23:59:59.000Z

204

Reluctance of a neutral nanoparticle to enter a charged pore  

E-Print Network [OSTI]

We consider the translocation of a neutral (uncharged) nanoparticle through a pore in a thin membrane with constant surface charge density. If the concomitant Debye screening layer is sufficiently thin, the resulting forces experienced by the particle on its way through the pore are negligible. But when the Debye length becomes comparable to the pore diameter, the particle encounters a quite significant potential barrier while approaching and entering the pore, and symmetrically upon exiting the pore. The main reason is an increasing pressure which acts on the particle when it intrudes into the counter ion cloud of the Debye screening layer. In case the polarizability of the particle is different (usually smaller) than that of the ambient fluid, a second, much smaller contribution to the potential barrier is due to self-energy effects. Our numerical treatment of the problem is complemented by analytical approximations for sufficiently long cylindrical particles and pores, which agree very well with the numerics.

Sebastian Getfert; Thomas Tws; Peter Reimann

2014-01-08T23:59:59.000Z

205

AN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS AN EDGE DEVICE FOR SUPPORTING INTERNET  

E-Print Network [OSTI]

parts of the Internet where the un- derlying link layer technology would be able to give good supportAN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS AN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS H. Hussmann Dresden

206

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Broader source: Energy.gov (indexed) [DOE]

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

207

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

208

The UW Online Timesheet is available to hourly employees with a UW NetID and access to Employee Self-Service (ESS). It can be accessed from any computer with an internet connection and is available 24/7. All time entry and approvals are done  

E-Print Network [OSTI]

Self-Service (ESS). It can be accessed from any computer with an internet connection and is available record is set up, the next time the employee logs in to Employee Self-Service (ESS), they will see for final processing. Employee Actions: Entering Time on UW Timesheet · Log into Employee Self-Service (ESS

Borenstein, Elhanan

209

E-Print Network 3.0 - abnormal doppler enteral Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

abnormal doppler enteral Page: << < 1 2 3 4 5 > >> 1 1317 September 2009, Hamburg, Germany Poster abstracts The relationship between abdominal circumference and Summary:...

210

Potential Internet Applications in Forest Products Exporting and  

E-Print Network [OSTI]

of Respondents #12;Adoption of Internet Technologies 0.0% 39.8% 57.0% 3.2% 0% 20% 40% 60% 80% 100 to Other Industries (n=93) #12;Adoption of Internet Technologies 2.2% 51.1% 22.8%23.9% 0% 20% 40% 60% 80 (n=54) 0% 20% 40% 60% 80% 100% Intranet Internet EDI Extranet VPN Do not use Use within next two

211

Analysis of Internet Banking Security Crack Through Messenger Hacking  

Science Journals Connector (OSTI)

The messenger is a free information and communication means for easy information exchange with acquaintances connected to the Internet during ordinary work process. Therefore, acquaintances (automatically) connec...

Dea-Woo Park; Kyong-Ha Roo

2013-01-01T23:59:59.000Z

212

Proactive techniques for correct and predictable Internet routing  

E-Print Network [OSTI]

The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

Feamster, Nicholas G. (Nicholas Greer), 1979-

2006-01-01T23:59:59.000Z

213

Instructions for Using Secure Email via Outlook Web Access | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

214

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

215

Already a pressing global issue, internet governance is growing in importance in international debates. With internet  

E-Print Network [OSTI]

Already a pressing global issue, internet governance is growing in importance in international, including those falling under: the United Nations General Assembly (UNGA), the International related to these processes are then weaved around two particular forums ­ the ITU Plenipotentiary in 2014

Chen, Yiling

216

Following antigen encounter, T cells enter a program of proliferation and differentiation that,  

E-Print Network [OSTI]

In case a pathogen enters at a local tissue site, activated T cells do not embark on a random search131 Following antigen encounter, T cells enter a program of proliferation and differentiation that. The first technology developed in this thesis, termed cellular barcoding, makes use of a retroviral barcode

van den Brink, Jeroen

217

T-729: Mozilla Code Installation Through Holding Down Enter | Department of  

Broader source: Energy.gov (indexed) [DOE]

9: Mozilla Code Installation Through Holding Down Enter 9: Mozilla Code Installation Through Holding Down Enter T-729: Mozilla Code Installation Through Holding Down Enter September 29, 2011 - 8:30am Addthis PROBLEM: Mozilla Code Installation Through Holding Down Enter. PLATFORM: Versions prior to the following are vulnerable: Firefox 7.0 Firefox 3.6.23 Thunderbird 7.0 SeaMonkey 2.4 ABSTRACT: Attackers can exploit this issue by enticing an unsuspecting victim into viewing and interacting with a malicious Web page. An attacker may be able to exploit this issue to bypass a confirmation dialog and install an arbitrary add-on. This may aid in further attacks. reference LINKS: Mozilla Foundation Security Advisory 2011-40 Firefox Security Advisories CVE-2011-2372 CVE-2011-3001 IMPACT ASSESSMENT: High Discussion: If a user holds down the Enter key--as part of a game or test, perhaps--a

218

GRR/Section 3-HI-f - Permit to Cross or Enter the State Energy Corridor |  

Open Energy Info (EERE)

GRR/Section 3-HI-f - Permit to Cross or Enter the State Energy Corridor GRR/Section 3-HI-f - Permit to Cross or Enter the State Energy Corridor < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-HI-f - Permit to Cross or Enter the State Energy Corridor 03HIFPermitToCrossOrEnterTheStateEnergyCorridor.pdf Click to View Fullscreen Contact Agencies Hawaii Department of Transportation Harbors Divsion Regulations & Policies Hawaii Revised Statutes Chapter 277 Triggers None specified Click "Edit With Form" above to add content 03HIFPermitToCrossOrEnterTheStateEnergyCorridor.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative

219

INL Portal Support  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Supported Browsers The INL Portal supports Internet Explorer 6.0, 7.0; Firefox 1.5, 2.0; and Safari 2.0 (Mac only) browsers. You can download one of the supported browsers from the...

220

Five Deaths Resulting from Abuse of Dextromethorphan Sold Over the Internet  

Science Journals Connector (OSTI)

......Resulting from Abuse of Dextromethorphan Sold Over the Internet Barry K. Logan...resulting from abuse of dextromethorphan sold over the internet. | Dextromethorphan...Resulting from Abuse of Dextromethorphan Sold Over the Internet Reproduction......

Barry K. Logan; Gary Goldfogel; Rebecca Hamilton; James Kuhlman

2009-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

End-to-end routing behavior in the internet  

Science Journals Connector (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

2006-10-01T23:59:59.000Z

222

End-to-end routing behavior in the Internet  

Science Journals Connector (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

1996-08-01T23:59:59.000Z

223

Touring the Internet in a TCP Sidecar Rob Sherwood  

E-Print Network [OSTI]

Touring the Internet in a TCP Sidecar Rob Sherwood Department of Computer Science University, College Park nspring@cs.umd.edu ABSTRACT An accurate router-level topology of the Internet would benefit. The combined approach mitigates problems associated with traceroute-based topology discovery, including abuse

Gruner, Daniel S.

224

MEASURING INTERNET TELEPHONY QUALITY: WHERE ARE WE TODAY ?  

E-Print Network [OSTI]

MEASURING INTERNET TELEPHONY QUALITY: WHERE ARE WE TODAY ? Olof Hagsand SICS Sweden Kjell Hanson Ericsson Business Networks Sweden Ian Marsh SICS Sweden Abstract Users of Internet telephony applications demand good quality audio playback. This quality is largely dependent on the instantaneous network

225

INTERNET AND E-COMMERCE PATENTS Bradley C. Wright  

E-Print Network [OSTI]

INTERNET AND E-COMMERCE PATENTS Bradley C. Wright The digital world is getting crowded. The number become pervasive, companies with an Internet presence have labored to distinguish their Web sites and marketing techniques from the offerings of others. Consumers who purchase goods and services over

Shamos, Michael I.

226

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network [OSTI]

of household Internet usage, 89% of 93 families needed support from a computer help desk in the 1st year for Technical Help 1.3. Theoretical Analysis 2. METHOD 2.1. Requests for Support From the Help Desk 2Troubles With the Internet: The Dynamics of Help at Home Sara Kiesler, Bozena Zdaniuk, Vicki

227

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network [OSTI]

help desk in the 1st year they used the Internet. However, usually only the most technically involved aspects of technological change and communication systems. Bozena Zdaniuk is Data Management Coordinator 2.1. Requests for Support From the Help Desk 2.2. Internet Usage 2.3. Questionnaire Measures 2

Kiesler, Sara

228

Models for a selfmanaged Internet By Frank Kelly  

E-Print Network [OSTI]

Models for a self­managed Internet By Frank Kelly Centre for Mathematical Sciences, University. Kelly that some current Internet traffic needs large buffers, causing unacceptable queue­ ing delays, Crowcroft & Oechslin 1998; Gibbens & Kelly 1999a; Key & McAuley 1999a). Its premise is that a simple packet

Kelly, Frank

229

A look behind the future internet architectures efforts  

Science Journals Connector (OSTI)

The Future Internet Architectures (FIA) constitutes a 10-year effort by the U.S. National Science Foundation (NSF) that was launched in 2006, with the announcement of the Future INternet Design (FIND) research area within a Network Technologies and Systems ...

Darleen Fisher

2014-07-01T23:59:59.000Z

230

CACHING CHARACTERISTICS OF INTERNET AND INTRANET WEB PROXY TRACES  

E-Print Network [OSTI]

CACHING CHARACTERISTICS OF INTERNET AND INTRANET WEB PROXY TRACES Arthur Goldberg, Ilya Pevzner} This paper studies the caching characteristics of HTTP requests and responses that pass through production a large Internet Service Provider (ISP) and 2.0 million entries from an Intranet firewall are studied. We

Goldberg, Arthur P.

231

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

­lennox­sip­reg­payload­01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

232

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

­lennox­sip­reg­payload­00.ps Columbia University March 6, 2000 Expires: September 2000 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

233

Enabling Performance Intelligence for Application Adaptation in the Future Internet  

E-Print Network [OSTI]

plat- form. Achieving autonomicity in the Future Internet will require a performance architecture that such "Future Internet Perfor- mance Architecture" (FIPA), and present our reference implementation of FIPA in virtualization [1] technology at end-hosts and core network switches/routers. The Global Envir

Calyam, Prasad

234

Spelling and searching the internet: An overlooked problem  

Science Journals Connector (OSTI)

Misspellings, phonetic spellings, deliberately idiosyncratic spellings, typographical, and other errors are examined in relation to the Internets lack of standardization. Despite the dramatic effect different spellings have on the outcome of searches, this topic has not been adequately addressed in the literature nor have solutions been suggested hitherto.

Edward Proctor

2002-01-01T23:59:59.000Z

235

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh  

E-Print Network [OSTI]

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh M. Satyanarayanan, Carnegie to suspend work at one machine and to resume it at another. Our key insight is that this capability can a machine at one Internet site, then travel to some other site and resume my work there on another machine

Satyanarayanan, Mahadev "Satya"

236

Intelligent fault prediction system based on internet of things  

Science Journals Connector (OSTI)

Fault prediction is the key technology to ensure the safe operation of large equipment. Based on the investigation of current and developing research of fault prediction, an intelligent fault prediction system based on internet of things is proposed ... Keywords: Fault prediction, Intelligent computer information processing, Internet of things, Mechanical equipment groups, Predictive maintenance

Xiaoli Xu; Tao Chen; Mamoru Minami

2012-09-01T23:59:59.000Z

237

Life Cycle Environmental Assessment of the Internet: The Benefits and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Thomas McKone This seminar starts by providing a short introduction to the field of Environmental Life Cycle Assessment (LCA) through a practical example of packaging. It will then develop the case of the Life Cycle Benefits and Impacts of the Internet; raising the different scientific challenges that LCA faces to provide relevant results for innovative technologies.--The rapid development of the Internet and the related potential impacts on and benefits for the environment deserves attention. The infrastructure that supports a university's use of the Internet has been comprehensively

238

Police Officers Perceptions of their Reactions to Viewing Internet Child Exploitation Material  

Science Journals Connector (OSTI)

Internet child exploitation (ICE) material, commonly referred to as internet child pornography or child sexual abuse images, refers to sexualised depictions of children ... produced, distributed, accessed or stor...

Martine Powell; Peter Cassematis; Mairi Benson

2014-04-01T23:59:59.000Z

239

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Broader source: Energy.gov (indexed) [DOE]

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

240

Internet Path-Quality Monitoring inInternet Path-Quality Monitoring in the Presence of Adversaries  

E-Print Network [OSTI]

Site A Performance Routing B l i l d b t lti l th ( ltih d it ) Routers need tools to detectInternet Path-Quality Monitoring inInternet Path-Quality Monitoring in the Presence of Adversaries routed from Alice to Bob via a path of intermediate routers Routing protocols used to set up paths

Goldberg, Sharon

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

(for Gene Recognition Analysis Internet Link),  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 6/1/2011 5 6/1/2011 6.6 Speeding Up the Process of Gene Discovery The human genome contains information that could be used to prevent birth defects and treat or cure devastating diseases, but it is written in a language that scientists are only beginning to understand. To help decipher the code, Ed Uberbacher and colleagues at Oak Ridge National Laboratory combined cutting- edge computer technology with their knowledge of human biology to develop GRAIL (for Gene Recognition Analysis Internet Link), a "thinking" computer program that imitates the human learning process as it searches for genetic meaning. GRAIL and successor software programs can rapidly identify key instructions in genes from within vast stretches of DNA that appear to be meaningless-a critical contribution to the

242

Fermilab Leadership Institute Integrating Internet, Instruction and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fermilab Leadership Institute Integrating Fermilab Leadership Institute Integrating Internet, Instruction and Curriculum Online Materials Projects ACT Program Information Example ACT Class Page Example LInC Class Page Please sign up here to be notified of future LInC program opportunities. Fermilab LInC Online is creating a cadre of educational leaders who effectively integrate technology in their classrooms to support engaged learning student investigations on real-world issues. Participants range from classroom teachers and technology coordinators through library media specialists, who create engaged learning projects that incorporate the best uses of technology. The new Fermilab LInC ACT course guides teachers through the process of evaluating, selecting and customizing an inquiry-based online project to

243

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

244

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Archived Data Dictionary Archived Data Dictionary Central Internet Database CID Photo Banner Archived Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Stream Disposition Quantity* EM Corp - The quantity of material or waste dispositioned for the stream during a specified year or range of years. Annual Stream Inventory Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be stored as of a particular year or range of years. Annual Stream Source Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be generated new, generated as process outputs (secondary), or added through a receipt from another DOE or non-DOE site, in a particular year or range of years.

245

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Data Dictionary Data Dictionary Central Internet Database CID Photo Banner Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Disposition WIMS - Planned disposition quantity (total volume of container, as disposed, in m3) reported for each year: FY08 through FY50. B C Chemical Name TRI - (Form R - Part II - Section 1.2) The name of the toxic chemical that has been released and/or transferred during the reporting year. Listed toxic chemicals are those chemicals on the list in Committee Print Number 99-169 of the Senate Committee on Environment and Public Works, titled "Toxic Chemicals Subject to Section 313 of the Emergency Planning and Community Right-To-Know Act of 1986" (42 U.S.C. 11023). Currently, there are over 600 toxic chemicals included on the list subject to reporting.

246

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

247

Workers Prepare to Safely Enter One of Hanford Sites Most Hazardous Rooms  

Broader source: Energy.gov [DOE]

RICHLAND, Wash. When workers enter the hazardous, historic McCluskey Room at the Hanford site this summer, they will be safer due to their preparation and involvement in planning and training for the job.

248

Sensing of Nitrogen Limitation by Bacillus subtilis: Comparison to Enteric Bacteria  

Science Journals Connector (OSTI)

...Sensing of Nitrogen Limitation by Bacillus subtilis: Comparison to Enteric Bacteria...studied this correlation in Bacillus subtilis, a gram-positive, sporulating...we assessed this response in Bacillus subtilis. B. subtilis, a low-GC...

