Powered by Deep Web Technologies
Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

IP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance  

E-Print Network [OSTI]

, smart cities, structural health management systems, smart grid and energy management, and transportationIP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance White paper #1 Adam, Cisco Systems September 2008 Executive Summary The emerging application space for smart objects requires

Dunkels, Adam

2

Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices  

DOE Patents [OSTI]

A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

Kouchri, Farrokh Mohammadzadeh

2012-11-06T23:59:59.000Z

3

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network [OSTI]

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

4

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network [OSTI]

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

5

Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico  

E-Print Network [OSTI]

This project-thesis examines the technical requirements of a Voice over Internet Protocol (VoIP) solution and is it advantageous for a Multinational Corporation (MNC) to utilize the Project Management Office (PMO) processes as defined by the Project...

Perez, Mary Louise

2012-08-31T23:59:59.000Z

6

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

Sandhu, Ravi

7

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

Sandhu, Ravi

8

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

Sandhu, Ravi

9

Privacy of encrypted Voice Over Internet Protocol  

E-Print Network [OSTI]

of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

Lella, Tuneesh Kumar

2008-10-10T23:59:59.000Z

10

Performance comparison of native ATM vs IP over ATM  

E-Print Network [OSTI]

engineers through its high bandwidth and multi traffic support. The robustness of the Internet Protocol (115 contributed to massive increase in Internet hosts globally. IP is a connectionless protocol as opposed to ATM, which is connection oriented...

Mohammed, Shajiuddin Asif

1998-01-01T23:59:59.000Z

11

On the development of Voice over IP  

E-Print Network [OSTI]

Internet Protocol (VoIP) security and proposed an Internet draft on secure retargeting and response identity. The draft provides a simple and comprehensive solution to the response identity, call recipient identity and intermediate server retargeting...

Yang, Xu

2009-05-15T23:59:59.000Z

12

CSP 541: Internet Technologies W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison-Wesley, ISBN 0201633469  

E-Print Network [OSTI]

CSP 541: Internet Technologies Texts W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison March 2006 (html, css checks) CSP 541: Internet Technologies - CS Dept, Illinois Institut... 1 of 1 #12;

Heller, Barbara

13

Mobile IP Survey Chakchai So-In, s_chakchai@yahoo.com  

E-Print Network [OSTI]

Mobile IP Survey Chakchai So-In, s_chakchai@yahoo.com Abstract: Mobile Internet Protocol (MIP regardless of physical movement. In this paper, we give an overview of Mobile IP: terminology, functionality, and operation. Comprehensive surveys on Mobile IP issues are discussed: Quality of Service (QOS), Multicast

Jain, Raj

14

Internet Protocol Adoption: Learning from Bitcoin Position Paper  

E-Print Network [OSTI]

This position paper discusses two related questions: 1. Using the framework of network economics, what are success factors behind the adoption of Bitcoin (a cryptographic curreny), and can we copy them for other protocols? 2. Can we design more successful protocols if we have inband payment mechanisms to internalize the externalities that emerge during adoption and in steady state? 1.

Rainer BŲhme; Westfšlische Wilhelms-universitšt MŁnster

15

Expansion of the internet protocol address space with "minor" disruption of current hardware or software  

E-Print Network [OSTI]

Currently, the Internet suite of protocols uses a 32 bit network layer address and requires that each machine have a unique address. The problem: 32 bits only distinguishes 2 32 or 4,294,967,296 machines. Even with four billion addresses, experts...

Wheatley, Philip Stephen

1996-01-01T23:59:59.000Z

16

Unified Theory of Relativistic Identification of Information in a Systems Age: Proposed Convergence of Unique Identification with Syntax and Semantics through Internet Protocol version 6  

E-Print Network [OSTI]

This paper proposes to utilize internet protocol version six (IPv6) to uniquely identify not only things (objects) but also processes, relationships (syntax, semantics) and interfaces (sensors). Convergence of identification ...

Datta, Shoumen

2008-07-31T23:59:59.000Z

17

An ethernet/IP security review with intrusion detection applications  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01T23:59:59.000Z

18

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

ScienceCinema (OSTI)

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2010-01-08T23:59:59.000Z

19

Effective Protocols for Mobile Communications and Networking  

SciTech Connect (OSTI)

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

20

Sports over IP : dynamics and perspectives  

E-Print Network [OSTI]

Technological advances are allowing the use of the Internet Protocol and the Internet infrastructure mainly built by cable and telecom operators for broadcasting purposes in the U.S. This disruption raises a business issue ...

Blain, Emmanuel

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

ENERGY EFFICIENT INTERNET INFRASTRUCTURE  

E-Print Network [OSTI]

. D R A F T October 27, 2010, 11:34pm D R A F T #12;2 ENERGY EFFICIENT INTERNET INFRASTRUCTURE FigureCHAPTER 1 ENERGY EFFICIENT INTERNET INFRASTRUCTURE Weirong Jiang, Ph.D.1 , and Viktor K. Prasanna]. In other words, an IP address may match multiple prefixes, but only the longest D R A F T October 27, 2010

Prasanna, Viktor K.

22

Mobile IPMobile IP Mobile IPMobile IP  

E-Print Network [OSTI]

Mobile IPMobile IP #12;2 Mobile IPMobile IP · How do we support mobile users whose point of attachment to the network changes dynamically? #12;3 Mobile IPMobile IP · The goal of Mobile IP is to allow connectivity automatically, despite the change. · While Mobile IP can work with wired connections, where you

Yeom, Ikjun

23

de Lange Lab Chromatin Immunoprecipitation (ChIP)  

E-Print Network [OSTI]

with cold PBS x 2. 7. Scrape cells in ~ 10 ml PBS into 50 ml conical tube . Spin down cells. 8. Combine cell. The remainder can be kept at 4¬ļC and reused, but add sodium azide before storage. ChIP Protocol Timeline Day 1IP) protocol 3 Preparing the lysate 1. Grow cells to subconfluence. Set up experiment for 10 IPs. For primary

de Lange, Titia

24

1. The Internet 1-1 Chapter 1: The Internet  

E-Print Network [OSTI]

1. The Internet 1-1 Chapter 1: The Internet References: · Rainer Klute: Das World Wide Web. Addison with TCP/IP. Prentice Hall, 1988, ISBN 0134701887. · W. Richard Stevens: TCP Illustrated, Vol. 1. Addison-Wesley, 1994, ISBN 0201633469. · W. Richard Stevens: UNIX Network Programming, Vol. 1, 2nd Ed. Prentice Hall

Brass, Stefan

25

Raj JainThe Ohio State University IP Next Generation (IPv6)IP Next Generation (IPv6)  

E-Print Network [OSTI]

State University 18-5 IP Address FormatIP Address Format q Three all-zero network numbers are reserved q people by 2020 q Each person will be served by more than one computer q Assuming 100 computers per person net stopped at 15000 nodes using 16-bit addresses H = 0.26 q 3 Million Internet hosts currently using

Jain, Raj

26

Proactive techniques for correct and predictable Internet routing  

E-Print Network [OSTI]

The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

Feamster, Nicholas G. (Nicholas Greer), 1979-

2006-01-01T23:59:59.000Z

27

VoIP Deregulation In South Africa: Implications for Underserviced Areas  

E-Print Network [OSTI]

VoIP Deregulation In South Africa: Implications for Underserviced Areas Marshini Chetty a marshiniDept of Computer Science, University of Cape Town, South Africa cPolicy Associate, Bridges.org, South Africa Protocol (VoIP) in South Africa. Previously, VoIP could only be utilised by the incumbent

Blake, Edwin

28

Tutorial Eight 1. Explain the addressing scheme used in Mobile IP?  

E-Print Network [OSTI]

COMP 347 Tutorial Eight Mobile IP 1. Explain the addressing scheme used in Mobile IP? 2. One simple method to implement mobility is to let the mobile host change its address as it goes to the new network with this approach? 3. What role does a mobile host, a home agent and a foreign agent play in mobile IP protocol? 4

Hamey, Len

29

Income Protection (IP) Insurance  

E-Print Network [OSTI]

of the daily futures market closing prices for the insured crop prior to the sales closing date and during harvest. IP uses the Group Risk Plan?s (GRP) county yield index to adjust IP premium rates. The insurance is provided for an enter- prise unit... equals 27.5 percent of the approved yield times 100 percent of the projected price. An insured?s total guaranteed dollar amount of protection is the net acres of the insured crop (acres times share) in the county multiplied by the IP dollar guaran- tee...

Stokes, Kenneth; Barnaby, G. A. Art; Waller, Mark L.; Outlaw, Joe

1999-06-09T23:59:59.000Z

30

Computation Migration based on Mobile IP and Intelligent Agent Techniques  

E-Print Network [OSTI]

Page 1 Computation Migration based on Mobile IP and Intelligent Agent Techniques Runtong Zhang, Dongmei Zhang, Zhigang Kan and Jian Ma Advanced Internet Technology, Nokia (China) R&D Center No. 11, He is to investigate the use of mobile agents in the platform of mobile IPv6, to provide adapted services to mobile

Zhang, Runtong

31

Interfacing the Controllogics PLC over Ethernet/IP.  

SciTech Connect (OSTI)

The Allen-Bradley ControlLogix [1] line of programmable logic controllers (PLCs) offers several interfaces: Ethernet, ControlNet, DeviceNet, RS-232 and others. The ControlLogix Ethernet interface module 1756-ENET uses EtherNet/IP, the ControlNet protocol [2], encapsulated in Ethernet packages, with specific service codes [3]. A driver for the Experimental Physics and Industrial Control System (EPICS) has been developed that utilizes this EtherNet/IP protocol for controllers running the vxWorks RTOS as well as a Win32 and Unix/Linux test program. Features, performance and limitations of this interface are presented.

Kasemir, K. U. (Kay-Uwe); Dalesio, L. R. (Leo R.)

2001-01-01T23:59:59.000Z

32

PROTECTING SENSITIVE INFORMATION THAT IS  

E-Print Network [OSTI]

the System Development Life Cycle, September 2004 Securing Voice Over Internet Protocol (IP) Networks

33

Continued on page 2 IMPLEMENTING THE HEALTH  

E-Print Network [OSTI]

The System Development Life Cycle, September 2004 Securing Voice Over Internet Protocol (IP) Networks

34

Ad-hoc Technology in Future IP based Mobile Communication Systems  

E-Print Network [OSTI]

Ad-hoc Technology in Future IP based Mobile Communication Systems Martin Reisslein Arizona State Heinrich Hertz Institut #12;Content · Required Research · Ad-hoc Testbed · Expected Results and Time Frame-Configuration · Assignment and release of IP addresses ­ omnipresent related protocols can not deployed in ad- hoc networks

Reisslein, Martin

35

Scaling IP Multicast on Datacenter Topologies Xiaozhou Li and Michael J. Freedman  

E-Print Network [OSTI]

Scaling IP Multicast on Datacenter Topologies Xiaozhou Li and Michael J. Freedman Princeton datacenter applications' communication. Unfor- tunately, traditional protocols for managing IP multicast structure of modern datacenter networks in order to build the first scale-out multicast architecture. In our

Singh, Jaswinder Pal

36

Adaptive best effort protocols for video delivery  

E-Print Network [OSTI]

This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

Madhwaraj, Ashwin Raj

1998-01-01T23:59:59.000Z

37

Internet Sampler  

E-Print Network [OSTI]

Gnat (gnatkip) wrote, 2006-08-23 16:36:00 Art: Internet Sampler Title: Internet Sampler Media: Excel, Photoshop, Crosstitch.com Caption Maker, alphabet by Carrie's Creations, graphics from Windows, IE, and Firefox Notes: An illustration... the manner of the pioneers. At the top Iíll set my most oft- uttered prayer: Thank you, internet, for letting me observe so many crazy people from a safe distance." Since I first read that line, there have been so many occasions when I've been reminded...

2006-08-23T23:59:59.000Z

38

Group Security Association (GSA) Management in IP Multicast  

E-Print Network [OSTI]

Abstract: This work describes the Group Security Association (GSA) Management model and protocol as developed in the Secure Multicast Group (SMuG) in the IETF. The background reasoning from the Internet Key Exchange (IKE) protocol perspective is explained, together with the notion of Security Associations (SA) in the unicast case. This serves as a basis for a requirements for Group SA for multicast. Finally, the definition and construction of a GSA is described. 1.

Thomas Hardjono; Mark Baugher; Hugh Harney

39

Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)  

E-Print Network [OSTI]

the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

Thomas, Andrew

40

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network [OSTI]

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

the barriers to internal investment in development by offering the IP for free and using quick and simple university and an international partner of the initiative for Australasia in December 2013. This new approach Access IP? Whilst we will still protect and commercialise some IP as before, we will offer some of our IP

University of Technology, Sydney

42

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS  

E-Print Network [OSTI]

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS #12 ASSESSMENT IN THE NETHERLANDS Published VSNU, KNAW and NWO 2009 This document is available through internet: Royal Netherlands Academy of Arts and Sciences (KNAW) The Academy's mission: As the forum, conscience

Franssen, Michael

43

Dynamic, transparent Internet server replication using HYDRANET  

E-Print Network [OSTI]

) in the Internet. These agents will replicate the transport-level service access points of their origin servers and begin serving clients in the name of the origin server. A new protocol and application API was also developed that manages this service replication...

Dillon, Geoffrey A.

1998-01-01T23:59:59.000Z

44

OWNER'S MANUAL IPS LED MONITOR  

E-Print Network [OSTI]

www.lg.com OWNER'S MANUAL IPS LED MONITOR (LED LCD MONITOR) 27EA83 27EA83R Please read the safety different licenses. Visit www.lg.com for more information on the license. VESA, VESA logo, Display Port of the Video Electronics Standards Association. The terms HDMI and HDMI High-Definition Multimedia Interface

Ott, Albrecht

45

Internet Topology Benoit Donnet  

E-Print Network [OSTI]

Internet Topology Discovery Benoit Donnet INL Seminar - 06-07/07/2011 1 1 #12;INL Seminar - Internet Topology Discovery 2 2 #12;INL Seminar - Internet Topology Discovery Agenda 3 · Background Probing - MERLIN · Power Law - Problem - L2 vs. L3 · Conclusion 3 #12;INL Seminar - Internet Topology

Bonaventure, Olivier

46

On the Energy Cost of Robustness and Resiliency in IP Networks , A. Caponea,  

E-Print Network [OSTI]

approaches in saving energy. We propose novel optimization models to minimize the energy consumption of IP protocols (like MPLS) allow us to quantitatively analyze the trade-off between energy cost and level Both network operators and device manufacturers agree that the energy consumption of communications

Paris-Sud XI, Université de

47

Adaptive Semi-Soft Handoff for Cellular IP Networks Eriko Nurvitadhi  

E-Print Network [OSTI]

to wireless networks becomes a critical issue. For this reason, a number of micro-mobility protocols handoff is still a major obstacle to enabling seamless micro-mobility in wireless access networksAdaptive Semi-Soft Handoff for Cellular IP Networks Eriko Nurvitadhi , Ben Lee , Chansu Yu

Yu, Chansu

48

SITE-CONTROLLED SECURE MULTI-HOMING AND TRAFFIC ENGINEERING FOR IP Randall Atkinson Saleem Bhatti Steve Hailes  

E-Print Network [OSTI]

SITE-CONTROLLED SECURE MULTI-HOMING AND TRAFFIC ENGINEERING FOR IP Randall Atkinson Saleem Bhatti Grid, including the global Internet. Similarly, the ability to provide traffic engineering for a site. Current approaches to site multi-homing and site traffic engineering (a) re- quire assistance from

Bhatti, Saleem N.

49

Cost Analysis of NEMO Protocol Md. Shohrab Hossain , Mohammed  

E-Print Network [OSTI]

based on all-IP technology, compounded by the fact that the number of mobile nodes requiring mobility have developed analytical models to estimate total costs of key mobility management entities of NEMO, mobility management entities, computer networks. I. INTRODUCTION To ensure continuous Internet connectivity

Atiquzzaman, Mohammed

50

IP Profiling via Service Cluster Membership Vectors  

SciTech Connect (OSTI)

This study investigates the feasibility of establishing and maintaining a system of compact IP behavioral profiles as a robust means of computer anomaly definition and detection. These profiles are based upon the degree to which a system's (IP's) network traffic is distributed among stable characteristic clusters derived of the aggregate session traffic generated by each of the major network services. In short, an IP's profile represents its degree of membership in these derived service clusters. The goal is to quantify and rank behaviors that are outside of the statistical norm for the services in question, or present significant deviation from profile for individual client IPs. Herein, we establish stable clusters for accessible features of common session traffic, migrate these clusters over time, define IP behavior profiles with respect to these clusters, migrate individual IP profiles over time, and demonstrate the detection of IP behavioral changes in terms of deviation from profile.

Bartoletti, A

2009-02-23T23:59:59.000Z

51

OSCAR: Object Security Architecture for the Internet of Things  

E-Print Network [OSTI]

with each client. The load translates into increased energy consumption and a shortened lifetime of devices the Cooja emulator. We show significant energy savings at constrained servers and reasonable delays. We also a concern. Well designed IP security protocol suites have been ported to constrained devices of Io

Paris-Sud XI, Université de

52

A client oriented, IP level redirection mechanism  

E-Print Network [OSTI]

. Latency for Supporting Clients 2. Latency for Legacy Clients C. Bulk Transfer Time Measurements 10 10 13 13 18 25 27 27 28 29 30 32 36 42 42 46 46 VII APPLICATIONS A. Applications . l. VIobile IP Implementations 2. Relial...- allel Redirected Connections (P. R. C. ), Hash Space Size ? 15 . 15 IP Output Processing Time for s. Non-Redircctcd Session. with Parallel Redirected Connections (P. R. C. ) . 16 IP Processing Time for Single Redirected Session 41 17 TCP Connection...

Gupta, Sumita

1998-01-01T23:59:59.000Z

53

ChoiceNet: Toward an Economy Plane for the Internet Tilman Wolf  

E-Print Network [OSTI]

and services in the Internet in- frastructure itself has been sluggish, especially where eco- nomic incentives in "protocol space." The current Internet reflects certain economic relation- ships, for example between of the economy sur- rounding in-network services. In our work, we aim for an explicit representation of eco

54

Avaya one-XTM Deskphone Value Edition 1603 IP Telephone  

E-Print Network [OSTI]

Avaya one-XTM Deskphone Value Edition 1603 IP Telephone User Guide 16-601444 Issue 1 July 2007 #12 ..................................................................................................... 5 Introduction to the 1603 IP Telephone .................................................. 7

55

Sustainable Internet Architecture PROJECT DESCRIPTION  

E-Print Network [OSTI]

Sustainable Internet Architecture PROJECT DESCRIPTION 1 Introduction The Internet currently plays that the problems in the current Internet architecture stem from its lack of sustainability which impedes future de of challenges. Numerous research studies on a new Internet architecture (e.g., [16, 37, 48, 54, 55]) have

Kuzmanovic, Aleksandar

56

Airborne Internet : market & opportunity  

E-Print Network [OSTI]

The purpose of this thesis to evaluate the opportunity for service provider entry and of the airborne internet, to analyze the disruptive impact technology used by AirCell and AeroSat has had on the development of an ...

Bhadouria, Anand

2007-01-01T23:59:59.000Z

57

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic  

E-Print Network [OSTI]

analytical models to estimate total costs of key mobility management entities of NEMO. We have presented, mobility management. I. INTRODUCTION To ensure continuous Internet connectivity of net- works in motion. As the next-generation wireless/mobile network will be a unified network based on all-IP technology

Atiquzzaman, Mohammed

58

GT: picking up the truth from the ground for Internet traffic F. Gringoli, L. Salgarelli, M. Dusi  

E-Print Network [OSTI]

of Internet traffic modeling, firewall, and intrusion detection research requires traces where some ground. But DPI is ineffective when traffic is encrypted and ambiguous when different protocols exhibit similarGT: picking up the truth from the ground for Internet traffic F. Gringoli, L. Salgarelli, M. Dusi

California at San Diego, University of

59

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An...

