Powered by Deep Web Technologies
Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Voice over Internet Protocol (VoIP) : the dynamics of technology and regulation  

E-Print Network [OSTI]

"What Voice over Internet Protocol (VoIP) is going to do is start to weaken the foundation of the way we've done things for 100 years...Congress already should be discussing the next telecom bill," said Federal Communications ...

Vaishnav, Chintan

2006-01-01T23:59:59.000Z

2

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network [OSTI]

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

3

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network [OSTI]

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

4

VoIP: VoIP and multimedia protocols in wireless and firewalled environments  

Science Journals Connector (OSTI)

Large numbers of IT departments are currently grappling with security issues around the deployment of VoIP and multimedia protocols in wireless and firewalled environments. What should they be considering?

Matt Gordon-Smith; Stephen Wing

2006-07-01T23:59:59.000Z

5

Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico  

E-Print Network [OSTI]

This project-thesis examines the technical requirements of a Voice over Internet Protocol (VoIP) solution and is it advantageous for a Multinational Corporation (MNC) to utilize the Project Management Office (PMO) processes as defined by the Project...

Perez, Mary Louise

2012-08-31T23:59:59.000Z

6

H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information  

Broader source: Energy.gov (indexed) [DOE]

as appropriate. Consider using in solicitations involving M&O as appropriate. Consider using in solicitations involving M&O contracts, management of major facilities, and any acquisition which could involve the direct or indirect purchase of Information Technology equipment that uses Internet Protocol (IP) technology. DOE-H-__ COMPLIANCE WITH INTERNET PROTOCOL VERSION 6 (IPV6) IN ACQUIRING INFORMATION TECHNOLOGY (JULY 2011) This contract involves the acquisition of Information Technology (IT) that uses Internet Protocol (IP) technology. The Contractor agrees that (1) all deliverables that involve IT that uses IP (products, services, software, etc.) comply with IPv6 standards and interoperate with both IPv6 and IPv4 systems and products; and (2) it has IPv6 technical support for fielded product management, development and

7

Architecture for a TCP/IP Based Robotic Protocol JOSHUA D. JACKSON, DALE W. CALLAHAN, DONALD S. APPLEBY,  

E-Print Network [OSTI]

scripts [3]. The PUMA paint robot allowed the remote user to be an artist from afar [1]. Many otherArchitecture for a TCP/IP Based Robotic Protocol JOSHUA D. JACKSON, DALE W. CALLAHAN, DONALD S@askdrcallahan.com www.uab.edu Abstract: Robotic Systems will soon be prevalent parts of the Internet and will allow

Callahan, Dale W.

8

6 August 1998 IP and Integrated Services Saleem Bhatti v1.0 Page 1 of 31  

E-Print Network [OSTI]

reliant on the use of the Internet protocols to provide data communications facilities. The use of the Internet protocols seems likely to increase at an extremely rapid rate and the Internet Protocol (IP audio and video are being developed using Internet protocols. The Internet and IP was never designed

Bhatti, Saleem N.

9

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

10

Performance comparison of native ATM vs IP over ATM  

E-Print Network [OSTI]

engineers through its high bandwidth and multi traffic support. The robustness of the Internet Protocol (115 contributed to massive increase in Internet hosts globally. IP is a connectionless protocol as opposed to ATM, which is connection oriented...

Mohammed, Shajiuddin Asif

1998-01-01T23:59:59.000Z

11

Design of a PSi header processor for the internet protocol  

E-Print Network [OSTI]

bottleneck is the network transport component, i.e. the network I/O at the end system. To overcome this performance bottleneck, a standard data communication protocol, such as TCP/IP, could be implemented by using hardware to speedup the protocol throughput...

Bai, Jinxia

2012-06-07T23:59:59.000Z

12

On the development of Voice over IP  

E-Print Network [OSTI]

Internet Protocol (VoIP) security and proposed an Internet draft on secure retargeting and response identity. The draft provides a simple and comprehensive solution to the response identity, call recipient identity and intermediate server retargeting...

Yang, Xu

2009-05-15T23:59:59.000Z

13

CSP 541: Internet Technologies W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison-Wesley, ISBN 0201633469  

E-Print Network [OSTI]

CSP 541: Internet Technologies Texts W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison March 2006 (html, css checks) CSP 541: Internet Technologies - CS Dept, Illinois Institut... 1 of 1 #12;

Heller, Barbara

14

Multi Layer Energy-Efficiency in IP over WDM Networks  

Science Journals Connector (OSTI)

We propose an energy-aware Internet Protocol (IP) traffic routing strategy together with a virtual topology adaptation approach to save energy in the IP over WDM networks by following...

Ribera, Carlos; Cavdar, Cicek; Gencata, Aysegul; Wosinska, Lena

15

Reduction-based Security Analysis of Internet Routing Protocols  

E-Print Network [OSTI]

Reduction-based Security Analysis of Internet Routing Protocols Chen Chen, Limin Jia, Boon Thau Loo. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary proofs with automated analysis. We define several reduction steps to reduce proving route authenticity

Pennsylvania, University of

16

SRP: a Scalable Resource Reservation Protocol for the Internet  

E-Print Network [OSTI]

SRP: a Scalable Resource Reservation Protocol for the Internet Werner Almesberger 1 , Tiziana (SRP) provides a light-weight reser- vation mechanism for adaptive multimedia applications. Our main these applications need in order to operate prop- erly. SRP aims to allow such applications to make a dependable

Almesberger, Werner

17

A comparison of the Internet multicast routing protocols  

Science Journals Connector (OSTI)

The exploding Internet has brought many novel network applications. These include teleconferencing, interactive games, the voice/video phone, real-time multimedia playing, distributed computing, web casting, and so on. One of the specific characteristics ... Keywords: Datagrams, Delivery tree, Multicasting routing protocols

Jhyda Lin; Ruay-Shiung Chang

1999-01-01T23:59:59.000Z

18

Traffic Grooming for IP-Over-WDM Networks: Energy and Delay Perspectives  

Science Journals Connector (OSTI)

As energy consumption has become a major concern of networks, traffic grooming studies on Internet protocol over wavelength division multiplexing (IP-over-WDM) networks have been...

Lee, Chankyun; Rhee, June-Koo Kevin

2014-01-01T23:59:59.000Z

19

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills  

E-Print Network [OSTI]

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills Electrical Engineering is designed to distribute time information in a large, diverse internet system operating at speeds from and resulted in the designation of NTP as an Internet Standard protocol. The NTP synchronization system, which

Mills, David L.

20

Research challenges towards the Future Internet  

Science Journals Connector (OSTI)

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture ... Keywords: Cognitive networks, Data and communication security, Future internet, Green networking, Internet architecture and protocols, Optical networks, System security, Wireless networks

Marco Conti; Song Chong; Serge Fdida; Weijia Jia; Holger Karl; Ying-Dar Lin; Petri MšhŲnen; Martin Maier; Refik Molva; Steve Uhlig; Moshe Zukerman

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Internet Time Synchronization: the Network Time Protocol 1,2,3 David L. Mills  

E-Print Network [OSTI]

the Internet backbone networks and gateways are carefully engineered for good service, op­ erating speedsInternet Time Synchronization: the Network Time Protocol 1,2,3 David L. Mills Electrical), which is designed to distribute time information in a large, diverse internet system operating at speeds

Mills, David L.

22

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

23

Mobile IP Survey Chakchai So-In, s_chakchai@yahoo.com  

E-Print Network [OSTI]

Mobile IP Survey Chakchai So-In, s_chakchai@yahoo.com Abstract: Mobile Internet Protocol (MIP regardless of physical movement. In this paper, we give an overview of Mobile IP: terminology, functionality, and operation. Comprehensive surveys on Mobile IP issues are discussed: Quality of Service (QOS), Multicast

Jain, Raj

24

Internet Protocol Adoption: Learning from Bitcoin Position Paper  

E-Print Network [OSTI]

This position paper discusses two related questions: 1. Using the framework of network economics, what are success factors behind the adoption of Bitcoin (a cryptographic curreny), and can we copy them for other protocols? 2. Can we design more successful protocols if we have inband payment mechanisms to internalize the externalities that emerge during adoption and in steady state? 1.

Rainer BŲhme; Westfšlische Wilhelms-universitšt MŁnster

25

Expansion of the internet protocol address space with "minor" disruption of current hardware or software  

E-Print Network [OSTI]

Currently, the Internet suite of protocols uses a 32 bit network layer address and requires that each machine have a unique address. The problem: 32 bits only distinguishes 2 32 or 4,294,967,296 machines. Even with four billion addresses, experts...

Wheatley, Philip Stephen

2012-06-07T23:59:59.000Z

26

FLIP: an Internetwork Protocol for Supporting Distributed Systems  

E-Print Network [OSTI]

are not well supported by protocols such as TCP/IP, X.25, and OSI TP4. As part of our ongoing research protocol, called FLIP (Fast Local Internet Protocol), is the subject of this paper. Although the ISO OSI a byteÔŅĹstream protocol like TCP or OSI TP4

27

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet System 1,2,3  

E-Print Network [OSTI]

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet describes a series of experiments involving over 100,000 hosts of the Internet system and located in the U and reliability of international standard time distribution using the Internet and the Network Time Protocol (NTP

Mills, David L.

28

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet System1,2,3  

E-Print Network [OSTI]

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet describes a series of experiments involving over 100,000 hosts of the Internet system and located in the U and reliability of international standard time distribution using the Internet and the Network Time Protocol (NTP

Mills, David L.

29

Utveckling av ett Ųppet Home Automation-protokoll fŲr anvšndning Ųver IP-nštverk; Development of an open Home Automation protocol for use over IP networks.  

E-Print Network [OSTI]

?? Detta arbete tar upp utvecklingen av ett nytt protokoll fŲr anvšndning inom Home Automation Ųver IP-nštverk, med stor vikt pŚ flexibilitet och enkelhet. ViÖ (more)

Johnsson, Kim; Turfors, Christoffer

2010-01-01T23:59:59.000Z

30

Adoption Process for VoIP: The UTAUT Model  

Science Journals Connector (OSTI)

This study tests the appropriateness of the Unified Theory of Acceptance and Use of Technology UTAUT model in the context of end user consumption by means of an online survey with four hundred and seventy five respondents 24% response rate. The study ... Keywords: Adoption Process, Consumer Behavior, New Technology, Unified Theory of Acceptance and Use of Technology, Voice over Internet Protocol VoIP

Eduardo Esteva-Armida; Alberto Rubio-Sanchez

2012-10-01T23:59:59.000Z

31

Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks  

E-Print Network [OSTI]

Voice Over IP (VoIP) systems and transmission technologies have now become the norm for many communications applications. However, whether they are used for personal communication or priority business conferences and talks, privacy...

Mohanty, Saswat

2012-07-16T23:59:59.000Z

32

An ethernet/IP security review with intrusion detection applications  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01T23:59:59.000Z

33

Adjusting the ratio of the clock rates in a PDA system to reduce the jitter through wireless VoIP  

Science Journals Connector (OSTI)

In this paper we propose a setting method to adjust the ratio of the CPU, RAM and BUS clock speeds of a PDA to balance the processing time and reduce the jitter of the arrival voice packets. To maintain the balance and fluency among compression, encoder-decoder, ... Keywords: PDA, VoIP (voice over internet protocol), clock rate, jitter

Ying-Wen Bai; Yung-De Cheng

2007-07-01T23:59:59.000Z

34

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

SciTech Connect (OSTI)

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2009-04-29T23:59:59.000Z

35

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

ScienceCinema (OSTI)

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2010-01-08T23:59:59.000Z

36

A Selective Retransmission Protocol for Multimedia on the Internet Ken French George Oprica  

E-Print Network [OSTI]

all data sent can be lost. Our Selective Retransmission Protocol (SRP) provides a balance between the delay of TCP and the loss of UDP. SRP retransmits only a percentage of the data that was lost, providing.8 1 1.2 1.4 1.6 1.8 2 0 0.5 1 1.5 2 Loss (normalized) Latency(normalized) SRP - ELL SRP - OQ UDP

Claypool, Mark

37

Stream Control Transmission Protocol  

Science Journals Connector (OSTI)

This document describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.

R. Stewart; Q. Xie; K. Morneault; C. Sharp; H. Schwarzbauer; T. Taylor; I. Rytina; M. Kalla; L. Zhang; V. Paxson

2000-10-01T23:59:59.000Z

38

Sports over IP : dynamics and perspectives  

E-Print Network [OSTI]

Technological advances are allowing the use of the Internet Protocol and the Internet infrastructure mainly built by cable and telecom operators for broadcasting purposes in the U.S. This disruption raises a business issue ...

Blain, Emmanuel

2010-01-01T23:59:59.000Z

39

ENERGY EFFICIENT INTERNET INFRASTRUCTURE  

E-Print Network [OSTI]

. D R A F T October 27, 2010, 11:34pm D R A F T #12;2 ENERGY EFFICIENT INTERNET INFRASTRUCTURE FigureCHAPTER 1 ENERGY EFFICIENT INTERNET INFRASTRUCTURE Weirong Jiang, Ph.D.1 , and Viktor K. Prasanna]. In other words, an IP address may match multiple prefixes, but only the longest D R A F T October 27, 2010

Prasanna, Viktor K.

40

Mobile IPMobile IP Mobile IPMobile IP  

E-Print Network [OSTI]

Mobile IPMobile IP #12;2 Mobile IPMobile IP · How do we support mobile users whose point of attachment to the network changes dynamically? #12;3 Mobile IPMobile IP · The goal of Mobile IP is to allow connectivity automatically, despite the change. · While Mobile IP can work with wired connections, where you

Yeom, Ikjun

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

1. The Internet 1-1 Chapter 1: The Internet  

E-Print Network [OSTI]

1. The Internet 1-1 Chapter 1: The Internet References: · Rainer Klute: Das World Wide Web. Addison with TCP/IP. Prentice Hall, 1988, ISBN 0134701887. · W. Richard Stevens: TCP Illustrated, Vol. 1. Addison-Wesley, 1994, ISBN 0201633469. · W. Richard Stevens: UNIX Network Programming, Vol. 1, 2nd Ed. Prentice Hall

Brass, Stefan

42

Raj JainThe Ohio State University IP Next Generation (IPv6)IP Next Generation (IPv6)  

E-Print Network [OSTI]

State University 18-5 IP Address FormatIP Address Format q Three all-zero network numbers are reserved q people by 2020 q Each person will be served by more than one computer q Assuming 100 computers per person net stopped at 15000 nodes using 16-bit addresses H = 0.26 q 3 Million Internet hosts currently using

Jain, Raj

43

Distributed Internet Security and Measurement  

E-Print Network [OSTI]

BGP (the Internet's interdomain routing protocol). It introduces Pretty Good BGP, an anomaly detection#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science Internet Security and Measurement by Josh Karlin ABSTRACT OF DISSERTATION Submitted in Partial Fulfillment

Forrest, Stephanie

44

Proactive techniques for correct and predictable Internet routing  

E-Print Network [OSTI]

The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

Feamster, Nicholas G. (Nicholas Greer), 1979-

2006-01-01T23:59:59.000Z

45

Beyond QoS signaling: A new generic IP signaling framework  

Science Journals Connector (OSTI)

This paper describes the design principles and an introduction of a framework and protocols for generic IP signaling, namely the Cross-Application Signaling Protocol (CASP) and its signaling applications. While reusing certain features of the existing RSVP protocol, CASP overcomes its shortcomings and may be deployed as a replacement technology to provide simpler, mobility-supported, more extensible and more secure signaling services in IP based networks. This paper discusses challenges of todayís IP signaling protocols and addresses fundamentals and key aspects of CASP and its current signaling applications. In addition, a comparison with previous signaling protocol proposals and an outlook of future work in this area are also given.

Xiaoming Fu; Hannes Tschofenig; Dieter Hogrefe

2006-01-01T23:59:59.000Z

46

StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks  

E-Print Network [OSTI]

Mellon University Pittsburgh, PA 15213 Abstract Today's Internet hosts are threatened by IP spoofing are realized even if only one third of Internet routers implement StackPi marking. We show these results through analysis and simulations based on several real Internet topologies. #12; Keywords: DDoS, Denial

47

StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks  

E-Print Network [OSTI]

Mellon University Pittsburgh, PA 15213 Abstract Today's Internet hosts are threatened by IP spoofing are realized even if only one third of Internet routers implement StackPi marking. We show these results through analysis and simulations based on several real Internet topologies. #12;Keywords: DDoS, Denial

48

Very large conferences on the Internet: the Internet Multimedia Conferencing Architecture.  

E-Print Network [OSTI]

components still in a nascent stage. 1 Introduction The Internet is not currently very good at carry­ ingVery large conferences on the Internet: the Internet Multimedia Conferencing Architecture. M In this paper we provide an overview of multimedia conferencing on the Internet. The protocols men­ tioned

Handley, Mark

49

Tutorial Eight 1. Explain the addressing scheme used in Mobile IP?  

E-Print Network [OSTI]

COMP 347 Tutorial Eight Mobile IP 1. Explain the addressing scheme used in Mobile IP? 2. One simple method to implement mobility is to let the mobile host change its address as it goes to the new network with this approach? 3. What role does a mobile host, a home agent and a foreign agent play in mobile IP protocol? 4

Hamey, Len

50

VoIP Deregulation In South Africa: Implications for Underserviced Areas  

E-Print Network [OSTI]

VoIP Deregulation In South Africa: Implications for Underserviced Areas Marshini Chetty a marshiniDept of Computer Science, University of Cape Town, South Africa cPolicy Associate, Bridges.org, South Africa Protocol (VoIP) in South Africa. Previously, VoIP could only be utilised by the incumbent

Blake, Edwin

51

Invited Talk: Mitigating the Effects of Internet Timing Faults  

E-Print Network [OSTI]

Invited Talk: Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways and the Internet. The usual approach to making such a connection is to install a gateway node which translates from Internet protocols to embedded field bus network protocols. Such connections raise obvious security

Koopman, Philip

52

Income Protection (IP) Insurance  

E-Print Network [OSTI]

of the daily futures market closing prices for the insured crop prior to the sales closing date and during harvest. IP uses the Group Risk Plan?s (GRP) county yield index to adjust IP premium rates. The insurance is provided for an enter- prise unit... equals 27.5 percent of the approved yield times 100 percent of the projected price. An insured?s total guaranteed dollar amount of protection is the net acres of the insured crop (acres times share) in the county multiplied by the IP dollar guaran- tee...

Stokes, Kenneth; Barnaby, G. A. Art; Waller, Mark L.; Outlaw, Joe

1999-06-09T23:59:59.000Z

53

Deriving traffic demands for operational IP networks: methodology and experience  

Science Journals Connector (OSTI)

Engineering a large IP backbone network without an accurate network-wide view of the traffic demands is challenging. Shifts in user behavior, changes in routing policies, and failures of network elements can result in significant (and sudden) fluctuations ... Keywords: Internet, measurement, routing, traffic engineering

Anja Feldmann; Albert Greenberg; Carsten Lund; Nick Reingold; Jennifer Rexford; Fred True

2001-06-01T23:59:59.000Z

54

FLIP: an Internetwork Protocol for Supporting Distributed Systems  

E-Print Network [OSTI]

of communication are not well supported by protocols such as TCP/IP, X.25, and OSI TP4. As part of our ongoing. Although the ISO OSI protocols are not widely used, the OSI model is con- venient for describing where-performance RPC protocol rather than a byte-stream protocol like TCP or OSI TP4

Tanenbaum, Andrew S.

55

An integrated soft handoff approach to IP fast reroute in wireless mobile networks  

Science Journals Connector (OSTI)

This paper presents an integrated approach to IP fast reroute (IPFRR) of both unicast and multicast paths in wireless mobile networks. A distinct feature of the proposed approach is that, instead of modifying existing routing protocols, it employs a ... Keywords: IP fast reroute, XORP, soft handoff, wireless mobile networks

S. Cevher; T. Chen; I. Hokelek; J. Kang; V. Kaul; Y. J. Lin; M. Pang; M. Rodoper; S. Samtani; C. Shah; J. Bowcock; G. B. Rucker; J. L. Simbol; A. Staikos

2010-01-01T23:59:59.000Z

56

Ad-hoc Technology in Future IP based Mobile Communication Systems  

E-Print Network [OSTI]

Ad-hoc Technology in Future IP based Mobile Communication Systems Martin Reisslein Arizona State Heinrich Hertz Institut #12;Content · Required Research · Ad-hoc Testbed · Expected Results and Time Frame-Configuration · Assignment and release of IP addresses ­ omnipresent related protocols can not deployed in ad- hoc networks

Reisslein, Martin

57

Internet video streaming using 3-D SPIHT  

E-Print Network [OSTI]

several years. Video streaming involves video compression, protocols selection for streaming media, client/receiver buffer management and packet loss recovery. This thesis documents a new Internet video streaming system based on the state-of-the-art 3-D...

Jiang, Jianhong

2012-06-07T23:59:59.000Z

58

Case Study: Interactive Visualization for Internet Security Soon Tee Teoh  

E-Print Network [OSTI]

] to communicate. A good way to un- derstand the behaviors and performance of the Internet is thus to collectCase Study: Interactive Visualization for Internet Security Soon Tee Teoh Kwan-Liu Ma S. Felix Wu North Carolina State University ABSTRACT Internet connectivity is defined by a set of routing protocols

California at Davis, University of

59

Adaptive best effort protocols for video delivery  

E-Print Network [OSTI]

This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

Madhwaraj, Ashwin Raj

2012-06-07T23:59:59.000Z

60

Internet Sampler  

E-Print Network [OSTI]

Gnat (gnatkip) wrote, 2006-08-23 16:36:00 Art: Internet Sampler Title: Internet Sampler Media: Excel, Photoshop, Crosstitch.com Caption Maker, alphabet by Carrie's Creations, graphics from Windows, IE, and Firefox Notes: An illustration... the manner of the pioneers. At the top Iíll set my most oft- uttered prayer: Thank you, internet, for letting me observe so many crazy people from a safe distance." Since I first read that line, there have been so many occasions when I've been reminded...

2006-08-23T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Internet 0  

E-Print Network [OSTI]

The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

Krikorian, Raffi Chant, 1978-

2004-01-01T23:59:59.000Z

62

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network [OSTI]

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

63

Privacy of encrypted Voice Over Internet Protocol  

E-Print Network [OSTI]

for our experiments. For simplicity, all the words are treated separately i.e. there is a silence period after each word in the sentence. Rhyme 1: \\Betty bought some batter butter. But she found the butter bitter. So she bought some better butter to make... the bitter batter better." Rhyme 2: \\Popeye the sailor man, lived in a garbage can, Ate all the worms and spat out the germs; the best a man can." Rhyme 3: \\My older brother is a pest, He loves to sit in the west, He gets no rest, but pins his chest...

Lella, Tuneesh Kumar

2008-10-10T23:59:59.000Z

64

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network [OSTI]

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

65

From an IP address to a street address: using wireless signals to locate a target  

Science Journals Connector (OSTI)

How quickly can somebody convert an IP address of a target into a real-word street address? Law enforcement regularly has need to determine a suspect's exact location when investigating crimes on the Internet. They first use geolocation software and ...

