Powered by Deep Web Technologies
Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information  

Broader source: Energy.gov (indexed) [DOE]

as appropriate. Consider using in solicitations involving M&O as appropriate. Consider using in solicitations involving M&O contracts, management of major facilities, and any acquisition which could involve the direct or indirect purchase of Information Technology equipment that uses Internet Protocol (IP) technology. DOE-H-__ COMPLIANCE WITH INTERNET PROTOCOL VERSION 6 (IPV6) IN ACQUIRING INFORMATION TECHNOLOGY (JULY 2011) This contract involves the acquisition of Information Technology (IT) that uses Internet Protocol (IP) technology. The Contractor agrees that (1) all deliverables that involve IT that uses IP (products, services, software, etc.) comply with IPv6 standards and interoperate with both IPv6 and IPv4 systems and products; and (2) it has IPv6 technical support for fielded product management, development and

2

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network [OSTI]

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

3

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

4

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

5

Reduction-based Security Analysis of Internet Routing Protocols  

E-Print Network [OSTI]

Reduction-based Security Analysis of Internet Routing Protocols Chen Chen, Limin Jia, Boon Thau Loo. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary proofs with automated analysis. We define several reduction steps to reduce proving route authenticity

Pennsylvania, University of

6

SRP: a Scalable Resource Reservation Protocol for the Internet  

E-Print Network [OSTI]

SRP: a Scalable Resource Reservation Protocol for the Internet Werner Almesberger 1 , Tiziana (SRP) provides a light-weight reser- vation mechanism for adaptive multimedia applications. Our main these applications need in order to operate prop- erly. SRP aims to allow such applications to make a dependable

Almesberger, Werner

7

A comparison of the Internet multicast routing protocols  

Science Journals Connector (OSTI)

The exploding Internet has brought many novel network applications. These include teleconferencing, interactive games, the voice/video phone, real-time multimedia playing, distributed computing, web casting, and so on. One of the specific characteristics ... Keywords: Datagrams, Delivery tree, Multicasting routing protocols

Jhyda Lin; Ruay-Shiung Chang

1999-01-01T23:59:59.000Z

8

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network [OSTI]

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

9

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills  

E-Print Network [OSTI]

Internet Time Synchronization: the Network Time Protocol1,2,3 David L. Mills Electrical Engineering is designed to distribute time information in a large, diverse internet system operating at speeds from and resulted in the designation of NTP as an Internet Standard protocol. The NTP synchronization system, which

Mills, David L.

10

Internet Time Synchronization: the Network Time Protocol 1,2,3 David L. Mills  

E-Print Network [OSTI]

the Internet backbone networks and gateways are carefully engineered for good service, op­ erating speedsInternet Time Synchronization: the Network Time Protocol 1,2,3 David L. Mills Electrical), which is designed to distribute time information in a large, diverse internet system operating at speeds

Mills, David L.

11

Design of a PSi header processor for the internet protocol  

E-Print Network [OSTI]

bottleneck is the network transport component, i.e. the network I/O at the end system. To overcome this performance bottleneck, a standard data communication protocol, such as TCP/IP, could be implemented by using hardware to speedup the protocol throughput...

Bai, Jinxia

2012-06-07T23:59:59.000Z

12

Internet Protocol Adoption: Learning from Bitcoin Position Paper  

E-Print Network [OSTI]

This position paper discusses two related questions: 1. Using the framework of network economics, what are success factors behind the adoption of Bitcoin (a cryptographic curreny), and can we copy them for other protocols? 2. Can we design more successful protocols if we have inband payment mechanisms to internalize the externalities that emerge during adoption and in steady state? 1.

Rainer BŲhme; Westfšlische Wilhelms-universitšt MŁnster

13

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An...

14

Expansion of the internet protocol address space with "minor" disruption of current hardware or software  

E-Print Network [OSTI]

Currently, the Internet suite of protocols uses a 32 bit network layer address and requires that each machine have a unique address. The problem: 32 bits only distinguishes 2 32 or 4,294,967,296 machines. Even with four billion addresses, experts...

Wheatley, Philip Stephen

2012-06-07T23:59:59.000Z

15

Voice over Internet Protocol (VoIP) : the dynamics of technology and regulation  

E-Print Network [OSTI]

"What Voice over Internet Protocol (VoIP) is going to do is start to weaken the foundation of the way we've done things for 100 years...Congress already should be discussing the next telecom bill," said Federal Communications ...

Vaishnav, Chintan

2006-01-01T23:59:59.000Z

16

Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico  

E-Print Network [OSTI]

This project-thesis examines the technical requirements of a Voice over Internet Protocol (VoIP) solution and is it advantageous for a Multinational Corporation (MNC) to utilize the Project Management Office (PMO) processes as defined by the Project...

Perez, Mary Louise

2012-08-31T23:59:59.000Z

17

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet System 1,2,3  

E-Print Network [OSTI]

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet describes a series of experiments involving over 100,000 hosts of the Internet system and located in the U and reliability of international standard time distribution using the Internet and the Network Time Protocol (NTP

Mills, David L.

18

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet System1,2,3  

E-Print Network [OSTI]

On the Accuracy and Stability of Clocks Synchronized by the Network Time Protocol in the Internet describes a series of experiments involving over 100,000 hosts of the Internet system and located in the U and reliability of international standard time distribution using the Internet and the Network Time Protocol (NTP

Mills, David L.

19

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

SciTech Connect (OSTI)

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2009-04-29T23:59:59.000Z

20

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

ScienceCinema (OSTI)

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2010-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Commercial Building Energy Asset Score Program Overview and Technical Protocol (Version 1.1)  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE) is developing a voluntary national scoring system for commercial buildings to help building owners and managers assess a buildingís energy-related systems independent of operations. The goal of the score is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system, known as the Commercial Building Energy Asset Score, will allow building owners and managers to compare their building infrastructure against peers and track building upgrades over time. The system will also help other building stakeholders (e.g., building investors, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset scoring tool. The alternative methods that were considered prior to developing the current approach are described in the Program Overview and Technical Protocol Version 1.0.

Wang, Na; Goel, Supriya; Makhmalbaf, Atefe

2013-08-09T23:59:59.000Z

22

A Selective Retransmission Protocol for Multimedia on the Internet Ken French George Oprica  

E-Print Network [OSTI]

all data sent can be lost. Our Selective Retransmission Protocol (SRP) provides a balance between the delay of TCP and the loss of UDP. SRP retransmits only a percentage of the data that was lost, providing.8 1 1.2 1.4 1.6 1.8 2 0 0.5 1 1.5 2 Loss (normalized) Latency(normalized) SRP - ELL SRP - OQ UDP

Claypool, Mark

23

Webinar: Hydrogen Refueling Protocols  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

24

Commercial Building Energy Asset Score System: Program Overview and Technical Protocol (Version 1.0)  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE) is developing a national voluntary energy asset score system that includes an energy asset score tool to help building owners evaluate their buildings with respect to the score system. The goal of the energy asset score system is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system will allow building owners and managers to compare their building infrastructure against peers and track building upgrade progress over time. The system can also help other building stakeholders (e.g., building operators, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from their operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset score tool. This report also describes alternative methods that were considered prior to developing the current approach. Finally, this report describes a few features of the program where alternative approaches are still under evaluation.