60

Design of a PSi header processor for the internet protocol  

E-Print Network [OSTI]

(Connection Processor number). The content of rb2 is the 32 bit memory address to indicate the memory location of the incoming packet. 7 rtmp ~ rbl k 00000003H;ALU z (~ check 00 "/ (if ALUM == 0 jump Startl) This microinstruction performs the 'And' operation... and checks the ALUM flag. According to the flag the address of the next microinstruction to be executed will be given. This microinstruction says that if the primitive code is 00(ALUM flag is true), it means the next step is to jump back to the address '1...

Bai, Jinxia

1995-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Protocol for House Parties  

Broader source: Energy.gov [DOE]

Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

62

On Runtime Adaptation of Application-Layer Multicast Protocol  

E-Print Network [OSTI]

¨ubsch, Christoph P. Mayer, and Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology (KIT), Germany {huebsch,mayer,waldhorst}@kit.edu Reasonable choice of protocol parameters is crucial., a clean implementation of multicast communication within the Internet architecture has been proposed

Paris-Sud XI, Université de

63

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

RESEARCH & INNOVATION OFFICE EASY ACCESS IP AN INTRODUCTION FOR INDUSTRY PARTNERS FEBRUARY 2014 #12 to economic, environmental and social benefits. We believe there are some significant benefits to Easy Access, design and innovation Simple template license agreements means no lengthy and expensive negotiations

University of Technology, Sydney

64

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc ∑ Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: ∑ Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc ∑ Set up paths

Goldberg, Sharon

65

Secure Voice over IP conferencing with decentralized group encryption  

E-Print Network [OSTI]

This thesis addresses the development of an end-to-end secure Voice over IP (VoIP) conference system. We are particularly interested in challenges associated with deploying such a system in ad-hoc networks containing low ...

Kannan, Steven (Steven K.)

2007-01-01T23:59:59.000Z

66

Internet architecture Access networks  

E-Print Network [OSTI]

access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

67

Service Oriented Internet Jaideep Chandrashekar  

E-Print Network [OSTI]

propose a novel, overlay based Service Oriented Internet architecture that is meant to serve as a flexible elsewhere. In this paper, we describe a new architecture -- the "Service Oriented Internet" or SOI, whichService Oriented Internet Jaideep Chandrashekar ¬° , Zhi-Li Zhang ¬° , Zhenhai Duan ¬° , and Y

Duan, Zhenhai

68

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network [OSTI]

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

Keeling, Stephen L.

69

Raj JainThe Ohio State University IP Next GenerationIP Next GenerationIP Next GenerationIP Next Generation  

E-Print Network [OSTI]

FormatIP Address Format u Three all-zero network numbers are reserved u 127 Class A + 16,381 Class B + 2;Raj JainThe Ohio State University 7 How Many Addresses?How Many Addresses? u 10 Billion people by 2020 7-character address at 64k nodes H = 0.14 (assuming 5 bits/char) u Physics/space science net

Jain, Raj

70

Webinar: Hydrogen Refueling Protocols  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

71

Application Protocol Reference Architecture Application Protocol Reference Architecture  

E-Print Network [OSTI]

Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

van Sinderen, Marten

72

MSIP: A protocol for efficient handoffs of real-time multimedia sessions in mobile wireless scenarios  

E-Print Network [OSTI]

infrastructure is to efficiently manage user mobility. Mobility is handled by Mobile IP (at the network layer in this paper, MSIP, is a combination of network and application layer mobility management models reducesMSIP: A protocol for efficient handoffs of real-time multimedia sessions in mobile wireless

Iyer, Sridhar

73

IPS- Industrial Power Systems | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpen EnergyBoard"Starting a newIGUS Innovative TechnischeIM2IPS-

74

Mashups--Web Web Internet  

E-Print Network [OSTI]

Mashups-- Web Web 1. Web Internet mashup Wikipedia Mashup web api web Web Internet Mashup public APIs, XML/RSS/Atom feeds, web services, HTML Mashup Web 2.0 Web 2.0 Mashup Web Web Web api eBay, Amazon, Google and Yahoos APIs Mashups Web Mashup Mashup 2. Mashup [2] Mashup

75

APS Protocol for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

76

Lessons Learned in the Design and Use of IP1 / IP2 Flexible Packaging - 13621  

SciTech Connect (OSTI)

For many years in the USA, Low Level Radioactive Waste (LLW), contaminated soils and construction debris, have been transported, interim stored, and disposed of, using IP1 / IP2 metal containers. The performance of these containers has been more than adequate, with few safety occurrences. The containers are used under the regulatory oversight of the US Department of Transportation (DOT), 49 Code of Federal Regulations (CFR). In the late 90's the introduction of flexible packaging for the transport, storage, and disposal of low level contaminated soils and construction debris was introduced. The development of flexible packaging came out of a need for a more cost effective package, for the large volumes of waste generated by the decommissioning of many of the US Department of Energy (DOE) legacy sites across the US. Flexible packaging had to be designed to handle a wide array of waste streams, including soil, gravel, construction debris, and fine particulate dust migration. The design also had to meet all of the IP1 requirements under 49CFR 173.410, and be robust enough to pass the IP2 testing 49 CFR 173.465 required for many LLW shipments. Tens of thousands of flexible packages have been safely deployed and used across the US nuclear industry as well as for hazardous non-radioactive applications, with no recorded release of radioactive materials. To ensure that flexible packages are designed properly, the manufacturer must use lessons learned over the years, and the tests performed to provide evidence that these packages are suitable for transporting low level radioactive wastes. The design and testing of flexible packaging for LLW, VLLW and other hazardous waste streams must be as strict and stringent as the design and testing of metal containers. The design should take into consideration the materials being loaded into the package, and should incorporate the right materials, and manufacturing methods, to provide a quality, safe product. Flexible packaging can be shown to meet the criteria for safe and fit for purpose packaging, by meeting the US DOT regulations, and the IAEA Standards for IP-1 and IP-2 including leak tightness. (authors)

Sanchez, Mike [VP Global Sales, PacTec, Inc. (United States)] [VP Global Sales, PacTec, Inc. (United States); Reeves, Wendall [National Sales Manager, PacTec, Inc. (United States)] [National Sales Manager, PacTec, Inc. (United States); Smart, Bill [Nuclear Sales Director, PacTec, Inc. (United States)] [Nuclear Sales Director, PacTec, Inc. (United States)

2013-07-01T23:59:59.000Z

77

IP: The Next Generation Written by Scott Phillips.  

E-Print Network [OSTI]

providers i.e. trusted providers. q Scalable multicast. Multicast in IP is only possible in subnetsIP: The Next Generation Written by Scott Phillips. This page is a general overview of the IPng, B, C and D (a fifth class, class E, is only for research purposes). These classes differ

Jain, Raj

78

Experimental Comparison of Handoff Performance of SIGMA and Mobile IP  

E-Print Network [OSTI]

to be eight seconds which is significantly higher than the six milliseconds handoff latency of SIGMA. The restExperimental Comparison of Handoff Performance of SIGMA and Mobile IP Surendra Kumar Sivagurunathan;1 Experimental Comparison of Handoff Performance of SIGMA and Mobile IP Surendra Kumar Sivagurunathan, Justin

Atiquzzaman, Mohammed

79

Increasing pipelined IP core utilization in Process Networks using Exploration  

E-Print Network [OSTI]

Increasing pipelined IP core utilization in Process Networks using Exploration Claudiu Zissulescu pipelined. In this paper, we present an exploration methodology that uses feedback provided by the Laura tool to increase the uti- lization of IP cores embedded in our PN network. Using this exploration, we

Kienhuis, Bart

80

Raj JainThe Ohio State University IP Next Generation (IPv6)IP Next Generation (IPv6)  

E-Print Network [OSTI]

The Ohio State University 4 IP Address FormatIP Address Format q Three all-zero network numbers people by 2020 q Each person will be served by more than one computer q Assuming 100 computers per person 7-character address at 64k nodes H = 0.14 (assuming 5 bits/char) q Physics/space science net

Jain, Raj

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Constructing Personal Network on the Internet Kenichi Kourai  

E-Print Network [OSTI]

. ≠1≠ #12;1 ADSL 2 IP IP IP VPN Secure Socket Layer (SSL)[1] 2 OS OS OS OS DNS IP IP IP 131/resolv.conf FQDN /etc/hosts DHCP setuid 3.3 IP IP OS 2 ≠4≠ #12;1 3.4 A B 1 2 A B A C B C A 4 Linux SSL 4.1 SSL SSL SSL SSL OpenSSL [4] Linux SSL OpenSSL SSL TCP/IP SSL 2 1 setsockopt SO USE SSL proc SSL TCP connect

Chiba, Shigeru

82

Clean Power for the Internet  

E-Print Network [OSTI]

Data centers have been increasingly large users of energy over the past 10 years. With the rapid increase in Internet use, these facilities continue to be built, stressing the local electricity grids with their immense energy needs, and typically...

Brown, E.; Elliott, R. N.; Shipley, A.

83

An Overview of Internet biosurveillance  

SciTech Connect (OSTI)

Internet biosurveillance utilizes unstructured data from diverse Web-based sources to provide early warning and situational awareness of public health threats. The scope of source coverage ranges from local based media in the vernacular to international media in widely read languages. Internet biosurveillance is a timely modality available to government and public health officials, health care workers, and the public and private sector, serving as a real-time complementary approach to traditional indicator-based public health disease surveillance methods. Internet biosurveillance also supports the broader activity of epidemic intelligence. This review covers the current state of the field of Internet biosurveillance and provides a perspective on the future of the field.

Hartley, David M.; Nelson, Noele P.; Arthur, Ray; Barboza, P.; Collier, Nigel; Lightfoot, Nigel; Linge, J. P.; van der Goot, E.; Mawudeku, A.; Madoff, Lawrence; Vaillant, L.; Walters, Ronald A.; Yangarber, Roman; Mantero, Jas; Corley, Courtney D.; Brownstein, John S.

2013-06-21T23:59:59.000Z

84

Using Gopher on the Internet  

SciTech Connect (OSTI)

This report is a complication of vugraphs with respect to the use of Gopher on Internet. There are viewgraphs on using Gopher at the University of California at Santa Cruz. Examples of other Internet Gopher servers around the world are given. Also discussed is the Library of Congress Gopher and JUGHEAD which is an acronym for Jonzy`s Universal Gopher Hierarchy Excavation And Display.

Davidoff, G.

1994-04-01T23:59:59.000Z

85

Experimental Study of an IP Model for the View Selection Problem by Zohreh Asgharzadeh Talebi, Rada Chirkova, and Yahya Fathi  

E-Print Network [OSTI]

to solve IP time needed to solve IPR time needed to solve with HHRU IP Answer IPR Answer HHRU Answer IP/IPR HHRU/IPR HHRU/IP 1 2 64

Young, R. Michael

86

IP3 signalling regulates exogenous RNAi in Caenorhabditis elegans  

E-Print Network [OSTI]

second messenger in animals. IP3 is generated by the action of phospholipase C (PLC) in response to a diverse range of extracellular stimuli, including neurotransmitters and hormones acting on G-protein or tyrosine kinase coupled receptors (Fig 1A). IP... to deplete GFP expressed in the body wall muscles using a myo-3p::GFP construct [30, 31] again itr-1 mutants show an increased effect (Fig 1I). PLC-? / EGL-8 mutants show increased RNAi responses IP3 is produced from phosphatidylinositol 4...

Nagy, Aniků I.; VŠzquez-Manrique, Rafael P.; Lopez, Marie; Christov, Christo; Sequedo, MarŪa Dolores; Herzog, Mareike; Herlihy, Anna E; Bodak, Maxime; Gatsi, Roxani; Baylis, Howard A.

2015-01-21T23:59:59.000Z

87

Protocol design contests  

E-Print Network [OSTI]

In fields like data mining and natural language processing, design contests have been successfully used to advance the state of the art. Such contests offer an opportunity to bring the excitement and challenges of protocol ...

Winstein, Keith

88

A practical approach to the interGroup protocols  

SciTech Connect (OSTI)

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

2001-11-12T23:59:59.000Z

89

Sustained signalling by PTH modulates IP3 accumulation and IP3 receptors via cyclic AMP junctions  

E-Print Network [OSTI]

activates Gs, stimulation of AC 61 and so formation of cAMP. When PTH1R or Gq is expressed at high levels, PTH1R can also 62 stimulate phospholipase C (PLC) (Taylor and Tovey, 2012), which catalyses formation of 63 inositol 1,4,5-trisphosphate (IP3... , 2012; van der Lee et al., 2013). Furthermore, some analogues of PTH favour coupling 67 of PTH1R to AC via Gs, while others favour PLC coupling (Cupp et al., 2013; Fujimori et al., 68 1991; Gesty-Palmer and Luttrell, 2011; Takasu et al., 1999...

Meena, Abha; Tovey, Stephen C.; Taylor, Colin W.

2014-11-27T23:59:59.000Z

90

Population SAMC, ChIP-chip Data Analysis and Beyond  

E-Print Network [OSTI]

This dissertation research consists of two topics, population stochastics approximation Monte Carlo (Pop-SAMC) for Baysian model selection problems and ChIP-chip data analysis. The following two paragraphs give a brief introduction to each...

Wu, Mingqi

2011-02-22T23:59:59.000Z

91

Rate-adaptive H.264 for TCP/IP networks  

E-Print Network [OSTI]

While there has always been a tremendous demand for streaming video over TCP/IP networks, the nature of the application still presents some challenging issues. These applications that transmit multimedia data over best-effort networks like...

Kota, Praveen

2007-09-17T23:59:59.000Z

92

On the Use of Fixed Point Approximations to Study Reliable Protocols over Congested Links  

E-Print Network [OSTI]

network operation? iii) What are the sustainable values of link utilization without the risk of network control features) over Internet congested links (the bottlenecks). Within this framework the analysis in a general framework, where only some very elementary properties of the protocols and the network come

93

A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots  

E-Print Network [OSTI]

of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

Paris-Sud XI, Universitť de

94

Estimation of Voice over IP Quality in the Netherlands  

E-Print Network [OSTI]

Estimation of Voice over IP Quality in the Netherlands X. Zhou1 , F. Muller1 , R. E. Kooij1,2 , and P. Van Mieghem1 1 Delft University of Technology, P.O. Box 5031, 2600 GA Delft, The Netherlands {X, The Netherlands R.E.Kooij@telecom.tno.nl Abstract. We have analyzed the measurements of end-to-end VoIP packets

Van Mieghem, Piet

95

An Approach for QoS Measurements in IP Multicast Networks MQM -Multicast Quality Monitor  

E-Print Network [OSTI]

An Approach for QoS Measurements in IP Multicast Networks MQM - Multicast Quality Monitor Falko@acm.org Abstract MQM - Multicast Quality Monitor represents a new approach to measure QoS within an IP multicast which builds a very basis for the measurements. Keywords IP Multicast, Quality of Service, IP

Breu, Ruth

96

Analysis of the mouse embryonic stem cell regulatory networks obtained by ChIP-chip and ChIP-PET  

E-Print Network [OSTI]

Background: Genome-wide approaches have begun to reveal the transcriptional networks responsible for pluripotency in embryonic stem (ES) cells. Chromatin Immunoprecipitation (ChIP) followed either by hybridization to a ...

Mathur, Divya

97

Algorithms for Large-Scale Internet Measurements  

E-Print Network [OSTI]

Methods . . . . . . . . . . . . . . . . . . . 95 4.4.1 IP-sequential . . . . . . . . . . . . . . . . . . . . . . . . 96 4.4.2 Uniform Pattern . . . . . . . . . . . . . . . . . . . . . . 97 4.4.3 Uniform Detection Probability... scan pattern, we derive their respective SCT?s and show that the uniform permutation is generally much stealthier than IP-sequential. However, contrary to common belief [3], [41], [59], we demonstrate that in some cases IP-sequential is stealthier...

Leonard, Derek Anthony

2012-02-14T23:59:59.000Z

98

White Paper: A Survey of 3D Sync IR Protocols  

E-Print Network [OSTI]

)..............................................................................................12 Sony Protocol (Standalone emitter

99

The Evolution of International Internet Telephony  

E-Print Network [OSTI]

International Internet Telephony has been evolving since its introduction in 1996. In 1996, the typical player was

McGarty, Terrence

100

Diploma in Internet Business Technology Looking for a Career in Internet Business? ........................................... 2  

E-Print Network [OSTI]

Diploma in Internet Business Technology Contents Looking for a Career in Internet Business? ........................................... 2 How can a McGill Program prepare you for a career in Internet Business the right to change this information at any time. #12;2 Looking for a Career in Internet Business? Since

Barthelat, Francois

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

MAPS MANUAL 2010 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2010 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

102

MAPS MANUAL 2014 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2014 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

103

MAPS MANUAL 2008 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2008 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Jim Saracco

DeSante, David F.

104

MAPS MANUAL 2013 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2013 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

105

MAPS MANUAL 2011 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2011 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

106

MAPS MANUAL 2012 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2012 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

107

Timekeeping in the Interplanetary Internet  

E-Print Network [OSTI]

vehicles, retrieve data for later transmission to Earth · Spacecraft ­ transport orbiters and surface, network routing, ephemeris maintenance and general timekeeping #12;2-Aug-04 3 IPIN issues o Transmission Transmission speeds are highly variable, but in general far slower than Earth internet o Spacecraft position

Mills, David L.

108

Future Internet Infrastructures for FI Prototyping  

E-Print Network [OSTI]

++ Fraunhofer Institute FOKUS, Berlin ++ www.fokus.fraunhofer.de/go/innovation ++ 11¬≠2009 #12;Future Internet Berlin AV de- partment (Architektur f√ľr Vermittlungskno- ten). Part of the Fraunhofer innovation clusFuture Internet Infrastructures for FI Prototyping NGN Evolution toward Future Internet Fraunhofer

Wichmann, Felix

109

Geo-Engineering through Internet Informatics (GEMINI)  

SciTech Connect (OSTI)

The program, for development and methodologies, was a 3-year interdisciplinary effort to develop an interactive, integrated Internet Website named GEMINI (Geo-Engineering Modeling through Internet Informatics) that would build real-time geo-engineering reservoir models for the Internet using the latest technology in Web applications.

Doveton, John H.; Watney, W. Lynn

2003-03-06T23:59:59.000Z

110

Internet video streaming using 3-D SPIHT  

E-Print Network [OSTI]

Internet video streaming is a new way of distributing video over the Internet. It is an important component of Internet multimedia. Due to the increasing demand of multimedia on the World Wide Web, it has experienced explosive growth in the last...

Jiang, Jianhong

2001-01-01T23:59:59.000Z

111

Extremal quantum protocols  

E-Print Network [OSTI]

Generalized quantum instruments correspond to measurements where the input and output are either states or more generally quantum circuits. These measurements describe any quantum protocol including games, communications, and algorithms. The set of generalized quantum instruments with a given input and output structure is a convex set. Here we investigate the extremal points of this set for the case of finite dimensional quantum systems and generalized instruments with finitely many outcomes. We derive algebraic necessary and sufficient conditions for extremality.

Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-01-25T23:59:59.000Z

112

Communication complexity protocols for qutrits  

SciTech Connect (OSTI)

Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

Tamir, Boaz [Department of History and Philosophy of Science, Bar-Ilan University, Ramat-Gan (Israel)

2007-03-15T23:59:59.000Z

113

The Long Wavelength Array (LWA) and Interplanetary Scintillation (IPS)  

E-Print Network [OSTI]

the following advantages: (1) Higher sensitivity; (2) Higher accuracy on the measurement of solar wind speed; (3 the inhomogeneous plasma (solar wind) in the interplanetary space. Observing the IPS using ground based telescopes) (Vitkevich et al. 1976) adopted single station-single frequency observations (SSSF) and used the power

Ellingson, Steven W.