Craig A. Shue; Nathanael Paul; Curtis R. Taylor

2013-08-01T23:59:59.000Z

66

AN EXPOSITION ON WIRELESS/IP INTERWORKING Jon W. Mark, Xuemin Shen and Yu Zeng  

E-Print Network [OSTI]

, yzengg@bbcr.uwaterloo.ca Center for Wireless Communications Department of Electrical and ComputerAN EXPOSITION ON WIRELESS/IP INTERWORKING Jon W. Mark, Xuemin Shen and Yu Zeng fjwmark, xshen on information available on Internet, and the rapid growth of the wireless subscriber population suggest a need

Waterloo, University of

67

AN EXPOSITION ON WIRELESS IP INTERWORKING Jon W. Mark, Xuemin Shen and Yu Zeng  

E-Print Network [OSTI]

, yzengg@bbcr.uwaterloo.ca Center for Wireless Communications Department of Electrical and ComputerAN EXPOSITION ON WIRELESS IP INTERWORKING Jon W. Mark, Xuemin Shen and Yu Zeng fjwmark, xshen on information available on Internet, and the rapid growth of the wireless subscriber population suggest a need

Waterloo, University of

68

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

the barriers to internal investment in development by offering the IP for free and using quick and simple university and an international partner of the initiative for Australasia in December 2013. This new approach Access IP? Whilst we will still protect and commercialise some IP as before, we will offer some of our IP

University of Technology, Sydney

69

ďYoung people, adult worriesĒ: RCT of an internet-based self-support method ďFeel the ViBeĒ for children, adolescents and young adults exposed to family violence, a study protocol  

Science Journals Connector (OSTI)

Violence in families affects children. Exposure to violence is seen as child abuse. Figures show that about one third of ... of the current generation have access to the internet, an online intervention will make...

Karin AWL van Rosmalen-Nooijens; Judith B Prins; Marianne VergeerÖ

2013-03-01T23:59:59.000Z

70

TCP/IP Security Protocol Suite for Grid Computing Architecture  

Science Journals Connector (OSTI)

Grid computing is a term referring to the ... domains to attain a common goal. The grid can be thought of as a distributed ... paper, we propose a solution for various security issues found in High Performance Grid

Vikas Kamra; Amit Chugh

2011-01-01T23:59:59.000Z

71

A Formal Framework for Secure Routing Protocols Wenchao Zhou3  

E-Print Network [OSTI]

verifies its security claims. Existing model-checking-based protocol analysis tools cannot be directlyA Formal Framework for Secure Routing Protocols Chen Chen1 Limin Jia2 Hao Xu1 Cheng Luo1 Wenchao routing protocol, is vulner- able to various attacks. Redesigns of Internet routing infrastructure (e.g. S

Sandholm, Tuomas W.

72

Internet Path-Quality Monitoring inInternet Path-Quality Monitoring in the Presence of Adversaries  

E-Print Network [OSTI]

Site A Performance Routing B l i l d b t lti l th ( ltih d it ) Routers need tools to detectInternet Path-Quality Monitoring inInternet Path-Quality Monitoring in the Presence of Adversaries routed from Alice to Bob via a path of intermediate routers Routing protocols used to set up paths

Goldberg, Sharon

73

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS  

E-Print Network [OSTI]

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS #12 ASSESSMENT IN THE NETHERLANDS Published VSNU, KNAW and NWO 2009 This document is available through internet: Royal Netherlands Academy of Arts and Sciences (KNAW) The Academy's mission: As the forum, conscience

Franssen, Michael

74

Review: Wireless Internet Handbook  

Science Journals Connector (OSTI)

......Review: Wireless Internet Handbook Reviewed by Harry Agius Wireless Internet Handbook Borko Furht, Mohammad Ilyas...the book. In fairness it does improve after the fifth chapter...Wireless Internet Handbook Borko Furht, Mohammad Ilyas......

Harry Agius

2004-07-01T23:59:59.000Z

75

Dynamic, transparent Internet server replication using HYDRANET  

E-Print Network [OSTI]

) in the Internet. These agents will replicate the transport-level service access points of their origin servers and begin serving clients in the name of the origin server. A new protocol and application API was also developed that manages this service replication...

Dillon, Geoffrey A.

1998-01-01T23:59:59.000Z

76

Studying Black Holes in the Internet with Hubble Ethan Katz-Bassett  

E-Print Network [OSTI]

as a top priority in the original design of the Internet protocols, ahead of high perfor- mance or goodStudying Black Holes in the Internet with Hubble Ethan Katz-Bassett Harsha V. Madhyastha John P that operates contin- uously to find Internet reachability problems in which routes exist to a destination

Anderson, Richard

77

Trends in Internet Marketing.  

E-Print Network [OSTI]

??Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for theÖ (more)

Panchanathan, Nitin

2005-01-01T23:59:59.000Z

78

Adaptive Semi-Soft Handoff for Cellular IP Networks Eriko Nurvitadhi  

E-Print Network [OSTI]

to wireless networks becomes a critical issue. For this reason, a number of micro-mobility protocols handoff is still a major obstacle to enabling seamless micro-mobility in wireless access networksAdaptive Semi-Soft Handoff for Cellular IP Networks Eriko Nurvitadhi , Ben Lee , Chansu Yu

Yu, Chansu

79

On the Energy Cost of Robustness and Resiliency in IP Networks , A. Caponea,  

E-Print Network [OSTI]

approaches in saving energy. We propose novel optimization models to minimize the energy consumption of IP protocols (like MPLS) allow us to quantitatively analyze the trade-off between energy cost and level Both network operators and device manufacturers agree that the energy consumption of communications

Paris-Sud XI, Université de

80

Internet Topology Benoit Donnet  

E-Print Network [OSTI]

Internet Topology Discovery Benoit Donnet INL Seminar - 06-07/07/2011 1 1 #12;INL Seminar - Internet Topology Discovery 2 2 #12;INL Seminar - Internet Topology Discovery Agenda 3 · Background Probing - MERLIN · Power Law - Problem - L2 vs. L3 · Conclusion 3 #12;INL Seminar - Internet Topology

Bonaventure, Olivier

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

On the energy cost of robustness and resiliency in IP networks  

Science Journals Connector (OSTI)

Abstract Despite the growing concern for the energy consumption of the Internet, green strategies for network and traffic management cannot undermine Quality of Service (QoS) and network survivability. In particular, two very important issues that may be affected by green networking techniques are resilience to node and link failures, and robustness to traffic variations. In this paper, we study how achieving different levels of resiliency and robustness impacts the network energy-aware efficiency. We propose novel optimization models to minimize the energy consumption of IP networks that explicitly guarantee network survivability to failures and robustness to traffic variations. Energy consumption is reduced by putting in sleep mode idle line cards and nodes according to traffic variations in different periods of the day. To guarantee network survivability we consider two different schemes, dedicated and shared protection, which assign a backup path to each traffic demand and some spare capacity on the links along the path. Robustness to traffic variations is provided by tuning the capacity margin on active links in order to accommodate load variations of different magnitude. Furthermore, we impose some inter-period constraints to guarantee network stability and preserve device lifetime. Both exact and heuristic methods are proposed. Experimentations carried out on realistic networks operated with flow-based routing protocols (like MPLS) allow us to quantitatively analyze the trade-off between energy cost and level of protection and robustness. Results show that significant savings, up to 30%, may be achieved even when both survivability and robustness are fully guaranteed, both with exact and heuristic approaches.

B. Addis; A. Capone; G. Carello; L.G. Gianoli; B. SansÚ

2014-01-01T23:59:59.000Z

82

An Information Services Algorithm to Heuristically Summarize IP Addresses for a Distributed, Hierarchical Directory Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

information services algorithm to heuristically summarize IP addresses for a information services algorithm to heuristically summarize IP addresses for a distributed, hierarchical directory service Marcos Portnoi, Martin Swany Department of Computer and Information Sciences University of Delaware Newark, DE 19716, U.S.A. {portnoi, swany}@cis.udel.edu Jason Zurawski Internet2 Washington, DC 20036, U.S.A. zurawski@internet2.edu Abstract- A distributed, hierarchical information service for computer networks might use several service instances, located in different layers. A distributed directory service, for example, might be comprised of upper level listings, and local directories. The upper level listings contain a compact version of the local directories. Clients desiring to access the information contained in local directories might first access the

83

Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis  

Science Journals Connector (OSTI)

......Automated Validation of Internet Security Protocols and...formalisms is natural in a young research area as researchers...Automated Validation of Internet Security Protocols and...used by principal A. By abuse of notation, we also...Mn . We will slightly abuse notation and refer to......

Carlos Caleiro; Luca ViganÚ; David Basin

2005-11-01T23:59:59.000Z

84

ILC-TCP: An Interlayer Collaboration Protocol for TCP Performance Improvement in Mobile and Wireless  

E-Print Network [OSTI]

Internet has led to the optimization of network protocols to provide for a better performance. Most of the Internet traffic uses TCP, the de- facto transport layer protocol. Unfortunately, TCP performance degrades in the mobile and wireless environments. A good amount of research has been attempted to improve its performance

Helal, Abdelsalam

85

OSCAR: Object Security Architecture for the Internet of Things  

E-Print Network [OSTI]

with each client. The load translates into increased energy consumption and a shortened lifetime of devices the Cooja emulator. We show significant energy savings at constrained servers and reasonable delays. We also a concern. Well designed IP security protocol suites have been ported to constrained devices of Io

Paris-Sud XI, Université de

86

A client oriented, IP level redirection mechanism  

E-Print Network [OSTI]

. Latency for Supporting Clients 2. Latency for Legacy Clients C. Bulk Transfer Time Measurements 10 10 13 13 18 25 27 27 28 29 30 32 36 42 42 46 46 VII APPLICATIONS A. Applications . l. VIobile IP Implementations 2. Relial...- allel Redirected Connections (P. R. C. ), Hash Space Size ? 15 . 15 IP Output Processing Time for s. Non-Redircctcd Session. with Parallel Redirected Connections (P. R. C. ) . 16 IP Processing Time for Single Redirected Session 41 17 TCP Connection...

Gupta, Sumita

1998-01-01T23:59:59.000Z

87

TERRORISM TRUMPS INTERNET ACCESS  

Science Journals Connector (OSTI)

TERRORISM TRUMPS INTERNET ACCESS ... The regulation is in response to fears that terrorists will be able to punch into the Internet and gather theoretical accident information that the government requires for environmental purposes. ...

JEFF JOHNSON

2000-07-03T23:59:59.000Z

88

Avaya one-XTM Deskphone Value Edition 1603 IP Telephone  

E-Print Network [OSTI]

Avaya one-XTM Deskphone Value Edition 1603 IP Telephone User Guide 16-601444 Issue 1 July 2007 #12 ..................................................................................................... 5 Introduction to the 1603 IP Telephone .................................................. 7

89

Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions  

Broader source: Energy.gov (indexed) [DOE]

Service Providers for Acquisition Service Providers for Acquisition and Assistance Transactions Headquarters IP Counsel, GC-62, Paul Gottlieb, 202-586-2802 Carlsbad: GC-62 Richland Operations and Office of River Protection: Berkeley Area Office IP Counsel, Gary Drew, 510- 486-6703 Chicago Office: Chicago IP Counsel, Mark Dvorscak, 630-252- 2393 Idaho Operations: Chicago IP Counsel SWAPA, WAPA: Chicago IP Counsel Rocky Flats Field Office: Chicago IP Counsel Yucca Mountain: Chicago IP Counsel acting through Berkeley Area Office IP Counsel, Gary Drew, 510-486- 6703 Golden Field Office: Golden IP Counsel, Julia Moody, 303-275-4867 National Energy Technology Laboratory: NETL IP Counsel, Lisa Baker, 304-285-4555 NNSA Service Center Including Amarillo and KC: NNSA Service Center IP Counsel, Jim Durkis, 505-845-5172

90

Telecommunications VoIP Work Order  

E-Print Network [OSTI]

Telecommunications VoIP Work Order 1. Fax the completed form to 979.847.1111. 2. **After you submit Desired Signature Date Telecommunications Office Use Only Verizon Work Order # Service Due Date

91

Internet Performance Measurement Collaborators  

E-Print Network [OSTI]

Internet Performance Measurement Collaborators Cross Industry Working Team (XIWT) High Performance of the timestamp mechanism in the ANS Surveyor Probe device FY98 · GITS Internet Performance Measurement Toolkit developed FY99 · GITS measurement systems deployed in the field FY00 Goal To advance the state of the art

92

Towards Securing Interdomain Routing on the Internet Sharon Goldberg  

E-Print Network [OSTI]

up by the routing protocols. 1. We start with a game-theoretic analysis that shows that evenTowards Securing Interdomain Routing on the Internet Sharon Goldberg A Dissertation Presented economic goals. Despite these complex relationships, the interdomain routing system (that allows ASes

Singh, Jaswinder Pal

93

Sustainable Internet Architecture PROJECT DESCRIPTION  

E-Print Network [OSTI]

Sustainable Internet Architecture PROJECT DESCRIPTION 1 Introduction The Internet currently plays that the problems in the current Internet architecture stem from its lack of sustainability which impedes future de of challenges. Numerous research studies on a new Internet architecture (e.g., [16, 37, 48, 54, 55]) have

Kuzmanovic, Aleksandar

94

Internet Users' Glossary  

Science Journals Connector (OSTI)

There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them.

G. Malkin

1996-08-01T23:59:59.000Z

95

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

RESEARCH & INNOVATION OFFICE EASY ACCESS IP AN INTRODUCTION FOR INDUSTRY PARTNERS FEBRUARY 2014 #12 to economic, environmental and social benefits. We believe there are some significant benefits to Easy Access, design and innovation Simple template license agreements means no lengthy and expensive negotiations

University of Technology, Sydney

96

Response Protocol Distressed Students  

E-Print Network [OSTI]

Response Protocol Distressed Students REFERRAL IDENTIFIERS: Student distress may manifest, the Distressed Student Protocol will assist you in responding to the student and providing appropriate referrals

California at Santa Barbara, University of

97

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An...

98

Managing IP for NSF Oregon State University (OSU) has strength in the area of Intellectual Property (IP) protection  

E-Print Network [OSTI]

that allows for collaboration with industrial partners throughout the research and commercialization process (IP) protection and commercialization through coordination with industrial partners and has a well-established Office for Commercialization & Corporate Development (OCCD). An IP agreement will be established

Escher, Christine

99

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic  

E-Print Network [OSTI]

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic to ensure connectivity of the mobile nodes with the Internet. However, there has been no comprehensive cost analysis of mobility protocol entities that considers all possible costs. In this paper, we have developed

Atiquzzaman, Mohammed

100

On Runtime Adaptation of Application-Layer Multicast Protocol  

E-Print Network [OSTI]

¨ubsch, Christoph P. Mayer, and Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology (KIT), Germany {huebsch,mayer,waldhorst}@kit.edu Reasonable choice of protocol parameters is crucial., a clean implementation of multicast communication within the Internet architecture has been proposed

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Raj JainThe Ohio State University IP Next GenerationIP Next GenerationIP Next GenerationIP Next Generation  

E-Print Network [OSTI]

FormatIP Address Format u Three all-zero network numbers are reserved u 127 Class A + 16,381 Class B + 2;Raj JainThe Ohio State University 7 How Many Addresses?How Many Addresses? u 10 Billion people by 2020 7-character address at 64k nodes H = 0.14 (assuming 5 bits/char) u Physics/space science net

Jain, Raj

102

Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions  

Broader source: Energy.gov (indexed) [DOE]

Counsel for DOE Laboratories Counsel for DOE Laboratories Headquarters: IP Counsel, Paul Gottlieb, 202-586-2802 Bettis Atomic Power Laboratory Knolls Atomic Power Laboratory (KAPL) Chicago Office: Chicago IP Counsel, Mark Dvorscak, 630-252-2393 Argonne National Laboratory Ames Laboratory Bonneville Power Administration Brookhaven National Laboratory Princeton Plasma Physics Laboratory Fermi National Acceleration Laboratory National Renewable Energy Laboratory Idaho National Laboratory Lawrence Berkeley National Laboratory, (acting through Berkeley Site Office IP Counsel, Gary Drew, 510- 486- 6703) National Energy Technology Laboratory: NETL IP Counsel, Lisa Jarr, 304- 285-4555 NNSA Service Center Including Amarillo and KC: NNSA Service Center IP Counsel, Jim Durkis, 505-845-5172

103

P26W-5 eCo iPs P24W-5 eCo iPs special features In Plane Switching (IPS), 0 Watt  

E-Print Network [OSTI]

Watt in power save mode, ECO button, Auto Brightness Control (ABC), DisplayViewTM IT Suite In Plane Switching (IPS), 0 Watt in power save mode, ECO button, Auto Brightness Control (ABC), Display P22W-5 eCo iPs P19-5P eCo special features In Plane Switching (IPS), 0 Watt in power save mode, ECO

Ott, Albrecht

104

IPS- Industrial Power Systems | Open Energy Information  

Open Energy Info (EERE)

IPS- Industrial Power Systems IPS- Industrial Power Systems Jump to: navigation, search Name IPS- Industrial Power Systems Address 1650 Indianwood Circle Place Maumee, Ohio Zip 43537 Sector Biofuels, Biomass, Buildings, Carbon, Efficiency, Hydro, Solar, Vehicles, Wind energy Product Engineering/architectural/design;Installation; Maintenance and repair; Other:Construction Phone number 419-531-3121 Website http://www.IPSContractor.com Coordinates 41.5867081¬į, -83.6797736¬į Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.5867081,"lon":-83.6797736,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

105

Integrated Internet collaboration  

Science Journals Connector (OSTI)

...e-commerce, Intranet, remote collaboration...and other new technologies. They should be...being realized. Technologies, such as INSP...Internet and intranet computing allows...e-commerce, Intranet, remote collaboration...and other new technologies. They should be...

Dimitri Bevc; Alexander M. Popovici

106

Service Oriented Internet Jaideep Chandrashekar  

E-Print Network [OSTI]

propose a novel, overlay based Service Oriented Internet architecture that is meant to serve as a flexible elsewhere. In this paper, we describe a new architecture -- the "Service Oriented Internet" or SOI, whichService Oriented Internet Jaideep Chandrashekar ¬° , Zhi-Li Zhang ¬° , Zhenhai Duan ¬° , and Y

Duan, Zhenhai

107

A Genetic Algorithm for the Weight Setting Problem in OSPF Routing  

E-Print Network [OSTI]

Oct 9, 2001 ... lines. AT&T Worldnet is an example of a large ISP. The larger ISPs ... transmission information, such as the destination Internet Protocol (IP)†...

2001-10-09T23:59:59.000Z

108

Internet-Enabled Supply ChainsInternet-Enabled Supply Chains Quan Z. Sheng, University of Adelaide  

E-Print Network [OSTI]

89 Internet-Enabled Supply ChainsInternet-Enabled Supply Chains Quan Z. Sheng, University of the Internet-enabled Supply Chain 89 Key Supply Chain Processes and the Internet 89 Impacts of Internet-Enabled Supply Chains 92 Enabling Technologies for Internet-Enabled Supply Chain Management 92 Internet-based EDI

Sheng, Michael

109

Webinar: Hydrogen Refueling Protocols  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

110

Application Protocol Reference Architecture Application Protocol Reference Architecture  

E-Print Network [OSTI]

Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

van Sinderen, Marten

111

Lessons Learned in the Design and Use of IP1 / IP2 Flexible Packaging - 13621  

SciTech Connect (OSTI)

For many years in the USA, Low Level Radioactive Waste (LLW), contaminated soils and construction debris, have been transported, interim stored, and disposed of, using IP1 / IP2 metal containers. The performance of these containers has been more than adequate, with few safety occurrences. The containers are used under the regulatory oversight of the US Department of Transportation (DOT), 49 Code of Federal Regulations (CFR). In the late 90's the introduction of flexible packaging for the transport, storage, and disposal of low level contaminated soils and construction debris was introduced. The development of flexible packaging came out of a need for a more cost effective package, for the large volumes of waste generated by the decommissioning of many of the US Department of Energy (DOE) legacy sites across the US. Flexible packaging had to be designed to handle a wide array of waste streams, including soil, gravel, construction debris, and fine particulate dust migration. The design also had to meet all of the IP1 requirements under 49CFR 173.410, and be robust enough to pass the IP2 testing 49 CFR 173.465 required for many LLW shipments. Tens of thousands of flexible packages have been safely deployed and used across the US nuclear industry as well as for hazardous non-radioactive applications, with no recorded release of radioactive materials. To ensure that flexible packages are designed properly, the manufacturer must use lessons learned over the years, and the tests performed to provide evidence that these packages are suitable for transporting low level radioactive wastes. The design and testing of flexible packaging for LLW, VLLW and other hazardous waste streams must be as strict and stringent as the design and testing of metal containers. The design should take into consideration the materials being loaded into the package, and should incorporate the right materials, and manufacturing methods, to provide a quality, safe product. Flexible packaging can be shown to meet the criteria for safe and fit for purpose packaging, by meeting the US DOT regulations, and the IAEA Standards for IP-1 and IP-2 including leak tightness. (authors)

Sanchez, Mike [VP Global Sales, PacTec, Inc. (United States)] [VP Global Sales, PacTec, Inc. (United States); Reeves, Wendall [National Sales Manager, PacTec, Inc. (United States)] [National Sales Manager, PacTec, Inc. (United States); Smart, Bill [Nuclear Sales Director, PacTec, Inc. (United States)] [Nuclear Sales Director, PacTec, Inc. (United States)

2013-07-01T23:59:59.000Z

112

Diploma in Management Internet Business concentration  

E-Print Network [OSTI]

, telecommunications, the internet and the Web as well as a good understanding of consumer behaviour. Our internet1 Diploma in Management Internet Business concentration Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part

Pientka, Brigitte

113

Increasing pipelined IP core utilization in Process Networks using Exploration  

E-Print Network [OSTI]

Increasing pipelined IP core utilization in Process Networks using Exploration Claudiu Zissulescu pipelined. In this paper, we present an exploration methodology that uses feedback provided by the Laura tool to increase the uti- lization of IP cores embedded in our PN network. Using this exploration, we

Kienhuis, Bart

114

IP: The Next Generation Written by Scott Phillips.  

