Sample records for internet protocol ip

  1. IP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance

    E-Print Network [OSTI]

    Dunkels, Adam

    , smart cities, structural health management systems, smart grid and energy management, and transportationIP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance White paper #1 Adam, Cisco Systems September 2008 Executive Summary The emerging application space for smart objects requires

  2. Internet Control Message Protocol The Context

    E-Print Network [OSTI]

    1 1 Internet Control Message Protocol ICMP 2 The Context IP-Related Protocol: ICMP TCP/IP Protocol Internet Control Message Protocol (ICMP) The Internet Control Message Protocol (ICMP) is used by routers is a separate protocol that sits above IP and uses IP to transport messages In practice, ICMP is an integral

  3. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOE Patents [OSTI]

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06T23:59:59.000Z

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  4. In modern IP routers, Internet Pro-tocol (IP) lookup forms a bottleneck in pack-

    E-Print Network [OSTI]

    Mahapatra, Rabinarayan

    POWER CONSUMPTION AND HEAT DISSIPATION, PROBLEMS ALLEVIATED BY REDUCING THE NUMBER OF ROUTING the data (IP address) in a single clock cycle. Because of this property, TCAMs are particularly attractive consumption and lack scal- able design schemes, which limit their use. Today's high-density TCAMs consume 12

  5. IP Addressing and RoutingIP Addressing and Routing TCP/IP Protocol SuiteTCP/IP Protocol Suite

    E-Print Network [OSTI]

    Yeom, Ikjun

    ETH IP (1400) FDDI IP (1400) PPP IP (512) PPP IP (376) PPP IP (512) ETH IP (512) ETH IP (376) ETH IP

  6. Assessment of VoIP Service Availability in the Current Internet

    E-Print Network [OSTI]

    Yang, Junfeng

    Assessment of VoIP Service Availability in the Current Internet Wenyu Jiang Department of Computer Science Columbia University Email: hgs@cs.columbia.edu Abstract-- We evaluate the availability of voice over IP (VoIP) service typically achieved in the current Internet. Service avail- ability is examined

  7. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  8. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

  9. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  10. Privacy of encrypted Voice Over Internet Protocol

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10T23:59:59.000Z

    of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

  11. Performance comparison of native ATM vs IP over ATM 

    E-Print Network [OSTI]

    Mohammed, Shajiuddin Asif

    1998-01-01T23:59:59.000Z

    engineers through its high bandwidth and multi traffic support. The robustness of the Internet Protocol (115 contributed to massive increase in Internet hosts globally. IP is a connectionless protocol as opposed to ATM, ...

  12. SMDP a Simple Multimedia Service Description Protocol on the Internet

    E-Print Network [OSTI]

    Lung, Chung-Horng

    SMDP ­ a Simple Multimedia Service Description Protocol on the Internet Qiang Nelson Yin Chung}@sce.carleton.ca Abstract Downloading multimedia content from the Internet becomes more and more popular. Consumers have. Based on the current model, it is time consuming for consumers to obtain the desired multimedia content

  13. Towards a Protocol-Independent Internet Transport API

    E-Print Network [OSTI]

    Welzl, Michael

    a standardized API yet, and at the time of writing, the most recent Internet-draft specifying the SCTP API [1Towards a Protocol-Independent Internet Transport API Michael Welzl University of Oslo Email Gjessing University of Oslo Email: steing@ifi.uio.no Abstract--The conjoint API of TCP, UDP, UDP-Lite, SCTP

  14. CSP 541: Internet Technologies W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison-Wesley, ISBN 0201633469

    E-Print Network [OSTI]

    Heller, Barbara

    CSP 541: Internet Technologies Texts W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison March 2006 (html, css checks) CSP 541: Internet Technologies - CS Dept, Illinois Institut... 1 of 1 #12;

  15. Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks

    E-Print Network [OSTI]

    Mohanty, Saswat

    2012-07-16T23:59:59.000Z

    utilize the length of the encrypted packets to infer the language and spoken phrases of the conversation. Secure Real-time Padding Protocol (SRPP) is a new RTP profile which pads all VoIP sessions in a unique way to thwart traffic analysis attacks...

  16. Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico

    E-Print Network [OSTI]

    Perez, Mary Louise

    2012-08-31T23:59:59.000Z

    Internet (VoIP) started in 1995 by people in Israel using computers to communicate. With later software and hardware developments by entrepreneurs and manufacturers more computer users had access to VoIP technology. A traditional call could now... in business operations. The disadvantages of VoIP technology are: 1) The technology is not quite as reliable as traditional land service. It is dependent on electrical power and the data network to support the VoIP telephony. TDM land lines should...

  17. Expansion of the internet protocol address space with "minor" disruption of current hardware or software

    E-Print Network [OSTI]

    Wheatley, Philip Stephen

    1996-01-01T23:59:59.000Z

    Currently, the Internet suite of protocols uses a 32 bit network layer address and requires that each machine have a unique address. The problem: 32 bits only distinguishes 2 32 or 4,294,967,296 machines. Even with four billion addresses, experts...

  18. IP OverIP Over SONETSONETRaj Jain

    E-Print Network [OSTI]

    Jain, Raj

    PPP q SONET is appearing as a competition to ATM #12;Raj Jain 6 SONET ProtocolsSONET Protocols q faster than by SONET #12;Raj Jain 10 IP/PPP/SONET vs IP/ATM/SONETIP/PPP/SONET vs IP/ATM/SONET 1. Overhead/CBR/VBR. m Signaling overhead for SVCs. #12;Raj Jain 11 PPP/SONET vs ATM/SONET (Cont)PPP/SONET vs ATM

  19. Unified Theory of Relativistic Identification of Information in a Systems Age: Proposed Convergence of Unique Identification with Syntax and Semantics through Internet Protocol version 6

    E-Print Network [OSTI]

    Datta, Shoumen

    2008-07-31T23:59:59.000Z

    This paper proposes to utilize internet protocol version six (IPv6) to uniquely identify not only things (objects) but also processes, relationships (syntax, semantics) and interfaces (sensors). Convergence of identification ...

  20. IP SwitchingIP Switching and Label Switchingand Label Switching

    E-Print Network [OSTI]

    Jain, Raj

    Raj Jain 1 IP SwitchingIP Switching and Label Switchingand Label Switching Raj Jain Professor Switching vs routing q IP Switching (Ipsilon) q Tag Switching (CISCO) q Multi-protocol label switching a tag. Exit router strips it off. H R R R H H HUntagged Packet Tagged packet #12;Raj Jain 9 Tag

  1. Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, this division of functionality evolved organically- tures of the algorithms, we construct TRUMP: a traffic man- agement protocol that is distributed

  2. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01T23:59:59.000Z

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  3. Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization

    ScienceCinema (OSTI)

    Lefteri Tsoukalas

    2010-01-08T23:59:59.000Z

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  4. Sports over IP : dynamics and perspectives

    E-Print Network [OSTI]

    Blain, Emmanuel

    2010-01-01T23:59:59.000Z

    Technological advances are allowing the use of the Internet Protocol and the Internet infrastructure mainly built by cable and telecom operators for broadcasting purposes in the U.S. This disruption raises a business issue ...

  5. Multimedia Communications over IP Networks 4 -6 September 2000

    E-Print Network [OSTI]

    Abu-Rgheff, Mosa Ali

    Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution of the Internet David@plymouth.ac.uk School of Computing #12;Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution' applying at each level: #12;Multimedia Communications over IP Networks 4 - 6 September 2000 Evolution

  6. Scalable Internet Routing on Topology-Independent Node Identities

    E-Print Network [OSTI]

    Ford, Bryan

    2003-10-31T23:59:59.000Z

    Unmanaged Internet Protocol (UIP) is a fully selforganizingnetwork-layer protocol that implements scalableidentity-based routing. In contrast with addressbasedrouting protocols, which depend for scalability oncentralized ...

  7. On the development of Voice over IP 

    E-Print Network [OSTI]

    Yang, Xu

    2009-05-15T23:59:59.000Z

    problems in the Session Initiation Protocol (SIP) call setup process. To support product line development and enable product evolution in the quickly growing VoIP market, I have proposed a generic development framework for SIP application servers...

  8. SIP Server VoIP UA IP

    E-Print Network [OSTI]

    SIP Server UA UA IP VoIP UA IP 1 1 Transport Layer Security (TLS) SIP server TLS Client TLS TLS Client VoIP SRTP SIP server TLS Client TLS SRTP .2> Skype (Skype Trunk) skype server skype ( Skype Client ) skype 20 20 VoIP Option

  9. 32 Int. J. Internet Protocol Technology, Vol. 5, Nos. 1/2, 2010 Copyright 2010 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Calyam, Prasad

    networking and cyber-security. Nathan Howes received his BS in Computer Science and Engineering from The Ohio and cyber-security. 1 Introduction With increased access to broadband, internet videoconferencing has emerged as a viable medium for communication and entertainment. It is being used increasingly

  10. de Lange Lab Chromatin Immunoprecipitation (ChIP)

    E-Print Network [OSTI]

    de Lange, Titia

    with cold PBS x 2. 7. Scrape cells in ~ 10 ml PBS into 50 ml conical tube . Spin down cells. 8. Combine cell. The remainder can be kept at 4ºC and reused, but add sodium azide before storage. ChIP Protocol Timeline Day 1IP) protocol 3 Preparing the lysate 1. Grow cells to subconfluence. Set up experiment for 10 IPs. For primary

  11. 1. The Internet 1-1 Chapter 1: The Internet

    E-Print Network [OSTI]

    Brass, Stefan

    1. The Internet 1-1 Chapter 1: The Internet References: · Rainer Klute: Das World Wide Web. Addison with TCP/IP. Prentice Hall, 1988, ISBN 0134701887. · W. Richard Stevens: TCP Illustrated, Vol. 1. Addison-Wesley, 1994, ISBN 0201633469. · W. Richard Stevens: UNIX Network Programming, Vol. 1, 2nd Ed. Prentice Hall

  12. Cellular-Internet Convergence: Evolving the Internet Architecture to

    E-Print Network [OSTI]

    Garfunkel, Eric

    protocols; standard mobility & service control API's Multiple radio access technologies simply plug: Industry Approach Towards Flat IP Architecture for Mobile Networks Cellular network standards (3GPP, LTE and cellular/mobile network standards ~1975... ~1990 ~2000 ~2010 ~2020 Basic IP Addressing & Routing BGP

  13. Proactive techniques for correct and predictable Internet routing

    E-Print Network [OSTI]

    Feamster, Nicholas G. (Nicholas Greer), 1979-

    2006-01-01T23:59:59.000Z

    The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

  14. VoIP Deregulation In South Africa: Implications for Underserviced Areas

    E-Print Network [OSTI]

    Blake, Edwin

    VoIP Deregulation In South Africa: Implications for Underserviced Areas Marshini Chetty a marshiniDept of Computer Science, University of Cape Town, South Africa cPolicy Associate, Bridges.org, South Africa Protocol (VoIP) in South Africa. Previously, VoIP could only be utilised by the incumbent

  15. Computation Migration based on Mobile IP and Intelligent Agent Techniques

    E-Print Network [OSTI]

    Zhang, Runtong

    Page 1 Computation Migration based on Mobile IP and Intelligent Agent Techniques Runtong Zhang, Dongmei Zhang, Zhigang Kan and Jian Ma Advanced Internet Technology, Nokia (China) R&D Center No. 11, He is to investigate the use of mobile agents in the platform of mobile IPv6, to provide adapted services to mobile

  16. Controlling IP Spoofing Through Inter-Domain Packet Filters

    E-Print Network [OSTI]

    Duan, Zhenhai

    Chandrashekar Abstract The Distributed Denial of Services (DDoS) attack is a serious threat to the legitimate localize the origin of an attack packet to a small number of candidate networks. Keywords: IP Spoofing, DDoS of Service (DDoS) attacks pose an increasingly grave threat to the Internet, as evidenced by recent DDoS

  17. Income Protection (IP) Insurance

    E-Print Network [OSTI]

    Stokes, Kenneth; Barnaby, G. A. Art; Waller, Mark L.; Outlaw, Joe

    1999-06-09T23:59:59.000Z

    insurance program available only for grain sorghum in all Texas counties and wheat in selected Kansas counties. How IP Works? The IP dollar guarantee per acre is calculated by multiplying the approved APH yield times the projected price times the selected...-99 *Professor and Extension Economist, The Texas A&M University System; Extension Agricultural Economist, Kansas State University Agricultural Experiment Station and Cooperative Extension Service; Professor and Extension Economist, The Texas A&M University...

  18. PROTECTING SENSITIVE INFORMATION THAT IS

    E-Print Network [OSTI]

    the System Development Life Cycle, September 2004 Securing Voice Over Internet Protocol (IP) Networks

  19. Continued on page 2 IMPLEMENTING THE HEALTH

    E-Print Network [OSTI]

    The System Development Life Cycle, September 2004 Securing Voice Over Internet Protocol (IP) Networks

  20. Dynamic, transparent Internet server replication using HYDRANET

    E-Print Network [OSTI]

    Dillon, Geoffrey A.

    1998-01-01T23:59:59.000Z

    The exponential growth of the use of the Internet has hics. caused increasing stress on the networking infrastructure. Routers, servers and protocols are reaching their limits and need room to scale up their capacities to meet user demands. Client...

  1. Controlling IP Spoofing Through Inter-Domain Packet Filters

    E-Print Network [OSTI]

    Yuan, Xin

    , Member, IEEE, and Jaideep Chandrashekar, Member, IEEE Abstract--The Distributed Denial of Services (DDoS to a small number of candidate networks. Index Terms--IP Spoofing, DDoS, BGP, Network-level Security and Protection, Routing Protocols I. INTRODUCTION Distributed Denial of Service (DDoS) attacks pose an in

  2. Adaptive best effort protocols for video delivery

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01T23:59:59.000Z

    This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

  3. Group Security Association (GSA) Management in IP Multicast

    E-Print Network [OSTI]

    Thomas Hardjono; Mark Baugher; Hugh Harney

    Abstract: This work describes the Group Security Association (GSA) Management model and protocol as developed in the Secure Multicast Group (SMuG) in the IETF. The background reasoning from the Internet Key Exchange (IKE) protocol perspective is explained, together with the notion of Security Associations (SA) in the unicast case. This serves as a basis for a requirements for Group SA for multicast. Finally, the definition and construction of a GSA is described. 1.

  4. Internet Sampler

    E-Print Network [OSTI]

    2006-08-23T23:59:59.000Z

    Gnat (gnatkip) wrote, 2006-08-23 16:36:00 Art: Internet Sampler Title: Internet Sampler Media: Excel, Photoshop, Crosstitch.com Caption Maker, alphabet by Carrie's Creations, graphics from Windows, IE, and Firefox Notes: An illustration... the manner of the pioneers. At the top I’ll set my most oft- uttered prayer: Thank you, internet, for letting me observe so many crazy people from a safe distance." Since I first read that line, there have been so many occasions when I've been reminded...

  5. Internet 0

    E-Print Network [OSTI]

    Krikorian, Raffi Chant, 1978-

    2004-01-01T23:59:59.000Z

    The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

  6. DATA COMMUNICATIONS PROTOCOL PERFORMANCE ON GEOSTATIONARY SATELLITE LINKS --LESSONS LEARNED USING ACTS

    E-Print Network [OSTI]

    Kruse, Hans

    studied the SNA/SDLC protocol in Normal Response Mode. Our observation of TCP/IP confirms the need modifications at or below the transport layer. Our study of SDLC suggests a response time degradation the SNA/SDLC and the TCP/IP protocol families. The operation of the ACTS system has confirmed that its

  7. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    crafted request to submit a user-controlled AJP protocol message to the Tomcat server. This can be exploited to spoof the name of the target user and the client IP address...

  8. Dynamic address allocation protocols for Mobile ad hoc networks

    E-Print Network [OSTI]

    Patchipulusu, Praveena

    2001-01-01T23:59:59.000Z

    Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

  9. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  10. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    -2004 SYSTEM MODEL NETWORK WORK- STATIONS SERVERS WS WS WS WS NFS GOPHER LIBRARY KERBEROS #12;3© Ravi Sandhu authorization and access control services on top of Kerberos #12;5© Ravi Sandhu 2000-2004 TRUST: BILATERAL RHOSTS MODEL A B C E G F A B A trusts B A will allow users logged onto B to log onto A without a password

  11. SIP-based VoIP Traffic Behavior Profiling and Its Applications

    E-Print Network [OSTI]

    Zhang, Zhi-Li

    calls over the Internet, or any other IP network, using the packet switched network as a transmission maximize network efficiency, stream- line the network architecture, reduce capital and operational Hun such powerful infrastructures also make them a liability. Risks include Denial of Service (DoS), Ser- vice Theft

  12. TransportAware IP Routers: a Builtin Protection Mechanism to Counter DDoS Attacks

    E-Print Network [OSTI]

    Wang, Haining

    is a powerful built­in pro­ tection mechanism to counter DDoS attacks, reducing the vulnerability of Internet Wang and Kang G. Shin Real­Time Computing Laboratory Department of Electrical Engineering and Computer isolation by the current IP routers exposes their vulnerability to Distributed Denial of Service (DDo

  13. The Internet Backplane Protocol: A Study in Resource Sharing1 This work is supported by the National Science Foundation Next Generation Software Program under grant # EIA-9975015, the Department of

    E-Print Network [OSTI]

    Plank, Jim

    by the National Science Foundation Next Generation Software Program under grant # EIA-9975015, the Department of Energy Scientific Discovery through Advanced Computing Program under grant # DE-FC02-01ER25465, and by the National Science Foundation Internet Technologies Program under grant # ANI-9980203. Alessandro Bassi

  14. On the Energy Cost of Robustness and Resiliency in IP Networks , A. Caponea,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    protocols (like MPLS) allow us to quantitatively analyze the trade-off between energy cost and levelOn the Energy Cost of Robustness and Resiliency in IP Networks B. Addisb , A. Caponea, , G different levels of resiliency and robustness impact the efficiency of energy-aware network management

  15. IP Profiling via Service Cluster Membership Vectors

    SciTech Connect (OSTI)

    Bartoletti, A

    2009-02-23T23:59:59.000Z

    This study investigates the feasibility of establishing and maintaining a system of compact IP behavioral profiles as a robust means of computer anomaly definition and detection. These profiles are based upon the degree to which a system's (IP's) network traffic is distributed among stable characteristic clusters derived of the aggregate session traffic generated by each of the major network services. In short, an IP's profile represents its degree of membership in these derived service clusters. The goal is to quantify and rank behaviors that are outside of the statistical norm for the services in question, or present significant deviation from profile for individual client IPs. Herein, we establish stable clusters for accessible features of common session traffic, migrate these clusters over time, define IP behavior profiles with respect to these clusters, migrate individual IP profiles over time, and demonstrate the detection of IP behavioral changes in terms of deviation from profile.

  16. SITE-CONTROLLED SECURE MULTI-HOMING AND TRAFFIC ENGINEERING FOR IP Randall Atkinson Saleem Bhatti Steve Hailes

    E-Print Network [OSTI]

    Bhatti, Saleem N.

    SITE-CONTROLLED SECURE MULTI-HOMING AND TRAFFIC ENGINEERING FOR IP Randall Atkinson Saleem Bhatti Grid, including the global Internet. Similarly, the ability to provide traffic engineering for a site. Current approaches to site multi-homing and site traffic engineering (a) re- quire assistance from

  17. Cost Analysis of NEMO Protocol Md. Shohrab Hossain , Mohammed

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    based on all-IP technology, compounded by the fact that the number of mobile nodes requiring mobility have developed analytical models to estimate total costs of key mobility management entities of NEMO, mobility management entities, computer networks. I. INTRODUCTION To ensure continuous Internet connectivity

  18. Network Layer and IP CSC 343643

    E-Print Network [OSTI]

    Fulp, Errin W.

    the usefulness of some options E. W. Fulp CSC 343·643 Fall 2013 9 #12;IP Header: ToS Field Type of Service (ToS

  19. Structure of mouse IP-10, a chemokine

    SciTech Connect (OSTI)

    Jabeen, Talat; Leonard, Philip; Jamaluddin, Haryati; Acharya, K. Ravi, E-mail: bsskra@bath.ac.uk [Department of Biology and Biochemistry, University of Bath, Claverton Down, Bath BA2 7AY (United Kingdom)

    2008-06-01T23:59:59.000Z

    The structure of mouse IP-10 shows a novel tetrameric association. Interferon-?-inducible protein (IP-10) belongs to the CXC class of chemokines and plays a significant role in the pathophysiology of various immune and inflammatory responses. It is also a potent angiostatic factor with antifibrotic properties. The biological activities of IP-10 are exerted by interactions with the G-protein-coupled receptor CXCR3 expressed on Th1 lymphocytes. IP-10 thus forms an attractive target for structure-based rational drug design of anti-inflammatory molecules. The crystal structure of mouse IP-10 has been determined and reveals a novel tetrameric association. In the tetramer, two conventional CXC chemokine dimers are associated through their N-terminal regions to form a 12-stranded elongated ?-sheet of ?90 Å in length. This association differs significantly from the previously studied tetramers of human IP-10, platelet factor 4 and neutrophil-activating peptide-2. In addition, heparin- and receptor-binding residues were mapped on the surface of IP-10 tetramer. Two heparin-binding sites were observed on the surface and were present at the interface of each of the two ?-sheet dimers. The structure supports the formation of higher order oligomers of IP-10, as observed in recent in vivo studies with mouse IP-10, which will have functional relevance.

  20. ChoiceNet: Toward an Economy Plane for the Internet Tilman Wolf

    E-Print Network [OSTI]

    and services in the Internet in- frastructure itself has been sluggish, especially where eco- nomic incentives in "protocol space." The current Internet reflects certain economic relation- ships, for example between of the economy sur- rounding in-network services. In our work, we aim for an explicit representation of eco

  1. Seamlessly Selecting the Best Copy from InternetWide Replicated Web Servers

    E-Print Network [OSTI]

    Amir, Yair

    that reside at the same site. These architectures improve performance by sharing the load between the standard properties of DNS. . The shared IP address method: This method is implemented at the network became the single largest load on the Internet [1]. Today, practically all of the popular web sites

  2. On the development of Voice over IP

    E-Print Network [OSTI]

    Yang, Xu

    2009-05-15T23:59:59.000Z

    4.3.1. Regulation in a Broadband World..................................167 4.3.2. VoIP Regulation.............................................................173 4.3.3. The Spectrum and Wireless Regulation .........................180 5...