Wang, Na; Gorrissen, Willy J.

2013-01-11T23:59:59.000Z

25

The Cisco SRP MAC Layer Protocol  

Science Journals Connector (OSTI)

This document specifies the MAC layer protocol, "Spatial Reuse Protocol" (SRP) for use with ring based media. This is a second version of the protocol (V2).

D. Tsiang; G. Suwala

2000-08-01T23:59:59.000Z

26

Distributed Internet Security and Measurement  

E-Print Network [OSTI]

BGP (the Internet's interdomain routing protocol). It introduces Pretty Good BGP, an anomaly detection#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science Internet Security and Measurement by Josh Karlin ABSTRACT OF DISSERTATION Submitted in Partial Fulfillment

Forrest, Stephanie

27

Proactive techniques for correct and predictable Internet routing  

E-Print Network [OSTI]

The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

Feamster, Nicholas G. (Nicholas Greer), 1979-

2006-01-01T23:59:59.000Z

28

Research challenges towards the Future Internet  

Science Journals Connector (OSTI)

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture ... Keywords: Cognitive networks, Data and communication security, Future internet, Green networking, Internet architecture and protocols, Optical networks, System security, Wireless networks

Marco Conti; Song Chong; Serge Fdida; Weijia Jia; Holger Karl; Ying-Dar Lin; Petri MšhŲnen; Martin Maier; Refik Molva; Steve Uhlig; Moshe Zukerman

2011-12-01T23:59:59.000Z

29

Very large conferences on the Internet: the Internet Multimedia Conferencing Architecture.  

E-Print Network [OSTI]

components still in a nascent stage. 1 Introduction The Internet is not currently very good at carry­ ingVery large conferences on the Internet: the Internet Multimedia Conferencing Architecture. M In this paper we provide an overview of multimedia conferencing on the Internet. The protocols men­ tioned

Handley, Mark

30

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

31

Invited Talk: Mitigating the Effects of Internet Timing Faults  

E-Print Network [OSTI]

Invited Talk: Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways and the Internet. The usual approach to making such a connection is to install a gateway node which translates from Internet protocols to embedded field bus network protocols. Such connections raise obvious security

Koopman, Philip

32

Internet video streaming using 3-D SPIHT  

E-Print Network [OSTI]

several years. Video streaming involves video compression, protocols selection for streaming media, client/receiver buffer management and packet loss recovery. This thesis documents a new Internet video streaming system based on the state-of-the-art 3-D...

Jiang, Jianhong

2012-06-07T23:59:59.000Z

33

Case Study: Interactive Visualization for Internet Security Soon Tee Teoh  

E-Print Network [OSTI]

] to communicate. A good way to un- derstand the behaviors and performance of the Internet is thus to collectCase Study: Interactive Visualization for Internet Security Soon Tee Teoh Kwan-Liu Ma S. Felix Wu North Carolina State University ABSTRACT Internet connectivity is defined by a set of routing protocols

California at Davis, University of

34

Internet Sampler  

E-Print Network [OSTI]

Gnat (gnatkip) wrote, 2006-08-23 16:36:00 Art: Internet Sampler Title: Internet Sampler Media: Excel, Photoshop, Crosstitch.com Caption Maker, alphabet by Carrie's Creations, graphics from Windows, IE, and Firefox Notes: An illustration... the manner of the pioneers. At the top Iíll set my most oft- uttered prayer: Thank you, internet, for letting me observe so many crazy people from a safe distance." Since I first read that line, there have been so many occasions when I've been reminded...

2006-08-23T23:59:59.000Z

35

Internet 0  

E-Print Network [OSTI]

The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

Krikorian, Raffi Chant, 1978-

2004-01-01T23:59:59.000Z

36

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network [OSTI]

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

37

FLIP: an Internetwork Protocol for Supporting Distributed Systems  

E-Print Network [OSTI]

are not well supported by protocols such as TCP/IP, X.25, and OSI TP4. As part of our ongoing research protocol, called FLIP (Fast Local Internet Protocol), is the subject of this paper. Although the ISO OSI a byteÔŅĹstream protocol like TCP or OSI TP4

38

Privacy of encrypted Voice Over Internet Protocol  

E-Print Network [OSTI]

for our experiments. For simplicity, all the words are treated separately i.e. there is a silence period after each word in the sentence. Rhyme 1: \\Betty bought some batter butter. But she found the butter bitter. So she bought some better butter to make... the bitter batter better." Rhyme 2: \\Popeye the sailor man, lived in a garbage can, Ate all the worms and spat out the germs; the best a man can." Rhyme 3: \\My older brother is a pest, He loves to sit in the west, He gets no rest, but pins his chest...

Lella, Tuneesh Kumar

2008-10-10T23:59:59.000Z

39

ďYoung people, adult worriesĒ: RCT of an internet-based self-support method ďFeel the ViBeĒ for children, adolescents and young adults exposed to family violence, a study protocol  

Science Journals Connector (OSTI)

Violence in families affects children. Exposure to violence is seen as child abuse. Figures show that about one third of ... of the current generation have access to the internet, an online intervention will make...

Karin AWL van Rosmalen-Nooijens; Judith B Prins; Marianne VergeerÖ

2013-03-01T23:59:59.000Z

40

Standard version Advanced version  

E-Print Network [OSTI]

: gasoline, jet fuel, and heating oil. The average octane levels must be: Gasoline Jet fuel Heating oil Distilled 2 Naphtha Distill (barrels) 0.25 0.25 0.5 Distilled naphtha can be used only to produce gasoline version Advanced version Margaret Oil - basic (3) Crude Distill Naphtha Gasoline Distilled 1 Jet fuel

Hall, Julian

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Broader source: Energy.gov (indexed) [DOE]

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

42

A Formal Framework for Secure Routing Protocols Wenchao Zhou3  

E-Print Network [OSTI]

verifies its security claims. Existing model-checking-based protocol analysis tools cannot be directlyA Formal Framework for Secure Routing Protocols Chen Chen1 Limin Jia2 Hao Xu1 Cheng Luo1 Wenchao routing protocol, is vulner- able to various attacks. Redesigns of Internet routing infrastructure (e.g. S

Sandholm, Tuomas W.