Ping Hu; Terrance Leighton; Galina Ishkhanova; Sydney Kustu

1999-08-01T23:59:59.000Z

249

PHOTO OPTION CURRICULUM (FOR STUDENTS ENTERING fAU2011 OR LATER)  

E-Print Network [OSTI]

PHOTO OPTION CURRICULUM (FOR STUDENTS ENTERING fAU2011 OR LATER) NOTE: ALL COURSE NUMBERS .........................................................................................3 MTA 260 - Intro Color Photo): .................................................................................9 MTA 2XX - Documentary Film & Photography (3) MTA303 - Early History of Photo (3) MTA304

Dyer, Bill

250

To make a circle graph (pie graph) in Excel 2010 1. Enter the data ...  

E-Print Network [OSTI]

To make a circle graph (pie graph) in Excel 2010. 1. Enter the data into Excel in rows, with the data labels followed by the numerical data. 2. Select all cells that...

Dave

2012-03-20T23:59:59.000Z

251

Histo-Blood Group Antigen-Like Substances of Human Enteric Bacteria as Specific Adsorbents for Human Noroviruses  

Science Journals Connector (OSTI)

...Antigen-Like Substances of Human Enteric Bacteria as Specific Adsorbents for Human Noroviruses Takayuki Miura a Daisuke Sano a Atsushi...The interactions between enteric viruses and environmental adsorbents were previously shown to have no binding specificity (41...

Takayuki Miura; Daisuke Sano; Atsushi Suenaga; Takeshi Yoshimura; Miyu Fuzawa; Toyoko Nakagomi; Osamu Nakagomi; Satoshi Okabe

2013-06-26T23:59:59.000Z

252

Registering for ADP Electronic Pay Statements This Quick Start Guide will help you set up your computer and web browser so that you can register for Statement Self Service  

E-Print Network [OSTI]

Folder window, select My Pay Statements and then click Open. The search page appears. 4. Either enter. Follow the instructions below. 1. Using caps lock, enter your full name as it appears on your pay statement. 2. The Client # for all StFX Employees is 193423. 3. Enter your date of birth in the format

253

Finding What You Need onFinding What You Need on the Internet:the Internet  

E-Print Network [OSTI]

into the "Enter search terms" field #12;9 Searching tips for CRISPSearching tips for CRISP----webweb math doesnmath doesn''t workt work The % is symbol is a wildcard; use to expand the keyword search sodium ion.gov/oberabstracts/index.jspwww.osti.gov/oberabstracts/index.jsp Can search in title, PI, F/Y, or institution sodium ion channel #12;AAAAACK! No results! OBER funds

Ha, Taekjip

254

TEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE  

E-Print Network [OSTI]

://www.ncemch.org/pubs/PDFs/breastfeedingTIB.pdf Internet monograph (standard citation to a part) Inhalent abuse [Internet]. Bethesda (MD): NationalTEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE Excellence in library recommendations for Internet citations using the CSE style are taken from the National Library of Medicine

255

A framework for nation-centric classification and observation of the internet  

Science Journals Connector (OSTI)

The Internet has matured to a mission-critical infrastructure, and recently attracted much attention at political and legal levels in many countries. Civil actions regarding the Internet infrastructure require a thorough understanding of the national ... Keywords: AS-level classification, German internet graph, methodology, nation-state internet routing

Matthias Whlisch; Sebastian Meiling; Thomas C. Schmidt

2010-11-01T23:59:59.000Z

256

Internet Engineering Task Force INTERNETDRAFT J. Lennox, J.Rosenberg, H.Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force INTERNET­DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne draft Status of this Memo This document is an Internet­Draft. Internet­Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also

Lennox, Jonathan

257

On Power-Law Relationships of the Internet Topology Michalis Faloutsos  

E-Print Network [OSTI]

On Power-Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp the apparent randomness of the Internet, we dis- cover some surprisingly simple power-laws of the Internet topology. These power-laws hold for three snapshots of the Internet, between November 1997 and December

258

Community Internet Access in Rural Areas: Solving the Economic Sustainability Puzzle  

E-Print Network [OSTI]

- oping nations. In researching and studying the economic self-sustainability of the Internet in rural

259

OSTI Pact with Internet Archive Ensures Uninterrupted Research Access |  

Office of Scientific and Technical Information (OSTI)

Pact with Internet Archive Ensures Uninterrupted Research Access Pact with Internet Archive Ensures Uninterrupted Research Access E-print Network One sure thing about the World Wide Web: like the weather, it will change. Given this dynamic nature of the Web and the importance of preservation of scientific information in a digital environment, OSTI recently partnered with Internet Archive to ensure uninterrupted access to more than 1 million online research papers from the E-print Network. The DOE E-print Network is the largest collection that a federal institution has undertaken in an on-going effort to preserve their own documents and history through Archive-It. "As a result of the pioneering partnership between the Internet Archive and OSTI, we are ensuring long-term, continuous access to the growing body of cutting-edge

260

Using end-user latency to manage internet infrastructure  

Science Journals Connector (OSTI)

Performance is a requirement for all interactive applications. For Internet-based distributed applications, the need is even more acute - users have a choice about where they browse, and if a site's performance frustrates them they may never return. ...

J. Bradley Chen; Michael Perkowitz

2002-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Chapter 6 Use [and Abuse] of Multistakeholderism in the Internet  

Science Journals Connector (OSTI)

Multistakeholderism has become the Internet governance regime choice of many. While it is certain that everyone does not have the same modalities in mind when they utter the term, it is apparent that for many ...

Avri Doria

2014-01-01T23:59:59.000Z

262

The CATI Project: Charging and Accounting Technology for the Internet  

E-Print Network [OSTI]

The CATI Project: Charging and Accounting Technology for the Internet Burkhard Stiller1, Torsten, Switzerland 1 E-Mail: [stiller | plattner]@tik.ee.ethz.ch, 2 E-Mail: [braun | mguenter]@iam.unibe.ch Abstract

Braun, Torsten

263

The Internet, children, and privacy: the case against parental monitoring  

Science Journals Connector (OSTI)

Raising children with access to the Internet is still a relatively new phenomenon. It ... childrens on-line communication exchanges, is not good. While there are reasons to think that...ethical inappropriateness

Kay Mathiesen

2013-12-01T23:59:59.000Z

264

Organization Culture Dimensions as Antecedents of Internet Technology Adoption  

Science Journals Connector (OSTI)

In recent years, growth of the Internet and the World Wide Web has had an impact on the way local, state, and national governments work. In this research, we examine the factors that influence adoption of Inte...

Subhasish Dasgupta; Babita Gupta

2013-01-01T23:59:59.000Z

265

An interoperable internet scale solution for RFID network security  

E-Print Network [OSTI]

Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for ...

Mao, Tingting

266

Towards More Efficient Delay Measurements on the Internet  

E-Print Network [OSTI]

the speed of experiments, improving the accuracy of measurement results, and reducing the amount of tra?c generated by the scan. Finally, we present architectures for performing an Internet scale measurement scan. We found that with custom drivers...

Webster, Patrick Jordan

2013-07-22T23:59:59.000Z

267

Population internet penetration rate and channel supply chain players' performances  

Science Journals Connector (OSTI)

With the rapid development of the internet, the population internet penetration rate plays a strategic importance in the dual-channel supply chain. In this research, we use a game-theoretic approach to examine the effect of the population internet penetration rate on the performances of the manufacturer and traditional retailer under the Stackelberg and Bertrand competitive models. Our results suggest that an increase in the population internet penetration rate always has a negative impact on the manufacturer and traditional retailer's profits. Furthermore, when the product is more suitable for the online market, the traditional retailer will be hurt more by the population internet penetration rate. For the manufacturer, although a larger product web fit can increase profits, the population internet penetration rate has a stronger impact on profitability, thus decreasing profits even as the product web fit increases. Our results also suggest that both the manufacturer and the retailer can adopt either of the Stackelberg and Bertrand competitive market structures in the dual-channel supply chain since their profits are unaffected by the two models. The managerial implications of our results are discussed and the probable paths of future research are identified.

Ruiliang Yan; John Wang; Sanjoy Ghose

2009-01-01T23:59:59.000Z

268

Policies and procedures to manage employee Internet abuse  

Science Journals Connector (OSTI)

Industry analysts estimate that billions of dollars in lost revenue were attributed to employee Internet abuse. Trends also suggest that lost job productivity and corporate liability have emerged as new workplace concerns due to growth of new online technologies and mobile computing. Such employee Internet misuse creates new management dilemmas on how to respond to incidences of such misuse as well poses network security risks and drains on network bandwidth. Within an organization, it is imperative to ensure that employees are using computing resources effectively and appropriately. Utilizing the previous literature in the field, this paper proposed a revised framework to manage employee Internet abuse. The former model proposed did not account for new digital media and recommended screening applicants for Internet addiction, using more of a clinical test than a job performance test. This new model describes both prevention and intervention methods to address incidents of online misuse in the workplace and refocuses hiring decisions into post-employment training. It also examines the new hiring concerns with the new iGeneration of college graduates and it examines how organizations should best utilize acceptable Internet use policies with clear methods of Internet monitoring to enforce that workers are complying with company policies. This paper also talks about the potential benefits of rehabilitation approaches to manage employees who abuse instead of terminating them to decrease job turnover and improve job retention. Implications for current management practices are also discussed.

Kimberly Young

2010-01-01T23:59:59.000Z

269

Money flows in the Internet ecosystem : strategic opportunities for telecom operators and other Internet agents in the digital age  

E-Print Network [OSTI]

The question about where the money goes is something really interesting for all the companies in the Internet ecosystem. While there is a huge interest, no clear answers have been provided, partially because the ecosystem ...

Valentin Vinagrero, Israel

2014-01-01T23:59:59.000Z

270

When sex, drugs, and violence enter the classroom: Conversations between adolescents and a female pedagogical agent  

Science Journals Connector (OSTI)

......Articles Special Issue: On the Abuse and Misuse of Social Agents...female agents suffer more abuse than male or gender neutral...anthropomorphism may motivate agent abuse. Another reason that users...characters may be because the Internet lowers human inhibitions (Hudson......

George Veletsianos; Cassandra Scharber; Aaron Doering

2008-05-01T23:59:59.000Z

271

AEO2011: Primary Natural Gas Flows Entering NGTDM Region from Neighboring  

Open Energy Info (EERE)

Primary Natural Gas Flows Entering NGTDM Region from Neighboring Primary Natural Gas Flows Entering NGTDM Region from Neighboring Regions Dataset Summary Description This dataset comes from the Energy Information Administration (EIA), and is part of the 2011 Annual Energy Outlook Report (AEO2011). This dataset is Table 138, and contains only the reference case. This dataset is in billion cubic feet per year. The data is broken down into New England, Middle Atlantic, East North Central, West Central, South Atlantic, East South Central, West South Central, Mountain, Pacific, Florida, Arizona/New Mexico, California. Source EIA Date Released April 26th, 2011 (3 years ago) Date Updated Unknown Keywords 2011 AEO EIS Natural Gas Data application/vnd.ms-excel icon AEO2011: Primary Natural Gas Flows Entering NGTDM Region from Neighboring Regions- Reference Case (xls, 60 KiB)

272

Lane Swimming Etiquette 1. All swimmers must shower before entering the pool.  

E-Print Network [OSTI]

Lane Swimming Etiquette 1. All swimmers must shower before entering the pool. 2. Swim hats must be worn. 3. Select a lane based on your ability and stroke/s you intend to swim during your visit. 4. While swimming, follow the directions of the arrows of your designated lane. 5. Clockwise lane-In order

O'Mahony, Donal E.

273

Lane Swimming Etiquette 1. All swimmers must shower before entering the pool.  

E-Print Network [OSTI]

Lane Swimming Etiquette 1. All swimmers must shower before entering the pool. 2. Swim hats must be worn. 3. Select a lane based on your ability and stroke/s you intend to swim during your visit. 4. While swimming, follow the directions of the arrows of your designated lane. 5. In order to pass

O'Mahony, Donal E.

274

OFFICE USE ONLY: Date Entered: App Rating: Complete Incomplete Documents Included  

E-Print Network [OSTI]

OFFICE USE ONLY: Date Entered: App Rating: Complete Incomplete Documents Included: Declaration/ Assessment APPLICATION INSTRUCTIONS: 1. All supporting documentation must be included with the application printed from BearTracks 2. Have you signed the Declaration and Consent form on the last page

MacMillan, Andrew

275

Classes Entering Fall 2009 and Fall 2010 Last Name: First Name: Middle Ini2al  

E-Print Network [OSTI]

Classes Entering Fall 2009 and Fall 2010 Last Name: First Name: Middle Ini2 ini2als for agreement: Date: From the courses listed in the tables above, iden2fy Wri2ng Advisor Approved Ini2als: Date: Probability & Sta2s2cs Final ECE Approval: Advanced

Afshari, Ehsan

276

ECOLOGY, EVOLUTION AND ENVIRONMENTAL BIOLOGY (for students entering Biology in Fall 2011 or later)  

E-Print Network [OSTI]

ECOLOGY, EVOLUTION AND ENVIRONMENTAL BIOLOGY (for students entering Biology in Fall 2011 or later course other than BIOL 54200 124 Total Credits BIOLOGY: 1. BIOL 12100 Biology I: Diversity, Ecology 28600 Intro. to Ecology and Evolution (2 cr.; spring) or BIOL 29500, Intro. to Evolution & Ecology (2 cr

Jiang, Wen

277

Latent Class Models in action: Bridging social capital & Internet usage  

Science Journals Connector (OSTI)

Abstract This paper explores how Latent Class Models (LCM) can be applied in social research, when the basic assumptions of regression models cannot be validated. We examine the usefulness of this method with data collected from a study on the relationship between bridging social capital and the Internet. Social capital is defined here as the resources that are potentially available in ones social ties. Bridging is a dimension of social capital, usually related to weak ties (acquaintances), and a source of instrumental resources such as information. The study surveyed a stratified random sample of 417 inhabitants of Lisbon, Portugal. We used LCM to create the variable bridging social capital, but also to estimate the relationship between bridging social capital and Internet usage when we encountered convergence problems with the logistic regression analysis. We conclude by showing a positive relationship between bridging and Internet usage, and by discussing the potential of LCM for social science research.

Barbara Barbosa Neves; Jaime R.S. Fonseca

2015-01-01T23:59:59.000Z

278

Internet-based calibration of a multifunction calibrator  

SciTech Connect (OSTI)

A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

2000-04-17T23:59:59.000Z

279

Value creation and the internet: entrepreneurial behaviour in Dutch SMEs  

Science Journals Connector (OSTI)

Although almost all Small- and Medium-sized Enterprises (SMEs) have adopted the internet and e-mail, only those entrepreneurs that realise how these innovations can be applied in their business are able to recognise opportunities to create value. Based on a sample of 614 Dutch SMEs, we examine what factors determine the recognition of such opportunities. Particularly, we argue that the use of the internet and e-mail has a positive relationship to organisational and strategic value creation; that organisational value creation precedes strategic value creation; and that entrepreneurs who are able to actually create strategic value and thus have actually recognised entrepreneurial opportunities from these technologies have higher levels of knowledge and experience, are more proactive networkers and have higher levels of entrepreneurial orientation. Our findings suggest that there are clear possibilities for SMEs to capitalise on adopting the internet and e-mail because all the associated factors can be enhanced through choices consciously made by the entrepreneurs.

Marijke Van Der Veen; Ingrid Wakkee

2009-01-01T23:59:59.000Z

280

CSP 550: Internet Programming Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and Paradigms, 2002.  

E-Print Network [OSTI]

CSP 550: Internet Programming Texts Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and SOAP 9 hours Total 45 hours Edited March 2006 (html, css checks) CSP 550: Internet Programming - CS

Heller, Barbara

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Internet-based Abuse Prevention Training www.PraesidiumInc.com  

E-Print Network [OSTI]

Internet-based Abuse Prevention Training www.PraesidiumInc.com Quick Start Guide Welcome to Armatus page, an orange arrow will appear. Click the orange arrow to move forward. Do not use your Internet

Subramanian, Venkat

282

Building trust over the Internet : design and prototyping of an advocacy website  

E-Print Network [OSTI]

The Internet has empowered consumers with information, options, and a simple mechanism for transaction. Although the Internet has not completely replaced traditional shopping methods, it has brought about a change in the ...