  3. LINEAR COLLIDER TEST FACILITY: TWISS PARAMETER ANALYSIS AT THE IP/POST-IP LOCATION OF THE ATF2 BEAM LINE *

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    LINEAR COLLIDER TEST FACILITY: TWISS PARAMETER ANALYSIS AT THE IP/POST-IP LOCATION OF THE ATF2 BEAM through to the IP, the Twiss parameters need to be measured at the IP or PIP. Up to now, these parameters to extract the Twiss parameters and the emittance thanks to the three coefficients of the fit

  4. Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    analytical models to estimate total costs of key mobility management entities of NEMO. We have presented, mobility management. I. INTRODUCTION To ensure continuous Internet connectivity of net- works in motion. As the next-generation wireless/mobile network will be a unified network based on all-IP technology

  5. Sustainable Internet Architecture PROJECT DESCRIPTION

    E-Print Network [OSTI]

    Kuzmanovic, Aleksandar

    Sustainable Internet Architecture PROJECT DESCRIPTION 1 Introduction The Internet currently plays that the problems in the current Internet architecture stem from its lack of sustainability which impedes future de of challenges. Numerous research studies on a new Internet architecture (e.g., [16, 37, 48, 54, 55]) have

  6. Airborne Internet : market & opportunity

    E-Print Network [OSTI]

    Bhadouria, Anand

    2007-01-01T23:59:59.000Z

    The purpose of this thesis to evaluate the opportunity for service provider entry and of the airborne internet, to analyze the disruptive impact technology used by AirCell and AeroSat has had on the development of an ...

  7. Internet Polling Development Report

    E-Print Network [OSTI]

    Klima, P.; Lockhart, D.; Haberl, J. S.

    2001-01-01T23:59:59.000Z

    This is the final report which documents the development of Internet-based data logger polling. The project consists of two main tasks: the development of automated polling procedures that can be launched remotely with no operator input...

  8. ;-(/'(!,%)97!*',/')!'9!%(+-(%%)-(+!Internet evangelist for

    E-Print Network [OSTI]

    Haller, Gary L.

    pivotal contribution to the creation, design, and implementation of Transmission Control Protocol to share digital data. TCP defines a standard way to package data and send it across the network, while IP handles the address of each packet and ensures that it is delivered to the right destination network

  9. GT: picking up the truth from the ground for Internet traffic F. Gringoli, L. Salgarelli, M. Dusi

    E-Print Network [OSTI]

    California at San Diego, University of

    of Internet traffic modeling, firewall, and intrusion detection research requires traces where some ground. But DPI is ineffective when traffic is encrypted and ambiguous when different protocols exhibit similarGT: picking up the truth from the ground for Internet traffic F. Gringoli, L. Salgarelli, M. Dusi

  10. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  11. A client oriented, IP level redirection mechanism

    E-Print Network [OSTI]

    Gupta, Sumita

    1998-01-01T23:59:59.000Z

    This thesis introduces a new approach for implementing transparent client access to network services. Ever increasing load on the Internet has made it essential to design services that are fast, reliable, easily manageable, transparent to access...

  12. Weaving Measurements Into Internet Protocols and Services Research Statement

    E-Print Network [OSTI]

    Plaisted, David A.

    be fully realized only if the number of monitors needed for completely monitoring a target network and then place monitors at the smallest set of nodes that can collectively monitor a complete target network

  13. Design of a PSi header processor for the internet protocol

    E-Print Network [OSTI]

    Bai, Jinxia

    1995-01-01T23:59:59.000Z

    (Connection Processor number). The content of rb2 is the 32 bit memory address to indicate the memory location of the incoming packet. 7 rtmp ~ rbl k 00000003H;ALU z (~ check 00 "/ (if ALUM == 0 jump Startl) This microinstruction performs the 'And' operation... and checks the ALUM flag. According to the flag the address of the next microinstruction to be executed will be given. This microinstruction says that if the primitive code is 00(ALUM flag is true), it means the next step is to jump back to the address '1...

  14. Wireless Internet for The Mobile Enterprise Consortium http://winmec.ucla.edu/ TECHNICAL REPORT/WHITE PAPER

    E-Print Network [OSTI]

    California at Los Angeles, University of

    . Content delivery will be based on IP networks in which packets of data are used to deliver content-609-MULTICAST-Bband, Nov. 2003. 1 Efficient broadband multi-media data distribution over the Internet using Enterprise Consortium, wireless@winmec.ucla.edu University of California, Los Angeles, 420 Westwood Plaza

  15. Secure Voice over IP conferencing with decentralized group encryption

    E-Print Network [OSTI]

    Kannan, Steven (Steven K.)

    2007-01-01T23:59:59.000Z

    This thesis addresses the development of an end-to-end secure Voice over IP (VoIP) conference system. We are particularly interested in challenges associated with deploying such a system in ad-hoc networks containing low ...

  16. Towards All-IP Wireless Networks: Architectures and Resource Management

    E-Print Network [OSTI]

    Boutaba, Raouf

    Towards All-IP Wireless Networks: Architectures and Resource Management Mechanism Majid Ghaderi-IP network integrating different wireless technologies using IP and its associated service models. The first to facilitate the integration of wireless LAN and 3G cellular networks towards a uniform architecture for all

  17. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  18. July 5 -August 2 (SICCEP and IP-CHINA) July 19 -August 16 (IP-CHINA and SICCEP)

    E-Print Network [OSTI]

    Herrmann, Samuel

    July 5 - August 2 (SICCEP and IP-CHINA) July 19 - August 16 (IP-CHINA and SICCEP) Summer School ................................................................................................. 11 #12;#12;SUMMER SCHOOL 2014 Page 4 SICCEP IP-CHINA-CHINA Introduction to Chinese LawIntroduction to Chinese Law, Institutions, and Politics, Institutions, and Politics Environment, Science, and Society

  19. JC3 Incident Reporting | Department of Energy

    Energy Savers [EERE]

    mission is to be reported. Unauthorized use includes, but is not limited to, port scanning that excessively degrades performance; IP (Internet protocol) spoofing; network...

  20. Adjusting the IP $\\beta$ Functions in RHIC

    E-Print Network [OSTI]

    Wittmer, W; Pilat, F; Ptitsyn, V; Van Zeijts, J

    2004-01-01T23:59:59.000Z

    The beta functions at the IP can be adjusted without perturbation of other optics functions via several approaches. In this paper we describe a scheme based on a vector knob, which assigns fixed values to the different tuning quadrupoles and scales them by a common multiplier. The values for the knob vector were calculated for a lattice without any errors using MADX. Previous studies for the LHC [1] have shown that this approach can meet the design goals. A specific feature of the RHIC lattice is the nested power supply system. To cope with the resulting problems a detailed response matrix analysis has been carried out and different sets of knobs were calculated and compared. The knobs were tested at RHIC during the 2004 run and preliminary results are discussed. Simultaneously a new approach to measure the beam sizes of both colliding beams at the IP, based on the tunability provided by the knobs, was developed and tested.

  1. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

  2. Internet architecture Access networks

    E-Print Network [OSTI]

    access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

  3. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  4. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  5. MSIP: A protocol for efficient handoffs of real-time multimedia sessions in mobile wireless scenarios

    E-Print Network [OSTI]

    Iyer, Sridhar

    infrastructure is to efficiently manage user mobility. Mobility is handled by Mobile IP (at the network layer in this paper, MSIP, is a combination of network and application layer mobility management models reducesMSIP: A protocol for efficient handoffs of real-time multimedia sessions in mobile wireless

  6. Internet Fuel Cells Forum

    SciTech Connect (OSTI)

    Sudhoff, Frederick A.

    1996-08-01T23:59:59.000Z

    The rapid development and integration of the Internet into the mainstream of professional life provides the fuel cell industry with the opportunity to share new ideas with unprecedented capabilities. The U.S. Department of Energy's (DOE's) Morgantown Energy Technology Center (METC) has undertaken the task to maintain a Fuel Cell Forum on the Internet. Here, members can exchange ideas and information pertaining to fuel cell technologies. The purpose of this forum is to promote a better understanding of fuel cell concepts, terminology, processes, and issues relating to commercialization of fuel cell power technology. The Forum was developed by METC to provide those interested with fuel cell conference information for its current concept of exchanging ideas and information pertaining to fuel cells. Last August, the Forum expanded to an on-line and world-wide network. There are 250 members, and membership is growing at a rate of several new subscribers per week. The forum currently provides updated conference information and interactive information exchange. Forum membership is encouraged from utilities, industry, universities, and government. Because of the public nature of the internet, business sensitive, confidential, or proprietary information should not be placed on this system. The Forum is unmoderated; therefore, the views and opinions of authors expressed in the forum do not necessarily state or reflect those of the U.S. government or METC.

  7. IP Kids Page | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)Hydrogen Storage inChangApplicationsof EnergyIP Kids

  8. Tools for primal degenerate linear programs: IPS, DCA, and PE

    E-Print Network [OSTI]

    Jean-Bertrand Gauthier

    2014-10-08T23:59:59.000Z

    Oct 8, 2014 ... Tools for primal degenerate linear programs: IPS, DCA, and PE. Jean-Bertrand Gauthier(jean-bertrand.gauthier ***at*** hec.ca) Jacques ...

  9. Research Study - Global Enterprise VoIP Equipment Market Forecasts...

    Open Energy Info (EERE)

    policy and plan, Enterprise VoIP Equipment product specification, manufacturing process, cost structure etc. Then we deeply analyzed the world's main region market conditions that...

  10. Internet Supplement for Vector Calculus

    E-Print Network [OSTI]

    Jerry Marsden

    2003-10-07T23:59:59.000Z

    Apr 3, 2010 ... Page i. Internet Supplement for Vector Calculus. Fifth Edition. Version: October, 2003. Jerrold E. Marsden. California Institute of Technology.

  11. APS Protocol for

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

  12. Lessons Learned in the Design and Use of IP1 / IP2 Flexible Packaging - 13621

    SciTech Connect (OSTI)

    Sanchez, Mike [VP Global Sales, PacTec, Inc. (United States)] [VP Global Sales, PacTec, Inc. (United States); Reeves, Wendall [National Sales Manager, PacTec, Inc. (United States)] [National Sales Manager, PacTec, Inc. (United States); Smart, Bill [Nuclear Sales Director, PacTec, Inc. (United States)] [Nuclear Sales Director, PacTec, Inc. (United States)

    2013-07-01T23:59:59.000Z

    For many years in the USA, Low Level Radioactive Waste (LLW), contaminated soils and construction debris, have been transported, interim stored, and disposed of, using IP1 / IP2 metal containers. The performance of these containers has been more than adequate, with few safety occurrences. The containers are used under the regulatory oversight of the US Department of Transportation (DOT), 49 Code of Federal Regulations (CFR). In the late 90's the introduction of flexible packaging for the transport, storage, and disposal of low level contaminated soils and construction debris was introduced. The development of flexible packaging came out of a need for a more cost effective package, for the large volumes of waste generated by the decommissioning of many of the US Department of Energy (DOE) legacy sites across the US. Flexible packaging had to be designed to handle a wide array of waste streams, including soil, gravel, construction debris, and fine particulate dust migration. The design also had to meet all of the IP1 requirements under 49CFR 173.410, and be robust enough to pass the IP2 testing 49 CFR 173.465 required for many LLW shipments. Tens of thousands of flexible packages have been safely deployed and used across the US nuclear industry as well as for hazardous non-radioactive applications, with no recorded release of radioactive materials. To ensure that flexible packages are designed properly, the manufacturer must use lessons learned over the years, and the tests performed to provide evidence that these packages are suitable for transporting low level radioactive wastes. The design and testing of flexible packaging for LLW, VLLW and other hazardous waste streams must be as strict and stringent as the design and testing of metal containers. The design should take into consideration the materials being loaded into the package, and should incorporate the right materials, and manufacturing methods, to provide a quality, safe product. Flexible packaging can be shown to meet the criteria for safe and fit for purpose packaging, by meeting the US DOT regulations, and the IAEA Standards for IP-1 and IP-2 including leak tightness. (authors)

  13. Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet

    E-Print Network [OSTI]

    Kravets, Robin

    Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet Invited Paper characteristics that can be leveraged to design energy-efficient loss recovery mechanisms. Given their loss, we first present an analysis of an energy-efficient MAC-layer protocol, called Fast Transmit MAC

  14. Experimental Comparison of Handoff Performance of SIGMA and Mobile IP

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    to be eight seconds which is significantly higher than the six milliseconds handoff latency of SIGMA. The restExperimental Comparison of Handoff Performance of SIGMA and Mobile IP Surendra Kumar Sivagurunathan;1 Experimental Comparison of Handoff Performance of SIGMA and Mobile IP Surendra Kumar Sivagurunathan, Justin

  15. A New Optimum Jitter Protection for Conversational VoIP

    E-Print Network [OSTI]

    Kabal, Peter

    A New Optimum Jitter Protection for Conversational VoIP Qipeng Gong, Peter Kabal Electrical.kabal@mcgill.ca Abstract--In Voice-over-IP, jitter buffers are introduced at both sides of the sender and the receiver to compensate for delay jitters. A longer buffer reduces the possibility of packet loss and packet disorder

  16. Exploiting NIC Architectural Support for Enhancing IP based Protocols on High Performance Networks

    E-Print Network [OSTI]

    Panda, Dhabaleswar K.

    Computer Science and Engineering, The Ohio State University, Columbus, OH 43210¢ jinhy, balaji, panda£ @cis.ohio ¡ ¡ Computer Science and Engineering, The Ohio State University£ jinhy, balaji, panda¤ @cis.ohio of Energy's Grant #DE-FC02-01ER25506, and National Science Foundation's grants #CCR- 0204429, and #CCR

  17. Mashups--Web Web Internet

    E-Print Network [OSTI]

    Mashups-- Web Web 1. Web Internet mashup Wikipedia Mashup web api web Web Internet Mashup public APIs, XML/RSS/Atom feeds, web services, HTML Mashup Web 2.0 Web 2.0 Mashup Web Web Web api eBay, Amazon, Google and Yahoos APIs Mashups Web Mashup Mashup 2. Mashup [2] Mashup

  18. AN INTERACTIVE SPIRES PLOT PROTOCOL

    E-Print Network [OSTI]

    Cerny, Barbara

    2013-01-01T23:59:59.000Z

    LBL-11068 AN INTERACTIVE SPIRES PLOT PROTOCOL Barbara Cerny,11068 PLOT PROTOCOL AN INTERACTIVE by Barbara Cerny, Geraldit gives immediate interactive plots that can be displayed

  19. Constructing Personal Network on the Internet Kenichi Kourai

    E-Print Network [OSTI]

    Chiba, Shigeru

    . ­1­ #12;1 ADSL 2 IP IP IP VPN Secure Socket Layer (SSL)[1] 2 OS OS OS OS DNS IP IP IP 131/resolv.conf FQDN /etc/hosts DHCP setuid 3.3 IP IP OS 2 ­4­ #12;1 3.4 A B 1 2 A B A C B C A 4 Linux SSL 4.1 SSL SSL SSL SSL OpenSSL [4] Linux SSL OpenSSL SSL TCP/IP SSL 2 1 setsockopt SO USE SSL proc SSL TCP connect

  20. IP3 signalling regulates exogenous RNAi in Caenorhabditis elegans

    E-Print Network [OSTI]

    Nagy, Anikó I.; Vázquez-Manrique, Rafael P.; Lopez, Marie; Christov, Christo; Sequedo, María Dolores; Herzog, Mareike; Herlihy, Anna E; Bodak, Maxime; Gatsi, Roxani; Baylis, Howard A.

    2015-01-21T23:59:59.000Z

    second messenger in animals. IP3 is generated by the action of phospholipase C (PLC) in response to a diverse range of extracellular stimuli, including neurotransmitters and hormones acting on G-protein or tyrosine kinase coupled receptors (Fig 1A). IP... to deplete GFP expressed in the body wall muscles using a myo-3p::GFP construct [30, 31] again itr-1 mutants show an increased effect (Fig 1I). PLC-? / EGL-8 mutants show increased RNAi responses IP3 is produced from phosphatidylinositol 4...

  1. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

    2001-11-12T23:59:59.000Z

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  2. An Overview of Internet biosurveillance

    SciTech Connect (OSTI)

    Hartley, David M.; Nelson, Noele P.; Arthur, Ray; Barboza, P.; Collier, Nigel; Lightfoot, Nigel; Linge, J. P.; van der Goot, E.; Mawudeku, A.; Madoff, Lawrence; Vaillant, L.; Walters, Ronald A.; Yangarber, Roman; Mantero, Jas; Corley, Courtney D.; Brownstein, John S.

    2013-06-21T23:59:59.000Z

    Internet biosurveillance utilizes unstructured data from diverse Web-based sources to provide early warning and situational awareness of public health threats. The scope of source coverage ranges from local based media in the vernacular to international media in widely read languages. Internet biosurveillance is a timely modality available to government and public health officials, health care workers, and the public and private sector, serving as a real-time complementary approach to traditional indicator-based public health disease surveillance methods. Internet biosurveillance also supports the broader activity of epidemic intelligence. This review covers the current state of the field of Internet biosurveillance and provides a perspective on the future of the field.

  3. The detailed proposal for ECN and IP: K. K. Ramakrishnan,

    E-Print Network [OSTI]

    Floyd, Sally

    #12;Details of ECN and IP: The IPv4 TOS byte is currently defined as follows. This byte is under +-----+-----+-----+-----+-----+-----+-----+-----+ | PRECEDENCE | TOS | | +-----+-----+-----+-----+-----+-----+-----+-----+ 2 #12;Our proposal is as follows: 0 1

  4. Rate-adaptive H.264 for TCP/IP networks

    E-Print Network [OSTI]

    Kota, Praveen

    2007-09-17T23:59:59.000Z

    While there has always been a tremendous demand for streaming video over TCP/IP networks, the nature of the application still presents some challenging issues. These applications that transmit multimedia data over best-effort networks like...

  5. Indoor experiments of self-organization and localization protocols for hybrid networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    to constitute a wireless testbed and to test any protocol for ad hoc or hybrid networks. I. INTRODUCTION Mobile. Because a source can be not in the radio range of the destination, intermediary nodes must relay on how to provide an efficient hybrid network, connected to the Internet, and test in one scenario

  6. On the Use of Fixed Point Approximations to Study Reliable Protocols over Congested Links

    E-Print Network [OSTI]

    network operation? iii) What are the sustainable values of link utilization without the risk of network control features) over Internet congested links (the bottlenecks). Within this framework the analysis in a general framework, where only some very elementary properties of the protocols and the network come

  7. A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

  8. fragility). A key research problem is distinguishing among laws, protocols, and historical accidents.

    E-Print Network [OSTI]

    Lee, H.C. Paul

    fragility). A key research problem is distinguishing among laws, protocols, and historical frequency and voltag- es of delivered power, oil refineries have 10,000 such control loops, and Internet, terabytes of data, and a billion-dollar price tag. 55. Systems Biology Workbench (www.cds.caltech.edu/ sbw

  9. Multimedia Communications over IP Networks 4-6 September 2000, University of Plymouth

    E-Print Network [OSTI]

    Abu-Rgheff, Mosa Ali

    Multimedia Communications over IP Networks 4-6 September 2000, University of Plymouth (QGWR(QG 4HWZRUN1HWZRUN Mike Buckley Lucent Technologies Multimedia Communications over IP Networks #12;Multimedia Communications over IP Networks 4-6 September 2000, University of Plymouth #12;Multimedia Communications over IP

  10. Analysis of the mouse embryonic stem cell regulatory networks obtained by ChIP-chip and ChIP-PET

    E-Print Network [OSTI]

    Mathur, Divya

    Background: Genome-wide approaches have begun to reveal the transcriptional networks responsible for pluripotency in embryonic stem (ES) cells. Chromatin Immunoprecipitation (ChIP) followed either by hybridization to a ...

  11. White Paper: A Survey of 3D Sync IR Protocols

    E-Print Network [OSTI]

    )..............................................................................................12 Sony Protocol (Standalone emitter

  12. Dynamic, transparent Internet server replication using HYDRANET 

    E-Print Network [OSTI]

    Dillon, Geoffrey A.

    1998-01-01T23:59:59.000Z

    -tolerance through redundancy, since Replicas can continue to function when their Origin Servers are no longer online. HYDRANET accomplishes these objectives by replicating Transport-level Service Access Points (TSAPs) [8] of servers in the operating system of our... modified Repli- cation Server. A modified IP-router provides the client traffic redirection by IP-in-IP tunneling. The use of TSAPs in this scheme allows us to selectively and transpar- ently replicate services from specific hosts without disrupting...

  13. Interactive, Internet Delivery of Visualization via Structured, Prerendered multiresolution Imagery

    E-Print Network [OSTI]

    Bethel, E. Wes; Yoon, Ilmi; Chen, Jerry

    2008-01-01T23:59:59.000Z

    I. Yoon and E. W. Bethel. “Interactive, Internet Delivery ofI. Yoon, E. W. Bethel. “Interactive, Internet Delivery ofFY 2007 Accomplishment Interactive, Internet Delivery of

  14. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  15. The Provision of IP Crossing Angles for the SSC

    SciTech Connect (OSTI)

    Ritson, David M

    2003-07-11T23:59:59.000Z

    Luminosity is to be produced at the SSC collider by crossing with finite angle the counter circulating proton beams at each interaction point (IP). Such a crossing angle introduces unwanted dispersion in the high beta triplet quadrupoles adjacent to the IPs which must be corrected out. they propose to produce variable crossing conditions at each IP with local steering dipoles adjusted to give required slopes and displacements for each IP. The anomalous dispersion introduced by these orbit displacements will be corrected in the arcs (dispersive region) just prior to entry and exit into the IRs with opposite polarity quadrupole pairs separated by 90{sup o} in phase, a late correction scheme. Such pairs cause minimal change to the betatron functions but produce dispersion that can be set to cancel the anomalous dispersion. The IR design is such that the phase advance between correctors and the IP triplet gives efficient full local anomalous dispersion cancellation. The proposed system is to be formed from standard SSC corrector elements and will provide the range of crossing conditions required for collision optics and for separating the beams at injection.

  16. Hydrogen Refueling Protocols Webinar (Text Version) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Refueling Protocols Webinar (Text Version) Hydrogen Refueling Protocols Webinar (Text Version) Below is the text version of the webinar titled "Hydrogen Refueling Protocols,"...

  17. Diploma in Internet Business Technology Looking for a Career in Internet Business? ........................................... 2

    E-Print Network [OSTI]

    Barthelat, Francois

    Diploma in Internet Business Technology Contents Looking for a Career in Internet Business? ........................................... 2 How can a McGill Program prepare you for a career in Internet Business the right to change this information at any time. #12;2 Looking for a Career in Internet Business? Since

  18. Geo-Engineering through Internet Informatics (GEMINI)

    SciTech Connect (OSTI)

    Doveton, John H.; Watney, W. Lynn

    2003-03-06T23:59:59.000Z

    The program, for development and methodologies, was a 3-year interdisciplinary effort to develop an interactive, integrated Internet Website named GEMINI (Geo-Engineering Modeling through Internet Informatics) that would build real-time geo-engineering reservoir models for the Internet using the latest technology in Web applications.