E-Print Network [OSTI]

providers i.e. trusted providers. q Scalable multicast. Multicast in IP is only possible in subnetsIP: The Next Generation Written by Scott Phillips. This page is a general overview of the IPng, B, C and D (a fifth class, class E, is only for research purposes). These classes differ

Jain, Raj

115

IP Networking Lab http://inl.info.ucl.ac.be  

E-Print Network [OSTI]

Eduroam - Abuse scenario 12 Stockholms universitet UCL Internet user: Beck@SU.se Swedish Authority Belgian Belgium, Jan 2009 Eduroam - Abuse scenario 13 Stockholms universitet UCL Internet Swedish Authority Context : Open WiFi Roaming 3 H F Internet #12;ALAWN - Technical aspects D. Leroy, M. Manulis, F. Koeune

Bonaventure, Olivier

116

Characterizing internet scams through underground infrastructure infiltration  

E-Print Network [OSTI]

the symp- toms of abuse on the Internet. Through interposingInternet as a medium for communication and commerce has attracted many actors who abuseAbuse Working Group (MAAWG) in 2009, estimate that 29% and 12%, respectively, of Internet

Kanich, Christopher William

2012-01-01T23:59:59.000Z

117

Raj JainThe Ohio State University IP Next Generation (IPv6)IP Next Generation (IPv6)  

E-Print Network [OSTI]

The Ohio State University 4 IP Address FormatIP Address Format q Three all-zero network numbers people by 2020 q Each person will be served by more than one computer q Assuming 100 computers per person 7-character address at 64k nodes H = 0.14 (assuming 5 bits/char) q Physics/space science net

Jain, Raj

118

Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet  

E-Print Network [OSTI]

Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet Invited Paper characteristics that can be leveraged to design energy-efficient loss recovery mechanisms. Given their loss, we first present an analysis of an energy-efficient MAC-layer protocol, called Fast Transmit MAC

Kravets, Robin

119

Asymmetric responses, risk seeking and internet bubble  

Science Journals Connector (OSTI)

We measure internet bubbles to verify the existence and evaporation of the internet bubble in early 2000. Then, we compare investor responses to internet stocks with those to traditional stocks to find how the internet bubble formed. Empirical results confirm that the internet bubble existed between 1998 and 1999, but began to evaporate in early 2000. Further, we find that the internet bubble formed due to investors' irrational overreaction to internet firms' positive outlooks and underreaction to internet firms' negative outlooks relative to their reactions to traditional firms. This finding supports our hypotheses that asset bubbles formed due to investors' extreme risk-seeking asymmetric responses to good and bad information.

Jaehan Koh; Bin Wang; Lai C. Liu; Kai S. Koong

2010-01-01T23:59:59.000Z

120

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Office Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Services ¬Ľ Oversight ¬Ľ Safety & Emergency Management Evaluations Services ¬Ľ Oversight ¬Ľ Safety & Emergency Management Evaluations ¬Ľ Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

122

Energy and Cost Efficiency of Adaptive and Mixed-Line-Rate IP Over DWDM Networks  

Science Journals Connector (OSTI)

Optimization of IP over DWDM networks is studied under constraints of cost (CAPEX) and energy consumption. Realistic IP traffic mapped to the optical ...

Klekamp, Axel; Gebhard, Ulrich; Ilchmann, Frank

2012-01-01T23:59:59.000Z

123

SPTP: A Trust Management Protocol for Online and Ubiquitous Systems  

Science Journals Connector (OSTI)

With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, ... Keywords: Privacy Framework, SPT, Security, Trust Management, Trust and Privacy Protocol, Cloud, Collective Intelligence, mHealth, Ubiquitous Computing, Mobile Computing, Online Advertising Privacy

Ivor D. Addo, Ji-Jiang Yang, Sheikh I. Ahamed

2014-07-01T23:59:59.000Z

124

Response Protocol Distressed Students  

E-Print Network [OSTI]

Response Protocol Distressed Students REFERRAL IDENTIFIERS: Student distress may manifest, the Distressed Student Protocol will assist you in responding to the student and providing appropriate referrals not know which office to contact.The coordinators will consult about a student, provide referrals to campus

California at Santa Barbara, University of

125

Experimental Study of an IP Model for the View Selection Problem by Zohreh Asgharzadeh Talebi, Rada Chirkova, and Yahya Fathi  

E-Print Network [OSTI]

to solve IP time needed to solve IPR time needed to solve with HHRU IP Answer IPR Answer HHRU Answer IP/IPR HHRU/IPR HHRU/IP 1 2 64

Young, R. Michael

126

Sustained signalling by PTH modulates IP3 accumulation and IP3 receptors via cyclic AMP junctions  

E-Print Network [OSTI]

activates Gs, stimulation of AC 61 and so formation of cAMP. When PTH1R or Gq is expressed at high levels, PTH1R can also 62 stimulate phospholipase C (PLC) (Taylor and Tovey, 2012), which catalyses formation of 63 inositol 1,4,5-trisphosphate (IP3... , 2012; van der Lee et al., 2013). Furthermore, some analogues of PTH favour coupling 67 of PTH1R to AC via Gs, while others favour PLC coupling (Cupp et al., 2013; Fujimori et al., 68 1991; Gesty-Palmer and Luttrell, 2011; Takasu et al., 1999...

Meena, Abha; Tovey, Stephen C.; Taylor, Colin W.

2014-11-27T23:59:59.000Z

127

Unleashing the Intranet  

Science Journals Connector (OSTI)

Many people have heard of or used the Internet. An intranet is nothing more complicated than an internal network which makes use of Internet technologies based on TCP/IP (transmission control protocol ... Zona Re...

R. Cochrane

1998-01-01T23:59:59.000Z

128

MHK Technologies/IPS OWEC Buoy | Open Energy Information  

Open Energy Info (EERE)

IPS OWEC Buoy IPS OWEC Buoy < MHK Technologies Jump to: navigation, search << Return to the MHK database homepage IPS OWEC Buoy.jpg Technology Profile Primary Organization Interproject Service AB Technology Resource Click here Wave Technology Readiness Level Click here TRL 1 3 Discovery Concept Def Early Stage Dev Design Engineering Technology Description The IPS OWEC Offshore Wave Energy Converter Buoy is a system for generating electricity from ocean waves at a cost competitive with fossil fuel generated power Cluster of buoys gives energy and act as wave breaker Off shore wave energy converters and systems with great flexibility Units from 10 kW 150 kW annual mean power A new interesting alternative for the internal energy conversion is based on a set of hose pumps driven by the piston in the acceleration tube pumping water to a small turbine directly coupled to a special generator

129

Deriving traffic demands for operational IP networks: methodology and experience  

Science Journals Connector (OSTI)

Engineering a large IP backbone network without an accurate, network-wide view of the traffic demands is challenging. Shifts in user behavior, changes in routing policies, and failures of network elements can result in significant (and sudden) fluctuations ...

Anja Feldmann; Albert Greenberg; Carsten Lund; Nick Reingold; Jennifer Rexford; Fred True

2000-08-01T23:59:59.000Z

130

VoIP Quality Evaluation in Mobile Wireless Networks  

Science Journals Connector (OSTI)

Managing voice service quality over both IP-based wired and wireless networks has become a challenge, especially in a heterogeneous network environment. This paper discusses the issues that affect voice qualit...

1; 2Pei-Jeng Kuo; Koji Omae; Ichiro OkajimaÖ

2002-01-01T23:59:59.000Z

131

Rate-adaptive H.264 for TCP/IP networks  

E-Print Network [OSTI]

While there has always been a tremendous demand for streaming video over TCP/IP networks, the nature of the application still presents some challenging issues. These applications that transmit multimedia data over best-effort networks like...

Kota, Praveen

2007-09-17T23:59:59.000Z

132

Population SAMC, ChIP-chip Data Analysis and Beyond  

E-Print Network [OSTI]

This dissertation research consists of two topics, population stochastics approximation Monte Carlo (Pop-SAMC) for Baysian model selection problems and ChIP-chip data analysis. The following two paragraphs give a brief introduction to each...

Wu, Mingqi

2011-02-22T23:59:59.000Z

133

Estimation of Voice over IP Quality in the Netherlands  

E-Print Network [OSTI]

Estimation of Voice over IP Quality in the Netherlands X. Zhou1 , F. Muller1 , R. E. Kooij1,2 , and P. Van Mieghem1 1 Delft University of Technology, P.O. Box 5031, 2600 GA Delft, The Netherlands {X, The Netherlands R.E.Kooij@telecom.tno.nl Abstract. We have analyzed the measurements of end-to-end VoIP packets

Van Mieghem, Piet

134

Internet Engineering Task Force S. Floyd INTERNET-DRAFT E. Kohler  

E-Print Network [OSTI]

Internet Engineering Task Force S. Floyd INTERNET-DRAFT E. Kohler Intended status: Informational draft-irtf-tmrg-tools-05.txt Status of this Memo By submitting this Internet-Draft, each author 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas

Floyd, Sally

135

Graduate Certificate in Internet Business Looking for a Career in Internet Business?  

E-Print Network [OSTI]

, telecommunications, the internet and the Web as well as a good understanding of consumer behaviour. Our internet1 Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part

Pientka, Brigitte

136

Internet Engineering Task Force INTERNET-DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force INTERNET-DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne draft Status of this Memo This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also

Lennox, Jonathan

137

Substance abuse precedes internet addiction  

Science Journals Connector (OSTI)

Abstract The purpose of the current study was to evaluate possible overlapping substance abuse and internet addiction in a large, uniformly sampled population, ranging in age from 13 to 18†years. Participants (N†=†73,238) in the current study were drawn from the 6th Korea Youth Risk Behavior Web-based Survey (KYRBWS-V) for students from 400 middle schools and 400 high schools in 16 cities within South Korea. Of adolescent internet users, 85.2% were general users (GU), 11.9% were users with potential risk for internet addiction (PR), and 3.0% were users with high risk for internet addiction (HR). There was a difference in the number of students with alcohol drinking among the GU, PR, and HR groups (20.8% vs 23.1% vs 27.4%). There was a difference in the number of students who smoked among the GS, PR, and HR groups (11.7% vs 13.5% vs 20.4%). There was a difference in the number of students with drug use among the GU, PR, and HR groups (1.7% vs 2.0% vs 6.5%). After adjusting for sex, age, stress, depressed mood, and suicidal ideation, smoking may predict a high risk for internet addiction (OR†=†1.203, p†=†0.004). In addition, drug use may predict a high risk for internet addiction (OR†=†2.591, p†internet addiction have vulnerability for addictive behaviors, co-morbid substance abuse should be evaluated and, if found, treated in adolescents with internet addiction.

Young Sik Lee; Doug Hyun Han; Sun Mi Kim; Perry F. Renshaw

2013-01-01T23:59:59.000Z

138

Using Gopher on the Internet  

SciTech Connect (OSTI)

This report is a complication of vugraphs with respect to the use of Gopher on Internet. There are viewgraphs on using Gopher at the University of California at Santa Cruz. Examples of other Internet Gopher servers around the world are given. Also discussed is the Library of Congress Gopher and JUGHEAD which is an acronym for Jonzy`s Universal Gopher Hierarchy Excavation And Display.

Davidoff, G.

1994-04-01T23:59:59.000Z

139

Office Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012...

140

SCADA protocol vulnerabilities  

Science Journals Connector (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Protocol design contests  

E-Print Network [OSTI]

In fields like data mining and natural language processing, design contests have been successfully used to advance the state of the art. Such contests offer an opportunity to bring the excitement and challenges of protocol ...

Winstein, Keith

142

An Approach for QoS Measurements in IP Multicast Networks MQM -Multicast Quality Monitor  

E-Print Network [OSTI]

An Approach for QoS Measurements in IP Multicast Networks MQM - Multicast Quality Monitor Falko@acm.org Abstract MQM - Multicast Quality Monitor represents a new approach to measure QoS within an IP multicast which builds a very basis for the measurements. Keywords IP Multicast, Quality of Service, IP

Breu, Ruth

143

Optimal protocols for nonlocality distillation  

SciTech Connect (OSTI)

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

144

Algorithms for Large-Scale Internet Measurements  

E-Print Network [OSTI]

Methods . . . . . . . . . . . . . . . . . . . 95 4.4.1 IP-sequential . . . . . . . . . . . . . . . . . . . . . . . . 96 4.4.2 Uniform Pattern . . . . . . . . . . . . . . . . . . . . . . 97 4.4.3 Uniform Detection Probability... scan pattern, we derive their respective SCT?s and show that the uniform permutation is generally much stealthier than IP-sequential. However, contrary to common belief [3], [41], [59], we demonstrate that in some cases IP-sequential is stealthier...

Leonard, Derek Anthony

2012-02-14T23:59:59.000Z

145

Alexithymia and internet abuse in young adults  

Science Journals Connector (OSTI)

Problematic internet use has become a growing concern in recent years due to expanded access and dependence on the internet. This study examined the relationship between alexithymia and internet abuse in a sample of young adults (165 males and 650 females). Participants completed the Internet Addiction Test (IAT) and the TAS-20. The alexithymic group (n†=†105) scored significantly higher than the non-alexithymic group (n†=†532) on all of the IAT scales: withdrawal scale, F(1,632)†=†31.21, p†internet abuse and emphasize the need to address these underlying vulnerabilities when treating internet abuse.

R.N. Taylor; R. Koerber; J.D.A. Parker; S.B. Maitland

2014-01-01T23:59:59.000Z

146

Efficient Data Transfer Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ‚ąó , Ezra Kissel ‚Ć , Martin Swany ‚Ć , Eric Pouyoul ‚ąó ‚ąó Lawrence Berkeley National Laboratory, Berkeley, CA 94270 ‚Ć School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

147

Standard Intellectual Property (IP) Provisions for Financial Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Standard Intellectual Property (IP) Provisions for Financial Standard Intellectual Property (IP) Provisions for Financial Assistance Awards Standard Intellectual Property (IP) Provisions for Financial Assistance Awards Click on Set Number to Access Provisions: Type of Award Type of Project Special Data Statute e.g., EPACT) Type of Recipient Set Number (PDF) Cooperative Agreement Research, Development, or Demonstration (RD&D) No Domestic Small Business CSB-1003 Cooperative Agreement RD&D Yes Domestic Small Business CDSB-1003 Cooperative Agreement RD&D No Large Business, State or Local Government, and Foreign Entity CLB-1003 Cooperative Agreement RD&D Yes Large Business, State or Local Government, and Foreign Entity CDLB-1003 Grant RD&D No Domestic Small Business GSB-1003 Grant RD&D Yes Domestic Small Business GDSB-1003

148

APS Protocol for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

149

A Handy Internet Politics Measurement Note Internet Politcs Measurement Measurement and analysis on the Internet politics through  

E-Print Network [OSTI]

A Handy Internet Politics Measurement Note Internet Politcs Measurement ­ Measurement and analysis on the Internet politics through case studies on (i) well-known but failed technical ideas in history, (ii........................................................................................................4 Abuse of Censorship-free Speech, "Human Search Engine" (China) ...............................4

Kuzmanovic, Aleksandar

150

Public Health Policy For Internet Cigarette Retailers  

E-Print Network [OSTI]

Internet cigarette retailers to avoid local cigarette prices); see also National Household Survey on Drug Abuse,Internet cigarette retailers to avoid local cigarette prices); see also National Household Survey on Drug Abuse,

Banthin, Christopher

2005-01-01T23:59:59.000Z

151

The Evolution of International Internet Telephony  

E-Print Network [OSTI]

International Internet Telephony has been evolving since its introduction in 1996. In 1996, the typical player was

McGarty, Terrence

152

Internet Engineering Task Force Individual Submission INTERNET-DRAFT J. Lennox, J. Rosenberg, H. Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force Individual Submission INTERNET-DRAFT J. Lennox, J. Rosenberg, H Gateway Interface for SIP Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

153

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation  

E-Print Network [OSTI]

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation Louis Saint Louis, MO 63130 jain@cse.wustl.edu Abstract-- The basic ideas of the Internet architecture switching. Is this the way we would design the Internet if we were to start it now? This paper is an attempt

Jain, Raj

154

Research and the Internet connection  

Science Journals Connector (OSTI)

... to cut funding for fusion research by a third. The Princeton Plasma Physics Laboratory (PPPL) says that the loss of one quarter of its staff means that collaboration with ... means that collaboration with researchers at other universities over the Internet has become "essential". PPPL recently began transmitting sound and video from the control room of its Tokamak Fusion Test ...

Declan Butler

1996-04-04T23:59:59.000Z

155

Internet Data logging and Display  

E-Print Network [OSTI]

. The solution presented here is to accomplish these goals is to include a miniature web server in a remote-logging module, which we designed as part of our device. Thus allowing data to be accessed more frequently, via the Internet. As it currently stands...

Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

2001-01-01T23:59:59.000Z

156

Timekeeping in the Interplanetary Internet  

E-Print Network [OSTI]

vehicles, retrieve data for later transmission to Earth · Spacecraft ­ transport orbiters and surface, network routing, ephemeris maintenance and general timekeeping #12;2-Aug-04 3 IPIN issues o Transmission Transmission speeds are highly variable, but in general far slower than Earth internet o Spacecraft position

Mills, David L.

157

Measuring Internet Performance: Challenges and Opportunities  

E-Print Network [OSTI]

Measuring Internet Performance: Challenges and Opportunities Rocky K. C. Chang Internet;Internet Infrastructure and Security Laboratory 2 #12;Measuring end-to-end performance · Source: Akamai's network performance comparison 3 #12;End-to-end network monitoring ... 4 #12;Why measuring network path

Chang, Rocky Kow-Chuen

158

The End of Internet Architecture Timothy Roscoe  

E-Print Network [OSTI]

back and asks a more radical question: is an internet ar- chitecture a good thing at all? Are weThe End of Internet Architecture Timothy Roscoe National ICT Australia, Sydney Intel Research have seen considerable publishing activ- ity in the area of "internet architecture". This paper steps

Roscoe, Timothy

159

Applying Quantitative Marketing Techniques to the Internet  

E-Print Network [OSTI]

. Blattberg and Deighton [1991] laid out a good framework for Internet marketing in their articleApplying Quantitative Marketing Techniques to the Internet by Alan L. Montgomery Carnegie Mellon with clickstream data. I illustrate these four modeling techniques and discuss their potential for solving Internet

Faloutsos, Christos

160

Modeling Internet Topology Dynamics Hamed Haddadi  

E-Print Network [OSTI]

graphs. Generation of the topology of the Internet calls for a model that achieves a good balance betweenModeling Internet Topology Dynamics Hamed Haddadi University College London Steve Uhlig Delft and inference, there still exists ambiguity about the real nature of the Internet AS and router level topol- ogy

Haddadi, Hamed

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

EVALUATION OF EVIDENCE IN INTERNET AUCTION  

E-Print Network [OSTI]

allegations about the sale of counterfeit goods at Internet auction sites. Also, it applies a Bayesian- livering the goods that are offered for sale. As a result, Internet auction fraud is the most common type of Internet auction fraud in Hong Kong related to the sale of counterfeit goods (i.e., goods bear- ing false

Overill, Richard E.

162

Future Internet Infrastructures for FI Prototyping  

E-Print Network [OSTI]

++ Fraunhofer Institute FOKUS, Berlin ++ www.fokus.fraunhofer.de/go/innovation ++ 11¬≠2009 #12;Future Internet Berlin AV de- partment (Architektur f√ľr Vermittlungskno- ten). Part of the Fraunhofer innovation clusFuture Internet Infrastructures for FI Prototyping NGN Evolution toward Future Internet Fraunhofer

Wichmann, Felix

163

MAPS MANUAL 2010 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2010 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

164

MAPS MANUAL 2014 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2014 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

165

MAPS MANUAL 2008 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2008 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Jim Saracco

DeSante, David F.

166

MAPS MANUAL 2013 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2013 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

167

MAPS MANUAL 2011 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2011 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

168

MAPS MANUAL 2012 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2012 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

169

RadNet: Open network protocol for radiation data  

SciTech Connect (OSTI)

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

170

Efficiently Monitoring Bandwidth and Latency in IP Networks  

E-Print Network [OSTI]

topologies. I. INTRODUCTION £ HE explosive growth in Internet and intranet deployment for a constantly- ternet link characteristics [6], [7], and packet-pair algorithms for measuring link bandwidth [8], [9

Chan, Chee Yong

171

The Cisco SRP MAC Layer Protocol  

Science Journals Connector (OSTI)

This document specifies the MAC layer protocol, "Spatial Reuse Protocol" (SRP) for use with ring based media. This is a second version of the protocol (V2).

D. Tsiang; G. Suwala

2000-08-01T23:59:59.000Z

172

Evaluation of IP Fast Reroute Proposals Minas Gjoka  

E-Print Network [OSTI]

which avoid micro loops under node or link failures. In this paper we present a comprehensive analysis convergence time in today's networks. These convergence times can be of the order of 100's of milliseconds or even 10's of seconds in the BGP networks. IP-based networks have evolved significantly over the past

Yang, Xiaowei

173

The Long Wavelength Array (LWA) and Interplanetary Scintillation (IPS)  

E-Print Network [OSTI]

the following advantages: (1) Higher sensitivity; (2) Higher accuracy on the measurement of solar wind speed; (3 the inhomogeneous plasma (solar wind) in the interplanetary space. Observing the IPS using ground based telescopes) (Vitkevich et al. 1976) adopted single station-single frequency observations (SSSF) and used the power

Ellingson, Steven W.

174

Innovations & IP Management:g : Status, Challenges and Future  

E-Print Network [OSTI]

of the Intellectual Property and Technology f ( & ) i i A h h hTransfer (IP&TT) unit in August 2010 through a research Asked Questions (FAQs) that are available on the university intranet for staff to refer. #12;Innovation areas so far:Innovation areas so far: · New technologies in:· New technologies in: Agriculture

Ge, Zigang

175

Supplement No. 2 to the FUSRAP Summary Protocol Ė Verification and Certification Protocol  

Broader source: Energy.gov [DOE]

Supplement No. 2 to the FUSRAP Summary Protocol Ė Verification and Certification Protocol (November 1985, Rev. 1)

176

T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of...  

Broader source: Energy.gov (indexed) [DOE]

77: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability July 27, 2011 -...

177

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 -...

178

PROCESS DEVELOPMENT FOR ZnO-BASED DEVICES KELLY PUI SZE IP  

E-Print Network [OSTI]

PROCESS DEVELOPMENT FOR ZnO-BASED DEVICES By KELLY PUI SZE IP A DISSERTATION PRESENTED OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2005 #12;Copyright 2005 by Kelly Pui Sze Ip #12;To my family

Pearton, Stephen J.

179

IP CN Crosby, ND Natural Gas Pipeline Imports From Canada (Dollars...  

U.S. Energy Information Administration (EIA) Indexed Site

IP CN Crosby, ND Natural Gas Pipeline Imports From Canada (Dollars per Thousand Cubic Feet) IP CN Crosby, ND Natural Gas Pipeline Imports From Canada (Dollars per Thousand Cubic...

180

Extremal quantum protocols  

E-Print Network [OSTI]

Generalized quantum instruments correspond to measurements where the input and output are either states or more generally quantum circuits. These measurements describe any quantum protocol including games, communications, and algorithms. The set of generalized quantum instruments with a given input and output structure is a convex set. Here we investigate the extremal points of this set for the case of finite dimensional quantum systems and generalized instruments with finitely many outcomes. We derive algebraic necessary and sufficient conditions for extremality.

Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-01-25T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Communication complexity protocols for qutrits  

SciTech Connect (OSTI)

Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

Tamir, Boaz [Department of History and Philosophy of Science, Bar-Ilan University, Ramat-Gan (Israel)

2007-03-15T23:59:59.000Z

182

Design and study of VoIP model in cognitive radio network under different simulation platforms  

Science Journals Connector (OSTI)

Rapid growth followed by increasing popularity in VoIP systems has witnessed rollout to new services and applications in emerging technologies like Cognitive Radio Networks (CRN). The stringent QoS requirements in VoIP coupled with the complexities in ... Keywords: OPNET modeler 16.0.A, Visual C++, cognitive radio network, simulation, voice over IP

Tamal Chakraborty; Iti Saha Misra; Salil Kumar Sanyal

2012-09-01T23:59:59.000Z

183

VLSI Design IP Protection: Solutions, New Challenges, and Opportunities Lin Yuan and Gang Qu  

E-Print Network [OSTI]

VLSI Design IP Protection: Solutions, New Challenges, and Opportunities Lin Yuan and Gang Qu Electrical and Computer Engineering Department and Institute for Advanced Copmuter Studies University the need of VLSI design intellectual property (IP) protection was identified [1,2]. The goals of IP

Ghouti, Lahouari

184

Energy Efficiency Savings Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

185

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the  

Broader source: Energy.gov (indexed) [DOE]

48: Avaya IP Office Manager TFTP Server Lets Remote Users 48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Avaya IP Office Manager. A remote user can view files on the target system. PLATFORM: Versions 5.0.x - 6.1.x ABSTRACT: The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. reference LINKS: ASA-2011-156 SecurityTracker Alert ID: 1025664 Secunia Advisory: SA43884 Avaya Support IMPACT ASSESSMENT: Medium Discussion: Avaya IP Office Manager is an application for viewing and editing an IP Office system's configuration. It can be used to securely connect to and

186

U-051: Skype Discloses IP Addresses to Remote Users | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

51: Skype Discloses IP Addresses to Remote Users 51: Skype Discloses IP Addresses to Remote Users U-051: Skype Discloses IP Addresses to Remote Users December 5, 2011 - 7:00am Addthis PROBLEM: A remote user can determine the IP address of a Skype user. PLATFORM: Skype application ABSTRACT: Skype Discloses IP Addresses to Remote Users reference LINKS: SecurityTracker Alert ID: 1026370 Forbes: Skype Flaw IMPACT ASSESSMENT: High Discussion: A remote user can initiate a Skype call to a target user to determine the target user's IP address and then terminate the call before the target user's Skype application has indicated an incoming call. The remote user does not need to be on the target user's contact list. Armed with an IP address, hackers can uncover specific information about victims, including who they chat with, what they download while online, and

187

internet of things | OpenEI Community  

Open Energy Info (EERE)

internet of things Home No Battery Wearables Description: Wearable IT and communication devices that don't require a battery. This group is for discussion about innovations in...

188

Traditional marketing vs. Internet marketing. A comparison.  

E-Print Network [OSTI]

?? Title: Traditional marketing vs. Internet marketing: A comparison Problem: Marketing is an important strategy for businesses and it contains numerous effective tools. Traditional marketingÖ (more)

Varfan, Mona

2008-01-01T23:59:59.000Z

189

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

190

Diploma in Internet Business Technology 1 McGill University  

E-Print Network [OSTI]

of programming, databases, networks, telecommunications, the internet and the Web as well as a good understandingDiploma in Internet Business Technology 1 McGill University Diploma in Internet Business Technology Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have

Pientka, Brigitte

191

Confessions of an Internet alautun, Maya glyph  

E-Print Network [OSTI]

Confessions of an Internet Timekeeper alautun, Maya glyph David L. Mills University of Delaware http://www.eecis.udel.edu/~mills mailto:mills@udel.edu 14-Feb-07 1 #12;On the Internet cultural algorithms, timekeeping and growing pains. ­ Along the way I developed an obsession to wind every computer

Mills, David L.

192

The Internet of Things: A survey  

Science Journals Connector (OSTI)

This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, ... Keywords: Internet of Things, Pervasive computing, RFID systems

Luigi Atzori; Antonio Iera; Giacomo Morabito

2010-10-01T23:59:59.000Z

193

Modeling the World from Internet Photo Collections  

Science Journals Connector (OSTI)

There are billions of photographs on the Internet, comprising the largest and most diverse photo collection ever assembled. How can computer vision researchers exploit this imagery? This paper explores this question from the standpoint of 3D scene modeling ... Keywords: 3D navigation, 3D scene analysis, Internet imagery, Photo browsers, Structure from motion

Noah Snavely; Steven M. Seitz; Richard Szeliski

2008-11-01T23:59:59.000Z

194

Page 1 of 4 Housing Internet Services  

E-Print Network [OSTI]

of Technology #12;Page 2 of 4 Introduction to Curtin Internet Services Internet services from Housing Guide). Access to the Curtin INTRANET (Curtin web pages remains free) Choose an alternative external is provided in setting up your account or choosing an ISP. Access to the Curtin INTRANET (Curtin web pages

195

An Intermittent Energy Internet Architecture Barath Raghavan  

E-Print Network [OSTI]

's energy infrastructure and will likely include significant de- ployment of intermittent renewable energyAn Intermittent Energy Internet Architecture Barath Raghavan ICSI David Irwin UMass Jeannie-design the Internet for an energy- constrained future powered by diffuse, intermittent, and expensive power sources

Shenoy, Prashant

196

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote...  

Broader source: Energy.gov (indexed) [DOE]

26: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability...

197

Unraveling Internet identities : accountability & anonymity at the application layer  

E-Print Network [OSTI]

Both anonymity and accountability play crucial roles in sustaining the Internet's functionality, however there is a common misconception that increasing the anonymity of Internet identities necessitates diminishing their ...

Wolff, Josephine Charlotte Paulina

2012-01-01T23:59:59.000Z

198

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

199

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

200

Spiral structure in IP Pegasi; how persistent is it?  

E-Print Network [OSTI]

We present spectroscopy of the dwarf nova IP Pegasi taken during two consecutive nights, 5 and 6 days after the start of an outburst. Even this late in the outburst, Doppler maps show marked spiral structure in the accretion disc, at least as strongly as seen earlier in other outbursts of IP Peg. The spiral shocks are present on both nights with no diminution in strength from one night to the next. The light curves of the lines show an offset to earlier phases, with the mid-eclipse of the emission lines displaced to phases between -0.015 +- 0.001 and -0.045 +- 0.009. This cannot be explained by the presence of the accretion shocks. As well as the fixed spiral pattern, the disc shows strong flaring in the Balmer and HeII lines. Irradiation-induced emission is seen from the companion star in the Balmer, HeI, HeII, MgII, CII, and other lines. The emission is located near the poles of the companion star, suggesting that the accretion disc shields the companion star substantially and thus has an effective H/R of order 0.2 at EUV wavelengths. The Balmer emission is distinctly broader than the other lines consistent with non-Doppler broadening.

L. Morales-Rueda; T. R. Marsh; I. Billington

1999-11-05T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A Comparative Performance Study of Load Adaptive Energy Saving Schemes for IP-Over-WDM Networks  

Science Journals Connector (OSTI)

Load adaptive energy saving schemes for backbone IP networks use dynamic transport circuit services to adapt the active network resources to the current traffic demand in order to...

Caria, Marcel; Chamania, Mohit; Jukan, Admela

2012-01-01T23:59:59.000Z

202

Thermodynamic Signatures of Half-Quantum Vortices in p+ip Josephson Junction Arrays  

E-Print Network [OSTI]

bind a Majorana Fermion . . 3 Josephson Junction Arrays 3.14 p + ip Josephson Junction Arrays 4.1Bind a Majorana Fermion . . . . . . . . . Josephson Junction

Krahn, Graham Joel

2012-01-01T23:59:59.000Z

203

Microsoft Word - 911147_0_SSC-16 RPS IPS and PCDIS Test Plan...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SERVICES FOR THE NEXT GENERATION NUCLEAR PLANT (NGNP) WITH HYDROGEN PRODUCTION Test Plan for RPS, IPS and PCDIS Prepared by General Atomics For the Battelle Energy...

204

Multilayer Traffic Engineering for IP Over WDM Networks Based on Bayesian Decision Theory  

Science Journals Connector (OSTI)

Network operators are migrating their networks to IP over WDM architectures. In such multilayer networks, it is necessary to define mechanisms that efficiently use the resources...

Lůpez, VŪctor; HernŠndez, Josť Alberto; GonzŠlez de Dios, ”scar; FernŠndez Palacios, Juan; Aracil, Javier

2010-01-01T23:59:59.000Z

205

Life Validation Testing Protocol Development | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Validation Testing Protocol Development Life Validation Testing Protocol Development Presentation from the U.S. DOE Office of Vehicle Technologies "Mega" Merit Review 2008 on...

206

Building internet trust: signalling through trustmarks  

Science Journals Connector (OSTI)

Consumers' concerns about privacy, security, and control of personal information highlight the importance of trust in building marketing relationships in the computer-mediated environment. Internet firms have begun posting third-party certifications, labelled ‚??trustmarks‚?Ě, as signals of reliability, credibility, and general trustworthiness. This paper integrates the literatures on signalling theory and trust, and makes extensions to the internet. It identifies and categorises sets of internet signals, highlighting the critical role of trustmarks in the computer-mediated environment. It develops a series of propositions related to the effectiveness of trustmarks, including variables such as source and culture. Lastly, it provides direction for future research.

K. Damon Aiken; Ben S. Liu; Robert D. Mackoy; Gregory E. Osland

2004-01-01T23:59:59.000Z

207

Linear Collider Test Facility: Twiss Parameter Analysis at the IP/Post-IP Location of the ATF2 Beam Line  

SciTech Connect (OSTI)

At the first stage of the ATF2 beam tuning, vertical beam size is usually bigger than 3 {micro}m at the IP. Beam waist measurements using wire scanners and a laser wire are usually performed to check the initial matching of the beam through to the IP. These measurements are described in this paper for the optics currently used ({beta}{sub x} = 4cm and {beta}{sub y} = 1mm). Software implemented in the control room to automate these measurements with integrated analysis is also described. Measurements showed that {beta} functions and emittances were within errors of measurements when no rematching and coupling corrections were done. However, it was observed that the waist in the horizontal (X) and vertical (Y) plane was abnormally shifted and simulations were performed to try to understand these shifts. They also showed that multiknobs are needed in the current optics to correct simultaneously {alpha}{sub x}, {alpha}{sub y} and the horizontal dispersion (D{sub x}). Such multiknobs were found and their linearity and orthogonality were successfully checked using MAD optics code. The software for these multiknobs was implemented in the control room and waist scan measurements using the {alpha}{sub y} knob were successfully performed.

Bolzon, Benoit; /Annecy, LAPP; Jeremie, Andrea; /Annecy, LAPP; Bai, Sha; /Beijing, Inst. High Energy Phys.; Bambade, Philip; /KEK, Tsukuba; White, Glen; /SLAC

2012-07-02T23:59:59.000Z

208

Former Worker Program Medical Protocol  

Broader source: Energy.gov [DOE]

The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which there are screening tests that are reasonably likely to be effective and beneficial to program participants.

209

Superior Energy Performance Certification Protocol  

Broader source: Energy.gov [DOE]

The Superior Energy Performanceģ (SEPô) Certification Protocol describes the purpose of the SEP program and defines the steps required for participationófrom initial application through certification by an ANSI-ANAB accredited Verification Body.

210

Internet growth: Myth and reality, use and abuse Andrew Odlyzko  

E-Print Network [OSTI]

Internet growth: Myth and reality, use and abuse Andrew Odlyzko AT&T Labs ¬≠ Research amo@research.att.com http://www.research.att.com/¬łamo Abstract Actual Internet traffic growth rates of 100 percent per year to Internet growth claim astronomical rates of increase; the usual phrase is that ``Internet traffic

Odlyzko, Andrew M.

211

Internet growth: Myth and reality, use and abuse Andrew Odlyzko  

E-Print Network [OSTI]

Internet growth: Myth and reality, use and abuse Andrew Odlyzko AT&T Labs - Research amo@research.att.com http://www.research.att.com/ amo Abstract Actual Internet traffic growth rates of 100 percent per year to Internet growth claim astronomical rates of increase; the usual phrase is that "Internet traffic

Odlyzko, Andrew M.

212

Towards an Energy-Efficient Internet  

Science Journals Connector (OSTI)

Global telecommunications consume a small but growing fraction of the worldís electricity supply. We examine the key contributors to energy consumption in the Internet and examine some...

Tucker, Rodney S

213

Hydranet: network support for scaling of large scale servic es  

E-Print Network [OSTI]

With the explosive growth of demand for services on the Internet, the networking infrastructure (routers 7 protocols, servers) is under considerable stress. Mechanisms are needed for current and future IP services to scale in a client transparent...

Chawla, Hamesh

1998-01-01T23:59:59.000Z

214

Multiservice Optical Network:Main Concepts and First Achievements of the ROM Program  

Science Journals Connector (OSTI)

With the tremendous introduction of internet protocol (IP) applications,the quality-of-service (QoS) becomes more and more an emergent issue. Concrete solutions can be adopted...

Gravey, P; Gosselin, phane; Guillemont, C; Chiaroni, Dominique; Sauze, Nicolas Le; Jourdan, Amaury; Dotaro, Emmanuel; Barth, Dominique; Bertom, Pascal; Laforest, Christian; Vial, S; Atmaca, Tulin; buterne, rard; Biaze, H El; Laalaoua, R; Gangloff, Eric; Kotuliak, I

2001-01-01T23:59:59.000Z

215

SLCA/IP Hydro Generation Estimates Month Forecast Generation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5/2013 9:06 5/2013 9:06 SLCA/IP Hydro Generation Estimates Month Forecast Generation less losses (kWh) Less Proj. Use (kWh) Net Generation (kWh) SHP Deliveries (kWh) Firming Purchases (kWh) Generation above SHP Level (kWH) 2013-Oct 232,469,911 13,095,926 219,373,985 398,608,181 192,676,761 - 2013-Nov 211,770,451 2,989,074 208,781,376 408,041,232 214,204,345 - 2013-Dec 252,579,425 3,106,608 249,472,817 455,561,848 221,545,708 - 2014-Jan 337,006,077 3,105,116 333,900,962 463,462,717 139,278,887 -

216

Mirror eclipses in the cataclysmic variable IP Peg  

E-Print Network [OSTI]

We present time resolved K-band infrared spectra of the dwarf nova (DN) IP Peg in early quiescence. The Brackett-gamma and HeI lines in our data show hitherto unseen behaviour, which we term a mirror eclipse, and interpret as an eclipse of the secondary star by an optically thin accretion disc. Mirror eclipses are a direct probe of the structure and physical conditions of accretion discs. For example, on assuming the relevant level populations to be in LTE, we constrain the temperature and density of the optically thin material causing the mirror eclipse to be 10,000 < T < 20,000 K and \\rho ~10^-11 g/cm^3 respectively. In order to match our data we find that at least the outermost 20% of the disc (in radius) must be entirely optically thin. Implications for time-dependant disc models are examined.

S. P. Littlefair; V. S. Dhillon; T. R. Marsh; E. T. Harlaftis

2001-06-11T23:59:59.000Z

217

ChIP-seq Identification of Weakly Conserved Heart Enhancers  

SciTech Connect (OSTI)

Accurate control of tissue-specific gene expression plays a pivotal role in heart development, but few cardiac transcriptional enhancers have thus far been identified. Extreme non-coding sequence conservation successfully predicts enhancers active in many tissues, but fails to identify substantial numbers of heart enhancers. Here we used ChIP-seq with the enhancer-associated protein p300 from mouse embryonic day 11.5 heart tissue to identify over three thousand candidate heart enhancers genome-wide. Compared to other tissues studied at this time-point, most candidate heart enhancers are less deeply conserved in vertebrate evolution. Nevertheless, the testing of 130 candidate regions in a transgenic mouse assay revealed that most of them reproducibly function as enhancers active in the heart, irrespective of their degree of evolutionary constraint. These results provide evidence for a large population of poorly conserved heart enhancers and suggest that the evolutionary constraint of embryonic enhancers can vary depending on tissue type.

Blow, Matthew J.; McCulley, David J.; Li, Zirong; Zhang, Tao; Akiyama, Jennifer A.; Holt, Amy; Plajzer-Frick, Ingrid; Shoukry, Malak; Wright, Crystal; Chen, Feng; Afzal, Veena; Bristow, James; Ren, Bing; Black, Brian L.; Rubin, Edward M.; Visel, Axel; Pennacchio, Len A.

2010-07-01T23:59:59.000Z

218

INTERNET-DRAFT draft-goyal-diffserv-afstdy-00 February 2000 Internet Engineering Task Force Mukul Goyal  

E-Print Network [OSTI]

INTERNET-DRAFT draft-goyal-diffserv-afstdy-00 February 2000 Internet Engineering Task Force Mukul Goyal Internet Draft Arian Durresi Expires: August 2000 Raj Jain Chunlei Liu The Ohio State University February 2000 Performance Analysis of Assured Forwarding Status of Memo This document is an Internet

Jain, Raj

219

T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service  

Broader source: Energy.gov (indexed) [DOE]

7: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of 7: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability July 27, 2011 - 3:58pm Addthis PROBLEM: F5 has acknowledged a vulnerability in BIG-IP, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: The vulnerability is reported in the following products and versions: BIG-IP LTM versions 9.0.0 through 9.4.8, 10.0.0 through 10.1.0, and 10.2.0 through 10.2.2 BIG-IP GTM versions 9.0.0 through 9.4.8, 10.0.0 through 10.1.0, and 10.2.0 through 10.2.2 BIG-IP ASM versions 9.0.0 through 9.4.8, 10.0.0 through 10.1.0, and 10.2.0 through 10.2.2 BIG-IP Link Controller versions 9.0.0 through 9.4.8, 10.0.0 through 10.1.0, and 10.2.0 through 10.2.2

220

NLEL-MAAT at CLEF-IP Santiago Correa, Davide Buscaldi, Paolo Rosso.  

E-Print Network [OSTI]

NLEL-MAAT at CLEF-IP Santiago Correa, Davide Buscaldi, Paolo Rosso. NLE Lab, ELiRF Research Group, DSIC, Universidad Politécnica de Valencia, Spain. {scorrea, dbuscaldi, prosso}@dsic.upv.es http://users.dsic.upv.es/grupos/nle Abstract. This report presents the work carried out at NLE Lab for the IP@CLEF-2009 competition. We adapted

Rosso, Paolo

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Fraud Detection for Voice over IP Services on Next-Generation Networks  

E-Print Network [OSTI]

Fraud Detection for Voice over IP Services on Next-Generation Networks Igor Ruiz-Agundez, Yoseba K the security requirements of NGN and introduce a fraud management system based on misuse detection for Voice over IP services. Specifically, we address a fraud detection framework consisting of a rule engine

Boyer, Edmond

222

Ad-hoc Technology in Future IP based Mobile Communication Frank Fitzek  

E-Print Network [OSTI]

Ad-hoc Technology in Future IP based Mobile Communication Systems Frank Fitzek acticom Gmb@asu.edu Abstract In this paper we outline our future research activities in the field of ad--hoc communication systems for IP based services. We summarize why omnipresent technologies fail to support ad--hoc

Reisslein, Martin

223

A novel SoC platform based multi-IP verification and performance measurement  

Science Journals Connector (OSTI)

It is well-known that in ASIC designs, verification is more difficult and time consuming than design itself. As the number of IPs in a SoC design increases, IP verification and performance validation have become the important factors in reducing time-to-market. In this paper, we propose a novel SoC platform based verification methodology which tests multiple IPs together using a single testbench. We've found that commercially available SoC platforms such as Altera Excalibur or Xilinx Virtex provide excellent environment in verifying the functionalities of mutually interactive multiple IPs with very low cost. In our methodology, embedded processor core built in the SoC device is used mainly for verification purposes and it runs a C-based testbench. The mutually interactive IPs are programmed in the FPGA device. We implement a set of tools which consists of a communication interface and a wrapper generator. Using this platform, we have verified up to five IPs together successfully, but we can verify more IPs together easily. Time and effort to verify complex IPs have been significantly reduced using this methodology.

Joo-Yul Park; So-Jin Lee; Ki-Seok Chung

2009-01-01T23:59:59.000Z

224

Coupled Oscillations of Calcium and IP3: Identification of Feedback Loops  

E-Print Network [OSTI]

Coupled Oscillations of Calcium and IP3: Identification of Feedback Loops with Andrew Thomas(cyt)Ca(ER) Ca(cyt) Calcium oscillator +/- Schuster, Marhl & Höfer, Eur. J. Biochem. (2002) #12;IP3 DAG Hormone for the calcium oscillator? #12;Höfer, Venance & Giaume J. Neurosci. (2002) #12;3 modes of intercellular signaling

Coombes, Stephen

225

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

226

Summary Protocol: Identification, Characterization, Designation, Remedial  

Broader source: Energy.gov (indexed) [DOE]

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

227

Building Technologies Office: House Simulation Protocols Report  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

228

Internet Engineering Task Force Individual Submission INTERNET-DRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

-lennox-sip-reg-payload-01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

229

Internet-based supply chain management: using the Internet to revolutionize your business  

Science Journals Connector (OSTI)

The Internet has emerged in the recent past as a dynamic medium for channeling transactions between customers and firms in virtual marketplace. In particular, the World Wide Web has emerged as a powerful new channel for supply chain, rendering many intermediaries ... Keywords: Business-to-business, Internet, Supply chain, Supply chain management

Zillur Rahman

2003-12-01T23:59:59.000Z

230

BroadPeak: a novel algorithm for identifying broad peaks in dif-fuse ChIP-seq datasets  

E-Print Network [OSTI]

1 BroadPeak: a novel algorithm for identifying broad peaks in dif- fuse ChIP-seq datasets JianrongIP-seq datasets. We show that BroadPeak is a linear time algorithm that requires only two parame- ters, and we validate its performance on real and simulated histone modification ChIP-seq datasets. BroadPeak calls

Jordan, King

231

Influences, usage, and outcomes of Internet health information searching: Multivariate results from the Pew surveys  

E-Print Network [OSTI]

INFLUENCES, USAGE, AND OUTCOMES OF INTERNET HEALTHR.E. (2006). Influences, usage, and outcomes of InternetSeeking, p-3 INFLUENCES, USAGE, AND OUTCOMES OF INTERNET

Rice, Ronald E

2006-01-01T23:59:59.000Z

232

Cryptography and the Internet: lessons and challenges  

SciTech Connect (OSTI)

The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising new questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.

McCurley, K.S.

1996-12-31T23:59:59.000Z

233

UCSB Distressed Students Response Protocol  

E-Print Network [OSTI]

about a student, provide referrals to campus departments, develop action plans, and follow up academic or personal issues REFERRAL IDENTIFIERS: Student distress may manifest in behavior Student Protocol will assist you in responding to the student and providing appropriate referrals. Student

California at Santa Barbara, University of

234

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

235

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

236

Membrane and MEA Accelerated Stress Test Protocols | Department...  

Broader source: Energy.gov (indexed) [DOE]

Membrane and MEA Accelerated Stress Test Protocols Membrane and MEA Accelerated Stress Test Protocols This presentation on fuel cell membrane and MEA stress test protocols was...

