Sample records for internet protocol version

  1. Unified Theory of Relativistic Identification of Information in a Systems Age: Proposed Convergence of Unique Identification with Syntax and Semantics through Internet Protocol version 6

    E-Print Network [OSTI]

    Datta, Shoumen

    2008-07-31T23:59:59.000Z

    This paper proposes to utilize internet protocol version six (IPv6) to uniquely identify not only things (objects) but also processes, relationships (syntax, semantics) and interfaces (sensors). Convergence of identification ...

  2. H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To: CongestionDevelopment ofofthePerformanceof EnergyH-35 DOE-H-__

  3. Internet Control Message Protocol The Context

    E-Print Network [OSTI]

    1 1 Internet Control Message Protocol ICMP 2 The Context IP-Related Protocol: ICMP TCP/IP Protocol Internet Control Message Protocol (ICMP) The Internet Control Message Protocol (ICMP) is used by routers is a separate protocol that sits above IP and uses IP to transport messages In practice, ICMP is an integral

  4. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  5. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

  6. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  7. Hydrogen Refueling Protocols Webinar (Text Version) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Refueling Protocols Webinar (Text Version) Hydrogen Refueling Protocols Webinar (Text Version) Below is the text version of the webinar titled "Hydrogen Refueling Protocols,"...

  8. Privacy of encrypted Voice Over Internet Protocol

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10T23:59:59.000Z

    of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

  9. SMDP a Simple Multimedia Service Description Protocol on the Internet

    E-Print Network [OSTI]

    Lung, Chung-Horng

    SMDP ­ a Simple Multimedia Service Description Protocol on the Internet Qiang Nelson Yin Chung}@sce.carleton.ca Abstract Downloading multimedia content from the Internet becomes more and more popular. Consumers have. Based on the current model, it is time consuming for consumers to obtain the desired multimedia content

  10. Towards a Protocol-Independent Internet Transport API

    E-Print Network [OSTI]

    Welzl, Michael

    a standardized API yet, and at the time of writing, the most recent Internet-draft specifying the SCTP API [1Towards a Protocol-Independent Internet Transport API Michael Welzl University of Oslo Email Gjessing University of Oslo Email: steing@ifi.uio.no Abstract--The conjoint API of TCP, UDP, UDP-Lite, SCTP

  11. Expansion of the internet protocol address space with "minor" disruption of current hardware or software

    E-Print Network [OSTI]

    Wheatley, Philip Stephen

    1996-01-01T23:59:59.000Z

    Currently, the Internet suite of protocols uses a 32 bit network layer address and requires that each machine have a unique address. The problem: 32 bits only distinguishes 2 32 or 4,294,967,296 machines. Even with four billion addresses, experts...

  12. IP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance

    E-Print Network [OSTI]

    Dunkels, Adam

    , smart cities, structural health management systems, smart grid and energy management, and transportationIP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance White paper #1 Adam, Cisco Systems September 2008 Executive Summary The emerging application space for smart objects requires

  13. Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, this division of functionality evolved organically- tures of the algorithms, we construct TRUMP: a traffic man- agement protocol that is distributed

  14. Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization

    ScienceCinema (OSTI)

    Lefteri Tsoukalas

    2010-01-08T23:59:59.000Z

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  15. ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP

    E-Print Network [OSTI]

    , Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton, and Mark Rooks of L-1 Identity Solutions (formerly of Booz Allen Hamilton), the guide examines the differences between IPv4 and IPv6

  16. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOE Patents [OSTI]

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06T23:59:59.000Z

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  17. Commercial Building Energy Asset Score Program Overview and Technical Protocol (Version 1.1)

    SciTech Connect (OSTI)

    Wang, Na; Goel, Supriya; Makhmalbaf, Atefe

    2013-08-09T23:59:59.000Z

    The U.S. Department of Energy (DOE) is developing a voluntary national scoring system for commercial buildings to help building owners and managers assess a building’s energy-related systems independent of operations. The goal of the score is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system, known as the Commercial Building Energy Asset Score, will allow building owners and managers to compare their building infrastructure against peers and track building upgrades over time. The system will also help other building stakeholders (e.g., building investors, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset scoring tool. The alternative methods that were considered prior to developing the current approach are described in the Program Overview and Technical Protocol Version 1.0.

  18. Scalable Internet Routing on Topology-Independent Node Identities

    E-Print Network [OSTI]

    Ford, Bryan

    2003-10-31T23:59:59.000Z

    Unmanaged Internet Protocol (UIP) is a fully selforganizingnetwork-layer protocol that implements scalableidentity-based routing. In contrast with addressbasedrouting protocols, which depend for scalability oncentralized ...

  19. 32 Int. J. Internet Protocol Technology, Vol. 5, Nos. 1/2, 2010 Copyright 2010 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Calyam, Prasad

    networking and cyber-security. Nathan Howes received his BS in Computer Science and Engineering from The Ohio and cyber-security. 1 Introduction With increased access to broadband, internet videoconferencing has emerged as a viable medium for communication and entertainment. It is being used increasingly

  20. Commercial Building Energy Asset Score System: Program Overview and Technical Protocol (Version 1.0)

    SciTech Connect (OSTI)

    Wang, Na; Gorrissen, Willy J.

    2013-01-11T23:59:59.000Z

    The U.S. Department of Energy (DOE) is developing a national voluntary energy asset score system that includes an energy asset score tool to help building owners evaluate their buildings with respect to the score system. The goal of the energy asset score system is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system will allow building owners and managers to compare their building infrastructure against peers and track building upgrade progress over time. The system can also help other building stakeholders (e.g., building operators, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from their operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset score tool. This report also describes alternative methods that were considered prior to developing the current approach. Finally, this report describes a few features of the program where alternative approaches are still under evaluation.

  1. Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico

    E-Print Network [OSTI]

    Perez, Mary Louise

    2012-08-31T23:59:59.000Z

    Internet (VoIP) started in 1995 by people in Israel using computers to communicate. With later software and hardware developments by entrepreneurs and manufacturers more computer users had access to VoIP technology. A traditional call could now... in business operations. The disadvantages of VoIP technology are: 1) The technology is not quite as reliable as traditional land service. It is dependent on electrical power and the data network to support the VoIP telephony. TDM land lines should...

  2. version

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin: EnergyWyandanch,Eaga SolarZoloHomeimprovesecurity

  3. Proactive techniques for correct and predictable Internet routing

    E-Print Network [OSTI]

    Feamster, Nicholas G. (Nicholas Greer), 1979-

    2006-01-01T23:59:59.000Z

    The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

  4. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  5. Internet Supplement for Vector Calculus

    E-Print Network [OSTI]

    Jerry Marsden

    2003-10-07T23:59:59.000Z

    Apr 3, 2010 ... Page i. Internet Supplement for Vector Calculus. Fifth Edition. Version: October, 2003. Jerrold E. Marsden. California Institute of Technology.

  6. Dynamic, transparent Internet server replication using HYDRANET

    E-Print Network [OSTI]

    Dillon, Geoffrey A.

    1998-01-01T23:59:59.000Z

    The exponential growth of the use of the Internet has hics. caused increasing stress on the networking infrastructure. Routers, servers and protocols are reaching their limits and need room to scale up their capacities to meet user demands. Client...

  7. * 5.6 Handshake protocol (tools.ietf.org/html/draft-ietf-tls-ssl-version3-00) enum{ hello_request(0), client_hello(1), server_hello(2), certificate(11),

    E-Print Network [OSTI]

    Dumas, Jean-Guillaume

    protocol (tools.ietf.org/html/draft-ietf-tls-ssl-version3_suite; CompressionMethod compression_method; } ServerHello; nov 12, 08 15:21 Page 1/4draft-ietf-tls-ssl:21 Page 2/4draft-ietf-tls-ssl-RSA.c Printed by Jean-Guillaume Dumas mercredi novembre 12, 2008 1/2draft-ietf-tls-ssl

  8. Internet Sampler

    E-Print Network [OSTI]

    2006-08-23T23:59:59.000Z

    Gnat (gnatkip) wrote, 2006-08-23 16:36:00 Art: Internet Sampler Title: Internet Sampler Media: Excel, Photoshop, Crosstitch.com Caption Maker, alphabet by Carrie's Creations, graphics from Windows, IE, and Firefox Notes: An illustration... the manner of the pioneers. At the top I’ll set my most oft- uttered prayer: Thank you, internet, for letting me observe so many crazy people from a safe distance." Since I first read that line, there have been so many occasions when I've been reminded...

  9. Internet 0

    E-Print Network [OSTI]

    Krikorian, Raffi Chant, 1978-

    2004-01-01T23:59:59.000Z

    The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

  10. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  11. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    -2004 SYSTEM MODEL NETWORK WORK- STATIONS SERVERS WS WS WS WS NFS GOPHER LIBRARY KERBEROS #12;3© Ravi Sandhu authorization and access control services on top of Kerberos #12;5© Ravi Sandhu 2000-2004 TRUST: BILATERAL RHOSTS MODEL A B C E G F A B A trusts B A will allow users logged onto B to log onto A without a password

  12. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01T23:59:59.000Z

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  13. The Internet Backplane Protocol: A Study in Resource Sharing1 This work is supported by the National Science Foundation Next Generation Software Program under grant # EIA-9975015, the Department of

    E-Print Network [OSTI]

    Plank, Jim

    by the National Science Foundation Next Generation Software Program under grant # EIA-9975015, the Department of Energy Scientific Discovery through Advanced Computing Program under grant # DE-FC02-01ER25465, and by the National Science Foundation Internet Technologies Program under grant # ANI-9980203. Alessandro Bassi

  14. Version: Nov 2005 Facility Orientation and Protocols

    E-Print Network [OSTI]

    of Energy FACE Facility at Duke University. This document provides an overview of the FACE Facility) plots. Plots 1-7 contain a central walk-up tower, 16 peripheral towers, and temperature-controlled 8' x initiatives have made use of the towers, sheds, and other unique resources available at the facility. In 2003

  15. ChoiceNet: Toward an Economy Plane for the Internet Tilman Wolf

    E-Print Network [OSTI]

    and services in the Internet in- frastructure itself has been sluggish, especially where eco- nomic incentives in "protocol space." The current Internet reflects certain economic relation- ships, for example between of the economy sur- rounding in-network services. In our work, we aim for an explicit representation of eco

  16. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that shown in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the...

  17. Decentralized Storage Consistency via Versioning Servers Garth Goodson,

    E-Print Network [OSTI]

    , consistency protocol, versioning servers, distributed systems #12; Introduction Survivable storage systems (e produce garbage. Protocols exist for achieving such consistency, they generally involve significant extra], survival client compromises [34]. Further, implemented with minimal performance cost ( [34] and capacity

  18. Sustainable Internet Architecture PROJECT DESCRIPTION

    E-Print Network [OSTI]

    Kuzmanovic, Aleksandar

    Sustainable Internet Architecture PROJECT DESCRIPTION 1 Introduction The Internet currently plays that the problems in the current Internet architecture stem from its lack of sustainability which impedes future de of challenges. Numerous research studies on a new Internet architecture (e.g., [16, 37, 48, 54, 55]) have

  19. Airborne Internet : market & opportunity

    E-Print Network [OSTI]

    Bhadouria, Anand

    2007-01-01T23:59:59.000Z

    The purpose of this thesis to evaluate the opportunity for service provider entry and of the airborne internet, to analyze the disruptive impact technology used by AirCell and AeroSat has had on the development of an ...

  20. Internet Polling Development Report

    E-Print Network [OSTI]

    Klima, P.; Lockhart, D.; Haberl, J. S.

    2001-01-01T23:59:59.000Z

    This is the final report which documents the development of Internet-based data logger polling. The project consists of two main tasks: the development of automated polling procedures that can be launched remotely with no operator input...

  1. GT: picking up the truth from the ground for Internet traffic F. Gringoli, L. Salgarelli, M. Dusi

    E-Print Network [OSTI]

    California at San Diego, University of

    of Internet traffic modeling, firewall, and intrusion detection research requires traces where some ground. But DPI is ineffective when traffic is encrypted and ambiguous when different protocols exhibit similarGT: picking up the truth from the ground for Internet traffic F. Gringoli, L. Salgarelli, M. Dusi

  2. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  3. Weaving Measurements Into Internet Protocols and Services Research Statement

    E-Print Network [OSTI]

    Plaisted, David A.

    be fully realized only if the number of monitors needed for completely monitoring a target network and then place monitors at the smallest set of nodes that can collectively monitor a complete target network

  4. Design of a PSi header processor for the internet protocol

    E-Print Network [OSTI]

    Bai, Jinxia

    1995-01-01T23:59:59.000Z

    (Connection Processor number). The content of rb2 is the 32 bit memory address to indicate the memory location of the incoming packet. 7 rtmp ~ rbl k 00000003H;ALU z (~ check 00 "/ (if ALUM == 0 jump Startl) This microinstruction performs the 'And' operation... and checks the ALUM flag. According to the flag the address of the next microinstruction to be executed will be given. This microinstruction says that if the primitive code is 00(ALUM flag is true), it means the next step is to jump back to the address '1...

  5. Security Survey of Internet Browsers Data Managers

    E-Print Network [OSTI]

    Boja, Catalin

    2011-01-01T23:59:59.000Z

    The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

  6. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  7. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

  8. Internet architecture Access networks

    E-Print Network [OSTI]

    access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

  9. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  10. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  11. Internet Fuel Cells Forum

    SciTech Connect (OSTI)

    Sudhoff, Frederick A.

    1996-08-01T23:59:59.000Z

    The rapid development and integration of the Internet into the mainstream of professional life provides the fuel cell industry with the opportunity to share new ideas with unprecedented capabilities. The U.S. Department of Energy's (DOE's) Morgantown Energy Technology Center (METC) has undertaken the task to maintain a Fuel Cell Forum on the Internet. Here, members can exchange ideas and information pertaining to fuel cell technologies. The purpose of this forum is to promote a better understanding of fuel cell concepts, terminology, processes, and issues relating to commercialization of fuel cell power technology. The Forum was developed by METC to provide those interested with fuel cell conference information for its current concept of exchanging ideas and information pertaining to fuel cells. Last August, the Forum expanded to an on-line and world-wide network. There are 250 members, and membership is growing at a rate of several new subscribers per week. The forum currently provides updated conference information and interactive information exchange. Forum membership is encouraged from utilities, industry, universities, and government. Because of the public nature of the internet, business sensitive, confidential, or proprietary information should not be placed on this system. The Forum is unmoderated; therefore, the views and opinions of authors expressed in the forum do not necessarily state or reflect those of the U.S. government or METC.

  12. Field and Lab Methods & Protocols University of Michigan

    E-Print Network [OSTI]

    Kling, George W.

    SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

  13. Office Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National Idling ReductionOffice Protocols

  14. Security proofs of cryptographic protocols Eva Jencusova

    E-Print Network [OSTI]

    with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

  15. APS Protocol for

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

  16. 1. The Internet 1-1 Chapter 1: The Internet

    E-Print Network [OSTI]

    Brass, Stefan

    1. The Internet 1-1 Chapter 1: The Internet References: · Rainer Klute: Das World Wide Web. Addison with TCP/IP. Prentice Hall, 1988, ISBN 0134701887. · W. Richard Stevens: TCP Illustrated, Vol. 1. Addison-Wesley, 1994, ISBN 0201633469. · W. Richard Stevens: UNIX Network Programming, Vol. 1, 2nd Ed. Prentice Hall

  17. Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet

    E-Print Network [OSTI]

    Kravets, Robin

    Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet Invited Paper characteristics that can be leveraged to design energy-efficient loss recovery mechanisms. Given their loss, we first present an analysis of an energy-efficient MAC-layer protocol, called Fast Transmit MAC

  18. Version Control

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrincetonUsing Maps1 - USAFof EnergyVendorwinsVenue and Control

  19. Attacking the Asokan-Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL 

    E-Print Network [OSTI]

    Steel, G.; Maidl, M.; Bundy, Alan

    We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols which may have an unbounded...

  20. Mashups--Web Web Internet

    E-Print Network [OSTI]

    Mashups-- Web Web 1. Web Internet mashup Wikipedia Mashup web api web Web Internet Mashup public APIs, XML/RSS/Atom feeds, web services, HTML Mashup Web 2.0 Web 2.0 Mashup Web Web Web api eBay, Amazon, Google and Yahoos APIs Mashups Web Mashup Mashup 2. Mashup [2] Mashup

  1. AN INTERACTIVE SPIRES PLOT PROTOCOL

    E-Print Network [OSTI]

    Cerny, Barbara

    2013-01-01T23:59:59.000Z

    LBL-11068 AN INTERACTIVE SPIRES PLOT PROTOCOL Barbara Cerny,11068 PLOT PROTOCOL AN INTERACTIVE by Barbara Cerny, Geraldit gives immediate interactive plots that can be displayed

  2. Financial Metrics Data Collection Protocol, Version 1.0

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Gorrissen, Willy J.; Wang, Na

    2010-04-30T23:59:59.000Z

    Brief description of data collection process and plan that will be used to collect financial metrics associated with sustainable design.