  19. Internet video streaming using 3-D SPIHT

    E-Print Network [OSTI]

    Jiang, Jianhong

    2001-01-01T23:59:59.000Z

    Internet video streaming is a new way of distributing video over the Internet. It is an important component of Internet multimedia. Due to the increasing demand of multimedia on the World Wide Web, it has experienced explosive growth in the last...

  20. OPI InternshIP FIeld Placement and lIcensure

    E-Print Network [OSTI]

    Dratz, Edward A.

    OPI InternshIP handbOOk FIeld Placement and lIcensure cOllege OF ehhd mOntana state unIversIty 247 Form 4. Planning Sheet 5. OPI Application These items can be found at http://www.montana.edu/fieldplacement/. Click the "OPI Internship" box. An intern must complete the program within three (3) years. If an intern

  1. Distributed Network Monitoring with Bounded Link Utilization in IP Networks

    E-Print Network [OSTI]

    Li, Li Erran

    1 Distributed Network Monitoring with Bounded Link Utilization in IP Networks Li Li Center multiple pollers located at different points in the network. However, using distributed pollers could for Networking Research Lucent Bell Labs erranlli@dnrc.bell-labs.com Marina Thottan Center for Networking

  2. Virtual Routers: A Tool for Emulating IP Routers Florian Baumgartner

    E-Print Network [OSTI]

    Braun, Torsten

    an intermediate approach based on the emulation of IP routers and evaluates the concept. In a first set of ex by the well known network simulator ns. 1 Introduction The strengths and drawbacks of network simulators, like the ns network simulator [9] or Opnet [10], in general lie in the use of a mathematical model to simulate

  3. A new method to discriminate between a valid IP response and EM coupling effects

    E-Print Network [OSTI]

    Schlindwein, Fernando S.

    contaminants on the IP response. IP is used extensively in the search for precious metals by map- ping areas-cluster (sul- phide) minerals, so it is appropriate to consider the common characteristics of the Cole

  4. Identification of Transcription Factor Binding Sites Derived from Transposable Element Sequences Using ChIP-seq

    E-Print Network [OSTI]

    Jordan, King

    unnoticed using conservation screens. Here, we describe a simple pipeline method for using data generated through ChIP-seq to identify TE-derived TFBS. Key words: Transposable elements, ChIP-seq, gene regulation

  5. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Energy Savers [EERE]

    107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am...

  6. Internet Data logging and Display 

    E-Print Network [OSTI]

    Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

    2001-01-01T23:59:59.000Z

    InterDAQ Research Team. December 2001, Final Report Energy Systems Laboratory, Texas A&M University IEEE Instrumentation and Measurement Technology Conference Budapest, Hungary, May 21-23, 2001 An Internet Based Power Measurement Technique M. Yeary1, B...-time monitoring and dynamic thermal rating of power transmission circuits," IEEE Transactions on Power Delivery, vol. 11, no. 3, pp. 1407-1418, 1996. [6] A. Belardinelii, G. Palagi, R. Bedini, A. Ripoli, V. Macellari, D. Franchi, "Advanced technology for personal...

  7. Performance Evaluation of IP Paging with Power Save Mechanism Ved Kafle, Sangheon Pack and Yanghee Choi

    E-Print Network [OSTI]

    and power management functions. 1. Introduction The future IP mobile nodes are expected to change project of the Ministry of Science and Technology, 2003, Korea. 2. IIPP Overview We take the Mobile IP to the Mobile IP regional registration, the IIPP significantly reduces the average power consumption of a mobile

  8. sics-logo kth-logo Real issues within IP voice communication

    E-Print Network [OSTI]

    sics-logo kth-logo Real issues within IP voice communication (with short SICS intro) Ian Marsh FEUP, February 2009 Ian Marsh Real issues within IP voice communication (with short SICS int #12;sics-logo kth-logo About SICS Ian Marsh Real issues within IP voice communication (with short SICS int #12;sics-logo kth-logo

  9. SLCA/IP power alternative screening method (SPASM)

    SciTech Connect (OSTI)

    Palmer, S.C. [USDOE Western Area Power Administration, Salt Lake City, UT (United States). Salt Lake City Area Office]|[Argonne National Lab., IL (United States); Ancrile, J.D. [Argonne National Lab., IL (United States)

    1995-03-01T23:59:59.000Z

    This report describes the SLCA/IP Power Alternative Screening Method (SPASM), which was used to screen 784 possible combinations of electric power marketing alternatives and dam operational scenarios to provide a representative range for analysis in the Western Area Power Administration Salt Lake City Area Integrated Projects (SLCA/IP) Electric Power Marketing Environmental Impact Statement (EIS). Each combination consists of one energy and capacity commitment level and one operational scenario for each of the hydroelectric facilities at Glen Canyon Dam, Flaming Gorge Dam, and the Aspinall Unit. The total annual cost to the SLCA/IP firm power customers of each of the 784 combinations is estimated and included in a relative frequency distribution. A relative frequency distribution is also generated for each marketing alternative. The number of combinations is reduced to 12 by taking the mean value and endpoint value for each of four marketing alternatives. Some minor deviations from this procedure, which are made for political purposes, are explained. 9 figs., 14 tabs.

  10. Corporate Governance, the Environment, and the Internet

    E-Print Network [OSTI]

    Andrew, Jane

    2003-01-01T23:59:59.000Z

    contemporary society: Corporate governance at a crossroads.R. (1997). A survey of corporate governance. The Journal ofCorporate Governance, the Environment, and the Internet Jane

  11. Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Internet Clients AbdelRahman M. Abdou Carleton University, Ottawa Email: abdou@sce.carleton.ca Ashraf

  12. Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.

    SciTech Connect (OSTI)

    Tolendino, Lawrence F.; Hu, Tan Chang

    2005-06-01T23:59:59.000Z

    The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

  13. Mensuration protocol National Forest Inventory

    E-Print Network [OSTI]

    NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

  14. Graduate Certificate in Internet Business Looking for a Career in Internet Business?

    E-Print Network [OSTI]

    Pientka, Brigitte

    1 Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since growth, hence a demand for experts who know how to effectively analyze and manage a business with the appropriate internet technology. Small to large-sized businesses require professionals who are able to design

  15. 282 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 3, MARCH 2001 Streaming Video over the Internet: Approaches

    E-Print Network [OSTI]

    Peha, Jon M.

    on this field, we cover six key areas of streaming video. Specifically, we cover video compression, application research directions. Index Terms--Application-layer QoS control, continuous media distribution services, Internet, protocol, streaming video, streaming server, synchronization, video compression. I. INTRODUCTION

  16. Analyzing the Dynamics of Chemical Networking Protocols

    E-Print Network [OSTI]

    Vetter, Thomas

    from several well-established fields, such as model linearization proposed in Metabolic Control congestion control protocol and highlight formerly unknown protocol features. Keywords: dynamic analysis;1 Introduction Predicting and controlling the dynamics of communication protocols are difficult but important

  17. POLICIES & PROCEDURES Legal Disclaimers for CSUN Internet

    E-Print Network [OSTI]

    Cohen, Randy W.

    /data lines. e. Limitation of Liability: This disclaimer of liability applies to any general, special and Conditions of Use CSUN Internet Sites Endorsements General Liability Limitation of Liability Disclaimer, or organizations. d. General Liability: The materials on CSUN's Internet site are provided "as is" and without

  18. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly February 2007 #12;X-Force® Threat Insight Monthly > February 2007 www.iss.netwww.iss.net About this report

  19. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net June 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly June 2007 #12;X-Force® Threat Insight Monthly > June 2007 www.iss.netwww.iss.net About this report

  20. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net May 2007 #12 The Emerging Threat Landscape . . . . . . . . . . . . . . . . . . . . . . . . 2 Mobile Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly May

  1. Time for a "Greener" Internet Mario Baldi

    E-Print Network [OSTI]

    Baldi, Mario

    , electronic components and cooling sub-systems deployed in various parts of the system. One important source that the Internet traffic will continue to grow exponentially for the foreseeable future, which will require ever as video) there is a huge potential for decreasing future Internet energy requirements by synchronizing

  2. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  3. An Intermittent Energy Internet Architecture Barath Raghavan

    E-Print Network [OSTI]

    Shenoy, Prashant

    -design the Internet for an energy- constrained future powered by diffuse, intermittent, and expensive power sources's energy infrastructure and will likely include significant de- ployment of intermittent renewable energyAn Intermittent Energy Internet Architecture Barath Raghavan ICSI David Irwin UMass Jeannie

  4. Robust multipartite multilevel quantum protocols

    SciTech Connect (OSTI)

    Nihira, Hideomi; Stroud, C.R. Jr. [The Institute of Optics, University of Rochester, Rochester, New York 14627 (United States)

    2005-08-15T23:59:59.000Z

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  5. Unraveling Internet identities : accountability & anonymity at the application layer

    E-Print Network [OSTI]

    Wolff, Josephine Charlotte Paulina

    2012-01-01T23:59:59.000Z

    Both anonymity and accountability play crucial roles in sustaining the Internet's functionality, however there is a common misconception that increasing the anonymity of Internet identities necessitates diminishing their ...

  6. Hydranet: network support for scaling of large scale servic es

    E-Print Network [OSTI]

    Chawla, Hamesh

    1998-01-01T23:59:59.000Z

    With the explosive growth of demand for services on the Internet, the networking infrastructure (routers 7 protocols, servers) is under considerable stress. Mechanisms are needed for current and future IP services to scale in a client transparent...

  7. Minute of proceedings from the IP, Competition and Human Rights conference 

    E-Print Network [OSTI]

    Waelde, Charlotte

    Minute of proceedings from the IP, Competition and Human Rights conference, chaired by Waelde and Brown. The meeting was held in Edinburgh during 2004....

  8. SURVIVABLE COMPOSITE-LINK IP NETWORK DESIGN WITH OSPF ROUTING

    E-Print Network [OSTI]

    Resende, Mauricio G. C.

    ,A), where N is the set of routers, A is the set of potential arcs where capacity can be installed protocol in a no-failure or any single arc failure situation there is enough installed capacity to move all of the demand and the total cost of the installed capacity is minimized. For routing purposes, we assume

  9. OECD Internet Economy Outlook 2012 Access the complete publication at

    E-Print Network [OSTI]

    Weske, Mathias

    From: OECD Internet Economy Outlook 2012 Access the complete publication at: http://dx.doi.org/10 and development", in OECD Internet Economy Outlook 2012, OECD Publishing. http://dx.doi.org/10 of international law. #12;OECD Internet Economy Outlook © OECD 2012 63 Chapter 2 Internet trends and development

  10. Modulate Internet Radio Into FM Using GNU Radio

    E-Print Network [OSTI]

    Yu, Chansu

    1 Modulate Internet Radio Into FM Using GNU Radio By: Elie Salameh Outline. · Fm in gnu radio · Audio Streams in Internet Radio · Gnu & Audio Files · Sox command · Playlist ".pls" · Recording internet radio #12;2 Project description · Using gnu radio to modulate internet radio into fm. · Using usrp

  11. Finding order in a contentious Internet

    E-Print Network [OSTI]

    Sowell, Jesse H., II (Jesse Horton)

    2015-01-01T23:59:59.000Z

    This inquiry started with the simple question, "Who manages the Internet infrastructure and how?" Since, this question evolved into an evaluation of the routing system and the institutions that manage it. This institutional ...

  12. Ricci Curvature of the Internet Topology

    E-Print Network [OSTI]

    Ni, Chien-Chun; Gao, Jie; Gu, Xianfeng David; Saucan, Emil

    2015-01-01T23:59:59.000Z

    Analysis of Internet topologies has shown that the Internet topology has negative curvature, measured by Gromov's "thin triangle condition", which is tightly related to core congestion and route reliability. In this work we analyze the discrete Ricci curvature of the Internet, defined by Ollivier, Lin, etc. Ricci curvature measures whether local distances diverge or converge. It is a more local measure which allows us to understand the distribution of curvatures in the network. We show by various Internet data sets that the distribution of Ricci cuvature is spread out, suggesting the network topology to be non-homogenous. We also show that the Ricci curvature has interesting connections to both local measures such as node degree and clustering coefficient, global measures such as betweenness centrality and network connectivity, as well as auxilary attributes such as geographical distances. These observations add to the richness of geometric structures in complex network theory.

  13. On the internet grouping for reliable multicasting

    E-Print Network [OSTI]

    Ghanem, Mohamed M.

    1996-01-01T23:59:59.000Z

    ON THE INTERNET GROUPING FOR RELIABLE MULTICASTING A Thesis by MOHAMED M. GHANEM Submitted to the Office of Graduate Studies of Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE May 1996... Major Subject: Computer Science ON THF, INTERNET GROUPING I'OR RELIABLE MULTICASTING A Thesis by MOHAMED M. GHANEM Submitted to Texas ASM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved...

  14. Algorithms for Large-Scale Internet Measurements

    E-Print Network [OSTI]

    Leonard, Derek Anthony

    2012-02-14T23:59:59.000Z

    - works, allow scanning rates that achieve coverage of the Internet in minutes/hours (rather than weeks/months), and significantly reduce administrator complaints. Us- ing IRLscanner and 24-hour scan durations, we perform 20 Internet-wide experi- ments... valuable experimental data in the future with significantly fewer hurdles. iv We finally turn our attention to Intrusion Detection Systems (IDS), which are often tasked with detecting scans and preventing them; however, it is currently un- known how...

  15. U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected application to crash.

  16. Accepted to International Journal of Internet Protocol Technology (Accepted Sep 24, 2009)

    E-Print Network [OSTI]

    California at Los Angeles, University of

    , Los Angeles, CA 90095 Abstract High volume, high speed, and heterogeneous inbound and outbound data format are characteristics of RFID-based Automatic Identification Data Capture infrastructure. Due. A "store and forward" and rule-based subscription integration methodology to streamline RFID data

  17. ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP

    E-Print Network [OSTI]

    , Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton, and Mark Rooks of L-1 Identity Solutions (formerly of Booz Allen Hamilton), the guide examines the differences between IPv4 and IPv6

  18. H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To: CongestionDevelopment ofofthePerformanceof EnergyH-35 DOE-H-__

  19. 9/10/2002 Internet/Grid Computing -Fall 2002 1 What is Performance for Internet/Grid Computation?

    E-Print Network [OSTI]

    Browne, James C.

    - Fall 2002 7 What is Performance for Internet/Grid Computation? Relative Speed/Cost of Computation is Performance for Internet/Grid Computation? Speed up for distributed parallel execution 1. Parallelizability9/10/2002 Internet/Grid Computing - Fall 2002 1 What is Performance for Internet/Grid Computation

  20. BH-2 Mainframe Chassis 65-0200 IP-2 Iontophoresis Pump Module 65-0203

    E-Print Network [OSTI]

    BH-2 Mainframe Chassis 65-0200 IP-2 Iontophoresis Pump Module 65-0203 PPM-2 Pneumatic Pump Module Module ..............6 MS-2 Power Supply ..........................................6 IP-2 Pump Module ..............................................7-8 PPM-2 Pneumatic Pump Module ..........................9 Recommended Setup Procedure

  1. NLEL-MAAT at CLEF-IP Santiago Correa, Davide Buscaldi, Paolo Rosso.

    E-Print Network [OSTI]

    Rosso, Paolo

    NLEL-MAAT at CLEF-IP Santiago Correa, Davide Buscaldi, Paolo Rosso. NLE Lab, ELiRF Research Group, DSIC, Universidad Politécnica de Valencia, Spain. {scorrea, dbuscaldi, prosso}@dsic.upv.es http://users.dsic.upv.es/grupos/nle Abstract. This report presents the work carried out at NLE Lab for the IP@CLEF-2009 competition. We adapted

  2. 9.IP.002.5.en.do Item 5: Obs

    E-Print Network [OSTI]

    Wauben, Wiel

    latter Vaisala stitute ng the sensor port. 9-IP/2 #12;AMOFSG/9-IP/2 - 2 - 2. SOLUTION AND EVALUATION 2 KNMI decide OR at civil ai International forward scatte used for visib ficant reductio r sensors hav forecasting a EOROLOG FORWARD (Present SU s in the meteo er sensors hav ts in the meas nsor firmwar es

  3. Active Measurement and Time-Domain Characterization of IP Packet Jitter

    E-Print Network [OSTI]

    Bregni, Stefano

    Active Measurement and Time-Domain Characterization of IP Packet Jitter Stefano Bregni, Senior depends sig- nificantly on the statistics of packet jitter, thus yielding a growing interest for real data measurement. We developed an experimen- tal setup to measure IP packet jitter by active probing, aiming

  4. 8 Research Activities 2012 CiRA: Center for iPS Cell Research and Application

    E-Print Network [OSTI]

    Takada, Shoji

    cutting-edge translational stem cell research in its laboratory in New York City and supporting research cells into iPS cells, especially in finding four initialization factor for establishing mouse iPS cells Embryonic and Adult Fibroblast Cultures by Defined Factors", which is a key research paper detailing

  5. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates

    E-Print Network [OSTI]

    Yuan, Xin

    Chandrashekar University of Minnesota jaideepc@cs.umn.edu Abstract-- The Distributed Denial of Services (DDoS. INTRODUCTION Distributed Denial of Service (DDoS) attacks pose an in- creasingly grave threat to the Internet, as evidenced by recent DDoS attacks mounted on both popular Internet sites [12] and the Internet infrastructure

  6. A PANCHROMATIC VIEW OF THE RESTLESS SN 2009ip REVEALS THE EXPLOSIVE EJECTION OF A MASSIVE STAR ENVELOPE

    E-Print Network [OSTI]

    Friedman, Andrew Samuel

    The double explosion of SN 2009ip in 2012 raises questions about our understanding of the late stages of massive star evolution. Here we present a comprehensive study of SN 2009ip during its remarkable rebrightenings. ...

  7. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  8. DISTRIBUTED SHORTESTPATH PROTOCOLS TIMEDEPENDENT NETWORKS

    E-Print Network [OSTI]

    Orda, Ariel

    DISTRIBUTED SHORTEST­PATH PROTOCOLS for TIME­DEPENDENT NETWORKS Ariel Orda Raphael Rom+ Department and the dynamic behavior of networks, since a distributed solution enables constant tracking of changes 32000 October 1992 Revised May 1994, October 1995 ABSTRACT This paper addresses algorithms for networks

  9. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

  10. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

  11. Terrestrial Carbon Observations: Protocols for Vegetation Sampling

    E-Print Network [OSTI]

    GTOS GTOS 55 Terrestrial Carbon Observations: Protocols for Vegetation Sampling and Data Submission Shashi Verma #12;(intentionally blank) #12;Terrestrial Carbon Observations: Protocols for Vegetation Forestry University, Bejing 100083, China 5 University of Wisconsin, Milwaukee, WI 6 Microsoft Research

  12. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  13. Statistical Estimation of Quantum Tomography Protocols Quality

    E-Print Network [OSTI]

    Yu. I. Bogdanov; G. Brida; M. Genovese; S. P. Kulik; E. V. Moreva; A. P. Shurupov

    2010-02-18T23:59:59.000Z

    A novel operational method for estimating the efficiency of quantum state tomography protocols is suggested. It is based on a-priori estimation of the quality of an arbitrary protocol by means of universal asymptotic fidelity distribution and condition number, which takes minimal value for better protocol. We prove the adequacy of the method both with numerical modeling and through the experimental realization of several practically important protocols of quantum state tomography.

  14. Automated Eye-Movement Protocol Analysis

    E-Print Network [OSTI]

    Salvucci, Dario D.

    Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

  15. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et étudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  16. CtIP tetramer assembly is required for DNA-end resection and repair

    E-Print Network [OSTI]

    Davies, Owen R.; Forment, Josep V.; Sun, Meidai; Belotserkovskaya, Rimma; Coates, Julia; Galanty, Yaron; Demir, Mukerrem; Morton, Christopher; Rzechorzek, Neil; Jackson, Stephen P.; Pellegrini, Luca

    2015-01-05T23:59:59.000Z

    1     CtIP tetramer assembly is required for DNA-end resection and repair Owen R. Davies1,4*, Josep V. Forment1,2,3*, Meidai Sun1, Rimma Belotserkovskaya1,2, Julia Coates1,2, Yaron Galanty1,2, Mukerrem Demir1,2, Christopher Morton1... that a CtIP tetramer architecture is essential for effective DSB repair by homologous recombination. Keywords CtIP/RBBP8, double-strand DNA break repair, DNA-end resection, gene conversion, homologous recombination. 3...

  17. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01T23:59:59.000Z

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  18. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01T23:59:59.000Z

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  19. National Clean Energy Business Plan Competition: Energy Internet...

    Energy Savers [EERE]

    100,000. Energy Internet has developed a new approach and solution to address cyber and control challenges facing the power grid with a decentralized, autonomous, Internet-like...

  20. POLITICAL ADMINISTRATIONS ON THE INTERNET: WHAT KIND OF TERRITORIAL NETWORK

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    POLITICAL ADMINISTRATIONS ON THE INTERNET: WHAT KIND OF TERRITORIAL NETWORK REPRESENTATION will try to represent an embryo of the administration network pattern. We start by considering the point the elements which constitute it. KEYWORDS Political administration, hypertext, internet, network, link

  1. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19T23:59:59.000Z

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  2. 28 BIts&ChIps 17 november 2005 Energetiq Technology heeft een licht-

    E-Print Network [OSTI]

    Cambridge, University of

    28 · BIts&ChIps · 17 november 2005 Energetiq Technology heeft een licht- bron gelanceerd voor extreem ultravi- olet (EUV) metrologie. Deze Electrode- less Z-Pinch EUV-source, of EQ-10M, genereert EUV

  3. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  4. Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    requirements by users on other online applications, VoIP users may also request privacy protection relay proxies. An AON accepts k flows in and produces k flows out. The flows out are differently encoded

  5. Combining Routing and Traffic Data for Detection of IP Forwarding Anomalies

    E-Print Network [OSTI]

    Roughan, Matthew

    Monitoring, C.4 Reliability, availability, and serviceability. General Terms: Algorithms, Management, Reliability. Keywords: Network anomaly detection, routing, BGP, traffic, SNMP. ABSTRACT IP forwarding anomalies, triggered by equipment failures, imple- mentation bugs, or configuration errors, can

  6. Network-based IP packet loss importance model for H.264 SD videos

    E-Print Network [OSTI]

    Chang, Y.L.; Lin, T.L.; Cosman, P C

    2010-01-01T23:59:59.000Z

    for pre-encoded compressed video. IEEE Signal Processingon Circuits and System/or Video Technology, July 2003. [13]of TS and IP packets in each video by frame type. Actual VQM

  7. Monitoring and Early Warning for Internet Worms

    E-Print Network [OSTI]

    Xu, Shouhuai

    an effective early warning system. Based on epidemic models and observation data of a fast-spreading worm, we a worm monitoring and early warning system. In addition, by collecting more complete data on the worm1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley

  8. Monitoring and Early Warning for Internet Worms

    E-Print Network [OSTI]

    Shenoy, Prashant

    monitoring and early warning system. In this paper, we propose effective algorithms for early detectionMonitoring and Early Warning for Internet Worms Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don warning system. In order to detect an unknown (zero-day) worm, a straight- forward way is to use various

  9. Monitoring and Early Warning for Internet Worms

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    of these worms calls for a worm monitoring and early warning system. In this paper we propose the effective algorithms for early warning of the presence of a worm and the correspondent monitoring system. Based1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley

  10. International Conference on INTERNET TECHNOLOGIES AND APPLICATIONS

    E-Print Network [OSTI]

    Davies, John N.