237

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

238

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Broader source: Energy.gov (indexed) [DOE]

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

239

A text mining approach to Internet abuse detection  

Science Journals Connector (OSTI)

Many organizations have started to fight Internet abuse by setting up Internet usage policies (Siau et al. 2002), conducting management training (Young and Case 2004), and monitoring and blocking employeesí abuse

Chen-Huei Chou; Atish P. SinhaÖ

2008-09-01T23:59:59.000Z

240

Ghost at the machine : Internet addiction and compulsive computer use  

E-Print Network [OSTI]

Technology use-particularly the use of the Internet-is a pervasive component of modem society. The Internet has changed the way we work and the way we play, creating new possibilities for self expression and communication. ...

VanCott, Rachel Diane

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

The internet as a source of drugs of abuse  

Science Journals Connector (OSTI)

The Internet is a vital medium for communication, entertainment ... to the many positive functions served by the Internet, it also has been used to facilitate ... and then actually sellócontrolled substances over...

Robert F. Forman PhD; Douglas B. Marlowe JD; PhDÖ

2006-01-01T23:59:59.000Z

242

Assessing mathematics automatically using computer algebra and the internet  

Science Journals Connector (OSTI)

......against the most obvious forms of student abuse exist within the system. Students are...evaluation of students' work over the internet provides the pragmatic educator with significant...Algebraic Computation (ISSAC2002), Internet Accessible Mathematical Computation 2002......

Chris Sangwin

2004-03-01T23:59:59.000Z

243

Economics of advertising: Emerging functions of Internet advertising  

Science Journals Connector (OSTI)

This paper intends to highlight the emerging force of the Internet as an advertising medium. The economic functions of Internet advertising are examined. Moreover, the paper aims to evaluate the relative impacts ...

Marcus Ling; Kevin Lawler; Norman McBain; Alfredo Moscardini

244

CAPRI: A Common Architecture for Distributed Probabilistic Internet Fault Diagnosis  

E-Print Network [OSTI]

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J.

2007-06-04T23:59:59.000Z

245

CAPRI : a common architecture for distributed probabilistic Internet fault diagnosis  

E-Print Network [OSTI]

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J. (George Janbing), 1979-

2007-01-01T23:59:59.000Z

246

Language Independent Icon-Based Interface for Accessing Internet  

Science Journals Connector (OSTI)

With the advancement of the information technology, Internet becomes an essential part in our every sphere of life. However, the benefits of Internet are limited to only educated people who can read and write in ...

Santa Maiti; Debasis Samanta; Satya Ranjan DasÖ

2011-01-01T23:59:59.000Z

247

The Internet of Things Helping Utilities | OpenEI Community  

Open Energy Info (EERE)

The Internet of Things Helping Utilities Home > Groups > Smart Grid Dc's picture Submitted by Dc(107) Contributor 16 October, 2014 - 12:21 The Internet of Things (IoT) is helping...

248

How the Internet is influencing today's E&P business  

Science Journals Connector (OSTI)

...between. So, how can this technology tool be used to best advantage...management. The Internet (and Intranet) support and encourage knowledge...management. The Internet (and Intranet) support and encourage knowledge...Encouragetheuseandvalueofhigher end information, technology, and interpretation methodologies...

Jon Fuller; Joe Fay

249

Knowledge Flow Analysis for Security Protocols  

E-Print Network [OSTI]

Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...

Torlak, Emina

2005-10-19T23:59:59.000Z

250

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure December 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.8 The Transmission Control Protocol

Bonaventure, Olivier

251

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3.8 The Transmission Control Protocol

Bonaventure, Olivier

252

Cost effectiveness of protection schemes for IP-over-WDM networks  

Science Journals Connector (OSTI)

We analyze the cost of IP-over-WDM networks employing survivable traffic grooming protection. The network cost is evaluated in terms of total number of optical transceivers in the...

Correia, N S C; Medeiros, M C R

2007-01-01T23:59:59.000Z

253

A GHS-Based Intelligent Management Platform with IP-Camera Security System  

Science Journals Connector (OSTI)

We have described an e-platform, with an IP camera for managing toxic and hazardous chemicals within an organization. The system allows: ... system (GHS) of classification and labeling of chemicals and printout t...

Kuo Yuan Hwa; Ming-Chuan Wu; Sang-Soo Yeo; Wenlung Li

2011-01-01T23:59:59.000Z

254

High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems  

E-Print Network [OSTI]

to attacks between conventional anonymization and our approach shows that TSA performs better for small scale trace, sensitive header fields need to be sanitized. In most cases these fields are the IP source

Shenoy, Prashant

255

European IPR Helpdesk IP Management in Horizon 2020: at the proposal stage  

E-Print Network [OSTI]

European IPR Helpdesk European IPR Helpdesk Fact Sheet IP Management in Horizon 2020: at the proposal stage The European IPR Helpdesk is managed by the European Commission's Executive Agency for Small

Robbiano, Lorenzo

256

Extensions of AAA for Future IP Networks Pascal Kurtansky, Hasan, Burkhard Stiller1  

E-Print Network [OSTI]

Extensions of AAA for Future IP Networks Pascal Kurtansky, Hasan, Burkhard Stiller1 Computer Engineering and Networks Laboratory TIK ETH Z√ľrich Z√ľrich, Switzerland [kurtansky|hasan|stiller

Zander, Sebastian

257

Layered View of QoS Issues in IP-Based Mobile Wireless Networks Honeywell Labs  

E-Print Network [OSTI]

Layered View of QoS Issues in IP-Based Mobile Wireless Networks Haowei Bai Honeywell Labs 3660 Technology Drive, Minneapolis, MN 55418 E-mail: haowei.bai@honeywell.com Mohammed Atiquzzaman School

Minnesota, University of

258

Using CASA IP1 to Diagnose Kinematic and Microphysical Interactions in a Convective Storm  

Science Journals Connector (OSTI)

Data from the Collaborative Adaptive Sensing of the Atmosphere (CASA) Integrated Project I (IP1) network of polarimetric X-band radars are used to observe a convective storm. A fuzzy logic hydrometeor identification algorithm is employed to study ...

Brenda Dolan; Steven A. Rutledge

2010-05-01T23:59:59.000Z

259

ďFollow the Sun, Follow the WindĒ Lightpath Virtual Topology Reconfiguration in IP Over WDM Network  

Science Journals Connector (OSTI)

Green House Gas (GHG) emissions mainly come from the consumption of non-renewable energy. To reduce GHG emissions of IP over WDM networks, we propose to maximize renewable energy...

Shen, Gangxiang; Lui, Yunlei; Bose, Sanjay Kumar

2014-01-01T23:59:59.000Z

260

U-032: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical |  

Broader source: Energy.gov (indexed) [DOE]

32: Microsoft Security Bulletin Windows TCP/IP MS11-083 - 32: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical U-032: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical November 9, 2011 - 1:00pm Addthis PROBLEM: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Who's Who in the Internet: Biographies of IAB, IESG and IRSG Members  

Science Journals Connector (OSTI)

This FYI RFC contains biographical information about members of the Internet Activities Board (IAB), the Internet Engineering Steering Group (IESG) of the Internet Engineering Task Force (IETF), and the the Internet Research Steering Group (IRSG) of ...

G. Malkin

1992-05-01T23:59:59.000Z

262

Characterizing Internet Performance to Support Wide-area Application Development  

E-Print Network [OSTI]

-of-the-way places, like Islamabad (Pakistan) or Paramaribo (Suriname), not just the Internet covering the USA

Tanenbaum, Andrew S.

263

NLEL-MAAT at CLEF-IP Santiago Correa and Davide Buscaldi and Paolo Rosso  

E-Print Network [OSTI]

NLEL-MAAT at CLEF-IP Santiago Correa and Davide Buscaldi and Paolo Rosso NLE Lab, ELiRF Research Group, DSIC, Universidad Polit¬īecnica de Valencia, Spain. {scorrea, dbuscaldi, prosso}@dsic.upv.es http://users.dsic.upv.es/grupos/nle Abstract. This report presents the work carried out at NLE Lab for the CLEF-IP 2009 competition. We adapted

Rosso, Paolo

264

DipZoom: The Internet Measurements Marketplace  

E-Print Network [OSTI]

DipZoom: The Internet Measurements Marketplace (Position Paper) Michael Rabinovich, Sipat Triukose measurements. Unlike existing approaches that face a difficult challenge of building a measurement platform with suf- ficiently diverse measurements and measuring hosts, DipZoom offers a matchmaking service instead

Rabinovich, Michael "Misha"

265

New platforms of the violence in internet  

Science Journals Connector (OSTI)

Over the last few decades, some of the most defining sociological changes involve communications, especially in the permeation of information technologies and its effects in all areas of life. However, does this virtual world replicate the same problems ... Keywords: cyberculture, cybersex, cyberviolence, internet, new technologies

MarŪa del Mar RamŪrez-Alvarado; Inmaculada Gordillo

2010-10-01T23:59:59.000Z

266

Language of the Internet NAOMI S. BARON  

E-Print Network [OSTI]

processing to facilitate working on the Internet and the World Wide Web (1.3) Section 2 Linguistic Issues for Communicating via the Web 1 As with so many aspects of the computing world, the nature of the language of this chapter. #12;2 summarize the types of Web coding systems (4.1) present an overview of Web markup languages

Carlini, David

267

Acoustic Lexemes for Organizing Internet Audio  

E-Print Network [OSTI]

Acoustic Lexemes for Organizing Internet Audio Michael A. Casey In this article, a method is proposed for automatic fine-scale audio description that draws inspiration from ontological sound automation of audio description at the level of sound objects for indexing and retrieving sound segments

Casey, Michael

268

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

269

Compact Routing on Internet-Like Graphs Dmitri Krioukov  

E-Print Network [OSTI]

Compact Routing on Internet-Like Graphs Dmitri Krioukov Email: dima@krioukov.net Kevin Fall Intel and simulation, we derive the stretch distribution of this routing scheme on Internet-like interdomain topologies that the average TZ stretch is quite low and virtually independent of . In particular, for the Internet interdomain

Yang, Xiaowei

270

Experimental Design of Worldwide Internet Voting System using PKI  

E-Print Network [OSTI]

easily participate in voting over the Internet. It is consid- ered as a good solution for the recent interest for Internet voting as a good solution to make voting more accessible and convenient, it is widely voting together with good e√?ciency. In this research, we design Internet voting system us- ing public key

Kim, Kwangjo

271

WEB N.0, THE NEW DEVELOPMENT TREND OF INTERNET  

E-Print Network [OSTI]

energy which can be equal to the mainstream market. The internet provides a good groundWEB N.0, THE NEW DEVELOPMENT TREND OF INTERNET Zhiguo Sun, Wensheng Wang Agricultural Information: This article analyzes the Internet basic theory, the network foundation environment and the user behavior

Boyer, Edmond

272

Pricing the Internet Jerey K. MacKie-Mason  

E-Print Network [OSTI]

. Currently, the several Internet backbone networks are public goods with exclusion: usage is essentially freePricing the Internet by Jerey K. MacKie-Mason Hal R. Varian University of Michigan April 1993 to the Internet," JFK School of Government, May 26­27 , 1993. We describe the technology and cost structure

Varian, Hal R.

273

Visualising Internet Traffic Data with Three-Dimensional Spherical Display  

E-Print Network [OSTI]

successful in this respect has proven to give good predictions about structural features of the InternetVisualising Internet Traffic Data with Three-Dimensional Spherical Display Ben Yip1 , Shea Goyette1 of visualising internet traffic data using the underlying spherical nature of the globe. The method uses data

Hong,Seokhee

274

Internet Routing Resilience to Failures: Analysis and Implications  

E-Print Network [OSTI]

Internet Routing Resilience to Failures: Analysis and Implications Jian Wu Ying Zhang Z. Morley Mao Kang G. Shin University of Michigan ABSTRACT Internet interdomain routing is policy-driven, and thus phys- ical connectivity does not imply reachability. On average, routing on today's Internet works

Mao, Zhuoqing Morley

275

Modeling Internet Topology Kenneth L. Calvert, Georgia Tech  

E-Print Network [OSTI]

such as the Internet, has a strong bearing on many management and performance issues. Good models of the topologicalModeling Internet Topology Kenneth L. Calvert, Georgia Tech Matthew B. Doar, Ascom Nexion Ellen W aspects of locality and hierarchy present in the Internet. Two implemen­ tations that generate networks

Zegura, Ellen W.

276

Ethical implications of internet monitoring: A comparative study  

Science Journals Connector (OSTI)

Organizations have become increasingly concerned about employee use of the Internet for personal reasons while at work. Monitoring Internet usage has become more and more prevalent in the workplace. While there may be legitimate business functions such ... Keywords: Autonomy, Fairness, Internet monitoring, University, Workplace

Frances S. Grodzinsky; Andra Gumbus; Stephen Lilley

2010-09-01T23:59:59.000Z

277

A Power Consumption Analysis for IP-Over-WDM Core Network Architectures  

Science Journals Connector (OSTI)

As Internet traffic is estimated to substantially grow in the near future, one of the most challenging issues will concern the reduction of its power requirement. For the...

Musumeci, Francesco; Tornatore, Massimo; Pattavina, Achille

2012-01-01T23:59:59.000Z

278

Independent Oversight Appraisal Process Protocols  

Broader source: Energy.gov (indexed) [DOE]

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

279

Independent Oversight Appraisal Process Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

280

Memory cost of quantum protocols  

E-Print Network [OSTI]

In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-12-16T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Chapter 14: Chiller Evaluation Protocol  

SciTech Connect (OSTI)

This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

Tiessen, A.

2014-09-01T23:59:59.000Z

282

AN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS AN EDGE DEVICE FOR SUPPORTING INTERNET  

E-Print Network [OSTI]

parts of the Internet where the un- derlying link layer technology would be able to give good supportAN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS AN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS H. Hussmann Dresden

283

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

284

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Broader source: Energy.gov (indexed) [DOE]

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

285

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks  

E-Print Network [OSTI]

Hellas, Greece Abstract. We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated Abuse% of the duration of the attack. 1 Introduction The Internet is a complicated distributed system that interconnects

California at Santa Barbara, University of

286

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

287

VChemLab: A Virtual Chemistry Laboratory. The Storage, Retrieval, and Display of Chemical Information Using Standard Internet Tools  

Science Journals Connector (OSTI)

Within the last 18 months, a number of developers have begun to target the corporate ĎIntranet' market by providing modeling tools ? structure drawing, query handling, data presentation & analysis ? with a consistent Web-based interface that can be easily learned by Ďweb-aware' researchers and chemists. ... Corporate Intranets, which use Internet standards and protocols as a means of communication, are being rapidly developed as a cost-effective method of sharing data resources and distributing reusable software components. ... We will report in a future article the scaleable characteristics of this system for large molecular object databases. ...

Henry S. Rzepa; Alan P. Tonge

1998-09-04T23:59:59.000Z

288

Transportation Protocols Working Group First Conference Call...  

Broader source: Energy.gov (indexed) [DOE]

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

289

SSF Experimental Protocols -- Lignocellulosic Biomass Hydrolysis...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SSF Experimental Protocols - Lignocellulosic Biomass Hydrolysis and Fermentation Laboratory Analytical Procedure (LAP) Issue Date: 10302001 N. Dowe and J. McMillan Technical...

290

ESPC ENABLE Measurement and Verification Protocol  

Broader source: Energy.gov [DOE]

Document provides an overview of the Measurement and Verification (M&V) Protocol utilized within ENABLE energy savings performance contract projects.

291

Superior Energy Performance Measurement and Verification Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Verification Protocol for Industry (November 2012) More Documents & Publications Energy Intensity Baselining and Tracking Guidance EnPI V4.0 Tool Algorithm Superior Energy...

292

Potential Internet Applications in Forest Products Exporting and  

E-Print Network [OSTI]

of Respondents #12;Adoption of Internet Technologies 0.0% 39.8% 57.0% 3.2% 0% 20% 40% 60% 80% 100 to Other Industries (n=93) #12;Adoption of Internet Technologies 2.2% 51.1% 22.8%23.9% 0% 20% 40% 60% 80 (n=54) 0% 20% 40% 60% 80% 100% Intranet Internet EDI Extranet VPN Do not use Use within next two

293

http://physics.technion.ac.il/~ips/webIsrael Physical Society Prof. Cezar Bruma IPS_Join_to_2006_05_06.doc created 2006_04_30 printed: 5/7/2006  

E-Print Network [OSTI]

of the European Physical Society (EPS) www.eps.org All IPS members are entitled to: · Register to EPS organized conferences and symposia at low EPS rates · Receive other EPS journals at low EPS rates Full IPS members are entitled to: · Receive 'Europhysics News' for free · Become a full individual EPS member for a reduced rate

Adler, Joan

294

Analysis of Internet Banking Security Crack Through Messenger Hacking  

Science Journals Connector (OSTI)

The messenger is a free information and communication means for easy information exchange with acquaintances connected to the Internet during ordinary work process. Therefore, acquaintances (automatically) connec...

Dea-Woo Park; Kyong-Ha Roo

2013-01-01T23:59:59.000Z

295

Already a pressing global issue, internet governance is growing in importance in international debates. With internet  

E-Print Network [OSTI]

Already a pressing global issue, internet governance is growing in importance in international, including those falling under: the United Nations General Assembly (UNGA), the International related to these processes are then weaved around two particular forums ­ the ITU Plenipotentiary in 2014

Chen, Yiling

296

Service Identification in TCP/IP: Well-Known versus Random Port Numbers  

E-Print Network [OSTI]

The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...

Masiello, Elizabeth

2006-01-11T23:59:59.000Z

297

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

298

Advantages of a Leveled Commitment Contracting Protocol  

E-Print Network [OSTI]

Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R. Lesser 7, 1995 #12; Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R, contracts have traditionally been binding. Such contracts do not al­ low agents to efficiently accommodate

Massachusetts at Amherst, University of

299

The Bitcoin Backbone Protocol: Analysis and Applications  

E-Print Network [OSTI]

The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

300

The CSUF Center for Entrepreneurship and CSUF Center for Family Business present: "Patent Trolls and Other IP-Related Threats  

E-Print Network [OSTI]

and Other IP-Related Threats: How to Protect Your Business from a New Kind of Predator" Mihaylo College trolls, with threats of lawsuits and litigation. At this seminar, panelists Roger N. Behle (IP litigator Other intellectual property threats Current and pending legislation designed to address patent trolling

de Lijser, Peter

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Implementation of load sharing in TCP/IP distributed systems by election technique  

E-Print Network [OSTI]

's association. The bind () system call is used as follows, in Internet domain: bind (s, (struct sockaddr +) csin, sizsof sin); d. Connection Establishment Connection establishment is usuaUy asymmetric, with one process a client and the ' other a server... The client requests services from the server by initiating a connection to the server's socket. On the client side the connect() call is used to initiate a connection. In the Internet domain, it would be: connect(s, (struct sockaddr +)observer, sizeof...

Muppidi, Sridhar Reddy

1991-01-01T23:59:59.000Z

302

House Simulation Protocols Report | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Residential Buildings ¬Ľ Building America ¬Ľ House Simulation Residential Buildings ¬Ľ Building America ¬Ľ House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

303

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect (OSTI)

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15T23:59:59.000Z

304

REPORT PREPARED FOR THE WELSH ASSEMBLY GOVERNMENT IP CRIME & E CRIME  

E-Print Network [OSTI]

. IP CRIME page 23 5. E COMMERCE LAW page 30 6. E CRIME page 38 7. RELEVANCE FOR WELSH SMEs page 45 8 Framework Study: "Effects of counterfeiting on EU SMEs and a review of various public and private IPR needs to know, National Hi-Tech Crime Unit (NHTCU), 2005. (l) Fraud and Technology Crimes ­ Findings

Martin, Ralph R.

305

VoIP at CSU -Frequently asked questions and options Instructions for your individual phone  

E-Print Network [OSTI]

" options 2. Forward your phone to a personal cell phone and use the voicemail that comes with your cell phone package. Enter your cell phone number with 8 + area code (e.g. 8-970-123-4567) at httpVoIP at CSU - Frequently asked questions and options Instructions for your individual phone: 1

306

Implementation of a traffic engineering technique that preserves IP Fast Reroute in  

E-Print Network [OSTI]

optimisation des poids des liens dans un r¬īeseau OSPF qui minimise la charge des liens et maximise les search, Combinatorial Optimization. 1 Introduction Enterprise and ISP networks have deployed IP Routing(CP) and Constraint-Based Local Search (CBLS) are well suited for solving such complex combinatorial problems. COMET

Bonaventure, Olivier

307

Deploying QoS for Cisco IP and Next Generation Networks: The Definitive Guide  

Science Journals Connector (OSTI)

Deploying QoS for IP Next Generation Networks: The Definitive Guide provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference ... Keywords: Networking

Vinod Joseph; Brett Chapman

2009-04-01T23:59:59.000Z

308

Techniques for the Study of QoS in IP Networks  

Science Journals Connector (OSTI)

Setting the many parameters available to the operator in a QoS-enabled IP network in order to achieve peak performance is a highly non-trivial task. Individual settings are not independent; and their consequences depend upon the traffic and application ...

Simon F. Carter; Neil W. Macfadyen; Gino A. R. Martin; Rachel L. Southgate

2002-07-01T23:59:59.000Z

309

An approach for improving performance of aggregate voice-over-IP traffic  

E-Print Network [OSTI]

of denial-of service (DoS) attacks can deteriorate the service that these voice calls receive. And these conditions contribute to the decline in call quality in VoIP applications; therefore, error-correcting/concealing techniques remain the only alternative...

Al-Najjar, Camelia

2006-10-30T23:59:59.000Z

310

VoIP-based Intra-village Teleconnectivity: An Architecture and Case Study  

E-Print Network [OSTI]

VoIP-based Intra-village Teleconnectivity: An Architecture and Case Study Janak Chandarana, K of the village. As proof- of-concept, we deploy the proposed solution in a rural test-bed and report our expensive to connect all villages to their nearest PoP. Income levels for rural India are lower than

Iyer, Sridhar

311

The SPHINX Enigma in Critical VoIP Infrastructures: Human or Botnet? D. Gritzalis, Y. Soupionis  

E-Print Network [OSTI]

. Katos, I. Psaroudakis Dept. of Electrical & Computer Engineering, Democritus University of Thrace (robustness), as well as for its DoS-resistance. We describe the principles and in- novations of Sphinx, without side-effects to the VoIP services. This has been formally verified along with the service DoS-resistance

Katsaros, Panagiotis

312

Mycoscience 39: 367-378, 1998 Ophiostomatoid fungi associated with Ips cembrae in Japan  

E-Print Network [OSTI]

Mycoscience 39: 367-378, 1998 367 Ophiostomatoid fungi associated with Ips cembrae in Japan! 11Institute of Agriculture and Forestry, University of Tsukuba, Tsukuba, Ibaraki 305-8572, Japan 2 400-0502, Japan Accepted for publication 29 July 1998 Six ophiostomatoid fungi, Le" Ceratocystiopsis

313

Automatic Information Discovery from the "Invisible Web" King-Ip Lin, Hui Chen  

E-Print Network [OSTI]

that is untouched by the traditional search engines. Known as the "invisible web" or "deep web", it representsAutomatic Information Discovery from the "Invisible Web" King-Ip Lin, Hui Chen Division of Computer@memphis.edu Abstract A large amount of on-line information resides on the invisible web ­ web pages generated

Lin, King-Ip "David"

314

Host-IP Clustering Technique for Deep Web Characterization Denis Shestakov  

E-Print Network [OSTI]

Host-IP Clustering Technique for Deep Web Characterization Denis Shestakov Department of Media databases. This part of the Web, known as the deep Web, is to date relatively unexplored and even major are aimed at more accurate estimation of main parameters of the deep Web by sampling one national web domain

Hammerton, James

315

Five Deaths Resulting from Abuse of Dextromethorphan Sold Over the Internet  

Science Journals Connector (OSTI)

......Resulting from Abuse of Dextromethorphan Sold Over the Internet Barry K. Logan...resulting from abuse of dextromethorphan sold over the internet. | Dextromethorphan...Resulting from Abuse of Dextromethorphan Sold Over the Internet Reproduction......