43

Internet Path-Quality Monitoring inInternet Path-Quality Monitoring in the Presence of Adversaries  

E-Print Network [OSTI]

Site A Performance Routing B l i l d b t lti l th ( ltih d it ) Routers need tools to detectInternet Path-Quality Monitoring inInternet Path-Quality Monitoring in the Presence of Adversaries routed from Alice to Bob via a path of intermediate routers Routing protocols used to set up paths

Goldberg, Sharon

44

APS Protocol for Reporting Construction Vibration Issues for...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the process for...

45

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS  

E-Print Network [OSTI]

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS #12 ASSESSMENT IN THE NETHERLANDS Published VSNU, KNAW and NWO 2009 This document is available through internet: Royal Netherlands Academy of Arts and Sciences (KNAW) The Academy's mission: As the forum, conscience

Franssen, Michael

46

Review: Wireless Internet Handbook  

Science Journals Connector (OSTI)

......Review: Wireless Internet Handbook Reviewed by Harry Agius Wireless Internet Handbook Borko Furht, Mohammad Ilyas...the book. In fairness it does improve after the fifth chapter...Wireless Internet Handbook Borko Furht, Mohammad Ilyas......

Harry Agius

2004-07-01T23:59:59.000Z

47

Dynamic, transparent Internet server replication using HYDRANET  

E-Print Network [OSTI]

) in the Internet. These agents will replicate the transport-level service access points of their origin servers and begin serving clients in the name of the origin server. A new protocol and application API was also developed that manages this service replication...

Dillon, Geoffrey A.

1998-01-01T23:59:59.000Z

48

Studying Black Holes in the Internet with Hubble Ethan Katz-Bassett  

E-Print Network [OSTI]

as a top priority in the original design of the Internet protocols, ahead of high perfor- mance or goodStudying Black Holes in the Internet with Hubble Ethan Katz-Bassett Harsha V. Madhyastha John P that operates contin- uously to find Internet reachability problems in which routes exist to a destination

Anderson, Richard

49

Trends in Internet Marketing.  

E-Print Network [OSTI]

??Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for theÖ (more)

Panchanathan, Nitin

2005-01-01T23:59:59.000Z

50

Internet Topology Benoit Donnet  

E-Print Network [OSTI]

Internet Topology Discovery Benoit Donnet INL Seminar - 06-07/07/2011 1 1 #12;INL Seminar - Internet Topology Discovery 2 2 #12;INL Seminar - Internet Topology Discovery Agenda 3 · Background Probing - MERLIN · Power Law - Problem - L2 vs. L3 · Conclusion 3 #12;INL Seminar - Internet Topology

Bonaventure, Olivier

51

Hydrogen Refueling Protocols Webinar (Text Version) | Department...  

Broader source: Energy.gov (indexed) [DOE]

of fuel cell vehicles. Prior to this, Jesse worked at automakers in both the U.S. and Germany with testing and systems integration responsibilities ranging from conventional...

52

Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis  

Science Journals Connector (OSTI)

......Automated Validation of Internet Security Protocols and...formalisms is natural in a young research area as researchers...Automated Validation of Internet Security Protocols and...used by principal A. By abuse of notation, we also...Mn . We will slightly abuse notation and refer to......

Carlos Caleiro; Luca ViganÚ; David Basin

2005-11-01T23:59:59.000Z

53

ILC-TCP: An Interlayer Collaboration Protocol for TCP Performance Improvement in Mobile and Wireless  

E-Print Network [OSTI]

Internet has led to the optimization of network protocols to provide for a better performance. Most of the Internet traffic uses TCP, the de- facto transport layer protocol. Unfortunately, TCP performance degrades in the mobile and wireless environments. A good amount of research has been attempted to improve its performance

Helal, Abdelsalam

54

TERRORISM TRUMPS INTERNET ACCESS  

Science Journals Connector (OSTI)

TERRORISM TRUMPS INTERNET ACCESS ... The regulation is in response to fears that terrorists will be able to punch into the Internet and gather theoretical accident information that the government requires for environmental purposes. ...

JEFF JOHNSON

2000-07-03T23:59:59.000Z

55

U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow  

Broader source: Energy.gov (indexed) [DOE]

1: Novell GroupWise Internet Agent "Content-Length" Integer 1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September 17, 2012 - 6:00am Addthis PROBLEM: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability PLATFORM: The vulnerability is confirmed in version 8.0.2 HP3 and reported in version 2012. Other versions may also be affected. ABSTRACT: A vulnerability was reported in Novell GroupWise Internet Agent reference LINKS: Novell SecurityTracker Alert ID: 1027536 Secunia Advisory SA50622 CVE-2012-0271 IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted request with the HTTP 'Content-Length' header value of '-1' to the administration interface via

56

ENERGY EFFICIENT INTERNET INFRASTRUCTURE  

E-Print Network [OSTI]

. D R A F T October 27, 2010, 11:34pm D R A F T #12;2 ENERGY EFFICIENT INTERNET INFRASTRUCTURE FigureCHAPTER 1 ENERGY EFFICIENT INTERNET INFRASTRUCTURE Weirong Jiang, Ph.D.1 , and Viktor K. Prasanna]. In other words, an IP address may match multiple prefixes, but only the longest D R A F T October 27, 2010

Prasanna, Viktor K.

57

Internet Performance Measurement Collaborators  

E-Print Network [OSTI]

Internet Performance Measurement Collaborators Cross Industry Working Team (XIWT) High Performance of the timestamp mechanism in the ANS Surveyor Probe device FY98 · GITS Internet Performance Measurement Toolkit developed FY99 · GITS measurement systems deployed in the field FY00 Goal To advance the state of the art

58

Towards Securing Interdomain Routing on the Internet Sharon Goldberg  

E-Print Network [OSTI]

up by the routing protocols. 1. We start with a game-theoretic analysis that shows that evenTowards Securing Interdomain Routing on the Internet Sharon Goldberg A Dissertation Presented economic goals. Despite these complex relationships, the interdomain routing system (that allows ASes

Singh, Jaswinder Pal

59

Internet, a Political Issue for Europe (1970s-2010s)  

E-Print Network [OSTI]

Internet, a Political Issue for Europe (1970s-2010s) Draft paper The final version of this paper will be published in Bishop J. & Solo A.M.G, Politics and Policy in the Information Age, Springer, in 2013. Romain in Europe? How did the "network of networks" and ICTs become political stakes for EU institutions

Paris-Sud XI, Université de

60

Sustainable Internet Architecture PROJECT DESCRIPTION  

E-Print Network [OSTI]

Sustainable Internet Architecture PROJECT DESCRIPTION 1 Introduction The Internet currently plays that the problems in the current Internet architecture stem from its lack of sustainability which impedes future de of challenges. Numerous research studies on a new Internet architecture (e.g., [16, 37, 48, 54, 55]) have

Kuzmanovic, Aleksandar

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Internet Users' Glossary  

Science Journals Connector (OSTI)

There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them.