Ma, Sha, 1981-

2004-01-01T23:59:59.000Z

283

E-Print Network 3.0 - art internet database Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

internet database Search Powered by Explorit Topic List Advanced Search Sample search results for: art internet database Page: << < 1 2 3 4 5 > >> 1 This is a guide to finding...

284

Routing Approach in IPv6 Ubiquitous Internet-Based Home Automation Network  

Science Journals Connector (OSTI)

Internet-based home automation system allows home owners to monitor and control connected devices in the home using any Internet enabled device. The homes low power and low data rate, ... needs are catered for u...

Ardiansyah Musa Efendi; Oh Seung Kyo

2013-01-01T23:59:59.000Z

285

The Use of Internet and Intranet In American Convention and Visitors Bureaus  

Science Journals Connector (OSTI)

The emergence of the Internet/Intranet offers new promise to American Convention and ... extent of the various capabilities of the Internet/Intranet are used by CVBs to augment marketing ... directors have not re...

Y. Y. Yuan; D. R. Fesenmaier; L. Xia

1999-01-01T23:59:59.000Z

286

Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"  

E-Print Network [OSTI]

The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coalthe PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

Koomey, Jonathan G.

2008-01-01T23:59:59.000Z

287

E-Print Network 3.0 - arthritis-related internet web Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

related internet web Search Powered by Explorit Topic List Advanced Search Sample search results for: arthritis-related internet web Page: << < 1 2 3 4 5 > >> 1 COP 6930 Advanced...

288

Employee Use of the Internet and Acceptable Use Policies in the Academic Workplace: Controlling Abuse while Creating Culture.  

E-Print Network [OSTI]

?? The use of the Internet has grown substantially, especially since the late 1990s. Businesses are relying increasingly on the Internet and intranet as tools (more)

King, B.J.

2007-01-01T23:59:59.000Z

289

ARTIGO INTERNET IST estreia laboratrio de medicina regenerativa  

E-Print Network [OSTI]

ARTIGO INTERNET IST estreia laboratório de medicina regenerativa in http://www.boasnoticias.pt/ Data: 2011-9-20 Link: http://www.boasnoticias.pt/not ... IST estreia laboratório de medicina Células Estaminais e Medicina Regenerativa. O objetivo deste espaço vai centrar-se na investigação em

Instituto de Sistemas e Robotica

290

Reduction-based Security Analysis of Internet Routing Protocols  

E-Print Network [OSTI]

Reduction-based Security Analysis of Internet Routing Protocols Chen Chen, Limin Jia, Boon Thau Loo. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary proofs with automated analysis. We define several reduction steps to reduce proving route authenticity

Pennsylvania, University of

291

Towards Securing Interdomain Routing on the Internet Sharon Goldberg  

E-Print Network [OSTI]

up by the routing protocols. 1. We start with a game-theoretic analysis that shows that evenTowards Securing Interdomain Routing on the Internet Sharon Goldberg A Dissertation Presented economic goals. Despite these complex relationships, the interdomain routing system (that allows ASes

Singh, Jaswinder Pal

292

Roaming and investments in the mobile internet market  

Science Journals Connector (OSTI)

This model discusses mobile network operators' (MNOs) incentives to invest in their network facilities such as new 4G networks under various regimes of data roaming charge regulation. Given an induced externality of investments (spillovers) due to the ... Keywords: Investment spillover, Mobile internet, National roaming, Regulation

Torben StHmeier

2012-09-01T23:59:59.000Z

293

ENERGY MANAGEMENT REAL-TIME MULTI-TIER INTERNET SERVICES  

E-Print Network [OSTI]

ENERGY MANAGEMENT IN REAL-TIME MULTI-TIER INTERNET SERVICES A Dissertation Presented to the faculty This dissertation has been read and approved by the examining Committee: Kevin Skadron (Advisor) Sudhanva Gurumurthi and Applied Science: James H. Aylor (Dean) May 2008 #12;Abstract Energy management only recently emerged

Skadron, Kevin

294

Search Technology Internet Start-Ups Business Computing Companies  

E-Print Network [OSTI]

#12;Search Technology Internet Start-Ups Business Computing Companies Inside Technology Bits Blog engineer at Google, uses statistical analysis of data to help improve the company's search engine » Cellphones, Cameras, Computers and more Personal Tech » Advertise on NYTimes.com Search All NYTimes

Oyet, Alwell

295

Rocky K. C. Chang Internet Infrastructure and Security Group  

E-Print Network [OSTI]

10 July 2012 Measuring and Understanding Internet Performance: A Personal View #12;2 Graduate Forum, SunYat-sen University July 2012 #12;Measuring end-to-end performance Source:Akamai's network performance comparison3 Graduate Forum, SunYat-sen University July 2012 #12;Why measuring network path

Chang, Rocky Kow-Chuen

296

Energy Router: Architectures and Functionalities toward Energy Internet  

E-Print Network [OSTI]

, such as sunlight, wind, hydro, tide, geothermal, and waste [1]. Besides the utilization of renewable energyEnergy Router: Architectures and Functionalities toward Energy Internet Yi Xu, Jianhua Zhang, Wenye Wang, Avik Juneja, and Subhashish Bhattacharya Future Renewable Electric Energy Delivery and Management

Wang, Wenye

297

ARTIGO INTERNET PLUX vence Prmio "Biggest Innovation" em concurso  

E-Print Network [OSTI]

concorreram aos prémios "Biggest Innovation", "Greatest Social Value" e "Potential for Biggest Social ImpactNewsSearch ARTIGO INTERNET PLUX vence Prémio "Biggest Innovation" em concurso internacional in http://www.cienciapt.net Data: 2010-8-16 Link: http://www.cienciapt.net/pt/in ... PLUX vence Prémio "Biggest Innovation" em

Instituto de Sistemas e Robotica

298

Technology acceptance model for internet banking: an invariance analysis  

Science Journals Connector (OSTI)

The technology acceptance model (TAM) has been applied in different contexts to investigate a wide range of information technologies (IT), and a cumulative tradition has already been developed in this stream of research. Most TAM studies have been empirical ... Keywords: internet banking, invariance analysis, technology acceptance model

Vincent S. Lai; Honglei Li

2005-01-01T23:59:59.000Z

299

Acculturation to the global culture and internet adoption  

Science Journals Connector (OSTI)

Globalization is felt in most parts of the world and its effects on culture are becoming a topic of interest to society and in particular to the IS academic community. Our research addresses calls for research on the issue of globalization and its cultural ... Keywords: acculturation, dynamic view of culture, global culture, internet adoption, subjective norm, technology acceptance model, theory of reasoned action

Reem Ayouby; Anne-Marie Croteau; Louis Raymond

2012-11-01T23:59:59.000Z

300

Internet-Enabled Distributed Engineering (Web) Services , J. Cheng1  

E-Print Network [OSTI]

1 Internet-Enabled Distributed Engineering (Web) Services J. Peng1 , D. Liu1 , J. Cheng1 , C.S. Han in Civil Engineering. The web services model is becoming a popular approach for integrating software service approach is a promising paradigm for integrating large engineering software applications. Keywords

Stanford University

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

A dependability evaluation tool for the Internet of Things  

Science Journals Connector (OSTI)

The Internet of Things (IoT) is a promising networking paradigm which immerses objects (cell phones, goods, watches, sensing motes, TVs, etc.) in a worldwide connection. Despite its high degree of applicability, the IoT faces some challenges. One of ...

Ivanovitch Silva; Rafael Leandro; Daniel Macedo; Luiz Affonso Guedes

2013-10-01T23:59:59.000Z

302

Internet, a Political Issue for Europe (1970s-2010s)  

E-Print Network [OSTI]

Internet, a Political Issue for Europe (1970s-2010s) Draft paper The final version of this paper will be published in Bishop J. & Solo A.M.G, Politics and Policy in the Information Age, Springer, in 2013. Romain in Europe? How did the "network of networks" and ICTs become political stakes for EU institutions

Paris-Sud XI, Université de

303

ARTIGO INTERNET Professores visitam o maior reactor de Fuso Nuclear  

E-Print Network [OSTI]

ARTIGO INTERNET Professores visitam o maior reactor de Fusão Nuclear in http reactor de Fusão Nuclear Experiência aproxima investigação das futuras gerações Doze professores do ensino secundário visitaram o maior reactor de fusão nuclear da Terra (JET), no Reino Unido, na semana passada

Instituto de Sistemas e Robotica

304

Performance analysis and network path characterization for scalable internet streaming  

E-Print Network [OSTI]

Delivering high-quality of video to end users over the best-effort Internet is a challenging task since quality of streaming video is highly subject to network conditions. A fundamental issue in this area is how real-time applications cope...

Kang, Seong-Ryong

2008-10-10T23:59:59.000Z

305

SRP: a Scalable Resource Reservation Protocol for the Internet  

E-Print Network [OSTI]

SRP: a Scalable Resource Reservation Protocol for the Internet Werner Almesberger 1 , Tiziana (SRP) provides a light-weight reser- vation mechanism for adaptive multimedia applications. Our main these applications need in order to operate prop- erly. SRP aims to allow such applications to make a dependable

Almesberger, Werner

306

Information Commons Help Desk Internet / Connectivity Wireless Access  

E-Print Network [OSTI]

Information Commons Help Desk Internet / Connectivity » Wireless Access ID #1912 Connecting in the Username and Password fields.5. Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help on this entry Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help

Boonstra, Rudy

307

Triple Play Support for the Next Generation Internet Mario Baldi  

E-Print Network [OSTI]

opportunity to information providers or, at least, be economically self-sustainable. In other words, Internet of accessing any type of information: it must be a profitable business or, at least, economically self- sustainable. In order to achieve this objective, services people are willing to pay for must be offered over

Baldi, Mario

308

Using the Internet to Stay Informed about Energy  

E-Print Network [OSTI]

and Oil Contract Information ....................................... http://apollo.osti.gov/htrnUeia4st2a.htm1 GasWEB Home Page ...................................................................................... http://www.gasweb.orglgasweb ... in 1997. My INTERNET e-mail address is jnp@unicomp.net. ENERGY HOMEPAGES Government: .................................................... DOE EREN - Energy Efficiency http://www.eren.doe.gov...

Phillips, J.

1996-01-01T23:59:59.000Z

309

ATLAS2000 Atlases of the Future in Internet M. Friedrich  

E-Print Network [OSTI]

ATLAS2000 ­ Atlases of the Future in Internet M. Friedrich (mafri@ipg.uni-freiburg.de) M. Melle the ecological system earth. Until recently the traditional atlas has been the pri- mary tool for collection and dissemination of geographical knowledge about the earth. To advance to concepts of the atlas it is necessary

Reiterer, Harald

310

ANALYSIS OF INTERNET TOPOLOGY DATA Hao (Johnson) Chen  

E-Print Network [OSTI]

ANALYSIS OF INTERNET TOPOLOGY DATA by Hao (Johnson) Chen B.E. in Computer Science, Shen Zhen OF SCIENCE In the School of Computing Science © Hao (Johnson) Chen 2004 SIMON FRASER UNIVERSITY April 2004, without permission of the author. #12;Approval Name: Hao (Johnson) Chen Degree: Master of Science Title

Trajkovic, Ljiljana

311

Has the ice man arrived? Tact on the Internet  

E-Print Network [OSTI]

Has the ice man arrived? Tact on the Internet Jonathan Grudin, UC Irvine and Microsoft Research. Eugene O'Neill's play The Ice Man Cometh outlines a series of calamities that occur when his characters the graded corrections via e- mail. The students produced a counter- proposal: After grading an exercise

Hearst, Marti

312

The Internet-What's Really in it for Teachers  

Science Journals Connector (OSTI)

......the filing system idea into an Intranet. An Intranet is simply a kind of internal...system but using all the same technologies as the Internet. No access...stuff again, but here with an Intranet system we have a genuine opportunity......

BRYAN DYE

1998-06-01T23:59:59.000Z

313

A comparison of the Internet multicast routing protocols  

Science Journals Connector (OSTI)

The exploding Internet has brought many novel network applications. These include teleconferencing, interactive games, the voice/video phone, real-time multimedia playing, distributed computing, web casting, and so on. One of the specific characteristics ... Keywords: Datagrams, Delivery tree, Multicasting routing protocols

Jhyda Lin; Ruay-Shiung Chang

1999-01-01T23:59:59.000Z

314

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network [OSTI]

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

315

Review of Internet Service Providers and Peering Matthew Renzelmann  

E-Print Network [OSTI]

Review of Internet Service Providers and Peering Matthew Renzelmann February 11, 2007 1 Introduction This paper discusses the issues that lead ISPs to con- sider peering or transit arrangements with one an- other. Norton considers the technical reasons for peering as well as the financial

Akella, Aditya

316

PROVISIONING AND ANALYSIS OF APPLICATION-SPECIFIC INTERNET MEASUREMENTS  

E-Print Network [OSTI]

S metrics need to be sampled with strict periodicity for accurate network weather forecasting. To addressS) metrics (e.g., delay and loss) and estimation techniques such as forecasting for initial selection, measurement scheduling techniques are presented that provision QoS metrics on the Internet with the accuracy

Calyam, Prasad

317

The GIS Manual 1 The Integration of Internet GIS  

E-Print Network [OSTI]

The GIS Manual 1 CHAPTER 48 The Integration of Internet GIS and Wireless Mobile GIS Ming, centralized GIS architecture, to an open, distributed geographic information services (GIServices) framework. With advances in computer networking and wireless communication technology, GIS is moving toward an integration

Tsou, Ming-Hsiang

318

Herding cats: modelling Quality of Service for Internet applications  

Science Journals Connector (OSTI)

...Quality of Service; performance engineering 1. Introduction In this paper...erent rates. For exam- ple, audio, video, gaming and data applications...the meantime, the Internet Engineering Task Force continues to build...quality of real-time multimedia audio and video. Poster presented...

2000-01-01T23:59:59.000Z

319

Turbo King: Framework for Large-Scale Internet Delay Measurements  

E-Print Network [OSTI]

servers (which is called cache pollution) and requires large traffic overhead when deployed in large consuming half the bandwidth needed by King and reducing the impact of cache pollution by several orders building an all-to-all delay matrix between approximately 220, 000 BGP prefixes advertised in the Internet

Loguinov, Dmitri

320

Energy Internet -- Towards Smart Grid 2.0  

Science Journals Connector (OSTI)

Price rising of energy and the limitation of fossil fuel makes it an inevitable tendency to introduce distributed energy such as renewable energy to the existing supply system in the future. Different players, such as power generation, transmission, ... Keywords: energy internet, smart grid, energy router, distributed generation

Junwei Cao, Mingbo Yang

2013-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Multiphoton Laser Processing: A Unique and Simple Way to Enter the  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiphoton Laser Processing: A Unique and Simple Way to Enter the Multiphoton Laser Processing: A Unique and Simple Way to Enter the Nano-Platform Speaker(s): Andreas Ostendorf Date: January 27, 2006 - 12:00pm Location: Bldg. 90 Multiphoton laser processing is one of the rapidly advancing laser technologies, providing unique possibilities for the fabrication of two- and three-dimensional microstructures. Multiphoton material processing has very important advantages over processes based on single photon absorption: an increased spatial resolution and the possibility of photofabrication inside transparent materials. Due to nonlinear nature of multiphoton processing, applications of ultrashort laser systems allow one to overcome the diffraction limit and to produce high quality 3D microstructures with a sub-wavelength resolution. This is very powerful

322

Course Registration Schedule Fall 2014 http://www.dartmouth.edu/~reg/guides/csel/csel_student_entering.html  

E-Print Network [OSTI]

. Step 6: Submit Changes Step 2: Select the appropriate term Step 3: Search for Courses using the CourseCourse Registration Schedule Fall 2014 http://www.dartmouth.edu/~reg/guides/csel/csel_student_entering.html Course Registration Quick Reference Guide: Entering Students Visual Guide Step 1: Access Banner

Shepherd, Simon

323

Five Deaths Resulting from Abuse of Dextromethorphan Sold Over the Internet  

Science Journals Connector (OSTI)

......obtained from the same internet supplier in each...dextromethorphan abuse and toxicity. The...Fatal Outcome Humans Internet Male Marketing legislation...Substance-Related Disorders blood Young Adult 99 Dextromethorphan...obtained from the same internet supplier in each...dextromethorphan abuse and toxicity. The......