  3. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

    2001-11-12T23:59:59.000Z

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  4. Wireshark Lab: SSL Version: 2.0

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Wireshark Lab: SSL Version: 2.0 © 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Top- down Approach, 4 th edition. In this lab, we'll investigate the Secure Sockets Layer (SSL) protocol, focusing on the SSL records sent over a TCP connection. We'll do so by analyzing a trace

  5. An Overview of Internet biosurveillance

    SciTech Connect (OSTI)

    Hartley, David M.; Nelson, Noele P.; Arthur, Ray; Barboza, P.; Collier, Nigel; Lightfoot, Nigel; Linge, J. P.; van der Goot, E.; Mawudeku, A.; Madoff, Lawrence; Vaillant, L.; Walters, Ronald A.; Yangarber, Roman; Mantero, Jas; Corley, Courtney D.; Brownstein, John S.

    2013-06-21T23:59:59.000Z

    Internet biosurveillance utilizes unstructured data from diverse Web-based sources to provide early warning and situational awareness of public health threats. The scope of source coverage ranges from local based media in the vernacular to international media in widely read languages. Internet biosurveillance is a timely modality available to government and public health officials, health care workers, and the public and private sector, serving as a real-time complementary approach to traditional indicator-based public health disease surveillance methods. Internet biosurveillance also supports the broader activity of epidemic intelligence. This review covers the current state of the field of Internet biosurveillance and provides a perspective on the future of the field.

  6. Indoor experiments of self-organization and localization protocols for hybrid networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    to constitute a wireless testbed and to test any protocol for ad hoc or hybrid networks. I. INTRODUCTION Mobile. Because a source can be not in the radio range of the destination, intermediary nodes must relay on how to provide an efficient hybrid network, connected to the Internet, and test in one scenario

  7. On the Use of Fixed Point Approximations to Study Reliable Protocols over Congested Links

    E-Print Network [OSTI]

    network operation? iii) What are the sustainable values of link utilization without the risk of network control features) over Internet congested links (the bottlenecks). Within this framework the analysis in a general framework, where only some very elementary properties of the protocols and the network come

  8. A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

  9. fragility). A key research problem is distinguishing among laws, protocols, and historical accidents.

    E-Print Network [OSTI]

    Lee, H.C. Paul

    fragility). A key research problem is distinguishing among laws, protocols, and historical frequency and voltag- es of delivered power, oil refineries have 10,000 such control loops, and Internet, terabytes of data, and a billion-dollar price tag. 55. Systems Biology Workbench (www.cds.caltech.edu/ sbw

  10. White Paper: A Survey of 3D Sync IR Protocols

    E-Print Network [OSTI]

    )..............................................................................................12 Sony Protocol (Standalone emitter

  11. Interactive, Internet Delivery of Visualization via Structured, Prerendered multiresolution Imagery

    E-Print Network [OSTI]

    Bethel, E. Wes; Yoon, Ilmi; Chen, Jerry

    2008-01-01T23:59:59.000Z

    I. Yoon and E. W. Bethel. “Interactive, Internet Delivery ofI. Yoon, E. W. Bethel. “Interactive, Internet Delivery ofFY 2007 Accomplishment Interactive, Internet Delivery of

  12. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  13. Small Business Internet Sites

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebookScholarship Fund3Biology and

  14. Diploma in Internet Business Technology Looking for a Career in Internet Business? ........................................... 2

    E-Print Network [OSTI]

    Barthelat, Francois

    Diploma in Internet Business Technology Contents Looking for a Career in Internet Business? ........................................... 2 How can a McGill Program prepare you for a career in Internet Business the right to change this information at any time. #12;2 Looking for a Career in Internet Business? Since

  15. Geo-Engineering through Internet Informatics (GEMINI)

    SciTech Connect (OSTI)

    Doveton, John H.; Watney, W. Lynn

    2003-03-06T23:59:59.000Z

    The program, for development and methodologies, was a 3-year interdisciplinary effort to develop an interactive, integrated Internet Website named GEMINI (Geo-Engineering Modeling through Internet Informatics) that would build real-time geo-engineering reservoir models for the Internet using the latest technology in Web applications.

  16. Internet video streaming using 3-D SPIHT

    E-Print Network [OSTI]

    Jiang, Jianhong

    2001-01-01T23:59:59.000Z

    Internet video streaming is a new way of distributing video over the Internet. It is an important component of Internet multimedia. Due to the increasing demand of multimedia on the World Wide Web, it has experienced explosive growth in the last...

  17. A Protocol for Disaster Data Evacuation Tilmann Rabl, Florian Stegmaier, Mario Dller, and The Tong Vang

    E-Print Network [OSTI]

    Hammerton, James

    send proto- col (DFSP), a new bulk data transfer protocol. It employs striping to dynamic intermediate is im- portant. Therefore, an enhanced version, the Dynamic Fast Send Protocol (DFSP), has been implemented which over- comes the identified weaknesses. DFSP comprises a novel Copyright is held

  18. Cellular-Internet Convergence: Evolving the Internet Architecture to

    E-Print Network [OSTI]

    Garfunkel, Eric

    protocols; standard mobility & service control API's Multiple radio access technologies simply plug: Industry Approach Towards Flat IP Architecture for Mobile Networks Cellular network standards (3GPP, LTE and cellular/mobile network standards ~1975... ~1990 ~2000 ~2010 ~2020 Basic IP Addressing & Routing BGP

  19. Internet Data logging and Display 

    E-Print Network [OSTI]

    Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

    2001-01-01T23:59:59.000Z

    InterDAQ Research Team. December 2001, Final Report Energy Systems Laboratory, Texas A&M University IEEE Instrumentation and Measurement Technology Conference Budapest, Hungary, May 21-23, 2001 An Internet Based Power Measurement Technique M. Yeary1, B...-time monitoring and dynamic thermal rating of power transmission circuits," IEEE Transactions on Power Delivery, vol. 11, no. 3, pp. 1407-1418, 1996. [6] A. Belardinelii, G. Palagi, R. Bedini, A. Ripoli, V. Macellari, D. Franchi, "Advanced technology for personal...

  20. Preprint version 2011 IEEE International Conference on Robotics and Automation, Shanghai, CN Haptic Teleoperation of Multiple Unmanned Aerial Vehicles

    E-Print Network [OSTI]

    Preprint version 2011 IEEE International Conference on Robotics and Automation, Shanghai, CN Haptic Teleoperation of Multiple Unmanned Aerial Vehicles over the Internet Dongjun Lee, Antonio Franchi, Paolo Robuffo control framework for multiple unmanned aerial vehicles (UAVs) over the Internet, consisting of the three

  1. Corporate Governance, the Environment, and the Internet

    E-Print Network [OSTI]

    Andrew, Jane

    2003-01-01T23:59:59.000Z

    contemporary society: Corporate governance at a crossroads.R. (1997). A survey of corporate governance. The Journal ofCorporate Governance, the Environment, and the Internet Jane

  2. Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Internet Clients AbdelRahman M. Abdou Carleton University, Ottawa Email: abdou@sce.carleton.ca Ashraf

  3. Mensuration protocol National Forest Inventory

    E-Print Network [OSTI]

    NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

  4. Graduate Certificate in Internet Business Looking for a Career in Internet Business?

    E-Print Network [OSTI]

    Pientka, Brigitte

    1 Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since growth, hence a demand for experts who know how to effectively analyze and manage a business with the appropriate internet technology. Small to large-sized businesses require professionals who are able to design

  5. 282 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 3, MARCH 2001 Streaming Video over the Internet: Approaches

    E-Print Network [OSTI]

    Peha, Jon M.

    on this field, we cover six key areas of streaming video. Specifically, we cover video compression, application research directions. Index Terms--Application-layer QoS control, continuous media distribution services, Internet, protocol, streaming video, streaming server, synchronization, video compression. I. INTRODUCTION

  6. Analyzing the Dynamics of Chemical Networking Protocols

    E-Print Network [OSTI]

    Vetter, Thomas

    from several well-established fields, such as model linearization proposed in Metabolic Control congestion control protocol and highlight formerly unknown protocol features. Keywords: dynamic analysis;1 Introduction Predicting and controlling the dynamics of communication protocols are difficult but important

  7. Wind Webinar Text Version

    Broader source: Energy.gov [DOE]

    Download the text version of the audio from the DOE Office of Indian Energy webinar on wind renewable energy.

  8. POLICIES & PROCEDURES Legal Disclaimers for CSUN Internet

    E-Print Network [OSTI]

    Cohen, Randy W.

    /data lines. e. Limitation of Liability: This disclaimer of liability applies to any general, special and Conditions of Use CSUN Internet Sites Endorsements General Liability Limitation of Liability Disclaimer, or organizations. d. General Liability: The materials on CSUN's Internet site are provided "as is" and without

  9. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly February 2007 #12;X-Force® Threat Insight Monthly > February 2007 www.iss.netwww.iss.net About this report

  10. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net June 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly June 2007 #12;X-Force® Threat Insight Monthly > June 2007 www.iss.netwww.iss.net About this report

  11. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net May 2007 #12 The Emerging Threat Landscape . . . . . . . . . . . . . . . . . . . . . . . . 2 Mobile Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly May

  12. Time for a "Greener" Internet Mario Baldi

    E-Print Network [OSTI]

    Baldi, Mario

    , electronic components and cooling sub-systems deployed in various parts of the system. One important source that the Internet traffic will continue to grow exponentially for the foreseeable future, which will require ever as video) there is a huge potential for decreasing future Internet energy requirements by synchronizing

  13. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  14. An Intermittent Energy Internet Architecture Barath Raghavan

    E-Print Network [OSTI]

    Shenoy, Prashant

    -design the Internet for an energy- constrained future powered by diffuse, intermittent, and expensive power sources's energy infrastructure and will likely include significant de- ployment of intermittent renewable energyAn Intermittent Energy Internet Architecture Barath Raghavan ICSI David Irwin UMass Jeannie

  15. Hardware Flooding (Preliminary Version)

    E-Print Network [OSTI]

    Kutten, Shay

    speed, this search becomes a bottleneck. There are two approaches to overcoming this bottleneck. The first approach is to implement the search described above directly in very high speed hardware,kutten@watson .ibm.com Abstract Traditional broadcast protocols for the high-speed networks of are inappropriate

  16. Robust multipartite multilevel quantum protocols

    SciTech Connect (OSTI)

    Nihira, Hideomi; Stroud, C.R. Jr. [The Institute of Optics, University of Rochester, Rochester, New York 14627 (United States)

    2005-08-15T23:59:59.000Z

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  17. Unraveling Internet identities : accountability & anonymity at the application layer

    E-Print Network [OSTI]

    Wolff, Josephine Charlotte Paulina

    2012-01-01T23:59:59.000Z

    Both anonymity and accountability play crucial roles in sustaining the Internet's functionality, however there is a common misconception that increasing the anonymity of Internet identities necessitates diminishing their ...

  18. Efficient Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscoveringESnetEffective safety ...Mediator Effects

  19. IES version 2013

    Broader source: Energy.gov [DOE]

    IES version 2013 Tax Deduction Qualified Software calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

  20. Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks Maurizio A. Bonuccelli and Francesca Lonetti

    E-Print Network [OSTI]

    Scheuermann, Peter

    Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks Maurizio A. Bonuccelli In this paper, we approach the problem of identifying a set of objects in an RFID network. We propose a modified version of Slotted Aloha protocol to reduce the number of transmission collisions. All tags select a slot

  1. Woody Plant Inventories, CVSEEP Protocol Thomas R. Wentworth, Robert K. Peet, Michael T. Lee, Steven D. Roberts

    E-Print Network [OSTI]

    Peet, Robert K.

    1 Woody Plant Inventories, CVSEEP Protocol Thomas R. Wentworth, Robert K. Peet, Michael T. Lee, Steven D. Roberts Version 4.2 2008 Woody plants are typically inventoried in all five levels of the CVSEEP protocol, although such inventory is optional in Levels 3 and 4. Woody plants fall into two

  2. REAL ANALYSIS: DRIPPED VERSION

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    i ELEMENTARY REAL ANALYSIS: DRIPPED VERSION -------------------------- thomson·bruckner2 -------------------------- Brian S. Thomson Judith B. Bruckner Andrew M. Bruckner www.classicalrealanalysis.com (2008) ClassicalRealAnalysis.com [TBB-Dripped] Elementary Real Analysis - Dripped Version Thomson*Bruckner*Bruckner #12;ii D

  3. Master logo Primary version

    E-Print Network [OSTI]

    Bandara, Arosha

    Master logo Primary version The master logo is the most important visual representation practical, this primary version of the logo must be used. Need help with something? Contact: brand logos, trade marks, trade names, photographic and video images, sound recordings, audio tools

  4. OECD Internet Economy Outlook 2012 Access the complete publication at

    E-Print Network [OSTI]

    Weske, Mathias

    From: OECD Internet Economy Outlook 2012 Access the complete publication at: http://dx.doi.org/10 and development", in OECD Internet Economy Outlook 2012, OECD Publishing. http://dx.doi.org/10 of international law. #12;OECD Internet Economy Outlook © OECD 2012 63 Chapter 2 Internet trends and development

  5. Modulate Internet Radio Into FM Using GNU Radio

    E-Print Network [OSTI]

    Yu, Chansu

    1 Modulate Internet Radio Into FM Using GNU Radio By: Elie Salameh Outline. · Fm in gnu radio · Audio Streams in Internet Radio · Gnu & Audio Files · Sox command · Playlist ".pls" · Recording internet radio #12;2 Project description · Using gnu radio to modulate internet radio into fm. · Using usrp

  6. Finding order in a contentious Internet

    E-Print Network [OSTI]

    Sowell, Jesse H., II (Jesse Horton)

    2015-01-01T23:59:59.000Z

    This inquiry started with the simple question, "Who manages the Internet infrastructure and how?" Since, this question evolved into an evaluation of the routing system and the institutions that manage it. This institutional ...

  7. Ricci Curvature of the Internet Topology

    E-Print Network [OSTI]

    Ni, Chien-Chun; Gao, Jie; Gu, Xianfeng David; Saucan, Emil

    2015-01-01T23:59:59.000Z

    Analysis of Internet topologies has shown that the Internet topology has negative curvature, measured by Gromov's "thin triangle condition", which is tightly related to core congestion and route reliability. In this work we analyze the discrete Ricci curvature of the Internet, defined by Ollivier, Lin, etc. Ricci curvature measures whether local distances diverge or converge. It is a more local measure which allows us to understand the distribution of curvatures in the network. We show by various Internet data sets that the distribution of Ricci cuvature is spread out, suggesting the network topology to be non-homogenous. We also show that the Ricci curvature has interesting connections to both local measures such as node degree and clustering coefficient, global measures such as betweenness centrality and network connectivity, as well as auxilary attributes such as geographical distances. These observations add to the richness of geometric structures in complex network theory.

  8. On the internet grouping for reliable multicasting

    E-Print Network [OSTI]

    Ghanem, Mohamed M.

    1996-01-01T23:59:59.000Z

    ON THE INTERNET GROUPING FOR RELIABLE MULTICASTING A Thesis by MOHAMED M. GHANEM Submitted to the Office of Graduate Studies of Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE May 1996... Major Subject: Computer Science ON THF, INTERNET GROUPING I'OR RELIABLE MULTICASTING A Thesis by MOHAMED M. GHANEM Submitted to Texas ASM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved...

  9. Algorithms for Large-Scale Internet Measurements

    E-Print Network [OSTI]

    Leonard, Derek Anthony

    2012-02-14T23:59:59.000Z

    - works, allow scanning rates that achieve coverage of the Internet in minutes/hours (rather than weeks/months), and significantly reduce administrator complaints. Us- ing IRLscanner and 24-hour scan durations, we perform 20 Internet-wide experi- ments... valuable experimental data in the future with significantly fewer hurdles. iv We finally turn our attention to Intrusion Detection Systems (IDS), which are often tasked with detecting scans and preventing them; however, it is currently un- known how...

  10. U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected application to crash.

  11. Accepted to International Journal of Internet Protocol Technology (Accepted Sep 24, 2009)

    E-Print Network [OSTI]

    California at Los Angeles, University of

    , Los Angeles, CA 90095 Abstract High volume, high speed, and heterogeneous inbound and outbound data format are characteristics of RFID-based Automatic Identification Data Capture infrastructure. Due. A "store and forward" and rule-based subscription integration methodology to streamline RFID data

  12. In modern IP routers, Internet Pro-tocol (IP) lookup forms a bottleneck in pack-

    E-Print Network [OSTI]

    Mahapatra, Rabinarayan

    POWER CONSUMPTION AND HEAT DISSIPATION, PROBLEMS ALLEVIATED BY REDUCING THE NUMBER OF ROUTING the data (IP address) in a single clock cycle. Because of this property, TCAMs are particularly attractive consumption and lack scal- able design schemes, which limit their use. Today's high-density TCAMs consume 12

  13. 9/10/2002 Internet/Grid Computing -Fall 2002 1 What is Performance for Internet/Grid Computation?