G. Malkin

1996-08-01T23:59:59.000Z

62

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

63

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

64

Response Protocol Distressed Students  

E-Print Network [OSTI]

Response Protocol Distressed Students REFERRAL IDENTIFIERS: Student distress may manifest, the Distressed Student Protocol will assist you in responding to the student and providing appropriate referrals

California at Santa Barbara, University of

65

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic  

E-Print Network [OSTI]

Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic to ensure connectivity of the mobile nodes with the Internet. However, there has been no comprehensive cost analysis of mobility protocol entities that considers all possible costs. In this paper, we have developed

Atiquzzaman, Mohammed

66

On Runtime Adaptation of Application-Layer Multicast Protocol  

E-Print Network [OSTI]

¨ubsch, Christoph P. Mayer, and Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology (KIT), Germany {huebsch,mayer,waldhorst}@kit.edu Reasonable choice of protocol parameters is crucial., a clean implementation of multicast communication within the Internet architecture has been proposed

Paris-Sud XI, Université de

67

Integrated Internet collaboration  

Science Journals Connector (OSTI)

...e-commerce, Intranet, remote collaboration...and other new technologies. They should be...being realized. Technologies, such as INSP...Internet and intranet computing allows...e-commerce, Intranet, remote collaboration...and other new technologies. They should be...

Dimitri Bevc; Alexander M. Popovici

68

Service Oriented Internet Jaideep Chandrashekar  

E-Print Network [OSTI]

propose a novel, overlay based Service Oriented Internet architecture that is meant to serve as a flexible elsewhere. In this paper, we describe a new architecture -- the "Service Oriented Internet" or SOI, whichService Oriented Internet Jaideep Chandrashekar ¬° , Zhi-Li Zhang ¬° , Zhenhai Duan ¬° , and Y

Duan, Zhenhai

69

Internet-Enabled Supply ChainsInternet-Enabled Supply Chains Quan Z. Sheng, University of Adelaide  

E-Print Network [OSTI]

89 Internet-Enabled Supply ChainsInternet-Enabled Supply Chains Quan Z. Sheng, University of the Internet-enabled Supply Chain 89 Key Supply Chain Processes and the Internet 89 Impacts of Internet-Enabled Supply Chains 92 Enabling Technologies for Internet-Enabled Supply Chain Management 92 Internet-based EDI

Sheng, Michael

70

Application Protocol Reference Architecture Application Protocol Reference Architecture  

E-Print Network [OSTI]

Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

van Sinderen, Marten

71

Diploma in Management Internet Business concentration  

E-Print Network [OSTI]

, telecommunications, the internet and the Web as well as a good understanding of consumer behaviour. Our internet1 Diploma in Management Internet Business concentration Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part

Pientka, Brigitte

72

1. The Internet 1-1 Chapter 1: The Internet  

E-Print Network [OSTI]

1. The Internet 1-1 Chapter 1: The Internet References: · Rainer Klute: Das World Wide Web. Addison with TCP/IP. Prentice Hall, 1988, ISBN 0134701887. · W. Richard Stevens: TCP Illustrated, Vol. 1. Addison-Wesley, 1994, ISBN 0201633469. · W. Richard Stevens: UNIX Network Programming, Vol. 1, 2nd Ed. Prentice Hall

Brass, Stefan

73

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.gov/upload/noticeoog.jsp" Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "MONTHLY NATURAL GAS MARKETER SURVEY" "FORM EIA-910" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

74

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "MONTHLY UNDERGROUND GAS STORAGE REPORT" "FORM EIA-191" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

75

Characterizing internet scams through underground infrastructure infiltration  

E-Print Network [OSTI]

the symp- toms of abuse on the Internet. Through interposingInternet as a medium for communication and commerce has attracted many actors who abuseAbuse Working Group (MAAWG) in 2009, estimate that 29% and 12%, respectively, of Internet

Kanich, Christopher William

2012-01-01T23:59:59.000Z

76

Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet  

E-Print Network [OSTI]

Energy-Efficient Transmission for Multimedia Streams in Last-hop Wireless Internet Invited Paper characteristics that can be leveraged to design energy-efficient loss recovery mechanisms. Given their loss, we first present an analysis of an energy-efficient MAC-layer protocol, called Fast Transmit MAC

Kravets, Robin

77

Stream Control Transmission Protocol  

Science Journals Connector (OSTI)

This document describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.

R. Stewart; Q. Xie; K. Morneault; C. Sharp; H. Schwarzbauer; T. Taylor; I. Rytina; M. Kalla; L. Zhang; V. Paxson

2000-10-01T23:59:59.000Z

78

Asymmetric responses, risk seeking and internet bubble  

Science Journals Connector (OSTI)

We measure internet bubbles to verify the existence and evaporation of the internet bubble in early 2000. Then, we compare investor responses to internet stocks with those to traditional stocks to find how the internet bubble formed. Empirical results confirm that the internet bubble existed between 1998 and 1999, but began to evaporate in early 2000. Further, we find that the internet bubble formed due to investors' irrational overreaction to internet firms' positive outlooks and underreaction to internet firms' negative outlooks relative to their reactions to traditional firms. This finding supports our hypotheses that asset bubbles formed due to investors' extreme risk-seeking asymmetric responses to good and bad information.

Jaehan Koh; Bin Wang; Lai C. Liu; Kai S. Koong

2010-01-01T23:59:59.000Z

79

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

80

Office Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Services ¬Ľ Oversight ¬Ľ Safety & Emergency Management Evaluations Services ¬Ľ Oversight ¬Ľ Safety & Emergency Management Evaluations ¬Ľ Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

SPTP: A Trust Management Protocol for Online and Ubiquitous Systems  

Science Journals Connector (OSTI)

With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, ... Keywords: Privacy Framework, SPT, Security, Trust Management, Trust and Privacy Protocol, Cloud, Collective Intelligence, mHealth, Ubiquitous Computing, Mobile Computing, Online Advertising Privacy

Ivor D. Addo, Ji-Jiang Yang, Sheikh I. Ahamed

2014-07-01T23:59:59.000Z

82

Response Protocol Distressed Students  

E-Print Network [OSTI]

Response Protocol Distressed Students REFERRAL IDENTIFIERS: Student distress may manifest, the Distressed Student Protocol will assist you in responding to the student and providing appropriate referrals not know which office to contact.The coordinators will consult about a student, provide referrals to campus

California at Santa Barbara, University of

83

Internet Engineering Task Force S. Floyd INTERNET-DRAFT E. Kohler  

E-Print Network [OSTI]

Internet Engineering Task Force S. Floyd INTERNET-DRAFT E. Kohler Intended status: Informational draft-irtf-tmrg-tools-05.txt Status of this Memo By submitting this Internet-Draft, each author 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas

Floyd, Sally

84

Graduate Certificate in Internet Business Looking for a Career in Internet Business?  