Barry K. Logan; Gary Goldfogel; Rebecca Hamilton; James Kuhlman

2009-03-01T23:59:59.000Z

324

Addressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet  

E-Print Network [OSTI]

. In the face of potential abuse or other malice, it seems clear that future Internet designs need to addressAddressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet David jtw@lcs.mit.edu Ted Faber USC ISI faber@isi.edu ABSTRACT A system as complex as the Internet can only

Faber, Ted

325

OurStory: Exploring the Sky From the Internet to Outer Space  

E-Print Network [OSTI]

OurStory: Exploring the Sky From the Internet to Outer Space Read the "Directions" sheets for step Guide, page 1 of 2 #12;OurStory: Exploring the Sky From the Internet to Outer Space Parent Guide, page 2 (attached) Computer with Internet access Pen or pencil More information at http

Mathis, Wayne N.

326

OPPORTUNITIES FOR COMPUTERAIDED INSTRUCTION IN PHONETICS AND SPEECH COMMUNICATION PROVIDED BY THE INTERNET  

E-Print Network [OSTI]

BY THE INTERNET M. Huckvale 1 , C. Benoit 2 , C. Bowerman 3 , A. Eriksson 4 , M. Rosner 5 , M. Tatham 6 , B. Williams 7 Computer Aided Learning and Use of the Internet Working Group SOCRATES Thematic Network available on the Internet could be exploited in the education of phonetics and speech communication

Edinburgh, University of

327

ELISA: European Linkage between Internet Integrated and Differentiated Services over ATM  

E-Print Network [OSTI]

Internet does not guarantee Quality of Service for user flows, which prevents the provision of good qualityELISA: European Linkage between Internet Integrated and Differentiated Services over ATM T. V. Do-Fokus Abstract Nowadays we are witnessing the growth of Internet at an unprecedented rate. However, the current

328

Internet Evolution and Social Impact Sara Kiesler, Robert Kraut, Jonathon Cummings, Bonka Boneva,  

E-Print Network [OSTI]

that many people, especially those with good social resources, have integrated the Internet--they become instantly popular. If communication is so important to Internet users, there is good reasonChapter xx Internet Evolution and Social Impact Sara Kiesler, Robert Kraut, Jonathon Cummings

329

ETH TIK-NR. 118, JULY 2001 1 A Spectral Analysis of the Internet Topology  

E-Print Network [OSTI]

. Finally, a good understanding of the Internet topology can lead to improvements in network topologyETH TIK-NR. 118, JULY 2001 1 A Spectral Analysis of the Internet Topology Danica Vukadinovi´c, Polly Huang, Thomas Erlebach Abstract-- In this paper we investigate properties of the Internet topology

Huang, Polly

330

The Extensive Challenges of Internet Application Measurement Martin Arlitt Carey Williamson  

E-Print Network [OSTI]

interested in learning more about Internet measurement, the book by Crovella and Krishnamurthy [1] is a goodThe Extensive Challenges of Internet Application Measurement Martin Arlitt Carey Williamson The Internet has grown dramatically and evolved significantly over the past 10 years. While this growth

Williamson, Carey

331

Internet Time Synchronization: the Network Time Protocol 1,2,3 David L. Mills  

E-Print Network [OSTI]

the Internet backbone networks and gateways are carefully engineered for good service, op­ erating speedsInternet Time Synchronization: the Network Time Protocol 1,2,3 David L. Mills Electrical), which is designed to distribute time information in a large, diverse internet system operating at speeds

Mills, David L.

332

Studying Black Holes in the Internet with Hubble Ethan Katz-Bassett  

E-Print Network [OSTI]

as a top priority in the original design of the Internet protocols, ahead of high perfor- mance or goodStudying Black Holes in the Internet with Hubble Ethan Katz-Bassett Harsha V. Madhyastha John P that operates contin- uously to find Internet reachability problems in which routes exist to a destination

Anderson, Richard

333

A framework for flowbased accounting on the Internet HansWerner Braun  

E-Print Network [OSTI]

for accounting in the Internet reflects its historical status as bulk­funded good for the academic communityA framework for flow­based accounting on the Internet Hans­Werner Braun hwb@sdsc.edu San Diego describe steps toward an accounting mechanism to attribute Internet resource consumption based on service

Polyzos, George C.

334

Sales Taxes on the Internet: When and How to Tax? Ozlem Uzuner Lee McKnight  

E-Print Network [OSTI]

, the Internet are considered. This paper discusses sales and use taxes for electronic services and goodsSales Taxes on the Internet: When and How to Tax? Ozlem Uzuner Lee McKnight Massachusetts Institute As a first attempt to tax electronic commerce, many countries applied the existing tax laws to Internet

Uzuner, ?zlem

335

OPPORTUNITIES FOR COMPUTER-AIDED INSTRUCTION IN PHONETICS AND SPEECH COMMUNICATION PROVIDED BY THE INTERNET  

E-Print Network [OSTI]

BY THE INTERNET M. Huckvale1 , C. Benoit2 , C. Bowerman3 , A. Eriksson4 , M. Rosner5 , M. Tatham6 , B. Williams7 Computer Aided Learning and Use of the Internet Working Group SOCRATES Thematic Network in Phonetics of teaching and learning. This paper investigates how resources currently available on the Internet could

Edinburgh, University of

336

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills  

E-Print Network [OSTI]

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills Electrical Engineering is designed to distribute time information in a large, diverse internet system operating at speeds from and resulted in the designation of NTP as an Internet Standard protocol. The NTP synchronization system, which

Mills, David L.

337

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control  

E-Print Network [OSTI]

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control Lars Rasmusson present the idea to let agents handle security issues in Internet markets. The motivation for this is the difficulties in having external or centralized control over a system as open as the Internet. The agents use

338

Measuring the Cost of Scalability and Reliability for Internet-based, server-centered applications  

E-Print Network [OSTI]

1 Measuring the Cost of Scalability and Reliability for Internet-based, server- centered, a centralized approach to Internet-based application development is not scalable and also not dependable. This paper presents a decentralized approach to dependable Internet based application development, consisting

Newcastle upon Tyne, University of

339

Endpoint-Based Routing Strategies for Improving Internet Performance and Resilience  

E-Print Network [OSTI]

to guarantee good end-to-end performance in the future Internet. We believe that the contributionsEndpoint-Based Routing Strategies for Improving Internet Performance and Resilience Aditya Akella, of any sponsoring institution, the U.S. government or any other entity. #12;Keywords: Internet routing

340

Sustaining the Internet with hyperbolic mapping Marian Bogu~na,1  

E-Print Network [OSTI]

. INTRODUCTION In the Information Age, the Internet is becoming a de facto public good, akin to roads, airportsSustaining the Internet with hyperbolic mapping Mari´an Bogu~n´a,1 Fragkiskos Papadopoulos,2, Kallipoleos 75, Nicosia 1678, Cyprus 3 Cooperative Association for Internet Data Analysis (CAIDA), University

California at San Diego, University of

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd,  

E-Print Network [OSTI]

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd, with contributions Introduction This note contains a discussion about formulating the research problem for Internet research the implications of these assumptions in formulating problems in Internet re- search. This process would aim

Floyd, Sally

342

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd,  

E-Print Network [OSTI]

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd, with contributions Introduction This note contains a discussion about formulating the research problem for Internet research the implications of these assumptions in formulating problems in Internet re­ search. This process would aim

Floyd, Sally

343

Internet Size Measurements Edoardo Biagioni, Peter Hinely, Chun Liu, Xinmin Wang  

E-Print Network [OSTI]

Internet Size Measurements Edoardo Biagioni, Peter Hinely, Chun Liu, Xinmin Wang January 2000 and the performance of the Internet. Our measurements and techniques are designed to reveal the number of hosts 2000, on the order of 23 million hosts are connected to the Internet. The mean distance from our

Biagioni, Edoardo S.

344

Measurement and Interpretation of Voice Traffic on the Internet N. F. Maxemchuk S. Lo  

E-Print Network [OSTI]

Measurement and Interpretation of Voice Traffic on the Internet N. F. Maxemchuk S. Lo AT&T Labs ­ Research Lucent Tech. ­ Bell labs ABSTRACT The Internet is being used to carry voice conversations describe the results of a set of measurements on intrastate, cross country, and international Internet

Maxemchuk, Nicholas F.

345

The Workshop on Active Internet Measurements (AIMS) kc@caida.org  

E-Print Network [OSTI]

The Workshop on Active Internet Measurements (AIMS) Report kc claffy CAIDA kc@caida.org Marina Internet is a perpetually challenging task for technical, economic and policy reasons, which leaves empirical grounding. On February 12-13, 2009, CAIDA hosted the Workshop on Ac- tive Internet Measurements

California at San Diego, University of

346

EndpointBased Routing Strategies for Improving Internet Performance and Resilience  

E-Print Network [OSTI]

to guarantee good end­to­end performance in the future Internet. We believe that the contributionsEndpoint­Based Routing Strategies for Improving Internet Performance and Resilience Aditya Akella, of any sponsoring institution, the U.S. government or any other entity. #12; Keywords: Internet routing

Akella, Aditya

347

Mapping the reasons for resistance to Internet banking: A means-end approach  

Science Journals Connector (OSTI)

Although Internet banking has been widely adopted in developed countries, there is still a group of customers resisting the services. In other words, Internet banking, although proven to be a successful innovation, has still not become adopted by the ... Keywords: ATM, Banking, Consumer behaviour, Innovation resistance, Internet

Tuire Kuisma; Tommi Laukkanen; Mika Hiltunen

2007-04-01T23:59:59.000Z

348

Communication strategies to overcome functional and psychological resistance to Internet banking  

Science Journals Connector (OSTI)

This paper aims to investigate how customers experiencing different kinds of resistance to Internet banking perceive the information and guidance offered by the service provider. A postal survey was conducted and 251 effective responses from Internet ... Keywords: Adoption, Banking, Consumer behavior, Internet, Resistance

Tommi Laukkanen; Suvi Sinkkonen; Pekka Laukkanen

2009-04-01T23:59:59.000Z

349

Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users  

Science Journals Connector (OSTI)

An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping efforts have derived the network structure, at the level of interconnected autonomous ... Keywords: as-level topology, bgp, internet measurement, traceroute

Kai Chen; David R. Choffnes; Rahul Potharaju; Yan Chen; Fabian E. Bustamante; Dan Pei; Yao Zhao

2009-12-01T23:59:59.000Z

350

Business Models for Monetizing Internet Applications and Web Sites: Experience, Theory, and Predictions  

Science Journals Connector (OSTI)

Almost all attempts to date to monetize Internet applications targeted at individuals have focused on natural extensions of traditional media or traditional retailing. Most are either some form of consumer-focused advertising or of consumer-focused e-commerce. ... Keywords: Business Models For The Internet, Future Of Online Advertising, Monetizing The Internet, Strategic Information Systems

Eric Clemons

2009-09-01T23:59:59.000Z

351

File:03HIFPermitToCrossOrEnterTheStateEnergyCorridor.pdf | Open Energy  

Open Energy Info (EERE)

HIFPermitToCrossOrEnterTheStateEnergyCorridor.pdf HIFPermitToCrossOrEnterTheStateEnergyCorridor.pdf Jump to: navigation, search File File history File usage Metadata File:03HIFPermitToCrossOrEnterTheStateEnergyCorridor.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 31 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:14, 29 March 2013 Thumbnail for version as of 14:14, 29 March 2013 1,275 × 1,650 (31 KB) Alevine (Talk | contribs) 12:47, 23 October 2012 Thumbnail for version as of 12:47, 23 October 2012 1,275 × 1,650 (44 KB) Dklein2012 (Talk | contribs) 12:40, 23 October 2012 Thumbnail for version as of 12:40, 23 October 2012 1,275 × 1,650 (44 KB) Dklein2012 (Talk | contribs)

352

Flow and Telepresence contributing to Internet Abuse: Differences according to Gender and Age  

Science Journals Connector (OSTI)

Abstract Flow describes immersive tendencies to Internet activities, and Telepresence defines the level one is absorbed in his virtual environment. The aim of this study was twofold: (a) to test whether and how Flow and Telepresence may contribute to Internet Abuse and (b) to examine group differences in Internet Abuse, Flow and Telepresence according to gender and age among adolescents. The sample consisted of 1609 adolescents, with a mean age of 16years old. Internet Abuse was assessed with the Internet Addiction Test (Young, 1998), Flow with the Flow Questionnaire (Chen, Wigand, & Nilan, 1999) and Telepresence with the Presence II questionnaire (Witmer & Singer, 1998). Findings revealed that Flow and Telepresence were related with Internet Abuse with Telepresence positively moderating the effect of Flow. Considering group differences, males were at higher risk of Internet Abuse and were more likely to experience Flow and Telepresence, while older adolescents scored higher only in Telepresence.

Vasilis Stavropoulos; Kyriaki Alexandraki; Frosso Motti-Stefanidi

2013-01-01T23:59:59.000Z

353

Explaining investors' reaction to internet security breach using deterrence theory  

Science Journals Connector (OSTI)

This study uses the deterrence theory to explain investors' behaviour towards the announcement of internet security breaches in the public media. Using the event study methodology, we compute the abnormal returns over a three day window. We then use decision tree induction to investigate how firm type and time affect the likelihood that an attack would lead to abnormal returns. The results reveal that investors are more likely to react negatively to announcements involving internet firms. In addition, investors are more likely to react negatively to more recent attacks. We argue that managers, especially in Net firms, should develop effective mechanisms to address security breach since investors interpret a security breach as management's failure to deter computer abusers from violating organisational security policies and controls. From a theoretical perspective, we demonstrate that event study research can use theory to explain investor's behaviour towards announcement of events in the public media.

Francis Kofi Andoh-Baidoo

2013-01-01T23:59:59.000Z

354

Chemistry on the Internet:? The Library on Your Computer  

Science Journals Connector (OSTI)

Hope is on the horizon, and the authors of Weaving a Better Web paint a picture of the Web at the end of the millennium that uses open standards with DHTML, style sheets, a document object model, and XML in conjunction with HTML 4.0 to solve the problems commonly experienced with HTML today. ... 37 Using robots to prowl the Internet and bring back for indexing huge volumes of information, the Internet search engines have given users both enormous delight at the wealth of information available and great frustration at their relative lack of ability to fine-tune a search. ... 41 All pages manually submitted to AltaVista as well as pages brought back that day by Digital's robot, Scooter, are indexed each day and added to the database. ...

Gary Wiggins

1998-10-22T23:59:59.000Z

355

Stratgie internet et pilotage de projets d'entreprise  

E-Print Network [OSTI]

;2 Stratégie internet et pilotage de projets d'entreprise UFR Sciences et Technologies PR?SENTATION Objectifs à l'intersection des technologies de l'information et de la communication, de la conduite de projet mesure de conduire et de réaliser l'ingénierie et l'intégration des plates formes Intranet, dont la

Sart, Remi

356

The Superposition Principle in Quantum Mechanics - did the rock enter the foundation surreptitiously?  

E-Print Network [OSTI]

The superposition principle forms the very backbone of quantum theory. The resulting linear structure of quantum theory is structurally so rigid that tampering with it may have serious, seemingly unphysical, consequences. This principle has been succesful at even the highest available accelerator energies. Is this aspect of quantum theory forever then? The present work is an attempt to understand the attitude of the founding fathers, particularly of Bohr and Dirac, towards this principle. The Heisenberg matrix mechanics on the one hand, and the Schrodinger wave mechanics on the other, are critically examined to shed light as to how this principle entered the very foundations of quantum theory.

N. D. Hari Dass

2013-11-18T23:59:59.000Z

357

The Superposition Principle in Quantum Mechanics - did the rock enter the foundation surreptitiously?  