Barry K. Logan; Gary Goldfogel; Rebecca Hamilton; James Kuhlman

2009-03-01T23:59:59.000Z

316

How To Setup EHSS Landing Page As Default Home Page For Internet...  

Energy Savers [EERE]

Internet Explorer How To Setup EHSS Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http:energy.govehss. Once the EHSS site...

317

How To Setup EA Landing Page As Default Home Page For Internet...  

Energy Savers [EERE]

Internet Explorer How To Setup EA Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http:energy.goviea. Once the EA site loads,...

318

DAD-MPR Flooding Protocol, Convergence Evaluation Through Simulation  

Science Journals Connector (OSTI)

In this paper, we present the convergence evaluation of DAD-MPR flooding protocol through simulation. DAD-MPR flooding protocol is the autoconfiguration protocol we proposed ... OLSR nodes with multiple interface...

Saadi Boudjit; Cťdric Adjih; Paul Muhlethaler

2007-01-01T23:59:59.000Z

319

End-to-end routing behavior in the internet  

Science Journals Connector (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

2006-10-01T23:59:59.000Z

320

End-to-end routing behavior in the Internet  

Science Journals Connector (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

1996-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Touring the Internet in a TCP Sidecar Rob Sherwood  

E-Print Network [OSTI]

Touring the Internet in a TCP Sidecar Rob Sherwood Department of Computer Science University, College Park nspring@cs.umd.edu ABSTRACT An accurate router-level topology of the Internet would benefit. The combined approach mitigates problems associated with traceroute-based topology discovery, including abuse

Gruner, Daniel S.

322

MEASURING INTERNET TELEPHONY QUALITY: WHERE ARE WE TODAY ?  

E-Print Network [OSTI]

MEASURING INTERNET TELEPHONY QUALITY: WHERE ARE WE TODAY ? Olof Hagsand SICS Sweden Kjell Hanson Ericsson Business Networks Sweden Ian Marsh SICS Sweden Abstract Users of Internet telephony applications demand good quality audio playback. This quality is largely dependent on the instantaneous network

323

INTERNET AND E-COMMERCE PATENTS Bradley C. Wright  

E-Print Network [OSTI]

INTERNET AND E-COMMERCE PATENTS Bradley C. Wright The digital world is getting crowded. The number become pervasive, companies with an Internet presence have labored to distinguish their Web sites and marketing techniques from the offerings of others. Consumers who purchase goods and services over

Shamos, Michael I.

324

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network [OSTI]

of household Internet usage, 89% of 93 families needed support from a computer help desk in the 1st year for Technical Help 1.3. Theoretical Analysis 2. METHOD 2.1. Requests for Support From the Help Desk 2Troubles With the Internet: The Dynamics of Help at Home Sara Kiesler, Bozena Zdaniuk, Vicki

325

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network [OSTI]

help desk in the 1st year they used the Internet. However, usually only the most technically involved aspects of technological change and communication systems. Bozena Zdaniuk is Data Management Coordinator 2.1. Requests for Support From the Help Desk 2.2. Internet Usage 2.3. Questionnaire Measures 2

Kiesler, Sara

326

Models for a selfmanaged Internet By Frank Kelly  

E-Print Network [OSTI]

Models for a self­managed Internet By Frank Kelly Centre for Mathematical Sciences, University. Kelly that some current Internet traffic needs large buffers, causing unacceptable queue­ ing delays, Crowcroft & Oechslin 1998; Gibbens & Kelly 1999a; Key & McAuley 1999a). Its premise is that a simple packet

Kelly, Frank

327

A look behind the future internet architectures efforts  

Science Journals Connector (OSTI)

The Future Internet Architectures (FIA) constitutes a 10-year effort by the U.S. National Science Foundation (NSF) that was launched in 2006, with the announcement of the Future INternet Design (FIND) research area within a Network Technologies and Systems ...

Darleen Fisher

2014-07-01T23:59:59.000Z

328

CACHING CHARACTERISTICS OF INTERNET AND INTRANET WEB PROXY TRACES  

E-Print Network [OSTI]

CACHING CHARACTERISTICS OF INTERNET AND INTRANET WEB PROXY TRACES Arthur Goldberg, Ilya Pevzner} This paper studies the caching characteristics of HTTP requests and responses that pass through production a large Internet Service Provider (ISP) and 2.0 million entries from an Intranet firewall are studied. We

Goldberg, Arthur P.

329

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

­lennox­sip­reg­payload­01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

330

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

­lennox­sip­reg­payload­00.ps Columbia University March 6, 2000 Expires: September 2000 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

331

Enabling Performance Intelligence for Application Adaptation in the Future Internet  

E-Print Network [OSTI]

plat- form. Achieving autonomicity in the Future Internet will require a performance architecture that such "Future Internet Perfor- mance Architecture" (FIPA), and present our reference implementation of FIPA in virtualization [1] technology at end-hosts and core network switches/routers. The Global Envir

Calyam, Prasad

332

Spelling and searching the internet: An overlooked problem  

Science Journals Connector (OSTI)

Misspellings, phonetic spellings, deliberately idiosyncratic spellings, typographical, and other errors are examined in relation to the Internetís lack of standardization. Despite the dramatic effect different spellings have on the outcome of searches, this topic has not been adequately addressed in the literature nor have solutions been suggested hitherto.

Edward Proctor

2002-01-01T23:59:59.000Z

333

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh  

E-Print Network [OSTI]

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh M. Satyanarayanan, Carnegie to suspend work at one machine and to resume it at another. Our key insight is that this capability can a machine at one Internet site, then travel to some other site and resume my work there on another machine

Satyanarayanan, Mahadev "Satya"

334

Intelligent fault prediction system based on internet of things  

Science Journals Connector (OSTI)

Fault prediction is the key technology to ensure the safe operation of large equipment. Based on the investigation of current and developing research of fault prediction, an intelligent fault prediction system based on internet of things is proposed ... Keywords: Fault prediction, Intelligent computer information processing, Internet of things, Mechanical equipment groups, Predictive maintenance

Xiaoli Xu; Tao Chen; Mamoru Minami

2012-09-01T23:59:59.000Z

335

Life Cycle Environmental Assessment of the Internet: The Benefits and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Thomas McKone This seminar starts by providing a short introduction to the field of Environmental Life Cycle Assessment (LCA) through a practical example of packaging. It will then develop the case of the Life Cycle Benefits and Impacts of the Internet; raising the different scientific challenges that LCA faces to provide relevant results for innovative technologies.--The rapid development of the Internet and the related potential impacts on and benefits for the environment deserves attention. The infrastructure that supports a university's use of the Internet has been comprehensively

336

Protein kinase C (PKC) phosphorylates human platelet inositol trisphosphate 5/sup +/-/-phosphomonoesterase (IP/sub 3/ 5'-p'tase) increasing phosphatase activity  

SciTech Connect (OSTI)

Phosphoinositide breakdown in response to thrombin stimulation of human platelets generates messenger molecules that activate PKC (diglyceride) and mobilize Ca/sup + +/ (inositol tris-phosphates). The water soluble products of phospholipase C-mediated metabolism of phosphatidylinositol 4,5-diphosphate are inositol 1,4,5 P/sub 3/ (IP/sub 3/) and inositol 1:2-cyclic 4,5 P/sub 3/ (cIP/sub 3/). A specific phosphatase, IP/sub 3/ 5'-p'tase, cleaves the 5 phosphate from IP/sub 3/ or cIP/sub 3/ to form IP/sub 2/ or cIP/sub 2/ and P/sub i/, none of which mobilizes Ca/sup + +/. Thus, the IP/sub 3/ 5'-p'tase may regulate cellular responses to IP/sub 3/ or cIP/sub 3/. The authors find that IP/sub 3/ 5'-p'tase isolated from human platelets is phosphorylated by rat brain PKC, resulting in a 4-fold increase in IP/sub 3/ 5'-p'tase activity. The authors phosphorylated IP/sub 3/ 5'-p'tase using ..gamma.. /sup 32/P-ATP and found that the labeled enzyme comigrated on SDS-PAGE with the previously described 40K protein phosphorylated in response to thrombin stimulation of platelets. The similarity of the PKC-phosphorylated IP/sub 3/ 5'-p'tase observed in vitro and the thrombin-stimulated phosphorylated 40K protein known to be phosphorylated by PKC in vivo, suggests that these proteins may be the same. These results suggest that platelet Ca/sup + +/ mobilization maybe regulated by PKC phosphorylation of the IP/sub 3/ 5'-p'tase and can explain the observation that phorbol ester treatment of intact human platelets results in decreased production of IP/sub 3/ and decreased Ca/sup + +/ mobilization upon subsequent thrombin addition.

Connolly, T.M.; Majerus, P.W.

1986-05-01T23:59:59.000Z

337

Protective Force Protocols for ESS Supported Performance Tests...  

Broader source: Energy.gov (indexed) [DOE]

Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12,...

338

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ash Loading Protocol Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Neutron Imaging of Advanced Engine Technologies...

339

International performance measurement and verification protocol for new construction  

E-Print Network [OSTI]

Performance Measurement and Verification Protocol for New1. INTRODUCTION Measurement and Verification (M&V) of energyPerformance Measurement & Verification Protocol.

2002-01-01T23:59:59.000Z

340

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A Discussion of Testing Protocols and LANL's Contribution to...  

Broader source: Energy.gov (indexed) [DOE]

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes...

342

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...  

Office of Environmental Management (EM)

Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents & Publications Slide 1 LPP Risk Management Plan...

343

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department...

344

Police Officersí Perceptions of their Reactions to Viewing Internet Child Exploitation Material  

Science Journals Connector (OSTI)

Internet child exploitation (ICE) material, commonly referred to as internet child pornography or child sexual abuse images, refers to sexualised depictions of children ... produced, distributed, accessed or stor...

Martine Powell; Peter Cassematis; Mairi BensonÖ

2014-04-01T23:59:59.000Z

345

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Broader source: Energy.gov (indexed) [DOE]

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

346

(for Gene Recognition Analysis Internet Link),  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 6/1/2011 5 6/1/2011 6.6 Speeding Up the Process of Gene Discovery The human genome contains information that could be used to prevent birth defects and treat or cure devastating diseases, but it is written in a language that scientists are only beginning to understand. To help decipher the code, Ed Uberbacher and colleagues at Oak Ridge National Laboratory combined cutting- edge computer technology with their knowledge of human biology to develop GRAIL (for Gene Recognition Analysis Internet Link), a "thinking" computer program that imitates the human learning process as it searches for genetic meaning. GRAIL and successor software programs can rapidly identify key instructions in genes from within vast stretches of DNA that appear to be meaningless-a critical contribution to the

347

Fermilab Leadership Institute Integrating Internet, Instruction and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fermilab Leadership Institute Integrating Fermilab Leadership Institute Integrating Internet, Instruction and Curriculum Online Materials Projects ACT Program Information Example ACT Class Page Example LInC Class Page Please sign up here to be notified of future LInC program opportunities. Fermilab LInC Online is creating a cadre of educational leaders who effectively integrate technology in their classrooms to support engaged learning student investigations on real-world issues. Participants range from classroom teachers and technology coordinators through library media specialists, who create engaged learning projects that incorporate the best uses of technology. The new Fermilab LInC ACT course guides teachers through the process of evaluating, selecting and customizing an inquiry-based online project to

348

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

349

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Archived Data Dictionary Archived Data Dictionary Central Internet Database CID Photo Banner Archived Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Stream Disposition Quantity* EM Corp - The quantity of material or waste dispositioned for the stream during a specified year or range of years. Annual Stream Inventory Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be stored as of a particular year or range of years. Annual Stream Source Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be generated new, generated as process outputs (secondary), or added through a receipt from another DOE or non-DOE site, in a particular year or range of years.

350

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Data Dictionary Data Dictionary Central Internet Database CID Photo Banner Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Disposition WIMS - Planned disposition quantity (total volume of container, as disposed, in m3) reported for each year: FY08 through FY50. B C Chemical Name TRI - (Form R - Part II - Section 1.2) The name of the toxic chemical that has been released and/or transferred during the reporting year. Listed toxic chemicals are those chemicals on the list in Committee Print Number 99-169 of the Senate Committee on Environment and Public Works, titled "Toxic Chemicals Subject to Section 313 of the Emergency Planning and Community Right-To-Know Act of 1986" (42 U.S.C. 11023). Currently, there are over 600 toxic chemicals included on the list subject to reporting.

351

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

352

Abstract B50: Supercooling under magnetic field can control the risk for malignant transformations of human pluripotent stem (iPS) cells  

Science Journals Connector (OSTI)

...supercooling under magnetic field (2 kHz...human iPS cell lines from adult...human iPS cell lines for the supercooling under magnetic field group in 1...supercooling under magnetic field group (p0...human iPS cell lines which carry...

Hisashi Moriauchi; Makoto Mihara; Raymond Chung; Yue Zhang; and Chifumi Sato

2011-09-15T23:59:59.000Z

353

MQM -Multicast Quality Monitor Falko Dressler  

E-Print Network [OSTI]

transmissions over the Internet. Examples are TV broadcasts or conference meetings. These ser- vices require as due to the state-less working principle of UDP (User Datagram Protocol, [19]) which is used for IP multi- cast transmissions, multimedia applications typically use RTP (Real-time Transport Protocol, [22

Breu, Ruth

354

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect (OSTI)

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

355

Kyoto Protocol Response (Alabama) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

356

PEP Classroom Observation Protocol Project # _______ District __________________________ School ________________________________________  

E-Print Network [OSTI]

PEP Classroom Observation Protocol Project # _______ District __________________________ School (mark all that apply) Demonstrate or confirm known concepts/procedures Demonstrate or confirm known concepts/procedures Explore ideas, test conjectures, look for patterns Explore ideas, test conjectures

Lee, Carl

357

The Kyoto Protocol and developing countries  

E-Print Network [OSTI]

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

358

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

359

Entanglement Distillation Protocols and Number Theory  

E-Print Network [OSTI]

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

360

Entanglement distillation protocols and number theory  

SciTech Connect (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z{sub D}{sup n} associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z{sub D}{sup n} into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

Bombin, H.; Martin-Delgado, M.A. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid (Spain)

2005-09-15T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Adaptive protocols for the quantum depolarizing channel  

E-Print Network [OSTI]

In the first part, we present a family of entanglement purification protocols that generalize four previous methods, namely the recurrence method, the modified recurrence method, and the two methods proposed by Maneva-Smolin ...

Leung, Alan W

2007-01-01T23:59:59.000Z

362

NREL Test-to-Failure Protocol (Presentation)  

SciTech Connect (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

363

Membrane and MEA Accelerated Stress Test Protocols  

Broader source: Energy.gov (indexed) [DOE]

and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

364

BPA's Proposed Oversupply Management Protocol Presentation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

M I N I S T R A T I O N BPA's Proposed Oversupply Management Protocol February 14, 2012 BPA Rates Hearing Room To participate by phone please call (888) 296-1938 and enter 563088...

365

Sensornet Protocol Tuning Using Principled Engineering Methods  

Science Journals Connector (OSTI)

......equally applicable to both energy-ignorant and energy-aware protocols...reasons including high cost, risk of low solution...3. 2. RELATED WORK Energy awareness and energy...typically small and non- renewable. Energy consumption......

Jonathan Tate; Iain Bate

2010-09-01T23:59:59.000Z

366

DLC+VIT4IP (Smart Grid Project) (Austria) | Open Energy Information  

Open Energy Info (EERE)

DLC+VIT4IP DLC+VIT4IP Country Austria Coordinates 47.516232¬į, 14.550072¬į Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.516232,"lon":14.550072,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

367

Verifying multicast-based security protocols using the inductive method  

Science Journals Connector (OSTI)

Multicast, originally designed as an efficient way of broadcasting content, is being used in security protocols. Multicast security protocols are difficult to verify using model checking because they typically involve a large number of participants. ... Keywords: formal verification, multicast protocols, security protocols

Jean E. Martina; Lawrence C. Paulson

2013-03-01T23:59:59.000Z

368

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

369

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

E-Print Network [OSTI]

time. † Savings † measurement † and † verification † (M&V) †Performance † Measurement † and † Verification † Protocol: †

Jump, David

2014-01-01T23:59:59.000Z

370

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

Broader source: Energy.gov [DOE]

Accelerated Stress Test Protocols for PEM Fuel Cells, Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies

371

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

372

Spatial and temporal coupling models for the discovery of binding events in ChIP-Seq data  

E-Print Network [OSTI]

In this thesis, we will present two methods for identifying binding events in ChIP-Seq data. The motivation of this venture is to propose a complete read generating process under a probabilistic graphical model framework ...

Papachristoudis, Georgios

2010-01-01T23:59:59.000Z

373

Transgene Excision Has No Impact on In Vivo Integration of Human iPS Derived Neural Precursors  

E-Print Network [OSTI]

The derivation of induced human pluripotent stem cells (hiPS) has generated significant enthusiasm particularly for the prospects of cell-based therapy. But there are concerns about the suitability of iPS cells for in vivo ...

Major, Tamara

374

TEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE  

E-Print Network [OSTI]

://www.ncemch.org/pubs/PDFs/breastfeedingTIB.pdf Internet monograph (standard citation to a part) Inhalent abuse [Internet]. Bethesda (MD): NationalTEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE Excellence in library recommendations for Internet citations using the CSE style are taken from the National Library of Medicine

375

A framework for nation-centric classification and observation of the internet  

Science Journals Connector (OSTI)

The Internet has matured to a mission-critical infrastructure, and recently attracted much attention at political and legal levels in many countries. Civil actions regarding the Internet infrastructure require a thorough understanding of the national ... Keywords: AS-level classification, German internet graph, methodology, nation-state internet routing

Matthias Wšhlisch; Sebastian Meiling; Thomas C. Schmidt

2010-11-01T23:59:59.000Z

376

Internet Engineering Task Force INTERNETDRAFT J. Lennox, J.Rosenberg, H.Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force INTERNET­DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne draft Status of this Memo This document is an Internet­Draft. Internet­Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also

Lennox, Jonathan

377

On Power-Law Relationships of the Internet Topology Michalis Faloutsos  

E-Print Network [OSTI]

On Power-Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp the apparent randomness of the Internet, we dis- cover some surprisingly simple power-laws of the Internet topology. These power-laws hold for three snapshots of the Internet, between November 1997 and December

378

Community Internet Access in Rural Areas: Solving the Economic Sustainability Puzzle  

E-Print Network [OSTI]

- oping nations. In researching and studying the economic self-sustainability of the Internet in rural

379

Soils as a factor in Pinyon Pine mortality due to Ips Beetle infestation in Garden Park, Colorado: a case study.  

E-Print Network [OSTI]

-axe .............................................................12 Figure 4. Colorado tree species fire resistance rating ...........................................14 Figure 5. Ips Beetle flight distance to host..............................................................17 Figure 6. View of the northern third... host tree. An analysis of each species of bark beetle is beyond the scope of this paper, rather this research focuses on the ips beetle and its host tree, the pinyon pine. Pinyon-Juniper (P-J) woodlands represent the third largest vegetation type...

Krecic, Jeffrey

2008-02-25T23:59:59.000Z

380

OSTI Pact with Internet Archive Ensures Uninterrupted Research Access |  

Office of Scientific and Technical Information (OSTI)

Pact with Internet Archive Ensures Uninterrupted Research Access Pact with Internet Archive Ensures Uninterrupted Research Access E-print Network One sure thing about the World Wide Web: like the weather, it will change. Given this dynamic nature of the Web and the importance of preservation of scientific information in a digital environment, OSTI recently partnered with Internet Archive to ensure uninterrupted access to more than 1 million online research papers from the E-print Network. The DOE E-print Network is the largest collection that a federal institution has undertaken in an on-going effort to preserve their own documents and history through Archive-It. "As a result of the pioneering partnership between the Internet Archive and OSTI, we are ensuring long-term, continuous access to the growing body of cutting-edge

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Using end-user latency to manage internet infrastructure  

Science Journals Connector (OSTI)

Performance is a requirement for all interactive applications. For Internet-based distributed applications, the need is even more acute - users have a choice about where they browse, and if a site's performance frustrates them they may never return. ...

J. Bradley Chen; Michael Perkowitz

2002-12-01T23:59:59.000Z

382

Chapter 6 Use [and Abuse] of Multistakeholderism in the Internet  

Science Journals Connector (OSTI)

Multistakeholderism has become the Internet governance regime choice of many. While it is certain that everyone does not have the same modalities in mind when they utter the term, it is apparent that for many ...

Avri Doria

2014-01-01T23:59:59.000Z

383

The CATI Project: Charging and Accounting Technology for the Internet  

E-Print Network [OSTI]

The CATI Project: Charging and Accounting Technology for the Internet Burkhard Stiller1, Torsten, Switzerland 1 E-Mail: [stiller | plattner]@tik.ee.ethz.ch, 2 E-Mail: [braun | mguenter]@iam.unibe.ch Abstract

Braun, Torsten

384

The Internet, children, and privacy: the case against parental monitoring  

Science Journals Connector (OSTI)

Raising children with access to the Internet is still a relatively new phenomenon. It ... childrenís on-line communication exchanges, is not good. While there are reasons to think that...ethical inappropriateness

Kay Mathiesen

2013-12-01T23:59:59.000Z

385

Organization Culture Dimensions as Antecedents of Internet Technology Adoption  

Science Journals Connector (OSTI)

In recent years, growth of the Internet and the World Wide Web has had an impact on the way local, state, and national governments work. In this research, we examine the factors that influence adoption of Inte...

Subhasish Dasgupta; Babita Gupta

2013-01-01T23:59:59.000Z

386

An interoperable internet scale solution for RFID network security  

E-Print Network [OSTI]

Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for ...

Mao, Tingting

387

Towards More Efficient Delay Measurements on the Internet  

E-Print Network [OSTI]

the speed of experiments, improving the accuracy of measurement results, and reducing the amount of tra?c generated by the scan. Finally, we present architectures for performing an Internet scale measurement scan. We found that with custom drivers...

Webster, Patrick Jordan

2013-07-22T23:59:59.000Z

388

A calculus for cryptographic protocols: The spi calculus  

E-Print Network [OSTI]

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.