    ), will be held in Wrexham, North East Wales, UK from Wednesday 7th to Friday 9th September 2005. The conferenceInternational Conference on INTERNET TECHNOLOGIES AND APPLICATIONS ITA 05 Wednesday 7th - Friday 9 computing and engineering. Accepted papers will be published in the conference proceedings. Suitable topics

  11. ADAPTIVE MULTIMEDIA TRANSMISSION OVER THE INTERNET

    E-Print Network [OSTI]

    Bouras, Christos

    Chapter 20 ADAPTIVE MULTIMEDIA TRANSMISSION OVER THE INTERNET CHRISTOS BOURAS and APOSTOLOS GKAMAS that are available to multimedia applications can be modified very quickly. Multimedia applications must have to multimedia applications, we can use techniques both at the network and application layers. Adaptive

  12. Language of the Internet NAOMI S. BARON

    E-Print Network [OSTI]

    Carlini, David

    processing to facilitate working on the Internet and the World Wide Web (1.3) Section 2 Linguistic Issues for Communicating via the Web 1 As with so many aspects of the computing world, the nature of the language of this chapter. #12;2 summarize the types of Web coding systems (4.1) present an overview of Web markup languages

  13. Using Google Earth for Internet GIS 

    E-Print Network [OSTI]

    Henry, Andrew

    2009-11-26T23:59:59.000Z

    The goal of this research is to investigate the potential of using Google Earth for Internet GIS applications. The study specifically examines the use of vector and attribute data and the potential of displaying and processing this data in new ways...

  14. LITERATURE SEARCH TUTORIAL Open Internet Browser

    E-Print Network [OSTI]

    Dratz, Edward A.

    ://www.ncbi.nlm.nih.gov/entrez/query.fcgi · To search PubMed--fill in search box enter search terms, or enter author name, or journal titles--see instructions written below search box. To obtain detailed instructions on how to enter items, click on blueLITERATURE SEARCH TUTORIAL · Open Internet Browser · Go to http

  15. The Linux Command Line Second Internet Edition

    E-Print Network [OSTI]

    Dahl, David B.

    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book #12....................................................................................................xvi Why Use The Command Line to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo

  16. Hierarchical Infrastructure for Internet Mapping Services

    E-Print Network [OSTI]

    Samet, Hanan

    locally. We investigate this opportunity for further improvement in providing the client with map data access to remote spatial databases adopted by numerous web-based mapping service vendors (e.g., MapChapter 1 Hierarchical Infrastructure for Internet Mapping Services Frantisek Brabec and Hanan

  17. NLEL-MAAT at CLEF-IP Santiago Correa and Davide Buscaldi and Paolo Rosso

    E-Print Network [OSTI]

    Rosso, Paolo

    NLEL-MAAT at CLEF-IP Santiago Correa and Davide Buscaldi and Paolo Rosso NLE Lab, ELiRF Research Group, DSIC, Universidad Polit´ecnica de Valencia, Spain. {scorrea, dbuscaldi, prosso}@dsic.upv.es http://users.dsic.upv.es/grupos/nle Abstract. This report presents the work carried out at NLE Lab for the CLEF-IP 2009 competition. We adapted

  18. Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking

    E-Print Network [OSTI]

    Dube, Raghav

    2005-02-17T23:59:59.000Z

    DENIAL OF SERVICE ATTACKS: PATH RECONSTRUCTION FOR IP TRACEBACK USING ADJUSTED PROBABILISTIC PACKET MARKING A Thesis by RAGHAV DUBE Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE December 2004 Major Subject: Electrical Engineering DENIAL OF SERVICE ATTACKS: PATH RECONSTRUCTION FOR IP TRACEBACK USING ADJUSTED PROBABILISTIC PACKET MARKING A Thesis by RAGHAV DUBE Submitted to Texas A&M University...

  19. US-Wissenschaftler entwickelte neuen ,,Porno-Blocker" frs Internet

    E-Print Network [OSTI]

    Wang, James Z.

    US-Wissenschaftler entwickelte neuen ,,Porno-Blocker" fürs Internet Darmstadt (dpa) - US-Wissenschaftler wollen künftig Computer-Kids beim Surfen durchs Internet mit einem neuartigen ,,Porno-Blocker" am Zugriff hatten lediglich Internet-Inhalte nach bestimmten Worten wie ,,Sex", ,,Porno", ,,Erotik" und anderen

  20. Assessing the Security of a CleanSlate Internet Architecture

    E-Print Network [OSTI]

    Assessing the Security of a Clean­Slate Internet Architecture Gowtham Boddapati # John Day designed a clean­slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without clean­ slate internet architectures. Our own investigations into the fundamental principles

  1. PERCEPTUAL EFFECTS OF PACKET LOSS ON H.264/AVC ENCODED VIDEOS Fadi Boulos

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    PERCEPTUAL EFFECTS OF PACKET LOSS ON H.264/AVC ENCODED VIDEOS Fadi Boulos , Benoît Parrein, Patrick.hands@bt.com ABSTRACT Video communication over IP (Internet Protocol) networks has grown significantly in recent years. However, the Qual- ity of Experience (QoE) associated with video over IP can vary

  2. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    SciTech Connect (OSTI)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27T23:59:59.000Z

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

  3. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01T23:59:59.000Z

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  4. Office Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National Idling ReductionOffice Protocols

  5. House Simulation Protocols (Building America Benchmark) - Building...

    Energy Savers [EERE]

    House Simulation Protocols. See an example of this Top Innovation in action. Find more case studies of Building America projects across the country that utilize House Simulation...

  6. Waimairi Clinic Policies, Procedures and Protocols

    E-Print Network [OSTI]

    Hickman, Mark

    Waimairi Clinic Policies, Procedures and Protocols July 2010 College of Education #12;Table The Facilities............................................................................2 Booking a Clinic room ............................................................................................... 3 Access to Clinics.......................................................................3

  7. Estimating Pedestrian Accident Exposure: Protocol Report

    E-Print Network [OSTI]

    Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

    2007-01-01T23:59:59.000Z

    A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

  8. Internet public information for fuel cells

    SciTech Connect (OSTI)

    Sudhoff, F.A. [Dept. of Energy, Morgantown, WV (United States)

    1995-08-01T23:59:59.000Z

    The rapid development and integration of the Internet into the mainstream of professional life provide the fuel cell industry with the opportunity to share new ideas with unprecedented capabilities. The U.S. Department of Energy`s Morgantown Energy Technology Center (METC) has undertaken the task to provide a service where current fuel cell descriptions and information are available to customers, manufactures, academia, and the general public. METC has developed a Fuel Cell Forum where members can exchange ideas and information pertaining to fuel cell technologies using the Internet. Forum membership is encouraged from utilities, industry, universities, and Government. Because of the public nature of the Internet, business sensitive, confidential, or proprietary information should not be placed on this system. The views and opinions of authors expressed in the forum do not necessarily state or reflect those of the U.S. Government or METC. METC, has endeavored to develop a World Wide Web (WWW) location committed to the description and development of the fuel cell. Netscape or compatible software provides access to the METC Homepage. The user then selects Advanced Power Systems, then Fuel Cells. Fuel cell overview and description is followed by a presentation of the fuel cell system characteristics and advantages. Descriptions of major fuel cell projects are provided in the FACTS section. Finally, as a service to METC customers, the homepage provides a calendar and points of contact. Updates to the WWW location are occasionally made revealing current technical advances in fuel cells. In the continuing effort to further improve public knowledge and perception of fuel cell power generation, METC has created two new modes of communication using the Internet.

  9. From Exogenous to Endogenous Networks: Internet Applications

    E-Print Network [OSTI]

    D'Ignazio, Alessio; Giovannetti, Emanuele

    2006-03-14T23:59:59.000Z

    incentive to deviate, will also find a lower incentive to implement a punishment for a possible deviant from the co-operative agreement. A possible escape from such a paradox may be found in the construction of more articulate punishment strategies, able... of the community 32 of internet users, calculated by taking into account the quality of interconnection between them. Formally, ?? ??? ? = +? iii npp ,? . The costs borne by a provider, instead, are assumed to increase with the number of both its users...

  10. Security Survey of Internet Browsers Data Managers

    E-Print Network [OSTI]

    Boja, Catalin

    2011-01-01T23:59:59.000Z

    The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

  11. Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and

    E-Print Network [OSTI]

    Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) plus a Comparison Population in Sierra Vista, Arizona The protocol Assessment of Case Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) and a Reference

  12. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  13. Security incidents on the Internet, 1989--1995

    SciTech Connect (OSTI)

    Howard, J.D.

    1995-12-31T23:59:59.000Z

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  14. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

  15. Protocol Number: (IBC office use only)

    E-Print Network [OSTI]

    Asaithambi, Asai

    Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

  16. Safe Operating Procedure SAFETY PROTOCOL: Rb-86

    E-Print Network [OSTI]

    Farritor, Shane

    of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

  17. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  18. aware multicast protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Switching) technology is the solution to the performance requirements of the next generation IP core networks. Unfortunately, the existing architecture for MPLS ignores...

  19. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect (OSTI)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15T23:59:59.000Z

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  20. Router-level community structure of the Internet Autonomous Systems

    E-Print Network [OSTI]

    Beiró, Mariano G; Alvarez-Hamelin, J Ignacio

    2015-01-01T23:59:59.000Z

    The Internet is composed of routing devices connected between them and organized into independent administrative entities: the Autonomous Systems. The existence of different types of Autonomous Systems (like large connectivity providers, Internet Service Providers or universities) together with geographical and economical constraints, turns the Internet into a complex modular and hierarchical network. This organization is reflected in many properties of the Internet topology, like its high degree of clustering and its robustness. In this work, we study the modular structure of the Internet router-level graph in order to assess to what extent the Autonomous Systems satisfy some of the known notions of community structure. We show that the modular structure of the Internet is much richer than what can be captured by the current community detection methods, which are severely affected by resolution limits and by the heterogeneity of the Autonomous Systems. Here we overcome this issue by using a multiresolution d...

  1. NOAA Fisheries Protocols For Sea Scallop Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Sea Scallop Dredge Surveys January 7, 2004 Prepared by: Members..................................................................................................................................... 5 NOAA Fisheries Sea Scallop Dredge Survey Protocols............................................................................................................................. 10 Changes to Regional Scallop Dredge Protocols

  2. Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg is to create distributed protocols that reduce the uncertainty by distributing the knowledge of the network anonymous networks. Keywords: Anonymous networks, directed networks, distributed protocols. 1 Introduction

  3. The regulation of internet interconnection : assessing network market power

    E-Print Network [OSTI]

    Maida, Elisabeth M. (Elisabeth Marigo)

    2013-01-01T23:59:59.000Z

    Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, ...

  4. Packet flow monitoring tool and method

    DOE Patents [OSTI]

    Thiede, David R [Richland, WA

    2009-07-14T23:59:59.000Z

    A system and method for converting packet streams into session summaries. Session summaries are a group of packets each having a common source and destination internet protocol (IP) address, and, if present in the packets, common ports. The system first captures packets from a transport layer of a network of computer systems, then decodes the packets captured to determine the destination IP address and the source IP address. The system then identifies packets having common destination IP addresses and source IP addresses, then writes the decoded packets to an allocated memory structure as session summaries in a queue.

  5. Network Upgrade for the SLC: Control System Modifications

    SciTech Connect (OSTI)

    Crane, M.; Mackenzie, R.; Sass, R.; Himel, T.; /SLAC

    2011-09-09T23:59:59.000Z

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  6. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  7. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative:...

  8. access control protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  9. access control protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  10. applicable protocol fails: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for...

  11. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Environmental Management (EM)

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  12. N-Terminal Enrichment: Developing a Protocol to Detect Specific...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments. N-Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments....

  13. additional protocol ratification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gergely 9 An Economic Assessment of the Kyoto Protocol using the Global Trade and Environment Model CiteSeer Summary: Ratification of the Kyoto Protocol will have major...

  14. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

  15. CAPEX study for grid dependent multi-layer IP/MPLS-over-EON using relative BV-WSS costs

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    CAPEX study for grid dependent multi-layer IP/MPLS-over-EON using relative BV-WSS costs O. Pedrola1@ac.upc.edu Abstract: The impact of the frequency grid on the CAPEX required to deploy a multi-layer IP/MPLS equipment for such functionality. Since network CAPEX is a figure network operators are always striving

  16. IP-SOC 2011 Conference Dec. 7-8, 2011 1 Research in 3D integration has been attracted

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    introduced a few years back which is 3D integration. This technology enable building circuits in 3 are [11]: · Increased off-state current from degraded drain-induced barrier IP-SOC 2011 3D Architecture : France (2011)" #12;IP-SOC 2011 Conference ­Dec. 7-8, 2011 2 lowering drain induce leakage current (DIBL

  17. Master Thesis ICT/ECS-2006-71 Multi-IP-Based SoC Design Including CCM

    E-Print Network [OSTI]

    Jantsch, Axel

    Master Thesis ICT/ECS-2006-71 Multi-IP-Based SoC Design Including CCM Security Mode of Operation. This thesis mainly implements CCM security mode of operation on a FPGA platform by using the AES encryption algorithm, it then builds a complete SoC that is based on multi IP cores including CCM. Except for the hard

  18. A Garch-based adaptive playout delay algorithm for VoIP Ying Zhang a,*, Damien Fay b

    E-Print Network [OSTI]

    Haddadi, Hamed

    A Garch-based adaptive playout delay algorithm for VoIP Ying Zhang a,*, Damien Fay b , Liam Garch Playout delay Time series forecasting VoIP a b s t r a c t Network delay, packet loss and network a trade-off between the buffer-induced delay and any additional packet loss rate. In this paper, a Garch

  19. Using Mobilize Power Management IP for Dynamic & Static Power Reduction in SoC at 130 nm

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Mobilize Power Management IP for Dynamic & Static Power Reduction in SoC at 130 nm Dan Tensilica's 32-bit Xtensa microprocessor core, using Virtual Silicon's Power Management IP. Independent of incorporating more and more devices on a single chip, but also managing the increase in the power that goes

  20. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  1. Service identification in TCP/IP : well-known versus random port numbers

    E-Print Network [OSTI]

    Masiello, Elizabeth

    2005-01-01T23:59:59.000Z

    The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...

  2. Scalable IP Lookup for Internet Routers David E. Taylor, Jonathan S. Turner, John W. Lockwood, Todd S. Sproull, David B. Parlour

    E-Print Network [OSTI]

    -Domain Routing (CIDR) compli- cates the lookup process, requiring a lookup engine to search variable, simultaneously achieve high lookup rates, good update performance, high memory efficiency and low hardware cost. High performance solutions using Content Ad- dressable Memory (CAM) devices are a popular, but high

  3. MULTI-WAVELENGTH OBSERVATIONS OF THE ENDURING TYPE IIn SUPERNOVAE 2005ip AND 2006jd

    SciTech Connect (OSTI)

    Stritzinger, Maximilian [Department of Physics and Astronomy, Aarhus University, Ny Munkegade 120, DK-8000 Aarhus C (Denmark); Taddia, Francesco; Fransson, Claes; Sollerman, Jesper [Oskar Klein Centre, Department of Astronomy, Stockholm University, AlbaNova, SE-10691 Stockholm (Sweden); Fox, Ori D. [Astrophysics Science Division, Observational Cosmology Laboratory, NASA Goddard Space Flight Center, Greenbelt, MD 20771 (United States); Morrell, Nidia; Phillips, M. M.; Campillay, Abdo; Castellon, Sergio; Contreras, Carlos; Krzeminski, Wojtek [Carnegie Observatories, Las Campanas Observatory, Casilla 601, La Serena (Chile); Anderson, J. P.; Hamuy, Mario [Departamento de Astronomia, Universidad de Chile, Casilla 36D, Santiago (Chile); Boldt, Luis [Argelander Institut fuer Astronomie, Universitaet Bonn, Auf dem Huegel 71, D-53111 Bonn (Germany); Brown, Peter J. [Mitchell Institute for Fundamental Physics and Astronomy, Department of Physics and Astronomy, Texas A and M University, College Station, TX 77843 (United States); Folatelli, Gaston [Institute for the Physics and Mathematics of the Universe (IPMU), University of Tokyo, 5-1-5 Kashiwanoha, Kashiwa, Chiba 277-8583 (Japan); Habergham, S. M.; James, Phil A. [Astrophysics Research Institute, Liverpool John Moores University, Twelve Quays House, Egerton Wharf, Birkenhead CH41 1LD (United Kingdom); Hjorth, Jens [Dark Cosmology Centre, Niels Bohr Institute, University of Copenhagen, Juliane Maries Vej 30, DK-2100 Copenhagen O (Denmark); Mattila, Seppo [Tuorla Observatory, University of Turku, Vaeisaelaentie 20, FI-21500 Piikkioe (Finland); and others

    2012-09-10T23:59:59.000Z

    We present an observational study of the Type IIn supernovae (SNe IIn) 2005ip and 2006jd. Broadband UV, optical, and near-IR photometry, and visual-wavelength spectroscopy of SN 2005ip complement and extend upon published observations to 6.5 years past discovery. Our observations of SN 2006jd extend from UV to mid-infrared wavelengths, and like SN 2005ip, are compared to reported X-ray measurements to understand the nature of the progenitor. Both objects display a number of similarities with the 1988Z-like subclass of SN IIn including (1) remarkably similar early- and late-phase optical spectra, (2) a variety of high-ionization coronal lines, (3) long-duration optical and near-IR emission, and (4) evidence of cold and warm dust components. However, diversity is apparent, including an unprecedented late-time r-band excess in SN 2006jd. The observed differences are attributed to differences between the mass-loss history of the progenitor stars. We conclude that the progenitor of SN 2006jd likely experienced a significant mass-loss event during its pre-SN evolution akin to the great 19th century eruption of {eta} Carinae. Contrarily, as advocated by Smith et al., the circumstellar environment of SN 2005ip is found to be more consistent with a clumpy wind progenitor.

  4. On the Test of Microprocessor IP Cores F. Corno, M. Sonza Reorda, G. Squillero, M. Violante

    E-Print Network [OSTI]

    Fernandez, Thomas

    On the Test of Microprocessor IP Cores F. Corno, M. Sonza Reorda, G. Squillero, M. Violante that include microprocessor cores is based on making them execute a test program. Thus, implementing a very microprocessors, ASICs, memories, and peripherals. The development of this new class of systems, called Systems

  5. Power Control by Kalman Filter With Error Margin for Wireless IP Networks

    E-Print Network [OSTI]

    Leung, Kin K.

    Power Control by Kalman Filter With Error Margin for Wireless IP Networks Kin K. Leung AT&T Labs, Room 4-120 100 Schulz Drive Red Bank, NJ 07701 Email: kkleung@research.att.com ABSTRACT A power-control enough due to little interference temporal correlation. In this paper, we enhance the power-control

  6. Automatic Information Discovery from the "Invisible Web" King-Ip Lin, Hui Chen

    E-Print Network [OSTI]

    Lin, King-Ip "David"

    that is untouched by the traditional search engines. Known as the "invisible web" or "deep web", it representsAutomatic Information Discovery from the "Invisible Web" King-Ip Lin, Hui Chen Division of Computer@memphis.edu Abstract A large amount of on-line information resides on the invisible web ­ web pages generated

  7. Host-IP Clustering Technique for Deep Web Characterization Denis Shestakov

    E-Print Network [OSTI]

    Hammerton, James

    Host-IP Clustering Technique for Deep Web Characterization Denis Shestakov Department of Media databases. This part of the Web, known as the deep Web, is to date relatively unexplored and even major are aimed at more accurate estimation of main parameters of the deep Web by sampling one national web domain

  8. IpNose: Electronic nose for remote bad odour monitoring system in landfill sites Alex Perera*

    E-Print Network [OSTI]

    Gutierrez-Osuna, Ricardo

    IpNose: Electronic nose for remote bad odour monitoring system in landfill sites Alex Perera to classify and quantify different gas/odours. Here we suggest the integration of a small form factor computer of bad odours in landfill sites. Preliminary approach to this application using commercial sensors

  9. Mycoscience 39: 367-378, 1998 Ophiostomatoid fungi associated with Ips cembrae in Japan

    E-Print Network [OSTI]

    Mycoscience 39: 367-378, 1998 367 Ophiostomatoid fungi associated with Ips cembrae in Japan! 11Institute of Agriculture and Forestry, University of Tsukuba, Tsukuba, Ibaraki 305-8572, Japan 2 400-0502, Japan Accepted for publication 29 July 1998 Six ophiostomatoid fungi, Le" Ceratocystiopsis

  10. Session Lengths and IP Address Usage of Smartphones in a University Campus WiFi

    E-Print Network [OSTI]

    Wang, Bing

    to laptops and desktop PCs, network usage characteristics of smartphones may differ significantly becauseSession Lengths and IP Address Usage of Smartphones in a University Campus WiFi Network be used more opportunistically. In this paper, we study two important network usage characteristics

  11. A Technology for Electronic Energy Meters Intelligent Accounting Using Distributed Database over TCP/IP Network

    E-Print Network [OSTI]

    Borissova, Daniela

    4 8 A Technology for Electronic Energy Meters Intelligent Accounting Using Distributed Database in their entirety. 2. Electronic energy metersaccountingtechnology developed inthe project The technology under Collection Electronic Energy Meters Distributed Database over TCP/IP Network Optical Head Optical Port RS-232

  12. Translation of a Patent Certificate Translated by AFD China IP Our Ref. No.:080801507-E

    E-Print Network [OSTI]

    Peleg, Shmuel

    #12;Translation of a Patent Certificate Translated by AFD China IP Our Ref. No.:080801507-E Certificate No. 1156871 Certificate of Invention Patent Title: Method and System for Producing a Video Synopsis Inventors: Shmuel Peleg; Alexander Rav-Acha Patent No.: ZL 2006 8 0048754.8 Date of Filing

  13. Textual summarisation of flowcharts in patent drawings for CLEF-IP 2012

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Textual summarisation of flowcharts in patent drawings for CLEF-IP 2012 Andrew Thean, Jean of flowcharts taken from patent draw- ings to produce summaries containing information about their structure.7 Digital Libraries General Terms Measurement, Performance, Experimentation Keywords Patent, Prior Art

  14. Color shift reduction of a multi-domain IPS-LCD using RGB-LED backlight

    E-Print Network [OSTI]

    Wu, Shin-Tson

    -emitting diodes (LEDs) and cold-cathode fluorescent lamp (CCFL) backlights. Simulation results indicateColor shift reduction of a multi-domain IPS- LCD using RGB-LED backlight Ruibo Lu, Qi Hong, Zhibing that the LED backlight exhibits a wider color gamut, better angular color uniformity, and 2-4X smaller static

  15. Large-Scale Quality Analysis of Published ChIP-seq Data

    E-Print Network [OSTI]

    Kundaje, Anshul

    ChIP-seq has become the primary method for identifying in vivo protein–DNA interactions on a genome-wide scale, with nearly 800 publications involving the technique appearing in PubMed as of December 2012. Individually and ...