114

www.sensor-ip.org Sustainability Impact Assessment  

E-Print Network [OSTI]

www.sensor-ip.org May 2005 Sustainability Impact Assessment: Tools for Environmental, Social countries constitute the consortium, which develops science based ex-ante Sustainability Impact Assessment regions. SENSOR directly responds to the European sustainability objectives as applied to land use

115

Evaluation of IP Fast Reroute Proposals Minas Gjoka  

E-Print Network [OSTI]

which avoid micro loops under node or link failures. In this paper we present a comprehensive analysis convergence time in today's networks. These convergence times can be of the order of 100's of milliseconds or even 10's of seconds in the BGP networks. IP-based networks have evolved significantly over the past

Yang, Xiaowei

116

PROCESS DEVELOPMENT FOR ZnO-BASED DEVICES KELLY PUI SZE IP  

E-Print Network [OSTI]

PROCESS DEVELOPMENT FOR ZnO-BASED DEVICES By KELLY PUI SZE IP A DISSERTATION PRESENTED OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2005 #12;Copyright 2005 by Kelly Pui Sze Ip #12;To my family

Pearton, Stephen J.

117

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 -...

118

Performance Evaluation of IP Paging with Power Save Mechanism Ved Kafle, Sangheon Pack and Yanghee Choi  

E-Print Network [OSTI]

and power management functions. 1. Introduction The future IP mobile nodes are expected to change project of the Ministry of Science and Technology, 2003, Korea. 2. IIPP Overview We take the Mobile IP to the Mobile IP regional registration, the IIPP significantly reduces the average power consumption of a mobile

119

Corporate Governance, the Environment, and the Internet  

E-Print Network [OSTI]

contemporary society: Corporate governance at a crossroads.R. (1997). A survey of corporate governance. The Journal ofCorporate Governance, the Environment, and the Internet Jane

Andrew, Jane

2003-01-01T23:59:59.000Z

120

Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients  

E-Print Network [OSTI]

Internet Clients AbdelRahman M. Abdou Carleton University, Ottawa Email: abdou@sce.carleton.ca Ashraf

Van Oorschot, Paul

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Graduate Certificate in Internet Business Looking for a Career in Internet Business?  

E-Print Network [OSTI]

1 Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since growth, hence a demand for experts who know how to effectively analyze and manage a business with the appropriate internet technology. Small to large-sized businesses require professionals who are able to design

Pientka, Brigitte

122

An Intermittent Energy Internet Architecture Barath Raghavan  

E-Print Network [OSTI]

's energy infrastructure and will likely include significant de- ployment of intermittent renewable energyAn Intermittent Energy Internet Architecture Barath Raghavan ICSI David Irwin UMass Jeannie-design the Internet for an energy- constrained future powered by diffuse, intermittent, and expensive power sources

Shenoy, Prashant

123

Mensuration protocol National Forest Inventory  

E-Print Network [OSTI]

NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

124

Unraveling Internet identities : accountability & anonymity at the application layer  

E-Print Network [OSTI]

Both anonymity and accountability play crucial roles in sustaining the Internet's functionality, however there is a common misconception that increasing the anonymity of Internet identities necessitates diminishing their ...

Wolff, Josephine Charlotte Paulina

2012-01-01T23:59:59.000Z

125

Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.  

SciTech Connect (OSTI)

The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

Tolendino, Lawrence F.; Hu, Tan Chang

2005-06-01T23:59:59.000Z

126

Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks  

E-Print Network [OSTI]

on encrypted calls. It pads every RTP or SRTP packet to a predefined packet size, adds dummy packets at the end of every burst in a controllable way, adds dummy bursts to hide silence spurts, and hides information about the packet inter-arrival timings...

Mohanty, Saswat

2012-07-16T23:59:59.000Z

127

OECD Internet Economy Outlook 2012 Access the complete publication at  

E-Print Network [OSTI]

From: OECD Internet Economy Outlook 2012 Access the complete publication at: http://dx.doi.org/10 and development", in OECD Internet Economy Outlook 2012, OECD Publishing. http://dx.doi.org/10 of international law. #12;OECD Internet Economy Outlook © OECD 2012 63 Chapter 2 Internet trends and development

Weske, Mathias

128

Hydranet: network support for scaling of large scale servic es  

E-Print Network [OSTI]

With the explosive growth of demand for services on the Internet, the networking infrastructure (routers 7 protocols, servers) is under considerable stress. Mechanisms are needed for current and future IP services to scale in a client transparent...

Chawla, Hamesh

1998-01-01T23:59:59.000Z

129

Microsoft Word - 911147_0_SSC-16 RPS IPS and PCDIS Test Plan...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7 Revision 0 ENGINEERING SERVICES FOR THE NEXT GENERATION NUCLEAR PLANT (NGNP) WITH HYDROGEN PRODUCTION Test Plan for RPS, IPS and PCDIS Prepared by General Atomics For the...

130

Thermodynamic Signatures of Half-Quantum Vortices in p+ip Josephson Junction Arrays  

E-Print Network [OSTI]

bind a Majorana Fermion . . 3 Josephson Junction Arrays 3.14 p + ip Josephson Junction Arrays 4.1Bind a Majorana Fermion . . . . . . . . . Josephson Junction

Krahn, Graham Joel

2012-01-01T23:59:59.000Z

131

ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP  

E-Print Network [OSTI]

, Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton, and Mark Rooks of L-1 Identity Solutions (formerly of Booz Allen Hamilton), the guide examines the differences between IPv4 and IPv6

132

Accepted to International Journal of Internet Protocol Technology (Accepted Sep 24, 2009)  

E-Print Network [OSTI]

.S. Prabhu, Rajit Gadh University of California, Los Angeles UCLA-WINMEC, RFID Lab 420 Westwood Plaza, UCLA

California at Los Angeles, University of

133

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected application to crash.

134

H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel Celland Contractors | Department ofMixed-Humid ClimateshogarH-35

135

Internet Engineering Task Force Individual Submission INTERNET-DRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

-lennox-sip-reg-payload-01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

136

Coupled Oscillations of Calcium and IP3: Identification of Feedback Loops  

E-Print Network [OSTI]

Coupled Oscillations of Calcium and IP3: Identification of Feedback Loops with Andrew Thomas(cyt)Ca(ER) Ca(cyt) Calcium oscillator +/- Schuster, Marhl & Höfer, Eur. J. Biochem. (2002) #12;IP3 DAG Hormone for the calcium oscillator? #12;Höfer, Venance & Giaume J. Neurosci. (2002) #12;3 modes of intercellular signaling

Coombes, Stephen

137

Ad-hoc Technology in Future IP based Mobile Communication Frank Fitzek  

E-Print Network [OSTI]

Ad-hoc Technology in Future IP based Mobile Communication Systems Frank Fitzek acticom Gmb@asu.edu Abstract In this paper we outline our future research activities in the field of ad--hoc communication systems for IP based services. We summarize why omnipresent technologies fail to support ad--hoc

Reisslein, Martin

138

BH-2 Mainframe Chassis 65-0200 IP-2 Iontophoresis Pump Module 65-0203  

E-Print Network [OSTI]

BH-2 Mainframe Chassis 65-0200 IP-2 Iontophoresis Pump Module 65-0203 PPM-2 Pneumatic Pump Module Module ..............6 MS-2 Power Supply ..........................................6 IP-2 Pump Module ..............................................7-8 PPM-2 Pneumatic Pump Module ..........................9 Recommended Setup Procedure

139

NLEL-MAAT at CLEF-IP Santiago Correa, Davide Buscaldi, Paolo Rosso.  

E-Print Network [OSTI]

NLEL-MAAT at CLEF-IP Santiago Correa, Davide Buscaldi, Paolo Rosso. NLE Lab, ELiRF Research Group, DSIC, Universidad Politécnica de Valencia, Spain. {scorrea, dbuscaldi, prosso}@dsic.upv.es http://users.dsic.upv.es/grupos/nle Abstract. This report presents the work carried out at NLE Lab for the IP@CLEF-2009 competition. We adapted

Rosso, Paolo

140

ChIP-seq Identification of Weakly Conserved Heart Enhancers  

SciTech Connect (OSTI)

Accurate control of tissue-specific gene expression plays a pivotal role in heart development, but few cardiac transcriptional enhancers have thus far been identified. Extreme non-coding sequence conservation successfully predicts enhancers active in many tissues, but fails to identify substantial numbers of heart enhancers. Here we used ChIP-seq with the enhancer-associated protein p300 from mouse embryonic day 11.5 heart tissue to identify over three thousand candidate heart enhancers genome-wide. Compared to other tissues studied at this time-point, most candidate heart enhancers are less deeply conserved in vertebrate evolution. Nevertheless, the testing of 130 candidate regions in a transgenic mouse assay revealed that most of them reproducibly function as enhancers active in the heart, irrespective of their degree of evolutionary constraint. These results provide evidence for a large population of poorly conserved heart enhancers and suggest that the evolutionary constraint of embryonic enhancers can vary depending on tissue type.

Blow, Matthew J.; McCulley, David J.; Li, Zirong; Zhang, Tao; Akiyama, Jennifer A.; Holt, Amy; Plajzer-Frick, Ingrid; Shoukry, Malak; Wright, Crystal; Chen, Feng; Afzal, Veena; Bristow, James; Ren, Bing; Black, Brian L.; Rubin, Edward M.; Visel, Axel; Pennacchio, Len A.

2010-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Office Protocols | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment of Energy(National1 -OSSGasofOffice Protocols Office Protocols

142

A PANCHROMATIC VIEW OF THE RESTLESS SN 2009ip REVEALS THE EXPLOSIVE EJECTION OF A MASSIVE STAR ENVELOPE  

E-Print Network [OSTI]

The double explosion of SN 2009ip in 2012 raises questions about our understanding of the late stages of massive star evolution. Here we present a comprehensive study of SN 2009ip during its remarkable rebrightenings. ...

Friedman, Andrew Samuel

143

Cryptography and the Internet: lessons and challenges  

SciTech Connect (OSTI)

The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising new questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.

McCurley, K.S.

1996-12-31T23:59:59.000Z

144

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

145

BroadPeak: a novel algorithm for identifying broad peaks in dif-fuse ChIP-seq datasets  

E-Print Network [OSTI]

1 BroadPeak: a novel algorithm for identifying broad peaks in dif- fuse ChIP-seq datasets JianrongIP-seq datasets. We show that BroadPeak is a linear time algorithm that requires only two parame- ters, and we validate its performance on real and simulated histone modification ChIP-seq datasets. BroadPeak calls

Jordan, King

146

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

147

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

148

CAPRI : a common architecture for distributed probabilistic Internet fault diagnosis  

E-Print Network [OSTI]

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J. (George Janbing), 1979-

2007-01-01T23:59:59.000Z

149

CAPRI: A Common Architecture for Distributed Probabilistic Internet Fault Diagnosis  

E-Print Network [OSTI]

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J.

2007-06-04T23:59:59.000Z

150

POLITICAL ADMINISTRATIONS ON THE INTERNET: WHAT KIND OF TERRITORIAL NETWORK  

E-Print Network [OSTI]

POLITICAL ADMINISTRATIONS ON THE INTERNET: WHAT KIND OF TERRITORIAL NETWORK REPRESENTATION will try to represent an embryo of the administration network pattern. We start by considering the point the elements which constitute it. KEYWORDS Political administration, hypertext, internet, network, link

Paris-Sud XI, Universitť de

151

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure December 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.8 The Transmission Control Protocol

Bonaventure, Olivier

152

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3.8 The Transmission Control Protocol

Bonaventure, Olivier

153

Characterizing Internet Performance to Support Wide-area Application Development  

E-Print Network [OSTI]

-of-the-way places, like Islamabad (Pakistan) or Paramaribo (Suriname), not just the Internet covering the USA

Tanenbaum, Andrew S.

154

LITERATURE SEARCH TUTORIAL Open Internet Browser  

E-Print Network [OSTI]

://www.ncbi.nlm.nih.gov/entrez/query.fcgi · To search PubMed--fill in search box enter search terms, or enter author name, or journal titles--see instructions written below search box. To obtain detailed instructions on how to enter items, click on blueLITERATURE SEARCH TUTORIAL · Open Internet Browser · Go to http

Dratz, Edward A.

155

Using Google Earth for Internet GIS†  

E-Print Network [OSTI]

The goal of this research is to investigate the potential of using Google Earth for Internet GIS applications. The study specifically examines the use of vector and attribute data and the potential of displaying and processing this data in new ways...

Henry, Andrew

2009-11-26T23:59:59.000Z

156

Language of the Internet NAOMI S. BARON  

E-Print Network [OSTI]

processing to facilitate working on the Internet and the World Wide Web (1.3) Section 2 Linguistic Issues for Communicating via the Web 1 As with so many aspects of the computing world, the nature of the language of this chapter. #12;2 summarize the types of Web coding systems (4.1) present an overview of Web markup languages

Carlini, David

157

International Conference on INTERNET TECHNOLOGIES AND APPLICATIONS  

E-Print Network [OSTI]

), will be held in Wrexham, North East Wales, UK from Wednesday 7th to Friday 9th September 2005. The conferenceInternational Conference on INTERNET TECHNOLOGIES AND APPLICATIONS ITA 05 Wednesday 7th - Friday 9 computing and engineering. Accepted papers will be published in the conference proceedings. Suitable topics

Davies, John N.

158

Automated Eye-Movement Protocol Analysis  

E-Print Network [OSTI]

Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

Salvucci, Dario D.

159

US-Wissenschaftler entwickelte neuen ,,Porno-Blocker" frs Internet  

E-Print Network [OSTI]

US-Wissenschaftler entwickelte neuen ,,Porno-Blocker" f√ľrs Internet Darmstadt (dpa) - US-Wissenschaftler wollen k√ľnftig Computer-Kids beim Surfen durchs Internet mit einem neuartigen ,,Porno-Blocker" am Zugriff hatten lediglich Internet-Inhalte nach bestimmten Worten wie ,,Sex", ,,Porno", ,,Erotik" und anderen

Wang, James Z.

160

Chapter 14: Chiller Evaluation Protocol  

SciTech Connect (OSTI)

This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

Tiessen, A.

2014-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

162

SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013  

SciTech Connect (OSTI)

There is a significant need to protect the nationís energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INLís research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate ďnon-normalĒ traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

Gordon Rueff; Lyle Roybal; Denis Vollmer

2013-01-01T23:59:59.000Z

163

Connecting to the Internet Securely; Protecting Home Networks CIAC-2324  

SciTech Connect (OSTI)

With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

Orvis, W J; Krystosek, P; Smith, J

2002-11-27T23:59:59.000Z

164

European IPR Helpdesk IP Management in Horizon 2020: at the proposal stage  

E-Print Network [OSTI]

European IPR Helpdesk European IPR Helpdesk Fact Sheet IP Management in Horizon 2020: at the proposal stage The European IPR Helpdesk is managed by the European Commission's Executive Agency for Small

Robbiano, Lorenzo

165

Extensions of AAA for Future IP Networks Pascal Kurtansky, Hasan, Burkhard Stiller1  

E-Print Network [OSTI]

Extensions of AAA for Future IP Networks Pascal Kurtansky, Hasan, Burkhard Stiller1 Computer Engineering and Networks Laboratory TIK ETH Z√ľrich Z√ľrich, Switzerland [kurtansky|hasan|stiller

Zander, Sebastian

166

High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems  

E-Print Network [OSTI]

to attacks between conventional anonymization and our approach shows that TSA performs better for small scale trace, sensitive header fields need to be sanitized. In most cases these fields are the IP source

Shenoy, Prashant

167

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory  

Broader source: Energy.gov [DOE]

The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

168

Network-based IP packet loss importance model for H.264 SD videos  

E-Print Network [OSTI]

for pre-encoded compressed video. IEEE Signal Processingon Circuits and System/or Video Technology, July 2003. [13]of TS and IP packets in each video by frame type. Actual VQM

Chang, Y.L.; Lin, T.L.; Cosman, P C

2010-01-01T23:59:59.000Z

169

NLEL-MAAT at CLEF-IP Santiago Correa and Davide Buscaldi and Paolo Rosso  

E-Print Network [OSTI]

NLEL-MAAT at CLEF-IP Santiago Correa and Davide Buscaldi and Paolo Rosso NLE Lab, ELiRF Research Group, DSIC, Universidad Polit¬īecnica de Valencia, Spain. {scorrea, dbuscaldi, prosso}@dsic.upv.es http://users.dsic.upv.es/grupos/nle Abstract. This report presents the work carried out at NLE Lab for the CLEF-IP 2009 competition. We adapted

Rosso, Paolo

170

PERCEPTUAL EFFECTS OF PACKET LOSS ON H.264/AVC ENCODED VIDEOS Fadi Boulos  

E-Print Network [OSTI]

PERCEPTUAL EFFECTS OF PACKET LOSS ON H.264/AVC ENCODED VIDEOS Fadi Boulos , BenoÓt Parrein, Patrick.hands@bt.com ABSTRACT Video communication over IP (Internet Protocol) networks has grown significantly in recent years. However, the Qual- ity of Experience (QoE) associated with video over IP can vary

Paris-Sud XI, Universitť de

171

From Exogenous to Endogenous Networks: Internet Applications  

E-Print Network [OSTI]

incentive to deviate, will also find a lower incentive to implement a punishment for a possible deviant from the co-operative agreement. A possible escape from such a paradox may be found in the construction of more articulate punishment strategies, able... of the community 32 of internet users, calculated by taking into account the quality of interconnection between them. Formally, ?? ??? ? = +? iii npp ,? . The costs borne by a provider, instead, are assumed to increase with the number of both its users...

D'Ignazio, Alessio; Giovannetti, Emanuele

2006-03-14T23:59:59.000Z

172

INEEL AIR MODELING PROTOCOL ext  

SciTech Connect (OSTI)

Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

C. S. Staley; M. L. Abbott; P. D. Ritter

2004-12-01T23:59:59.000Z

173

Security incidents on the Internet, 1989--1995  

SciTech Connect (OSTI)

This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

Howard, J.D.

1995-12-31T23:59:59.000Z

174

Transportation Protocols Working Group First Conference Call...  

Broader source: Energy.gov (indexed) [DOE]

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

175

SSF Experimental Protocols -- Lignocellulosic Biomass Hydrolysis...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SSF Experimental Protocols - Lignocellulosic Biomass Hydrolysis and Fermentation Laboratory Analytical Procedure (LAP) Issue Date: 10302001 N. Dowe and J. McMillan Technical...

176

Superior Energy Performance Measurement and Verification Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Verification Protocol for Industry (November 2012) More Documents & Publications Energy Intensity Baselining and Tracking Guidance EnPI V4.0 Tool Algorithm Superior Energy...

177

Estimating Pedestrian Accident Exposure: Protocol Report  

E-Print Network [OSTI]

A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

2007-01-01T23:59:59.000Z

178

Router-level community structure of the Internet Autonomous Systems  

E-Print Network [OSTI]

The Internet is composed of routing devices connected between them and organized into independent administrative entities: the Autonomous Systems. The existence of different types of Autonomous Systems (like large connectivity providers, Internet Service Providers or universities) together with geographical and economical constraints, turns the Internet into a complex modular and hierarchical network. This organization is reflected in many properties of the Internet topology, like its high degree of clustering and its robustness. In this work, we study the modular structure of the Internet router-level graph in order to assess to what extent the Autonomous Systems satisfy some of the known notions of community structure. We show that the modular structure of the Internet is much richer than what can be captured by the current community detection methods, which are severely affected by resolution limits and by the heterogeneity of the Autonomous Systems. Here we overcome this issue by using a multiresolution d...

Beirů, Mariano G; Alvarez-Hamelin, J Ignacio

2015-01-01T23:59:59.000Z

179

The regulation of internet interconnection : assessing network market power  

E-Print Network [OSTI]

Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, ...

Maida, Elisabeth M. (Elisabeth Marigo)

2013-01-01T23:59:59.000Z

180

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538...

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Already a pressing global issue, internet governance is growing in importance in international debates. With internet  

E-Print Network [OSTI]

Already a pressing global issue, internet governance is growing in importance in international, including those falling under: the United Nations General Assembly (UNGA), the International related to these processes are then weaved around two particular forums ­ the ITU Plenipotentiary in 2014

Chen, Yiling

182

Protocol Number: (IBC office use only)  

E-Print Network [OSTI]

Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

Asaithambi, Asai

183

Safe Operating Procedure SAFETY PROTOCOL: Rb-86  

E-Print Network [OSTI]

of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

Farritor, Shane

184

Advantages of a Leveled Commitment Contracting Protocol  

E-Print Network [OSTI]

Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R. Lesser 7, 1995 #12; Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R, contracts have traditionally been binding. Such contracts do not al­ low agents to efficiently accommodate

Massachusetts at Amherst, University of

185

The Bitcoin Backbone Protocol: Analysis and Applications  

E-Print Network [OSTI]

The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

186

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

187

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect (OSTI)

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15T23:59:59.000Z

188

Perceived consequences and concerns in the diffusion of Internet2 at Texas A&M University  

E-Print Network [OSTI]

needed to support them. Internet2 adoption at TAMU took place towards the end of the 90s decade with the inclusion of the university in the University Corporation for the Advanced Internet Development (UCAID). This dissertation reviewed the Internet...