E-Print Network [OSTI]

The superposition principle forms the very backbone of quantum theory. The resulting linear structure of quantum theory is structurally so rigid that tampering with it may have serious, seemingly unphysical, consequences. This principle has been succesful at even the highest available accelerator energies. Is this aspect of quantum theory forever then? The present work is an attempt to understand the attitude of the founding fathers, particularly of Bohr and Dirac, towards this principle. The Heisenberg matrix mechanics on the one hand, and the Schrodinger wave mechanics on the other, are critically examined to shed light as to how this principle entered the very foundations of quantum theory.

Dass, N D Hari

2013-01-01T23:59:59.000Z

358

Transistor-based filter for inhibiting load noise from entering a power supply  

DOE Patents [OSTI]

A transistor-based filter for inhibiting load noise from entering a power supply is disclosed. The filter includes a first transistor having an emitter coupled to a power supply, a collector coupled to a load, and a base. The filter also includes a first capacitor coupled between the base of the first transistor and a ground terminal. The filter further includes an impedance coupled between the base and a node between the collector and the load, or a second transistor and second capacitor. The impedance can be a resistor or an inductor.

Taubman, Matthew S

2013-07-02T23:59:59.000Z

359

A Comparison of Education, Business, and Engineering Undergraduate Students Internet Use and their Experience, Confidence, and Competence in Using New Literacies of the Internet  

E-Print Network [OSTI]

, and engineering majors .............................................................................. 24 3.2 Number and percent of education students? majors ................................... 25 3.3 Number and percent of business students? majors... ............................................................. 33 4.1 Number and percent of underclassmen?s high school-related Internet use: Overall frequency of Internet use .............................................................. 35 4.2 Number and percent of underclassmen...

Kim, Su Yeon

2011-08-08T23:59:59.000Z

360

To appear in Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, August 2013. Internet Censorship in Iran: A First Look  

E-Print Network [OSTI]

, August 2013. Internet Censorship in Iran: A First Look Simurgh Aryan Aryan Censorship Project aryan censorship in Iran based on network measurements conducted from a major Iranian ISP during the lead up Introduction Iran is known as one of the leading suppressors of Internet freedom. Reporters Without Borders

Eustice, Ryan

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

The development of a diagnostic instrument to investigate entering competency levels of students in university introductory biology  

E-Print Network [OSTI]

THE DEVELOPMENT OF A DIAGNOSTIC INSTRUMENT TO INVESTIGATE ENTERING CONiPETENCY LEVELS OF STUDENTS IN UNIVERSITY INTRODUCTORY BIOLOGY A Thesis by Russell Douglas Souchek Submitted to the Graduate College of Texas A&M University in partial... fulfillment of the reauirement for the degree of MASTER OF SCIENCE August 1978 Major Subject: Educational Curriculum and Instruction THE DEVELOPMENT OF A DIAGNOSTIC INSTRUMENT TO INVESTIGATE ENTERING COMPETENCY LEVELS OF STUDENTS IN UNIVERSITY...

Souchek, Russell Douglas

2012-06-07T23:59:59.000Z

362

To enter the Blue Bottle Photo Competition, applicants must follow these rules: 1) There can only be one submission per resident.  

E-Print Network [OSTI]

To enter the Blue Bottle Photo Competition, applicants must follow these rules: 1) There can only be one submission per resident. 2) Only residents may enter this competition. 3) Photos are entered into the competition by posting them on the wall of the Positive Impact Facebook page. 4) Photo posting opens at 12

Ferrara, Katherine W.

363

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

364

The impact of buyer perceptions and situational factors on internet usage  

Science Journals Connector (OSTI)

The internet is rapidly gaining prominence in business-to-business marketing. As a result, there is a strong need to understand the role that it plays in inter-firm relationships. This paper addresses this issue by examining internet usage from the perspective of industrial buyers. We draw upon conceptual material, as well as a survey of 100 industrial buyers, to examine factors that may affect a buyer's likelihood of using the internet. The findings suggest that an industrial buyer's likelihood of using the internet is affected by the buyer's perceptions of value and trust, as well as situational factors such as product type, decision stage, and the buyer's overall internet experience. These findings have implications for how industrial marketers design their websites and integrate their internet strategies with their more traditional marketing programmes.

Thomas Tellefsen; Alan Zimmerman

2004-01-01T23:59:59.000Z

365

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

366

APPLICATION OF INTERNET GIS TOOLS FOR HERITAGE MANAGEMENT: ARKAS CASE STUDY  

E-Print Network [OSTI]

open society. It has to constantly renew and modernize its informational infrastructure : Romania (2006)" #12;Application of internet GIS tools for heritage management: ARKAS case study 1

367

Und die Gtter landen immer wieder... : Zukunftsprognostik in neureligisen UFO-Bewegungen im Medium Internet.  

E-Print Network [OSTI]

??Das Medienverbundsystem Internet ist ein eigenstndiges Feld variantenreicher religiser Darstellungen geworden. Neben diversen Websites vieler grerer religisen Gemeinschaften findet sich zustzlich eine beachtliche Zahl verschiedenster (more)

Meier, Gernot

2003-01-01T23:59:59.000Z

368

Examining a technology acceptance model of internet usage by academics within Thai business schools.  

E-Print Network [OSTI]

??Information Technology has been a significant research area for some time, but its nature has changed considerably since the Internet became prominent just over a (more)

Kripanont, Napaporn

2007-01-01T23:59:59.000Z

369

Distribution of personality, individual characteristics and internet usage in Swedish older adults.  

E-Print Network [OSTI]

??Objectives: This paper investigated factors associated with internet usage in the Swedish older adults ranging in age from 60 to 96. Personality traits and individual (more)

Berner, Jessica; Rennemark, Mikael; Jogrus, Claes

2012-01-01T23:59:59.000Z

370

Network effects, economic efficiency, and usage-based pricing for internet access.  

E-Print Network [OSTI]

??This paper attempts to shed some light on the issue of net neutrality by examining the extent to which Internet usage is efficiently allocated under (more)

Cooper, Matthew L.

2011-01-01T23:59:59.000Z

371

Customer behaviour towards internet banking: a study of the dormant users of Saudi Arabia .  

E-Print Network [OSTI]

??Technology acceptance, especially internet banking acceptance has become a vital issue in the business world today. A number of studies agree on the importance of (more)

AlMohaimmeed, Bader M

2012-01-01T23:59:59.000Z

372

The use of the internet among EFL teachers at the Colleges of Technology in Saudi Arabia.  

E-Print Network [OSTI]

??Because of its far reaching impact on many aspects and functions of educational institutions and its potential benefits for educators, the Internet has been the (more)

Al-Asmari, Ali M.

2005-01-01T23:59:59.000Z

373

1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2004  

E-Print Network [OSTI]

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

Kocur, George

374

DEPART.MENT OF ENERGY EE RE PROJECT MANAG EMENT C ENTER NEPA DETERMINATION  

Broader source: Energy.gov (indexed) [DOE]

Tamarac Tamarac u.s. DEPART.MENT OF ENERGY EE RE PROJECT MANAG EMENT C ENTER NEPA DETERMINATION PROJECT TITLE: Solar Panel and Induction lighting Project Page 1 of2 STATE:FL Funding Opportuoity Announcement Number Procurement Instrument Number NEPA Control Number CID Number FY 2010 COP GFO-OOO3187-OO1 0 Based on my review ofthe information concerning the proposed adion, as NEPA Compliance Offi<:er (authorized under DOE Ordu451.1A),1 have made the following determination: ex, EA, EIS APPENDIX AND NUMBER: Description: 85.1 Actions to conselVe energy, demonstrate potential energy conselVation, and promote energy-efficiency that do not increase the indoor concentrations of potentially harmful substances. These actions may involve financial and technical

375

u.s. DEPARTMENT OF ENFRGY !'ERE PROJECT MANAGEME:-.JT C ENTER  

Broader source: Energy.gov (indexed) [DOE]

ENFRGY ENFRGY !'ERE PROJECT MANAGEME:-.JT C ENTER NFPA DETERMINATION RECIPIENT:Vermonl Sustainable Jobs Fund PROJECT TITLE: Vermont Biofuels Initiative: Carbon Harvest 2 Page 1 of2 STATE: VT Funding Opportunity Announcement Number Procurement Instrument Numbu NEPA Control Number CID Number DE-FG36-08G088182 GFO-G088182-024 G088182 Based on my re"lew orlhe information concerning the proposed action, as NEPA Compliance Officer (authorized under DOE Order 451.11\),1 han made the following determination: ex, F.A, EIS APPENDIX AND NUMBER: Description: 83.6 Siting. construction (or modification). operation, and decommissioning of facilities for indoor bench-scale research projects and convenlionallaboratory operations (for example, preparation of chemical standards and sample analysis);

376

Though the interface to the World Wide Web is fairly user friendly and straightforward, the inner workings of the Internet are quite complicated. This  

E-Print Network [OSTI]

workings of the Internet are quite complicated. This complexity exists on two levels: 1) the Internet as an entity unto itself, and 2) the Internet as an interacting ecosystem of networks. This paper explores the complexities of the Internet, providing insight into how and why the Internet works as well as it does, while

Scarano, Vittorio

377

Spatial Dispersion of Peering Clusters in the European Internet  

E-Print Network [OSTI]

section by analyzing the determinants of bilateral peering decisions. Finally, section 5 concludes. 2 Agglomeration in the Internet In one of the earliest contributions of the renewed debate on the geographical agglomeration of economic activity Krugman... .0136 Paris, France -0.03448 0.00762 0.23892 random RONIX -0.22 Bucharest, Romania -0.05 0.00881 -1.8113 dispersed TIX -0.0267 Zurich, Switzerland -0.02222 0.00157 -0.1141 random TOPIX -0.077 Torino, Italy -0.09091 0.00894 0.1466 random VIX 0.07147 Vienna...

D'Ignazio, Alessio; Giovannetti, Emanuele

2006-03-14T23:59:59.000Z

378

Communications of the Association for Information Systems (Volume 15, 2005)371-392 371 Global Diffusion of the Internet VI: The Internet in Togo by A. Bernstein and S. Goodman  

E-Print Network [OSTI]

Georgia Institute of Technology ABSTRACT The Global Diffusion of the Internet (GDI) framework is used companies to utilize Togo Telecom's network. Keywords: Internet diffusion, Togo, ISP, Togo Telecom, GDI

Bieber, Michael

379

Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and  

E-Print Network [OSTI]

Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications, August 29, 2004 Abstract. With telecommunications in a slump, the search is on for ways to re telecommunications for introduction of di#eren­ tiated services and sophisticated charging methods on the Internet

Odlyzko, Andrew M.

380

Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and  

E-Print Network [OSTI]

Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications, August 29, 2004 Abstract. With telecommunications in a slump, the search is on for ways to re telecommunications for introduction of differen- tiated services and sophisticated charging methods on the Internet

Odlyzko, Andrew M.

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Internet Mathematics Vol. 6, No. 3: 255256 Special Issue on Algorithms and  

E-Print Network [OSTI]

Internet Mathematics Vol. 6, No. 3: 255­256 Special Issue on Algorithms and Models for the Web of Internet Mathematics is dedicated to the 6th International Workshop on Algorithms and Models for the Web-the-art achievements in the analysis of the World Wide Web and online social networking sites where the notion

Boucherie, Richard J.

382

A model of the spread of randomly scanning Internet worms that saturate access links  

Science Journals Connector (OSTI)

We present a simple, deterministic mathematical model for the spread of randomly scanning and bandwidth-saturating Internet worms. Such worms include Slammer and Witty, both of which spread extremely rapidly. Our model, consisting of coupled Kermack-McKendrick ... Keywords: Internet worms, communications/computer networking, epidemiology, modeling

George Kesidis; Ihab Hamadeh; Youngmi Jin; Soranun Jiwasurat; Milan Vojnovi?

2008-04-01T23:59:59.000Z

383

15 17 June 2011, T-Labs Berlin Germany Innovative Internet  

E-Print Network [OSTI]

15 ­ 17 June 2011, T-Labs Berlin Germany Innovative Internet Community Systems Welcome to the 11th Berlin/Germany, 15 ­ 17 June 2011 OrgTeam Deutsche Telekom Laboratories & Technische Universität Berlin #12;15 ­ 17 June 2011, T-Labs Berlin Germany Innovative Internet Community Systems Opening Session I2

Rossak, Wilhelm R.

384

Internet Iso-bar: A Scalable Overlay Distance Monitoring Yan Chen, and Randy H. Katz  

E-Print Network [OSTI]

]. Internet Iso-bar is easy to implement and use, and has good scalability and small communicationInternet Iso-bar: A Scalable Overlay Distance Monitoring System Yan Chen, and Randy H. Katz-to-peer overlay routing and location. However, there is a lack of such scalable system with small over- head, good

Chen, Yan

385

The Driving Internal Beliefs of Household Internet Adoption among Jordanians and the Role of Cultural Values  

Science Journals Connector (OSTI)

The purpose of this study is to develop and validate a comprehensive model for the determinants of household Internet adoption through identifying the driving internal beliefs of individuals and the effect of cultural values on behavioral intention to ... Keywords: Hofstede's Cultural Dimensions, Household Internet Adoption, Internal Beliefs, Micro Cultural Level, Perceived Risks, Technology Acceptance Model

Amin A. Shaqrah; Khaled Saleh Al Omoush; Raed Musbah Alqirem

2011-01-01T23:59:59.000Z

386

Web strategies to promote internet shopping: is cultural-customization needed?  

Science Journals Connector (OSTI)

Building consumer trust is important for new or unknown Internet businesses seeking to extend their customer reach globally. This study explores the question: Should website designers take into account the cultural characteristics of prospective customers ... Keywords: cross-cultural study, internet shopping, trust, web strategies

Choon Ling Sia; Kai H. Lim; Kwok Leung; Matthew K. O. Lee; Wayne Wei Huang; Izak Benbasat

2009-09-01T23:59:59.000Z

387

A Network Modeling Approach Optimization of Internet-Based Advertising Strategies and Pricing  

E-Print Network [OSTI]

A Network Modeling Approach for the Optimization of Internet-Based Advertising Strategies and evaluation of optimal Internet mar- keting strategies when a firm is advertising on multiple websites examples are constructed that demonstrate two paradoxes: (1). that advertising on more websites may reduce

Nagurney, Anna

388

Scheduling Space-Sharing for Internet Advertising Micah Adler Phillip B. Gibbonsy Yossi Matiasz  

E-Print Network [OSTI]

Scheduling Space-Sharing for Internet Advertising Micah Adler Phillip B. Gibbonsy Yossi Matiasz in the scheduling of space-sharing for Internet advertising. Given a set of ads speci ed by geometry and display. matias@research.bell-labs.com. #12;1 Introduction Advertisers have recently become aware of the power

Gibbons, Phillip B.