E-Print Network [OSTI]

, telecommunications, the internet and the Web as well as a good understanding of consumer behaviour. Our internet1 Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part

Pientka, Brigitte

85

Internet Engineering Task Force INTERNET-DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force INTERNET-DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne draft Status of this Memo This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also

Lennox, Jonathan

86

Substance abuse precedes internet addiction  

Science Journals Connector (OSTI)

Abstract The purpose of the current study was to evaluate possible overlapping substance abuse and internet addiction in a large, uniformly sampled population, ranging in age from 13 to 18†years. Participants (N†=†73,238) in the current study were drawn from the 6th Korea Youth Risk Behavior Web-based Survey (KYRBWS-V) for students from 400 middle schools and 400 high schools in 16 cities within South Korea. Of adolescent internet users, 85.2% were general users (GU), 11.9% were users with potential risk for internet addiction (PR), and 3.0% were users with high risk for internet addiction (HR). There was a difference in the number of students with alcohol drinking among the GU, PR, and HR groups (20.8% vs 23.1% vs 27.4%). There was a difference in the number of students who smoked among the GS, PR, and HR groups (11.7% vs 13.5% vs 20.4%). There was a difference in the number of students with drug use among the GU, PR, and HR groups (1.7% vs 2.0% vs 6.5%). After adjusting for sex, age, stress, depressed mood, and suicidal ideation, smoking may predict a high risk for internet addiction (OR†=†1.203, p†=†0.004). In addition, drug use may predict a high risk for internet addiction (OR†=†2.591, p†internet addiction have vulnerability for addictive behaviors, co-morbid substance abuse should be evaluated and, if found, treated in adolescents with internet addiction.

Young Sik Lee; Doug Hyun Han; Sun Mi Kim; Perry F. Renshaw

2013-01-01T23:59:59.000Z

87

Using Gopher on the Internet  

SciTech Connect (OSTI)

This report is a complication of vugraphs with respect to the use of Gopher on Internet. There are viewgraphs on using Gopher at the University of California at Santa Cruz. Examples of other Internet Gopher servers around the world are given. Also discussed is the Library of Congress Gopher and JUGHEAD which is an acronym for Jonzy`s Universal Gopher Hierarchy Excavation And Display.

Davidoff, G.

1994-04-01T23:59:59.000Z

88

Office Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012...

89

ARM - Kim Nitschke Interview (English Version)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Outreach Backgrounders English Version (PDF, 363K) Portuguese Version (PDF, 327K) AMF Posters, 2009 English Version Portuguese Version Education Flyers English Version Portuguese...

90

SCADA protocol vulnerabilities  

Science Journals Connector (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

91

Protocol design contests  

E-Print Network [OSTI]

In fields like data mining and natural language processing, design contests have been successfully used to advance the state of the art. Such contests offer an opportunity to bring the excitement and challenges of protocol ...

Winstein, Keith

92

Optimal protocols for nonlocality distillation  

SciTech Connect (OSTI)

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

93

Alexithymia and internet abuse in young adults  

Science Journals Connector (OSTI)

Problematic internet use has become a growing concern in recent years due to expanded access and dependence on the internet. This study examined the relationship between alexithymia and internet abuse in a sample of young adults (165 males and 650 females). Participants completed the Internet Addiction Test (IAT) and the TAS-20. The alexithymic group (n†=†105) scored significantly higher than the non-alexithymic group (n†=†532) on all of the IAT scales: withdrawal scale, F(1,632)†=†31.21, p†internet abuse and emphasize the need to address these underlying vulnerabilities when treating internet abuse.

R.N. Taylor; R. Koerber; J.D.A. Parker; S.B. Maitland

2014-01-01T23:59:59.000Z

94

Efficient Data Transfer Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ‚ąó , Ezra Kissel ‚Ć , Martin Swany ‚Ć , Eric Pouyoul ‚ąó ‚ąó Lawrence Berkeley National Laboratory, Berkeley, CA 94270 ‚Ć School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

95

APS Protocol for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

96

A Handy Internet Politics Measurement Note Internet Politcs Measurement Measurement and analysis on the Internet politics through  

E-Print Network [OSTI]

A Handy Internet Politics Measurement Note Internet Politcs Measurement ­ Measurement and analysis on the Internet politics through case studies on (i) well-known but failed technical ideas in history, (ii........................................................................................................4 Abuse of Censorship-free Speech, "Human Search Engine" (China) ...............................4

Kuzmanovic, Aleksandar

97

MDF Overview (Text Version)  

Broader source: Energy.gov [DOE]

This is a text version of the Manufacturing Demonstration Facilities (MDF) overview video, originally presented on March 12, 2012 at the MDF Workshop held in Chicago, Illinois.

98

IES version 2013  

Broader source: Energy.gov [DOE]

IES version 2013 Tax Deduction Qualified Software calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

99

Public Health Policy For Internet Cigarette Retailers  

E-Print Network [OSTI]

Internet cigarette retailers to avoid local cigarette prices); see also National Household Survey on Drug Abuse,Internet cigarette retailers to avoid local cigarette prices); see also National Household Survey on Drug Abuse,

Banthin, Christopher

2005-01-01T23:59:59.000Z

100

Finite-key-size security of the Phoenix-Barnett-Chefles 2000 quantum-key-distribution protocol  

Science Journals Connector (OSTI)

The postselection technique was introduced by Christandl, KŲnig, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] in order to simplify the security of quantum-key-distribution schemes. Here, we present how it can be applied to study the security of the Phoenix-Barnett-Chefles 2000 trine-state protocol, a symmetric version of the Bennett 1992 protocol.

Mhlambululi Mafu, Kevin Garapo, and Francesco Petruccione

2014-09-08T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

The Evolution of International Internet Telephony  

E-Print Network [OSTI]

International Internet Telephony has been evolving since its introduction in 1996. In 1996, the typical player was

McGarty, Terrence

102

Internet Engineering Task Force Individual Submission INTERNET-DRAFT J. Lennox, J. Rosenberg, H. Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force Individual Submission INTERNET-DRAFT J. Lennox, J. Rosenberg, H Gateway Interface for SIP Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

103

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation  

E-Print Network [OSTI]

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation Louis Saint Louis, MO 63130 jain@cse.wustl.edu Abstract-- The basic ideas of the Internet architecture switching. Is this the way we would design the Internet if we were to start it now? This paper is an attempt

Jain, Raj

104

Research and the Internet connection  

Science Journals Connector (OSTI)

... to cut funding for fusion research by a third. The Princeton Plasma Physics Laboratory (PPPL) says that the loss of one quarter of its staff means that collaboration with ... means that collaboration with researchers at other universities over the Internet has become "essential". PPPL recently began transmitting sound and video from the control room of its Tokamak Fusion Test ...