Mendoza Diaz, Noemi Veronica

2009-05-15T23:59:59.000Z

189

http://physics.technion.ac.il/~ips/webIsrael Physical Society Prof. Cezar Bruma IPS_Join_to_2006_05_06.doc created 2006_04_30 printed: 5/7/2006  

E-Print Network [OSTI]

of the European Physical Society (EPS) www.eps.org All IPS members are entitled to: · Register to EPS organized conferences and symposia at low EPS rates · Receive other EPS journals at low EPS rates Full IPS members are entitled to: · Receive 'Europhysics News' for free · Become a full individual EPS member for a reduced rate

Adler, Joan

190

Packet flow monitoring tool and method  

SciTech Connect (OSTI)

A system and method for converting packet streams into session summaries. Session summaries are a group of packets each having a common source and destination internet protocol (IP) address, and, if present in the packets, common ports. The system first captures packets from a transport layer of a network of computer systems, then decodes the packets captured to determine the destination IP address and the source IP address. The system then identifies packets having common destination IP addresses and source IP addresses, then writes the decoded packets to an allocated memory structure as session summaries in a queue.

Thiede, David R [Richland, WA

2009-07-14T23:59:59.000Z

191

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network [OSTI]

of household Internet usage, 89% of 93 families needed support from a computer help desk in the 1st year for Technical Help 1.3. Theoretical Analysis 2. METHOD 2.1. Requests for Support From the Help Desk 2Troubles With the Internet: The Dynamics of Help at Home Sara Kiesler, Bozena Zdaniuk, Vicki

192

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network [OSTI]

help desk in the 1st year they used the Internet. However, usually only the most technically involved aspects of technological change and communication systems. Bozena Zdaniuk is Data Management Coordinator 2.1. Requests for Support From the Help Desk 2.2. Internet Usage 2.3. Questionnaire Measures 2

Kiesler, Sara

193

Models for a selfmanaged Internet By Frank Kelly  

E-Print Network [OSTI]

Models for a self­managed Internet By Frank Kelly Centre for Mathematical Sciences, University. Kelly that some current Internet traffic needs large buffers, causing unacceptable queue­ ing delays, Crowcroft & Oechslin 1998; Gibbens & Kelly 1999a; Key & McAuley 1999a). Its premise is that a simple packet

Kelly, Frank

194

Roadmap for Real World Internet applications Socioeconomic scenarios  

E-Print Network [OSTI]

Roadmap for Real World Internet applications ­ Socioeconomic scenarios and design recommendations that is feasible to roadmap the dynamic deployment of Real World Internet applications. A multi- faceted scenarios. These scenarios are used as a roadmap for the system and architecture deployment. The application

Paris-Sud XI, Université de

195

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

­lennox­sip­reg­payload­01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

196

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

­lennox­sip­reg­payload­00.ps Columbia University March 6, 2000 Expires: September 2000 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

197

Smarter Cropping: Internet program helps farmers make decisions about crops  

E-Print Network [OSTI]

Story by Kathy Wythe tx H2O | pg. 26 Smarter Cropping Internet program helps farmers make decisions about crops Along the coastal plains of Texas, farmers and crop managers are using the Internet to make more informed decisions about growing...

Wythe, Kathy

2009-01-01T23:59:59.000Z

198

Enabling Performance Intelligence for Application Adaptation in the Future Internet  

E-Print Network [OSTI]

plat- form. Achieving autonomicity in the Future Internet will require a performance architecture that such "Future Internet Perfor- mance Architecture" (FIPA), and present our reference implementation of FIPA in virtualization [1] technology at end-hosts and core network switches/routers. The Global Envir

Calyam, Prasad

199

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh  

E-Print Network [OSTI]

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh M. Satyanarayanan, Carnegie to suspend work at one machine and to resume it at another. Our key insight is that this capability can a machine at one Internet site, then travel to some other site and resume my work there on another machine

Satyanarayanan, Mahadev "Satya"

200

Using the Internet to Stay Informed about Energy  

E-Print Network [OSTI]

A new tool, the INTERNET, has arrived on the scene to help everyone who has anything to do with energy: the energy user, the utilities, the equipment manufacturers, energy management firms, and energy brokers. The INTERNET is useful to the same...

Phillips, J.

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Service identification in TCP/IP : well-known versus random port numbers  

E-Print Network [OSTI]

The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...

Masiello, Elizabeth

2005-01-01T23:59:59.000Z

202

Service Identification in TCP/IP: Well-Known versus Random Port Numbers  

E-Print Network [OSTI]

The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...

Masiello, Elizabeth

2006-01-11T23:59:59.000Z

203

Network Upgrade for the SLC: Control System Modifications  

SciTech Connect (OSTI)

Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

Crane, M.; Mackenzie, R.; Sass, R.; Himel, T.; /SLAC

2011-09-09T23:59:59.000Z

204

A Garch-based adaptive playout delay algorithm for VoIP Ying Zhang a,*, Damien Fay b  

E-Print Network [OSTI]

A Garch-based adaptive playout delay algorithm for VoIP Ying Zhang a,*, Damien Fay b , Liam Garch Playout delay Time series forecasting VoIP a b s t r a c t Network delay, packet loss and network a trade-off between the buffer-induced delay and any additional packet loss rate. In this paper, a Garch

Haddadi, Hamed

205

CAPEX study for grid dependent multi-layer IP/MPLS-over-EON using relative BV-WSS costs  

E-Print Network [OSTI]

CAPEX study for grid dependent multi-layer IP/MPLS-over-EON using relative BV-WSS costs O. Pedrola1@ac.upc.edu Abstract: The impact of the frequency grid on the CAPEX required to deploy a multi-layer IP/MPLS equipment for such functionality. Since network CAPEX is a figure network operators are always striving

Politècnica de Catalunya, Universitat

206

Implementation of load sharing in TCP/IP distributed systems by election technique  

E-Print Network [OSTI]

's association. The bind () system call is used as follows, in Internet domain: bind (s, (struct sockaddr +) csin, sizsof sin); d. Connection Establishment Connection establishment is usuaUy asymmetric, with one process a client and the ' other a server... The client requests services from the server by initiating a connection to the server's socket. On the client side the connect() call is used to initiate a connection. In the Internet domain, it would be: connect(s, (struct sockaddr +)observer, sizeof...

Muppidi, Sridhar Reddy

1991-01-01T23:59:59.000Z

207

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

208

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

209

Protective Force Protocols for ESS Supported Performance Tests...  

Broader source: Energy.gov (indexed) [DOE]

Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12,...

210

access control protocols: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

211

access control protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

212

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster...

213

Protocol for Addressing Induced Seismicity Associated with Enhanced...  

Office of Environmental Management (EM)

Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

214

NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys  

E-Print Network [OSTI]

NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols

215

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

216

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

217

CIS 455: Internet and Web Systems Course Number & Title (A.1) CIS 455 Internet and Web Systems  

E-Print Network [OSTI]

CIS 455: Internet and Web Systems Course Number & Title (A.1) CIS 455 Internet and Web Systems and web systems: scalability, interoperability (of data and code), atomicity and consistency models-backed or PHP/JSP/Servlet-based web sites (for this, see CIS 330/550 or MKSE 212). Here, we will learn how

Plotkin, Joshua B.

218

MQM -Multicast Quality Monitor Falko Dressler  

E-Print Network [OSTI]

transmissions over the Internet. Examples are TV broadcasts or conference meetings. These ser- vices require as due to the state-less working principle of UDP (User Datagram Protocol, [19]) which is used for IP multi- cast transmissions, multimedia applications typically use RTP (Real-time Transport Protocol, [22

Breu, Ruth

219

Implementation of a traffic engineering technique that preserves IP Fast Reroute in  

E-Print Network [OSTI]

optimisation des poids des liens dans un r¬īeseau OSPF qui minimise la charge des liens et maximise les search, Combinatorial Optimization. 1 Introduction Enterprise and ISP networks have deployed IP Routing(CP) and Constraint-Based Local Search (CBLS) are well suited for solving such complex combinatorial problems. COMET

Bonaventure, Olivier

220

Session Lengths and IP Address Usage of Smartphones in a University Campus WiFi  

E-Print Network [OSTI]

to laptops and desktop PCs, network usage characteristics of smartphones may differ significantly becauseSession Lengths and IP Address Usage of Smartphones in a University Campus WiFi Network be used more opportunistically. In this paper, we study two important network usage characteristics

Wang, Bing

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

REPORT PREPARED FOR THE WELSH ASSEMBLY GOVERNMENT IP CRIME & E CRIME  

E-Print Network [OSTI]

. IP CRIME page 23 5. E COMMERCE LAW page 30 6. E CRIME page 38 7. RELEVANCE FOR WELSH SMEs page 45 8 Framework Study: "Effects of counterfeiting on EU SMEs and a review of various public and private IPR needs to know, National Hi-Tech Crime Unit (NHTCU), 2005. (l) Fraud and Technology Crimes ­ Findings

Martin, Ralph R.

222

VoIP at CSU -Frequently asked questions and options Instructions for your individual phone  

E-Print Network [OSTI]

" options 2. Forward your phone to a personal cell phone and use the voicemail that comes with your cell phone package. Enter your cell phone number with 8 + area code (e.g. 8-970-123-4567) at httpVoIP at CSU - Frequently asked questions and options Instructions for your individual phone: 1

223

Econometric Feedback for Runtime Risk Management in VoIP Architectures  

E-Print Network [OSTI]

Econometric Feedback for Runtime Risk Management in VoIP Architectures Oussema Dabbebi, R at automatically adapting these parameters based on an econometric feedback mechanism. We mathematically describe the configuration of such risk models, by refining at runtime the model parameters based on an econometric feedback

Paris-Sud XI, Universitť de

224

IP 2000 Conference 23. / 24. October 2000 Page 1 25/8/00  

E-Print Network [OSTI]

IP 2000 Conference 23. / 24. October 2000 Page 1 25/8/00 Low Power Macro Component Library. For this reason the macro components are specified tailored for low power operation. A unified power reduction, Lattice) or Fast Fourier Transform (FFT) modules the same components can be isolated too. It would

Arslan, Tughrul

225

Energy-Aware Path Selection for Scheduled Lightpaths in IP-over-WDM Networks  

E-Print Network [OSTI]

Energy-Aware Path Selection for Scheduled Lightpaths in IP-over-WDM Networks Song Yang and Fernando in the context of energy-aware routing. In this paper we study energy-efficient path selection under propose an energy-aware routing algorithm that is based on traffic grooming, but which has the flexibility

Kuipers, Fernando A.

226

An approach for improving performance of aggregate voice-over-IP traffic  

E-Print Network [OSTI]

of denial-of service (DoS) attacks can deteriorate the service that these voice calls receive. And these conditions contribute to the decline in call quality in VoIP applications; therefore, error-correcting/concealing techniques remain the only alternative...

Al-Najjar, Camelia

2006-10-30T23:59:59.000Z

227

Self-learning IP Traffic Classification based on Statistical Flow Characteristics  

E-Print Network [OSTI]

and intrusion detection. The most common identification technique based on the inspection of `known port numbers or encrypted traffic. The authors of [1] propose signature-based methods to classify P2P traffic. AlthoughSelf-learning IP Traffic Classification based on Statistical Flow Characteristics Sebastian Zander1

Zander, Sebastian

228

Textual summarisation of flowcharts in patent drawings for CLEF-IP 2012  

E-Print Network [OSTI]

Textual summarisation of flowcharts in patent drawings for CLEF-IP 2012 Andrew Thean, Jean of flowcharts taken from patent draw- ings to produce summaries containing information about their structure.7 Digital Libraries General Terms Measurement, Performance, Experimentation Keywords Patent, Prior Art

Paris-Sud XI, Universitť de

229

Translation of a Patent Certificate Translated by AFD China IP Our Ref. No.:080801507-E  

E-Print Network [OSTI]

#12;Translation of a Patent Certificate Translated by AFD China IP Our Ref. No.:080801507-E Certificate No. 1156871 Certificate of Invention Patent Title: Method and System for Producing a Video Synopsis Inventors: Shmuel Peleg; Alexander Rav-Acha Patent No.: ZL 2006 8 0048754.8 Date of Filing

Peleg, Shmuel

230

An implementation of optimal dynamic load balancing based on multipath IP routing  

E-Print Network [OSTI]

] has tackled this problem from the transport layer side: here, TCP sources manage multiple congestion build on recent theory which shows a globally optimum resource allocation across the TCP/IP layers can of demands within network capacity. Solutions involve use of optimization together with practical techniques

231

Automatic Information Discovery from the "Invisible Web" King-Ip Lin, Hui Chen  

E-Print Network [OSTI]

that is untouched by the traditional search engines. Known as the "invisible web" or "deep web", it representsAutomatic Information Discovery from the "Invisible Web" King-Ip Lin, Hui Chen Division of Computer@memphis.edu Abstract A large amount of on-line information resides on the invisible web ­ web pages generated

Lin, King-Ip "David"

232

Host-IP Clustering Technique for Deep Web Characterization Denis Shestakov  

E-Print Network [OSTI]

Host-IP Clustering Technique for Deep Web Characterization Denis Shestakov Department of Media databases. This part of the Web, known as the deep Web, is to date relatively unexplored and even major are aimed at more accurate estimation of main parameters of the deep Web by sampling one national web domain

Hammerton, James

233

Geographic Trough Filling for Internet Datacenters  

E-Print Network [OSTI]

To reduce datacenter energy consumption and cost, current practice has considered demand-proportional resource provisioning schemes, where servers are turned on/off according to the load of requests. Most existing work considers instantaneous (Internet) requests only, which are explicitly or implicitly assumed to be delay-sensitive. On the other hand, in datacenters, there exist a vast amount of delay-tolerant jobs, such as background/maintainance jobs. In this paper, we explicitly differentiate delay-sensitive jobs and delay tolerant jobs. We focus on the problem of using delay-tolerant jobs to fill the extra capacity of datacenters, referred to as trough/valley filling. Giving a higher priority to delay-sensitive jobs, our schemes complement to most existing demand-proportional resource provisioning schemes. Our goal is to design intelligent trough filling mechanisms that are energy efficient and also achieve good delay performance. Specifically, we propose two joint dynamic speed scaling and traffic shifti...

Xu, Dan

2011-01-01T23:59:59.000Z

234

A Metaobject Protocol for C++ Shigeru Chiba  

E-Print Network [OSTI]

A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

Chiba, Shigeru

235

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

236

NREL Test-to-Failure Protocol (Presentation)  

SciTech Connect (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

237

PEP Classroom Observation Protocol Project # _______ District __________________________ School ________________________________________  

E-Print Network [OSTI]

PEP Classroom Observation Protocol Project # _______ District __________________________ School (mark all that apply) Demonstrate or confirm known concepts/procedures Demonstrate or confirm known concepts/procedures Explore ideas, test conjectures, look for patterns Explore ideas, test conjectures

Lee, Carl

238

IT Licentiate theses Ad Hoc Routing Protocol  

E-Print Network [OSTI]

IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

Flener, Pierre

239

The Kyoto Protocol and developing countries  

E-Print Network [OSTI]

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

240

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect (OSTI)

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Protein kinase C (PKC) phosphorylates human platelet inositol trisphosphate 5/sup +/-/-phosphomonoesterase (IP/sub 3/ 5'-p'tase) increasing phosphatase activity  

SciTech Connect (OSTI)

Phosphoinositide breakdown in response to thrombin stimulation of human platelets generates messenger molecules that activate PKC (diglyceride) and mobilize Ca/sup + +/ (inositol tris-phosphates). The water soluble products of phospholipase C-mediated metabolism of phosphatidylinositol 4,5-diphosphate are inositol 1,4,5 P/sub 3/ (IP/sub 3/) and inositol 1:2-cyclic 4,5 P/sub 3/ (cIP/sub 3/). A specific phosphatase, IP/sub 3/ 5'-p'tase, cleaves the 5 phosphate from IP/sub 3/ or cIP/sub 3/ to form IP/sub 2/ or cIP/sub 2/ and P/sub i/, none of which mobilizes Ca/sup + +/. Thus, the IP/sub 3/ 5'-p'tase may regulate cellular responses to IP/sub 3/ or cIP/sub 3/. The authors find that IP/sub 3/ 5'-p'tase isolated from human platelets is phosphorylated by rat brain PKC, resulting in a 4-fold increase in IP/sub 3/ 5'-p'tase activity. The authors phosphorylated IP/sub 3/ 5'-p'tase using ..gamma.. /sup 32/P-ATP and found that the labeled enzyme comigrated on SDS-PAGE with the previously described 40K protein phosphorylated in response to thrombin stimulation of platelets. The similarity of the PKC-phosphorylated IP/sub 3/ 5'-p'tase observed in vitro and the thrombin-stimulated phosphorylated 40K protein known to be phosphorylated by PKC in vivo, suggests that these proteins may be the same. These results suggest that platelet Ca/sup + +/ mobilization maybe regulated by PKC phosphorylation of the IP/sub 3/ 5'-p'tase and can explain the observation that phorbol ester treatment of intact human platelets results in decreased production of IP/sub 3/ and decreased Ca/sup + +/ mobilization upon subsequent thrombin addition.

Connolly, T.M.; Majerus, P.W.

1986-05-01T23:59:59.000Z

242

EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?  

E-Print Network [OSTI]

Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

Nakano, Koji

243

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

244

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

245

Community Internet Access in Rural Areas: Solving the Economic Sustainability Puzzle  

E-Print Network [OSTI]

- oping nations. In researching and studying the economic self-sustainability of the Internet in rural

246

On PowerLaw Relationships of the Internet Topology Michalis Faloutsos  

E-Print Network [OSTI]

On Power­Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp Despite the apparent randomness of the Internet, we dis­ cover some surprisingly simple power­laws of the Internet topology. These power­laws hold for three snapshots of the Internet, between November 1997

247

On Power-Law Relationships of the Internet Topology Michalis Faloutsos  

E-Print Network [OSTI]

On Power-Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp the apparent randomness of the Internet, we dis- cover some surprisingly simple power-laws of the Internet topology. These power-laws hold for three snapshots of the Internet, between November 1997 and December

248

Hybrid protocol of remote implementations of quantum operations  

E-Print Network [OSTI]

We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

Ning Bo Zhao; An Min Wang

2007-08-04T23:59:59.000Z

249

A calculus for cryptographic protocols: The spi calculus  

E-Print Network [OSTI]

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.

Martin Abadi; Andrew D. Gordon

1999-01-01T23:59:59.000Z

250

An interoperable internet scale solution for RFID network security  

E-Print Network [OSTI]

Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for ...

Mao, Tingting

251

Benefit from Web services in the mobile Internet industry  

E-Print Network [OSTI]

Over the past five years, mobile Internet services in Japan have seen major expansion as a result of collaboration between mobile operators acting as mobile portal providers, and their complementors, namely, content ...

Ikeda, Daizo, 1974-

2004-01-01T23:59:59.000Z

252

The Internet as recommendation engine : implications of online behavioral targeting  

E-Print Network [OSTI]

This thesis discusses the economic implications of Internet behavioral advertising, which targets ads to individuals based on extensive detailed data about the specific websites users have visited. Previous literature on ...

Smith-Grieco, Anthony Nicoll

2010-01-01T23:59:59.000Z

253

Standards as interdependent artifacts : the case of the Internet  

E-Print Network [OSTI]

This thesis has explored a new idea: viewing standards as interdependent artifacts and studying them with network analysis tools. Using the set of Internet standards as an example, the research of this thesis includes the ...