389

Testof English as a Foreign LanguageTM for Internet-Based Testing (iBT)  

E-Print Network [OSTI]

Testof English as a Foreign LanguageTM for Internet-Based Testing (iBT) TOEFL ® iBT www® Internet- based testing ONLY. Information about TOEFL paper-based testing and the TEST OF SPOKEN ENGLISHTM on when TOEFL iBT will be introduced in your area, as well as up-to-date lists of test locations

390

Power-Saving in Storage Systems for Internet Hosting Services with Data Access Prediction  

E-Print Network [OSTI]

percentage of the total computing energy is consumed by the storage systems, various attempts at reducingPower-Saving in Storage Systems for Internet Hosting Services with Data Access Prediction Jumpei@cs.tsukuba.ac.jp Abstract--We present a power-saving method for storage systems in Internet hosting services, particularly

Banbara, Mutsunori

391

Power-Aware Autonomous Distributed Storage Systems for Internet Hosting Service Platforms  

E-Print Network [OSTI]

percentage of the total computing system's energy is used by the data storage systems, various attemptsPower-Aware Autonomous Distributed Storage Systems for Internet Hosting Service Platforms Jumpei@osss.,hasebe@,kato@}cs.tsukuba.ac.jp Abstract. We present a power-saving method for large-scale distributed storage systems of Internet hosting

Banbara, Mutsunori

392

Some Thoughts On Peer Review In The Global Internet Context Narayanan Komerath  

E-Print Network [OSTI]

Some Thoughts On Peer Review In The Global Internet Context Narayanan Komerath Daniel Guggenheim in capturing knowledge. The implications of internet based peer review are considered in suggesting a model for peer review and cross-disciplinary innovation, with some preliminary empirical observations on needed

393

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network [OSTI]

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

394

Solving Some Modeling Challenges when Testing Rich Internet Applications for Security  

E-Print Network [OSTI]

Solving Some Modeling Challenges when Testing Rich Internet Applications for Security Suryakant, Canada {vioonut, pionescu}@ca.ibm.com Abstract--Crawling is a necessary step for testing web applications applications, so-called Rich Internet Applications (RIAs). RIAs present new security and crawling challenges

Jourdan, Guy-Vincent

395

Hop-by-hop Computing for Green Internet Routing (Technical report, under revision)  

E-Print Network [OSTI]

Hop-by-hop Computing for Green Internet Routing (Technical report, under revision) Yuan Yang@cernet.edu.cn Abstract--Energy conservation is a global concern nowadays and it is widely expected that energy cost will continuously increase in the near future. The design of the Internet, un- fortunately, has not taken energy

Wang, Dan

396

MesoNet: A Mesoscopic Simulation Model of a Router-Level Internet-like Network  

E-Print Network [OSTI]

MesoNet: A Mesoscopic Simulation Model of a Router-Level Internet- like Network MesoNet is a mesoscopic (medium scale) simulation model of a router-level Internet-like network. The model, written in SLX transfer and associated multiplier on file size. During simulation, model state is captured at each user

397

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

398

U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow  

Broader source: Energy.gov (indexed) [DOE]

1: Novell GroupWise Internet Agent "Content-Length" Integer 1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September 17, 2012 - 6:00am Addthis PROBLEM: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability PLATFORM: The vulnerability is confirmed in version 8.0.2 HP3 and reported in version 2012. Other versions may also be affected. ABSTRACT: A vulnerability was reported in Novell GroupWise Internet Agent reference LINKS: Novell SecurityTracker Alert ID: 1027536 Secunia Advisory SA50622 CVE-2012-0271 IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted request with the HTTP 'Content-Length' header value of '-1' to the administration interface via

399

Advertising on the internet: perceptions of advertising agencies and marketing managers  

Science Journals Connector (OSTI)

While a significant number of companies have invested in internet advertising and clearly digital media continue to grow in popularity, a significant segment of organisations is still uncertain about internet advertising efficiency. The purpose of this study is to gain insights into the perceptions of both advertised firms and advertising agencies of the internet as an advertising medium in order to identify the factors that inhibit or reinforce the integration of the new medium into their strategies and to identify future trends. One hundred and 24 managers participated in this study and their responses indicate that currently internet advertising is perceived as a questionable and ineffective marketing channel. However, in the short run, marketers and agencies are willing to exploit the benefits of internet advertising.

Dimitris A. Drossos; Konstantinos G. Fouskas; Flora Kokkinaki; Dimitrios Papakyriakopoulos

2011-01-01T23:59:59.000Z

400

CSP 541: Internet Technologies W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison-Wesley, ISBN 0201633469  

E-Print Network [OSTI]

CSP 541: Internet Technologies Texts W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison March 2006 (html, css checks) CSP 541: Internet Technologies - CS Dept, Illinois Institut... 1 of 1 #12;

Heller, Barbara

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Fundamentals for immediate implementation of a quantum secured Internet  

E-Print Network [OSTI]

This work shows how a secure Internet for users A and B can be implemented through a fast key distribution system that uses physical noise to encrypt information transmitted in deterministic form. Starting from a shared secret random sequence between them, long sequences of fresh random bits can be shared in a secure way and not involving a third party. The shared decrypted random bits -encrypted by noise at the source- are subsequently utilized for one-time-pad data encryption. The physical generated protection is not susceptible to advances in computation or mathematics. In particular, it does not depend on the difficulty of factoring numbers in primes. Also, there is no use of Linear Feed Back Shift Registers. The attacker has free access to the communication channels and may acquire arbitrary number of copies of the transmitted signal without lowering the security level. No intrusion detection method is needed.

Geraldo A. Barbosa

2006-07-14T23:59:59.000Z

402

In this paper, we propose an Internet payment system which uses a payment gateway to handle the credit card  

E-Print Network [OSTI]

Abstract In this paper, we propose an Internet payment system which uses a payment gateway that our payment system is easy-to-use, secure, and cost-effective. Keywords: E-commerce, Internet payment, public key cryptography, security, on-line travel agency 1. Introduction Internet invents a new style

Lyu, Michael R.

403

of the filter were measured using condensation particle counters (TSI Inc. model 3022A). Submicrometer particles entering the counters are  

E-Print Network [OSTI]

Standard for High Efficiency Air Filters (HEPA and ULPA), Beuth Verlag GmbH, Berlin, Germany 1995. [11] Tof the filter were measured using condensation particle counters (TSI Inc. model 3022A). Submicrometer particles entering the counters are grown into micrometer sized droplets by condensation

Gruner, George

404

1. Profile of individual participants: User should be able to enter information into the software about each  

E-Print Network [OSTI]

. Work History A database ref. #12;Profile of Budge Spending Inputs: Outputs: Company name A database ref Statistical data from input: Every piece of information entered into the database should be relatable and easy to compare with other data attributes. Users will be able to go into the database and cross-reference data

Kundu, Sukhamay

405

Engineering Student YouTube Contest! Enter to win a trip to Ottawa to meet the leaders of the  

E-Print Network [OSTI]

clearly: "Why I want to be a Consulting Engineer". Creativity and presentation skills will be taken1 Engineering Student YouTube Contest! Enter to win a trip to Ottawa to meet the leaders of the Canadian consulting engineering industry! How It Works 1. Become a fan of the Association of Consulting

Thompson, Michael

406

Exploration of the comics medium developed for use on the internet  

E-Print Network [OSTI]

of a given site or made available to be downloaded. Finally, in what is possibly the greatest separation from the two-dimensionality of the printed medium, the advancement of V R M L (virtual reality markup language) on the internet allows for a... as the speed of the internet connection, could have a dramatically different experience within a common web site. It is evident that the internet, much like traditional printed work, has its own limita tions. Ultimately, however, it also has ever...

Piana, Brian James

2012-06-07T23:59:59.000Z

407

Install the E-print Network toolbar -- Energy, science, and technology for  

Office of Scientific and Technical Information (OSTI)

Browser Toolbar The E-print Network offers a browser toolbar for easy access to e-print searches and discipline pages. EPN browser toolbar Two installation options are available for the EPN browser toolbar: Internet Explorer - Download and install the toolbar using the Softomate ActiveX Web installer Please select "Install ActiveX Control" when prompted by your browser. Install toolbar for Internet Explorer Can't see the toolbar after installing? Note: Browser security settings at some organizations may prevent installation or use of the toolbar in Internet Explorer. Try installing the toolbar in the FireFox browser, using the button below. Minimum System Requirements: Windows XP/Vista Internet Explorer 6 or Firefox 2 FireFox - Install toolbar for FireFox

408

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

409

"Dark Fiber" Enables Research to Create Tomorrow's Internet | U.S.  

Office of Science (SC) Website

"Dark Fiber" Enables Research to Create Tomorrow's Internet "Dark Fiber" Enables Research to Create Tomorrow's Internet Advanced Scientific Computing Research (ASCR) ASCR Home About Research Facilities Science Highlights Benefits of ASCR Funding Opportunities Advanced Scientific Computing Advisory Committee (ASCAC) News & Resources Contact Information Advanced Scientific Computing Research U.S. Department of Energy SC-21/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-7486 F: (301) 903-4846 E: sc.ascr@science.doe.gov More Information » October 2012 "Dark Fiber" Enables Research to Create Tomorrow's Internet The Advanced Networking Initiative testbed is allowing researchers to develop radical new technologies for the next generation Internet. Print Text Size: A A A

410

Architecture of participation : the realization of the Semantic Web, and Internet OS  

E-Print Network [OSTI]

The Internet and World Wide Web (WWW) is becoming an integral part of our daily life and touching every part of the society around the world including both well-developed and developing countries. The simple technology and ...

Lau, Shelley

2008-01-01T23:59:59.000Z

411

Insecure Attachment Attitudes in the Onset of Problematic Internet Use Among Late Adolescents  

Science Journals Connector (OSTI)

Studies on the role played by attachment attitudes among late adolescents who show Problematic Internet Use (PIU) are still lacking. Three ... measures concerning attachment attitudes, childhood experiences of abuse

Adriano Schimmenti; Alessia Passanisi

2014-10-01T23:59:59.000Z

412

Characteristics of Internet Child Pornography Offenders: A Comparison with Child Molesters  

Science Journals Connector (OSTI)

The sample comprised 210 subjects, of whom 90 (43%) had an index offense of internet child pornography, and 120 (57%)...1. The child molester characteristics are generally in line with other published samples of ...

L. Webb; J. Craissati; S. Keen

2007-12-01T23:59:59.000Z

413

Priority-Based Internet Access Control for Fairness Improvement and Abuse Reduction  

Science Journals Connector (OSTI)

In this paper, we exploit a prioritized-service architecture and apply a priority based traffic control scheme to reduce abusive Internet access, improve fairness among users and study users. behavior under a ...

Tsung-Ching Lin; Yeali S. Sun

2003-01-01T23:59:59.000Z

414

Preventing Drug Abuse Among Adolescent Girls: Outcome Data from an Internet-Based Intervention  

Science Journals Connector (OSTI)

This study developed and tested an Internet-based gender-specific drug abuse prevention program for adolescent girls. A sample...N...?=?236) from 42 states and 4 Canadian provinces were randomly assigned to an in...

Traci M. Schwinn; Steven P. Schinke; Jennifer Di Noia

2010-03-01T23:59:59.000Z

415

Towards green for relay in InterPlaNetary Internet based on differential game model  

Science Journals Connector (OSTI)

InterPlaNetary Internet (IPN) plays a very important role in the exploitation of space. However, the relays in IPN are suffered from high symbol error, limited storage space, and limited available energy. To anal...

FuHong Lin; Qian Liu; XianWei Zhou; Ke Xiong

2014-04-01T23:59:59.000Z

416

How Sales Taxes Affect Customer and Firm Behavior: The Role of Search on the Internet  

E-Print Network [OSTI]

When a multichannel retailer opens its first retail store in a state, the firm is obligated to collect sales taxes on all Internet and catalog orders shipped to that state. This article assesses how opening a store affects ...

Anderson, Eric T.

417

The Value of Wireless Internet Connection on Trains: Implications for Mode-Choice Models  

E-Print Network [OSTI]

GAO-01-345, pp 6-13. Train, K. , McFadden, D. , 1978. The2006. Wireless Internet on Trains: Impact on performance ofA. , et al. 2005. California Trains Connected, Final Project

Banerjee, Ipsita; Kanafani, Adib

2008-01-01T23:59:59.000Z

418

Combined wavelet video coding and error control for internet streaming and multicast  

E-Print Network [OSTI]

In the past several years, advances in Internet video streaming have been tremendous. Originally designed without error protection, Receiver-driven layered multicast (RLM) has proved to be a very effective scheme for scalable video multicast. Though...

Chu, Tianli

2012-06-07T23:59:59.000Z

419

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets  

Science Journals Connector (OSTI)

The number of threats from the Internet has been growing in ... the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective ... tools for obtaining deta...

Tomas Sochor; Matej Zuzcak

2014-01-01T23:59:59.000Z

420

.art : situating Internet art in the traditional institution for contemporary art  

E-Print Network [OSTI]

This thesis provides a critical analysis of the relation between Internet art and the traditional institution for contemporary art in the North American and West-European regions. Thirteen years after its inception as an ...

Verschooren, Karen A. (Karen Annemie)

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Infertility Help Seeking and Social Support: Do Conventional Theories Explain Internet Behaviors and Outcomes.  

E-Print Network [OSTI]

??This dissertation uses data from the National Survey of Fertility Barriers (NSFB), a nationally representative sample, to assess factors associated with face-to-face and internet help (more)

Slauson-Blevins, Kathleen S.

2011-01-01T23:59:59.000Z

422

Internet Appendices for Lubell, Mark. 2003. "Collaborative Institutions, Belief Systems, and Perceived Policy  

E-Print Network [OSTI]

Internet Appendices for Lubell, Mark. 2003. "Collaborative Institutions, Belief Systems. The independent variables are similar to those found by Lubell et al. (2002) to predict the emergence of watershed

Lubell, Mark

423

Using push technology for industrial automation: new ways of conceiving Internet / Intranet for industries  

Science Journals Connector (OSTI)

The paper presents a prototype that allows shop-floor personnel to perform operations on remote computers using Internet, from controlling intelligent devices to instructing remote personnel about manufacturing p...

Andrea Molinari; Luigi Colazzo

1998-01-01T23:59:59.000Z

424

Internet-based Building Performance Analysis Provided as a Low-Cost Commercial Service  

E-Print Network [OSTI]

Internet-based monitoring services can play a very important role in reducing the energy consumed in commercial buildings. They can provide the information needed to identify improvements that should be made in the operation of particular buildings...

Heinemeier, K.; Koran, W.

2001-01-01T23:59:59.000Z

425

Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin, Gregor v. Bochmann,  

E-Print Network [OSTI]

Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin (RIAs), using technologies such as Ajax, Flex, or Silverlight, break away from the traditional approach and servers. RIAs introduce new challenges, new security vulnerabilities, and their behavior makes

Jourdan, Guy-Vincent

426

Access Business Systems | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(desktop, laptop, mobile) Using any operating system (such as Windows, Mac, Linux, Apple IOS, Android) Through most browsers (Internet Explorer, Firefox, Safari; Chrome is not...

427

Energy API Browser | OpenEI  

Open Energy Info (EERE)

keyword or API of interest to center. Selected API information will be displayed below. Alternatively, you can download a CSV with this API data. Last reviewed on 08.23.2013...

428

Guide de l'pigraphiste. Liste des sites internet jeudi 25 novembre 2010 1 GUIDE DE L'PIGRAPHISTE  

E-Print Network [OSTI]

. http://www.dge.filol.csic.es/claros/cnc/cnc.htm. #12;Guide de l'épigraphiste. Liste des sites internet

429

Getting More Media Bang for Your Buck: Understanding Attitudes and Beliefs Toward Internet, Television, and Print Advertising.  

E-Print Network [OSTI]

??The purpose of the following study is to provide advertisers with a better understanding of how Internet, television, and print media influence the perceptions of (more)

Stevens, Ashley

2011-01-01T23:59:59.000Z

430

Voluntary sexual exposure online among Swedish youth social background, Internet behavior and psychosocial health  

Science Journals Connector (OSTI)

Abstract Studies have described the phenomenon of voluntary sexual exposure among youth online but only a few focus on the typical young person who has this experience. The purpose of this study was to investigate Swedish youth with experience of voluntary sexual exposure online, with regard to Internet behavior, social background, and psychosocial health including parentchild relationships. A representative sample of 3503 Swedish youths in their third year of high school completed a survey about Internet behavior, Internet-related sexual harassment, sexuality, health, and sexual abuse. Out of those taking part in the survey, 20.9% (19.2% boys and 22.3% girls) reported experiences of voluntary sexual exposure online. Multivariate analysis showed a significant association between voluntary sexual exposure online and a number of different forms of harassment online. Neither poorer psychosocial health nor problematic relationships with parents remained significant in the final model. The results underlined the fact that voluntary sexual exposure online is associated with vulnerability on the Internet among both boys and girls and that there is a need for parents and professionals to better understand what young people do on the Internet and the risks they may incur.