    E-Print Network [OSTI]

    Browne, James C.

    - Fall 2002 7 What is Performance for Internet/Grid Computation? Relative Speed/Cost of Computation is Performance for Internet/Grid Computation? Speed up for distributed parallel execution 1. Parallelizability9/10/2002 Internet/Grid Computing - Fall 2002 1 What is Performance for Internet/Grid Computation

  14. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  15. DISTRIBUTED SHORTESTPATH PROTOCOLS TIMEDEPENDENT NETWORKS

    E-Print Network [OSTI]

    Orda, Ariel

    DISTRIBUTED SHORTEST­PATH PROTOCOLS for TIME­DEPENDENT NETWORKS Ariel Orda Raphael Rom+ Department and the dynamic behavior of networks, since a distributed solution enables constant tracking of changes 32000 October 1992 Revised May 1994, October 1995 ABSTRACT This paper addresses algorithms for networks

  16. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

  17. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

  18. Terrestrial Carbon Observations: Protocols for Vegetation Sampling

    E-Print Network [OSTI]

    GTOS GTOS 55 Terrestrial Carbon Observations: Protocols for Vegetation Sampling and Data Submission Shashi Verma #12;(intentionally blank) #12;Terrestrial Carbon Observations: Protocols for Vegetation Forestry University, Bejing 100083, China 5 University of Wisconsin, Milwaukee, WI 6 Microsoft Research

  19. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  20. Statistical Estimation of Quantum Tomography Protocols Quality

    E-Print Network [OSTI]

    Yu. I. Bogdanov; G. Brida; M. Genovese; S. P. Kulik; E. V. Moreva; A. P. Shurupov

    2010-02-18T23:59:59.000Z

    A novel operational method for estimating the efficiency of quantum state tomography protocols is suggested. It is based on a-priori estimation of the quality of an arbitrary protocol by means of universal asymptotic fidelity distribution and condition number, which takes minimal value for better protocol. We prove the adequacy of the method both with numerical modeling and through the experimental realization of several practically important protocols of quantum state tomography.

  1. Automated Eye-Movement Protocol Analysis

    E-Print Network [OSTI]

    Salvucci, Dario D.

    Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

  2. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et étudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  3. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01T23:59:59.000Z

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  4. National Clean Energy Business Plan Competition: Energy Internet...

    Energy Savers [EERE]

    100,000. Energy Internet has developed a new approach and solution to address cyber and control challenges facing the power grid with a decentralized, autonomous, Internet-like...

  5. POLITICAL ADMINISTRATIONS ON THE INTERNET: WHAT KIND OF TERRITORIAL NETWORK

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    POLITICAL ADMINISTRATIONS ON THE INTERNET: WHAT KIND OF TERRITORIAL NETWORK REPRESENTATION will try to represent an embryo of the administration network pattern. We start by considering the point the elements which constitute it. KEYWORDS Political administration, hypertext, internet, network, link

  6. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19T23:59:59.000Z

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  7. EPICS Version 4 - Implementing Complex Data Types

    SciTech Connect (OSTI)

    Marty Kraimer,; John dalesio

    2012-11-27T23:59:59.000Z

    Through phase 1 and phase 2 SBIR grants, s fully functional I/O Controller and communication protocol for version 4 of EPICS is completed. This new software architecture provides a flexible and extendible architecture. Version 4 is implemented fully in Java. The performance metrics look promising. The final portion of phase 2 is to optimize the communication mechanisms. Subsequent work on different aspects of this are required to provide a viable solutions in various areas. Version 3 of EPICS is able to provide a platform for implementing channel based control, because the channel and attributes for time stamping, alarm, display and control were narrow, well defined, and complete. To extend EPICS functionality beyond this, it is necessary to define attributes needed for archive data, array, image data, and directory services. The proper handling of several array types enables the development of middle layer servers such as orbit and bump control in accelerators. Phase 1 should produce a well defined, reviewed, and agreed upon definition of the metadata required for these services. A Phase 2 grant would provide tools that implemented archiving, general array, imaging, and directory applications.

  8. Version pressure feedback mechanisms for speculative versioning caches

    DOE Patents [OSTI]

    Eichenberger, Alexandre E.; Gara, Alan; O'Brien, Kathryn M.; Ohmacht, Martin; Zhuang, Xiaotong

    2013-03-12T23:59:59.000Z

    Mechanisms are provided for controlling version pressure on a speculative versioning cache. Raw version pressure data is collected based on one or more threads accessing cache lines of the speculative versioning cache. One or more statistical measures of version pressure are generated based on the collected raw version pressure data. A determination is made as to whether one or more modifications to an operation of a data processing system are to be performed based on the one or more statistical measures of version pressure, the one or more modifications affecting version pressure exerted on the speculative versioning cache. An operation of the data processing system is modified based on the one or more determined modifications, in response to a determination that one or more modifications to the operation of the data processing system are to be performed, to affect the version pressure exerted on the speculative versioning cache.

  9. Monitoring and Early Warning for Internet Worms

    E-Print Network [OSTI]

    Xu, Shouhuai

    an effective early warning system. Based on epidemic models and observation data of a fast-spreading worm, we a worm monitoring and early warning system. In addition, by collecting more complete data on the worm1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley

  10. Monitoring and Early Warning for Internet Worms

    E-Print Network [OSTI]

    Shenoy, Prashant

    monitoring and early warning system. In this paper, we propose effective algorithms for early detectionMonitoring and Early Warning for Internet Worms Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don warning system. In order to detect an unknown (zero-day) worm, a straight- forward way is to use various

  11. Monitoring and Early Warning for Internet Worms

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    of these worms calls for a worm monitoring and early warning system. In this paper we propose the effective algorithms for early warning of the presence of a worm and the correspondent monitoring system. Based1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley

  12. International Conference on INTERNET TECHNOLOGIES AND APPLICATIONS

    E-Print Network [OSTI]

    Davies, John N.

    ), will be held in Wrexham, North East Wales, UK from Wednesday 7th to Friday 9th September 2005. The conferenceInternational Conference on INTERNET TECHNOLOGIES AND APPLICATIONS ITA 05 Wednesday 7th - Friday 9 computing and engineering. Accepted papers will be published in the conference proceedings. Suitable topics

  13. ADAPTIVE MULTIMEDIA TRANSMISSION OVER THE INTERNET

    E-Print Network [OSTI]

    Bouras, Christos

    Chapter 20 ADAPTIVE MULTIMEDIA TRANSMISSION OVER THE INTERNET CHRISTOS BOURAS and APOSTOLOS GKAMAS that are available to multimedia applications can be modified very quickly. Multimedia applications must have to multimedia applications, we can use techniques both at the network and application layers. Adaptive

  14. Language of the Internet NAOMI S. BARON

    E-Print Network [OSTI]

    Carlini, David

    processing to facilitate working on the Internet and the World Wide Web (1.3) Section 2 Linguistic Issues for Communicating via the Web 1 As with so many aspects of the computing world, the nature of the language of this chapter. #12;2 summarize the types of Web coding systems (4.1) present an overview of Web markup languages

  15. Using Google Earth for Internet GIS 

    E-Print Network [OSTI]

    Henry, Andrew

    2009-11-26T23:59:59.000Z

    The goal of this research is to investigate the potential of using Google Earth for Internet GIS applications. The study specifically examines the use of vector and attribute data and the potential of displaying and processing this data in new ways...

  16. LITERATURE SEARCH TUTORIAL Open Internet Browser

    E-Print Network [OSTI]

    Dratz, Edward A.

    ://www.ncbi.nlm.nih.gov/entrez/query.fcgi · To search PubMed--fill in search box enter search terms, or enter author name, or journal titles--see instructions written below search box. To obtain detailed instructions on how to enter items, click on blueLITERATURE SEARCH TUTORIAL · Open Internet Browser · Go to http

  17. The Linux Command Line Second Internet Edition

    E-Print Network [OSTI]

    Dahl, David B.

    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book #12....................................................................................................xvi Why Use The Command Line to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo

  18. Hierarchical Infrastructure for Internet Mapping Services

    E-Print Network [OSTI]

    Samet, Hanan

    locally. We investigate this opportunity for further improvement in providing the client with map data access to remote spatial databases adopted by numerous web-based mapping service vendors (e.g., MapChapter 1 Hierarchical Infrastructure for Internet Mapping Services Frantisek Brabec and Hanan

  19. US-Wissenschaftler entwickelte neuen ,,Porno-Blocker" frs Internet

    E-Print Network [OSTI]

    Wang, James Z.

    US-Wissenschaftler entwickelte neuen ,,Porno-Blocker" fürs Internet Darmstadt (dpa) - US-Wissenschaftler wollen künftig Computer-Kids beim Surfen durchs Internet mit einem neuartigen ,,Porno-Blocker" am Zugriff hatten lediglich Internet-Inhalte nach bestimmten Worten wie ,,Sex", ,,Porno", ,,Erotik" und anderen

  20. Assessing the Security of a CleanSlate Internet Architecture

    E-Print Network [OSTI]

    Assessing the Security of a Clean­Slate Internet Architecture Gowtham Boddapati # John Day designed a clean­slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without clean­ slate internet architectures. Our own investigations into the fundamental principles

  1. The two phase commit protocol simulation and analysis

    E-Print Network [OSTI]

    Bokil, Anupam

    1993-01-01T23:59:59.000Z

    IDENTIFICATION II. A Failures in a. Distributed DBMS 10 HI ATOIYIIC COMMITMENT HI. A Uncertainty Period . HI. B Blocking HI C Independent Recovery 17 17 IU THE TWO PHASE COMMIT PROTOCOL V111 CHAPTER Pa, ge IV. A Timeout Actions 21 IV. B Recovery..., 55 LIST OF TABLES TABLE Page Comparison of three versions of the two phase comniit CHAPTER I INTRODUCTION A database management system(DBMS) consists of a collection of interrelated, persis- tent data. and a set of programs to access this data...

  2. Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |ofDepartment of Energy November 2012 Protocol

  3. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015 < prev nextEnergy Consumer Privacy whileProtocol for

  4. On the Scalability of Data Synchronization Protocols for PDAs and Mobile Devices

    E-Print Network [OSTI]

    Goldberg, Bennett

    Boston University Abstract Personal Digital Assistants (PDAs) and other mobile computing devices relyOn the Scalability of Data Synchronization Protocols for PDAs and Mobile Devices S. Agarwal D, tetherless networks. Keywords: Personal Digital Assistants, mobile networks, data synchronization A version

  5. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    SciTech Connect (OSTI)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27T23:59:59.000Z

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

  6. PVWatts Version 5 Manual

    SciTech Connect (OSTI)

    Dobos, A. P.

    2014-09-01T23:59:59.000Z

    The NREL PVWatts calculator is a web application developed by the National Renewable Energy Laboratory (NREL) that estimates the electricity production of a grid-connected photovoltaic system based on a few simple inputs. PVWatts combines a number of sub-models to predict overall system performance, and makes includes several built-in parameters that are hidden from the user. This technical reference describes the sub-models, documents assumptions and hidden parameters, and explains the sequence of calculations that yield the final system performance estimate. This reference is applicable to the significantly revised version of PVWatts released by NREL in 2014.

  7. ramdisk, Version 0.x

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( (Buried RoomCO2. .3

  8. STONIX, Version 0.x

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection245C Unlimited ReleaseWelcome ton n uSTEM OutreachObjective 

  9. Libparty, Version 1.x

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us count the ways. We've13,LewisLiane

  10. FAROW Version 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-l 1,EnergyExploringGamma-ray2As atoAct FAQsTHEORY

  11. PROSIG, Version 1.x

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomassPPPO Website Directory PPPO WebsitePREP |Dan5,PROJECTPROSIG,

  12. Infographic Guide - Print Version

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking of BlytheDepartment of EnergyTreatment andJuneJobs

  13. SEQSTRAP, Version 1.x

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection245C Unlimited Release PrintedDEVIATIONSReduce Waste and linkSEQSTRAP,

  14. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01T23:59:59.000Z

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  15. House Simulation Protocols (Building America Benchmark) - Building...

    Energy Savers [EERE]

    House Simulation Protocols. See an example of this Top Innovation in action. Find more case studies of Building America projects across the country that utilize House Simulation...

  16. Waimairi Clinic Policies, Procedures and Protocols

    E-Print Network [OSTI]

    Hickman, Mark

    Waimairi Clinic Policies, Procedures and Protocols July 2010 College of Education #12;Table The Facilities............................................................................2 Booking a Clinic room ............................................................................................... 3 Access to Clinics.......................................................................3

  17. Estimating Pedestrian Accident Exposure: Protocol Report

    E-Print Network [OSTI]

    Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

    2007-01-01T23:59:59.000Z

    A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

  18. Internet public information for fuel cells

    SciTech Connect (OSTI)

    Sudhoff, F.A. [Dept. of Energy, Morgantown, WV (United States)

    1995-08-01T23:59:59.000Z

    The rapid development and integration of the Internet into the mainstream of professional life provide the fuel cell industry with the opportunity to share new ideas with unprecedented capabilities. The U.S. Department of Energy`s Morgantown Energy Technology Center (METC) has undertaken the task to provide a service where current fuel cell descriptions and information are available to customers, manufactures, academia, and the general public. METC has developed a Fuel Cell Forum where members can exchange ideas and information pertaining to fuel cell technologies using the Internet. Forum membership is encouraged from utilities, industry, universities, and Government. Because of the public nature of the Internet, business sensitive, confidential, or proprietary information should not be placed on this system. The views and opinions of authors expressed in the forum do not necessarily state or reflect those of the U.S. Government or METC. METC, has endeavored to develop a World Wide Web (WWW) location committed to the description and development of the fuel cell. Netscape or compatible software provides access to the METC Homepage. The user then selects Advanced Power Systems, then Fuel Cells. Fuel cell overview and description is followed by a presentation of the fuel cell system characteristics and advantages. Descriptions of major fuel cell projects are provided in the FACTS section. Finally, as a service to METC customers, the homepage provides a calendar and points of contact. Updates to the WWW location are occasionally made revealing current technical advances in fuel cells. In the continuing effort to further improve public knowledge and perception of fuel cell power generation, METC has created two new modes of communication using the Internet.

  19. From Exogenous to Endogenous Networks: Internet Applications

    E-Print Network [OSTI]

    D'Ignazio, Alessio; Giovannetti, Emanuele

    2006-03-14T23:59:59.000Z

    incentive to deviate, will also find a lower incentive to implement a punishment for a possible deviant from the co-operative agreement. A possible escape from such a paradox may be found in the construction of more articulate punishment strategies, able... of the community 32 of internet users, calculated by taking into account the quality of interconnection between them. Formally, ?? ??? ? = +? iii npp ,? . The costs borne by a provider, instead, are assumed to increase with the number of both its users...

  20. Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and

    E-Print Network [OSTI]

    Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) plus a Comparison Population in Sierra Vista, Arizona The protocol Assessment of Case Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) and a Reference

  1. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  2. Security incidents on the Internet, 1989--1995

    SciTech Connect (OSTI)

    Howard, J.D.

    1995-12-31T23:59:59.000Z

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  3. Execution Version POWER PURCHASE AGREEMENT

    E-Print Network [OSTI]

    Firestone, Jeremy

    ") and BLUEWATER WIND DELAWARE LLC ("Seller") June 23, 2008 #12;Execution Version POWER PURCHASE AGREEMENT TableExecution Version POWER PURCHASE AGREEMENT between DELMARVA POWER & LIGHT COMPANY ("Buyer 3.5 Energy Forecasts, Scheduling and Balancing.......................................... 40 3

  4. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

  5. Protocol Number: (IBC office use only)

    E-Print Network [OSTI]

    Asaithambi, Asai

    Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

  6. Safe Operating Procedure SAFETY PROTOCOL: Rb-86

    E-Print Network [OSTI]

    Farritor, Shane

    of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

  7. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  8. Adaptive best effort protocols for video delivery

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01T23:59:59.000Z

    This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

  9. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect (OSTI)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15T23:59:59.000Z

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  10. Router-level community structure of the Internet Autonomous Systems

    E-Print Network [OSTI]

    Beiró, Mariano G; Alvarez-Hamelin, J Ignacio

    2015-01-01T23:59:59.000Z

    The Internet is composed of routing devices connected between them and organized into independent administrative entities: the Autonomous Systems. The existence of different types of Autonomous Systems (like large connectivity providers, Internet Service Providers or universities) together with geographical and economical constraints, turns the Internet into a complex modular and hierarchical network. This organization is reflected in many properties of the Internet topology, like its high degree of clustering and its robustness. In this work, we study the modular structure of the Internet router-level graph in order to assess to what extent the Autonomous Systems satisfy some of the known notions of community structure. We show that the modular structure of the Internet is much richer than what can be captured by the current community detection methods, which are severely affected by resolution limits and by the heterogeneity of the Autonomous Systems. Here we overcome this issue by using a multiresolution d...