  16. Balancing cost and reliability in the design of IP backbone using agile optical networking

    E-Print Network [OSTI]

    Fisher, Kathleen

    1 Balancing cost and reliability in the design of IP backbone using agile optical networking Byrav AT&T Labs - Research, Florham Park, NJ 07932, USA Abstract To address the reliability challenges due, providers deploy redundant backbone routers and redundant transport equipment interconnecting these routers

  17. Cost and Reliability Considerations in Designing the Next-Generation IP over WDM Backbone Networks

    E-Print Network [OSTI]

    Fisher, Kathleen

    and reliability. Reduction of equipment and costs at Layer 3 (router and line cards) should not resultCost and Reliability Considerations in Designing the Next-Generation IP over WDM Backbone Networks networks. To address the reliability challenges due to failures and planned outages, ISPs typically use two

  18. IP Routing Table Compression Using TCAM and Distance-one Merge

    E-Print Network [OSTI]

    Bollapalli, Kalyana Chakravarthy

    2011-02-22T23:59:59.000Z

    of completely specified logic functions, we demonstrate that our technique can achieve about 25% reduction in the size of IP routing tables, while ensuring that our approach can handle routing table updates in real-time. The resulting routing table can be used... . . . . . . . . . . . . . . 28 D. Compression . . . . . . . . . . . . . . . . . . . . . . . 30 E. Updates . . . . . . . . . . . . . . . . . . . . . . . . . . 31 1. Insertions . . . . . . . . . . . . . . . . . . . . . 31 2. Withdrawal . . . . . . . . . . . . . . . . . . . . 34 F...

  19. Econometric Feedback for Runtime Risk Management in VoIP Architectures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Econometric Feedback for Runtime Risk Management in VoIP Architectures Oussema Dabbebi, R at automatically adapting these parameters based on an econometric feedback mechanism. We mathematically describe the configuration of such risk models, by refining at runtime the model parameters based on an econometric feedback

  20. IP 2000 Conference 23. / 24. October 2000 Page 1 25/8/00

    E-Print Network [OSTI]

    Arslan, Tughrul

    IP 2000 Conference 23. / 24. October 2000 Page 1 25/8/00 Low Power Macro Component Library. For this reason the macro components are specified tailored for low power operation. A unified power reduction, Lattice) or Fast Fourier Transform (FFT) modules the same components can be isolated too. It would

  1. University of Oklahoma [INTELLECTUAL PROPERTY POLICY] The University of Oklahoma |IP Policy 1

    E-Print Network [OSTI]

    Oklahoma, University of

    University of Oklahoma [INTELLECTUAL PROPERTY POLICY] The University of Oklahoma |IP Policy 1 INTELLECTUAL PROPERTY POLICY 3.27.1 PREAMBLE (A) The people of the State of Oklahoma may reasonably expect from their creative works, trademarks, discoveries, and inventions. #12;University of Oklahoma

  2. The peculiar balmer decrement of SN 2009ip: Constraints on circumstellar geometry

    SciTech Connect (OSTI)

    Levesque, Emily M.; Stringfellow, Guy S.; Bally, John; Keeney, Brian A. [CASA, Department of Astrophysical and Planetary Sciences, University of Colorado 389-UCB, Boulder, CO 80309 (United States); Ginsburg, Adam G., E-mail: Emily.Levesque@colorado.edu [European Southern Observatory, ESO Headquarters, Karl-Schwarzschild-Strasse 2, D-95748 Garching bei München (Germany)

    2014-01-01T23:59:59.000Z

    We present optical and near-IR spectroscopic observations of the luminous blue variable SN 2009ip during its remarkable photometric evolution of 2012. The spectra sample three key points in the SN 2009ip light curve, corresponding to its initial brightening in August (2012-A) and its dramatic rebrightening in early October (2012-B). Based on line fluxes and velocities measured in our spectra, we find a surprisingly low I(H?)/I(H?) ratio (?1.3-1.4) in the 2012-B spectra. Such a ratio implies either a rare Case B recombination scenario where H?, but not H?, is optically thick, or an extremely high density for the circumstellar material of n{sub e} > 10{sup 13} cm{sup –3}. The H? line intensity yields a minimum radiating surface area of ?20,000 AU{sup 2} in H? at the peak of SN 2009ip's photometric evolution. Combined with the nature of this object's spectral evolution in 2012, a high circumstellar density and large radiating surface area imply the presence of a thin disk geometry around the central star (and, consequently, a possible binary companion), suggesting that the observed 2012-B rebrightening of SN 2009ip can be attributed to the illumination of the disk's inner rim by fast-moving ejecta produced by the underlying events of 2012-A.

  3. Performance Characterization of IP Network-based Control Methodologies for DC Motor Applications Part I

    E-Print Network [OSTI]

    Chow, Mo-Yuen

    Performance Characterization of IP Network-based Control Methodologies for DC Motor Applications stability, allowing control of real-time applications. I. INTRODUCTION A recent trend in control systems ­ Part I Tyler Richards Mo-Yuen Chow Advanced Diagnosis Automation and Control Lab Advanced Diagnosis

  4. Reflectivity retrieval in a networked radar environment: Demonstration from the CASA IP1

    E-Print Network [OSTI]

    Jayasumana, Anura P.

    using data from the first Integration Project (IP1) radar network in Oklahoma. Electromagnetic waves, the lowest coverage altitude gets higher with range due to earth curvature [1]. A networked radar environment is capable of high spatial coverage and temporal resolution. The Engineering Research Center for CASA

  5. Energy-Aware Path Selection for Scheduled Lightpaths in IP-over-WDM Networks

    E-Print Network [OSTI]

    Kuipers, Fernando A.

    Energy-Aware Path Selection for Scheduled Lightpaths in IP-over-WDM Networks Song Yang and Fernando in the context of energy-aware routing. In this paper we study energy-efficient path selection under propose an energy-aware routing algorithm that is based on traffic grooming, but which has the flexibility

  6. Routing of IP Output Packets The UDP interface to the routing system

    E-Print Network [OSTI]

    Westall, James M.

    Routing of IP Output Packets The UDP interface to the routing system The RT_TOS macro retrieves the low order 5 bits from the tos field of the struct sock. These will be 0 unless set by setsockopt(). These include the DTRC bits and the low order bit is the ONLINK bit. #define RT_TOS(tos) ((tos)&IPTOS_TOS

  7. Scaling IP Routing with the Core Router-Integrated Xinyang Zhang

    E-Print Network [OSTI]

    Sirer, Emin Gun

    presents CRIO: a new approach to IP scalability for both global and VPN routing. Using tunneling and virtual prefixes, CRIO decouples address hierarchy and physical topology, effectively giving ISPs the ability to trade-off routing table size for path length. Though CRIO is a new routing architecture

  8. Self-learning IP Traffic Classification based on Statistical Flow Characteristics

    E-Print Network [OSTI]

    Zander, Sebastian

    and intrusion detection. The most common identification technique based on the inspection of `known port numbers or encrypted traffic. The authors of [1] propose signature-based methods to classify P2P traffic. AlthoughSelf-learning IP Traffic Classification based on Statistical Flow Characteristics Sebastian Zander1

  9. VIIRS VIIRS-Surf-Refl-IP, Beta Data Quality Last Updated: 22 March 2013

    E-Print Network [OSTI]

    -Surf-Refl-IP is the basis for various VIIRS EDRs including vegetation index, snow/ice products and others. Based; ecosystem monitoring; climate studies etc., provided its elevation to the status of EDR (the motion EDRs and the proposed L1RD EDR requirements are compliant with the derived requirements. The algorithm

  10. An implementation of optimal dynamic load balancing based on multipath IP routing

    E-Print Network [OSTI]

    ] has tackled this problem from the transport layer side: here, TCP sources manage multiple congestion build on recent theory which shows a globally optimum resource allocation across the TCP/IP layers can of demands within network capacity. Solutions involve use of optimization together with practical techniques

  11. JSAC SPECIAL ISSUE ON NETWORK SUPPORT FOR GROUP COMMUNICATION 1 Scalable Secure Group Communication over IP

    E-Print Network [OSTI]

    Banerjee, Suman

    JSAC SPECIAL ISSUE ON NETWORK SUPPORT FOR GROUP COMMUNICATION 1 Scalable Secure Group Communication our scheme is completely end­host based, it can be used to implement group security over IP multicast­enabled untrusted, insecure networks. A. Group Keys and Re­keying Groups Many secure group communication systems [12

  12. Perceived consequences and concerns in the diffusion of Internet2 at Texas A&M University

    E-Print Network [OSTI]

    Mendoza Diaz, Noemi Veronica

    2009-05-15T23:59:59.000Z

    needed to support them. Internet2 adoption at TAMU took place towards the end of the 90s decade with the inclusion of the university in the University Corporation for the Advanced Internet Development (UCAID). This dissertation reviewed the Internet...

  13. Explorative study of African Americans and internet dating

    E-Print Network [OSTI]

    Spates, Kamesha Sondranek

    2005-02-17T23:59:59.000Z

    EXPLORATIVE STUDY OF AFRICAN AMERICANS AND INTERNET DATING A Thesis by KAMESHA SONDRANEK SPATES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE December 2004 Major Subject: Sociology EXPLORATIVE STUDY OF AFRICAN AMERICANS AND INTERNET DATING A Thesis by KAMESHA SONDRANEK SPATES...

  14. Smarter Cropping: Internet program helps farmers make decisions about crops

    E-Print Network [OSTI]

    Wythe, Kathy

    2009-01-01T23:59:59.000Z

    Story by Kathy Wythe tx H2O | pg. 26 Smarter Cropping Internet program helps farmers make decisions about crops Along the coastal plains of Texas, farmers and crop managers are using the Internet to make more informed decisions about growing...

  15. Roadmap for Real World Internet applications Socioeconomic scenarios

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Roadmap for Real World Internet applications ­ Socioeconomic scenarios and design recommendations that is feasible to roadmap the dynamic deployment of Real World Internet applications. A multi- faceted scenarios. These scenarios are used as a roadmap for the system and architecture deployment. The application

  16. Detecting Internet Worms at Early Stage Shigang Chen Sanjay Ranka

    E-Print Network [OSTI]

    Chen, Shigang

    proposes an Internet-worm early warning system that automatically detects concerted scan activities on the responsiveness of this early warning system. Keywords: Enterprise Security Management, Internet Worm, Early and derives possible signatures of worm attacks. Its goal is to issue warning at the early stage of worm

  17. Using the Internet to Stay Informed about Energy

    E-Print Network [OSTI]

    Phillips, J.

    1996-01-01T23:59:59.000Z

    A new tool, the INTERNET, has arrived on the scene to help everyone who has anything to do with energy: the energy user, the utilities, the equipment manufacturers, energy management firms, and energy brokers. The INTERNET is useful to the same...

  18. Future of Internet Yrj Neuvo & Elina Karvonen (eds.)

    E-Print Network [OSTI]

    Kaski, Samuel

    's Multidisciplinary Institute of Digitalisation and Energy (MIDE) #12;#12;Bit Bang IV Future of Internet - Societal, business, governance and technological aspects #12;ISBN 978-952-60-3610-6 (PDF) Cover: Petri Saarikko ON BIT BANG 4 7 FUTURE OF INTERNET - SOCIETAL, BUSINESS, GOVERNANCE AND TECHNOLOGICAL ASPECTS 9 Are We

  19. Assessing the Security of a Clean-Slate Internet Architecture

    E-Print Network [OSTI]

    Assessing the Security of a Clean-Slate Internet Architecture Gowtham Boddapati John Day Ibrahim Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate a comprehensive approach to security. Most recently, there have been attempts to design clean- slate internet

  20. Internet Security Systems, an IBM Company Threat Insight Monthly

    E-Print Network [OSTI]

    Internet Security Systems, an IBM Company X-Force ® Threat Insight Monthly www . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net Internet Security Systems, an IBM Company X-Force Threat Insight Monthly April 2007 #12;X-Force® Threat Insight Monthly > April 2007 www.iss.netwww.iss.net About

  1. Study of Internet autonomous system interconnectivity from BGP routing tables

    E-Print Network [OSTI]

    Catalunya, Universitat Politècnica de

    Study of Internet autonomous system interconnectivity from BGP routing tables Jose M. Barcelo ISPs (Internet Service Providers) and to interconnect enterprises to ISPs. ISPs usually are providers University of Baja California (UABC), Mexico. He is a PhD student at UPC, Spain, with a grant of the Mexican

  2. On Correlated Availability in Internet-Distributed Systems Derrick Kondo

    E-Print Network [OSTI]

    Boyer, Edmond

    On Correlated Availability in Internet-Distributed Systems Derrick Kondo INRIA, France dkondo measure and characterize the time dynamics of availability in a large-scale Internet- distributed system with over 110,000 hosts. Our char- acterization focuses on identifying patterns of corre- lated availability

  3. Controlling the Internet to Improve Energy Efficiency Dr. Lachlan Andrew

    E-Print Network [OSTI]

    Huang, Jianwei

    Controlling the Internet to Improve Energy Efficiency by Dr. Lachlan Andrew Centre for Advanced, and energy-efficient networking. He is an editor of IEEE/ACM Trans. Networking, and an area editor Internet Architectures Swinburne University of Technology Australia THE CHINESE UNIVERSITY OF HONG KONG

  4. Offline Social Networks: stepping away from the Internet (Position paper)

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Offline Social Networks: stepping away from the Internet (Position paper) Anne-Marie Kermarrec@no-log.org Abstract Online social networks have been revolutionary in the way people interact over the Internet today. Typically in online social networks the information is ephemeral while the relationships between users

  5. Jitter Regulation in an Internet Router with Delay Constraint

    E-Print Network [OSTI]

    Imai, Hiroshi

    Jitter Regulation in an Internet Router with Delay Constraint Hisashi Koga Fujitsu Laboratories Ltd To playback multimedia data smoothly via the world­wide Internet, jitter, the variability of delay of individual packets, must be kept low. We examine on­line algorithms in a router to regulate jitter

  6. IT Licentiate theses Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

  7. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

  8. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  9. A Metaobject Protocol for C++ Shigeru Chiba

    E-Print Network [OSTI]

    Chiba, Shigeru

    A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

  10. A novel DHT Routing Protocol for MANETs

    E-Print Network [OSTI]

    Chellamani, Deepak

    2010-04-30T23:59:59.000Z

    The central challenge in Mobile Ad hoc Networks (MANETs) is to provide a stable routing strategy without depending on any central administration. This work presents and examines the working of Radio Ring Routing Protocol (RRRP), a DHT based routing...

  11. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.

    2012-03-01T23:59:59.000Z

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  12. The security of Ping-Pong protocol

    E-Print Network [OSTI]

    Jian-Chuan Tan; An Min Wang

    2008-08-28T23:59:59.000Z

    Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

  13. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01T23:59:59.000Z

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  14. CIS 455: Internet and Web Systems Course Number & Title (A.1) CIS 455 Internet and Web Systems

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    CIS 455: Internet and Web Systems Course Number & Title (A.1) CIS 455 Internet and Web Systems and web systems: scalability, interoperability (of data and code), atomicity and consistency models-backed or PHP/JSP/Servlet-based web sites (for this, see CIS 330/550 or MKSE 212). Here, we will learn how

  15. EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?

    E-Print Network [OSTI]

    Nakano, Koji

    Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

  16. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  17. Dispersal of the spruce beetle, `dendroctonus rufipennis`, and the engraver beetle, `ips perturbatus`, in Alaska. Forest Service research paper

    SciTech Connect (OSTI)

    Werner, R.A.; Holsten, E.H.

    1997-09-01T23:59:59.000Z

    Mark-release-recapture experiments were performed with spruce beetles (Dendroctonus rufipennis (Kirby)) and Ips engraver beetles (Ips perturbatus (Eichhoff)) to determine distance and direction of dispersal. The recapture rate of beetles marked with fluorescent powder was extremely low. Most I. perturbatus beetles dispersed up to 30 m from their overwintering sites compared to most D. rufipennis, which dispersed from 90 to 300 m. Ips perturbatus beetles were caught up to 90 m and D. rufipennis up to 600 m from the point of release.

  18. PONDER - A Real time software backend for pulsar and IPS observations at the Ooty Radio Telescope

    E-Print Network [OSTI]

    Naidu, Arun; Manoharan, P K; Krishnakumar, M A

    2015-01-01T23:59:59.000Z

    This paper describes a new real-time versatile backend, the Pulsar Ooty Radio Telescope New Digital Efficient Receiver (PONDER), which has been designed to operate along with the legacy analog system of the Ooty Radio Telescope (ORT). PONDER makes use of the current state of the art computing hardware, a Graphical Processing Unit (GPU) and sufficiently large disk storage to support high time resolution real-time data of pulsar observations, obtained by coherent dedispersion over a bandpass of 16 MHz. Four different modes for pulsar observations are implemented in PONDER to provide standard reduced data products, such as time-stamped integrated profiles and dedispersed time series, allowing faster avenues to scientific results for a variety of pulsar studies. Additionally, PONDER also supports general modes of interplanetary scintillation (IPS) measurements and very long baseline interferometry data recording. The IPS mode yields a single polarisation correlated time series of solar wind scintillation over a b...

  19. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01T23:59:59.000Z

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  20. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01T23:59:59.000Z

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  1. SN 2009ip at late times - an interacting transient at +2 years

    E-Print Network [OSTI]

    Fraser, Morgan; Pastorello, Andrea; Jerkstrand, Anders; Smartt, Stephen J; Chen, Ting-Wan; Childress, Michael; Gilmore, Gerard; Inserra, Cosimo; Kankare, Erkki; Margheim, Steve; Mattila, Seppo; Valenti, Stefano; Ashall, Christopher; Benetti, Stefano; Botticella, Maria Teresa; Bauer, Franz Erik; Campbell, Heather; Elias-Rosa, Nancy; Fleury, Mathilde; Gal-Yam, Avishay; Hachinger, Stephan; Howell, D Andrew; Guillou, Laurent Le; Léget, Pierre-François; Morales-Garoffolo, Antonia; Polshaw, Joe; Spiro, Susanna; Sullivan, Mark; Taubenberger, Stefan; Turatto, Massimo; Walker, Emma S; Young, David R; Zhang, Bonnie

    2015-01-01T23:59:59.000Z

    We present photometric and spectroscopic observations of the interacting transient SN 2009ip taken during the 2013 and 2014 observing seasons. We characterise the photometric evolution as a steady and smooth decline in all bands, with a decline rate that is slower than expected for a solely $^{56}$Co-powered supernova at late phases. No further outbursts or eruptions were seen over a two year period from 2012 December until 2014 December. SN 2009ip remains brighter than its historic minimum from pre-discovery images. Spectroscopically, SN 2009ip continues to be dominated by strong, narrow ($\\lesssim$2000 km~s$^{-1}$) emission lines of H, He, Ca, and Fe. While we make tenuous detections of [Fe~{\\sc ii}] $\\lambda$7155 and [O~{\\sc i}] $\\lambda\\lambda$6300,6364 lines at the end of 2013 June and the start of 2013 October respectively, we see no strong broad nebular emission lines that could point to a core-collapse origin. In general, the lines appear relatively symmetric, with the exception of our final spectrum ...

  2. Shape-based peak identification for ChIP-Seq Valerie Hower, Steven N. Evans, and Lior Pachter

    E-Print Network [OSTI]

    Evans, Steven N.

    Shape-based peak identification for ChIP-Seq Valerie Hower, Steven N. Evans, and Lior PachterSeq [27] and MACS [29] using two published data sets. #12;2 Valerie Hower, Steven N. Evans, and Lior

  3. Engineering a p+ip superconductor: Comparison of topological insulator and Rashba spin-orbit-coupled materials

    E-Print Network [OSTI]

    Potter, Andrew Cole

    We compare topological insulator materials and Rashba-coupled surfaces as candidates for engineering p+ip superconductivity. Specifically, in each type of material we examine (1) the limitations to inducing superconductivity ...

  4. In-situ calibration: migrating control system IP module calibration from the bench to the storage ring

    SciTech Connect (OSTI)

    Weber, Jonah M.; Chin, Michael

    2002-04-30T23:59:59.000Z

    The Control System for the Advanced Light Source (ALS) at Lawrence Berkeley National Lab (LBNL) uses in-house designed IndustryPack(registered trademark) (IP) modules contained in compact PCI (cPCI) crates with 16-bit analog I/O to control instrumentation. To make the IP modules interchangeable, each module is calibrated for gain and offset compensation. We initially developed a method of verifying and calibrating the IP modules in a lab bench test environment using a PC with LabVIEW. The subsequent discovery that the ADCs have significant drift characteristics over periods of days of installed operation prompted development of an ''in-situ'' calibration process--one in which the IP modules can be calibrated without removing them from the cPCI crates in the storage ring. This paper discusses the original LabVIEW PC calibration and the migration to the proposed in-situ EPICS control system calibration.

  5. Transgene Excision Has No Impact on In Vivo Integration of Human iPS Derived Neural Precursors

    E-Print Network [OSTI]

    Major, Tamara

    The derivation of induced human pluripotent stem cells (hiPS) has generated significant enthusiasm particularly for the prospects of cell-based therapy. But there are concerns about the suitability of iPS cells for in vivo ...