Hsieh, Mo-Han

2008-01-01T23:59:59.000Z

254

Equalizing Superstars: The Internet and the Democratization of Education  

E-Print Network [OSTI]

Internet-based educational resources are proliferating rapidly. One concern associated with these (potentially transformative) technological changes is that they will be disequalizingóas many technologies of the last several ...

Acemoglu, Daron

255

The CATI Project: Charging and Accounting Technology for the Internet  

E-Print Network [OSTI]

The CATI Project: Charging and Accounting Technology for the Internet Burkhard Stiller1, Torsten, Switzerland 1 E-Mail: [stiller | plattner]@tik.ee.ethz.ch, 2 E-Mail: [braun | mguenter]@iam.unibe.ch Abstract

Braun, Torsten

256

Equalizing Superstars: The Internet and the Democratization of Education  

E-Print Network [OSTI]

Educational resources distributed via the Internet are rapidly proliferating. One prominent concern associated with these potentially transformative developments is that, as many of the leading technologies of the last ...

Acemoglu, Daron

2014-01-17T23:59:59.000Z

257

Texas science teachers' use of TENET and the internet  

E-Print Network [OSTI]

The wealth of information available on TENET, the Texas Education Network, and the Internet has the potential to bring dramatic changes to science classrooms throughout Texas. Networking technology removes the limits of classrooms walls and opens...

Edwards, Eleanor Evelyn

1995-01-01T23:59:59.000Z

258

Distributed real-time control via the internet  

E-Print Network [OSTI]

The objective of this research is to demonstrate experimentally the feasibility of using the Internet for a Distributed Control System (DCS). An algorithm has been designed and implemented to ensure stability of the system in the presence of upper...

Srivastava, Abhinav

2004-09-30T23:59:59.000Z

259

Towards More Efficient Delay Measurements on the Internet  

E-Print Network [OSTI]

the speed of experiments, improving the accuracy of measurement results, and reducing the amount of tra?c generated by the scan. Finally, we present architectures for performing an Internet scale measurement scan. We found that with custom drivers...

Webster, Patrick Jordan

2013-07-22T23:59:59.000Z

260

T-593: Microsoft Internet Explorer unspecified code execution  

Broader source: Energy.gov [DOE]

Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Cerebro : forming parallel internets and enabling ultra-local economies  

E-Print Network [OSTI]

Internet-based mobile communications have been increasing rapidly [5], yet there is little or no progress in platforms that enable applications for discovery, context-awareness and sharing of data and services in a peer-wise ...

Ypodimatopoulos, Polychronis Panagiotis

2008-01-01T23:59:59.000Z

262

Snap: Robust Tool for Internet-wide Operating System Fingerprinting  

E-Print Network [OSTI]

SNAP: ROBUST TOOL FOR INTERNET-WIDE OPERATING SYSTEM FINGERPRINTING A Thesis by ANKUR BHARATBHUSHAN NANDWANI Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree... of MASTER OF SCIENCE December 2010 Major Subject: Computer Science SNAP: ROBUST TOOL FOR INTERNET-WIDE OPERATING SYSTEM FINGERPRINTING A Thesis by ANKUR BHARATBHUSHAN NANDWANI Submitted to the O?ce of Graduate Studies of Texas A&M University...

Nandwani, Ankur Bharatbhushan

2012-02-14T23:59:59.000Z

263

PONDER - A Real time software backend for pulsar and IPS observations at the Ooty Radio Telescope  

E-Print Network [OSTI]

This paper describes a new real-time versatile backend, the Pulsar Ooty Radio Telescope New Digital Efficient Receiver (PONDER), which has been designed to operate along with the legacy analog system of the Ooty Radio Telescope (ORT). PONDER makes use of the current state of the art computing hardware, a Graphical Processing Unit (GPU) and sufficiently large disk storage to support high time resolution real-time data of pulsar observations, obtained by coherent dedispersion over a bandpass of 16 MHz. Four different modes for pulsar observations are implemented in PONDER to provide standard reduced data products, such as time-stamped integrated profiles and dedispersed time series, allowing faster avenues to scientific results for a variety of pulsar studies. Additionally, PONDER also supports general modes of interplanetary scintillation (IPS) measurements and very long baseline interferometry data recording. The IPS mode yields a single polarisation correlated time series of solar wind scintillation over a b...

Naidu, Arun; Manoharan, P K; Krishnakumar, M A

2015-01-01T23:59:59.000Z

264

A Unifying Infrastructure for Internet Services Jaideep Chandrashekar  

E-Print Network [OSTI]

this. In this paper, we propose a novel service overlay architecture that serves as a flexible and an associated service layer, which en- ables service-oriented routing and forwarding over the underly- ing IP architecture, namely service gateway (SG) and service point-of-presence (S- PoP). We also present examples

Hou, Y. Thomas

265

Money flows in the Internet ecosystem : strategic opportunities for telecom operators and other Internet agents in the digital age  

E-Print Network [OSTI]

The question about where the money goes is something really interesting for all the companies in the Internet ecosystem. While there is a huge interest, no clear answers have been provided, partially because the ecosystem ...

Valentin Vinagrero, Israel

2014-01-01T23:59:59.000Z

266

Chapter 22: Compressed Air Evaluation Protocol  

SciTech Connect (OSTI)

Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

Benton, N.

2014-11-01T23:59:59.000Z

267

Chapter 15: Commercial New Construction Protocol  

SciTech Connect (OSTI)

This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

Keates, S.

2014-09-01T23:59:59.000Z

268

SN 2009ip at late times - an interacting transient at +2 years  

E-Print Network [OSTI]

We present photometric and spectroscopic observations of the interacting transient SN 2009ip taken during the 2013 and 2014 observing seasons. We characterise the photometric evolution as a steady and smooth decline in all bands, with a decline rate that is slower than expected for a solely $^{56}$Co-powered supernova at late phases. No further outbursts or eruptions were seen over a two year period from 2012 December until 2014 December. SN 2009ip remains brighter than its historic minimum from pre-discovery images. Spectroscopically, SN 2009ip continues to be dominated by strong, narrow ($\\lesssim$2000 km~s$^{-1}$) emission lines of H, He, Ca, and Fe. While we make tenuous detections of [Fe~{\\sc ii}] $\\lambda$7155 and [O~{\\sc i}] $\\lambda\\lambda$6300,6364 lines at the end of 2013 June and the start of 2013 October respectively, we see no strong broad nebular emission lines that could point to a core-collapse origin. In general, the lines appear relatively symmetric, with the exception of our final spectrum ...

Fraser, Morgan; Pastorello, Andrea; Jerkstrand, Anders; Smartt, Stephen J; Chen, Ting-Wan; Childress, Michael; Gilmore, Gerard; Inserra, Cosimo; Kankare, Erkki; Margheim, Steve; Mattila, Seppo; Valenti, Stefano; Ashall, Christopher; Benetti, Stefano; Botticella, Maria Teresa; Bauer, Franz Erik; Campbell, Heather; Elias-Rosa, Nancy; Fleury, Mathilde; Gal-Yam, Avishay; Hachinger, Stephan; Howell, D Andrew; Guillou, Laurent Le; Lťget, Pierre-FranÁois; Morales-Garoffolo, Antonia; Polshaw, Joe; Spiro, Susanna; Sullivan, Mark; Taubenberger, Stefan; Turatto, Massimo; Walker, Emma S; Young, David R; Zhang, Bonnie

2015-01-01T23:59:59.000Z

269

Engineering a p+ip superconductor: Comparison of topological insulator and Rashba spin-orbit-coupled materials  

E-Print Network [OSTI]

We compare topological insulator materials and Rashba-coupled surfaces as candidates for engineering p+ip superconductivity. Specifically, in each type of material we examine (1) the limitations to inducing superconductivity ...

Potter, Andrew Cole

270

Transgene Excision Has No Impact on In Vivo Integration of Human iPS Derived Neural Precursors  

E-Print Network [OSTI]

The derivation of induced human pluripotent stem cells (hiPS) has generated significant enthusiasm particularly for the prospects of cell-based therapy. But there are concerns about the suitability of iPS cells for in vivo ...

Major, Tamara

271

Shape-based peak identification for ChIP-Seq Valerie Hower, Steven N. Evans, and Lior Pachter  

E-Print Network [OSTI]

Shape-based peak identification for ChIP-Seq Valerie Hower, Steven N. Evans, and Lior PachterSeq [27] and MACS [29] using two published data sets. #12;2 Valerie Hower, Steven N. Evans, and Lior

Evans, Steven N.

272

Internet Key Exchange (IKE) with MQV Yongge Wang  

E-Print Network [OSTI]

to work in an arbitrary finite group. The MQV protocol has been standardized in ANSI X9.42 [1], ANSI X9 in an arbitrary finite group. The MQV protocol has been standardized in ANSI X9.42 [1], ANSI X9.63 [2], and IEEE

Wang, Yongge

273

An Effective Scheduler for IP Routers Goncalo Quadros, Antonio Alves, Edmundo Monteiro, Fernando Boavida  

E-Print Network [OSTI]

useless when QoS is needed - a different type of scheduler must be used. Our first idea to overcome essentially the same technologies as the ones currently used in the Internet. A fundamental step for the development of the intended service model was the selection of an alternative for the common ≠ but useless

Monteiro, Edmundo

274

Russia's role in the Kyoto Protocol  

E-Print Network [OSTI]

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

275

Measuring Transport Protocol Potential for Energy Efficiency  

E-Print Network [OSTI]

Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras, Greece {skontog, emamatas, ipsaras, vtsaousi}@ee.duth.gr Abstract. We investigate the energy-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

Tsaoussidis, Vassilis

276

Optimal Decentralized Protocols for Electric Vehicle Charging  

E-Print Network [OSTI]

1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging. The algorithms exploit the elasticity and controllability of electric vehicle loads in order to fill the valleys

Low, Steven H.

277

Utility, informativity and protocols Robert van Rooy  

E-Print Network [OSTI]

Utility, informativity and protocols Robert van Rooy ILLC/University of Amsterdam R particular natural assumptions the utility of questions and answers reduces to their informativity, and that the ordering relation induced by utility sometimes even reduces to the logical relation of entailment

van Rooij, Robert

278

Transport Control Protocol (TCP) In Heterogeneous Networks  

E-Print Network [OSTI]

Sprint Transport Control Protocol (TCP) In Heterogeneous Networks Objectives · Principles of TCP functional modules: slow start, congestion avoidance, fast transmission and fast recovery. ­ Maintain · Packet dropping is the only indication signal for network congestion (Maybe?) · Different transmission

Shihada, Basem

279

Web Applications and Security Web protocol overview  

E-Print Network [OSTI]

Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

Massachusetts at Amherst, University of

280

Northern Kentucky University Communicable Disease Protocol  

E-Print Network [OSTI]

Northern Kentucky University Communicable Disease Protocol Approved 12/6/2011 1.0 Scope To develop procedures and policies for Northern Kentucky University students who reside on or off- campus who have been those required as outlined in 902 KAR 2:020 to be reported to the Northern Kentucky Health Department

Boyce, Richard L.

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security proofs of cryptographic protocols Eva Jencusova  

E-Print Network [OSTI]

with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

282

A New Protocol for Evaluating Concrete Curing Effectiveness  

E-Print Network [OSTI]

and qualify the curing compound, a new evaluation protocol is introduced in this study. The new protocol consists of using measured relative humidity and temperature to calculate an effectiveness index (EI) which serves as an indicator of the effectiveness...

Sun, Peizhi

2013-07-22T23:59:59.000Z

283

Coherent feedback that beats all measurement-based feedback protocols  

E-Print Network [OSTI]

We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

Jacobs, Kurt

284

Protocols for the Equitable Assessment of Marine Energy Converters†  

E-Print Network [OSTI]

This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

285

Coherent feedback that beats all measurement-based feedback protocols  

E-Print Network [OSTI]

We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

2014-07-21T23:59:59.000Z

286

Internet-based calibration of a multifunction calibrator  

SciTech Connect (OSTI)

A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

2000-04-17T23:59:59.000Z

287

3-D Spectral IP Imaging: Non-Invasive Characterization DE FG02 96ER 14714  

SciTech Connect (OSTI)

The Earth Resources Laboratory (ERL) performed a broad foundational study of spectral induced polarization (SIP) for site characterization. The project encompassed laboratory studies of microgeometry and chemistry effects on Induced Polarization (IP), an investigation of electromagnetic coupling (emc) noise, and development of 3D modeling and inversion codes. The major finding of the project is that emc noise presents a critical limitation for field implementation of SIP and conventional correction methods are inadequate. The project developed a frequency domain 3D complex resistivity modeling and inversion code Laboratory experiments were conducted to study the effects of solution chemistry and microgeometry on the SIP response of sandstone. Results indicate that changes in chemistry affect the magnitude of the spectral IP response and changes in microgeometry affect the shape of the spectral IP response. The developed physiochemical IP model can be used to invert spectral IP data for an apparent grain size distribution. Laboratory studies over the last twenty years have shown that SIP data must be acquired over several decades of frequency and include frequencies greater than 1kHz. A model of the components of emc noise has been developed and investigation with this model showed that inductive coupling is the most significant component. The study concluded that emc limits the frequency range of usable field data to approximately 100 Hz and below for typical site conditions. Several correction schemes have been developed based on treating emc as noise to be removed from the data, but our investigation has shown that these are not adequate for high frequencies, greater than 100Hz. Laboratory studies have demonstrated that the greatest response is the frequency range greater than 1KHz, hence the emc problem must be resolved for field implementation of SIP to advance. The ERL developed 2D/3D time domain codes that perform inversions for charge abilities based on schemes introduced by Siegel (1959). The ERL has also developed a 3D complex resistivity code for inversion of frequency domain IP data. The algorithm accommodates a general earth model with a complex electrical resistivity as a function of frequency and 3-D spatial position. The forward problem is solved by the complex biconjugate gradient method, while the regularized inverse problem is solved by the nonlinear conjugate gradient method. Time domain field data was acquired along a single survey line at the FS-12 plume, Massachusetts Military Reservation. The data was inverted with the developed 2D time domain code with the results having an excellent match to monitoring well data. The data was further analyzed by an innovative scheme where a ''gross spectral chargeability'' was determined from time domain data. The results show that there is valuable information in the spectra of the data.

Morgan, F. Dale; Rodi, William; Lesmes, David

2000-06-01T23:59:59.000Z

288

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

289

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

290

Utilisation des Protocoles HARQ pour la Radio Cognitive  

E-Print Network [OSTI]

Utilisation des Protocoles HARQ pour la Radio Cognitive Romain Tajan encadré/01/2012 #12;Plan 1 Introduction 2 La Radio Cognitive Techniques de la Radio Cognitive Méthodes d'accès 3 performances du protocole IR-HARQ 4 Utilisation des protocoles HARQ pour la Radio Cognitive Utilisation de l

Dobigeon, Nicolas

291

Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,  

E-Print Network [OSTI]

to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

292

A Multi-Sender Asynchronous Extension to the AER Protocol  

E-Print Network [OSTI]

A Multi-Sender Asynchronous Extension to the AER Protocol John Lazzaro and John Wawrzynek Computer-event representation (AER) is an asynchronous point-to-point communi- cations protocol for silicon neural systems. This paper describes an extension of the AER protocol that allows multiple AER senders to share a common bus

Lazzaro, John

293

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network [OSTI]

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

294

Fusion rules and vortices in $p_x+ip_y$ superconductors  

E-Print Network [OSTI]

The "half-quantum" vortices ($\\sigma$) and quasiparticles ($\\psi$) in a two-dimensional $p_x+ip_y$ superconductor obey the Ising-like fusion rules $\\psi\\times \\psi=1$, $\\sigma\\times \\psi=\\sigma$, and $\\sigma\\times \\sigma= 1+\\psi$. We explain how the physical fusion of vortex-antivortex pairs allows us to use these rules to read out the information encoded in the topologically protected space of degenerate ground states. We comment on the potential applicability of this fact to quantum computation. Modified 11/30/05 to reflect manuscript as accepted for publication. Includes corrected last section.

Michael Stone; Suk Bum Chung

2005-11-30T23:59:59.000Z

295

Assistance Transactions Headquarters IP Counsel, GC-62, John Lucas, 202-586-2939  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergy Cooperation |South42.2 (April 2012)Tie Ltd |Line, LLC:LLCOffshoreContinentalAssetAsset(IP)

296

CINEMA: Columbia InterNet Extensible Multimedia Architecture Kundan Singh, Wenyu Jiang, Jonathan Lennox, Sankaran Narayanan and Henning Schulzrinne  

E-Print Network [OSTI]

CINEMA: Columbia InterNet Extensible Multimedia Architecture Kundan Singh, Wenyu Jiang, Jonathan Lennox, Sankaran Narayanan and Henning Schulzrinne Department of Computer Science, Columbia University and implementation of our Internet telephony system CINEMA (Columbia InterNet Extensible Multimedia Architecture

297

Building America House Simulation Protocols (Revised)  

SciTech Connect (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

298

Lab protocols A. Preparation of competent Cells  

E-Print Network [OSTI]

for 30- 60 min. #12;Lab protocols C. Solutions RF1 Compound RbCl MnCl2 4H2O Potassium acetate CaCl2.2H2O-rinsed 0.22 u membrane. RF2 Compound MOPS RbCl CaCl2.2H2O Glycerol Amount/liter 20 ml of 0.5 M (pH6.8) 1

Oliver, Douglas L.

299

CREATION OF THE MODEL ADDITIONAL PROTOCOL  

SciTech Connect (OSTI)

In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

Houck, F.; Rosenthal, M.; Wulf, N.

2010-05-25T23:59:59.000Z

300

08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols  

E-Print Network [OSTI]

Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

Udgaonkar, Jayant B.

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Quality Matters: Some Remarks on Internet Service Provisioning and Tariff Design  

E-Print Network [OSTI]

Quality Matters: Some Remarks on Internet Service Provisioning and Tariff Design¬£ J¬®orn Altmann√Ě Bj on demand to derive some consequences for Internet service provisioning and tariff design. ¬£This research

Varaiya, Pravin

302

E-Print Network 3.0 - art internet database Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

internet database Search Powered by Explorit Topic List Advanced Search Sample search results for: art internet database Page: << < 1 2 3 4 5 > >> 1 This is a guide to finding...

303

Building trust over the Internet : design and prototyping of an advocacy website  

E-Print Network [OSTI]

The Internet has empowered consumers with information, options, and a simple mechanism for transaction. Although the Internet has not completely replaced traditional shopping methods, it has brought about a change in the ...

Ma, Sha, 1981-

2004-01-01T23:59:59.000Z

304

E-Print Network 3.0 - arthritis-related internet web Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

related internet web Search Powered by Explorit Topic List Advanced Search Sample search results for: arthritis-related internet web Page: << < 1 2 3 4 5 > >> 1 COP 6930 Advanced...

305

CSP 550: Internet Programming Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and Paradigms, 2002.  

E-Print Network [OSTI]

CSP 550: Internet Programming Texts Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and SOAP 9 hours Total 45 hours Edited March 2006 (html, css checks) CSP 550: Internet Programming - CS

Heller, Barbara

306

Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"  

E-Print Network [OSTI]

The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coalóthe PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

Koomey, Jonathan G.

2008-01-01T23:59:59.000Z

307

Using Batteries to Reduce the Power Costs of Internet-scale Distributed  

E-Print Network [OSTI]

Cost of Running an Internet-Scale Network 4 Server Cost (CapEx) Bandwidth From network provider Example

Berger, Emery

308

Experiences with TCP/IP over an ATM OC12 WAN  

SciTech Connect (OSTI)

This paper discusses the performance testing experiences of a 622.08 Mbps OC12 link. The link will be used for large bulk data transfer, and as such, of interest are both the ATM level throughput rates and end-to-end TCP/IP throughput rates. Tests were done to evaluate the ATM switches, the IP routers, the end hosts, as well as the underlying ATM service provided by the carrier. A low level of cell loss, (resulting in <.01 % packet loss), decreased the TCP throughput rate considerably when one TCP flow was trying to use the entire OC12 bandwidth. Identifying and correcting cell loss in the network proved to be extremely difficult. TCP Selective Acknowledgement (SACK) improved performance dramatically, and the maximum throughput rate increased from 300 Mbps to 400 Mbps. The effects of TCP slow start on performance at OC12 rates are also examined, and found to be insignificant for very large file transfers (e.g., for a 10 GB file). Finally, a history of TCP performance over high-speed networks is presented.