  11. How To Setup EHSS Landing Page As Default Home Page For Internet Explorer |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy: Thomas P.Department of Energy Internet Explorer enter the URL

  12. Market Protocols for SPP Integrated Marketplace Version 2.0 7/12/2011 584

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    into or out of CBA or SA OCL Over Collected Losses Settlement surplus related to marginal loss pricing, which Response Load reduction which can be metered DRL Demand Response Load A meter location discretely representing the load behind which a demand response resource is located. A DRL is not necessarily associated

  13. NOAA Fisheries Protocols For Sea Scallop Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Sea Scallop Dredge Surveys January 7, 2004 Prepared by: Members..................................................................................................................................... 5 NOAA Fisheries Sea Scallop Dredge Survey Protocols............................................................................................................................. 10 Changes to Regional Scallop Dredge Protocols

  14. Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg is to create distributed protocols that reduce the uncertainty by distributing the knowledge of the network anonymous networks. Keywords: Anonymous networks, directed networks, distributed protocols. 1 Introduction

  15. The regulation of internet interconnection : assessing network market power

    E-Print Network [OSTI]

    Maida, Elisabeth M. (Elisabeth Marigo)

    2013-01-01T23:59:59.000Z

    Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, ...

  16. PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version)

    E-Print Network [OSTI]

    Legout, Arnaud

    PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version) A the properties of a new multicast congestion control protocol (called PLM) for audio/video and file transfer. We evaluated PLM for a large variety of scenarios and show that it converges fast to the optimal link

  17. PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version) \\Lambda

    E-Print Network [OSTI]

    Legout, Arnaud

    PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version the properties of a new multicast congestion control protocol (called PLM) for audio/video and file transfer. We evaluated PLM for a large variety of scenarios and show that it converges fast to the optimal link

  18. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  19. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative:...

  20. access control protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  1. access control protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  2. applicable protocol fails: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for...

  3. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Environmental Management (EM)

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  4. N-Terminal Enrichment: Developing a Protocol to Detect Specific...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments. N-Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments....

  5. additional protocol ratification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gergely 9 An Economic Assessment of the Kyoto Protocol using the Global Trade and Environment Model CiteSeer Summary: Ratification of the Kyoto Protocol will have major...

  6. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

  7. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  8. Version No.: 2002.001

    U.S. Energy Information Administration (EIA) Indexed Site

    ,,,"Version No.: 2015.01" "WEEKLY UNDERGROUND NATURAL GAS STORAGE REPORT" "FORM EIA-912" "This report is mandatory under the Federal Energy...

  9. Perceived consequences and concerns in the diffusion of Internet2 at Texas A&M University

    E-Print Network [OSTI]

    Mendoza Diaz, Noemi Veronica

    2009-05-15T23:59:59.000Z

    needed to support them. Internet2 adoption at TAMU took place towards the end of the 90s decade with the inclusion of the university in the University Corporation for the Advanced Internet Development (UCAID). This dissertation reviewed the Internet...

  10. Seismicity Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015ParentsMiddle|Security Enforcement Documentsis Not anEnergy

  11. Seismicity Protocol | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCO OverviewRepository |Complex"DepartmentProgram under ARRAServices

  12. Kyoto Protocol | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation, search GEOTHERMALTexas:Kuju Kanko HotelKwitherbee's blogdoKyoto

  13. Superior Energy Performance Certification Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment of StaffingStorageEnergy 2,Super BowlofSuperior Energy

  14. Independent Oversight Appraisal Process Protocols

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe RankingReform atSolar EnergyMarch 3-6, 2014 |

  15. Information requested in Protocol No

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe RankingReformManager (ISSM) Information1, 2010 Smart Grid

  16. Explorative study of African Americans and internet dating

    E-Print Network [OSTI]

    Spates, Kamesha Sondranek

    2005-02-17T23:59:59.000Z

    EXPLORATIVE STUDY OF AFRICAN AMERICANS AND INTERNET DATING A Thesis by KAMESHA SONDRANEK SPATES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE December 2004 Major Subject: Sociology EXPLORATIVE STUDY OF AFRICAN AMERICANS AND INTERNET DATING A Thesis by KAMESHA SONDRANEK SPATES...

  17. Smarter Cropping: Internet program helps farmers make decisions about crops

    E-Print Network [OSTI]

    Wythe, Kathy

    2009-01-01T23:59:59.000Z

    Story by Kathy Wythe tx H2O | pg. 26 Smarter Cropping Internet program helps farmers make decisions about crops Along the coastal plains of Texas, farmers and crop managers are using the Internet to make more informed decisions about growing...

  18. Roadmap for Real World Internet applications Socioeconomic scenarios

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Roadmap for Real World Internet applications ­ Socioeconomic scenarios and design recommendations that is feasible to roadmap the dynamic deployment of Real World Internet applications. A multi- faceted scenarios. These scenarios are used as a roadmap for the system and architecture deployment. The application

  19. Detecting Internet Worms at Early Stage Shigang Chen Sanjay Ranka

    E-Print Network [OSTI]

    Chen, Shigang

    proposes an Internet-worm early warning system that automatically detects concerted scan activities on the responsiveness of this early warning system. Keywords: Enterprise Security Management, Internet Worm, Early and derives possible signatures of worm attacks. Its goal is to issue warning at the early stage of worm

  20. Using the Internet to Stay Informed about Energy

    E-Print Network [OSTI]

    Phillips, J.

    1996-01-01T23:59:59.000Z

    A new tool, the INTERNET, has arrived on the scene to help everyone who has anything to do with energy: the energy user, the utilities, the equipment manufacturers, energy management firms, and energy brokers. The INTERNET is useful to the same...

  1. Future of Internet Yrj Neuvo & Elina Karvonen (eds.)

    E-Print Network [OSTI]

    Kaski, Samuel

    's Multidisciplinary Institute of Digitalisation and Energy (MIDE) #12;#12;Bit Bang IV Future of Internet - Societal, business, governance and technological aspects #12;ISBN 978-952-60-3610-6 (PDF) Cover: Petri Saarikko ON BIT BANG 4 7 FUTURE OF INTERNET - SOCIETAL, BUSINESS, GOVERNANCE AND TECHNOLOGICAL ASPECTS 9 Are We

  2. Assessing the Security of a Clean-Slate Internet Architecture

    E-Print Network [OSTI]

    Assessing the Security of a Clean-Slate Internet Architecture Gowtham Boddapati John Day Ibrahim Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate a comprehensive approach to security. Most recently, there have been attempts to design clean- slate internet

  3. Internet Security Systems, an IBM Company Threat Insight Monthly

    E-Print Network [OSTI]

    Internet Security Systems, an IBM Company X-Force ® Threat Insight Monthly www . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net Internet Security Systems, an IBM Company X-Force Threat Insight Monthly April 2007 #12;X-Force® Threat Insight Monthly > April 2007 www.iss.netwww.iss.net About

  4. Study of Internet autonomous system interconnectivity from BGP routing tables

    E-Print Network [OSTI]

    Catalunya, Universitat Politècnica de

    Study of Internet autonomous system interconnectivity from BGP routing tables Jose M. Barcelo ISPs (Internet Service Providers) and to interconnect enterprises to ISPs. ISPs usually are providers University of Baja California (UABC), Mexico. He is a PhD student at UPC, Spain, with a grant of the Mexican

  5. On Correlated Availability in Internet-Distributed Systems Derrick Kondo

    E-Print Network [OSTI]

    Boyer, Edmond

    On Correlated Availability in Internet-Distributed Systems Derrick Kondo INRIA, France dkondo measure and characterize the time dynamics of availability in a large-scale Internet- distributed system with over 110,000 hosts. Our char- acterization focuses on identifying patterns of corre- lated availability

  6. Controlling the Internet to Improve Energy Efficiency Dr. Lachlan Andrew

    E-Print Network [OSTI]

    Huang, Jianwei

    Controlling the Internet to Improve Energy Efficiency by Dr. Lachlan Andrew Centre for Advanced, and energy-efficient networking. He is an editor of IEEE/ACM Trans. Networking, and an area editor Internet Architectures Swinburne University of Technology Australia THE CHINESE UNIVERSITY OF HONG KONG

  7. Offline Social Networks: stepping away from the Internet (Position paper)

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Offline Social Networks: stepping away from the Internet (Position paper) Anne-Marie Kermarrec@no-log.org Abstract Online social networks have been revolutionary in the way people interact over the Internet today. Typically in online social networks the information is ephemeral while the relationships between users

  8. Jitter Regulation in an Internet Router with Delay Constraint

    E-Print Network [OSTI]

    Imai, Hiroshi

    Jitter Regulation in an Internet Router with Delay Constraint Hisashi Koga Fujitsu Laboratories Ltd To playback multimedia data smoothly via the world­wide Internet, jitter, the variability of delay of individual packets, must be kept low. We examine on­line algorithms in a router to regulate jitter

  9. IT Licentiate theses Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

  10. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

  11. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  12. A Metaobject Protocol for C++ Shigeru Chiba

    E-Print Network [OSTI]

    Chiba, Shigeru

    A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

  13. A novel DHT Routing Protocol for MANETs

    E-Print Network [OSTI]

    Chellamani, Deepak

    2010-04-30T23:59:59.000Z

    The central challenge in Mobile Ad hoc Networks (MANETs) is to provide a stable routing strategy without depending on any central administration. This work presents and examines the working of Radio Ring Routing Protocol (RRRP), a DHT based routing...

  14. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.

    2012-03-01T23:59:59.000Z

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  15. The security of Ping-Pong protocol

    E-Print Network [OSTI]

    Jian-Chuan Tan; An Min Wang

    2008-08-28T23:59:59.000Z

    Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

  16. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01T23:59:59.000Z

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  17. Budget Versions FMS705 NUPlans Web

    E-Print Network [OSTI]

    Shull, Kenneth R.

    Budget Versions FMS705 NUPlans Web Tutorial #12;Contents · About Versioning · Version Forms, Views Reports 1 #12;About Versioning · Up to four versions of a budget can be created. Versions 2 and 3 are created: o One budget grouping at a time o The entire budget grouping is included Version 4 is created

  18. CIS 455: Internet and Web Systems Course Number & Title (A.1) CIS 455 Internet and Web Systems

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    CIS 455: Internet and Web Systems Course Number & Title (A.1) CIS 455 Internet and Web Systems and web systems: scalability, interoperability (of data and code), atomicity and consistency models-backed or PHP/JSP/Servlet-based web sites (for this, see CIS 330/550 or MKSE 212). Here, we will learn how

  19. EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?

    E-Print Network [OSTI]

    Nakano, Koji

    Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

  20. Hydrogen Storage Materials Requirements (Text Version) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Requirements (Text Version) Hydrogen Storage Materials Requirements (Text Version) Below is the text version of the webinar titled "Hydrogen Storage Materials Requirements,"...

  1. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  2. Checkpointing in speculative versioning caches

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gara, Alan; Gschwind, Michael K; Ohmacht, Martin

    2013-08-27T23:59:59.000Z

    Mechanisms for generating checkpoints in a speculative versioning cache of a data processing system are provided. The mechanisms execute code within the data processing system, wherein the code accesses cache lines in the speculative versioning cache. The mechanisms further determine whether a first condition occurs indicating a need to generate a checkpoint in the speculative versioning cache. The checkpoint is a speculative cache line which is made non-speculative in response to a second condition occurring that requires a roll-back of changes to a cache line corresponding to the speculative cache line. The mechanisms also generate the checkpoint in the speculative versioning cache in response to a determination that the first condition has occurred.

  3. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01T23:59:59.000Z

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  4. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01T23:59:59.000Z

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  5. On PowerLaw Relationships of the Internet Topology Michalis Faloutsos

    E-Print Network [OSTI]

    On Power­Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp Despite the apparent randomness of the Internet, we dis­ cover some surprisingly simple power­laws of the Internet topology. These power­laws hold for three snapshots of the Internet, between November 1997

  6. On Power-Law Relationships of the Internet Topology Michalis Faloutsos

    E-Print Network [OSTI]

    On Power-Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp the apparent randomness of the Internet, we dis- cover some surprisingly simple power-laws of the Internet topology. These power-laws hold for three snapshots of the Internet, between November 1997 and December

  7. ACCEPTED -IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT CONTROL -2003 1 Internet-like Protocols for the Control and

    E-Print Network [OSTI]

    . Abdallah , and Peter F. Hokayem Electrical & Computer Engineering Department MSC01 1100 1 University of New Mexico Albuquerque, NM 87131-0001 {rsandova,chaouki,hokayem}@eece.unm.edu Abstract In this paper we show systems such as the Inter- net are only concerned with transferring the information (with high fidelity

  8. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chanelière; R. Lauro; J. Ruggiero; J. -L. Le Gouët

    2009-11-17T23:59:59.000Z

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  9. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  10. Texas science teachers' use of TENET and the internet

    E-Print Network [OSTI]

    Edwards, Eleanor Evelyn

    1995-01-01T23:59:59.000Z

    The wealth of information available on TENET, the Texas Education Network, and the Internet has the potential to bring dramatic changes to science classrooms throughout Texas. Networking technology removes the limits of classrooms walls and opens...

  11. Distributed real-time control via the internet

    E-Print Network [OSTI]

    Srivastava, Abhinav

    2004-09-30T23:59:59.000Z

    The objective of this research is to demonstrate experimentally the feasibility of using the Internet for a Distributed Control System (DCS). An algorithm has been designed and implemented to ensure stability of the system in the presence of upper...

  12. On countermeasures of worm attacks over the Internet 

    E-Print Network [OSTI]

    Yu, Wei

    2009-05-15T23:59:59.000Z

    Worm attacks have always been considered dangerous threats to the Internet since they can infect a large number of computers and consequently cause large-scale service disruptions and damage. Thus, research on modeling ...

  13. Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches

    E-Print Network [OSTI]

    Schwartz, Paul M.; Lee, Ronald D.; Rubinstein, Ira

    2008-01-01T23:59:59.000Z

    of consensus safeguards around government data mining tocommercial data mining, the extent and speed of ad- funded2/19/2008 3:00:00 PM Data Mining and Internet Profiling:

  14. Standards as interdependent artifacts : the case of the Internet

    E-Print Network [OSTI]

    Hsieh, Mo-Han

    2008-01-01T23:59:59.000Z

    This thesis has explored a new idea: viewing standards as interdependent artifacts and studying them with network analysis tools. Using the set of Internet standards as an example, the research of this thesis includes the ...

  15. Equalizing Superstars: The Internet and the Democratization of Education

    E-Print Network [OSTI]

    Acemoglu, Daron

    Internet-based educational resources are proliferating rapidly. One concern associated with these (potentially transformative) technological changes is that they will be disequalizing—as many technologies of the last several ...

  16. Equalizing Superstars: The Internet and the Democratization of Education

    E-Print Network [OSTI]

    Acemoglu, Daron

    2014-01-17T23:59:59.000Z

    Educational resources distributed via the Internet are rapidly proliferating. One prominent concern associated with these potentially transformative developments is that, as many of the leading technologies of the last ...

  17. Radial structure of the Internet BY PETTER HOLME

    E-Print Network [OSTI]

    Forrest, Stephanie

    Department of Computer Science, University of New Mexico, Albuquerque, NM 87131, USA 2 Santa Fe Institute of Internet data, for example, a local office network of computers and their interconnections; a network

  18. The Internet as recommendation engine : implications of online behavioral targeting

    E-Print Network [OSTI]

    Smith-Grieco, Anthony Nicoll

    2010-01-01T23:59:59.000Z

    This thesis discusses the economic implications of Internet behavioral advertising, which targets ads to individuals based on extensive detailed data about the specific websites users have visited. Previous literature on ...

  19. Using the Internet to Stay Informed about Energy 

    E-Print Network [OSTI]

    Phillips, J.

    1996-01-01T23:59:59.000Z

    degree for both large companies and small, one person or a Fortune 500 business. What is the INTERNET? It is a powerful communications tool whereby anyone can contact anyone else, worldwide, to either provide or reuieve information. Using the existing...

  20. Cerebro : forming parallel internets and enabling ultra-local economies

    E-Print Network [OSTI]

    Ypodimatopoulos, Polychronis Panagiotis

    2008-01-01T23:59:59.000Z

    Internet-based mobile communications have been increasing rapidly [5], yet there is little or no progress in platforms that enable applications for discovery, context-awareness and sharing of data and services in a peer-wise ...

  1. GENII Version 2 Users’ Guide

    SciTech Connect (OSTI)

    Napier, Bruce A.