  6. On PowerLaw Relationships of the Internet Topology Michalis Faloutsos

    E-Print Network [OSTI]

    On Power­Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp Despite the apparent randomness of the Internet, we dis­ cover some surprisingly simple power­laws of the Internet topology. These power­laws hold for three snapshots of the Internet, between November 1997

  7. On Power-Law Relationships of the Internet Topology Michalis Faloutsos

    E-Print Network [OSTI]

    On Power-Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp the apparent randomness of the Internet, we dis- cover some surprisingly simple power-laws of the Internet topology. These power-laws hold for three snapshots of the Internet, between November 1997 and December

  8. ACCEPTED -IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT CONTROL -2003 1 Internet-like Protocols for the Control and

    E-Print Network [OSTI]

    . Abdallah , and Peter F. Hokayem Electrical & Computer Engineering Department MSC01 1100 1 University of New Mexico Albuquerque, NM 87131-0001 {rsandova,chaouki,hokayem}@eece.unm.edu Abstract In this paper we show systems such as the Inter- net are only concerned with transferring the information (with high fidelity

  9. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chanelière; R. Lauro; J. Ruggiero; J. -L. Le Gouët

    2009-11-17T23:59:59.000Z

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  10. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  11. Texas science teachers' use of TENET and the internet

    E-Print Network [OSTI]

    Edwards, Eleanor Evelyn

    1995-01-01T23:59:59.000Z

    The wealth of information available on TENET, the Texas Education Network, and the Internet has the potential to bring dramatic changes to science classrooms throughout Texas. Networking technology removes the limits of classrooms walls and opens...

  12. Distributed real-time control via the internet

    E-Print Network [OSTI]

    Srivastava, Abhinav

    2004-09-30T23:59:59.000Z

    The objective of this research is to demonstrate experimentally the feasibility of using the Internet for a Distributed Control System (DCS). An algorithm has been designed and implemented to ensure stability of the system in the presence of upper...

  13. On countermeasures of worm attacks over the Internet 

    E-Print Network [OSTI]

    Yu, Wei

    2009-05-15T23:59:59.000Z

    Worm attacks have always been considered dangerous threats to the Internet since they can infect a large number of computers and consequently cause large-scale service disruptions and damage. Thus, research on modeling ...

  14. Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches

    E-Print Network [OSTI]

    Schwartz, Paul M.; Lee, Ronald D.; Rubinstein, Ira

    2008-01-01T23:59:59.000Z

    of consensus safeguards around government data mining tocommercial data mining, the extent and speed of ad- funded2/19/2008 3:00:00 PM Data Mining and Internet Profiling:

  15. Standards as interdependent artifacts : the case of the Internet

    E-Print Network [OSTI]

    Hsieh, Mo-Han

    2008-01-01T23:59:59.000Z

    This thesis has explored a new idea: viewing standards as interdependent artifacts and studying them with network analysis tools. Using the set of Internet standards as an example, the research of this thesis includes the ...

  16. Equalizing Superstars: The Internet and the Democratization of Education

    E-Print Network [OSTI]

    Acemoglu, Daron

    Internet-based educational resources are proliferating rapidly. One concern associated with these (potentially transformative) technological changes is that they will be disequalizing—as many technologies of the last several ...

  17. Equalizing Superstars: The Internet and the Democratization of Education

    E-Print Network [OSTI]

    Acemoglu, Daron

    2014-01-17T23:59:59.000Z

    Educational resources distributed via the Internet are rapidly proliferating. One prominent concern associated with these potentially transformative developments is that, as many of the leading technologies of the last ...

  18. Radial structure of the Internet BY PETTER HOLME

    E-Print Network [OSTI]

    Forrest, Stephanie

    Department of Computer Science, University of New Mexico, Albuquerque, NM 87131, USA 2 Santa Fe Institute of Internet data, for example, a local office network of computers and their interconnections; a network

  19. The Internet as recommendation engine : implications of online behavioral targeting

    E-Print Network [OSTI]

    Smith-Grieco, Anthony Nicoll

    2010-01-01T23:59:59.000Z

    This thesis discusses the economic implications of Internet behavioral advertising, which targets ads to individuals based on extensive detailed data about the specific websites users have visited. Previous literature on ...

  20. Using the Internet to Stay Informed about Energy 

    E-Print Network [OSTI]

    Phillips, J.

    1996-01-01T23:59:59.000Z

    degree for both large companies and small, one person or a Fortune 500 business. What is the INTERNET? It is a powerful communications tool whereby anyone can contact anyone else, worldwide, to either provide or reuieve information. Using the existing...

  1. Cerebro : forming parallel internets and enabling ultra-local economies

    E-Print Network [OSTI]

    Ypodimatopoulos, Polychronis Panagiotis

    2008-01-01T23:59:59.000Z

    Internet-based mobile communications have been increasing rapidly [5], yet there is little or no progress in platforms that enable applications for discovery, context-awareness and sharing of data and services in a peer-wise ...

  2. Effects of verbenone and brevicomin on within-tree populations of Dendroctonus frontalis and Ips avulsus (Coleoptera: Scolytidae)

    E-Print Network [OSTI]

    Watterson, Gary Phillip

    1979-01-01T23:59:59.000Z

    EFFECTS OF VERBENONE AND BREVICOMIN ON WITHIN-TREE POPULATIONS OF DENDROCTONUS FRONTALIS AND IPS AVULSUS (COLEOPTERA: SCOLYTIDAE) A Thesis by GARY PHILLIP WATTERSON Submitted to the Graduate College of Texas A8M University in partial... fulfillment of the requirements for the degree of MASTER OF SCIENCE December, 1 979 Major Subject: Entomology EFFECTS OF VERBENONE AND BREVICOMIN ON WITHIN-TREE POPULATIONS OF DENDROCTONUS FRONTALIS AND IPS AVULSUS (COLEOPTERA: SCOLYTIDAE) A Thes1s...

  3. Snap: Robust Tool for Internet-wide Operating System Fingerprinting

    E-Print Network [OSTI]

    Nandwani, Ankur Bharatbhushan

    2012-02-14T23:59:59.000Z

    SNAP: ROBUST TOOL FOR INTERNET-WIDE OPERATING SYSTEM FINGERPRINTING A Thesis by ANKUR BHARATBHUSHAN NANDWANI Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree... of MASTER OF SCIENCE December 2010 Major Subject: Computer Science SNAP: ROBUST TOOL FOR INTERNET-WIDE OPERATING SYSTEM FINGERPRINTING A Thesis by ANKUR BHARATBHUSHAN NANDWANI Submitted to the O?ce of Graduate Studies of Texas A&M University...

  4. ObjectGlobe: Ubiquitous Query Processing on the Internet

    E-Print Network [OSTI]

    Kemper, Alfons

    for scalable Internet applications, such as business-to-business (B2B) e-commerce systems like SAP's "mySAP capabilities. The goal of the ObjectGlobe project is to establish an open market place in which data and query on the Internet. One of the main challenges in the design of such an open system is to ensure privacy and security

  5. Zephyr: A secure Internet process to streamline engineering

    SciTech Connect (OSTI)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others

    1998-05-12T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  6. A Comparison of Education, Business, and Engineering Undergraduate Students’ Internet Use and their Experience, Confidence, and Competence in Using New Literacies of the Internet

    E-Print Network [OSTI]

    Kim, Su Yeon

    2011-08-08T23:59:59.000Z

    This study explored beginning and advanced pre-service teachers’ Internet use and their experience, confidence, and competence in using new literacies of the Internet. In addition, this study compared the pre-service teachers to same-aged business...

  7. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  8. Security proofs of cryptographic protocols Eva Jencusova

    E-Print Network [OSTI]

    with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

  9. Optimal Decentralized Protocols for Electric Vehicle Charging

    E-Print Network [OSTI]

    Low, Steven H.

    into the electric power grid. EV charging increases the electricity demand, and potentially amplifies the peak1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging

  10. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 µl total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  11. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  12. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  13. An Effective Scheduler for IP Routers Goncalo Quadros, Antonio Alves, Edmundo Monteiro, Fernando Boavida

    E-Print Network [OSTI]

    Monteiro, Edmundo

    useless when QoS is needed - a different type of scheduler must be used. Our first idea to overcome essentially the same technologies as the ones currently used in the Internet. A fundamental step for the development of the intended service model was the selection of an alternative for the common ­ but useless

  14. Assessing Internet energy intensity: A review of methods and results

    SciTech Connect (OSTI)

    Coroama, Vlad C., E-mail: vcoroama@gmail.com [Instituto Superior Técnico, Universidade Técnica de Lisboa, Av. Rovisco Pais 1, 1049-001 Lisboa (Portugal); Hilty, Lorenz M. [Department of Informatics, University of Zurich, Binzmühlestrasse 14, 8050 Zurich (Switzerland) [Department of Informatics, University of Zurich, Binzmühlestrasse 14, 8050 Zurich (Switzerland); Empa, Swiss Federal Laboratories for Materials Science and Technology, Lerchenfeldstr. 5, 9014 St. Gallen (Switzerland); Centre for Sustainable Communications, KTH Royal Institute of Technology, Lindstedtsvägen 5, 100 44 Stockholm (Sweden)

    2014-02-15T23:59:59.000Z

    Assessing the average energy intensity of Internet transmissions is a complex task that has been a controversial subject of discussion. Estimates published over the last decade diverge by up to four orders of magnitude — from 0.0064 kilowatt-hours per gigabyte (kWh/GB) to 136 kWh/GB. This article presents a review of the methodological approaches used so far in such assessments: i) top–down analyses based on estimates of the overall Internet energy consumption and the overall Internet traffic, whereby average energy intensity is calculated by dividing energy by traffic for a given period of time, ii) model-based approaches that model all components needed to sustain an amount of Internet traffic, and iii) bottom–up approaches based on case studies and generalization of the results. Our analysis of the existing studies shows that the large spread of results is mainly caused by two factors: a) the year of reference of the analysis, which has significant influence due to efficiency gains in electronic equipment, and b) whether end devices such as personal computers or servers are included within the system boundary or not. For an overall assessment of the energy needed to perform a specific task involving the Internet, it is necessary to account for the types of end devices needed for the task, while the energy needed for data transmission can be added based on a generic estimate of Internet energy intensity for a given year. Separating the Internet as a data transmission system from the end devices leads to more accurate models and to results that are more informative for decision makers, because end devices and the networking equipment of the Internet usually belong to different spheres of control. -- Highlights: • Assessments of the energy intensity of the Internet differ by a factor of 20,000. • We review top–down, model-based, and bottom–up estimates from literature. • Main divergence factors are the year studied and the inclusion of end devices. • We argue against extending the Internet system boundary beyond data transmission. • Decision-makers need data that differentiates between end devices and transmission.

  15. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Jacobs, Kurt

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

  16. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols........................................................................... 5 Clam Dredge Construction and Repair

  17. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  18. Protocols for the Equitable Assessment of Marine Energy Converters 

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  19. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

    2014-07-21T23:59:59.000Z

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

  20. Performance Test Protocol for Evaluating Inverters Used in Grid...

    Office of Scientific and Technical Information (OSTI)

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems. Re-direct Destination: Abstract not provided....

  1. 3-D Spectral IP Imaging: Non-Invasive Characterization DE FG02 96ER 14714

    SciTech Connect (OSTI)

    Morgan, F. Dale; Rodi, William; Lesmes, David

    2000-06-01T23:59:59.000Z

    The Earth Resources Laboratory (ERL) performed a broad foundational study of spectral induced polarization (SIP) for site characterization. The project encompassed laboratory studies of microgeometry and chemistry effects on Induced Polarization (IP), an investigation of electromagnetic coupling (emc) noise, and development of 3D modeling and inversion codes. The major finding of the project is that emc noise presents a critical limitation for field implementation of SIP and conventional correction methods are inadequate. The project developed a frequency domain 3D complex resistivity modeling and inversion code Laboratory experiments were conducted to study the effects of solution chemistry and microgeometry on the SIP response of sandstone. Results indicate that changes in chemistry affect the magnitude of the spectral IP response and changes in microgeometry affect the shape of the spectral IP response. The developed physiochemical IP model can be used to invert spectral IP data for an apparent grain size distribution. Laboratory studies over the last twenty years have shown that SIP data must be acquired over several decades of frequency and include frequencies greater than 1kHz. A model of the components of emc noise has been developed and investigation with this model showed that inductive coupling is the most significant component. The study concluded that emc limits the frequency range of usable field data to approximately 100 Hz and below for typical site conditions. Several correction schemes have been developed based on treating emc as noise to be removed from the data, but our investigation has shown that these are not adequate for high frequencies, greater than 100Hz. Laboratory studies have demonstrated that the greatest response is the frequency range greater than 1KHz, hence the emc problem must be resolved for field implementation of SIP to advance. The ERL developed 2D/3D time domain codes that perform inversions for charge abilities based on schemes introduced by Siegel (1959). The ERL has also developed a 3D complex resistivity code for inversion of frequency domain IP data. The algorithm accommodates a general earth model with a complex electrical resistivity as a function of frequency and 3-D spatial position. The forward problem is solved by the complex biconjugate gradient method, while the regularized inverse problem is solved by the nonlinear conjugate gradient method. Time domain field data was acquired along a single survey line at the FS-12 plume, Massachusetts Military Reservation. The data was inverted with the developed 2D time domain code with the results having an excellent match to monitoring well data. The data was further analyzed by an innovative scheme where a ''gross spectral chargeability'' was determined from time domain data. The results show that there is valuable information in the spectra of the data.

  2. COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1

    E-Print Network [OSTI]

    Sergot, Marek

    COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1 PETER HAMMOND2 AND MAREK SERGOT3 July 1994 Cancer treatment is often carried out within protocol-based clinical trials. An oncology clinic may take of many protocols, the life-threatening nature of cancer and the toxicity of treatment side

  3. Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,

    E-Print Network [OSTI]

    to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

  4. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Protocol Stack March 26, 2014 1 / 15 #12;One-Slide Refresher Wireless Sensor Networks (WSNs) Could be used;Wireless access point network Layers Application Google Chrome Transport Transmission Control Protocol (TCP

  5. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  6. PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS

    E-Print Network [OSTI]

    1/6 PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS Yi Qian 1 , Kejie Lu 2 on a priority based secure MAC protocol for vehicular networks and present detailed security and performance and simulations that the MAC protocol can achieve both security and QoS requirements for vehicular network safety

  7. Clues to the nature of SN 2009ip from photometric and spectroscopic evolution to late times

    SciTech Connect (OSTI)

    Graham, M. L. [Astronomy Department, University of California, Berkeley, CA 94720 (United States); Sand, D. J. [Physics Department, Texas Tech University, Lubbock, TX 79409 (United States); Valenti, S.; Howell, D. A.; Parrent, J. [Las Cumbres Observatory Global Telescope Network, Goleta, CA 93117 (United States); Halford, M.; Zaritsky, D. [Astronomy Department, University of Arizona, Tucson, AZ 85721 (United States); Bianco, F. [Department of Physics, New York University, 4 Washington Place, New York, NY 10003 (United States); Rest, A. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Dilday, B., E-mail: melissagraham@berkeley.edu [North Idaho College, 1000 W. Garden Avenue, Coeur d'Alene, ID 83814 (United States)

    2014-06-01T23:59:59.000Z

    We present time series photometric and spectroscopic data for the transient SN 2009ip from the start of its outburst in 2012 September until 2013 November. These data were collected primarily with the new robotic capabilities of the Las Cumbres Observatory Global Telescope Network, a specialized facility for time domain astrophysics, and includes supporting high-resolution spectroscopy from the Southern Astrophysical Research Telescope, Kitt Peak National Observatory, and Gemini Observatory. Based on our nightly photometric monitoring, we interpret the strength and timing of fluctuations in the light curve as interactions between fast-moving ejecta and an inhomogeneous circumstellar material (CSM) produced by past eruptions of this massive luminous blue variable (LBV) star. Our time series of spectroscopy in 2012 reveals that, as the continuum and narrow H? flux from CSM interactions declines, the broad component of H? persists with supernova (SN)-like velocities that are not typically seen in LBVs or SN impostor events. At late times, we find that SN 2009ip continues to decline slowly, at ? 0.01 mag day{sup –1}, with small fluctuations in slope similar to Type IIn supernovae (SNe IIn) or SN impostors but no further LBV-like activity. The late-time spectrum features broad calcium lines similar to both late-time SNe and SN impostors. In general, we find that the photometric and spectroscopic evolution of SN 2009ip is more similar to SNe IIn than either continued eruptions of an LBV star or SN impostors but we cannot rule out a nonterminal explosion. In this context, we discuss the implications for episodic mass loss during the late stages of massive star evolution.

  8. Fusion rules and vortices in $p_x+ip_y$ superconductors

    E-Print Network [OSTI]

    Michael Stone; Suk Bum Chung

    2005-11-30T23:59:59.000Z

    The "half-quantum" vortices ($\\sigma$) and quasiparticles ($\\psi$) in a two-dimensional $p_x+ip_y$ superconductor obey the Ising-like fusion rules $\\psi\\times \\psi=1$, $\\sigma\\times \\psi=\\sigma$, and $\\sigma\\times \\sigma= 1+\\psi$. We explain how the physical fusion of vortex-antivortex pairs allows us to use these rules to read out the information encoded in the topologically protected space of degenerate ground states. We comment on the potential applicability of this fact to quantum computation. Modified 11/30/05 to reflect manuscript as accepted for publication. Includes corrected last section.

  9. DLC+VIT4IP (Smart Grid Project) (Belgium) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationinConcentratingEnergyCoosaPageEnergyDLC+VIT4IP Country Belgium

  10. DLC+VIT4IP (Smart Grid Project) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationinConcentratingEnergyCoosaPageEnergyDLC+VIT4IP Country

  11. DLC+VIT4IP (Smart Grid Project) (United Kingdom) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformationNew|CoreCpWingCushing,DADEVELOPMENTItalyIP (Smart Grid

  12. 08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols

    E-Print Network [OSTI]

    Udgaonkar, Jayant B.

    Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

  13. Automated Verification of Quantum Protocols using MCMAS

    E-Print Network [OSTI]

    F. Belardinelli; P. Gonzalez; A. Lomuscio

    2012-07-04T23:59:59.000Z

    We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC), an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  14. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01T23:59:59.000Z

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  15. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25T23:59:59.000Z

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  16. Protocols for Authorized Release of Concrete

    SciTech Connect (OSTI)

    Smith, Agatha Marie; Meservey, Richard Harlan; Chen, S.Y.; Powell, James Edward; PArker, F.

    2000-06-01T23:59:59.000Z

    Much of the clean or slightly contaminated concrete from Decontamination and Decommissioning (D&D) activities could be re-used. Currently, there is no standardized approach, or protocol, for managing the disposition of such materials. Namely, all potential disposition options for concrete, including authorized release for re-use, are generally not fully evaluated in D&D projects, so large quantities have been unduly disposed of as low-level radioactive waste. As a result, costs of D&D have become prohibitively high, hindering expedient cleanup of surplus facilities. The ability to evaluate and implement the option of authorized release of concrete from demolition would result in significant cost savings, while maintaining protection of environmental health and safety, across the Department of Energy (DOE) complex. The Idaho National Engineering and Environmental Laboratory (INEEL), Argonne National Laboratory East (ANL-E), and Vanderbilt University have teamed to develop a protocol for the authorized release of concrete, based on the existing DOE guidance of Order 5400.5, that applies across the DOE complex. The protocol will provide a streamlined method for assessing risks and costs, and reaching optimal disposal options, including re-use of the concrete within the DOE system.

  17. Internet-based calibration of a multifunction calibrator

    SciTech Connect (OSTI)

    BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

    2000-04-17T23:59:59.000Z

    A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

  18. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01T23:59:59.000Z

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  19. Energetic neutral atom imaging with the Polar CEPPAD/IPS instrument: Initial forward modeling results

    SciTech Connect (OSTI)

    Henderson, M.G.; Reeves, G.D.; Moore, K.R. [Los Alamos National Lab., NM (United States); Spence, H.E.; Jorgensen, A.M. [Boston Univ., MA (United States). Center for Space Physics; Fennell, J.F.; Blake, J.B. [Aerospace Corp., Los Angeles, CA (United States); Roelof, E.C. [Johns Hopkins Univ., Laurel, MD (United States). Applied Physics Lab.

    1997-12-31T23:59:59.000Z

    Although the primary function of the CEP-PAD/IPS instrument on Polar is the measurement of energetic ions in-situ, it has also proven to be a very capable Energetic neutral Atom (ENA) imager. Raw ENA images are currently being constructed on a routine basis with a temporal resolution of minutes during both active and quiet times. However, while analyses of these images by themselves provide much information on the spatial distribution and dynamics of the energetic ion population in the ring current, detailed modeling is required to extract the actual ion distributions. In this paper, the authors present the initial results of forward modeling an IPS ENA image obtained during a small geo-magnetic storm on June 9, 1997. The equatorial ion distribution inferred with this technique reproduces the expected large noon/midnight and dawn/dusk asymmetries. The limitations of the model are discussed and a number of modifications to the basic forward modeling technique are proposed which should significantly improve its performance in future studies.

  20. Experiences with TCP/IP over an ATM OC12 WAN

    SciTech Connect (OSTI)

    Nitzan, Rebecca L.; Tierney, Brian L.

    1999-12-23T23:59:59.000Z

    This paper discusses the performance testing experiences of a 622.08 Mbps OC12 link. The link will be used for large bulk data transfer, and as such, of interest are both the ATM level throughput rates and end-to-end TCP/IP throughput rates. Tests were done to evaluate the ATM switches, the IP routers, the end hosts, as well as the underlying ATM service provided by the carrier. A low level of cell loss, (resulting in <.01 % packet loss), decreased the TCP throughput rate considerably when one TCP flow was trying to use the entire OC12 bandwidth. Identifying and correcting cell loss in the network proved to be extremely difficult. TCP Selective Acknowledgement (SACK) improved performance dramatically, and the maximum throughput rate increased from 300 Mbps to 400 Mbps. The effects of TCP slow start on performance at OC12 rates are also examined, and found to be insignificant for very large file transfers (e.g., for a 10 GB file). Finally, a history of TCP performance over high-speed networks is presented.