Declan Butler

1996-04-04T23:59:59.000Z

105

Internet Data logging and Display  

E-Print Network [OSTI]

. The solution presented here is to accomplish these goals is to include a miniature web server in a remote-logging module, which we designed as part of our device. Thus allowing data to be accessed more frequently, via the Internet. As it currently stands...

Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

2001-01-01T23:59:59.000Z

106

Timekeeping in the Interplanetary Internet  

E-Print Network [OSTI]

vehicles, retrieve data for later transmission to Earth · Spacecraft ­ transport orbiters and surface, network routing, ephemeris maintenance and general timekeeping #12;2-Aug-04 3 IPIN issues o Transmission Transmission speeds are highly variable, but in general far slower than Earth internet o Spacecraft position

Mills, David L.

107

Measuring Internet Performance: Challenges and Opportunities  

E-Print Network [OSTI]

Measuring Internet Performance: Challenges and Opportunities Rocky K. C. Chang Internet;Internet Infrastructure and Security Laboratory 2 #12;Measuring end-to-end performance · Source: Akamai's network performance comparison 3 #12;End-to-end network monitoring ... 4 #12;Why measuring network path

Chang, Rocky Kow-Chuen

108

The End of Internet Architecture Timothy Roscoe  

E-Print Network [OSTI]

back and asks a more radical question: is an internet ar- chitecture a good thing at all? Are weThe End of Internet Architecture Timothy Roscoe National ICT Australia, Sydney Intel Research have seen considerable publishing activ- ity in the area of "internet architecture". This paper steps

Roscoe, Timothy

109

Applying Quantitative Marketing Techniques to the Internet  

E-Print Network [OSTI]

. Blattberg and Deighton [1991] laid out a good framework for Internet marketing in their articleApplying Quantitative Marketing Techniques to the Internet by Alan L. Montgomery Carnegie Mellon with clickstream data. I illustrate these four modeling techniques and discuss their potential for solving Internet

Faloutsos, Christos

110

Modeling Internet Topology Dynamics Hamed Haddadi  

E-Print Network [OSTI]

graphs. Generation of the topology of the Internet calls for a model that achieves a good balance betweenModeling Internet Topology Dynamics Hamed Haddadi University College London Steve Uhlig Delft and inference, there still exists ambiguity about the real nature of the Internet AS and router level topol- ogy

Haddadi, Hamed

111

EVALUATION OF EVIDENCE IN INTERNET AUCTION  

E-Print Network [OSTI]

allegations about the sale of counterfeit goods at Internet auction sites. Also, it applies a Bayesian- livering the goods that are offered for sale. As a result, Internet auction fraud is the most common type of Internet auction fraud in Hong Kong related to the sale of counterfeit goods (i.e., goods bear- ing false

Overill, Richard E.

112

Future Internet Infrastructures for FI Prototyping  

E-Print Network [OSTI]

++ Fraunhofer Institute FOKUS, Berlin ++ www.fokus.fraunhofer.de/go/innovation ++ 11¬≠2009 #12;Future Internet Berlin AV de- partment (Architektur f√ľr Vermittlungskno- ten). Part of the Fraunhofer innovation clusFuture Internet Infrastructures for FI Prototyping NGN Evolution toward Future Internet Fraunhofer

Wichmann, Felix

113

MAPS MANUAL 2010 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2010 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

114

MAPS MANUAL 2014 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2014 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

115

MAPS MANUAL 2008 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2008 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Jim Saracco

DeSante, David F.

116

MAPS MANUAL 2013 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2013 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

117

MAPS MANUAL 2011 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2011 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

118

MAPS MANUAL 2012 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2012 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

119

RadNet: Open network protocol for radiation data  

SciTech Connect (OSTI)

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

120

Why We Don't Know How To Simulate The Internet Sally Floyd and Vern Paxson \\Lambda  

E-Print Network [OSTI]

the global Internet data network behaves is an immensely challenging undertaking because of the network simulator (x8). \\Lambda This work was supported by the Director, Office of Energy Research, Office of the United States Department of Energy under Contract No. DE­AC03­76SF00098, and by ACIRI. An earlier version

Floyd, Sally

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Supplement No. 2 to the FUSRAP Summary Protocol Ė Verification and Certification Protocol  

Broader source: Energy.gov [DOE]

Supplement No. 2 to the FUSRAP Summary Protocol Ė Verification and Certification Protocol (November 1985, Rev. 1)

122

Version pressure feedback mechanisms for speculative versioning caches  

DOE Patents [OSTI]

Mechanisms are provided for controlling version pressure on a speculative versioning cache. Raw version pressure data is collected based on one or more threads accessing cache lines of the speculative versioning cache. One or more statistical measures of version pressure are generated based on the collected raw version pressure data. A determination is made as to whether one or more modifications to an operation of a data processing system are to be performed based on the one or more statistical measures of version pressure, the one or more modifications affecting version pressure exerted on the speculative versioning cache. An operation of the data processing system is modified based on the one or more determined modifications, in response to a determination that one or more modifications to the operation of the data processing system are to be performed, to affect the version pressure exerted on the speculative versioning cache.

Eichenberger, Alexandre E.; Gara, Alan; O'Brien, Kathryn M.; Ohmacht, Martin; Zhuang, Xiaotong

2013-03-12T23:59:59.000Z

123

Extremal quantum protocols  

E-Print Network [OSTI]

Generalized quantum instruments correspond to measurements where the input and output are either states or more generally quantum circuits. These measurements describe any quantum protocol including games, communications, and algorithms. The set of generalized quantum instruments with a given input and output structure is a convex set. Here we investigate the extremal points of this set for the case of finite dimensional quantum systems and generalized instruments with finitely many outcomes. We derive algebraic necessary and sufficient conditions for extremality.

Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-01-25T23:59:59.000Z

124

SHMTools, Version 0.1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SHMTools, Version 0.1 SHMTools, Version 0.1 SHMTools is a MATLAB package that facilitates the construction of structural health monitoring (SHM) processes. September 24, 2013...