    2004-03-08T23:59:59.000Z

    The GENII Version 2 computer code was developed for the Environmental Protection Agency (EPA) at Pacific Northwest National Laboratory (PNNL) to incorporate the internal dosimetry models recommended by the International Commission on Radiological Protection (ICRP) and the radiological risk estimating procedures of Federal Guidance Report 13 into updated versions of existing environmental pathway analysis models. The resulting environmental dosimetry computer codes are compiled in the GENII Environmental Dosimetry System. The GENII system was developed to provide a state-of-the-art, technically peer-reviewed, documented set of programs for calculating radiation dose and risk from radionuclides released to the environment. The codes were designed with the flexibility to accommodate input parameters for a wide variety of generic sites. Operation of a new version of the codes, GENII Version 2, is described in this report. Two versions of the GENII Version 2 code system are available, a full-featured version and a version specifically designed for demonstrating compliance with the dose limits specified in 40 CFR 61.93(a), the National Emission Standards for Hazardous Air Pollutants (NESHAPS) for radionuclides. The only differences lie in the limitation of the capabilities of the user to change specific parameters in the NESHAPS version. This report describes the data entry, accomplished via interactive, menu-driven user interfaces. Default exposure and consumption parameters are provided for both the average (population) and maximum individual; however, these may be modified by the user. Source term information may be entered as radionuclide release quantities for transport scenarios, or as basic radionuclide concentrations in environmental media (air, water, soil). For input of basic or derived concentrations, decay of parent radionuclides and ingrowth of radioactive decay products prior to the start of the exposure scenario may be considered. A single code run can accommodate unlimited numbers of radionuclides including the source term and any radionuclides that accumulate from decay of the parent, because the system works sequentially on individual decay chains. The code package also provides interfaces, through the Framework for Risk Analysis in Multimedia Environmental Systems (FRAMES), for external calculations of atmospheric dispersion, geohydrology, biotic transport, and surface water transport.

  2. Snap: Robust Tool for Internet-wide Operating System Fingerprinting

    E-Print Network [OSTI]

    Nandwani, Ankur Bharatbhushan

    2012-02-14T23:59:59.000Z

    SNAP: ROBUST TOOL FOR INTERNET-WIDE OPERATING SYSTEM FINGERPRINTING A Thesis by ANKUR BHARATBHUSHAN NANDWANI Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree... of MASTER OF SCIENCE December 2010 Major Subject: Computer Science SNAP: ROBUST TOOL FOR INTERNET-WIDE OPERATING SYSTEM FINGERPRINTING A Thesis by ANKUR BHARATBHUSHAN NANDWANI Submitted to the O?ce of Graduate Studies of Texas A&M University...

  3. ObjectGlobe: Ubiquitous Query Processing on the Internet

    E-Print Network [OSTI]

    Kemper, Alfons

    for scalable Internet applications, such as business-to-business (B2B) e-commerce systems like SAP's "mySAP capabilities. The goal of the ObjectGlobe project is to establish an open market place in which data and query on the Internet. One of the main challenges in the design of such an open system is to ensure privacy and security

  4. Zephyr: A secure Internet process to streamline engineering

    SciTech Connect (OSTI)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others

    1998-05-12T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  5. A Comparison of Education, Business, and Engineering Undergraduate Students’ Internet Use and their Experience, Confidence, and Competence in Using New Literacies of the Internet

    E-Print Network [OSTI]

    Kim, Su Yeon

    2011-08-08T23:59:59.000Z

    This study explored beginning and advanced pre-service teachers’ Internet use and their experience, confidence, and competence in using new literacies of the Internet. In addition, this study compared the pre-service teachers to same-aged business...

  6. Gasoline prices increase (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014long version) Theshort

  7. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  8. Optimal Decentralized Protocols for Electric Vehicle Charging

    E-Print Network [OSTI]

    Low, Steven H.

    into the electric power grid. EV charging increases the electricity demand, and potentially amplifies the peak1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging

  9. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 µl total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  10. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  11. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  12. Assessing Internet energy intensity: A review of methods and results

    SciTech Connect (OSTI)

    Coroama, Vlad C., E-mail: vcoroama@gmail.com [Instituto Superior Técnico, Universidade Técnica de Lisboa, Av. Rovisco Pais 1, 1049-001 Lisboa (Portugal); Hilty, Lorenz M. [Department of Informatics, University of Zurich, Binzmühlestrasse 14, 8050 Zurich (Switzerland) [Department of Informatics, University of Zurich, Binzmühlestrasse 14, 8050 Zurich (Switzerland); Empa, Swiss Federal Laboratories for Materials Science and Technology, Lerchenfeldstr. 5, 9014 St. Gallen (Switzerland); Centre for Sustainable Communications, KTH Royal Institute of Technology, Lindstedtsvägen 5, 100 44 Stockholm (Sweden)

    2014-02-15T23:59:59.000Z

    Assessing the average energy intensity of Internet transmissions is a complex task that has been a controversial subject of discussion. Estimates published over the last decade diverge by up to four orders of magnitude — from 0.0064 kilowatt-hours per gigabyte (kWh/GB) to 136 kWh/GB. This article presents a review of the methodological approaches used so far in such assessments: i) top–down analyses based on estimates of the overall Internet energy consumption and the overall Internet traffic, whereby average energy intensity is calculated by dividing energy by traffic for a given period of time, ii) model-based approaches that model all components needed to sustain an amount of Internet traffic, and iii) bottom–up approaches based on case studies and generalization of the results. Our analysis of the existing studies shows that the large spread of results is mainly caused by two factors: a) the year of reference of the analysis, which has significant influence due to efficiency gains in electronic equipment, and b) whether end devices such as personal computers or servers are included within the system boundary or not. For an overall assessment of the energy needed to perform a specific task involving the Internet, it is necessary to account for the types of end devices needed for the task, while the energy needed for data transmission can be added based on a generic estimate of Internet energy intensity for a given year. Separating the Internet as a data transmission system from the end devices leads to more accurate models and to results that are more informative for decision makers, because end devices and the networking equipment of the Internet usually belong to different spheres of control. -- Highlights: • Assessments of the energy intensity of the Internet differ by a factor of 20,000. • We review top–down, model-based, and bottom–up estimates from literature. • Main divergence factors are the year studied and the inclusion of end devices. • We argue against extending the Internet system boundary beyond data transmission. • Decision-makers need data that differentiates between end devices and transmission.

  13. IES version 6.1

    Broader source: Energy.gov [DOE]

    On this page you'll find information about the IES version 6.1 qualified computer software (buildings.energy.gov/qualified_software.html), which calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

  14. IES version 6.3

    Broader source: Energy.gov [DOE]

    On this page you'll find information about the IES version 6.3 qualified computer software (buildings.energy.gov/qualified_software.html), which calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

  15. 2012 Sustainability Plan Public Version

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Sustainability Plan (SP) meets the Executive Order (EO) 13514, Federal Leadership in Environmental, Energy1 2012 Sustainability Plan Public Version 16 November 2012 Point of Contact: Candice S. Walters, and Economic Performance, Section 8 requirement to annually update an integrated Strategic Sustainability

  16. University Policy Process Short Version

    E-Print Network [OSTI]

    Mohanty, Saraju P.

    Rev. 5/09 University Policy Process Short Version Conduct Analysis Draft Documents Get Approvals. Identify policy owner 3. Assemble team 4. Engage Stakeholders 5. Draft policy 6. Submit proposed policy approves (or not) Do we need a policy? 11. Plan communication & training 12. UPO posts approved policy

  17. Safe Method of Use for Hazardous Substances of Higher Risk 16 Version 2 July 2008 Page 1 of 5

    E-Print Network [OSTI]

    Auckland, University of

    Safe Method of Use for Hazardous Substances of Higher Risk 16 Version 2 July 2008 Page 1 of 5 SafeBr depend on the nature of the waste materials and the concentration of EtBr that they contain. Much a choice of protocols, the sodium nitrite method is preferred as the reaction products retain very little

  18. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Jacobs, Kurt

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

  19. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols........................................................................... 5 Clam Dredge Construction and Repair

  20. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  1. Protocols for the Equitable Assessment of Marine Energy Converters 

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  2. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

    2014-07-21T23:59:59.000Z

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

  3. Performance Test Protocol for Evaluating Inverters Used in Grid...

    Office of Scientific and Technical Information (OSTI)

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems. Re-direct Destination: Abstract not provided....

  4. Schonlau M. Will web surveys ever become part of mainstream research? Journal of Medical Internet Research. 2004; 6(3):e31. Available at http://www.jmir.org/2004/3/e31/.

    E-Print Network [OSTI]

    Schonlau, Matt

    Schonlau M. Will web surveys ever become part of mainstream research? Journal of Medical Internet the pre-publication version in this document. Guest Editorial Will web surveys ever become part Santa Monica, CA 90407 email: matt@rand.org This journal issue contains two interesting papers on web

  5. COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1

    E-Print Network [OSTI]

    Sergot, Marek

    COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1 PETER HAMMOND2 AND MAREK SERGOT3 July 1994 Cancer treatment is often carried out within protocol-based clinical trials. An oncology clinic may take of many protocols, the life-threatening nature of cancer and the toxicity of treatment side

  6. Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,

    E-Print Network [OSTI]

    to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

  7. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Protocol Stack March 26, 2014 1 / 15 #12;One-Slide Refresher Wireless Sensor Networks (WSNs) Could be used;Wireless access point network Layers Application Google Chrome Transport Transmission Control Protocol (TCP

  8. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  9. PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS

    E-Print Network [OSTI]

    1/6 PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS Yi Qian 1 , Kejie Lu 2 on a priority based secure MAC protocol for vehicular networks and present detailed security and performance and simulations that the MAC protocol can achieve both security and QoS requirements for vehicular network safety

  10. Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    Toyohiro Tsurumaru

    2006-12-25T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the "discretized gaussian" intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100km reported by Diamanti et al. turns out to be insecure. Moreover it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95km.

  11. Beej's Guide to Network Programming Using Internet Sockets

    E-Print Network [OSTI]

    Solworth, Jon A.

    : beej Initial version. Revision Version 1.5.5 January 13, 1999 Revised by: beej Latest HTML version@piratehaven.org Copyright © 1995-2001 by Brian "Beej" Hall Revision History Revision Version 1.0.0 August, 1995 Revised by. Revision Version 2.0.0 March 6, 2001 Revised by: beej Converted to DocBook XML, corrections, additions

  12. DECADE_for Internet.indd

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy, OAPM | Department ofCommunications3Department of

  13. internet of things | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 Wind Projectsource History ViewZAPZinccell Homehybrid

  14. Microsoft Word - Document in Microsoft Internet Explorer

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions forCheneyNovember S. DEPARTMENTtheStatus of the Mixed Oxide Fuel

  15. Microsoft Word - Internet Write-Up.doc

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions forCheneyNovember S.Fluor-B&W OE-781R DOE RFI onDepartment ofSandia

  16. OpenEI Community - internet of things

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer PlantMunhall,Missouri: EnergyExcellenceOfficeOhio: Energy Resourcesen)5/0 en Global8/0

  17. Microsoft Word - Document in Microsoft Internet Explorer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA / USACE SWPAURTeC:8CO 2 FoamC M E TBILLHorizontal Axis8

  18. Microsoft Word - Document in Windows Internet Explorer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA / USACE SWPAURTeC:8CO 2 FoamC M E TBILLHorizontal

  19. 08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols

    E-Print Network [OSTI]

    Udgaonkar, Jayant B.

    Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

  20. Automated Verification of Quantum Protocols using MCMAS

    E-Print Network [OSTI]

    F. Belardinelli; P. Gonzalez; A. Lomuscio

    2012-07-04T23:59:59.000Z

    We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC), an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  1. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01T23:59:59.000Z

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  2. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25T23:59:59.000Z

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  3. Protocols for Authorized Release of Concrete

    SciTech Connect (OSTI)

    Smith, Agatha Marie; Meservey, Richard Harlan; Chen, S.Y.; Powell, James Edward; PArker, F.

    2000-06-01T23:59:59.000Z

    Much of the clean or slightly contaminated concrete from Decontamination and Decommissioning (D&D) activities could be re-used. Currently, there is no standardized approach, or protocol, for managing the disposition of such materials. Namely, all potential disposition options for concrete, including authorized release for re-use, are generally not fully evaluated in D&D projects, so large quantities have been unduly disposed of as low-level radioactive waste. As a result, costs of D&D have become prohibitively high, hindering expedient cleanup of surplus facilities. The ability to evaluate and implement the option of authorized release of concrete from demolition would result in significant cost savings, while maintaining protection of environmental health and safety, across the Department of Energy (DOE) complex. The Idaho National Engineering and Environmental Laboratory (INEEL), Argonne National Laboratory East (ANL-E), and Vanderbilt University have teamed to develop a protocol for the authorized release of concrete, based on the existing DOE guidance of Order 5400.5, that applies across the DOE complex. The protocol will provide a streamlined method for assessing risks and costs, and reaching optimal disposal options, including re-use of the concrete within the DOE system.

  4. Internet-based calibration of a multifunction calibrator

    SciTech Connect (OSTI)

    BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

    2000-04-17T23:59:59.000Z

    A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

  5. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01T23:59:59.000Z

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  6. Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code

    E-Print Network [OSTI]

    No, Jong-Seon

    protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

  7. Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols

    E-Print Network [OSTI]

    Duan, Pu

    2012-07-16T23:59:59.000Z

    ................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

  8. Measurements and analysis of end-to-end Internet dynamics

    SciTech Connect (OSTI)

    Paxson, V [Univ. of California, Berkeley, CA (United States). Computer Science Division

    1997-04-01T23:59:59.000Z

    Accurately characterizing end-to-end Internet dynamics - the performance that a user actually obtains from the lengthy series of network links that comprise a path through the Internet - is exceptionally difficult, due to the network`s immense heterogeneity. At the heart of this work is a `measurement framework` in which a number of sites around the Internet host a specialized measurement service. By coordinating `probes` between pairs of these sites one can measure end-to-end behavior along O(N{sup 2}) paths for a framework consisting of N sites. Consequently, one obtains a superlinear scaling that allows measuring a rich cross-section of Internet behavior without requiring huge numbers of observation points. 37 sites participated in this study, allowing the author to measure more than 1,000 distinct Internet paths. The first part of this work looks at the behavior of end-to-end routing: the series of routers over which a connection`s packets travel. Based on 40,000 measurements made using this framework, the author analyzes: routing `pathologies` such as loops, outages, and flutter; the stability of routes over time; and the symmetry of routing along the two directions of an end-to-end path. The author finds that pathologies increased significantly over the course of 1995 and that Internet paths are heavily dominated by a single route. The second part of this work studies end-to-end Internet packet dynamics. The author analyzes 20,000 TCP transfers of 100 Kbyte each to investigate the performance of both the TCP endpoints and the Internet paths. The measurements used for this part of the study are much richer than those for the first part, but require a great degree of attention to issues of calibration, which are addressed by applying self-consistency checks to the measurements whenever possible. The author finds that packet filters are capable of a wide range of measurement errors, some of which, if undetected, can significantly taint subsequent analysis.

  9. CINEMA: Columbia InterNet Extensible Multimedia Architecture Kundan Singh, Wenyu Jiang, Jonathan Lennox, Sankaran Narayanan and Henning Schulzrinne

    E-Print Network [OSTI]

    CINEMA: Columbia InterNet Extensible Multimedia Architecture Kundan Singh, Wenyu Jiang, Jonathan Lennox, Sankaran Narayanan and Henning Schulzrinne Department of Computer Science, Columbia University and implementation of our Internet telephony system CINEMA (Columbia InterNet Extensible Multimedia Architecture

  10. Embrittlement data base, version 1

    SciTech Connect (OSTI)

    Wang, J.A.

    1997-08-01T23:59:59.000Z

    The aging and degradation of light-water-reactor (LWR) pressure vessels is of particular concern because of their relevance to plant integrity and the magnitude of the expected irradiation embrittlement. The radiation embrittlement of reactor pressure vessel (RPV) materials depends on many different factors such as flux, fluence, fluence spectrum, irradiation temperature, and preirradiation material history and chemical compositions. These factors must be considered to reliably predict pressure vessel embrittlement and to ensure the safe operation of the reactor. Based on embrittlement predictions, decisions must be made concerning operating parameters and issues such as low-leakage-fuel management, possible life extension, and the need for annealing the pressure vessel. Large amounts of data from surveillance capsules and test reactor experiments, comprising many different materials and different irradiation conditions, are needed to develop generally applicable damage prediction models that can be used for industry standards and regulatory guides. Version 1 of the Embrittlement Data Base (EDB) is such a comprehensive collection of data resulting from merging version 2 of the Power Reactor Embrittlement Data Base (PR-EDB). Fracture toughness data were also integrated into Version 1 of the EDB. For power reactor data, the current EDB lists the 1,029 Charpy transition-temperature shift data points, which include 321 from plates, 125 from forgoings, 115 from correlation monitor materials, 246 from welds, and 222 from heat-affected-zone (HAZ) materials that were irradiated in 271 capsules from 101 commercial power reactors. For test reactor data, information is available for 1,308 different irradiated sets (352 from plates, 186 from forgoings, 303 from correlation monitor materials, 396 from welds and 71 from HAZs) and 268 different irradiated plus annealed data sets.