Nitzan, Rebecca L.; Tierney, Brian L.

1999-12-23T23:59:59.000Z

309

ARTIGO INTERNET Professores visitam o maior reactor de Fuso Nuclear  

E-Print Network [OSTI]

ARTIGO INTERNET Professores visitam o maior reactor de Fus√£o Nuclear in http reactor de Fus√£o Nuclear Experi√™ncia aproxima investiga√ß√£o das futuras gera√ß√Ķes Doze professores do ensino secund√°rio visitaram o maior reactor de fus√£o nuclear da Terra (JET), no Reino Unido, na semana passada

Instituto de Sistemas e Robotica

310

ARTIGO INTERNET PLUX vence Prmio "Biggest Innovation" em concurso  

E-Print Network [OSTI]

concorreram aos prémios "Biggest Innovation", "Greatest Social Value" e "Potential for Biggest Social ImpactNewsSearch ARTIGO INTERNET PLUX vence Prémio "Biggest Innovation" em concurso internacional in http://www.cienciapt.net Data: 2010-8-16 Link: http://www.cienciapt.net/pt/in ... PLUX vence Prémio "Biggest Innovation" em

Instituto de Sistemas e Robotica

311

Internet-Enabled Distributed Engineering (Web) Services , J. Cheng1  

E-Print Network [OSTI]

1 Internet-Enabled Distributed Engineering (Web) Services J. Peng1 , D. Liu1 , J. Cheng1 , C.S. Han in Civil Engineering. The web services model is becoming a popular approach for integrating software service approach is a promising paradigm for integrating large engineering software applications. Keywords

Stanford University

312

Leveraging residential energy management through the Internet of Things  

E-Print Network [OSTI]

Leveraging residential energy management through the Internet of Things Markus Weiss Engineering into the residential environment contribute significantly to today's energy consumption. However, there exists a lack be achieved with adequate information at hand. Thus, conserving energy in residential spaces requires making

313

Internet, a Political Issue for Europe (1970s-2010s)  

E-Print Network [OSTI]

Internet, a Political Issue for Europe (1970s-2010s) Draft paper The final version of this paper will be published in Bishop J. & Solo A.M.G, Politics and Policy in the Information Age, Springer, in 2013. Romain in Europe? How did the "network of networks" and ICTs become political stakes for EU institutions

Paris-Sud XI, Université de

314

Performance analysis and network path characterization for scalable internet streaming  

E-Print Network [OSTI]

Delivering high-quality of video to end users over the best-effort Internet is a challenging task since quality of streaming video is highly subject to network conditions. A fundamental issue in this area is how real-time applications cope...

Kang, Seong-Ryong

2008-10-10T23:59:59.000Z

315

A Multilingual Usage Consultation Tool Based on Internet Searching  

E-Print Network [OSTI]

A Multilingual Usage Consultation Tool Based on Internet Searching -More than a search engine, less than QA- Kumiko Tanaka-Ishii Graduate School of Information Science and Technology University of Tokyo Technology Center University of Tokyo 7-3-1 Hongo, Bunkyo-ku Tokyo, Japan nakagawa

Nakagawa, Hiroshi

316

Securing Internet Coordinate Embedding Systems Mohamed Ali Kaafar  

E-Print Network [OSTI]

Securing Internet Coordinate Embedding Systems Mohamed Ali Kaafar INRIA Sophia Antipolis, FR mkaafar@sophia.inria.fr Laurent Mathy Lancaster University, UK laurent@comp.lancs.ac.uk Chadi Barakat INRIA Sophia Antipolis, FR barakat@sophia.inria.fr Kave Salamatian LIP6, FR and EPFL, CH kave

Turletti, Thierry

317

Virtual Networks under Attack: Disrupting Internet Coordinate Systems  

E-Print Network [OSTI]

Sophia Antipolis, FR mkaafar@sophia.inria.fr Laurent Mathy Lancaster University, UK and LAAS-CNRS, FR laurent@comp.lancs.ac.uk Thierry Turletti INRIA Sophia Antipolis, FR turletti@sophia.inria.fr Walid Dabbous INRIA Sophia Antipolis, FR dabbous@sophia.inria.fr ABSTRACT Internet coordinate-based systems

Turletti, Thierry

318

ENERGY MANAGEMENT REAL-TIME MULTI-TIER INTERNET SERVICES  

E-Print Network [OSTI]

ENERGY MANAGEMENT IN REAL-TIME MULTI-TIER INTERNET SERVICES A Dissertation Presented to the faculty This dissertation has been read and approved by the examining Committee: Kevin Skadron (Advisor) Sudhanva Gurumurthi and Applied Science: James H. Aylor (Dean) May 2008 #12;Abstract Energy management only recently emerged

Skadron, Kevin

319

Search Technology Internet Start-Ups Business Computing Companies  

E-Print Network [OSTI]

#12;Search Technology Internet Start-Ups Business Computing Companies Inside Technology Bits Blog engineer at Google, uses statistical analysis of data to help improve the company's search engine ¬Ľ Cellphones, Cameras, Computers and more Personal Tech ¬Ľ Advertise on NYTimes.com Search All NYTimes

Oyet, Alwell

320

Roadmap: Technical and Applied Studies Computer Technology Internet/Multimedia  

E-Print Network [OSTI]

Roadmap: Technical and Applied Studies ­ Computer Technology Internet/Multimedia ­ Bachelor Updated: 22-Aug-12/TET This roadmap is a recommended semester-by-semester plan of study for this major and minimum 39 upper-division credit hours #12;Roadmap: Technical and Applied Studies ­ Computer Technology

Sheridan, Scott

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Information Commons Help Desk Internet / Connectivity Wireless Access  

E-Print Network [OSTI]

Information Commons Help Desk Internet / Connectivity ¬Ľ Wireless Access ID #1912 Connecting in the Username and Password fields.5. Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help on this entry Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help

Boonstra, Rudy

322

Triple Play Support for the Next Generation Internet Mario Baldi  

E-Print Network [OSTI]

opportunity to information providers or, at least, be economically self-sustainable. In other words, Internet of accessing any type of information: it must be a profitable business or, at least, economically self- sustainable. In order to achieve this objective, services people are willing to pay for must be offered over

Baldi, Mario

323

ATLAS2000 Atlases of the Future in Internet M. Friedrich  

E-Print Network [OSTI]

ATLAS2000 ­ Atlases of the Future in Internet M. Friedrich (mafri@ipg.uni-freiburg.de) M. Melle the ecological system earth. Until recently the traditional atlas has been the pri- mary tool for collection and dissemination of geographical knowledge about the earth. To advance to concepts of the atlas it is necessary

Reiterer, Harald

324

Great Lakes Hydrometeorological Station Directory Database and Internet Web Development  

E-Print Network [OSTI]

Great Lakes Hydrometeorological Station Directory Database and Internet Web Development Primary Investigator: Thomas Croley - NOAA GLERL (Emeritus) This project was completed in 2001 Overview A new directory in hydrometeorological data availability with in the Great Lakes. The new directory will consist of an updated database

325

ANALYSIS OF INTERNET TOPOLOGY DATA Hao (Johnson) Chen  

E-Print Network [OSTI]

ANALYSIS OF INTERNET TOPOLOGY DATA by Hao (Johnson) Chen B.E. in Computer Science, Shen Zhen OF SCIENCE In the School of Computing Science © Hao (Johnson) Chen 2004 SIMON FRASER UNIVERSITY April 2004, without permission of the author. #12;Approval Name: Hao (Johnson) Chen Degree: Master of Science Title

Trajkovic, Ljiljana

326

Has the ice man arrived? Tact on the Internet  

E-Print Network [OSTI]

Has the ice man arrived? Tact on the Internet Jonathan Grudin, UC Irvine and Microsoft Research. Eugene O'Neill's play The Ice Man Cometh outlines a series of calamities that occur when his characters the graded corrections via e- mail. The students produced a counter- proposal: After grading an exercise

Hearst, Marti

327

World Wide Web Internet and Web Information Systems  

E-Print Network [OSTI]

1 23 World Wide Web Internet and Web Information Systems ISSN 1386-145X World Wide Web DOI 10's request, provided it is not made publicly available until 12 months after publication. #12;World Wide Web worlds. Its detection is a typical use case of the broad-based Wisdom Web of Things (W2T) methodology

Cao, Longbing

328

ARTIGO INTERNET IST estreia laboratrio de medicina regenerativa  

E-Print Network [OSTI]

ARTIGO INTERNET IST estreia laboratório de medicina regenerativa in http://www.boasnoticias.pt/ Data: 2011-9-20 Link: http://www.boasnoticias.pt/not ... IST estreia laboratório de medicina Células Estaminais e Medicina Regenerativa. O objetivo deste espaço vai centrar-se na investigação em

Instituto de Sistemas e Robotica

329

SECURE AUTHENTICATION FOR MOBILE COMMUNICATION OVER THE INTERNET1  

E-Print Network [OSTI]

, including mobile devices. In this paper, we propose to secure an infrastructure for telecommunication Internet Telecommunication services (MobInTel). We present this infrastructure in details and illustrate traditional mobile networks, such as GSM. The network infrastructure registration process should give

von Bochmann, Gregor

330

Turbo King: Framework for Large-Scale Internet Delay Measurements  

E-Print Network [OSTI]

servers (which is called cache pollution) and requires large traffic overhead when deployed in large consuming half the bandwidth needed by King and reducing the impact of cache pollution by several orders building an all-to-all delay matrix between approximately 220, 000 BGP prefixes advertised in the Internet

Loguinov, Dmitri

331

TungsTen--2004 79. Referencesthatincludeasectionmark()arefoundintheInternet  

E-Print Network [OSTI]

TungsTen--2004 79. Referencesthatincludeasectionmark(ß)arefoundintheInternet ReferencesCitedsection. TungsTen ByKimB.shedd Domestic survey data and tables were prepared by Amy C. Tolcin, statistical assistant, and the world production table was prepared by Glenn J. Wallace, international data coordinator

332

TEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE  

E-Print Network [OSTI]

://www.ncemch.org/pubs/PDFs/breastfeedingTIB.pdf Internet monograph (standard citation to a part) Inhalent abuse [Internet]. Bethesda (MD): National Institute on Drug Abuse (US); 1994 [revised 2000 Jul; cited 2001 Mar 1]. How can inhalent abuse Care [Internet]. 1997 Apr [cited 1997 Nov 4];2(3):[about 10 p.]. Available from: http

333

Is the Internet for Porn? An Insight Into the Online Adult Industry  

E-Print Network [OSTI]

Is the Internet for Porn? An Insight Into the Online Adult Industry Gilbert Wondracek1 , Thorsten Introduction "The Internet is for Porn" is the title of a satirical song that has been viewed several million at work. With a total worth of more than 97 billion USD in 2006 [14], the Internet porn industry yields

Kruegel, Christopher

334

Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols  

E-Print Network [OSTI]

................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

Duan, Pu

2012-07-16T23:59:59.000Z

335

Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code  

E-Print Network [OSTI]

protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

No, Jong-Seon

336

Efficient Application Integration in IP-Based Sensor Networks Dogan Yazar, Adam Dunkels  

E-Print Network [OSTI]

fields of energy management for homes, offices, and the smart grid. Many existing sensor network deploy evaluation of our system and show that Web services are a viable mechanism for use in low-power sensor Protocols]: Applications General Terms Design, Experimentation, Measurement, Performance Keywords Sensor

337

2014 Building America House Simulation Protocols  

SciTech Connect (OSTI)

As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

2014-03-01T23:59:59.000Z

338

SN 2009ip: Constraining the latest explosion properties by its late-phase light curve  

E-Print Network [OSTI]

We constrain the explosion and circumstellar properties at the 2012b event of SN 2009ip based on its late-phase bolometric light curve recently reported. The explosion energy and ejected mass at the 2012b event are estimated as 0.02 Msun and 2e49 erg, respectively. The circumstellar medium is assumed to have two components: an inner shell and an outer wind. The inner shell which is likely created at the 2012a event has 0.2 Msun. The outer wind is created by the wind mass loss before the 2012a mass ejection, and the progenitor is estimated to have had the mass-loss rate about 0.1 Msun/yr with the wind velocity 550 km/s before the 2012a event. The estimated explosion energy and ejected mass indicate that the 2012b event is not caused by a regular supernova.

Moriya, Takashi J

2015-01-01T23:59:59.000Z

339

Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP). Technology summary  

SciTech Connect (OSTI)

The Characterization, Monitoring, and Sensor Technology Integrated Program seeks to deliver needed technologies, timely and cost-effectively, to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The scope of characterizations monitoring, and sensor technology needs that are required by those organizations encompass: (1) initial location and characterization of wastes and waste environments - prior to treatment; (2) monitoring of waste retrieval, remediation and treatment processes; (3) characterization of the co-position of final waste treatment forms to evaluate the performance of waste treatments processes; and (4) site closure and compliance monitoring. Wherever possible, the CMST-IP fosters technology transfer and commercialization of technologies that it sponsors.

Not Available

1994-04-01T23:59:59.000Z

340

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Fibred Coalgebraic Logic and Quantum Protocols  

E-Print Network [OSTI]

Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

Daniel Marsden

2014-12-30T23:59:59.000Z

342

Chapter 18: Variable Frequency Drive Evaluation Protocol  

SciTech Connect (OSTI)

An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

Romberger, J.

2014-11-01T23:59:59.000Z

343

Separable states improve protocols with restricted randomness  

E-Print Network [OSTI]

It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterise the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models and separable, i.e. disentangled, states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that in particular, separable states may improve the so-called random access codes, which is a class of communication problems where one party tries to read a portion of the data held by another distant party in presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

T. K. Chuan; T. Paterek

2014-10-07T23:59:59.000Z

344

Device-independent entanglement-based Bennett 1992 protocol  

E-Print Network [OSTI]

In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

2012-10-05T23:59:59.000Z

345

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network [OSTI]

Services Administration. 10 IEA is the International Energy Agency. ESL-IC-08-10-11 Proceedings of the Eighth International Conference for Enhanced Building Operations, Berlin, Germany, October 20-22, 2008 2 The resultant protocols are intended to provide... Building Operations, Berlin, Germany, October 20-22, 2008 3 Chapter 1: Energy (Authors: MacDonald, Haberl). In Chapter 1 the protocols for measuring the building?s energy useare presented. These protocols begin with acollection of facility information...

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

346

Comparison of Energy Efficiency in PSTN and VoIP Florin Bota, Faheem Khuhawar, Marco Mellia, Michela Meo  

E-Print Network [OSTI]

Comparison of Energy Efficiency in PSTN and VoIP Systems Florin Bota, Faheem Khuhawar, Marco Mellia.lastname@polito.it ABSTRACT The importance of deploying energy efficient networks has vastly increased due to the rapidly to existing networks that could prove to be energy efficient. In this paper, two telephone net- works namely

347

INTEGRATED MOBILE IP AND SIP APPROACH FOR ADVANCED LOCATION MANAGEMENT Q Wang and M A Abu-Rgheff  

E-Print Network [OSTI]

INTEGRATED MOBILE IP AND SIP APPROACH FOR ADVANCED LOCATION MANAGEMENT Q Wang and M A Abu-Rgheff University of Plymouth, UK ABSTRACT The vision of ubiquitous and continuous communications for a mobile user entails several emerging mobility types, which pose new requirements for location management

Abu-Rgheff, Mosa Ali

348

J Physiol 556.2 (2004) pp 447461 447 Spatiotemporal patterning of IP3-mediated Ca2+ signals in  

E-Print Network [OSTI]

J Physiol 556.2 (2004) pp 447­461 447 Spatiotemporal patterning of IP3-mediated Ca2+ signals in Xenopus oocytes by Ca2+-binding proteins Sheila L. Dargan1 , Beat Schwaller2 and Ian Parker1 1 Department of Neurobiology and Behaviour, University of California Irvine, CA 92697-4550, USA 2 Division of Histology

Parker, Ian

349

Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira Aman Shaikh Tim Griffin Jennifer Rexford  

E-Print Network [OSTI]

Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira Aman Shaikh Tim Griffin Jennifer, based on the intrado- main path cost. Under such hot-potato routing, an intradomain event can trigger BGP routing changes. To characterize the influ- ence of hot-potato routing, we conduct controlled

Zhou, Yuanyuan

350

Impact of Hot-Potato Routing Changes in IP Networks Renata Teixeira Aman Shaikh Tim Griffin Jennifer Rexford  

E-Print Network [OSTI]

Impact of Hot-Potato Routing Changes in IP Networks Renata Teixeira Aman Shaikh Tim Griffin, a router selects the one with the closest egress point, based on the intradomain path cost. Under such hot-potato routing, an intradomain event can trigger BGP routing changes. To characterize the influence of hot-potato

Singh, Jaswinder Pal

351

Analysis of the Impact of SR-ARQ on the IP Packet Delay Performance in Mobile Data  

E-Print Network [OSTI]

Analysis of the Impact of SR-ARQ on the IP Packet Delay Performance in Mobile Data Networks By in wired enviroment . . . . . . . . . . . . . . . . . . . . 43 3.2.2 TCP in the wireless environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3.3.1 Scheduling algorithms for wired (error free) enviroment . . 50 3.3.2 Scheduling algorithms

Murphy, John

352

DOE Transportation Protocols Topic Group Summary of Second Conference  

Broader source: Energy.gov (indexed) [DOE]

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

353

DOE Transportation Protocols Topic Group Conference Call Summary...  

Broader source: Energy.gov (indexed) [DOE]

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

354

Decentralized Decision-making and Protocol Design for Recycled ...  

E-Print Network [OSTI]

Decentralized Decision-making and Protocol. Design for Recycled Material Flows. Reverse logistics networks often consist of several tiers with independent

ihong

2006-07-24T23:59:59.000Z

355

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of...

356

A search for quantum coin-flipping protocols using optimization ...  

E-Print Network [OSTI]

Mar 3, 2014 ... We conduct two kinds of search: one for protocols. ?Department of ..... This operation maps a probability vector to a quantum state, see Sub-.

2014-03-02T23:59:59.000Z

357

Formal Modelling and Analysis of the NORM Multicast Protocol  

E-Print Network [OSTI]

Formal Modelling and Analysis of the NORM Multicast Protocol Using Real-Time Maude Elisabeth Lien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 iii #12;2.3.2 Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

√?lveczky, Peter Csaba

358

aureus decolonisation protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

359

addfam study protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

360

antineoplastic combined chemotherapy protocols: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

afinos study protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

362

agrobacterium-mediated transformation protocol: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

363

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

364

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

365

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...  

Open Energy Info (EERE)

Purchased Electricity Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity AgencyCompany...

366

BPA Response to Comments on Oversupply Management Protocol  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

367

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Broader source: Energy.gov (indexed) [DOE]

Accelerated Ash-Loading Protocol for Diesel Particulate Filters Bruce G. Bunting and Todd J. Toops Oak Ridge National Laboratory Adam Youngquist and Ke Nguyen University of...

368

NEMVP: North American energy measurement and verification protocol  

SciTech Connect (OSTI)

This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

NONE

1996-03-01T23:59:59.000Z

369

Architectures and protocols for mobile computing applications: a reconfigurable approach  

E-Print Network [OSTI]

demanding TCP/IP services (mobile computing). Users can move amongst different wireless net- works (named). RAMON aims at supporting (i) session continuity when moving in different REs; (ii) user address port integrity by using adaptive FEC/ARQ techniques; (vi) energy optimization, for energy saving at the mobile

Tinnirello, Ilenia

370

STANDARD LAN -1 Fiber Channel  

E-Print Network [OSTI]

STANDARD LAN - 1 Fiber Channel Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ #12;STANDARD LAN - 2 Fibre Channel · Born to interconnect mainframes and servers to storage systems: fibERs, but not only... · Interoperability with SCSI, Internet Protocol (IP), ... · Standard ANSI X3

Mellia, Marco

371

Should mobile Internet services be an extension of the fixed Internet? Context-of-use, fixed-mobile reinforcement and personal innovativeness  

E-Print Network [OSTI]

reinforcement and personal innovativeness Mark de Reuver Faculty Technology, Policy and Management Delft Innovation & Interaction Utrecht, The Netherlands Harry Bouwman Faculty Technology, Policy and ManagementShould mobile Internet services be an extension of the fixed Internet? Context-of-use, fixed-mobile

Twente, Universiteit

372

A Comparison of Education, Business, and Engineering Undergraduate Studentsí Internet Use and their Experience, Confidence, and Competence in Using New Literacies of the Internet  

E-Print Network [OSTI]

, and engineering majors .............................................................................. 24 3.2 Number and percent of education students? majors ................................... 25 3.3 Number and percent of business students? majors... ............................................................. 33 4.1 Number and percent of underclassmen?s high school-related Internet use: Overall frequency of Internet use .............................................................. 35 4.2 Number and percent of underclassmen...