125

Communication complexity protocols for qutrits  

SciTech Connect (OSTI)

Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

Tamir, Boaz [Department of History and Philosophy of Science, Bar-Ilan University, Ramat-Gan (Israel)

2007-03-15T23:59:59.000Z

126

Network Markup Language Base Schema version 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

GFD-R-P.206 GFD-R-P.206 NML-WG nml-wg@ogf.org Jeroen van der Ham, UvA (editor) Freek Dijkstra, SURFsara Roman ŇĀapacz, PSNC Jason Zurawski, Internet2 May 2013 Network Markup Language Base Schema version 1 Status of This Document Grid Final Draft (GFD), Proposed Recommendation (R-P). Copyright Notice Copyright c Open Grid Forum (2008-2013). Some Rights Reserved. Distribution is unlim- ited. Abstract This document describes a set of normative schemas which allow the description of computer network topologies. Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1 Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3 Notational Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

127

Architecture for a TCP/IP Based Robotic Protocol JOSHUA D. JACKSON, DALE W. CALLAHAN, DONALD S. APPLEBY,  

E-Print Network [OSTI]

scripts [3]. The PUMA paint robot allowed the remote user to be an artist from afar [1]. Many otherArchitecture for a TCP/IP Based Robotic Protocol JOSHUA D. JACKSON, DALE W. CALLAHAN, DONALD S@askdrcallahan.com www.uab.edu Abstract: Robotic Systems will soon be prevalent parts of the Internet and will allow

Callahan, Dale W.

128

Energy Efficiency Savings Protocols | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

129

EPICS Version 4 - Implementing Complex Data Types  

SciTech Connect (OSTI)

Through phase 1 and phase 2 SBIR grants, s fully functional I/O Controller and communication protocol for version 4 of EPICS is completed. This new software architecture provides a flexible and extendible architecture. Version 4 is implemented fully in Java. The performance metrics look promising. The final portion of phase 2 is to optimize the communication mechanisms. Subsequent work on different aspects of this are required to provide a viable solutions in various areas. Version 3 of EPICS is able to provide a platform for implementing channel based control, because the channel and attributes for time stamping, alarm, display and control were narrow, well defined, and complete. To extend EPICS functionality beyond this, it is necessary to define attributes needed for archive data, array, image data, and directory services. The proper handling of several array types enables the development of middle layer servers such as orbit and bump control in accelerators. Phase 1 should produce a well defined, reviewed, and agreed upon definition of the metadata required for these services. A Phase 2 grant would provide tools that implemented archiving, general array, imaging, and directory applications.

Marty Kraimer,; John dalesio

2012-11-27T23:59:59.000Z

130

internet of things | OpenEI Community  

Open Energy Info (EERE)

internet of things Home No Battery Wearables Description: Wearable IT and communication devices that don't require a battery. This group is for discussion about innovations in...

131

Traditional marketing vs. Internet marketing. A comparison.  

E-Print Network [OSTI]

?? Title: Traditional marketing vs. Internet marketing: A comparison Problem: Marketing is an important strategy for businesses and it contains numerous effective tools. Traditional marketingÖ (more)

Varfan, Mona

2008-01-01T23:59:59.000Z

132

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

133

Diploma in Internet Business Technology 1 McGill University  

E-Print Network [OSTI]

of programming, databases, networks, telecommunications, the internet and the Web as well as a good understandingDiploma in Internet Business Technology 1 McGill University Diploma in Internet Business Technology Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have

Pientka, Brigitte

134

Confessions of an Internet alautun, Maya glyph  

E-Print Network [OSTI]

Confessions of an Internet Timekeeper alautun, Maya glyph David L. Mills University of Delaware http://www.eecis.udel.edu/~mills mailto:mills@udel.edu 14-Feb-07 1 #12;On the Internet cultural algorithms, timekeeping and growing pains. ­ Along the way I developed an obsession to wind every computer

Mills, David L.

135

The Internet of Things: A survey  

Science Journals Connector (OSTI)

This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, ... Keywords: Internet of Things, Pervasive computing, RFID systems

Luigi Atzori; Antonio Iera; Giacomo Morabito

2010-10-01T23:59:59.000Z

136

Modeling the World from Internet Photo Collections  

Science Journals Connector (OSTI)

There are billions of photographs on the Internet, comprising the largest and most diverse photo collection ever assembled. How can computer vision researchers exploit this imagery? This paper explores this question from the standpoint of 3D scene modeling ... Keywords: 3D navigation, 3D scene analysis, Internet imagery, Photo browsers, Structure from motion

Noah Snavely; Steven M. Seitz; Richard Szeliski

2008-11-01T23:59:59.000Z

137

Page 1 of 4 Housing Internet Services  

E-Print Network [OSTI]

of Technology #12;Page 2 of 4 Introduction to Curtin Internet Services Internet services from Housing Guide). Access to the Curtin INTRANET (Curtin web pages remains free) Choose an alternative external is provided in setting up your account or choosing an ISP. Access to the Curtin INTRANET (Curtin web pages

138

An Intermittent Energy Internet Architecture Barath Raghavan  

E-Print Network [OSTI]

's energy infrastructure and will likely include significant de- ployment of intermittent renewable energyAn Intermittent Energy Internet Architecture Barath Raghavan ICSI David Irwin UMass Jeannie-design the Internet for an energy- constrained future powered by diffuse, intermittent, and expensive power sources

Shenoy, Prashant

139

A Collaborative Clinical Trial Protocol Writing System Chunhua Weng M.S.1  

E-Print Network [OSTI]

coordination, or version control. Second, their interfaces are often driven by rigorous comput- able models present a web-based protocol writing sys- tem with integrated support for collaborative reviewing approach to provide a structured document model or reusable text to facili- tate knowledge reuse

Yetisgen-Yildiz, Meliha

140

Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption  

E-Print Network [OSTI]

protocols in which the parties are allowed to use ideal functionalities as well as a set of powerful on the other hand this abstraction may make us "forget" about issues that make an attack possible. One solution version. Or, in other words, that intuitively the symbolic adversary is as powerful as the computational

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote...  

Broader source: Energy.gov (indexed) [DOE]

26: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability...

142

Unraveling Internet identities : accountability & anonymity at the application layer  

E-Print Network [OSTI]

Both anonymity and accountability play crucial roles in sustaining the Internet's functionality, however there is a common misconception that increasing the anonymity of Internet identities necessitates diminishing their ...

Wolff, Josephine Charlotte Paulina

2012-01-01T23:59:59.000Z

143

V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2: Cisco ASA Software TFTP Protocol Inspection Denial of 2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - 4:00am Addthis PROBLEM: A vulnerability has been reported in Cisco ASA Software, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x, Cisco Adaptive Security Appliance (ASA) 9.x, Cisco ASA 5500-X Series Adaptive Security Appliances ABSTRACT: The vulnerability is reported in versions 8.4(5.7), 8.4(6), 9.0(2.3), 9.1(1.5), and 9.1(2.1). Other versions may also be affected. REFERENCE LINKS: Secunia Advisory SA54699 CVE-2013-3463 Cisco (CSCuh13899) IMPACT ASSESSMENT: Low DISCUSSION: A vulnerability has been reported in Cisco ASA Software, which can be

144

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

145

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

146

Assessing Energy Resources Webinar Text Version | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Text Version Assessing Energy Resources Webinar Text Version Download the text version of the audio from the DOE Office of Indian Energy webinar on assessing energy resources. DOE...