  11. IBM Presentation Template Full Version

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40 Buildingto17 3400, U.S.MajorMarketsNov-14 Dec-14Has Hydrocarbon

  12. BEGIN VCALENDAR VERSION METHOD PUBLISH

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperationalAugust Nazim Ali Bharmal, Comparisons4-3BEGIN

  13. POSTMAX, Version 2.0

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomass and4/26/11:Tel.:162 PreparedExpert ShowcaseSite

  14. Microsoft Word - Version_1.doc

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found TheHot electron dynamicsAspen Aerogels, Inc.Use of Solid

  15. Gasoline prices decrease (Short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline pricesGasolineShort

  16. Gasoline prices decrease (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline

  17. Gasoline prices decrease (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline5, 2014 Gasoline prices

  18. Gasoline prices decrease (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline5, 2014 Gasoline

  19. Gasoline prices decrease (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline5, 2014 Gasolinelong

  20. Gasoline prices decrease (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline5, 2014

  1. Gasoline prices decrease (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline5, 2014Gasoline prices

  2. Gasoline prices decrease (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014 Gasoline5, 2014Gasoline

  3. Version No.: 2002.001

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline pricessummer gasoline

  4. Version No.: 2002.001

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline pricessummer gasoline,,,,,,"OMB

  5. Version No.: 2002.001

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline pricessummer gasoline,,,,,,"OMB

  6. Version No.: 2002.001

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline pricessummer

  7. SHMTools, Version 0.1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection245C Unlimited Release PrintedDEVIATIONSReduce5, 3/6/15)SHMTools,

  8. Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"

    E-Print Network [OSTI]

    Koomey, Jonathan G.

    2008-01-01T23:59:59.000Z

    The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coal—the PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

  9. Exploration of the comics medium developed for use on the internet

    E-Print Network [OSTI]

    Piana, Brian James

    2000-01-01T23:59:59.000Z

    A new derivative of the comics medium may be created by incorporating computer and internet technology into the design process. Traditionally a printed medium, comics is now finding its way onto the internet; more comic creators are presenting...

  10. SP.772 Internet Technology in Local and Global Communities, Spring 2005

    E-Print Network [OSTI]

    Gray, Paul E.

    The MIT-Africa Internet Technology Initiative (MIT-AITI) organization is an innovative approach by MIT students to integrate computers and internet technology into the education of students in African schools. The program ...

  11. Quality Matters: Some Remarks on Internet Service Provisioning and Tariff Design

    E-Print Network [OSTI]

    Varaiya, Pravin

    Quality Matters: Some Remarks on Internet Service Provisioning and Tariff Design£ J¨orn AltmannÝ Bj on demand to derive some consequences for Internet service provisioning and tariff design. £This research

  12. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  13. CSP 550: Internet Programming Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and Paradigms, 2002.

    E-Print Network [OSTI]

    Heller, Barbara

    CSP 550: Internet Programming Texts Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and SOAP 9 hours Total 45 hours Edited March 2006 (html, css checks) CSP 550: Internet Programming - CS

  14. Productive Economy InternetMobilephonesBudgetanalysisGreeneconomyRapid

    E-Print Network [OSTI]

    Berzins, M.

    manufacturing work 1990s A new process, `Selective Laser Sintering', paves way for rapid manufacture of productsProductive Economy InternetMobilephonesBudgetanalysisGreeneconomyRapid manufacturing 1967 UK computer design files ­ using plastic lays foundation for new low-cost, low- waste manufacturing techniques

  15. World Wide Web Internet and Web Information Systems

    E-Print Network [OSTI]

    Cao, Longbing

    1 23 World Wide Web Internet and Web Information Systems ISSN 1386-145X World Wide Web DOI 10's request, provided it is not made publicly available until 12 months after publication. #12;World Wide Web worlds. Its detection is a typical use case of the broad-based Wisdom Web of Things (W2T) methodology

  16. SPOT PRICING FRAMEWORK FOR LOSS GUARANTEED INTERNET SERVICE CONTRACTS

    E-Print Network [OSTI]

    Kalyanaraman, Shivkumar

    . In a two-component approach to pricing, a nonlinear pricing scheme is used for cost recovery and a utility for cost recovery, and (ii) an options-based approach to price the risk of deviations in the loss based QoSPOT PRICING FRAMEWORK FOR LOSS GUARANTEED INTERNET SERVICE CONTRACTS Aparna Gupta Decision

  17. Internet and Mobile Services Patrick Clara, Manuel Piubelli

    E-Print Network [OSTI]

    Ricci, Francesco

    Domotics Internet and Mobile Services Patrick Clara, Manuel Piubelli 2010/11 Abstract People do and are considered to be annoying. Domotics, a J2ME mobile application provides a way to accomplish these tasks by a few keyboard hits from any place using the mobile phone. Moreover, Domotics implements an intelligence

  18. Roadmap: Technical and Applied Studies Computer Technology Internet/Multimedia

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Technical and Applied Studies ­ Computer Technology Internet/Multimedia ­ Bachelor Updated: 22-Aug-12/TET This roadmap is a recommended semester-by-semester plan of study for this major and minimum 39 upper-division credit hours #12;Roadmap: Technical and Applied Studies ­ Computer Technology

  19. Malicious Internet Use and Homeland Security Wolfgang W. Bein

    E-Print Network [OSTI]

    Bein, Wolfgang

    @cs.unlv.edu Abstract The advantages of speed, security and connectivity, which Information Technology brings new digital world; perhaps very much similar to the excitement experienced over nuclear energy: The Internet has redefined the meaning of neighborhood, enabling terrorist cells to communicate over long

  20. The Monitoring and Early Detection of Internet Worms

    E-Print Network [OSTI]

    Shenoy, Prashant

    to our society, it is necessary to set up a nation-scale worm-monitoring and early-warning system. (The to give people accurate early warning information and possible reaction time for counteractions1 The Monitoring and Early Detection of Internet Worms Cliff C. Zou, Weibo Gong, Fellow, IEEE, Don

  1. A Future Internet Architecture supporting Multipath Communication Networks

    E-Print Network [OSTI]

    Dreibholz, Thomas

    . In this paper, we propose a clean-slate conceptual design of a new architecture as a contribution to the ongoing extensions is becoming more and more common. In this paper, we present a novel clean-slate for the Internet to be mentioned that clean-slate, as explained by [3], should be viewed as a design process, not as a result

  2. Autonomic Power Management Schemes for Internet Servers and Data Centers

    E-Print Network [OSTI]

    Kozyrakis, Christos

    power control policies. In section III, we analyze the structural properties of the optimal policies,bambos,christos,dimeco}@stanford.edu Abstract-- We investigate autonomic power control policies for internet servers and data centers Programming approach that captures the power-performance tradeoff. We study the structural properties

  3. ARTIGO INTERNET Professores visitam o maior reactor de Fuso Nuclear

    E-Print Network [OSTI]

    Instituto de Sistemas e Robotica

    ARTIGO INTERNET Professores visitam o maior reactor de Fusão Nuclear in http reactor de Fusão Nuclear Experiência aproxima investigação das futuras gerações Doze professores do ensino secundário visitaram o maior reactor de fusão nuclear da Terra (JET), no Reino Unido, na semana passada

  4. Leveraging residential energy management through the Internet of Things

    E-Print Network [OSTI]

    Leveraging residential energy management through the Internet of Things Markus Weiss Engineering into the residential environment contribute significantly to today's energy consumption. However, there exists a lack be achieved with adequate information at hand. Thus, conserving energy in residential spaces requires making

  5. Inferring Internet Denial-of-Service Activity DAVID MOORE

    E-Print Network [OSTI]

    Wang, Deli

    -up connections. We believe our technique is the first to provide quantitative estimates of Internet-wide denial: Measurement, Security Additional Key Words and Phrases: backscatter, denial-of-service, network measurement by a similar assault, the root DNS servers were targeted in 2002, and SCO's corporate Web site

  6. Securing Internet Coordinate Embedding Systems Mohamed Ali Kaafar

    E-Print Network [OSTI]

    Turletti, Thierry

    Securing Internet Coordinate Embedding Systems Mohamed Ali Kaafar INRIA Sophia Antipolis, FR mkaafar@sophia.inria.fr Laurent Mathy Lancaster University, UK laurent@comp.lancs.ac.uk Chadi Barakat INRIA Sophia Antipolis, FR barakat@sophia.inria.fr Kave Salamatian LIP6, FR and EPFL, CH kave

  7. Virtual Networks under Attack: Disrupting Internet Coordinate Systems

    E-Print Network [OSTI]

    Turletti, Thierry

    Sophia Antipolis, FR mkaafar@sophia.inria.fr Laurent Mathy Lancaster University, UK and LAAS-CNRS, FR laurent@comp.lancs.ac.uk Thierry Turletti INRIA Sophia Antipolis, FR turletti@sophia.inria.fr Walid Dabbous INRIA Sophia Antipolis, FR dabbous@sophia.inria.fr ABSTRACT Internet coordinate-based systems

  8. Challenges in Inferring Internet Interdomain Congestion Matthew Luckie

    E-Print Network [OSTI]

    California at San Diego, University of

    to handle the traf- fic demand. The two primary forms of interconnection are transit, when one AS sells another ISP access to the global Internet, and peering, when two ISPs interconnect to ex- change customer with the agreement and be disconnected by the other party until a new agreement was reached. More recent peering

  9. OSCAR: Object Security Architecture for the Internet of Things

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    discuss the applicability of OSCAR to Smart City deployments. I. INTRODUCTION The long awaited InternetT scenarios, such as smart city deployments, where a large number of clients per constrained server.lastname}@imag.fr, {firstname.lastname}@st.com Abstract--Billions of smart, but constrained objects wirelessly connected

  10. On the Importance of Local Connectivity for Internet Topology Models

    E-Print Network [OSTI]

    Hand, Steven

    typically stem from beliefs about the true properties of the Internet, e.g. hierarchy and power- laws, which a power-law [8]. In this comparison we rely on a wide set of commonly used topological measures2 two main measurement techniques, i.e., BGP routing tables [1], [2] and traceroute maps [3

  11. Jitter Regulation in an Internet Router with Delay Consideration

    E-Print Network [OSTI]

    Imai, Hiroshi

    Jitter Regulation in an Internet Router with Delay Consideration Hisashi Koga Fujitsu Laboratories, jitter, the variability of delay of individual packets, must be kept low. We examine on­line algorithms in a router to regulate jitter for a given multimedia stream by holding packets in an internal buffer

  12. The Convergence of Internet Security (Spam, Viruses, Trojans, Phishing)

    E-Print Network [OSTI]

    Gutmann, Peter

    huge amounts of spam costs very little -- BBC News #12;Spam Technical Mechanisms Bulletproof hosting numbers of spam servers are located in China · Highly advanced telecom infrastructure · Cheaper bandwidth than in the West · China has 30 ­ 50,000 Internet police in 700 cities... ... who carefully investigate

  13. TungsTen--2004 79. Referencesthatincludeasectionmark()arefoundintheInternet

    E-Print Network [OSTI]

    TungsTen--2004 79. Referencesthatincludeasectionmark(§)arefoundintheInternet ReferencesCitedsection. TungsTen ByKimB.shedd Domestic survey data and tables were prepared by Amy C. Tolcin, statistical assistant, and the world production table was prepared by Glenn J. Wallace, international data coordinator

  14. Is the Internet for Porn? An Insight Into the Online Adult Industry

    E-Print Network [OSTI]

    Kruegel, Christopher

    Is the Internet for Porn? An Insight Into the Online Adult Industry Gilbert Wondracek1 , Thorsten Introduction "The Internet is for Porn" is the title of a satirical song that has been viewed several million at work. With a total worth of more than 97 billion USD in 2006 [14], the Internet porn industry yields

  15. Final Project Report Modulate of Internet Radio Into FM Using GNU Radio

    E-Print Network [OSTI]

    Yu, Chansu

    Final Project Report Modulate of Internet Radio Into FM Using GNU Radio Department of Electrical-Introduction: Internet radio (also known as Webcasting) is becoming more and more popular. Especially that it covers for people traveling all the time or living away from there home country, internet radio helps them keep

  16. Jean Arnaud, Sara Bouchenak Performance, Availability and Cost of Self-Adaptive Internet Services

    E-Print Network [OSTI]

    Bouchenak, Sara

    Jean Arnaud, Sara Bouchenak Performance, Availability and Cost of Self-Adaptive Internet Services Directions IGI Global, 2011 #12;#12;Performance, Availability and Cost of Self-Adaptive Internet Services tradeoff between service performance and availability. This is made harder as Internet service workloads

  17. TEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE

    E-Print Network [OSTI]

    ://www.ncemch.org/pubs/PDFs/breastfeedingTIB.pdf Internet monograph (standard citation to a part) Inhalent abuse [Internet]. Bethesda (MD): National Institute on Drug Abuse (US); 1994 [revised 2000 Jul; cited 2001 Mar 1]. How can inhalent abuse Care [Internet]. 1997 Apr [cited 1997 Nov 4];2(3):[about 10 p.]. Available from: http

  18. The 3rd Workshop on Active Internet Measurements (AIMS-3) Report

    E-Print Network [OSTI]

    California at San Diego, University of

    , and government, fo- cused on analysis of goals, means, and emerging issues in ac- tive Internet measurement for macroscopic measurement and mapping of Internet properties, in particular those related to cybersecurity Internet measurement, particularly those related to cybersecurity, as well as exchange of insights among

  19. Communications of the ACM, June 1999 Lessons from Haiti's Internet Development

    E-Print Network [OSTI]

    Peha, Jon M.

    1 Communications of the ACM, June 1999 Lessons from Haiti's Internet Development Jon M. Peha Abstract Haiti does not appear to be the most fertile ground for Internet growth. It is a poor nation, and have sometimes explored unconventional technical approaches. Haiti now has four commercial Internet

  20. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01T23:59:59.000Z

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  1. Adaptive protocols for mobile ad hoc networks

    E-Print Network [OSTI]

    Holland, Gavin Douglas

    2005-02-17T23:59:59.000Z

    . We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...

  2. LA REVUE DE L'EPI N 88 UNE CLASSE -UN MONDE -SUR INTERNET UNE CLASSE -UN MONDE -SUR INTERNET

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    INTERNET SANS PAPIER- SANS CAHIER Monique PERDRILLAT UNIVERSITÉ VIRTUELLE INTERNATIONALE À L'OCCASION DU G8 pays du G8 Pendant la période du sommet du G8, qui a eu lieu aux États-Unis, à Denver, du 20 au 22 juin objectifs pédagogiques Chaque pays représenté au sommet du G8 a constitué sa déléga- tion officielle de

  3. Device-independent entanglement-based Bennett 1992 protocol

    E-Print Network [OSTI]

    Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

    2012-10-05T23:59:59.000Z

    In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

  4. Fibred Coalgebraic Logic and Quantum Protocols

    E-Print Network [OSTI]

    Daniel Marsden

    2014-12-30T23:59:59.000Z

    Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  5. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  6. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    the Development and Maintenance of Criteria Review and Approach Documents, March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments...

  7. aided routing protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    reduction in the number of routing messages. However, current position Yasinsac, Alec 2 Energy Efficient Location Aided Routing Protocol for Wireless MANETs CERN Preprints...

  8. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...

    Open Energy Info (EERE)

    calculation-toolsall-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions...

  9. Dynamic Protocol Tuning Algorithms for High Performance Data...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Dynamic Protocol Tuning Algorithms for High Performance Data Transfers Event Sponsor: Mathematics and Computing Science Seminar Start Date: Apr 3 2015 - 2:00pm BuildingRoom:...

  10. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

  11. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

  12. acids extraction protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  13. aureus decolonisation protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  14. addfam study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  15. antineoplastic combined chemotherapy protocols: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  16. afinos study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  17. agrobacterium-mediated transformation protocol: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  18. antineoplastic protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  19. Protective Force Protocols for ESS Supported Performance Tests...

    Broader source: Energy.gov (indexed) [DOE]

    security force-on-force performance tests and exercises. Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 More Documents & Publications...

  20. BPA Response to Comments on Oversupply Management Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

  1. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    NONE

    1996-03-01T23:59:59.000Z

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  2. Biomass Webinar Text Version | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Dowload the text version of the audio from the DOE Office of Indian Energy webinar on biomass. DOE Office of Indian Energy Foundational Course Webinar on Biomass: Text Version More...

  3. Solar Webinar Text Version | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    the text version of the audio from the DOE Office of Indian Energy webinar on solar renewable energy. DOE Office of Indian Energy Foundational Course on Solar: Text Version More...

  4. Assessing Energy Resources Webinar Text Version

    Broader source: Energy.gov [DOE]

    Download the text version of the audio from the DOE Office of Indian Energy webinar on assessing energy resources.

  5. Visual Sample Plan Version 3.0

    E-Print Network [OSTI]

    PNNL-14970 Visual Sample Plan Version 3.0 User's Guide N. L. Hassig R. O. Gilbert J. E. Wilson B. A-14970 Visual Sample Plan Version 3.0 User's Guide N. L. Hassig R. O. Gilbert J. E. Wilson B. A Sample Plan (VSP) Version 3.0 and provides instructions for using the software. VSP selects

  6. Modelling unbounded parallel sessions of security protocols in CSP

    E-Print Network [OSTI]

    Roscoe, Bill

    Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

  7. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  8. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

  9. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  10. SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols

    E-Print Network [OSTI]

    Han, Richard Y.

    SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols Anmol Sheth and Richard Han@cs.colorado.edu Abstract-- Asymmetric transmission ranges caused due to transmit power control have the undesirable effect access. In this paper we present a new reactive power controlled MAC protocol, SHUSH, which tackles

  11. A Power Control MAC Protocol for Ad Hoc Networks

    E-Print Network [OSTI]

    A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A This paper presents a power control MAC protocol that al- lows nodes to vary transmit power level on a per control. The main idea of these power control schemes is to use different power lev- els for RTS

  12. Distributed Temporal Logic for the Analysis of Security Protocol Models

    E-Print Network [OSTI]

    Basin, David

    , showing that it is sufficient to consider models in which the intruder completely controls the networkDistributed Temporal Logic for the Analysis of Security Protocol Models David Basin Department to reason about and relate different security-protocol models. This includes reasoning about model

  13. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  14. METHODOLOGY Open Access An improved pyrite pretreatment protocol for

    E-Print Network [OSTI]

    Halevy, Itay

    METHODOLOGY Open Access An improved pyrite pretreatment protocol for kinetic and isotopic studies, therefore, desirable. A robust standardized pretreatment protocol for removal of fine particles. Results: Our data demonstrate the presence of large fractions of S0 on untreated pyrite particle surfaces

  15. Cross-layered Synchronization Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cross-layered Synchronization Protocol for Wireless Sensor Networks Thomas Beluch, Daniela. Advances in wireless sensor network performances and improvement of attainable bit rates allow research on such measurement systems using Wireless Sensor Networks (WSNs). However, current WSN synchronization protocols do

  16. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Micha¨el Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  17. Adaptive Data Collection Protocol using Reinforcement Learning for VANETs

    E-Print Network [OSTI]

    Boyer, Edmond

    Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

  18. A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Nahrstedt, Klara

    ­hop wireless ad­hoc networks, designing energy­efficient rout­ ing protocols is critical since nodes are power be mobile, demanding the energy­efficient routing protocol to be fully distributed and adaptive­ spect to end­to­end energy­efficient routes. Finally, preliminary simulation results are presented

  19. Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols

    E-Print Network [OSTI]

    Wang, Yu

    28223, USA {lcao2, tdahlber, ywang32}@uncc.edu Abstract-- Energy aware routing protocols metric and aim to save energy consumption per packet. However, such protocols do not take the nodes' energy capacity into account. Thus, the energy consumption is not fair among nodes in the network

  20. DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network

    E-Print Network [OSTI]

    Shenoy, Prashant

    DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network Xiaolong Li, Pengyu Zhang security protocol, is proposed in this paper to secure data sensing networks. With the use of symmetric to evaluate the performance of DTK, and their relationship is derived. Furthermore, simulation carried on real

  1. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30T23:59:59.000Z

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  2. Improved protocols of secure quantum communication using W states

    E-Print Network [OSTI]

    Chitra Shukla; Anindita Banerjee; Anirban Pathak

    2012-04-20T23:59:59.000Z

    Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

  3. Should mobile Internet services be an extension of the fixed Internet? Context-of-use, fixed-mobile reinforcement and personal innovativeness

    E-Print Network [OSTI]

    Twente, Universiteit

    reinforcement and personal innovativeness Mark de Reuver Faculty Technology, Policy and Management Delft Innovation & Interaction Utrecht, The Netherlands Harry Bouwman Faculty Technology, Policy and ManagementShould mobile Internet services be an extension of the fixed Internet? Context-of-use, fixed-mobile

  4. To appear in Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, August 2013. Internet Censorship in Iran: A First Look

    E-Print Network [OSTI]

    Eustice, Ryan

    , August 2013. Internet Censorship in Iran: A First Look Simurgh Aryan Aryan Censorship Project aryan censorship in Iran based on network measurements conducted from a major Iranian ISP during the lead up Introduction Iran is known as one of the leading suppressors of Internet freedom. Reporters Without Borders

  5. T.T.T.Nguyen, G.Armitage, A Survey of Techniques for Internet Traffic Classification using Machine Learning A Survey of Techniques for Internet Traffic

    E-Print Network [OSTI]

    Armitage, Grenville

    of their various business goals. Traffic classification may be a core part of automated intrusion detection systemsT.T.T.Nguyen, G.Armitage, A Survey of Techniques for Internet Traffic Classification using Machine Learning A Survey of Techniques for Internet Traffic Classification using Machine Learning Thuy T.T. Nguyen

  6. A New Internet Architecture to Enable Software Defined Optics

    E-Print Network [OSTI]

    architecture. According to this point of view, it is time for taking a "clean-slate" approach to address and without being constrained by the existing architecture and protocols [17]. Major clean-slate research initiatives in the US (FIND [18]) and Europe (FIRE [21]) take a two-pronged strategy in clean- slate design

  7. How to truly improve the Internet's transport layer

    E-Print Network [OSTI]

    Welzl, Michael

    Lon designers ­ want to get best performance with minimal effort · Note: difference between updaLng an already working applicaLon and wriLng a new one from scratch ­ making use of a protocol which is now only available in 1% of the world: usually not worth it · Note for commercial applicaLons: programming effort

  8. Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level

    E-Print Network [OSTI]

    Kohm, Katherine E.

    2009-01-01T23:59:59.000Z

    Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

  9. Welcome and Advanced Manufacturing Partnership (Text Version)

    Broader source: Energy.gov [DOE]

    This is a text version of the Welcome and Advanced Manufacturing Partnership video, originally presented on March 12, 2012 at the MDF Workshop held in Chicago, Illinois.

  10. DOE and Critical Materials Video (Text Version)

    Broader source: Energy.gov [DOE]

    This is a text version of the "DOE and Critical Materials" video presented at the Critical Materials Workshop, held on April 3, 2012 in Arlington, Virginia.

  11. Manufacturing Ecosystems and Keystone Technologies (Text Version)

    Broader source: Energy.gov [DOE]

    This is a text version of the Manufacturing Ecosystems and Keystone Technologies video, originally presented on March 12, 2012 at the MDF Workshop held in Chicago, Illinois.

  12. Version Date: July 2012 COPYRIGHT & TRADEMARKS

    E-Print Network [OSTI]

    WEB Clock Version Date: July 2012 #12;COPYRIGHT & TRADEMARKS Copyright © 1998, 2011, Oracle and Guide WEB Clock Page iii Table of Contents WEB Clock ........................................................................................................................ 1 WEB Clock Procedure

  13. Fuel Cell Animation- Chemical Process (Text Version)

    Broader source: Energy.gov [DOE]

    This text version of the fuel cell animation demonstrates how a fuel cell uses hydrogen to produce electricity, with only water and heat as byproducts.

  14. Secretary of Energy Moniz Keynote (Text Version)

    Broader source: Energy.gov [DOE]

    Below is the text version for the Keynote: The Honorable Ernest J. Moniz, U.S. Secretary of Energy Video.

  15. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect (OSTI)

    Bogard, J.S.

    1998-12-01T23:59:59.000Z

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  16. A New Protocol of Continuous-Variable Entanglement Distillation

    E-Print Network [OSTI]

    Shi Jin; Xian-Min Jin; Joshua Nunn; Animesh Datta; Ian Walmsley

    2012-10-16T23:59:59.000Z

    We introduce a new protocol in continuous variable entanglement distillation that requires only linear temporal and constant physical or spatial resources.Compared with the existing protocols, our protocol uses atom-photon entanglement to substitute for atom-atom entanglement in existing protol, which will not only save the number of quantum memories, but also has the advantages in operation efficiency and temporal saving. The distillation can be realized by a fixed model of iterations, in which only three quantum memories and photon detectors are required.

  17. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  18. Parallel decomposition of the logical link control protocol

    E-Print Network [OSTI]

    Bajpai, Dhruv Haribanshnath

    1991-01-01T23:59:59.000Z

    INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

  19. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20T23:59:59.000Z

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  20. 1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2002

    E-Print Network [OSTI]

    Kocur, George

    Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

  1. 1.264J / ESD.264J Database, Internet, and Systems Integration Technologies, Fall 2004

    E-Print Network [OSTI]

    Kocur, George

    Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to ...

  2. Freight Analysis Framework version 3 (FAF3)

    E-Print Network [OSTI]

    Freight Analysis Framework version 3 (FAF3) Oak Ridge National Laboratory managed by UT Technologies Research Brief T he Freight Analysis Framework version 3 (FAF3) database is a Federal Highway data to enable users to perform train analysis. FAF3 Geography Figure 1 shows the analysis regions

  3. UPGRADES TO Monteburns, VERSION 3.0

    SciTech Connect (OSTI)

    Galloway, Jack D [Los Alamos National Laboratory; Trellue, Holly R [Los Alamos National Laboratory

    2012-06-22T23:59:59.000Z

    Monteburns VERSION 3.0 is an upgrade of the existing Monteburns code available through RSICC. The new version includes modern programming style, increased parallel computing, more accurate capture gamma calculations and an automated input generator. This capability was demonstrated through a small PWR core simulation.

  4. Tunneling study on HTS -digest version-

    E-Print Network [OSTI]

    Tonouchi, Masayoshi

    Tunneling study on HTS -digest version- Tunneling study on HTS -digest version- #12;Type contact tunneling #12;Tunneling spectra observed with different types of probes. (a):600Ê mÓ Pt wire, (b):200Ê mÓ Ag wire of coil shaped and (c):30Ê mÓ Au wire probes. The corresponding surface SEM image were

  5. Gestion de versions incertaines de documents XML

    E-Print Network [OSTI]

    Senellart, Pierre

    gestion de l'incertitude dans les donn´ees. C'est le cas de l'incertitude qui r´esulte de conflits. LesD RA FT Gestion de versions incertaines de documents XML M. Lamine Ba Talel Abdessalem Pierre'expertise et de fiabilit´e des participants. La gestion de versions est donc cruciale pour tracer l

  6. The Economy of Internet-Based Hospitality Exchange

    E-Print Network [OSTI]

    Tagiew, Rustam

    2015-01-01T23:59:59.000Z

    In this paper, we analyze and compare general development and individual behavior on two non-profit internet-based hospitality exchange services -- bewelcome.org and warmshowers.org. We measure the effort needed to achieve a real-life interaction, whereby the advantages of mutual altruism arise. The effort needed is the communication quantified in units of time. Since the amount of effort is not obvious to individual users, the development of the effort investing strategy is investigated. The impact of individual behavior on general development is discussed.

  7. House Simulation Protocols Report | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To:Department ofOral Testimony of Secretary Samuel W. BodmanReport cover

  8. Appraisal Process Protocols, Independent Oversight - November 2012 |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you0 ARRA NewslettersPartnership of the Americasfor

  9. Summary Protocol: Identification, Characterization, Designation, Remedial

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -Blueprint | DepartmentExcellenceGuidanceS EM Pr ETR RofAction,

  10. 2014 Building America House Simulation Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform is always evolving, soFuel Cell2 -of Energy4 AMO2014 Building

  11. BPA's Proposed Oversupply Management Protocol Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperationalAugustDecade Later: AreAugust 19,1 BPA5July 16, B O

  12. Property:CommunicationProtocol | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation,PillarPublicationType Jump to: navigation, search

  13. The Daily Overgeneration Management Protocol Retrospective

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafetyTed5, 2015ComputingTotal Wind89 0605

  14. The Daily Overgeneration Management Protocol Retrospective

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafetyTed5, 2015ComputingTotal Wind89 060520 0 0

  15. High Performance Computing Data Center Metering Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet), GeothermalGridHYDROGEN TOTechnologyHighLouisiana | Department ofHigh

  16. House Simulation Protocols Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet), GeothermalGridHYDROGEND D e e p pofHon. DanielHoteliersHouseTopHouse

  17. Sandia Inverter Performance Test Protocol Efficiency Weighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiationImplementingnpitche Home About npitcheSandian Wins Award in 2015SecondInverter

  18. Efficient Wide Area Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscoveringESnetEffective safety ...Mediator

  19. Optimization Online - Quantum and classical coin-flipping protocols ...

    E-Print Network [OSTI]

    Ashwin Nayak

    2015-04-21T23:59:59.000Z

    Apr 21, 2015 ... In this analogy, classical systems correspond to linear programming ... Moreover, if the product of Alice and Bob's optimal cheating probabilities is 1/2, then exactly one party can perfectly control the outcome of the protocol.

  20. The Greenhouse Gas Protocol Initiative: Measurement and Estimation...

    Open Energy Info (EERE)

    in conjunction with other WRI tools (e.g., the GHG Protocol tools for stationary combustion and purchased electricity), or in conjunction with other non-WRI tools that a...

  1. Transaction Abort Rate Reduction with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muñoz, Francesc

    and Francesc D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform´atica Universitat Polit`ecnica de Val Abort Rate Reduction with Prioritized Atomic Multicast Protocols Emili Miedes and Francesc D. Mu~noz-Esco

  2. Proposals for Non-PGM Catalyst Target and Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

  3. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    crafted request to submit a user-controlled AJP protocol message to the Tomcat server. This can be exploited to spoof the name of the target user and the client IP address...

  4. User managed wireless protocol stacks Vijay T. Raisinghani

    E-Print Network [OSTI]

    Iyer, Sridhar

    User experience on mobile devices is bound by the device constraints of memory, processing power, battery life and variations in the wireless network. Cross layer feedback in the protocol stack is useful

  5. A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.

    E-Print Network [OSTI]

    Van Dyke, Aaron R. (Aaron Robert)

    2009-01-01T23:59:59.000Z

    A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

  6. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  7. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingÕumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  8. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01T23:59:59.000Z

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  9. Dynamic address allocation protocols for Mobile ad hoc networks

    E-Print Network [OSTI]

    Patchipulusu, Praveena

    2001-01-01T23:59:59.000Z

    Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

  10. an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux

    E-Print Network [OSTI]

    Coupechoux, Marceau

    CROMA - an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux Institut Eurecom and Alcatel: +33 1 69 63 43 60 marceau.coupechoux@alcatel.fr Bruno Baynat University Pierre et Marie Curie, Paris

  11. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  12. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01T23:59:59.000Z

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  13. Predictive Protocol Management with Contingency Planning for Wireless Sensor Networks

    E-Print Network [OSTI]

    Raja, Anita

    characteristics of the Radio-Frequency (RF) in which the network operates. I. INTRODUCTION Energy efficiency protocol model with contingency planning (PPM & CP). The premise behind the approach is that providing

  14. Distributed Protocols as Behaviours in Erlang Darren Demicoli

    E-Print Network [OSTI]

    Francalanza, Adrian

    Distributed Protocols as Behaviours in Erlang Darren Demicoli CS, ICT Univeristy of Malta ddem0003@um.edu.mt Adrian Francalanza CS, ICT Univeristy of Malta adrian.francalanza@um.edu.mt ABSTRACT We

  15. Indoor airPLUS Construction Specifications Version 1 (Rev. 02...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Specifications Version 1 (Rev. 02) Indoor airPLUS Construction Specifications Version 1 (Rev. 02) Indoor airPLUS Construction Specifications Version 1 (Rev. 02), November 2013,...

  16. 2014 Hydrogen Student Design Contest (Text Version) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    4 Hydrogen Student Design Contest (Text Version) 2014 Hydrogen Student Design Contest (Text Version) Below is the text version of the webinar titled "2014 Hydrogen Student Design...

  17. Modeling in dyadic protocols for training complex skills

    E-Print Network [OSTI]

    Jordan, Jeffrey Alan

    1991-01-01T23:59:59.000Z

    MODELING IN DYADIC PROTOCOLS FOR TRAINING COMPLEX SKILLS A Thesis by JEFFREY ALAN JORDAN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE...) Charles FL Shea (Member) t n Worchel / e d of Department) / December 1991 ABSTRACT Modeling in Dyadic Protocols for Training Complex Skills. (December 1991) Jeffrey Alan Jordan, B. S. , Texas A&M University Chair of Advisory Committee: Dr. Wayne...

  18. Effective algorithms and protocols for wireless networking: a topological approach

    E-Print Network [OSTI]

    Zhang, Fenghui

    2008-10-10T23:59:59.000Z

    EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of DOCTOR OF PHILOSOPHY August 2008 Major Subject: Computer Science EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University...

  19. An internet tool for designing energy efficient homes

    SciTech Connect (OSTI)

    Milne, M.; Gomez, C.; Leeper, D.; Zurick, J.; Nindra, A.; Shen, J.; Kobayashi, Y.

    1999-07-01T23:59:59.000Z

    To help their 4.5 million residential customers make energy efficient decisions, Southern California Gas asked UCLA to develop an Internet-based simulation tool called Project REED (Residential Energy Efficient Design). The critical problem is to give these ratepayers an easy way to visualize the relative effectiveness of their various options. REED is a internet-based tool that calculates the annual gas and electricity cost for each separate building design or operating decision. Hourly climate data for the Typical Meteorological Year (TMY2) in all the climate zones in the SoCalGas service area are built in, as well as utility rates for each type of residential service. REED's Expert System first designs a basic Code Compliant home, then designs a more Energy Efficient design based on local climate, and it shows how much money ratepayers would save. The simulation engine inside REED is SOLAR-5, one of the nation's most widely used whole building energy design tools. SOLAR-5 has been validated against DOE-2 using the BESTEST procedure. This paper, one of a pair describing REED, explains the project from the user's point of view and describes what was learned from the Ratepayer Usability Test. The second paper explains the project from the simulation and software engineering point of view.