Linda S. Jonsson; Gisela Priebe; Marie Bladh; Carl Gran Svedin

2014-01-01T23:59:59.000Z

431

H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information  

Broader source: Energy.gov (indexed) [DOE]

as appropriate. Consider using in solicitations involving M&O as appropriate. Consider using in solicitations involving M&O contracts, management of major facilities, and any acquisition which could involve the direct or indirect purchase of Information Technology equipment that uses Internet Protocol (IP) technology. DOE-H-__ COMPLIANCE WITH INTERNET PROTOCOL VERSION 6 (IPV6) IN ACQUIRING INFORMATION TECHNOLOGY (JULY 2011) This contract involves the acquisition of Information Technology (IT) that uses Internet Protocol (IP) technology. The Contractor agrees that (1) all deliverables that involve IT that uses IP (products, services, software, etc.) comply with IPv6 standards and interoperate with both IPv6 and IPv4 systems and products; and (2) it has IPv6 technical support for fielded product management, development and

432

The Internet Café of the Nuclear World | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

The Internet Café of the Nuclear World The Internet Café of the Nuclear World The Internet Café of the Nuclear World July 19, 2012 - 12:25pm Addthis Participants in the 2012 Advanced Test Reactor National Scientific User Facility Users Week, held at Idaho National Laboratory in June. | Photo courtesy of the Idaho National Laboratory Participants in the 2012 Advanced Test Reactor National Scientific User Facility Users Week, held at Idaho National Laboratory in June. | Photo courtesy of the Idaho National Laboratory Karissa Marcum Public Affairs Specialist, Office of Public Affairs What are the key facts? Today's awards will help train and educate our future nuclear energy scientists and engineers. They will also help advance the technological innovations we need to make sure America's nuclear industry stays competitive in the 21st

433

Kelliher. Joseph' To: "Karen_Y._Knutson@ovp.eop.gov%internet  

Broader source: Energy.gov (indexed) [DOE]

'Kelliher. Joseph' To: "Karen_Y._Knutson@ovp.eop.gov%internet' 'Kelliher. Joseph' To: "Karen_Y._Knutson@ovp.eop.gov%internet' , .doe.gov> "KMurphy@Osec.doc.gov%inlemet' . 'JHowardJ@ceq.eop.gov%internet-

434

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

SciTech Connect (OSTI)

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2009-04-29T23:59:59.000Z

435

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

ScienceCinema (OSTI)

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2010-01-08T23:59:59.000Z

436

Consumer preferences for wireless internet access networks and their affecting factors: a conjoint analysis  

Science Journals Connector (OSTI)

This paper compares service characteristics and analyses consumer preferences between the two current wireless internet access alternatives: 3G cellular networks and public wireless Local Area Network (LAN). A conjoint analysis was employed to find significant service attributes behind consumers' preferences. Major findings of this study are twofold. First, there was a significant difference in consumer preferences among four wireless internet service categories consisting of three wireless LAN services and one 3G service. Secondly, consumers considered price and network speed more important than service coverage, which implies wireless LAN has an advantage over 3G as far as wireless internet access is concerned. These results are expected to be of help to both government policy makers and telecommunications service providers in designing and implementing industrial promotion and competition policies in the wireless industry. Furthermore, they can also shed light on the decision-making regarding the commercial introduction of the mobile broadband wireless services in the near future.

Changi Nam; Kiyong Om; Jungmann Lee; Jeongyoung Kim

2006-01-01T23:59:59.000Z

437

DHT-based security infrastructure for trusted internet and grid computing  

Science Journals Connector (OSTI)

We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.

Kai Hwang; Min Cai; Yu-Kwong Kwok; Shanshan Song; Yu Chen; Ying Chen

2006-01-01T23:59:59.000Z

438

USENIX Association 17th USENIX Security Symposium 155 Measurement and Classification of Humans and Bots in Internet Chat  

E-Print Network [OSTI]

and Bots in Internet Chat Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang Department of Computer Science The College of William and Mary {srgian, mjxie, adamwu, hnw}@cs.wm.edu Abstract The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat

Xie, Mengjun

439

DE 8714FF Rev. 17 (8-13) (INTERNET) Page 1 of 1 CU EDD FIDELITY BONDING PROGRAM  

E-Print Network [OSTI]

DE 8714FF Rev. 17 (8-13) (INTERNET) Page 1 of 1 CU EDD FIDELITY BONDING PROGRAM The Employment coverage because of an arrest record or imprisonment; history of drug or alcohol abuse; poor credit history the EDD's Internet site at www.edd.ca.gov. P.O. Box 826880 · Sacramento CA 94280-0001 The EDD is an equal

440

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 1557 Humans and Bots in Internet Chat: Measurement,  

E-Print Network [OSTI]

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 1557 Humans and Bots in Internet, Zhenyu Wu, and Haining Wang, Senior Member, IEEE Abstract--The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat bots target popular chat

Wang, Haining

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Measurement and Classification of Humans and Bots in Internet Chat Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang  

E-Print Network [OSTI]

Measurement and Classification of Humans and Bots in Internet Chat Steven Gianvecchio, Mengjun Xie, adamwu, hnw}@cs.wm.edu Abstract The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat bots target popular chat networks to dis- tribute spam

Wang, Haining

442

T-Mobile is making mobile surfing for your personal Internet favorites even easier, faster and convenient  

E-Print Network [OSTI]

T-Mobile is making mobile surfing for your personal Internet favorites even easier, faster on your mobile- phone display · Active widgets provide automatic notification of new information on personal Internet sites if required · Strategic partnership between T-Mobile and Opera for the creation

Deutschmann, Rainer

443

Problematic Internet and mobile phone use and clinical symptoms in college students: The role of emotional intelligence  

Science Journals Connector (OSTI)

This study deals with maladaptive use of the Internet and the mobile phone and its relationship to symptoms of psychological distress and mental disorder, as well as to the possible role of Perceived Emotional Intelligence in this relationship. Three ... Keywords: Behavioral addictions, College students, Emotional intelligence, Internet addiction, Mobile phone use

Marta Beranuy; Ursula Oberst; Xavier Carbonell; Ander Chamarro

2009-09-01T23:59:59.000Z

444

Abstract--We propose a novel Internet Exchange (IX) architecture, namely OSN-IX, which adopts an overlaid-star  

E-Print Network [OSTI]

Abstract-- We propose a novel Internet Exchange (IX) architecture, namely OSN-IX, which adopts, Photonic IX, etc., OSN-IX has good properties of scalability, resilience, and widely distributed access-ISP (Internet Service Provider) routing while requiring no change, hardware or software, on existing traditional

von Bochmann, Gregor

445

Expressive participation in Internet social movements: Testing the moderating effect of technology readiness and sex on student SNS use  

Science Journals Connector (OSTI)

An understanding of students' use of social networking sites (SNS) for expressive participation in Internet Social Movements (ISMs) is absent in the literature on the social psychology of student social networking behavior. Using the Unified Theory of ... Keywords: Gender, Internet social movement, Sex, Social networking sites, Technology readiness, UTAUT

Juan D. Borrero; Shumaila Y. Yousafzai; Uzma Javed; Kelly L. Page

2014-01-01T23:59:59.000Z

446

Factors affecting the adoption or acceptance of internet banking services: a review and analysis of past research  

Science Journals Connector (OSTI)

Extensive review of literature shows that there is scarcity of facts related to retaining the old customers of internet banking and acquisition of new customers. This study is conducted to examine the trend of internet banking usage, its attributes and various factors affecting its adoption. The aim of this paper is to present the managers view along with the customer's view in internet banking and services to reduce the gap between customer's perceptions and manager's perceptions regarding factors affecting adoption of internet banking. This paper provides an insight into the key factors such as security, reliability, accessibility, availability, and cost, etc. used by researchers that should be kept in mind by customers before selecting particular internet banking services. These findings will be useful for new researchers who want to explore new dimensions in this field along with reducing the cost of customer acquisition, provide better service quality and higher customer retention rate.

Vaibhav Mishra; Vrijendra Singh

2014-01-01T23:59:59.000Z

447

CSP 542: Internet Design and Analysis Eric Siegel, Designing Quality-of-Service Solutions for the Enterprise, John Wiley and Sons, ISBN 0471333131  

E-Print Network [OSTI]

CSP 542: Internet Design and Analysis Texts Eric Siegel, Designing Quality-of-Service Solutions March 2006 (html, css checks) CSP 542: Internet Design and Analysis - CS Dept, Illinois ... 1 of 1 #12;

Heller, Barbara

448

U.S. DEPARTMENT OF ENERGY EERE PROJECT MANAG EMENT C ENTER NEPA DETERll'llNATION  

Broader source: Energy.gov (indexed) [DOE]

C C ENTER NEPA DETERll'llNATION RECIPIENT:County of San Luis Obispo PROJECf TITLE: EECBG: Bike Lane Activity Page 1 of2 STATE: CA Funding Opportunity Announcement Number Procurement Instrument Number NEPA Control Number CID Number DE-FOA-ODOD013 OE-EEOO00903 0 Based on my review oftbe information concerning the proposed action, as N[PA Compliance Officer (authorized under DOE Order45I.1A), I have made the following determination: ex, EA, EIS APPENDIX AND NUMBER: Description: 85.1 Actions to conserve energy, demonstrate potential energy conservation, and promote energy-efficiency thai do not increase the indoor concentrations of potentially harmful substances. These actions may involve financial and technical assistance to individuals (such as builders, owners, consultants, designers), organizations (such as utilities), and state

449

XtremWeb & Condor : sharing resources between Internet connected Condor O. Lodygensky, G. Fedak, F. Cappello, V. Neri, M. Livny, D. Thain  

E-Print Network [OSTI]

participants connected to Internet like for SETI@home or Folding@home. They simply look for a Grid solution

Liblit, Ben

450

Internet Gambling Offshore: Caribbean Struggles over Casino Capitalism. Andrew F. Cooper. Basingstoke, U.K.: Palgrave Macmillan, 2011. xvii + 201 pp. (Cloth US$ 85.00)  

E-Print Network [OSTI]

Reviews Internet Gambling Offshore: Caribbean Struggles overcrisis. Antigua hosted offshore gambling operations thatweaker than those against offshore gambling. Furthermore,

Maurer, Bill

2013-01-01T23:59:59.000Z

451

Mercury: A Scalable Publish-Subscribe System for Internet Ashwin R. Bharambe  

E-Print Network [OSTI]

Mercury: A Scalable Publish-Subscribe System for Internet Games Ashwin R. Bharambe ashu-subscribe system. We present the design of Mercury, a completely distributed publish-subscribe system, which of communication building block for distributed multiplayer games. Our system, called Mercury, provide

Goldstein, Seth Copen

452

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network [OSTI]

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures Federico Maggi, and to what extent these abuses can impact the end users. With these questions in mind, we first analyzed and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

California at Santa Barbara, University of

453

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network [OSTI]

DRAFT COPY Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures URLs, and to what extent these abuses can impact the end users. With these questions in mind, we first and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

Vigna, Giovanni

454

Expansion of the internet protocol address space with "minor" disruption of current hardware or software  

E-Print Network [OSTI]

Currently, the Internet suite of protocols uses a 32 bit network layer address and requires that each machine have a unique address. The problem: 32 bits only distinguishes 2 32 or 4,294,967,296 machines. Even with four billion addresses, experts...

Wheatley, Philip Stephen

2012-06-07T23:59:59.000Z

455

Voice over Internet Protocol (VoIP) : the dynamics of technology and regulation  

E-Print Network [OSTI]

"What Voice over Internet Protocol (VoIP) is going to do is start to weaken the foundation of the way we've done things for 100 years...Congress already should be discussing the next telecom bill," said Federal Communications ...

Vaishnav, Chintan

2006-01-01T23:59:59.000Z

456

Telecommunications Policy 25 (2001) 349371 Developing the Internet: entrepreneurship and public policy  

E-Print Network [OSTI]

Telecommunications Policy 25 (2001) 349­371 Developing the Internet: entrepreneurship and public for entrepreneurship and investment. We find little evidence that competition and privatization of telecommunications for by per capita income, and by the existing infrastructure and competition in the telecommunications sector

Sharp, Kim

457

Deployment of Internet Technologies at Oak Ridge National Laboratory Forrest Hoffman  

E-Print Network [OSTI]

Deployment of Internet Technologies at Oak Ridge National Laboratory Forrest Hoffman Environmental Sciences Division Oak Ridge National Laboratory* P.O. Box 2008 Oak Ridge, Tennessee 37831--6036 ABSTRACT applications for this forum. Oak Ridge National Laboratory­s entire General Employee Training guide, including

Hoffman, Forrest M.

458

USAGES OF THE INTERNET AND e-TOURISM. TOWARDS A NEW ECONOMY OF TOURISM  

E-Print Network [OSTI]

1 USAGES OF THE INTERNET AND e-TOURISM. TOWARDS A NEW ECONOMY OF TOURISM Christian Longhi on the organization of industry and the market dynamics in the tourism activities, focusing in the European scene. Tourism incorporates many features of the contemporaneous information and communication economy. Even if e-tourism

Paris-Sud XI, Université de

459

Code-Red: a case study on the spread and victims of an Internet worm  

E-Print Network [OSTI]

Code-Red: a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon infected with the Code- Red (CRv2) worm in less than 14 hours. The cost of this epidemic, including subsequent strains of Code-Red, is es- timated to be in excess of $2.6 billion. Despite the global damage

Somayaji, Anil

460

Roadmap: Computer Technology Internet and Multimedia Technology Associate of Applied Business  

E-Print Network [OSTI]

Roadmap: Computer Technology ­ Internet and Multimedia Technology ­ Associate of Applied Business This roadmap is a recommended semester-by-semester plan of study for this major. However, courses Technology 3 *Fulfills Kent Core Social Sciences Course Subject and Title Credit Hours Min. Grade Major GPA

Sheridan, Scott

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Roadmap: Computer Technology Internet and Multimedia Technology Associate of Applied Business  

E-Print Network [OSTI]

Roadmap: Computer Technology ­ Internet and Multimedia Technology ­ Associate of Applied Business This roadmap is a recommended semester-by-semester plan of study for this major. However, courses Technology* 3 *Equivalent to MIS 24163 K Fulfills Kent Core Social Sciences Course Subject and Title Credit

Khan, Javed I.

462

ISSN 1393-614X Minerva -An Internet Journal of Philosophy 8 (2004): 62-90  

E-Print Network [OSTI]

ISSN 1393-614X Minerva - An Internet Journal of Philosophy 8 (2004): 62 for the Dispute in Philosophy of Mathematics Chong Ho Yu Abstract Both Carnap and Quine made significant contributions to the philosophy of mathematics despite their diversed views. Carnap endorsed the dichotomy

Yu, Alex

463

NetBill: An Internet Commerce System Optimized for Network Delivered Services  

E-Print Network [OSTI]

NetBill: An Internet Commerce System Optimized for Network Delivered Services Marvin Sirbu J. D for commerce in information goods and other network delivered services. It has very low transaction costs. Of special interest is our new certified delivery mechanism which delivers information goods if and only

Tygar, Doug

464

Wi-fi backscatter: internet connectivity for RF-powered devices  

Science Journals Connector (OSTI)

RF-powered computers are small devices that compute and communicate using only the power that they harvest from RF signals. While existing technologies have harvested power from ambient RF sources (e.g., TV broadcasts), they require a dedicated gateway ... Keywords: backscatter, energy harvesting, internet of things, wireless

Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, David Wetherall

2014-08-01T23:59:59.000Z

465

Periodic Broadcast and Patching Services -Implementation, Measurement, and Analysis in an Internet  

E-Print Network [OSTI]

Periodic Broadcast and Patching Services - Implementation, Measurement, and Analysis in an Internet to multime- dia steams by a large number of clients. Current research in this area has focussed primarily these algorithms. We present measurements detailing the overheads associated with the various server compo- nents

Massachusetts at Amherst, University of

466

Periodic Broadcast and Patching Services Implementation, Measurement, and Analysis in an Internet  

E-Print Network [OSTI]

Periodic Broadcast and Patching Services ­ Implementation, Measurement, and Analysis in an Internet time al- lowing asynchronous access to multimedia steams by a large number of clients. Current research, and explore the issues that arise when implementing these algorithms. We present measurements detailing

Massachusetts at Amherst, University of

467

From Computational Science to Internetics Integration of Science with Computer Science  

E-Print Network [OSTI]

-- bridging computer science and all application areas whether simulation or information based. Internetics of theory and experiment in high- energy physics. At that time, I mistakenly did not understand the academic" tasking of using computers to translate real physics (equations) into quantitative comparison

468

An Efficiency Measure for Dynamic Networks with Application to the Internet and Vulnerability  

E-Print Network [OSTI]

-dependent demand structures will occur on the Internet as individuals seek information and news online in response University of Massachusetts Amherst, Massachusetts 01003 Isenberg School of Mangement University of Massachusetts Amherst, Massachusetts 01003 INFORMS Annual Meeting, Seattle, Washington, November 4-7, 2007 Anna

Nagurney, Anna

469

Distributed processing and internet technology to solve challenges of primary healthcare in india  

Science Journals Connector (OSTI)

National Reproductive and Child Health program, focused on Mother and Child Health, part of Millennium Developmental Goals, is being implemented through Primary Health Centers of the Public Healthcare System. The health record generated through community ... Keywords: internet technology, mHEALTH-PHC, mobile phone, primary healthcare

Arun Pande; Sanjay Kimbahune; Nandini Bondale; Ratnendra Shinde; Sunita Shanbhag

2012-02-01T23:59:59.000Z

470

Standards as InterdependentArtifacts: the Case of the Internet Mo-Han Hsieh  

E-Print Network [OSTI]

Standards as InterdependentArtifacts: the Case of the Internet by Mo-Han Hsieh B.S. Civil Systems Chair, Engineer ystems Division Education Committee #12;1 #12;Standards as Interdependent in Engineering Systems ABSTRACT This thesis has explored a new idea: viewing standards as interdependent

de Weck, Olivier L.