Kim, Su Yeon

2011-08-08T23:59:59.000Z

373

T.T.T.Nguyen, G.Armitage, A Survey of Techniques for Internet Traffic Classification using Machine Learning A Survey of Techniques for Internet Traffic  

E-Print Network [OSTI]

of their various business goals. Traffic classification may be a core part of automated intrusion detection systemsT.T.T.Nguyen, G.Armitage, A Survey of Techniques for Internet Traffic Classification using Machine Learning A Survey of Techniques for Internet Traffic Classification using Machine Learning Thuy T.T. Nguyen

Armitage, Grenville

374

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self-Organization  

E-Print Network [OSTI]

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self of the HELLO protocol. This makes this HELLO protocol very important for wireless networks especially for self- organizing the network. Most of layer-3 protocols assume an ideal MAC layer. In such a case, HELLO protocol

Paris-Sud XI, Université de

375

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network [OSTI]

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

376

Field and Lab Methods & Protocols University of Michigan  

E-Print Network [OSTI]

SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

Kling, George W.

377

Adaptive Data Collection Protocol using Reinforcement Learning for VANETs  

E-Print Network [OSTI]

Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

Boyer, Edmond

378

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

379

Practical quantum oblivious transfer and bit commitment protocols  

E-Print Network [OSTI]

We propose a practical quantum oblivious transfer and a bit commitment protocols which replace the single-photon source with weak coherent pulses and allow error and loss in channel and detectors. These protocols can be realized with available optoelectronic apparatus.

Ya-Qi Song; Li Yang

2015-02-09T23:59:59.000Z

380

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network [OSTI]

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

382

A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

≠hop wireless ad≠hoc networks, designing energy≠efficient rout≠ ing protocols is critical since nodes are power be mobile, demanding the energy≠efficient routing protocol to be fully distributed and adaptive≠ spect to end≠to≠end energy≠efficient routes. Finally, preliminary simulation results are presented

Nahrstedt, Klara

383

Uniform Leader Election Protocols for Radio Networks Koji Nakano  

E-Print Network [OSTI]

Uniform Leader Election Protocols for Radio Networks #3; Koji Nakano School of Information Science be distinguished by serial or manufacturing number. The leader election problem asks to designate one of the station as leader. A leader election protocol is said to be uniform if in each time slot every station

Nakano, Koji

384

Hello Again: Stabilization of the Hello Protocol in OSPF  

E-Print Network [OSTI]

Hello Again: Stabilization of the Hello Protocol in OSPF Jorge A. Cobb Mohamed G. Gouda Deepinder Sidhu § Abstract The Hello protocol in OSPF allows each router in a network to check whether it can periodi- cally send hello messages to every neighboring router in the network. Associated with the Hello

Cobb, Jorge Arturo

385

Multi-Gas Assessment of the Kyoto Protocol John Reilly,*  

E-Print Network [OSTI]

Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

386

Modelling unbounded parallel sessions of security protocols in CSP  

E-Print Network [OSTI]

Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

Roscoe, Bill

387

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

388

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

389

Improved protocols of secure quantum communication using W states  

E-Print Network [OSTI]

Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

Chitra Shukla; Anindita Banerjee; Anirban Pathak

2012-04-20T23:59:59.000Z

390

ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13-57 Patrick Center for Environmental Research 117  

E-Print Network [OSTI]

of associated pressure gauges, and monitor the volume of gas left in the tank. Replace cylinders as needed. Any hoods. 3.1.4. Gas suspension tables. 3.1.5. Slide warmers/hot plates. 3.2. Chemistry Laboratory. 3 recommended. Periodically clean oil #12;ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13

Charles, Donald

391

E-Print Network 3.0 - anamneses-based internet information Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with DISCERN instrument Author: Nada... of internet sites for patients who search for help when they have problems connected to mental ... Source: Vehkalahti, Kimmo -...

392

Customer behaviour towards internet banking: a study of the dormant users of Saudi Arabia .  

E-Print Network [OSTI]

??Technology acceptance, especially internet banking acceptance has become a vital issue in the business world today. A number of studies agree on the importance ofÖ (more)

AlMohaimmeed, Bader M

2012-01-01T23:59:59.000Z

393

The use of the internet among EFL teachers at the Colleges of Technology in Saudi Arabia.  

E-Print Network [OSTI]

??Because of its far reaching impact on many aspects and functions of educational institutions and its potential benefits for educators, the Internet has been theÖ (more)

Al-Asmari, Ali M.

2005-01-01T23:59:59.000Z

394

1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2002  

E-Print Network [OSTI]

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

Kocur, George

395

1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2004  

E-Print Network [OSTI]

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

Kocur, George

396

APPLICATION OF INTERNET GIS TOOLS FOR HERITAGE MANAGEMENT: ARKAS CASE STUDY  

E-Print Network [OSTI]

open society. It has to constantly renew and modernize its informational infrastructure : Romania (2006)" #12;Application of internet GIS tools for heritage management: ARKAS case study 1

397

The Quiescent Accretion Disk in IP Peg at Near-Infrared Wavelengths  

E-Print Network [OSTI]

We present near-infrared, H-band (1.45-1.85 microns) observations of the eclipsing dwarf nova, IP Peg, in quiescence. The light curves are composed of ellipsoidal variations from the late-type secondary star and emission from the accretion disk and the bright spot. The light curves have two eclipses: a primary eclipse of the accretion disk and the bright spot by the companion star, and a secondary eclipse of the companion star by the disk. The ellipsoidal variations of the secondary star were modeled and subtracted from the data. The resulting light curve shows a pronounced double-hump variation. The double-hump profile resembles those seen in the light curves of WZ Sge and AL Com and likely originates in the accretion disk. The primary eclipse was modeled using maximum entropy disk mapping techniques. The accretion disk has a flat intensity distribution and a cool brightness temperature (Tbr=3000 K) in the near-infrared. Superimposed on the face of the disk is the bright spot (Tbr=10,000 K); the position of the bright spot is different from the observed range of visible bright spot positions. The near-infrared accretion disk flux is dominated by optically thin emission. The secondary eclipse indicates the presence of some occulting medium in the disk, but the eclipse depth is too shallow to be caused by a fully opaque accretion disk.

C. S. Froning; E. L. Robinson; William F. Welsh; Janet H. Wood

1999-07-07T23:59:59.000Z

398

Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level  

E-Print Network [OSTI]

Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

Kohm, Katherine E.

2009-01-01T23:59:59.000Z

399

The Economy of Internet-Based Hospitality Exchange  

E-Print Network [OSTI]

In this paper, we analyze and compare general development and individual behavior on two non-profit internet-based hospitality exchange services -- bewelcome.org and warmshowers.org. We measure the effort needed to achieve a real-life interaction, whereby the advantages of mutual altruism arise. The effort needed is the communication quantified in units of time. Since the amount of effort is not obvious to individual users, the development of the effort investing strategy is investigated. The impact of individual behavior on general development is discussed.

Tagiew, Rustam

2015-01-01T23:59:59.000Z

400

The Internet of Things Helping Utilities | OpenEI Community  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectric Coop, Inc Place:InnovationFunds-Business GuideRoundtableThe Internet of

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Operational Experiences Tuning the ATF2 Final Focus Optics Towards Obtaining a 37nm Electron Beam IP Spot Size  

SciTech Connect (OSTI)

The primary aim of the ATF2 research accelerator is to test a scaled version of the final focus optics planned for use in next-generation linear lepton colliders. ATF2 consists of a 1.3 GeV linac, damping ring providing low-emittance electron beams (< 12pm in the vertical plane), extraction line and final focus optics. The design details of the final focus optics and implementation at ATF2 are presented elsewhere. The ATF2 accelerator is currently being commissioned, with a staged approach to achieving the design IP spot size. It is expected that as we implement more demanding optics and reduce the vertical beta function at the IP, the tuning becomes more difficult and takes longer. We present here a description of the implementation of the tuning procedures and describe operational experiences and performances.

White, Glen; /SLAC; Seryi, Andrei; /SLAC; Woodley, Mark; /SLAC; Bai, Sha; /Beijing, Inst. High Energy Phys.; Bambade, Philip; /Orsay, LAL; Renier, Yves; /Orsay, LAL; Bolzon, Benoit; /Annecy, LAPP; Kamiya, Yoshio; /Tokyo U., ICEPP; Komamiya, Sachio; /Tokyo U.; Oroku, Masahiro; /Tokyo U.; Yamaguchi, Yohei; /Tokyo U.; Yamanaka, Takashi; /Tokyo U.; Kubo, Kiyoshi; /KEK, Tsukuba; Kuroda, Shigeru; /KEK, Tsukuba; Okugi, Toshiyuki; /KEK, Tsukuba; Tauchi, Toshiaki; /KEK, Tsukuba; Marin, Eduardo; /CERN

2012-07-06T23:59:59.000Z

402

RADCAL Operations Manual Radiation Calibration Laboratory Protocol  

SciTech Connect (OSTI)

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

Bogard, J.S.

1998-12-01T23:59:59.000Z

403

E-Print Network 3.0 - aided routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: aided routing protocol Page: << < 1 2 3 4 5 > >> 1 Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation Summary: network. LAR: Location Aided...

404

E-Print Network 3.0 - applicable protocol fails Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

identical protocol is used for different purposes ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 2 Protocol Interactions and...

405

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

406

Parallel decomposition of the logical link control protocol  

E-Print Network [OSTI]

INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

Bajpai, Dhruv Haribanshnath

1991-01-01T23:59:59.000Z

407

Protocol for secure quantum machine learning at a distant place  

E-Print Network [OSTI]

The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

2015-04-20T23:59:59.000Z

408

An internet tool for designing energy efficient homes  

SciTech Connect (OSTI)

To help their 4.5 million residential customers make energy efficient decisions, Southern California Gas asked UCLA to develop an Internet-based simulation tool called Project REED (Residential Energy Efficient Design). The critical problem is to give these ratepayers an easy way to visualize the relative effectiveness of their various options. REED is a internet-based tool that calculates the annual gas and electricity cost for each separate building design or operating decision. Hourly climate data for the Typical Meteorological Year (TMY2) in all the climate zones in the SoCalGas service area are built in, as well as utility rates for each type of residential service. REED's Expert System first designs a basic Code Compliant home, then designs a more Energy Efficient design based on local climate, and it shows how much money ratepayers would save. The simulation engine inside REED is SOLAR-5, one of the nation's most widely used whole building energy design tools. SOLAR-5 has been validated against DOE-2 using the BESTEST procedure. This paper, one of a pair describing REED, explains the project from the user's point of view and describes what was learned from the Ratepayer Usability Test. The second paper explains the project from the simulation and software engineering point of view.

Milne, M.; Gomez, C.; Leeper, D.; Zurick, J.; Nindra, A.; Shen, J.; Kobayashi, Y.

1999-07-01T23:59:59.000Z

409

15 17 June 2011, T-Labs Berlin Germany Innovative Internet  

E-Print Network [OSTI]

15 ­ 17 June 2011, T-Labs Berlin Germany Innovative Internet Community Systems Welcome to the 11th Berlin/Germany, 15 ­ 17 June 2011 OrgTeam Deutsche Telekom Laboratories & Technische Universität Berlin #12;15 ­ 17 June 2011, T-Labs Berlin Germany Innovative Internet Community Systems Opening Session I2

Rossak, Wilhelm R.

410

On the Global Content PMI: Improved Copy-Protected Internet Content Distribution  

E-Print Network [OSTI]

On the Global Content PMI: Improved Copy-Protected Internet Content Distribution Tadayoshi Kohno distribution, copy-protection, PMI, risk manage- ment. 1 Introduction The Internet is changing the way Conference, 2001. #12;2 Tadayoshi Kohno and Mark McGovern the Privilege Management Infrastructure (PMI

Matsuoka, Yoky

411

The holonic enterprise: a model for Internet-enabled global manufacturing supply chain and workflow  

E-Print Network [OSTI]

The holonic enterprise: a model for Internet-enabled global manufacturing supply chain and workflow, which supports organizational information that, in turn, can mirror social organization. The Holonic with an overview of the three main concepts used to develop our HE model: holonic systems, MAS, and the Internet

Ulieru, Mihaela

412

A Virtual Learning Environment for Doing Business on the Internet Roumen Nikolov & Krassen Stefanov,  

E-Print Network [OSTI]

environment demonstrates the potential of Internet to stimulate the co-operative work of people who have never1 A Virtual Learning Environment for Doing Business on the Internet Roumen Nikolov & Krassen, collaborative work, business, or other joint activities. These communities cross the national and cultural

Paris-Sud XI, Université de

413

Hop-by-hop Computing for Green Internet Routing (Technical report, under revision)  

E-Print Network [OSTI]

Hop-by-hop Computing for Green Internet Routing (Technical report, under revision) Yuan Yang@cernet.edu.cn Abstract--Energy conservation is a global concern nowadays and it is widely expected that energy cost will continuously increase in the near future. The design of the Internet, un- fortunately, has not taken energy

Wang, Dan

414

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

415

Solving Some Modeling Challenges when Testing Rich Internet Applications for Security  

E-Print Network [OSTI]

Solving Some Modeling Challenges when Testing Rich Internet Applications for Security Suryakant, Canada {vioonut, pionescu}@ca.ibm.com Abstract--Crawling is a necessary step for testing web applications applications, so-called Rich Internet Applications (RIAs). RIAs present new security and crawling challenges

Jourdan, Guy-Vincent

416

MesoNet: A Mesoscopic Simulation Model of a Router-Level Internet-like Network  

E-Print Network [OSTI]

MesoNet: A Mesoscopic Simulation Model of a Router-Level Internet- like Network MesoNet is a mesoscopic (medium scale) simulation model of a router-level Internet-like network. The model, written in SLX transfer and associated multiplier on file size. During simulation, model state is captured at each user

417

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect (OSTI)

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

418

Proposals for Non-PGM Catalyst Target and Test Protocols  

Broader source: Energy.gov (indexed) [DOE]

Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

419

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard  

E-Print Network [OSTI]

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard Department of Computer Science (AA- MAS 2013), Ito, Jonker, Gini, and Shehory (eds.), May, 6­10, 2013, Saint Paul, Minnesota, USA

420

A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.  

E-Print Network [OSTI]

A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

Van Dyke, Aaron R. (Aaron Robert)

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Cost of Kyoto Protocol Targets: The Case of Japan  

E-Print Network [OSTI]

This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

Paltsev, Sergey.

422

On the Energy Efficiency of IP-over-WDM Francesca Vismara, Vida Grkovic, Francesco Musumeci, Massimo Tornatore, Stefano Bregni  

E-Print Network [OSTI]

the power consumption point of view. Nowadays, the 7-8% of the world energy consumption is absorbed, reducing the energy consumption of telecom networks is expected to become an increasingly-important challenge, being unacceptable that the Internet energy consumption grows proportionally to the served

Bregni, Stefano

423

Design and simulation of Header Processor for Xpress Transfer Protocol  

E-Print Network [OSTI]

cannot meet the demands of future applications. Contemporary protocols provide traditional error-control and flow- control functions but do not provide fast and implicit connection setup, rapid re- quest/response and reliable multicast operations... OF SCIENCE August 1993 Major Subject: Electrical Engineering DESIGN AND SIMULATION OF HEADER PROCESSOR FOR XPRESS TRANSFER PROTOCOL A Thesis by GIRISH R. CHANDANGOUDAR Approved ss to style and content by: Hosame Abu-Amara (Chair of Committee) Bar G...

Chandangoudar, Girish R.

1993-01-01T23:59:59.000Z

424

Last updated: July 31, 2013 Page 1 of 3 CUNY HRPP Guidance: Internet or Mobile Technology Based Human Subject Research  

E-Print Network [OSTI]

or Mobile Technology Based Human Subject Research 1. Purpose The purpose responsibilities and considerations related to Internet or mobile technology based human of the Internet or mobile technology as a tool for subject recruitment; as a tool

Rosen, Jay

425

The Innovation Journal: The Public Sector Innovation Journal, 18(1), 2013, article 3. Protecting the Internet from Dictators  

E-Print Network [OSTI]

Internet communications, activists, and the state in Egypt, Syria, Libya, Uganda and northern Sudan and China.iv Yet, the scope of efforts by Egypt, Libya and Syria to shut down the Internet and cellular

Camp, L. Jean

426

In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389-405 In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389-405  

E-Print Network [OSTI]

In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389-405 #12;In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389-405 #12;In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389

Tygar, Doug

427

Comparison of two wireless ad hoc routing protocols on a hardware test-bed  

E-Print Network [OSTI]

. These protocols are tested predominately using software simulation. Very few implementations have demonstratedComparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation

Brown, Timothy X.

428

An Efficient Query Tree Protocol for RFID Tag Anti-Collision  

E-Print Network [OSTI]

An Efficient Query Tree Protocol for RFID Tag Anti-Collision Ming-Kuei Yeh National Taipei Query Tree (EQT) protocol to improve both the Query Tree (QT) protocol and the Collision Tree (CT and the energy consumption is lessened. In the EQT protocol, the timeslots structure, the query and responses

Jiang, Jehn-Ruey

429

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

Schneier, Bruce

430

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

Schneier, Bruce

431

Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches  

E-Print Network [OSTI]

Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

Anirban Pathak

2014-11-24T23:59:59.000Z

432

New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless  

E-Print Network [OSTI]

New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

Jain, Raj

433

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

renewable energy. Instead, the Kyoto Protocol CDM process encourages carbon reduction in developing countries,

Ferrey, Steven

2010-01-01T23:59:59.000Z

434

A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features  

E-Print Network [OSTI]

Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

2014-09-06T23:59:59.000Z

435

Everything you might want to know about the Internet but are afraid to ask!. A new users resource  

SciTech Connect (OSTI)

This document is a guide to accessing the Internet and the services available on Internet. The document contains a short explanation of the Internet by E. Kroll and E. Hoffman, brief descriptions of the primary access tools, a glossary, answers to frequently asked questions about the Internet, J. Martin`s `Search for Internet Treasure` and other helpful information. The data access tools discussed in this document include Gopher, World Wide Web, WAIS, ASTRA, ARCHIE, WHOIS, NETSERV, and TRICKLE. The file transfer tool discussed is BITFTP. The two communication services discussed are NETNEWS and LISTSERV.

Thiel, E.

1993-09-01T23:59:59.000Z

436

Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols  

SciTech Connect (OSTI)

Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

2013-05-01T23:59:59.000Z

437

The Dynamics of Internet Traffic: Self-Similarity, Self-Organization, and Complex Phenomena  

E-Print Network [OSTI]

The Internet is the most complex system ever created in human history. Therefore, its dynamics and traffic unsurprisingly take on a rich variety of complex dynamics, self-organization, and other phenomena that have been researched for years. This paper is a review of the complex dynamics of Internet traffic. Departing from normal treatises, we will take a view from both the network engineering and physics perspectives showing the strengths and weaknesses as well as insights of both. In addition, many less covered phenomena such as traffic oscillations, large-scale effects of worm traffic, and comparisons of the Internet and biological models will be covered.

Reginald D. Smith

2010-09-05T23:59:59.000Z

438

Exploration of the comics medium developed for use on the internet  

E-Print Network [OSTI]

of a given site or made available to be downloaded. Finally, in what is possibly the greatest separation from the two-dimensionality of the printed medium, the advancement of V R M L (virtual reality markup language) on the internet allows for a... as the speed of the internet connection, could have a dramatically different experience within a common web site. It is evident that the internet, much like traditional printed work, has its own limita tions. Ultimately, however, it also has ever...