  20. Gasoline prices inch down slightly (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014long version) Theshort version) The

  1. Gasoline prices inch up (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014long version) Theshort version)

  2. Gasoline prices up this week (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014long version)short version) The

  3. Gasoline prices up this week (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014long version)short version)

  4. Gasoline prices up this week (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name:24, 2014long version)short version)short

  5. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol

    SciTech Connect (OSTI)

    Tsurumaru, Toyohiro [Mitsubishi Electric Corporation, Information Technology R and D Center, 5-1-1 Ofuna, Kamakura-shi, Kanagawa, 247-8501 (Japan)

    2007-06-15T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum-key-distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. [Phys. Rev. A 73, 012344 (2006)]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the 'discretized Gaussian' intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100 km reported by Diamanti et al. [Opt. Express 14, 13073 (2006)] turns out to be insecure. Moreover, it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95 km.

  6. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  7. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

  8. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

  9. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24T23:59:59.000Z

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  10. Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    , ljilja}@cs.sfu.ca Abstract This paper describes OPNET implementation of the Mobile Application Part (MAP) protocol within the General Packet Radio Service (GPRS) model. MAP represents an application layer protocol residing on top of the Signaling System 7 (SS7) protocol stack. In GPRS networks, MAP protocol supports

  11. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31T23:59:59.000Z

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  12. Cost Analysis of NEMO Protocol Md. Shohrab Hossain , Mohammed

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    based on all-IP technology, compounded by the fact that the number of mobile nodes requiring mobility have developed analytical models to estimate total costs of key mobility management entities of NEMO, mobility management entities, computer networks. I. INTRODUCTION To ensure continuous Internet connectivity

  13. MDF Form and Function (Text Version)

    Broader source: Energy.gov [DOE]

    This is a text version of the Manufacturing Demonstration Facilities (MDF) Form and Function video, originally presented on March 12, 2012 at the MDF Workshop held in Chicago, Illinois.

  14. Gambit-C, version 3.0

    E-Print Network [OSTI]

    1999-03-06T23:59:59.000Z

    This command only supports frames created by inter- preted code. Here is a sample interaction with gsi: % gsi. Gambit Version 3.0. > (define (f x) (let* ((y 10) (

  15. Graceful Degradation Via Versions: Specifications and Implementations

    E-Print Network [OSTI]

    Thekkath, Chandramohan A.

    Graceful Degradation Via Versions: Specifications and Implementations Lidong Zhou, Vijayan to degraded system behavior that deviates from the system's specification and even causing complete unavailability of the system. This paper advocates the notion of graceful degradation as a complementary

  16. Paper Airplane user's manual : version four

    E-Print Network [OSTI]

    Lajoie, Ronnie M.

    Preface: This document provides the user with a step-by-step guide to using Paper Airplane, Version IV. Although this program can be used to design any system (once given the proper set of design equations), this manual ...

  17. HOOTS99 Preliminary Version Object Closure Conversion

    E-Print Network [OSTI]

    Glew, Neal

    classes is an exam* *ple of closure conversion. This paper argues that a direct formulation of object HOOTS99 Preliminary Version Object Closure Conversion __________________________________________________________________________ Abstract An integral part of implementing functional languages is closure conversion_the process

  18. Vehicle Technologies Office: Lightweighting Video Text Version

    Broader source: Energy.gov [DOE]

    This is a text version of the Motorweek video segment Materials Technology / Vehicle Lightweighting, which aired on April 21, 2014. The full video is on the Lightweight Materials for Cars and...

  19. Version Auteur Monitoring the International Standardization Process

    E-Print Network [OSTI]

    Boyer, Edmond

    organizations are in charge of global security management. To address this issue, ISO (International Standards Organization), the main international organization for technical standardization, has launched a set of studiesVersion Auteur Monitoring the International Standardization Process Theoretical Choices

  20. User manual Version 1.3

    E-Print Network [OSTI]

    Napp, Nils

    Updated for new Kilobots version 1.2 13.07.2012 F.Lambercy Colour of OHC led corrected (chapter 4.2.3) 1................................................................................................. 2 1.3 RECYCLING

  1. A Virtual Learning Environment for Doing Business on the Internet Roumen Nikolov & Krassen Stefanov,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    environment demonstrates the potential of Internet to stimulate the co-operative work of people who have never1 A Virtual Learning Environment for Doing Business on the Internet Roumen Nikolov & Krassen, collaborative work, business, or other joint activities. These communities cross the national and cultural

  2. Hop-by-hop Computing for Green Internet Routing (Technical report, under revision)

    E-Print Network [OSTI]

    Wang, Dan

    Hop-by-hop Computing for Green Internet Routing (Technical report, under revision) Yuan Yang@cernet.edu.cn Abstract--Energy conservation is a global concern nowadays and it is widely expected that energy cost will continuously increase in the near future. The design of the Internet, un- fortunately, has not taken energy

  3. 15 17 June 2011, T-Labs Berlin Germany Innovative Internet

    E-Print Network [OSTI]

    Rossak, Wilhelm R.

    15 ­ 17 June 2011, T-Labs Berlin Germany Innovative Internet Community Systems Welcome to the 11th Berlin/Germany, 15 ­ 17 June 2011 OrgTeam Deutsche Telekom Laboratories & Technische Universität Berlin #12;15 ­ 17 June 2011, T-Labs Berlin Germany Innovative Internet Community Systems Opening Session I2

  4. The holonic enterprise: a model for Internet-enabled global manufacturing supply chain and workflow

    E-Print Network [OSTI]

    Ulieru, Mihaela

    The holonic enterprise: a model for Internet-enabled global manufacturing supply chain and workflow, which supports organizational information that, in turn, can mirror social organization. The Holonic with an overview of the three main concepts used to develop our HE model: holonic systems, MAS, and the Internet

  5. An Internet-Worm Early Warning System Shigang Chen Sanjay Ranka

    E-Print Network [OSTI]

    Chen, Shigang

    An Internet-Worm Early Warning System Shigang Chen Sanjay Ranka Department of Computer on the properties and effectiveness of this early warning system, and back up our claims by numerical results. I of defeating Internet worms. An early warning system is essential in fighting against natural disasters

  6. Toward a New Addressing Scheme for a Service-Centric Internet

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    , and it is positioned as a clean slate alternative aimed at overcoming the critical issues in today's Internet Terms--Naming and addressing, locators, identifiers, service-centric networks, clean slate, scalability such initiative is TAR- IFA [5], which has developed a clean slate architecture for the Future Internet (FI

  7. 3.5 ADVANCED MULTIMEDIA FOR EDUCATION ON THE INTERNET Joel Plutchak*

    E-Print Network [OSTI]

    Wilhelmson, Robert

    3.5 ADVANCED MULTIMEDIA FOR EDUCATION ON THE INTERNET Joel Plutchak* , Noah Nigg, Daniel J. Bramer and viewing of more advanced forms of multimedia content to the typical Internet user. Web developers computers and new multimedia formats allow access to animation, video, and interactive diagrams that can

  8. How Internet Concepts and Technologies Can Help Green and Smarten the Electrical Grid

    E-Print Network [OSTI]

    Rosenberg, Catherine P.

    How Internet Concepts and Technologies Can Help Green and Smarten the Electrical Grid Srinivasan of a smart, green grid. This is because both the Internet and the electrical grid are designed to meet Terms Design Keywords Electrical grid, Green Networking Permission to make digital or hard copies of all

  9. Gateway Adaptive Pacing for TCP across Multihop Wireless Networks and the Internet*

    E-Print Network [OSTI]

    Lindemann, Christoph

    Gateway Adaptive Pacing for TCP across Multihop Wireless Networks and the Internet* Sherif M. El introduce an effective congestion control scheme for TCP over hybrid wireless/wired networks comprising a multihop wireless IEEE 802.11 network and the wired Internet. We propose an adaptive pacing scheme

  10. SOFAnet: Middleware for Software Distribution over Internet Ladislav Sobr, Petr Tuma

    E-Print Network [OSTI]

    SOFAnet: Middleware for Software Distribution over Internet Ladislav Sobr, Petr Tuma Distributed.tuma@mff.cuni.cz Abstract The paper focuses on software distribution over the Internet, points to weaknesses of the current practice and argues for removing the weaknesses by introducing a ubiquitous distribution framework

  11. Zephyr: A secure Internet-based process to streamline engineering procurements using the World Wide Web

    SciTech Connect (OSTI)

    Jordan, C.W.; Cavitt, R.E.; Niven, W.A.; Warren, F.E.; Taylor, S.S.; Sharick, T.M.; Vickers, D.L.; Mitschkowetz, N.; Weaver, R.L.

    1996-08-13T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is piloting an Internet- based paperless process called `Zephyr` to streamline engineering procurements. Major benefits have accrued by using Zephyr in reducing procurement time, speeding the engineering development cycle, facilitating industrial collaboration, and reducing overall costs. Programs at LLNL are benefiting by the efficiencies introduced since implementing Zephyr`s engineering and commerce on the Internet.

  12. Assessment of VoIP Service Availability in the Current Internet

    E-Print Network [OSTI]

    Yang, Junfeng

    Assessment of VoIP Service Availability in the Current Internet Wenyu Jiang Department of Computer Science Columbia University Email: hgs@cs.columbia.edu Abstract-- We evaluate the availability of voice over IP (VoIP) service typically achieved in the current Internet. Service avail- ability is examined

  13. ENERGY NEEDS IN AN INTERNET ECONOMY: A CLOSER LOOK AT DATA CENTERS

    E-Print Network [OSTI]

    Data Center Loads VI. Using Measured Data to Confirm Power Needs VII. Reasons for Exaggerated Forecasts changes. This Internet economy also brings with it new requirements for power and power systems. In many the Internet to purchase products from stores around the country rather than being limited to stores

  14. On the Global Content PMI: Improved Copy-Protected Internet Content Distribution

    E-Print Network [OSTI]

    Matsuoka, Yoky

    On the Global Content PMI: Improved Copy-Protected Internet Content Distribution Tadayoshi Kohno distribution, copy-protection, PMI, risk manage- ment. 1 Introduction The Internet is changing the way Conference, 2001. #12;2 Tadayoshi Kohno and Mark McGovern the Privilege Management Infrastructure (PMI

  15. Internet Mathematics Vol. 6, No. 3: 255256 Special Issue on Algorithms and

    E-Print Network [OSTI]

    Boucherie, Richard J.

    Internet Mathematics Vol. 6, No. 3: 255­256 Special Issue on Algorithms and Models for the Web of Internet Mathematics is dedicated to the 6th International Workshop on Algorithms and Models for the Web-the-art achievements in the analysis of the World Wide Web and online social networking sites where the notion

  16. arthritis-related internet web: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    arthritis-related internet web First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Web Internet...

  17. Distributed Worm Simulation with a Realistic Internet Model Songjie Wei, Jelena Mirkovic, Martin Swany

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Distributed Worm Simulation with a Realistic Internet Model Songjie Wei, Jelena Mirkovic, Martin at work in its network. Aggressive worms further interact with the underlying Internet topology - the dynamics of the spread is constrained by the limited bandwidth of network links, and high-volume scan

  18. A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features

    E-Print Network [OSTI]

    Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

    2014-09-06T23:59:59.000Z

    Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

  19. Last updated: July 31, 2013 Page 1 of 3 CUNY HRPP Guidance: Internet or Mobile Technology Based Human Subject Research

    E-Print Network [OSTI]

    Rosen, Jay

    or Mobile Technology Based Human Subject Research 1. Purpose The purpose responsibilities and considerations related to Internet or mobile technology based human of the Internet or mobile technology as a tool for subject recruitment; as a tool

  20. CSP 541: Internet Technologies W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison-Wesley, ISBN 0201633469

    E-Print Network [OSTI]

    Heller, Barbara

    CSP 541: Internet Technologies Texts W.R. Stevens, TCP/IP Illustrated, Volume 1, Addison March 2006 (html, css checks) CSP 541: Internet Technologies - CS Dept, Illinois Institut... 1 of 1 #12;

  1. What level of Internet access does Paducah, Kentucky have? In order to answer this question, I ran a search of ISPs (Internet Service Providers) in the (502) area code

    E-Print Network [OSTI]

    Ehrman, Sheryl H.

    What level of Internet access does Paducah, Kentucky have? In order to answer this question, I ran a search of ISPs (Internet Service Providers) in the (502) area code (the area code which contains Paducah on these search results, I think that the level of Internet access availability in Paducah is equivalent

  2. In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389-405 In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389-405

    E-Print Network [OSTI]

    Tygar, Doug

    In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389-405 #12;In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389-405 #12;In Internet Besieged, eds. D. Denning and P. Denning, ACM Press and Addison-Wesley, 1997, pp. 389

  3. An abridged version of this paper appears in Advances in Cryptology --Crypto '93 Proceedings, SpringerVerlag. This is the full version.

    E-Print Network [OSTI]

    Bellare, Mihir

    and radical idea to get beyond iterative, attack­responsive design of cryptographic protocols: Goldwasser

  4. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01T23:59:59.000Z

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  5. The Diesel Combustion Collaboratory: Combustion Researchers Collaborating over the Internet

    SciTech Connect (OSTI)

    C. M. Pancerella; L. A. Rahn; C. Yang

    2000-02-01T23:59:59.000Z

    The Diesel Combustion Collaborator (DCC) is a pilot project to develop and deploy collaborative technologies to combustion researchers distributed throughout the DOE national laboratories, academia, and industry. The result is a problem-solving environment for combustion research. Researchers collaborate over the Internet using DCC tools, which include: a distributed execution management system for running combustion models on widely distributed computers, including supercomputers; web-accessible data archiving capabilities for sharing graphical experimental or modeling data; electronic notebooks and shared workspaces for facilitating collaboration; visualization of combustion data; and video-conferencing and data-conferencing among researchers at remote sites. Security is a key aspect of the collaborative tools. In many cases, the authors have integrated these tools to allow data, including large combustion data sets, to flow seamlessly, for example, from modeling tools to data archives. In this paper the authors describe the work of a larger collaborative effort to design, implement and deploy the DCC.

  6. 1-4244-1243-9/07/$25.00 2007 IEEE Asking Internet Users to Explain Non-Use in Kyrgyzstan

    E-Print Network [OSTI]

    1-4244-1243-9/07/$25.00 ©2007 IEEE Asking Internet Users to Explain Non-Use in Kyrgyzstan Chad, and specifically Kyrgyzstan, Internet adoption seems to be tapering off well below saturation levels. Survey data picture of how to define Internet use in Kyrgyzstan, and why some people are adopting ICTs and why others

  7. Shear Transformation Zones: State Determined or Protocol Dependent?

    E-Print Network [OSTI]

    Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

    2014-08-18T23:59:59.000Z

    The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

  8. Streaming multimedia over WMSNs: an online multipath routing protocol

    E-Print Network [OSTI]

    Medjiah, Samir; Asgari, Abolghasem Hamid

    2012-01-01T23:59:59.000Z

    Routing is a challenge to Wireless Multimedia Sensor Networks (WMSNs) for supporting multimedia applications due to nodes' energy constraints and computational capabilities, and the ways sensor nodes obtain forwarding information. In this paper, we propose an online multipath routing protocol that uses nodes' positions to make forwarding decisions at each hop. Real-time decisions are made without any need to have the entire network topology knowledge. The protocol achieves load-balancing and minimises nodes' energy consumption by utilizing: (a) smart greedy forwarding scheme for selecting next hop, and (b) walking back forwarding scheme to bypass network holes. Performance comparisons of the proposed protocol (schemes) are made with TPGF and GPSR. The results show that our schemes: (a) maximise the overall network lifespan by not draining energy from some specific nodes, (b) provide QoS delivery for video streams by using best nodes along the route, and (c) scale better in high density WMSN.

  9. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28T23:59:59.000Z

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  10. Protocol development for evaluation of commercial catalytic cracking catalysts

    SciTech Connect (OSTI)

    Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

    1988-09-01T23:59:59.000Z

    A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

  11. Gasoline price up this week (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNatural Gaslong version) The

  12. Gasoline price up this week (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNatural Gaslong version)

  13. Gasoline prices continue to decrease (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNatural Gaslong(long version)

  14. Gasoline prices continue to decrease (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNatural Gaslong(long version)

  15. Gasoline prices continue to fall (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNaturallong version) The

  16. Gasoline prices continue to fall (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNaturallong version)

  17. Gasoline prices continue to fall (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNaturallong version)Gasoline

  18. Gasoline prices continue to fall (long version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNaturallonglong version) The

  19. Gasoline prices continue to fall (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNaturallonglong version)

  20. Gasoline prices continue to fall (short version)

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin:DeploymentSite Name: Email:UraniumNaturallonglong version)short