Martin Abadi; Andrew D. Gordon

1999-01-01T23:59:59.000Z

389

Hybrid protocol of remote implementations of quantum operations  

E-Print Network [OSTI]

We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

Ning Bo Zhao; An Min Wang

2007-08-04T23:59:59.000Z

390

Interpolation of recurrence and hashing entanglement distillation protocols  

SciTech Connect (OSTI)

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

391

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

392

Policy Flash 2011-96 Attachment.pdf  

Broader source: Energy.gov (indexed) [DOE]

in solicitations involving M&O contracts, management of major in solicitations involving M&O contracts, management of major facilities, and any acquisition which could involve the direct or indirect purchase of Information Technology equipment that uses Internet Protocol (IP) technology. DOE-H-__ COMPLIANCE WITH INTERNET PROTOCOL VERSION 6 (IPV6) IN ACQUIRING INFORMATION TECHNOLOGY (JULY 2011) This contract involves the acquisition of Information Technology (IT) that uses Internet Protocol (IP) technology. The Contractor agrees that (1) all deliverables that involve IT that uses IP (products, services, software, etc.) comply with IPv6 standards and interoperate with both IPv6 and IPv4 systems and products; and (2) it has IPv6 technical support for fielded product management, development and implementation available. If the Contractor plans to offer a deliverable that involves

393

A Unifying Infrastructure for Internet Services Jaideep Chandrashekar  

E-Print Network [OSTI]

this. In this paper, we propose a novel service overlay architecture that serves as a flexible and an associated service layer, which en- ables service-oriented routing and forwarding over the underly- ing IP architecture, namely service gateway (SG) and service point-of-presence (S- PoP). We also present examples

Hou, Y. Thomas

394

Population internet penetration rate and channel supply chain players' performances  

Science Journals Connector (OSTI)

With the rapid development of the internet, the population internet penetration rate plays a strategic importance in the dual-channel supply chain. In this research, we use a game-theoretic approach to examine the effect of the population internet penetration rate on the performances of the manufacturer and traditional retailer under the Stackelberg and Bertrand competitive models. Our results suggest that an increase in the population internet penetration rate always has a negative impact on the manufacturer and traditional retailer's profits. Furthermore, when the product is more suitable for the online market, the traditional retailer will be hurt more by the population internet penetration rate. For the manufacturer, although a larger product web fit can increase profits, the population internet penetration rate has a stronger impact on profitability, thus decreasing profits even as the product web fit increases. Our results also suggest that both the manufacturer and the retailer can adopt either of the Stackelberg and Bertrand competitive market structures in the dual-channel supply chain since their profits are unaffected by the two models. The managerial implications of our results are discussed and the probable paths of future research are identified.

Ruiliang Yan; John Wang; Sanjoy Ghose

2009-01-01T23:59:59.000Z

395

Policies and procedures to manage employee Internet abuse  

Science Journals Connector (OSTI)

Industry analysts estimate that billions of dollars in lost revenue were attributed to employee Internet abuse. Trends also suggest that lost job productivity and corporate liability have emerged as new workplace concerns due to growth of new online technologies and mobile computing. Such employee Internet misuse creates new management dilemmas on how to respond to incidences of such misuse as well poses network security risks and drains on network bandwidth. Within an organization, it is imperative to ensure that employees are using computing resources effectively and appropriately. Utilizing the previous literature in the field, this paper proposed a revised framework to manage employee Internet abuse. The former model proposed did not account for new digital media and recommended screening applicants for Internet addiction, using more of a clinical test than a job performance test. This new model describes both prevention and intervention methods to address incidents of online misuse in the workplace and refocuses hiring decisions into post-employment training. It also examines the new hiring concerns with the new iGeneration of college graduates and it examines how organizations should best utilize acceptable Internet use policies with clear methods of Internet monitoring to enforce that workers are complying with company policies. This paper also talks about the potential benefits of rehabilitation approaches to manage employees who abuse instead of terminating them to decrease job turnover and improve job retention. Implications for current management practices are also discussed.

Kimberly Young

2010-01-01T23:59:59.000Z

396

Money flows in the Internet ecosystem : strategic opportunities for telecom operators and other Internet agents in the digital age  

E-Print Network [OSTI]

The question about where the money goes is something really interesting for all the companies in the Internet ecosystem. While there is a huge interest, no clear answers have been provided, partially because the ecosystem ...

Valentin Vinagrero, Israel

2014-01-01T23:59:59.000Z

397

Chapter 15: Commercial New Construction Protocol  

SciTech Connect (OSTI)

This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

Keates, S.

2014-09-01T23:59:59.000Z

398

Chapter 22: Compressed Air Evaluation Protocol  

SciTech Connect (OSTI)

Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

Benton, N.

2014-11-01T23:59:59.000Z

399

The Kyoto Protocol: A business perspective  

SciTech Connect (OSTI)

Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

Malin, C.B. [International Chamber of Commerce, Paris (France)

1998-01-19T23:59:59.000Z

400

Surfing the internet with a BCI mouse  

Science Journals Connector (OSTI)

In this paper, we present a new web browser based on a two-dimensional (2D) brainĖcomputer interface (BCI) mouse, where our major concern is the selection of an intended target in a multi-target web page. A real-world web page may contain tens or even hundreds of targets, including hyperlinks, input elements, buttons, etc. In this case, a target filter designed in our system can be used to exclude most of those targets of no interest. Specifically, the user filters the targets of no interest out by inputting keywords with a P300-based speller, while keeps those containing the keywords. Such filtering largely facilitates the target selection task based on our BCI mouse. When there are only several targets in a web page (either an original sparse page or a target-filtered page), the user moves the mouse toward the target of interest using his/her electroencephalographic signal. The horizontal movement and vertical movement are controlled by motor imagery and P300 potential, respectively. If the mouse encounters a target of no interest, the user rejects it and continues to move the mouse. Otherwise the user selects the target and activates it. With the collaboration of the target filtering and a series of mouse movements and target selections/rejections, the user can select an intended target in a web page. Based on our browser system, common navigation functions, including history rolling forward and backward, hyperlink selection, page scrolling, text input, etc, are available. The system has been tested on seven subjects. Experimental results not only validated the efficacy of the proposed method, but also showed that free internet surfing with a BCI mouse is feasible.

Tianyou Yu; Yuanqing Li; Jinyi Long; Zhenghui Gu

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Internet Key Exchange (IKE) with MQV Yongge Wang  

E-Print Network [OSTI]

to work in an arbitrary finite group. The MQV protocol has been standardized in ANSI X9.42 [1], ANSI X9 in an arbitrary finite group. The MQV protocol has been standardized in ANSI X9.42 [1], ANSI X9.63 [2], and IEEE

Wang, Yongge

402

Fusion rules and vortices in $p_x+ip_y$ superconductors  

E-Print Network [OSTI]

The "half-quantum" vortices ($\\sigma$) and quasiparticles ($\\psi$) in a two-dimensional $p_x+ip_y$ superconductor obey the Ising-like fusion rules $\\psi\\times \\psi=1$, $\\sigma\\times \\psi=\\sigma$, and $\\sigma\\times \\sigma= 1+\\psi$. We explain how the physical fusion of vortex-antivortex pairs allows us to use these rules to read out the information encoded in the topologically protected space of degenerate ground states. We comment on the potential applicability of this fact to quantum computation. Modified 11/30/05 to reflect manuscript as accepted for publication. Includes corrected last section.

Michael Stone; Suk Bum Chung

2005-05-20T23:59:59.000Z

403

IP Routing Table Compression Using TCAM and Distance-one Merge  

E-Print Network [OSTI]

Subtraction . . . . . . . . . . . . . . . . . . . . . . . 26 IV.7 Pseudo Code to Convert a Range of IP Addresses to Cubes . . . . . 27 IV.8 Pseudo Code to Compress a Cover Using d1merge . . . . . . . . . . . 29 IV.9 Pseudo Code to Compress the Routing Table... Specified Functions (CSFs). Definition 5 A Literal is defined as a variable or its complement Definition 6 A Cube is defined as a conjunction of literals. Definition 7 A cube c is an Implicant ofF iff c?f +d Definition 8 A cube c1 is contained in a cube c2...

Bollapalli, Kalyana Chakravarthy

2011-02-22T23:59:59.000Z

404

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Broader source: Energy.gov (indexed) [DOE]

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

405

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Broader source: Energy.gov (indexed) [DOE]

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

406

Optimal Decentralized Protocols for Electric Vehicle Charging  

E-Print Network [OSTI]

1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging. The algorithms exploit the elasticity and controllability of electric vehicle loads in order to fill the valleys

Low, Steven H.

407

Russia's role in the Kyoto Protocol  

E-Print Network [OSTI]

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

408

Measuring Transport Protocol Potential for Energy Efficiency  

E-Print Network [OSTI]

Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras, Greece {skontog, emamatas, ipsaras, vtsaousi}@ee.duth.gr Abstract. We investigate the energy-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

Tsaoussidis, Vassilis

409

Utility, informativity and protocols Robert van Rooy  

E-Print Network [OSTI]

Utility, informativity and protocols Robert van Rooy ILLC/University of Amsterdam R particular natural assumptions the utility of questions and answers reduces to their informativity, and that the ordering relation induced by utility sometimes even reduces to the logical relation of entailment

van Rooij, Robert

410

Transport Control Protocol (TCP) In Heterogeneous Networks  

E-Print Network [OSTI]

Sprint Transport Control Protocol (TCP) In Heterogeneous Networks Objectives · Principles of TCP functional modules: slow start, congestion avoidance, fast transmission and fast recovery. ­ Maintain · Packet dropping is the only indication signal for network congestion (Maybe?) · Different transmission

Shihada, Basem

411

Routing protocols in ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc networking involves computers, typically wireless mobile nodes (MNs), that cooperatively form a network without specific user administration or configuration. In other words, ad hoc networking allows an arbitrary collection of MNs to create a ... Keywords: associativity-based routing (ABR), distributed bellman-ford (DBF), dynamic source routing (DSR), on-demand routing protocols

Dan Galatchi; Roxana Zoican

2005-03-01T23:59:59.000Z

412

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

413

A New Protocol for Evaluating Concrete Curing Effectiveness  

E-Print Network [OSTI]

and qualify the curing compound, a new evaluation protocol is introduced in this study. The new protocol consists of using measured relative humidity and temperature to calculate an effectiveness index (EI) which serves as an indicator of the effectiveness...

Sun, Peizhi

2013-07-22T23:59:59.000Z

414

Latent Class Models in action: Bridging social capital & Internet usage  

Science Journals Connector (OSTI)

Abstract This paper explores how Latent Class Models (LCM) can be applied in social research, when the basic assumptions of regression models cannot be validated. We examine the usefulness of this method with data collected from a study on the relationship between bridging social capital and the Internet. Social capital is defined here as the resources that are potentially available in oneís social ties. Bridging is a dimension of social capital, usually related to weak ties (acquaintances), and a source of instrumental resources such as information. The study surveyed a stratified random sample of 417 inhabitants of Lisbon, Portugal. We used LCM to create the variable bridging social capital, but also to estimate the relationship between bridging social capital and Internet usage when we encountered convergence problems with the logistic regression analysis. We conclude by showing a positive relationship between bridging and Internet usage, and by discussing the potential of LCM for social science research.

Barbara Barbosa Neves; Jaime R.S. Fonseca

2015-01-01T23:59:59.000Z

415

Internet-based calibration of a multifunction calibrator  

SciTech Connect (OSTI)

A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

2000-04-17T23:59:59.000Z

416

Value creation and the internet: entrepreneurial behaviour in Dutch SMEs  

Science Journals Connector (OSTI)

Although almost all Small- and Medium-sized Enterprises (SMEs) have adopted the internet and e-mail, only those entrepreneurs that realise how these innovations can be applied in their business are able to recognise opportunities to create value. Based on a sample of 614 Dutch SMEs, we examine what factors determine the recognition of such opportunities. Particularly, we argue that the use of the internet and e-mail has a positive relationship to organisational and strategic value creation; that organisational value creation precedes strategic value creation; and that entrepreneurs who are able to actually create strategic value Ė and thus have actually recognised entrepreneurial opportunities from these technologies Ė have higher levels of knowledge and experience, are more proactive networkers and have higher levels of entrepreneurial orientation. Our findings suggest that there are clear possibilities for SMEs to capitalise on adopting the internet and e-mail because all the associated factors can be enhanced through choices consciously made by the entrepreneurs.

Marijke Van Der Veen; Ingrid Wakkee

2009-01-01T23:59:59.000Z

417

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley  

E-Print Network [OSTI]

and relies on the skill of the protocol designer. Saidi [32] proposes a semi-automatic design tool based

Foley, Simon

418

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network [OSTI]

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

419

ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

ESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer a long lifetime of the sensor network and the application it is important to save energy. A sensor node control (MAC) protocol for wireless sensor networks, called Energy Saving Token Ring Protocol (ESTR). ESTR

Ungerer, Theo

420

A semantic translation method for data communication protocols  

Science Journals Connector (OSTI)

Protocol translation is a method for transforming pieces of information from a source protocol into relevant target protocol formats in order to communicate between heterogeneous legacy systems in interoperability environments. There are some existing ... Keywords: Gateway system, Heterogeneous system, Interoperability, Message translation, Semantic translation, Semantic-centric communication

Jingyu Kim; Sungwon Kang; Jihyun Lee; Bong Wan Choi

2012-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

A Program Logic for Verifying Secure Routing Protocols  

E-Print Network [OSTI]

reasoning. Existing protocol analysis tools [7, 12, 14] are rarely used in analyzing rout- ing protocolsA Program Logic for Verifying Secure Routing Protocols Chen Chen1 , Limin Jia2 , Hao Xu1 , Cheng done to understand and verify the formal security guarantees of proposed secure inter-domain routing

Pennsylvania, University of

422

A Program Logic for Verifying Secure Routing Protocols  

E-Print Network [OSTI]

protocol analysis tools [7, 11, 13] are rarely used in analyzing routing protocols becauseA Program Logic for Verifying Secure Routing Protocols (Technical Report) Chen Chen1 , Limin Jia2 done to understand and verify the formal security guarantees of proposed secure inter-domain routing

Sandholm, Tuomas W.

423

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

424

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

425

Utilisation des Protocoles HARQ pour la Radio Cognitive  

E-Print Network [OSTI]

Utilisation des Protocoles HARQ pour la Radio Cognitive Romain Tajan encadré/01/2012 #12;Plan 1 Introduction 2 La Radio Cognitive Techniques de la Radio Cognitive Méthodes d'accès 3 performances du protocole IR-HARQ 4 Utilisation des protocoles HARQ pour la Radio Cognitive Utilisation de l

Dobigeon, Nicolas

426

Simplified VO M&V Protocol Simplified Voltage Optimization (VO)  

E-Print Network [OSTI]

Simplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification Protocol 1.0 Introduction 1.1 Purpose The Simplified Voltage Optimization (VO) Measurement and Verification requirements, and measurement and verification formulations are included as part of this Protocol. 1

427

A Multi-Sender Asynchronous Extension to the AER Protocol  

E-Print Network [OSTI]

A Multi-Sender Asynchronous Extension to the AER Protocol John Lazzaro and John Wawrzynek Computer-event representation (AER) is an asynchronous point-to-point communi- cations protocol for silicon neural systems. This paper describes an extension of the AER protocol that allows multiple AER senders to share a common bus

Lazzaro, John

428

Efficient Application Integration in IP-Based Sensor Networks Dogan Yazar, Adam Dunkels  

E-Print Network [OSTI]

fields of energy management for homes, offices, and the smart grid. Many existing sensor network deploy evaluation of our system and show that Web services are a viable mechanism for use in low-power sensor Protocols]: Applications General Terms Design, Experimentation, Measurement, Performance Keywords Sensor

429

Lab protocols A. Preparation of competent Cells  

E-Print Network [OSTI]

for 30- 60 min. #12;Lab protocols C. Solutions RF1 Compound RbCl MnCl2 4H2O Potassium acetate CaCl2.2H2O-rinsed 0.22 u membrane. RF2 Compound MOPS RbCl CaCl2.2H2O Glycerol Amount/liter 20 ml of 0.5 M (pH6.8) 1

Oliver, Douglas L.

430

Building America 2014 House Simulation Protocols  

Broader source: Energy.gov [DOE]

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

431

CSP 550: Internet Programming Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and Paradigms, 2002.  

E-Print Network [OSTI]

CSP 550: Internet Programming Texts Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and SOAP 9 hours Total 45 hours Edited March 2006 (html, css checks) CSP 550: Internet Programming - CS

Heller, Barbara

432

Internet-based Abuse Prevention Training www.PraesidiumInc.com  

E-Print Network [OSTI]

Internet-based Abuse Prevention Training www.PraesidiumInc.com Quick Start Guide Welcome to Armatus page, an orange arrow will appear. Click the orange arrow to move forward. Do not use your Internet

Subramanian, Venkat

433

Building trust over the Internet : design and prototyping of an advocacy website  

E-Print Network [OSTI]

The Internet has empowered consumers with information, options, and a simple mechanism for transaction. Although the Internet has not completely replaced traditional shopping methods, it has brought about a change in the ...

Ma, Sha, 1981-

2004-01-01T23:59:59.000Z

434

E-Print Network 3.0 - art internet database Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

internet database Search Powered by Explorit Topic List Advanced Search Sample search results for: art internet database Page: << < 1 2 3 4 5 > >> 1 This is a guide to finding...

435

Routing Approach in IPv6 Ubiquitous Internet-Based Home Automation Network  

Science Journals Connector (OSTI)

Internet-based home automation system allows home owners to monitor and control connected devices in the home using any Internet enabled device. The homeís low power and low data rate, ... needs are catered for u...

Ardiansyah Musa Efendi; Oh Seung KyoÖ

2013-01-01T23:59:59.000Z

436

The Use of Internet and Intranet In American Convention and Visitors Bureaus  

Science Journals Connector (OSTI)

The emergence of the Internet/Intranet offers new promise to American Convention and ... extent of the various capabilities of the Internet/Intranet are used by CVBs to augment marketing ... directors have not re...

Y. Y. Yuan; D. R. Fesenmaier; L. XiaÖ

1999-01-01T23:59:59.000Z

437

Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"  

E-Print Network [OSTI]

The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coalóthe PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

Koomey, Jonathan G.

2008-01-01T23:59:59.000Z

438

E-Print Network 3.0 - arthritis-related internet web Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

related internet web Search Powered by Explorit Topic List Advanced Search Sample search results for: arthritis-related internet web Page: << < 1 2 3 4 5 > >> 1 COP 6930 Advanced...

439

The nucleolar SUMO-specific protease SMT3IP1/SENP3 attenuates Mdm2-mediated p53 ubiquitination and degradation  

SciTech Connect (OSTI)

Research highlights: {yields} SMT3IP1 interacts with p53 and Mdm2, and desumoylates both proteins. {yields} SMT3IP1 competes with p53 for binding to the central acidic domain of Mdm2. {yields} SMT3IP1 binding to Mdm2 inhibits Mdm2-mediated p53 ubiquitination and degradation. {yields} We postulate that SMT3IP1 acts as a new regulator of the p53-Mdm2 pathway. -- Abstract: SUMO (small ubiquitin-like modifier) modification plays multiple roles in several cellular processes. Sumoylation is reversibly regulated by SUMO-specific proteases. SUMO-specific proteases have recently been implicated in cell proliferation and early embryogenesis, but the underlying mechanisms remain unknown. Here, we show that a nucleolar SUMO-specific protease, SMT3IP1/SENP3, controls the p53-Mdm2 pathway. We found that SMT3IP1 interacts with p53 and Mdm2, and desumoylates both proteins. Overexpression of SMT3IP1 in cells resulted in the accumulation of Mdm2 in the nucleolus and increased stability of the p53 protein. In addition, SMT3IP1 bound to the acidic domain of Mdm2, which also mediates the p53 interaction, and competed with p53 for binding. Increasing expression of SMT3IP1 suppressed Mdm2-mediated p53 ubiquitination and subsequent proteasomal degradation. Interestingly, the desumoylation activity of SMT3IP1 was not necessary for p53 stabilization. These results suggest that SMT3IP1 is a new regulator of the p53-Mdm2 pathway.

Nishida, Tamotsu, E-mail: nishida@gene.mie-u.ac.jp [Department of Human Functional Genomics, Life Science Research Center, Mie University, 1577 Kurima-machiya, Tsu 514-8507 (Japan)] [Department of Human Functional Genomics, Life Science Research Center, Mie University, 1577 Kurima-machiya, Tsu 514-8507 (Japan); Yamada, Yoshiji [Department of Human Functional Genomics, Life Science Research Center, Mie University, 1577 Kurima-machiya, Tsu 514-8507 (Japan)] [Department of Human Functional Genomics, Life Science Research Center, Mie University, 1577 Kurima-machiya, Tsu 514-8507 (Japan)

2011-03-11T23:59:59.000Z

440

Employee Use of the Internet and Acceptable Use Policies in the Academic Workplace: Controlling Abuse while Creating Culture.  

E-Print Network [OSTI]

?? The use of the Internet has grown substantially, especially since the late 1990s. Businesses are relying increasingly on the Internet and intranet as toolsÖ (more)

King, B.J.