  1. Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code

    E-Print Network [OSTI]

    No, Jong-Seon

    protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

  2. Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols

    E-Print Network [OSTI]

    Duan, Pu

    2012-07-16T23:59:59.000Z

    ................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

  3. Measurements and analysis of end-to-end Internet dynamics

    SciTech Connect (OSTI)

    Paxson, V [Univ. of California, Berkeley, CA (United States). Computer Science Division

    1997-04-01T23:59:59.000Z

    Accurately characterizing end-to-end Internet dynamics - the performance that a user actually obtains from the lengthy series of network links that comprise a path through the Internet - is exceptionally difficult, due to the network`s immense heterogeneity. At the heart of this work is a `measurement framework` in which a number of sites around the Internet host a specialized measurement service. By coordinating `probes` between pairs of these sites one can measure end-to-end behavior along O(N{sup 2}) paths for a framework consisting of N sites. Consequently, one obtains a superlinear scaling that allows measuring a rich cross-section of Internet behavior without requiring huge numbers of observation points. 37 sites participated in this study, allowing the author to measure more than 1,000 distinct Internet paths. The first part of this work looks at the behavior of end-to-end routing: the series of routers over which a connection`s packets travel. Based on 40,000 measurements made using this framework, the author analyzes: routing `pathologies` such as loops, outages, and flutter; the stability of routes over time; and the symmetry of routing along the two directions of an end-to-end path. The author finds that pathologies increased significantly over the course of 1995 and that Internet paths are heavily dominated by a single route. The second part of this work studies end-to-end Internet packet dynamics. The author analyzes 20,000 TCP transfers of 100 Kbyte each to investigate the performance of both the TCP endpoints and the Internet paths. The measurements used for this part of the study are much richer than those for the first part, but require a great degree of attention to issues of calibration, which are addressed by applying self-consistency checks to the measurements whenever possible. The author finds that packet filters are capable of a wide range of measurement errors, some of which, if undetected, can significantly taint subsequent analysis.

  4. CINEMA: Columbia InterNet Extensible Multimedia Architecture Kundan Singh, Wenyu Jiang, Jonathan Lennox, Sankaran Narayanan and Henning Schulzrinne

    E-Print Network [OSTI]

    CINEMA: Columbia InterNet Extensible Multimedia Architecture Kundan Singh, Wenyu Jiang, Jonathan Lennox, Sankaran Narayanan and Henning Schulzrinne Department of Computer Science, Columbia University and implementation of our Internet telephony system CINEMA (Columbia InterNet Extensible Multimedia Architecture

  5. Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"

    E-Print Network [OSTI]

    Koomey, Jonathan G.

    2008-01-01T23:59:59.000Z

    The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coal—the PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

  6. Exploration of the comics medium developed for use on the internet

    E-Print Network [OSTI]

    Piana, Brian James

    2000-01-01T23:59:59.000Z

    A new derivative of the comics medium may be created by incorporating computer and internet technology into the design process. Traditionally a printed medium, comics is now finding its way onto the internet; more comic creators are presenting...

  7. SP.772 Internet Technology in Local and Global Communities, Spring 2005

    E-Print Network [OSTI]

    Gray, Paul E.

    The MIT-Africa Internet Technology Initiative (MIT-AITI) organization is an innovative approach by MIT students to integrate computers and internet technology into the education of students in African schools. The program ...

  8. Quality Matters: Some Remarks on Internet Service Provisioning and Tariff Design

    E-Print Network [OSTI]

    Varaiya, Pravin

    Quality Matters: Some Remarks on Internet Service Provisioning and Tariff Design£ J¨orn AltmannÝ Bj on demand to derive some consequences for Internet service provisioning and tariff design. £This research

  9. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  10. CSP 550: Internet Programming Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and Paradigms, 2002.

    E-Print Network [OSTI]

    Heller, Barbara

    CSP 550: Internet Programming Texts Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and SOAP 9 hours Total 45 hours Edited March 2006 (html, css checks) CSP 550: Internet Programming - CS

  11. Productive Economy InternetMobilephonesBudgetanalysisGreeneconomyRapid

    E-Print Network [OSTI]

    Berzins, M.

    manufacturing work 1990s A new process, `Selective Laser Sintering', paves way for rapid manufacture of productsProductive Economy InternetMobilephonesBudgetanalysisGreeneconomyRapid manufacturing 1967 UK computer design files ­ using plastic lays foundation for new low-cost, low- waste manufacturing techniques

  12. World Wide Web Internet and Web Information Systems

    E-Print Network [OSTI]

    Cao, Longbing

    1 23 World Wide Web Internet and Web Information Systems ISSN 1386-145X World Wide Web DOI 10's request, provided it is not made publicly available until 12 months after publication. #12;World Wide Web worlds. Its detection is a typical use case of the broad-based Wisdom Web of Things (W2T) methodology

  13. SPOT PRICING FRAMEWORK FOR LOSS GUARANTEED INTERNET SERVICE CONTRACTS

    E-Print Network [OSTI]

    Kalyanaraman, Shivkumar

    . In a two-component approach to pricing, a nonlinear pricing scheme is used for cost recovery and a utility for cost recovery, and (ii) an options-based approach to price the risk of deviations in the loss based QoSPOT PRICING FRAMEWORK FOR LOSS GUARANTEED INTERNET SERVICE CONTRACTS Aparna Gupta Decision

  14. Internet and Mobile Services Patrick Clara, Manuel Piubelli

    E-Print Network [OSTI]

    Ricci, Francesco

    Domotics Internet and Mobile Services Patrick Clara, Manuel Piubelli 2010/11 Abstract People do and are considered to be annoying. Domotics, a J2ME mobile application provides a way to accomplish these tasks by a few keyboard hits from any place using the mobile phone. Moreover, Domotics implements an intelligence

  15. Roadmap: Technical and Applied Studies Computer Technology Internet/Multimedia

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Technical and Applied Studies ­ Computer Technology Internet/Multimedia ­ Bachelor Updated: 22-Aug-12/TET This roadmap is a recommended semester-by-semester plan of study for this major and minimum 39 upper-division credit hours #12;Roadmap: Technical and Applied Studies ­ Computer Technology

  16. Malicious Internet Use and Homeland Security Wolfgang W. Bein

    E-Print Network [OSTI]

    Bein, Wolfgang

    @cs.unlv.edu Abstract The advantages of speed, security and connectivity, which Information Technology brings new digital world; perhaps very much similar to the excitement experienced over nuclear energy: The Internet has redefined the meaning of neighborhood, enabling terrorist cells to communicate over long

  17. The Monitoring and Early Detection of Internet Worms

    E-Print Network [OSTI]

    Shenoy, Prashant

    to our society, it is necessary to set up a nation-scale worm-monitoring and early-warning system. (The to give people accurate early warning information and possible reaction time for counteractions1 The Monitoring and Early Detection of Internet Worms Cliff C. Zou, Weibo Gong, Fellow, IEEE, Don

  18. A Future Internet Architecture supporting Multipath Communication Networks

    E-Print Network [OSTI]

    Dreibholz, Thomas

    . In this paper, we propose a clean-slate conceptual design of a new architecture as a contribution to the ongoing extensions is becoming more and more common. In this paper, we present a novel clean-slate for the Internet to be mentioned that clean-slate, as explained by [3], should be viewed as a design process, not as a result

  19. Autonomic Power Management Schemes for Internet Servers and Data Centers

    E-Print Network [OSTI]

    Kozyrakis, Christos

    power control policies. In section III, we analyze the structural properties of the optimal policies,bambos,christos,dimeco}@stanford.edu Abstract-- We investigate autonomic power control policies for internet servers and data centers Programming approach that captures the power-performance tradeoff. We study the structural properties

  20. ARTIGO INTERNET Professores visitam o maior reactor de Fuso Nuclear

    E-Print Network [OSTI]

    Instituto de Sistemas e Robotica

    ARTIGO INTERNET Professores visitam o maior reactor de Fusão Nuclear in http reactor de Fusão Nuclear Experiência aproxima investigação das futuras gerações Doze professores do ensino secundário visitaram o maior reactor de fusão nuclear da Terra (JET), no Reino Unido, na semana passada

  1. Leveraging residential energy management through the Internet of Things

    E-Print Network [OSTI]

    Leveraging residential energy management through the Internet of Things Markus Weiss Engineering into the residential environment contribute significantly to today's energy consumption. However, there exists a lack be achieved with adequate information at hand. Thus, conserving energy in residential spaces requires making

  2. Inferring Internet Denial-of-Service Activity DAVID MOORE

    E-Print Network [OSTI]

    Wang, Deli

    -up connections. We believe our technique is the first to provide quantitative estimates of Internet-wide denial: Measurement, Security Additional Key Words and Phrases: backscatter, denial-of-service, network measurement by a similar assault, the root DNS servers were targeted in 2002, and SCO's corporate Web site

  3. Securing Internet Coordinate Embedding Systems Mohamed Ali Kaafar

    E-Print Network [OSTI]

    Turletti, Thierry

    Securing Internet Coordinate Embedding Systems Mohamed Ali Kaafar INRIA Sophia Antipolis, FR mkaafar@sophia.inria.fr Laurent Mathy Lancaster University, UK laurent@comp.lancs.ac.uk Chadi Barakat INRIA Sophia Antipolis, FR barakat@sophia.inria.fr Kave Salamatian LIP6, FR and EPFL, CH kave

  4. Virtual Networks under Attack: Disrupting Internet Coordinate Systems

    E-Print Network [OSTI]

    Turletti, Thierry

    Sophia Antipolis, FR mkaafar@sophia.inria.fr Laurent Mathy Lancaster University, UK and LAAS-CNRS, FR laurent@comp.lancs.ac.uk Thierry Turletti INRIA Sophia Antipolis, FR turletti@sophia.inria.fr Walid Dabbous INRIA Sophia Antipolis, FR dabbous@sophia.inria.fr ABSTRACT Internet coordinate-based systems

  5. Challenges in Inferring Internet Interdomain Congestion Matthew Luckie

    E-Print Network [OSTI]

    California at San Diego, University of

    to handle the traf- fic demand. The two primary forms of interconnection are transit, when one AS sells another ISP access to the global Internet, and peering, when two ISPs interconnect to ex- change customer with the agreement and be disconnected by the other party until a new agreement was reached. More recent peering

  6. OSCAR: Object Security Architecture for the Internet of Things

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    discuss the applicability of OSCAR to Smart City deployments. I. INTRODUCTION The long awaited InternetT scenarios, such as smart city deployments, where a large number of clients per constrained server.lastname}@imag.fr, {firstname.lastname}@st.com Abstract--Billions of smart, but constrained objects wirelessly connected

  7. On the Importance of Local Connectivity for Internet Topology Models

    E-Print Network [OSTI]

    Hand, Steven

    typically stem from beliefs about the true properties of the Internet, e.g. hierarchy and power- laws, which a power-law [8]. In this comparison we rely on a wide set of commonly used topological measures2 two main measurement techniques, i.e., BGP routing tables [1], [2] and traceroute maps [3

  8. Jitter Regulation in an Internet Router with Delay Consideration

    E-Print Network [OSTI]

    Imai, Hiroshi

    Jitter Regulation in an Internet Router with Delay Consideration Hisashi Koga Fujitsu Laboratories, jitter, the variability of delay of individual packets, must be kept low. We examine on­line algorithms in a router to regulate jitter for a given multimedia stream by holding packets in an internal buffer

  9. The Convergence of Internet Security (Spam, Viruses, Trojans, Phishing)

    E-Print Network [OSTI]

    Gutmann, Peter

    huge amounts of spam costs very little -- BBC News #12;Spam Technical Mechanisms Bulletproof hosting numbers of spam servers are located in China · Highly advanced telecom infrastructure · Cheaper bandwidth than in the West · China has 30 ­ 50,000 Internet police in 700 cities... ... who carefully investigate

  10. TungsTen--2004 79. Referencesthatincludeasectionmark()arefoundintheInternet

    E-Print Network [OSTI]

    TungsTen--2004 79. Referencesthatincludeasectionmark(§)arefoundintheInternet ReferencesCitedsection. TungsTen ByKimB.shedd Domestic survey data and tables were prepared by Amy C. Tolcin, statistical assistant, and the world production table was prepared by Glenn J. Wallace, international data coordinator

  11. Is the Internet for Porn? An Insight Into the Online Adult Industry

    E-Print Network [OSTI]

    Kruegel, Christopher

    Is the Internet for Porn? An Insight Into the Online Adult Industry Gilbert Wondracek1 , Thorsten Introduction "The Internet is for Porn" is the title of a satirical song that has been viewed several million at work. With a total worth of more than 97 billion USD in 2006 [14], the Internet porn industry yields

  12. Final Project Report Modulate of Internet Radio Into FM Using GNU Radio

    E-Print Network [OSTI]

    Yu, Chansu

    Final Project Report Modulate of Internet Radio Into FM Using GNU Radio Department of Electrical-Introduction: Internet radio (also known as Webcasting) is becoming more and more popular. Especially that it covers for people traveling all the time or living away from there home country, internet radio helps them keep

  13. Jean Arnaud, Sara Bouchenak Performance, Availability and Cost of Self-Adaptive Internet Services

    E-Print Network [OSTI]

    Bouchenak, Sara

    Jean Arnaud, Sara Bouchenak Performance, Availability and Cost of Self-Adaptive Internet Services Directions IGI Global, 2011 #12;#12;Performance, Availability and Cost of Self-Adaptive Internet Services tradeoff between service performance and availability. This is made harder as Internet service workloads

  14. TEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE

    E-Print Network [OSTI]

    ://www.ncemch.org/pubs/PDFs/breastfeedingTIB.pdf Internet monograph (standard citation to a part) Inhalent abuse [Internet]. Bethesda (MD): National Institute on Drug Abuse (US); 1994 [revised 2000 Jul; cited 2001 Mar 1]. How can inhalent abuse Care [Internet]. 1997 Apr [cited 1997 Nov 4];2(3):[about 10 p.]. Available from: http

  15. The 3rd Workshop on Active Internet Measurements (AIMS-3) Report

    E-Print Network [OSTI]

    California at San Diego, University of

    , and government, fo- cused on analysis of goals, means, and emerging issues in ac- tive Internet measurement for macroscopic measurement and mapping of Internet properties, in particular those related to cybersecurity Internet measurement, particularly those related to cybersecurity, as well as exchange of insights among

  16. Communications of the ACM, June 1999 Lessons from Haiti's Internet Development

    E-Print Network [OSTI]

    Peha, Jon M.

    1 Communications of the ACM, June 1999 Lessons from Haiti's Internet Development Jon M. Peha Abstract Haiti does not appear to be the most fertile ground for Internet growth. It is a poor nation, and have sometimes explored unconventional technical approaches. Haiti now has four commercial Internet

  17. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01T23:59:59.000Z

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  18. Adaptive protocols for mobile ad hoc networks

    E-Print Network [OSTI]

    Holland, Gavin Douglas

    2005-02-17T23:59:59.000Z

    . We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...

  19. Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP). Technology summary

    SciTech Connect (OSTI)

    Not Available

    1994-04-01T23:59:59.000Z

    The Characterization, Monitoring, and Sensor Technology Integrated Program seeks to deliver needed technologies, timely and cost-effectively, to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The scope of characterizations monitoring, and sensor technology needs that are required by those organizations encompass: (1) initial location and characterization of wastes and waste environments - prior to treatment; (2) monitoring of waste retrieval, remediation and treatment processes; (3) characterization of the co-position of final waste treatment forms to evaluate the performance of waste treatments processes; and (4) site closure and compliance monitoring. Wherever possible, the CMST-IP fosters technology transfer and commercialization of technologies that it sponsors.

  20. SN 2009ip: Constraining the latest explosion properties by its late-phase light curve

    E-Print Network [OSTI]

    Moriya, Takashi J

    2015-01-01T23:59:59.000Z

    We constrain the explosion and circumstellar properties at the 2012b event of SN 2009ip based on its late-phase bolometric light curve recently reported. The explosion energy and ejected mass at the 2012b event are estimated as 0.02 Msun and 2e49 erg, respectively. The circumstellar medium is assumed to have two components: an inner shell and an outer wind. The inner shell which is likely created at the 2012a event has 0.2 Msun. The outer wind is created by the wind mass loss before the 2012a mass ejection, and the progenitor is estimated to have had the mass-loss rate about 0.1 Msun/yr with the wind velocity 550 km/s before the 2012a event. The estimated explosion energy and ejected mass indicate that the 2012b event is not caused by a regular supernova.

  1. LA REVUE DE L'EPI N 88 UNE CLASSE -UN MONDE -SUR INTERNET UNE CLASSE -UN MONDE -SUR INTERNET

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    INTERNET SANS PAPIER- SANS CAHIER Monique PERDRILLAT UNIVERSITÉ VIRTUELLE INTERNATIONALE À L'OCCASION DU G8 pays du G8 Pendant la période du sommet du G8, qui a eu lieu aux États-Unis, à Denver, du 20 au 22 juin objectifs pédagogiques Chaque pays représenté au sommet du G8 a constitué sa déléga- tion officielle de

  2. Device-independent entanglement-based Bennett 1992 protocol

    E-Print Network [OSTI]

    Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

    2012-10-05T23:59:59.000Z

    In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

  3. Fibred Coalgebraic Logic and Quantum Protocols

    E-Print Network [OSTI]

    Daniel Marsden

    2014-12-30T23:59:59.000Z

    Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  4. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  5. Analysis of the Impact of SR-ARQ on the IP Packet Delay Performance in Mobile Data

    E-Print Network [OSTI]

    Murphy, John

    Analysis of the Impact of SR-ARQ on the IP Packet Delay Performance in Mobile Data Networks By in wired enviroment . . . . . . . . . . . . . . . . . . . . 43 3.2.2 TCP in the wireless environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3.3.1 Scheduling algorithms for wired (error free) enviroment . . 50 3.3.2 Scheduling algorithms

  6. Comparison of Energy Efficiency in PSTN and VoIP Florin Bota, Faheem Khuhawar, Marco Mellia, Michela Meo

    E-Print Network [OSTI]

    Comparison of Energy Efficiency in PSTN and VoIP Systems Florin Bota, Faheem Khuhawar, Marco Mellia.lastname@polito.it ABSTRACT The importance of deploying energy efficient networks has vastly increased due to the rapidly to existing networks that could prove to be energy efficient. In this paper, two telephone net- works namely

  7. Traceback of Single IP Packets Using SPIE W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren,

    E-Print Network [OSTI]

    Zhou, Yuanyuan

    , scalable fashion. We present SPIE, the Source Path Isola- tion Engine, a hash-based technique for IP challenges in the construction of such a tracing system including determining which packets to trace, main- taining privacy, and minimizing cost, both in time spent tracking packets and in storage used to keep

  8. AbstractThe potential use of IP networks for real-time high performance robots and automation is enormous and

    E-Print Network [OSTI]

    Chow, Mo-Yuen

    , control systems, DC motors, distributed control, real time system. I. INTRODUCTION RECENT and advancing trend in the networked control area is to replace specialized industrial networks with a general is enormous and appealing. A widely attractive objective for an IP-based mobile robot is to control a mobile

  9. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    the Development and Maintenance of Criteria Review and Approach Documents, March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments...

  10. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that shown in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the...

  11. aided routing protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    reduction in the number of routing messages. However, current position Yasinsac, Alec 2 Energy Efficient Location Aided Routing Protocol for Wireless MANETs CERN Preprints...

  12. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...

    Open Energy Info (EERE)

    calculation-toolsall-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions...

  13. Dynamic Protocol Tuning Algorithms for High Performance Data...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Dynamic Protocol Tuning Algorithms for High Performance Data Transfers Event Sponsor: Mathematics and Computing Science Seminar Start Date: Apr 3 2015 - 2:00pm BuildingRoom:...

  14. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

  15. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

  16. acids extraction protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  17. aureus decolonisation protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  18. addfam study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  19. antineoplastic combined chemotherapy protocols: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  20. afinos study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  1. agrobacterium-mediated transformation protocol: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  2. antineoplastic protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  3. Protective Force Protocols for ESS Supported Performance Tests...

    Broader source: Energy.gov (indexed) [DOE]

    security force-on-force performance tests and exercises. Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 More Documents & Publications...

  4. BPA Response to Comments on Oversupply Management Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

  5. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    NONE

    1996-03-01T23:59:59.000Z

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  6. Modelling unbounded parallel sessions of security protocols in CSP

    E-Print Network [OSTI]

    Roscoe, Bill

    Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

  7. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  8. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

  9. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  10. SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols

    E-Print Network [OSTI]

    Han, Richard Y.

    SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols Anmol Sheth and Richard Han@cs.colorado.edu Abstract-- Asymmetric transmission ranges caused due to transmit power control have the undesirable effect access. In this paper we present a new reactive power controlled MAC protocol, SHUSH, which tackles

  11. A Power Control MAC Protocol for Ad Hoc Networks

    E-Print Network [OSTI]

    A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A This paper presents a power control MAC protocol that al- lows nodes to vary transmit power level on a per control. The main idea of these power control schemes is to use different power lev- els for RTS

  12. Distributed Temporal Logic for the Analysis of Security Protocol Models

    E-Print Network [OSTI]

    Basin, David

    , showing that it is sufficient to consider models in which the intruder completely controls the networkDistributed Temporal Logic for the Analysis of Security Protocol Models David Basin Department to reason about and relate different security-protocol models. This includes reasoning about model

  13. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  14. METHODOLOGY Open Access An improved pyrite pretreatment protocol for

    E-Print Network [OSTI]

    Halevy, Itay

    METHODOLOGY Open Access An improved pyrite pretreatment protocol for kinetic and isotopic studies, therefore, desirable. A robust standardized pretreatment protocol for removal of fine particles. Results: Our data demonstrate the presence of large fractions of S0 on untreated pyrite particle surfaces

  15. Cross-layered Synchronization Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cross-layered Synchronization Protocol for Wireless Sensor Networks Thomas Beluch, Daniela. Advances in wireless sensor network performances and improvement of attainable bit rates allow research on such measurement systems using Wireless Sensor Networks (WSNs). However, current WSN synchronization protocols do

  16. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Micha¨el Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  17. Field and Lab Methods & Protocols University of Michigan

    E-Print Network [OSTI]

    Kling, George W.

    SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

  18. Adaptive Data Collection Protocol using Reinforcement Learning for VANETs

    E-Print Network [OSTI]

    Boyer, Edmond

    Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

  19. A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Nahrstedt, Klara

    ­hop wireless ad­hoc networks, designing energy­efficient rout­ ing protocols is critical since nodes are power be mobile, demanding the energy­efficient routing protocol to be fully distributed and adaptive­ spect to end­to­end energy­efficient routes. Finally, preliminary simulation results are presented

  20. Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols

    E-Print Network [OSTI]

    Wang, Yu

    28223, USA {lcao2, tdahlber, ywang32}@uncc.edu Abstract-- Energy aware routing protocols metric and aim to save energy consumption per packet. However, such protocols do not take the nodes' energy capacity into account. Thus, the energy consumption is not fair among nodes in the network

  1. DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network

    E-Print Network [OSTI]

    Shenoy, Prashant

    DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network Xiaolong Li, Pengyu Zhang security protocol, is proposed in this paper to secure data sensing networks. With the use of symmetric to evaluate the performance of DTK, and their relationship is derived. Furthermore, simulation carried on real

  2. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30T23:59:59.000Z

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  3. Improved protocols of secure quantum communication using W states

    E-Print Network [OSTI]

    Chitra Shukla; Anindita Banerjee; Anirban Pathak

    2012-04-20T23:59:59.000Z

    Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

  4. Should mobile Internet services be an extension of the fixed Internet? Context-of-use, fixed-mobile reinforcement and personal innovativeness

    E-Print Network [OSTI]

    Twente, Universiteit

    reinforcement and personal innovativeness Mark de Reuver Faculty Technology, Policy and Management Delft Innovation & Interaction Utrecht, The Netherlands Harry Bouwman Faculty Technology, Policy and ManagementShould mobile Internet services be an extension of the fixed Internet? Context-of-use, fixed-mobile

  5. To appear in Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, August 2013. Internet Censorship in Iran: A First Look

    E-Print Network [OSTI]

    Eustice, Ryan

    , August 2013. Internet Censorship in Iran: A First Look Simurgh Aryan Aryan Censorship Project aryan censorship in Iran based on network measurements conducted from a major Iranian ISP during the lead up Introduction Iran is known as one of the leading suppressors of Internet freedom. Reporters Without Borders

  6. T.T.T.Nguyen, G.Armitage, A Survey of Techniques for Internet Traffic Classification using Machine Learning A Survey of Techniques for Internet Traffic

    E-Print Network [OSTI]

    Armitage, Grenville

    of their various business goals. Traffic classification may be a core part of automated intrusion detection systemsT.T.T.Nguyen, G.Armitage, A Survey of Techniques for Internet Traffic Classification using Machine Learning A Survey of Techniques for Internet Traffic Classification using Machine Learning Thuy T.T. Nguyen

  7. A New Internet Architecture to Enable Software Defined Optics

    E-Print Network [OSTI]

    architecture. According to this point of view, it is time for taking a "clean-slate" approach to address and without being constrained by the existing architecture and protocols [17]. Major clean-slate research initiatives in the US (FIND [18]) and Europe (FIRE [21]) take a two-pronged strategy in clean- slate design

  8. How to truly improve the Internet's transport layer

    E-Print Network [OSTI]

    Welzl, Michael

    Lon designers ­ want to get best performance with minimal effort · Note: difference between updaLng an already working applicaLon and wriLng a new one from scratch ­ making use of a protocol which is now only available in 1% of the world: usually not worth it · Note for commercial applicaLons: programming effort

  9. Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level

    E-Print Network [OSTI]

    Kohm, Katherine E.

    2009-01-01T23:59:59.000Z

    Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

  10. The Quiescent Accretion Disk in IP Peg at Near-Infrared Wavelengths

    E-Print Network [OSTI]

    C. S. Froning; E. L. Robinson; William F. Welsh; Janet H. Wood

    1999-07-07T23:59:59.000Z

    We present near-infrared, H-band (1.45-1.85 microns) observations of the eclipsing dwarf nova, IP Peg, in quiescence. The light curves are composed of ellipsoidal variations from the late-type secondary star and emission from the accretion disk and the bright spot. The light curves have two eclipses: a primary eclipse of the accretion disk and the bright spot by the companion star, and a secondary eclipse of the companion star by the disk. The ellipsoidal variations of the secondary star were modeled and subtracted from the data. The resulting light curve shows a pronounced double-hump variation. The double-hump profile resembles those seen in the light curves of WZ Sge and AL Com and likely originates in the accretion disk. The primary eclipse was modeled using maximum entropy disk mapping techniques. The accretion disk has a flat intensity distribution and a cool brightness temperature (Tbr=3000 K) in the near-infrared. Superimposed on the face of the disk is the bright spot (Tbr=10,000 K); the position of the bright spot is different from the observed range of visible bright spot positions. The near-infrared accretion disk flux is dominated by optically thin emission. The secondary eclipse indicates the presence of some occulting medium in the disk, but the eclipse depth is too shallow to be caused by a fully opaque accretion disk.

  11. Embedding Internet Technology for Home Automation Matthias Kovatsch, Markus Weiss, Dominique Guinard

    E-Print Network [OSTI]

    controllers. This raises the question whether the classical architectures and networking standards of the home and building au- tomation domain are still adequate. Already in 2001 the question appeared whether IP is "the

  12. A panchromatic view of the restless SN 2009ip reveals the explosive ejection of a massive star envelope

    SciTech Connect (OSTI)

    Margutti, R.; Milisavljevic, D.; Soderberg, A. M.; Chornock, R.; Zauderer, B. A.; Sanders, N. E.; Berger, E. [Harvard-Smithsonian Center for Astrophysics, 60 Garden St., Cambridge, MA 02138 (United States); Murase, K. [Institute for Advanced Study, Princeton, NJ 08540 (United States); Guidorzi, C. [Department of Physics, University of Ferrara, via Saragat 1, I-44122 Ferrara (Italy); Kuin, P. [University College London, MSSL, Holmbury St. Mary, Dorking, Surrey RH5 6NT (United Kingdom); Fransson, C. [Department of Astronomy and the Oskar Klein Centre, Stockholm University, AlbaNova, SE-106 91 Stockholm (Sweden); Levesque, E. M. [CASA, Department of Astrophysical and Planetary Sciences, University of Colorado, 389-UCB, Boulder, CO 80309 (United States); Chandra, P.; Challis, P. [National Centre for Radio Astrophysics, Tata Institute of Fundamental Research, Pune University Campus, Ganeshkhind, Pune 411007 (India); Bianco, F. B. [Center for Cosmology and Particle Physics, New York University, 4 Washington Place, New York, NY 10003 (United States); Brown, P. J. [George P. and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A. and M. University, Department of Physics and Astronomy, 4242 TAMU, College Station, TX 77843 (United States); Chatzopoulos, E. [Department of Astronomy, University of Texas at Austin, Austin, TX 78712-1205 (United States); Cheung, C. C. [Space Science Division, Naval Research Laboratory, Washington, DC 20375-5352 (United States); Choi, C. [CEOU/Department of Physics and Astronomy, Seoul National University, Seoul 151-742 (Korea, Republic of); Chomiuk, L. [National Radio Astronomy Observatory, P.O. Box O, Socorro, NM 87801 (United States); and others

    2014-01-01T23:59:59.000Z

    The double explosion of SN 2009ip in 2012 raises questions about our understanding of the late stages of massive star evolution. Here we present a comprehensive study of SN 2009ip during its remarkable rebrightenings. High-cadence photometric and spectroscopic observations from the GeV to the radio band obtained from a variety of ground-based and space facilities (including the Very Large Array, Swift, Fermi, Hubble Space Telescope, and XMM) constrain SN 2009ip to be a low energy (E ? 10{sup 50} erg for an ejecta mass ?0.5 M {sub ?}) and asymmetric explosion in a complex medium shaped by multiple eruptions of the restless progenitor star. Most of the energy is radiated as a result of the shock breaking out through a dense shell of material located at ?5 × 10{sup 14} cm with M ? 0.1 M {sub ?}, ejected by the precursor outburst ?40 days before the major explosion. We interpret the NIR excess of emission as signature of material located further out, the origin of which has to be connected with documented mass-loss episodes in the previous years. Our modeling predicts bright neutrino emission associated with the shock break-out if the cosmic-ray energy is comparable to the radiated energy. We connect this phenomenology with the explosive ejection of the outer layers of the massive progenitor star, which later interacted with material deposited in the surroundings by previous eruptions. Future observations will reveal if the massive luminous progenitor star survived. Irrespective of whether the explosion was terminal, SN 2009ip brought to light the existence of new channels for sustained episodic mass loss, the physical origin of which has yet to be identified.

  13. Response of the engraver beetle, IPS perturbatus, to semiochemicals in white spruce stands of interior Alaska. Forest Service research paper

    SciTech Connect (OSTI)

    Werner, R.A.

    1993-05-01T23:59:59.000Z

    Field tests on the efficacy of various scolytid bark beetle pheromones to attract Ips perturbatus (Eichhoff) were conducted from 1977 through 1992 in stands of white spruce (Picea glauca (Moench) Voss) in interior Alaska. Several pheromones attracted high numbers of I. perturbatus and species of the predator Thanasimus to baited funnel traps. Test results also indicated that attacks by I. perturbatus may be deferred by certain semiochemicals.

  14. Effects of verbenone and brevicomin on within-tree populations of Dendroctonus frontalis and Ips avulsus (Coleoptera: Scolytidae) 

    E-Print Network [OSTI]

    Watterson, Gary Phillip

    1979-01-01T23:59:59.000Z

    EFFECTS OF VERBENONE AND BREVICOMIN ON WITHIN-TREE POPULATIONS OF DENDROCTONUS FRONTALIS AND IPS AVULSUS (COLEOPTERA: SCOLYTIDAE) A Thesis by GARY PHILLIP WATTERSON Submitted to the Graduate College of Texas A8M University in partial... by GARY PHILLIP WATTERSON Approved as to style and content by: Chairman of o ee Head of Department ember Member I , Mem er December, 1979 ABSTRACT Effects of Verbenone and Brevi comi n on Within-Tree Populations of Dendroctonus frontalis and ~I...

  15. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect (OSTI)

    Bogard, J.S.

    1998-12-01T23:59:59.000Z

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  16. A New Protocol of Continuous-Variable Entanglement Distillation

    E-Print Network [OSTI]

    Shi Jin; Xian-Min Jin; Joshua Nunn; Animesh Datta; Ian Walmsley

    2012-10-16T23:59:59.000Z

    We introduce a new protocol in continuous variable entanglement distillation that requires only linear temporal and constant physical or spatial resources.Compared with the existing protocols, our protocol uses atom-photon entanglement to substitute for atom-atom entanglement in existing protol, which will not only save the number of quantum memories, but also has the advantages in operation efficiency and temporal saving. The distillation can be realized by a fixed model of iterations, in which only three quantum memories and photon detectors are required.

  17. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  18. Parallel decomposition of the logical link control protocol

    E-Print Network [OSTI]

    Bajpai, Dhruv Haribanshnath

    1991-01-01T23:59:59.000Z

    INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

  19. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20T23:59:59.000Z

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  20. 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 5 Cisco Unified IP Phone 6945

    E-Print Network [OSTI]

    Moeller, Ralf

    -over-Ethernet (PoE) Class 1, which is the lowest-power consumption IP phone to save energy and support your green (Sweden) Serbian (Republic of Serbia and Republic of Montenegro) Slovenian (Slovenia) Thai (Thailand

  1. 1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2002

    E-Print Network [OSTI]

    Kocur, George

    Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

  2. 1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2004

    E-Print Network [OSTI]

    Kocur, George

    Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

  3. The Economy of Internet-Based Hospitality Exchange

    E-Print Network [OSTI]

    Tagiew, Rustam

    2015-01-01T23:59:59.000Z

    In this paper, we analyze and compare general development and individual behavior on two non-profit internet-based hospitality exchange services -- bewelcome.org and warmshowers.org. We measure the effort needed to achieve a real-life interaction, whereby the advantages of mutual altruism arise. The effort needed is the communication quantified in units of time. Since the amount of effort is not obvious to individual users, the development of the effort investing strategy is investigated. The impact of individual behavior on general development is discussed.

  4. Eclipse maps of spiral shocks in the accretion disc of IP Pegasi in outburst

    E-Print Network [OSTI]

    Raymundo Baptista; E. Harlaftis; D. Steeghs

    2000-02-08T23:59:59.000Z

    Eclipse lightcurves of the dwarf nova IP Peg during the November 1996 outburst are analysed with eclipse mapping techniques to constrain the location and investigate the spatial structure of the spiral shocks observed in the Doppler tomograms (Harlaftis et al. 1999). Eclipse maps in the blue continuum and in the CIII+NIII 4650 emission line show two asymmetric arcs of \\sim 90 degrees in azimuth and extending from intermediate to the outer disc regions (R \\simeq 0.2 - 0.6 R_{L1}, where R_{L1} is the distance from disc centre to the inner Lagrangian point) which are interpreted as being the spiral shocks seen in the Doppler tomograms. The HeII 4686 eclipse map also shows two asymmetric arcs diluted by a central brightness source. The central source probably corresponds to the low-velocity component seen in the Doppler tomogram and is understood in terms of gas outflow in a wind emanating from the inner parts of the disc. We estimate that the spirals contribute about 16 and 30 per cent of the total line flux, respectively, for the HeII and CIII+NIII lines. Comparison between the Doppler and eclipse maps reveal that the Keplerian velocities derived from the radial position of the shocks are systematically larger than those inferred from the Doppler tomography indicating that the gas in the spiral shocks has sub-Keplerian velocities. We undertake simulations with the aim to investigate the effect of artifacts on the image reconstruction of the spiral structures.

  5. Optimization Online - Quantum and classical coin-flipping protocols ...

    E-Print Network [OSTI]

    Ashwin Nayak

    2015-04-21T23:59:59.000Z

    Apr 21, 2015 ... In this analogy, classical systems correspond to linear programming ... Moreover, if the product of Alice and Bob's optimal cheating probabilities is 1/2, then exactly one party can perfectly control the outcome of the protocol.

  6. The Greenhouse Gas Protocol Initiative: Measurement and Estimation...

    Open Energy Info (EERE)

    in conjunction with other WRI tools (e.g., the GHG Protocol tools for stationary combustion and purchased electricity), or in conjunction with other non-WRI tools that a...

  7. Transaction Abort Rate Reduction with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muñoz, Francesc

    and Francesc D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform´atica Universitat Polit`ecnica de Val Abort Rate Reduction with Prioritized Atomic Multicast Protocols Emili Miedes and Francesc D. Mu~noz-Esco

  8. Proposals for Non-PGM Catalyst Target and Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

  9. User managed wireless protocol stacks Vijay T. Raisinghani

    E-Print Network [OSTI]

    Iyer, Sridhar

    User experience on mobile devices is bound by the device constraints of memory, processing power, battery life and variations in the wireless network. Cross layer feedback in the protocol stack is useful

  10. A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.

    E-Print Network [OSTI]

    Van Dyke, Aaron R. (Aaron Robert)

    2009-01-01T23:59:59.000Z

    A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

  11. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  12. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingÕumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  13. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01T23:59:59.000Z

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  14. an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux

    E-Print Network [OSTI]

    Coupechoux, Marceau

    CROMA - an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux Institut Eurecom and Alcatel: +33 1 69 63 43 60 marceau.coupechoux@alcatel.fr Bruno Baynat University Pierre et Marie Curie, Paris

  15. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  16. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01T23:59:59.000Z

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  17. Predictive Protocol Management with Contingency Planning for Wireless Sensor Networks

    E-Print Network [OSTI]

    Raja, Anita

    characteristics of the Radio-Frequency (RF) in which the network operates. I. INTRODUCTION Energy efficiency protocol model with contingency planning (PPM & CP). The premise behind the approach is that providing

  18. Distributed Protocols as Behaviours in Erlang Darren Demicoli

    E-Print Network [OSTI]

    Francalanza, Adrian

    Distributed Protocols as Behaviours in Erlang Darren Demicoli CS, ICT Univeristy of Malta ddem0003@um.edu.mt Adrian Francalanza CS, ICT Univeristy of Malta adrian.francalanza@um.edu.mt ABSTRACT We

  19. Modeling in dyadic protocols for training complex skills

    E-Print Network [OSTI]

    Jordan, Jeffrey Alan

    1991-01-01T23:59:59.000Z

    MODELING IN DYADIC PROTOCOLS FOR TRAINING COMPLEX SKILLS A Thesis by JEFFREY ALAN JORDAN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE...) Charles FL Shea (Member) t n Worchel / e d of Department) / December 1991 ABSTRACT Modeling in Dyadic Protocols for Training Complex Skills. (December 1991) Jeffrey Alan Jordan, B. S. , Texas A&M University Chair of Advisory Committee: Dr. Wayne...

  20. Effective algorithms and protocols for wireless networking: a topological approach

    E-Print Network [OSTI]

    Zhang, Fenghui

    2008-10-10T23:59:59.000Z

    EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of DOCTOR OF PHILOSOPHY August 2008 Major Subject: Computer Science EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University...

  1. An internet tool for designing energy efficient homes

    SciTech Connect (OSTI)

    Milne, M.; Gomez, C.; Leeper, D.; Zurick, J.; Nindra, A.; Shen, J.; Kobayashi, Y.

    1999-07-01T23:59:59.000Z

    To help their 4.5 million residential customers make energy efficient decisions, Southern California Gas asked UCLA to develop an Internet-based simulation tool called Project REED (Residential Energy Efficient Design). The critical problem is to give these ratepayers an easy way to visualize the relative effectiveness of their various options. REED is a internet-based tool that calculates the annual gas and electricity cost for each separate building design or operating decision. Hourly climate data for the Typical Meteorological Year (TMY2) in all the climate zones in the SoCalGas service area are built in, as well as utility rates for each type of residential service. REED's Expert System first designs a basic Code Compliant home, then designs a more Energy Efficient design based on local climate, and it shows how much money ratepayers would save. The simulation engine inside REED is SOLAR-5, one of the nation's most widely used whole building energy design tools. SOLAR-5 has been validated against DOE-2 using the BESTEST procedure. This paper, one of a pair describing REED, explains the project from the user's point of view and describes what was learned from the Ratepayer Usability Test. The second paper explains the project from the simulation and software engineering point of view.

  2. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  3. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

  4. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

  5. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24T23:59:59.000Z

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  6. Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    , ljilja}@cs.sfu.ca Abstract This paper describes OPNET implementation of the Mobile Application Part (MAP) protocol within the General Packet Radio Service (GPRS) model. MAP represents an application layer protocol residing on top of the Signaling System 7 (SS7) protocol stack. In GPRS networks, MAP protocol supports

  7. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31T23:59:59.000Z

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  8. A Virtual Learning Environment for Doing Business on the Internet Roumen Nikolov & Krassen Stefanov,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    environment demonstrates the potential of Internet to stimulate the co-operative work of people who have never1 A Virtual Learning Environment for Doing Business on the Internet Roumen Nikolov & Krassen, collaborative work, business, or other joint activities. These communities cross the national and cultural

  9. Hop-by-hop Computing for Green Internet Routing (Technical report, under revision)

    E-Print Network [OSTI]

    Wang, Dan

    Hop-by-hop Computing for Green Internet Routing (Technical report, under revision) Yuan Yang@cernet.edu.cn Abstract--Energy conservation is a global concern nowadays and it is widely expected that energy cost will continuously increase in the near future. The design of the Internet, un- fortunately, has not taken energy

  10. 15 17 June 2011, T-Labs Berlin Germany Innovative Internet

    E-Print Network [OSTI]

    Rossak, Wilhelm R.

    15 ­ 17 June 2011, T-Labs Berlin Germany Innovative Internet Community Systems Welcome to the 11th Berlin/Germany, 15 ­ 17 June 2011 OrgTeam Deutsche Telekom Laboratories & Technische Universität Berlin #12;15 ­ 17 June 2011, T-Labs Berlin Germany Innovative Internet Community Systems Opening Session I2

  11. The holonic enterprise: a model for Internet-enabled global manufacturing supply chain and workflow

    E-Print Network [OSTI]

    Ulieru, Mihaela

    The holonic enterprise: a model for Internet-enabled global manufacturing supply chain and workflow, which supports organizational information that, in turn, can mirror social organization. The Holonic with an overview of the three main concepts used to develop our HE model: holonic systems, MAS, and the Internet

  12. An Internet-Worm Early Warning System Shigang Chen Sanjay Ranka

    E-Print Network [OSTI]

    Chen, Shigang

    An Internet-Worm Early Warning System Shigang Chen Sanjay Ranka Department of Computer on the properties and effectiveness of this early warning system, and back up our claims by numerical results. I of defeating Internet worms. An early warning system is essential in fighting against natural disasters

  13. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  14. Toward a New Addressing Scheme for a Service-Centric Internet

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    , and it is positioned as a clean slate alternative aimed at overcoming the critical issues in today's Internet Terms--Naming and addressing, locators, identifiers, service-centric networks, clean slate, scalability such initiative is TAR- IFA [5], which has developed a clean slate architecture for the Future Internet (FI

  15. 3.5 ADVANCED MULTIMEDIA FOR EDUCATION ON THE INTERNET Joel Plutchak*

    E-Print Network [OSTI]

    Wilhelmson, Robert

    3.5 ADVANCED MULTIMEDIA FOR EDUCATION ON THE INTERNET Joel Plutchak* , Noah Nigg, Daniel J. Bramer and viewing of more advanced forms of multimedia content to the typical Internet user. Web developers computers and new multimedia formats allow access to animation, video, and interactive diagrams that can

  16. How Internet Concepts and Technologies Can Help Green and Smarten the Electrical Grid

    E-Print Network [OSTI]

    Rosenberg, Catherine P.

    How Internet Concepts and Technologies Can Help Green and Smarten the Electrical Grid Srinivasan of a smart, green grid. This is because both the Internet and the electrical grid are designed to meet Terms Design Keywords Electrical grid, Green Networking Permission to make digital or hard copies of all

  17. Gateway Adaptive Pacing for TCP across Multihop Wireless Networks and the Internet*

    E-Print Network [OSTI]

    Lindemann, Christoph

    Gateway Adaptive Pacing for TCP across Multihop Wireless Networks and the Internet* Sherif M. El introduce an effective congestion control scheme for TCP over hybrid wireless/wired networks comprising a multihop wireless IEEE 802.11 network and the wired Internet. We propose an adaptive pacing scheme

  18. SOFAnet: Middleware for Software Distribution over Internet Ladislav Sobr, Petr Tuma

    E-Print Network [OSTI]

    SOFAnet: Middleware for Software Distribution over Internet Ladislav Sobr, Petr Tuma Distributed.tuma@mff.cuni.cz Abstract The paper focuses on software distribution over the Internet, points to weaknesses of the current practice and argues for removing the weaknesses by introducing a ubiquitous distribution framework

  19. Zephyr: A secure Internet-based process to streamline engineering procurements using the World Wide Web

    SciTech Connect (OSTI)

    Jordan, C.W.; Cavitt, R.E.; Niven, W.A.; Warren, F.E.; Taylor, S.S.; Sharick, T.M.; Vickers, D.L.; Mitschkowetz, N.; Weaver, R.L.

    1996-08-13T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is piloting an Internet- based paperless process called `Zephyr` to streamline engineering procurements. Major benefits have accrued by using Zephyr in reducing procurement time, speeding the engineering development cycle, facilitating industrial collaboration, and reducing overall costs. Programs at LLNL are benefiting by the efficiencies introduced since implementing Zephyr`s engineering and commerce on the Internet.

  20. ENERGY NEEDS IN AN INTERNET ECONOMY: A CLOSER LOOK AT DATA CENTERS

    E-Print Network [OSTI]

    Data Center Loads VI. Using Measured Data to Confirm Power Needs VII. Reasons for Exaggerated Forecasts changes. This Internet economy also brings with it new requirements for power and power systems. In many the Internet to purchase products from stores around the country rather than being limited to stores