Piana, Brian James

2012-06-07T23:59:59.000Z

439

Protocol development for evaluation of commercial catalytic cracking catalysts  

SciTech Connect (OSTI)

A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

1988-09-01T23:59:59.000Z

440

Routing Protocols for Cognitive Radio Networks: A Survey  

E-Print Network [OSTI]

with the cognitive radio (CR) technology, a wireless system can exploit opportunistically the radio spectrum licensed to other systems. Thus, CR is regarded as a solution to the problems resulting from the limited available spectrum and the inefficiency in the spectrum usage. The multi-hop CR networks need some novel routing algorithms taking the open spectrum phenomenon into account. The main approach in designing the routing algorithm for the CR networks is the joint design of routing and spectrum management. Works on such issues have just started and are still in a rudimentary stage. In this paper, we survey comprehensively the existing research on the routing protocols for CR networks, especially with reference to CR ad hoc networks. We classify the routing protocols, discuss the essential features of the different protocols, and provide the future research directions.

Kamruzzaman, S M

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Shear Transformation Zones: State Determined or Protocol Dependent?  

E-Print Network [OSTI]

The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

2014-08-18T23:59:59.000Z

442

A Fast Delivery Protocol for Total Order Broadcasting  

SciTech Connect (OSTI)

The conclusions of this report are: (1) Fast delivery protocol reduces the latency of message ordering for idle systems and keep comparable performances with communication history algorithms for busy systems; (2) The protocol optimizes the total ordering process by waiting for messages only from a subset of the machines in the group; and (3) The fast acknowledgment aggressively acknowledges total order messages to reduce the latency for idle system, and it is smart enough to hold the acknowledgments when the network communication is heavy.

Ou, Li [Tennessee Technological University; He, X. [Tennessee Technological University; Engelmann, Christian [ORNL; Scott, Stephen L [ORNL

2007-01-01T23:59:59.000Z

443

A Hybrid Long-Distance Entanglement Distribution Protocol  

E-Print Network [OSTI]

We propose a hybrid (continuous-discrete variable) quantum repeater protocol for distribution of entanglement over long distances. Starting from entangled states created by means of single-photon detection, we show how entangled coherent state superpositions, also known as `Schr\\"odinger cat states', can be generated by means of homodyne detection of light. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements.

Jonatan B. Brask; Ioannes Rigas; Eugene S. Polzik; Ulrik L. Andersen; Anders S. Sorensen

2010-04-01T23:59:59.000Z

444

System for remote multichannel real-time monitoring of mouse ECG via the Internet  

E-Print Network [OSTI]

A hardware/software system was developed to allow real-time monitoring of multiple physiological signals simultaneously via the Internet. The hardware is specifically designed for measuring ECG signals from mice, while the ...

Oefinger, Matthew Blake, 1976-

2003-01-01T23:59:59.000Z

445

Architecture of participation : the realization of the Semantic Web, and Internet OS  

E-Print Network [OSTI]

The Internet and World Wide Web (WWW) is becoming an integral part of our daily life and touching every part of the society around the world including both well-developed and developing countries. The simple technology and ...

Lau, Shelley

2008-01-01T23:59:59.000Z

446

On the semantics of Internet topologies Milena Mihail, Christos Gkantsidis, Amin Saberi, Ellen Zegura  

E-Print Network [OSTI]

1 On the semantics of Internet topologies Milena Mihail, Christos Gkantsidis, Amin Saberi, Ellen Zegura fmihail, gantsich, saberi, ewzg@cc.gatech.edu College of Computing Georgia Institute of Technology

Saberi, Amin

447

A Network Economic Model of a Service-Oriented Internet with Choices and Quality Competition  

E-Print Network [OSTI]

of Electrical and Computer Engineering and Sara Saberi PhD candidate Department of Operations & Information., and Saberi, S. (2013). A Network Economic Game Theory Model of a Service-Oriented Internet with Choices

Nagurney, Anna

448

How Sales Taxes Affect Customer and Firm Behavior: The Role of Search on the Internet  

E-Print Network [OSTI]

When a multichannel retailer opens its first retail store in a state, the firm is obligated to collect sales taxes on all Internet and catalog orders shipped to that state. This article assesses how opening a store affects ...

Anderson, Eric T.

449

.art : situating Internet art in the traditional institution for contemporary art  

E-Print Network [OSTI]

This thesis provides a critical analysis of the relation between Internet art and the traditional institution for contemporary art in the North American and West-European regions. Thirteen years after its inception as an ...

Verschooren, Karen A. (Karen Annemie)

2007-01-01T23:59:59.000Z

450

Infertility Help Seeking and Social Support: Do Conventional Theories Explain Internet Behaviors and Outcomes.  

E-Print Network [OSTI]

??This dissertation uses data from the National Survey of Fertility Barriers (NSFB), a nationally representative sample, to assess factors associated with face-to-face and internet helpÖ (more)

Slauson-Blevins, Kathleen S.

2011-01-01T23:59:59.000Z

451

Incentive schemes for Internet congestion management: Raffles versus time-of-day pricing  

E-Print Network [OSTI]

The Internet is plagued with congestion problems of growing severity which are worst at peak periods. In this paper, we compare two schemes that incentivize users to shift part of their usage from the peak-time to the ...

Loiseau, Patrick

452

An Internet survey of private pond owners and managers in Texas  

E-Print Network [OSTI]

pond owners got the information they used to deal with pond management problems. A secondary emphasis of the project was to examine the potential presented by the Internet for use in this type of information gathering and distribution for Texas...

Schonrock, April Elizabeth

2005-11-01T23:59:59.000Z

453

Internet Technology and Social Support: Are They Beneficial for Overweight Older Adolescents?  

E-Print Network [OSTI]

, the Model of Influence of Social Support on Health Behavior (MISSHRB), in a group of older adolescents; 2) To determine the feasibility and clinical utility of an internet intervention for social support for overweight older adolescents, and 3) To examine...

Olson, Wendy Ann

2011-10-21T23:59:59.000Z

454

Access and Display of LoanSTAR Data via the Internet  

E-Print Network [OSTI]

The Energy and Environmental Data System (EEDS) is a web application that facilitates web-based viewing of the Energy Systems Lab's extensive building energy databases. EEDS is the initial framework for a growing set of internet energy analysis...

Sweeney, J., Jr.; Lockhart, D.; Haberl, J. S.

2001-01-01T23:59:59.000Z

455

ENERGY NEEDS IN AN INTERNET ECONOMY: A CLOSER LOOK AT DATA CENTERS  

E-Print Network [OSTI]

of the personal computer, the expansion of the nation's fiber optic network, and the spread of the World Wide Web in their neighborhood. Despite the decentralized nature of this web, the communication system involved with Internet

456

The strategic implications of the current Internet design for cyber security  

E-Print Network [OSTI]

In the last two decades, the Internet system has evolved from a collection point of a few networks to a worldwide interconnection of millions of networks and users who connect to transact virtually all kinds of business. ...

Iheagwara, Charles M

2011-01-01T23:59:59.000Z

457

RFID as a key enabler of the internet of things : localization and communication  

E-Print Network [OSTI]

By having everything in our physical world digitally connected, the Internet of Things is expected to transform how we interact with our environments and unlock tremendous business values through advance analytics. Owing ...

Wang, Jue, 1986-

2014-01-01T23:59:59.000Z

458

Combined wavelet video coding and error control for internet streaming and multicast  

E-Print Network [OSTI]

In the past several years, advances in Internet video streaming have been tremendous. Originally designed without error protection, Receiver-driven layered multicast (RLM) has proved to be a very effective scheme for scalable video multicast. Though...

Chu, Tianli

2002-01-01T23:59:59.000Z

459

Internet-based Building Performance Analysis Provided as a Low-Cost Commercial Service  

E-Print Network [OSTI]

Internet-based monitoring services can play a very important role in reducing the energy consumed in commercial buildings. They can provide the information needed to identify improvements that should be made in the operation of particular buildings...

Heinemeier, K.; Koran, W.

2001-01-01T23:59:59.000Z

460

The Value of Wireless Internet Connection on Trains: Implications for Mode-Choice Models  

E-Print Network [OSTI]

GAO-01-345, pp 6-13. Train, K. , McFadden, D. , 1978. The2006. Wireless Internet on Trains: Impact on performance ofA. , et al. 2005. California Trains Connected, Final Project

Banerjee, Ipsita; Kanafani, Adib

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin, Gregor v. Bochmann,  

E-Print Network [OSTI]

Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin (RIAs), using technologies such as Ajax, Flex, or Silverlight, break away from the traditional approach and servers. RIAs introduce new challenges, new security vulnerabilities, and their behavior makes

Jourdan, Guy-Vincent

462

A Secure Address Resolution Protocol Mohamed G. Gouda ChinTser Huang  

E-Print Network [OSTI]

[i] broadcasts a rqst(ipa) message over the Ethernet to every other computer in the network, where ipa is the IP[j] receives the rqst(ipa) message, it detects that ipa is not its own IP address and discards the message. Third, when the ARP process in computer h[j] receives the rqst(ipa) message, it detects that ipa is its

Huang, Chin-Tser

463

NIST cooperative laboratory for OSI routing technology  

SciTech Connect (OSTI)

This document is one of two reports on the Integrated ISIS protocol. Required by the IAB/IESG in order for an Internet routing protocol to advance to Draft Standard Status. Integrated ISIS is an Interior Gateway Protocol and is designed to carry both IP and ISO CLNP routing information. Integrated ISIS is currently designated as a Proposed Standard. The protocol was first published in RFC 1195. Internet Draft was published subsequently to RFC 1195 and documents the current version of the protocol. This report documents experience with Integrated ISIS. This includes reports on interoperability testing, field experience and the current state of Integrated ISIS implementations. It also presents a summary of the Integrated ISIS Management Information Base (MIB), and a summary of the Integrated ISIS authentication mechanism.

Montgomery, D.

1994-05-23T23:59:59.000Z

464

Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol  

E-Print Network [OSTI]

We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

2002-10-31T23:59:59.000Z

465

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas  

E-Print Network [OSTI]

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas Abdel Ilah Alshbatat and Liang Dong, Senior Member, IEEE Abstract-- Unmanned aerial vehicle (UAV) has been used inspection and range extension. Moreover, UAVs are suited for situations that are too dangerous for direct

Dong, Liang

466

Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol  

SciTech Connect (OSTI)

The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

Romberger, J.

2014-11-01T23:59:59.000Z

467

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

468

A Review of Embedded Automotive Protocols Nicolas Navet  

E-Print Network [OSTI]

A Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst is given. Next, the current eorts of the automotive industry on middleware technologies which may

Navet, Nicolas

469

Air to Air Communication Protocol Arjan Durresi1  

E-Print Network [OSTI]

1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

Jain, Raj

470

Reply to "Comment on Protocol for Direct Counterfactual Quantum Communication"  

E-Print Network [OSTI]

In reply to Vaidman's Comment [arXiv:1304.6689], we show that his claim that our Protocol for Direct Counterfactual Quantum Communication [PRL 110, 170502 (2013), arXiv:1206.2042] is counterfactual only for one type of information bit is wrong.

Hatim Salih; Zheng-Hong Li; M. Al-Amri; M. Suhail Zubairy

2014-04-28T23:59:59.000Z

471

Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''  

E-Print Network [OSTI]

Biomolecular free energy profiles by a shooting√?umbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

Schlick, Tamar

472

Survivability validation protocol issues for a system-of-systems  

SciTech Connect (OSTI)

This paper illuminates the various issues confronting a protocol developer as he attempts to construct a system-of-systems (SOS) survivability validation protocol. These issues are considered in the context of a Battle Management Command, Control, and Communications (BMC{sup 3}) network in the form of a Hypothetical System Architecture consisting of air, sea, ground, and space platforms. The purpose of the protocol of concem is to validate the nuclear survivability of the BMC{sup 3} SOS. To achieve this validation, the combined susceptibilities of the SOS platforms and communications links must be considered. A basic SOS simulation concept is described, which assumes individual platform survivability. The nuclear environments to be considered in the simulation are outlined with a discussion of the relationship to basic system susceptibility. Various validation concepts for the SOS protocol are summarized in relation to the life cycle phase during which they would be utilized. Computer simulation issues are discussed, including the environments to be modeled, validation of the codes, documentation, and configuration control. Concluding remarks center on the most likely way of simulating nuclear effects and on treating simulation tools like mission critical items.

Brock, G.; Ianacone, K.J.; Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

1993-08-01T23:59:59.000Z

473

WLDF 311 Treefrog Study; Fall 2007 PVC Pipe Deployment Protocol  

E-Print Network [OSTI]

WLDF 311 Treefrog Study; Fall 2007 PVC Pipe Deployment Protocol: 1. Arrange time to meet should include: a. 12 pipes with caps (there should be ~3 pipes on "your" transects out in the field & place trap on the stake (using hole near top of pipe for screw head). e. Record UTM positions (easting

Johnson, Matthew

474

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks Yongjun Dai, Changhee Joo prevalent, TCP performance over mobile ad hoc networks attracts more attention. The earlier studies on TCP in wireless networks have shown that it performs poorly in ad hoc networks. They tackled the problem

Bahk, Saewoong

475

STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001  

E-Print Network [OSTI]

1 STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001 Vosshall Lab 1. Anesthetize flies the brain, starting with the removal of the proboscis. Gently peel away the cuticle at the back of the fly the esophagus (hole in brain). Once all the cuticle has been removed, gently remove the fat body and trachea

476

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

477

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

478

WHOP: Wormhole Attack Detection Protocol using Hound Packet  

E-Print Network [OSTI]

WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

Dharmaraja, S.

479

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network  

E-Print Network [OSTI]

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

Dharmaraja, S.

480

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations  

E-Print Network [OSTI]

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations S federation. As a cluster federation comprises of a large number of nodes, there is a high probability fits to the characteristics of a cluster federation (large number of nodes, high latency and low

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea  

E-Print Network [OSTI]

1 CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea by Gerhard Herndl Lab @ www FISH Hybridization www.microbial-oceanography.eu 2007 2 Sample Fixation 1. Fix samples in Ethanol 95% 7. Dry and mount in DAPI mix #12;CARD FISH Buffers and Chemicals www

Herndl, Gerhard

482

Reliable and Energy-Efficient Routing Protocol in Dense  

E-Print Network [OSTI]

Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks Min Chen, Taekyoung Kwon, Shiwen Mao, + Yong Yuan, Victor C.M. Leung* Department of Electrical and Computer@snu.ac.kr Department of Electrical and Computer Engineering Auburn University, 200 Broun Hall, Auburn, AL 36849

Chen, Min

483

LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note  

E-Print Network [OSTI]

LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

Raizada, Manish N.

484

A Self-Healing Load Balancing Protocol and Implementation  

E-Print Network [OSTI]

in the opposite direction exhibits a rate of r2 = c2x2. It can be shown that the overall reaction system spanned Comparison In order to illustrate the principle of the two protocols, we carried out OMNeT++ [2] simulations this unbounded growth, we apply a "non-selective dilution flow" to the reactor which randomly destroys a molecule

Vetter, Thomas

485

GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning  

E-Print Network [OSTI]

GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 ¬Ķl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

Movileanu, Liviu

486

An adaptive protocol for distributed beamforming Stephan Sigg1  

E-Print Network [OSTI]

settings and propose a protocol that utilises organic computing principles to find optimum parameters is the approach to combine transmission signals from distinct transmit antennas simultaneously in order to create transmission [7, 8, 2]. Several open-loop and closed-loop carrier synchronisation approaches have been proposed

Beigl, Michael

487

How to Use Bitcoin to Design Fair Protocols Iddo Bentov  

E-Print Network [OSTI]

How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

488

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

489

Safeguards Agreement and Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

2004-01-07T23:59:59.000Z

490

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

491

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

492

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

493

WSN-inspired Sleep Protocols for Heterogeneous LTE Networks  

E-Print Network [OSTI]

architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed to strengthen algorithm to dynamically switch off and on the micro eNodeBs of an LTE heterogeneous network followingWSN-inspired Sleep Protocols for Heterogeneous LTE Networks Iulia Tunaru CEA CEA-Leti, Minatec

Paris-Sud XI, Université de

494

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16≠32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

495

Localized radio frequency communication using asynchronous transfer mode protocol  

DOE Patents [OSTI]

A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

2007-08-14T23:59:59.000Z

496

An Energy-Aware Simulation Model and Transaction Protocol  

E-Print Network [OSTI]

1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution of Southern California Oct. 15, 2003 Outline ! Introduction ! MANET Simulation Model ! Energy-aware Network of analytical approaches ! We presents a simulation model to evaluating power management policies for a MANET

Pedram, Massoud

497

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect (OSTI)

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

498

GEO-ENGINEERING MODELING THROUGH INTERNET INFORMATICS (GEMINI)  

SciTech Connect (OSTI)

GEMINI (Geo-Engineering Modeling through Internet Informatics) is a public-domain web application focused on analysis and modeling of petroleum reservoirs and plays (http://www.kgs.ukans.edu/Gemini/index.html). GEMINI creates a virtual project by ''on-the-fly'' assembly and analysis of on-line data either from the Kansas Geological Survey or uploaded from the user. GEMINI's suite of geological and engineering web applications for reservoir analysis include: (1) petrofacies-based core and log modeling using an interactive relational rock catalog and log analysis modules; (2) a well profile module; (3) interactive cross sections to display ''marked'' wireline logs; (4) deterministic gridding and mapping of petrophysical data; (5) calculation and mapping of layer volumetrics; (6) material balance calculations; (7) PVT calculator; (8) DST analyst, (9) automated hydrocarbon association navigator (KHAN) for database mining, and (10) tutorial and help functions. The Kansas Hydrocarbon Association Navigator (KHAN) utilizes petrophysical databases to estimate hydrocarbon pay or other constituent at a play- or field-scale. Databases analyzed and displayed include digital logs, core analysis and photos, DST, and production data. GEMINI accommodates distant collaborations using secure password protection and authorized access. Assembled data, analyses, charts, and maps can readily be moved to other applications. GEMINI's target audience includes small independents and consultants seeking to find, quantitatively characterize, and develop subtle and bypassed pays by leveraging the growing base of digital data resources. Participating companies involved in the testing and evaluation of GEMINI included Anadarko, BP, Conoco-Phillips, Lario, Mull, Murfin, and Pioneer Resources.

W. Lynn Watney; John H. Doveton

2004-05-13T23:59:59.000Z

499

ACCELERATING VERY FAST GAS IN THE SUPERNOVA IMPOSTOR SN 2009ip WITH JETS FROM A STELLAR COMPANION  

SciTech Connect (OSTI)

Using hydrodynamic numerical simulations we show that high-velocity ejecta with v ? 10{sup 4} km s{sup Ė1} in the outbursts of the supernova impostor SN 2009ip and similar luminous blue variable (LBV) stars can be explained by the interaction of fast jets, having v {sub jet} ? 2000-3000 km s{sup Ė1}, with a circumbinary shell (extended envelope). The density profile in the shell is very steep such that the shock wave, that is excited by the jets' interaction with the shell, accelerates to high velocities as it propagates outward. The amount of very fast ejecta is small, but sufficient to account for some absorption lines. Such an extended envelope can be formed from the binary interaction and/or the unstable phase of the LBV primary star. The jets themselves are launched by the more compact secondary star near periastron passages.

Tsebrenko, Danny; Soker, Noam, E-mail: ddtt@tx.technion.ac.il, E-mail: soker@physics.technion.ac.il [Department of Physics, TechnionóIsrael Institute of Technology, Haifa 32000 (Israel)] [Department of Physics, TechnionóIsrael Institute of Technology, Haifa 32000 (Israel)

2013-11-10T23:59:59.000Z

500

An object-oriented implementation of a Low Level Reader Protocol (LLRP) library  

E-Print Network [OSTI]

This Master of Engineering Thesis describes the design and implementation of an object-oriented Low Level Reader Protocol (LLRP) library. LLRP is a recently released protocol which standardizes the formats and methods of ...

Constantinou, Fivos

2007-01-01T23:59:59.000Z