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

ARTIGO INTERNET IST estreia laboratrio de medicina regenerativa  

E-Print Network [OSTI]

ARTIGO INTERNET IST estreia laboratório de medicina regenerativa in http://www.boasnoticias.pt/ Data: 2011-9-20 Link: http://www.boasnoticias.pt/not ... IST estreia laboratório de medicina Células Estaminais e Medicina Regenerativa. O objetivo deste espaço vai centrar-se na investigação em

Instituto de Sistemas e Robotica

442

Roaming and investments in the mobile internet market  

Science Journals Connector (OSTI)

This model discusses mobile network operators' (MNOs) incentives to invest in their network facilities such as new 4G networks under various regimes of data roaming charge regulation. Given an induced externality of investments (spillovers) due to the ... Keywords: Investment spillover, Mobile internet, National roaming, Regulation

Torben StŁHmeier

2012-09-01T23:59:59.000Z

443

ENERGY MANAGEMENT REAL-TIME MULTI-TIER INTERNET SERVICES  

E-Print Network [OSTI]

ENERGY MANAGEMENT IN REAL-TIME MULTI-TIER INTERNET SERVICES A Dissertation Presented to the faculty This dissertation has been read and approved by the examining Committee: Kevin Skadron (Advisor) Sudhanva Gurumurthi and Applied Science: James H. Aylor (Dean) May 2008 #12;Abstract Energy management only recently emerged

Skadron, Kevin

444

Search Technology Internet Start-Ups Business Computing Companies  

E-Print Network [OSTI]

#12;Search Technology Internet Start-Ups Business Computing Companies Inside Technology Bits Blog engineer at Google, uses statistical analysis of data to help improve the company's search engine ¬Ľ Cellphones, Cameras, Computers and more Personal Tech ¬Ľ Advertise on NYTimes.com Search All NYTimes

Oyet, Alwell

445

Rocky K. C. Chang Internet Infrastructure and Security Group  

E-Print Network [OSTI]

10 July 2012 Measuring and Understanding Internet Performance: A Personal View #12;2 Graduate Forum, SunYat-sen University July 2012 #12;Measuring end-to-end performance Source:Akamai's network performance comparison3 Graduate Forum, SunYat-sen University July 2012 #12;Why measuring network path

Chang, Rocky Kow-Chuen

446

Energy Router: Architectures and Functionalities toward Energy Internet  

E-Print Network [OSTI]

, such as sunlight, wind, hydro, tide, geothermal, and waste [1]. Besides the utilization of renewable energyEnergy Router: Architectures and Functionalities toward Energy Internet Yi Xu, Jianhua Zhang, Wenye Wang, Avik Juneja, and Subhashish Bhattacharya Future Renewable Electric Energy Delivery and Management

Wang, Wenye

447

ARTIGO INTERNET PLUX vence Prmio "Biggest Innovation" em concurso  

E-Print Network [OSTI]

concorreram aos prémios "Biggest Innovation", "Greatest Social Value" e "Potential for Biggest Social ImpactNewsSearch ARTIGO INTERNET PLUX vence Prémio "Biggest Innovation" em concurso internacional in http://www.cienciapt.net Data: 2010-8-16 Link: http://www.cienciapt.net/pt/in ... PLUX vence Prémio "Biggest Innovation" em

Instituto de Sistemas e Robotica

448

Technology acceptance model for internet banking: an invariance analysis  

Science Journals Connector (OSTI)

The technology acceptance model (TAM) has been applied in different contexts to investigate a wide range of information technologies (IT), and a cumulative tradition has already been developed in this stream of research. Most TAM studies have been empirical ... Keywords: internet banking, invariance analysis, technology acceptance model

Vincent S. Lai; Honglei Li

2005-01-01T23:59:59.000Z

449

Acculturation to the global culture and internet adoption  

Science Journals Connector (OSTI)

Globalization is felt in most parts of the world and its effects on culture are becoming a topic of interest to society and in particular to the IS academic community. Our research addresses calls for research on the issue of globalization and its cultural ... Keywords: acculturation, dynamic view of culture, global culture, internet adoption, subjective norm, technology acceptance model, theory of reasoned action

Reem Ayouby; Anne-Marie Croteau; Louis Raymond

2012-11-01T23:59:59.000Z

450

Internet-Enabled Distributed Engineering (Web) Services , J. Cheng1  

E-Print Network [OSTI]

1 Internet-Enabled Distributed Engineering (Web) Services J. Peng1 , D. Liu1 , J. Cheng1 , C.S. Han in Civil Engineering. The web services model is becoming a popular approach for integrating software service approach is a promising paradigm for integrating large engineering software applications. Keywords

Stanford University

451

A dependability evaluation tool for the Internet of Things  

Science Journals Connector (OSTI)

The Internet of Things (IoT) is a promising networking paradigm which immerses objects (cell phones, goods, watches, sensing motes, TVs, etc.) in a worldwide connection. Despite its high degree of applicability, the IoT faces some challenges. One of ...

Ivanovitch Silva; Rafael Leandro; Daniel Macedo; Luiz Affonso Guedes

2013-10-01T23:59:59.000Z

452

Internet, a Political Issue for Europe (1970s-2010s)  

E-Print Network [OSTI]

Internet, a Political Issue for Europe (1970s-2010s) Draft paper The final version of this paper will be published in Bishop J. & Solo A.M.G, Politics and Policy in the Information Age, Springer, in 2013. Romain in Europe? How did the "network of networks" and ICTs become political stakes for EU institutions

Paris-Sud XI, Université de

453

ARTIGO INTERNET Professores visitam o maior reactor de Fuso Nuclear  

E-Print Network [OSTI]

ARTIGO INTERNET Professores visitam o maior reactor de Fus√£o Nuclear in http reactor de Fus√£o Nuclear Experi√™ncia aproxima investiga√ß√£o das futuras gera√ß√Ķes Doze professores do ensino secund√°rio visitaram o maior reactor de fus√£o nuclear da Terra (JET), no Reino Unido, na semana passada

Instituto de Sistemas e Robotica

454

Performance analysis and network path characterization for scalable internet streaming  

E-Print Network [OSTI]

Delivering high-quality of video to end users over the best-effort Internet is a challenging task since quality of streaming video is highly subject to network conditions. A fundamental issue in this area is how real-time applications cope...

Kang, Seong-Ryong

2008-10-10T23:59:59.000Z

455

Information Commons Help Desk Internet / Connectivity Wireless Access  

E-Print Network [OSTI]

Information Commons Help Desk Internet / Connectivity ¬Ľ Wireless Access ID #1912 Connecting in the Username and Password fields.5. Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help on this entry Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help

Boonstra, Rudy

456

Triple Play Support for the Next Generation Internet Mario Baldi  

E-Print Network [OSTI]

opportunity to information providers or, at least, be economically self-sustainable. In other words, Internet of accessing any type of information: it must be a profitable business or, at least, economically self- sustainable. In order to achieve this objective, services people are willing to pay for must be offered over

Baldi, Mario

457

Using the Internet to Stay Informed about Energy  

E-Print Network [OSTI]

and Oil Contract Information ....................................... http://apollo.osti.gov/htrnUeia4st2a.htm1 GasWEB Home Page ...................................................................................... http://www.gasweb.orglgasweb ... in 1997. My INTERNET e-mail address is jnp@unicomp.net. ENERGY HOMEPAGES Government: .................................................... DOE EREN - Energy Efficiency http://www.eren.doe.gov...

Phillips, J.

1996-01-01T23:59:59.000Z

458

ATLAS2000 Atlases of the Future in Internet M. Friedrich  

E-Print Network [OSTI]

ATLAS2000 ­ Atlases of the Future in Internet M. Friedrich (mafri@ipg.uni-freiburg.de) M. Melle the ecological system earth. Until recently the traditional atlas has been the pri- mary tool for collection and dissemination of geographical knowledge about the earth. To advance to concepts of the atlas it is necessary

Reiterer, Harald

459

ANALYSIS OF INTERNET TOPOLOGY DATA Hao (Johnson) Chen  

E-Print Network [OSTI]

ANALYSIS OF INTERNET TOPOLOGY DATA by Hao (Johnson) Chen B.E. in Computer Science, Shen Zhen OF SCIENCE In the School of Computing Science © Hao (Johnson) Chen 2004 SIMON FRASER UNIVERSITY April 2004, without permission of the author. #12;Approval Name: Hao (Johnson) Chen Degree: Master of Science Title

Trajkovic, Ljiljana

460

Has the ice man arrived? Tact on the Internet  

E-Print Network [OSTI]

Has the ice man arrived? Tact on the Internet Jonathan Grudin, UC Irvine and Microsoft Research. Eugene O'Neill's play The Ice Man Cometh outlines a series of calamities that occur when his characters the graded corrections via e- mail. The students produced a counter- proposal: After grading an exercise

Hearst, Marti

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

The Internet-What's Really in it for Teachers  

Science Journals Connector (OSTI)

......the filing system idea into an Intranet. An Intranet is simply a kind of internal...system but using all the same technologies as the Internet. No access...stuff again, but here with an Intranet system we have a genuine opportunity......

BRYAN DYE

1998-06-01T23:59:59.000Z

462

Review of Internet Service Providers and Peering Matthew Renzelmann  

E-Print Network [OSTI]

Review of Internet Service Providers and Peering Matthew Renzelmann February 11, 2007 1 Introduction This paper discusses the issues that lead ISPs to con- sider peering or transit arrangements with one an- other. Norton considers the technical reasons for peering as well as the financial

Akella, Aditya

463

PROVISIONING AND ANALYSIS OF APPLICATION-SPECIFIC INTERNET MEASUREMENTS  

E-Print Network [OSTI]

S metrics need to be sampled with strict periodicity for accurate network weather forecasting. To addressS) metrics (e.g., delay and loss) and estimation techniques such as forecasting for initial selection, measurement scheduling techniques are presented that provision QoS metrics on the Internet with the accuracy

Calyam, Prasad

464

The GIS Manual 1 The Integration of Internet GIS  

E-Print Network [OSTI]

The GIS Manual 1 CHAPTER 48 The Integration of Internet GIS and Wireless Mobile GIS Ming, centralized GIS architecture, to an open, distributed geographic information services (GIServices) framework. With advances in computer networking and wireless communication technology, GIS is moving toward an integration

Tsou, Ming-Hsiang

465

Herding cats:Ü modelling Quality of Service for Internet applications  

Science Journals Connector (OSTI)

...Quality of Service; performance engineering 1. Introduction In this paper...erent rates. For exam- ple, audio, video, gaming and data applications...the meantime, the Internet Engineering Task Force continues to build...quality of real-time multimedia audio and video. Poster presented...

2000-01-01T23:59:59.000Z

466

Turbo King: Framework for Large-Scale Internet Delay Measurements  

E-Print Network [OSTI]

servers (which is called cache pollution) and requires large traffic overhead when deployed in large consuming half the bandwidth needed by King and reducing the impact of cache pollution by several orders building an all-to-all delay matrix between approximately 220, 000 BGP prefixes advertised in the Internet

Loguinov, Dmitri

467

Energy Internet -- Towards Smart Grid 2.0  

Science Journals Connector (OSTI)

Price rising of energy and the limitation of fossil fuel makes it an inevitable tendency to introduce distributed energy such as renewable energy to the existing supply system in the future. Different players, such as power generation, transmission, ... Keywords: energy internet, smart grid, energy router, distributed generation

Junwei Cao, Mingbo Yang

2013-12-01T23:59:59.000Z

468

Protocol, Site Leads - May 2011 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

469

Building Technologies Office: Open-Protocol Platform for Commercial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Open-Protocol Platform Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project to someone by E-mail Share Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Facebook Tweet about Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Twitter Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Google Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Delicious Rank Building Technologies Office: Open-Protocol Platform for

470

DLC+VIT4IP (Smart Grid Project) (United Kingdom) | Open Energy Information  

Open Energy Info (EERE)

Kingdom) Kingdom) Jump to: navigation, search Project Name DLC+VIT4IP Country United Kingdom Coordinates 55.378052¬į, -3.435973¬į Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":55.378052,"lon":-3.435973,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

471

DLC+VIT4IP (Smart Grid Project) (Israel) | Open Energy Information  

Open Energy Info (EERE)

Israel) Israel) Jump to: navigation, search Project Name DLC+VIT4IP Country Israel Coordinates 32.498569¬į, 35.516289¬į Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":32.498569,"lon":35.516289,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

472

DLC+VIT4IP (Smart Grid Project) (Belgium) | Open Energy Information  

Open Energy Info (EERE)

(Belgium) (Belgium) Jump to: navigation, search Project Name DLC+VIT4IP Country Belgium Coordinates 50.282318¬į, 4.910889¬į Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.282318,"lon":4.910889,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

473

Quantitative Visualization of ChIP-chip Data by Using Linked Views  

SciTech Connect (OSTI)

Most analyses of ChIP-chip in vivo DNA binding have focused on qualitative descriptions of whether genomic regions are bound or not. There is increasing evidence, however, that factors bind in a highly overlapping manner to the same genomic regions and that it is quantitative differences in occupancy on these commonly bound regions that are the critical determinants of the different biological specificity of factors. As a result, it is critical to have a tool to facilitate the quantitative visualization of differences between transcription factors and the genomic regions they bind to understand each factor's unique roles in the network. We have developed a framework which combines several visualizations via brushing-and-linking to allow the user to interactively analyze and explore in vivo DNA binding data of multiple transcription factors. We describe these visualization types and also provide a discussion of biological examples in this paper.

Huang, Min-Yu; Weber, Gunther; Li, Xiao-Yong; Biggin, Mark; Hamann, Bernd

2010-11-05T23:59:59.000Z

474

Distributed Grooming in Multi-Domain IP/MPLS-DWDM Networks  

SciTech Connect (OSTI)

This paper studies distributed multi-domain, multilayer provisioning (grooming) in IP/MPLS-DWDM networks. Although many multi-domain studies have emerged over the years, these have primarily considered 'homogeneous' network layers. Meanwhile, most grooming studies have assumed idealized settings with 'global' link state across all layers. Hence there is a critical need to develop practical distributed grooming schemes for real-world networks consisting of multiple domains and technology layers. Along these lines, a detailed hierarchical framework is proposed to implement inter-layer routing, distributed grooming, and setup signaling. The performance of this solution is analyzed in detail using simulation studies and future work directions are also high-lighted.

Liu, Qing [ORNL

2009-12-01T23:59:59.000Z

475

Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP). Technology summary  

SciTech Connect (OSTI)

The Characterization, Monitoring, and Sensor Technology Integrated Program seeks to deliver needed technologies, timely and cost-effectively, to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The scope of characterizations monitoring, and sensor technology needs that are required by those organizations encompass: (1) initial location and characterization of wastes and waste environments - prior to treatment; (2) monitoring of waste retrieval, remediation and treatment processes; (3) characterization of the co-position of final waste treatment forms to evaluate the performance of waste treatments processes; and (4) site closure and compliance monitoring. Wherever possible, the CMST-IP fosters technology transfer and commercialization of technologies that it sponsors.

Not Available

1994-04-01T23:59:59.000Z

476

Using IP law as a medical patient safety tool: efforts from the US and China  

Science Journals Connector (OSTI)

The unregulated manufacture of prescription drugs, sold under a known generic or brand name, poses an increasing safety risk to unsuspecting healthcare consumers around the world. Those who receive a counterfeit medication may be at risk for a number of dangerous health consequences. Patients may experience unexpected side effects, allergic reactions, or worsening of their medical condition. Many counterfeits do not contain any active ingredient and instead use inert substances which provide no medical treatment benefit. Counterfeit medications may also contain incorrect ingredients, improper dosages of the correct ingredients, or may contain hazardous ingredients. As a collaborative countermeasure model, we summarise here joint anti-counterfeiting efforts through intellectual property rights (IPR) enforcement by the US and China. Such cooperative work serves as a model for enforcement and illustrates how intellectual property (IP) law is being applied across borders to combat unregulated prescription drug manufacture and sale.

Robert Jameson; James Chin; Frank Peo; Luis Gonzales; Daniel Lorence

2009-01-01T23:59:59.000Z

477

DLC+VIT4IP (Smart Grid Project) (Italy) | Open Energy Information  

Open Energy Info (EERE)

Italy) Italy) Jump to: navigation, search Project Name DLC+VIT4IP Country Italy Coordinates 41.352074¬į, 12.249756¬į Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.352074,"lon":12.249756,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

478

DLC+VIT4IP (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Project Name DLC+VIT4IP Country Germany Coordinates 51.165691¬į, 10.451526¬į Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":51.165691,"lon":10.451526,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

479

Five Deaths Resulting from Abuse of Dextromethorphan Sold Over the Internet  

Science Journals Connector (OSTI)

......obtained from the same internet supplier in each...dextromethorphan abuse and toxicity. The...Fatal Outcome Humans Internet Male Marketing legislation...Substance-Related Disorders blood Young Adult 99 Dextromethorphan...obtained from the same internet supplier in each...dextromethorphan abuse and toxicity. The......

Barry K. Logan; Gary Goldfogel; Rebecca Hamilton; James Kuhlman

2009-03-01T23:59:59.000Z

480

Addressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet  

E-Print Network [OSTI]

. In the face of potential abuse or other malice, it seems clear that future Internet designs need to addressAddressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet David jtw@lcs.mit.edu Ted Faber USC ISI faber@isi.edu ABSTRACT A system as complex as the Internet can only

Faber, Ted

Note: This page contains sample records for the topic "internet protocol ip" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

OurStory: Exploring the Sky From the Internet to Outer Space  

E-Print Network [OSTI]

OurStory: Exploring the Sky From the Internet to Outer Space Read the "Directions" sheets for step Guide, page 1 of 2 #12;OurStory: Exploring the Sky From the Internet to Outer Space Parent Guide, page 2 (attached) Computer with Internet access Pen or pencil More information at http

Mathis, Wayne N.

482

OPPORTUNITIES FOR COMPUTERAIDED INSTRUCTION IN PHONETICS AND SPEECH COMMUNICATION PROVIDED BY THE INTERNET  

E-Print Network [OSTI]

BY THE INTERNET M. Huckvale 1 , C. Benoit 2 , C. Bowerman 3 , A. Eriksson 4 , M. Rosner 5 , M. Tatham 6 , B. Williams 7 Computer Aided Learning and Use of the Internet Working Group SOCRATES Thematic Network available on the Internet could be exploited in the education of phonetics and speech communication

Edinburgh, University of

483

ELISA: European Linkage between Internet Integrated and Differentiated Services over ATM  

E-Print Network [OSTI]

Internet does not guarantee Quality of Service for user flows, which prevents the provision of good qualityELISA: European Linkage between Internet Integrated and Differentiated Services over ATM T. V. Do-Fokus Abstract Nowadays we are witnessing the growth of Internet at an unprecedented rate. However, the current

484

Internet Evolution and Social Impact Sara Kiesler, Robert Kraut, Jonathon Cummings, Bonka Boneva,  

E-Print Network [OSTI]

that many people, especially those with good social resources, have integrated the Internet--they become instantly popular. If communication is so important to Internet users, there is good reasonChapter xx Internet Evolution and Social Impact Sara Kiesler, Robert Kraut, Jonathon Cummings

485

ETH TIK-NR. 118, JULY 2001 1 A Spectral Analysis of the Internet Topology  

E-Print Network [OSTI]

. Finally, a good understanding of the Internet topology can lead to improvements in network topologyETH TIK-NR. 118, JULY 2001 1 A Spectral Analysis of the Internet Topology Danica Vukadinovi¬īc, Polly Huang, Thomas Erlebach Abstract-- In this paper we investigate properties of the Internet topology

Huang, Polly

486

The Extensive Challenges of Internet Application Measurement Martin Arlitt Carey Williamson  

E-Print Network [OSTI]

interested in learning more about Internet measurement, the book by Crovella and Krishnamurthy [1] is a goodThe Extensive Challenges of Internet Application Measurement Martin Arlitt Carey Williamson The Internet has grown dramatically and evolved significantly over the past 10 years. While this growth

Williamson, Carey

487

A framework for flowbased accounting on the Internet HansWerner Braun  

E-Print Network [OSTI]

for accounting in the Internet reflects its historical status as bulk­funded good for the academic communityA framework for flow­based accounting on the Internet Hans­Werner Braun hwb@sdsc.edu San Diego describe steps toward an accounting mechanism to attribute Internet resource consumption based on service

Polyzos, George C.

488

Sales Taxes on the Internet: When and How to Tax? Ozlem Uzuner Lee McKnight  

E-Print Network [OSTI]

, the Internet are considered. This paper discusses sales and use taxes for electronic services and goodsSales Taxes on the Internet: When and How to Tax? Ozlem Uzuner Lee McKnight Massachusetts Institute As a first attempt to tax electronic commerce, many countries applied the existing tax laws to Internet

Uzuner, √?zlem

489

OPPORTUNITIES FOR COMPUTER-AIDED INSTRUCTION IN PHONETICS AND SPEECH COMMUNICATION PROVIDED BY THE INTERNET  

E-Print Network [OSTI]

BY THE INTERNET M. Huckvale1 , C. Benoit2 , C. Bowerman3 , A. Eriksson4 , M. Rosner5 , M. Tatham6 , B. Williams7 Computer Aided Learning and Use of the Internet Working Group SOCRATES Thematic Network in Phonetics of teaching and learning. This paper investigates how resources currently available on the Internet could

Edinburgh, University of

490

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control  

E-Print Network [OSTI]

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control Lars Rasmusson present the idea to let agents handle security issues in Internet markets. The motivation for this is the difficulties in having external or centralized control over a system as open as the Internet. The agents use

491

Measuring the Cost of Scalability and Reliability for Internet-based, server-centered applications  

E-Print Network [OSTI]

1 Measuring the Cost of Scalability and Reliability for Internet-based, server- centered, a centralized approach to Internet-based application development is not scalable and also not dependable. This paper presents a decentralized approach to dependable Internet based application development, consisting

Newcastle upon Tyne, University of

492

Endpoint-Based Routing Strategies for Improving Internet Performance and Resilience  

E-Print Network [OSTI]

to guarantee good end-to-end performance in the future Internet. We believe that the contributionsEndpoint-Based Routing Strategies for Improving Internet Performance and Resilience Aditya Akella, of any sponsoring institution, the U.S. government or any other entity. #12;Keywords: Internet routing

493

Sustaining the Internet with hyperbolic mapping Marian Bogu~na,1  

E-Print Network [OSTI]

. INTRODUCTION In the Information Age, the Internet is becoming a de facto public good, akin to roads, airportsSustaining the Internet with hyperbolic mapping Mari¬īan Bogu~n¬īa,1 Fragkiskos Papadopoulos,2, Kallipoleos 75, Nicosia 1678, Cyprus 3 Cooperative Association for Internet Data Analysis (CAIDA), University

California at San Diego, University of

494

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd,  

E-Print Network [OSTI]

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd, with contributions Introduction This note contains a discussion about formulating the research problem for Internet research the implications of these assumptions in formulating problems in Internet re- search. This process would aim

Floyd, Sally

495

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd,  

E-Print Network [OSTI]

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd, with contributions Introduction This note contains a discussion about formulating the research problem for Internet research the implications of these assumptions in formulating problems in Internet re­ search. This process would aim

Floyd, Sally

496

Internet Size Measurements Edoardo Biagioni, Peter Hinely, Chun Liu, Xinmin Wang  

E-Print Network [OSTI]

Internet Size Measurements Edoardo Biagioni, Peter Hinely, Chun Liu, Xinmin Wang January 2000 and the performance of the Internet. Our measurements and techniques are designed to reveal the number of hosts 2000, on the order of 23 million hosts are connected to the Internet. The mean distance from our

Biagioni, Edoardo S.

497

Measurement and Interpretation of Voice Traffic on the Internet N. F. Maxemchuk S. Lo  

E-Print Network [OSTI]

Measurement and Interpretation of Voice Traffic on the Internet N. F. Maxemchuk S. Lo AT&T Labs ­ Research Lucent Tech. ­ Bell labs ABSTRACT The Internet is being used to carry voice conversations describe the results of a set of measurements on intrastate, cross country, and international Internet

Maxemchuk, Nicholas F.

498

The Workshop on Active Internet Measurements (AIMS) kc@caida.org  

E-Print Network [OSTI]

The Workshop on Active Internet Measurements (AIMS) Report kc claffy CAIDA kc@caida.org Marina Internet is a perpetually challenging task for technical, economic and policy reasons, which leaves empirical grounding. On February 12-13, 2009, CAIDA hosted the Workshop on Ac- tive Internet Measurements

California at San Diego, University of

499

EndpointBased Routing Strategies for Improving Internet Performance and Resilience  

E-Print Network [OSTI]

to guarantee good end­to­end performance in the future Internet. We believe that the contributionsEndpoint­Based Routing Strategies for Improving Internet Performance and Resilience Aditya Akella, of any sponsoring institution, the U.S. government or any other entity. #12; Keywords: Internet routing

Akella, Aditya

500

Mapping the reasons for resistance to Internet banking: A means-end approach  

Science Journals Connector (OSTI)

Although Internet banking has been widely adopted in developed countries, there is still a group of customers resisting the services. In other words, Internet banking, although proven to be a successful innovation, has still not become adopted by the ... Keywords: ATM, Banking, Consumer behaviour, Innovation resistance, Internet

Tuire Kuisma; Tommi Laukkanen; Mika Hiltunen

2007-04-01T23:59:59.000Z