471

TRACKING ELEPHANT FLOWS IN INTERNET BACKBONE TRAFFIC WITH AN FPGA-BASED CACHE  

E-Print Network [OSTI]

TRACKING ELEPHANT FLOWS IN INTERNET BACKBONE TRAFFIC WITH AN FPGA-BASED CACHE Martin Zadnik an FPGA-friendly approach to track- ing elephant flows in network traffic. Our approach, Single Step elephant flows: con- servatively promoting potential elephants and evicting low- rate flows in LRU manner

Haddadi, Hamed

472

Cutting Down Electricity Cost in Internet Data Centers by Using Energy Storage  

E-Print Network [OSTI]

Cutting Down Electricity Cost in Internet Data Centers by Using Energy Storage Yuanxiong Guo, Zongrui Ding, Yuguang Fang, Dapeng Wu Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA Email: {guoyuanxiong@, dingzr@, fang@ece., wu@ece.}ufl.edu Abstract--Electricity

Latchman, Haniph A.

473

SOFAnet: Middleware for Software Distribution over Internet Ladislav Sobr, Petr Tuma  

E-Print Network [OSTI]

in designing and implementing a distribution framework. The proprie- tary frameworks typically use mutually of the paper. Sec- tion 3 presents our design of the distribution framework within the SOFA component systemSOFAnet: Middleware for Software Distribution over Internet Ladislav Sobr, Petr Tuma Distributed

474

Exploring Marketing Orientation Influences on Internet Adoption in the U.S. Lumber Industry  

E-Print Network [OSTI]

Exploring Marketing Orientation Influences on Internet Adoption in the U.S. Lumber Industry Kofi. Specifically, we focus on the question "Does a high marketing orientation have a positive effect and tested a model that examines the mediating influence of marketing orientation across a number

Wu, Qinglin

475

Bitcoin: a regulatory nightmare to a libertarian dream Internet Policy Review, 3(2).  

E-Print Network [OSTI]

Bitcoin: a regulatory nightmare to a libertarian dream Internet Policy Review, 3(2). Author and current discussions on the regulation of bitcoin in Europe and beyond. After presenting the potential by a central server, bitcoin is a distributed, worldwide, decentralised cryptocurrency that is managed solely

Boyer, Edmond

476

Theoretical Estimates of HVAC Duct Channel Capacity for High-Speed Internet Access  

E-Print Network [OSTI]

Theoretical Estimates of HVAC Duct Channel Capacity for High-Speed Internet Access Ariton E. Xhafa-conditioning (HVAC) ducts based on multi-carrier transmission that uses M-QAM mod- ulation and measured channel- flections in HVAC ducts). Our work also shows that data rates in excess of 300 Mbps are possible over

Stancil, Daniel D.

477

A co-operative environment for local government: an InternetIntranet approach  

E-Print Network [OSTI]

of the workspace. Intranet and Extranet technologies are exploited to enable asynchronous and synchronous coA co-operative environment for local government: an Internet±Intranet approach Christos Bouras a®dis b a Computer Technology Institute (CTI), 3 Kolokotroni St., 262 21 Patras, Greece b Computer

Bouras, Christos

478

An Intranet and Internet based Information System for Administration and Information purposes*  

E-Print Network [OSTI]

groups etc.) the prefecture of Corfu. It is exploiting Intranet and Extranet technologies in order with this important problem has designed and now is implementing an Information System based on Intranet technologies1 An Intranet and Internet based Information System for Administration and Information purposes

Bouras, Christos

479

Le territoire numrique organisationnel l'preuve des pratiques socio-numriques des salaris sur internet  

E-Print Network [OSTI]

principale se rapportant à la dimension politique des technologies dans l'espace organisationnel. Celle-ci se nourrit de tensions relatives à la cohabitation entre les pratiques internet et les dispositifs intranet des salariés ; intranet ; traces numériques; cultures numériques ; sociologie de la traduction

Paris-Sud XI, Université de

480

A Look at the Consequences of Internet Censorship Through an ISP Lens  

Science Journals Connector (OSTI)

Internet censorship artificially changes the dynamics of resource production and consumption, affecting a range of stakeholders that include end users, service providers, and content providers. We analyze two large-scale censorship events in Pakistan: ... Keywords: censorship, content blocking, isp traffic, porn, video streaming

Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson

2014-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet browser enter" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

The Answer Is Blowing in the Wind: Analysis of Powering Internet Data Centers with Wind Energy  

E-Print Network [OSTI]

The Answer Is Blowing in the Wind: Analysis of Powering Internet Data Centers with Wind Energy Yan. As a result, many IDC operators have started using renewable energy, e.g., wind power, to power their data centers. Unfortunately, the utilization of wind energy has stayed at a low ratio due to the intermittent

482

Short communication: Short-term fairness and long-term QoS in the Internet  

Science Journals Connector (OSTI)

We consider connection-level models of resource allocation in a simple symmetric three-link network, where files arrive into the network according to a Poisson process and the size of each file is exponentially distributed. For the simple network under ... Keywords: Delay optimality, Dynamic programming, Internet congestion control, Lyapunov functions, Proportional fairness

Bo (Rambo) Tan; Lei Ying; R. Srikant

2010-05-01T23:59:59.000Z

483

Preparing experiments with media-oriented service composition for future internet  

Science Journals Connector (OSTI)

Service composition provides feasible ways to flexibly build m edia applications employing widely dispersed media contents and tools. There have been several attempts to enable media-oriented service composition based on service over-lay networks (SONs). ... Keywords: agent-based toolkit, future internet testbed, media-oriented service composition, multimedia, service-oriented computing

Sang Woo Han; JongWon Kim

2010-06-01T23:59:59.000Z

484

Socio-Cultural Challenges for the Internet in South Africa Philip Machanick*  

E-Print Network [OSTI]

Socio-Cultural Challenges for the Internet in South Africa Philip Machanick* Department of Computer Science University of the Witwatersrand Private Bag 3 2050 Wits South Africa http://www.cs.wits.ac.za/~philip/ philip@cs.wits.ac.za abstract A key aspect of technology policy in South Africa today is universal access

Machanick, Philip

485

System Architecture and Public Policy: How the Internet's Design Impacts the Policy Process  

E-Print Network [OSTI]

1 System Architecture and Public Policy: How the Internet's Design Impacts the Policy Process of technology and policy is especially manifest in system architecture. Architecture defines the enduring architecture is recognized as an important part of system engineering, but its significance for policy has

de Weck, Olivier L.

486

How to 0wn the Internet in Your Spare Time Stuart Staniford  

E-Print Network [OSTI]

@cs.berkeley.edu To Appear in the Proceedings of the 11th USENIX Security Symposium (Security '02) Abstract The ability mechanisms by which attackers can control and update deployed worms. In conclusion, we argue for the pressing Introduction If you can control a million hosts on the Internet, you can do enormous damage. First, you can

Ramkumar, Mahalingam

487

Enabling Internet Suspend/Resume with Session Continuations Alex C. Snoeren SNOEREN@LCS.MIT.EDU  

E-Print Network [OSTI]

Enabling Internet Suspend/Resume with Session Continuations Alex C. Snoeren SNOEREN@LCS.MIT.EDU MIT users have grown accustomed to the ``sus­ pend/resume'' model of computing, in which activity can be resumed precisely from the point at which it was sus­ pended, despite arbitrary periods of inactivity

Gummadi, Ramakrishna

488

Enabling Internet Suspend/Resume with Session Continuations Alex C. Snoeren SNOEREN@LCS.MIT.EDU  

E-Print Network [OSTI]

Enabling Internet Suspend/Resume with Session Continuations Alex C. Snoeren SNOEREN@LCS.MIT.EDU MIT users have grown accustomed to the "sus- pend/resume" model of computing, in which activity can be resumed precisely from the point at which it was sus- pended, despite arbitrary periods of inactivity

Gummadi, Ramakrishna

489

Fairtrade.com versus Fairtrade.orghow Fairtrade organisations use the Internet  

Science Journals Connector (OSTI)

......frequency of online buying increase significantly after two or...a system of branding and quality assurance as well as a large...Internet can actually help increase the overall turnover for Fairtrade...cocoa, rice, quinua, sugar, wine, marmelade, Cuban rum, chewing......

Dorothea Kleine

2005-01-01T23:59:59.000Z

490

Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet  

E-Print Network [OSTI]

Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet Invited Paper characteristics that can be leveraged to design energy-efficient loss recovery mechanisms. Given their loss, we first present an analysis of an energy-efficient MAC-layer protocol, called Fast Transmit MAC

Kravets, Robin

491

Keywords: Excrow service, online C2C auctions, Internet fraud, perceived risk, system dynamics, decision making. 2001 --Twenty-Second International Conference on Information Systems 1  

E-Print Network [OSTI]

1 Keywords: Excrow service, online C2C auctions, Internet fraud, perceived risk, system dynamics markets for protecting online traders from Internet fraud. Although the process of online escrow services (OES) ensures its effectiveness i blocking Internet frauds, its adoption rate is still surprisingly low

Lin, Zhangxi

492

T-Mobile makes access to Internet services and applications easy with widgets in new release of web'n'walk  

E-Print Network [OSTI]

T-Mobile makes access to Internet services and applications easy with widgets in new release of web'n'walk Feb 17, 2009 T-Mobile brings its customers even closer to the Internet with its new re-lease of web, making it easy to stay up to date. "T-Mobile is striving towards offering its customers the best Internet

Deutschmann, Rainer

493

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet System 1,2,3  

E-Print Network [OSTI]

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet describes a series of experiments involving over 100,000 hosts of the Internet system and located in the U and reliability of international standard time distribution using the Internet and the Network Time Protocol (NTP

Mills, David L.

494

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet System1,2,3  

E-Print Network [OSTI]

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet describes a series of experiments involving over 100,000 hosts of the Internet system and located in the U and reliability of international standard time distribution using the Internet and the Network Time Protocol (NTP

Mills, David L.

495

A Society of Natural Language Agents on the Internet Wen-Lian Hsu, Yi-Shiou Chen and Yuan-Kai Wang  

E-Print Network [OSTI]

1 A Society of Natural Language Agents on the Internet Wen-Lian Hsu, Yi-Shiou Chen and Yuan As the Internet is flooded with different types of documents (unstructured, semi-structured texts with the information service problem on the Internet, we are experimenting with an agent society in which agents act

Chu, Hao-hua

496

Researching on the Internet Careers & Education This tipsheet highlights some of the more useful websites for career and education research. This is a guide to help  

E-Print Network [OSTI]

Researching on the Internet ­ Careers & Education This tipsheet highlights some of the more useful websites for career and education research. This is a guide to help you begin using the Internet as a career and education research tool, not a comprehensive listing. Please note that Internet addresses

Boonstra, Rudy

497

Internet Resources for Job Safety and Health Compiled by Tim Morse, Ph.D., at the ErgoCenter at the University of Connecticut Health Center  

E-Print Network [OSTI]

Internet Resources for Job Safety and Health Compiled by Tim Morse, Ph.D., at the Ergo on the internet is the OSHA (Occupational Safety and Health Administration) homepage, which includes an ergonomics homepage, a searchable index of standards, and a listing of health and safety sites on the internet. http

Oliver, Douglas L.

498

Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes  

Science Journals Connector (OSTI)

Key supplier-side factors that affect the usage level of mobile Internet were identified and the procedural mechanism among the independent and dependent variables was investigated. For this, a research model was introduced to describe associations among ... Keywords: Mobile data services, Mobile internet, Mobile internet services, Post-adoption usage, Technology acceptance

Young Mee Shin; Seung Chang Lee; Bongsik Shin; Ho Geun Lee

2010-11-01T23:59:59.000Z

499

Perceptions and behaviour of access of the Internet: A study of women attending a breast screening service in Sydney, Australia  

Science Journals Connector (OSTI)

Objectives To describe the perceptions and behaviour in accessing health information from the Internet by women attending a BreastScreen, New South Wales (NSW) Service in Northern Sydney. Design Cross-sectional study. Setting A BreastScreen NSW Service in Northern Sydney. Main outcome measures Behaviour and perceptions of accessing of the Internet for breast health and screening information and other related health information. Participants Four hundred and fifteen women aged ?40 years who had a screening mammogram at a BreastScreen NSW Service in Northern Sydney. Data were collected from 1 October to 22 December 2004 (study interval). Results Four hundred and sixty-one eligible women were invited to participate in the study and of these 415 women agreed to participate in the study (participation rate=90%). Of the 415 women enrolled in the cohort, 80% (333/415) of women accessed the Internet in general and 62% (205/333) of the women who accessed the Internet also accessed health related information from the Internet, but only 7% of the total women accessed breast health and screening information from the Internet. Two hundred and eighty (70%) women in the cohort expressed their intention to access the Internet if they were diagnosed with breast cancer. Age (OR=0.94; 95% CI=0.910.97), marital status (OR=2.65; 95% CI=1.454.83), educational status (OR=3.26; 95% CI=1.776.02) and behavioural intention of accessing the Internet if diagnosed with breast cancer (OR=3.31; 95% CI=1.835.98) were found to be associated with access of Internet for general information. Furthermore, behavioural intention (OR=2.43; 95% CI=1.304.55), rating of computer skills as average (OR=0.42; 95% CI=0.220.79) and not good to poor (OR=0.23; 95% CI=0.110.49) were found to be associated with access of health related information from the Internet. Conclusions Information searching from the Internet is common among women having a screening mammogram. There is potential to provide guidance to women regarding accessing the BreastScreen NSW website and other reliable sources of Internet information on breast health, breast screening and cancer-related information.

Aditi Dey; Beth Reid; Robyn Godding; Andrew Campbell

2008-01-01T23:59:59.000Z

500

Enter Title of Presentation  

U.S. Energy Information Administration (EIA) Indexed Site

Long-term Global Oil Scenarios: Long-term Global Oil Scenarios: Looking Beyond 2030 EIA 2008 Energy Conference Washington, DC April 7, 2008 Glen Sweetnam Energy Information Administration Long term Global Oil Scenarios: April 7, 2008 2 EIA's view to 2030 * Reference Case: - Liquid fuels consumption grows to 113 MMB/D - 29 MMB/D increase from 2006 - Conventional crude oil and lease condensate up only 12 MMB/D * Higher oil prices slow consumption growth - Liquid fuels grow to 98 MMB/D in the high price case - Conventional crude and lease condensate down 11 MMB/D from 2006 * Important difference between conventional crude oil and total liquids Long term Global Oil Scenarios: April 7, 2008 3 Unconventional liquids become more important over time 76.1 99.3 81.9 Conventional Subtotal 21.6 14.0 2.8 Unconventional Subtotal