147

Life Validation Testing Protocol Development | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Validation Testing Protocol Development Life Validation Testing Protocol Development Presentation from the U.S. DOE Office of Vehicle Technologies "Mega" Merit Review 2008 on...

148

Building internet trust: signalling through trustmarks  

Science Journals Connector (OSTI)

Consumers' concerns about privacy, security, and control of personal information highlight the importance of trust in building marketing relationships in the computer-mediated environment. Internet firms have begun posting third-party certifications, labelled ‚??trustmarks‚?Ě, as signals of reliability, credibility, and general trustworthiness. This paper integrates the literatures on signalling theory and trust, and makes extensions to the internet. It identifies and categorises sets of internet signals, highlighting the critical role of trustmarks in the computer-mediated environment. It develops a series of propositions related to the effectiveness of trustmarks, including variables such as source and culture. Lastly, it provides direction for future research.

K. Damon Aiken; Ben S. Liu; Robert D. Mackoy; Gregory E. Osland

2004-01-01T23:59:59.000Z

149

A version of this paper appeared in COMPCON 1993. The Midway Distributed Shared Memory System  

E-Print Network [OSTI]

A version of this paper appeared in COMPCON 1993. The Midway Distributed Shared Memory System Brian and per­ formance of Midway, a programming system for a dis­ tributed shared memory multicomputer (DSM pos­ sible higher performance implementations of the un­ derlying consistency protocols. Midway

150

Former Worker Program Medical Protocol  

Broader source: Energy.gov [DOE]

The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which there are screening tests that are reasonably likely to be effective and beneficial to program participants.

151

Superior Energy Performance Certification Protocol  

Broader source: Energy.gov [DOE]

The Superior Energy Performanceģ (SEPô) Certification Protocol describes the purpose of the SEP program and defines the steps required for participationófrom initial application through certification by an ANSI-ANAB accredited Verification Body.

152

Internet growth: Myth and reality, use and abuse Andrew Odlyzko  

E-Print Network [OSTI]

Internet growth: Myth and reality, use and abuse Andrew Odlyzko AT&T Labs ¬≠ Research amo@research.att.com http://www.research.att.com/¬łamo Abstract Actual Internet traffic growth rates of 100 percent per year to Internet growth claim astronomical rates of increase; the usual phrase is that ``Internet traffic

Odlyzko, Andrew M.

153

Internet growth: Myth and reality, use and abuse Andrew Odlyzko  

E-Print Network [OSTI]

Internet growth: Myth and reality, use and abuse Andrew Odlyzko AT&T Labs - Research amo@research.att.com http://www.research.att.com/ amo Abstract Actual Internet traffic growth rates of 100 percent per year to Internet growth claim astronomical rates of increase; the usual phrase is that "Internet traffic

Odlyzko, Andrew M.

154

Towards an Energy-Efficient Internet  

Science Journals Connector (OSTI)

Global telecommunications consume a small but growing fraction of the worldís electricity supply. We examine the key contributors to energy consumption in the Internet and examine some...

Tucker, Rodney S

155

INTERNET-DRAFT draft-goyal-diffserv-afstdy-00 February 2000 Internet Engineering Task Force Mukul Goyal  

E-Print Network [OSTI]

INTERNET-DRAFT draft-goyal-diffserv-afstdy-00 February 2000 Internet Engineering Task Force Mukul Goyal Internet Draft Arian Durresi Expires: August 2000 Raj Jain Chunlei Liu The Ohio State University February 2000 Performance Analysis of Assured Forwarding Status of Memo This document is an Internet

Jain, Raj

156

PVWatts Version 5 Manual  

SciTech Connect (OSTI)

The NREL PVWatts calculator is a web application developed by the National Renewable Energy Laboratory (NREL) that estimates the electricity production of a grid-connected photovoltaic system based on a few simple inputs. PVWatts combines a number of sub-models to predict overall system performance, and makes includes several built-in parameters that are hidden from the user. This technical reference describes the sub-models, documents assumptions and hidden parameters, and explains the sequence of calculations that yield the final system performance estimate. This reference is applicable to the significantly revised version of PVWatts released by NREL in 2014.

Dobos, A. P.

2014-09-01T23:59:59.000Z

157

Summary Protocol: Identification, Characterization, Designation, Remedial  

Broader source: Energy.gov (indexed) [DOE]

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

158

Building Technologies Office: House Simulation Protocols Report  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

159

Internet Engineering Task Force Individual Submission INTERNET-DRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

-lennox-sip-reg-payload-01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

160

Internet-based supply chain management: using the Internet to revolutionize your business  

Science Journals Connector (OSTI)

The Internet has emerged in the recent past as a dynamic medium for channeling transactions between customers and firms in virtual marketplace. In particular, the World Wide Web has emerged as a powerful new channel for supply chain, rendering many intermediaries ... Keywords: Business-to-business, Internet, Supply chain, Supply chain management

Zillur Rahman

2003-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

,,,"Version No.: 2015.01" "WEEKLY UNDERGROUND NATURAL GAS STORAGE REPORT" "FORM EIA-912" "This report is mandatory under the Federal Energy...

162

Influences, usage, and outcomes of Internet health information searching: Multivariate results from the Pew surveys  

E-Print Network [OSTI]

INFLUENCES, USAGE, AND OUTCOMES OF INTERNET HEALTHR.E. (2006). Influences, usage, and outcomes of InternetSeeking, p-3 INFLUENCES, USAGE, AND OUTCOMES OF INTERNET

Rice, Ronald E

2006-01-01T23:59:59.000Z

163

Cryptography and the Internet: lessons and challenges  

SciTech Connect (OSTI)

The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising new questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.

McCurley, K.S.

1996-12-31T23:59:59.000Z

164

UCSB Distressed Students Response Protocol  

E-Print Network [OSTI]

about a student, provide referrals to campus departments, develop action plans, and follow up academic or personal issues REFERRAL IDENTIFIERS: Student distress may manifest in behavior Student Protocol will assist you in responding to the student and providing appropriate referrals. Student

California at Santa Barbara, University of

165

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

166

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

167

Membrane and MEA Accelerated Stress Test Protocols | Department...  

Broader source: Energy.gov (indexed) [DOE]

Membrane and MEA Accelerated Stress Test Protocols Membrane and MEA Accelerated Stress Test Protocols This presentation on fuel cell membrane and MEA stress test protocols was...

168

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

169

A text mining approach to Internet abuse detection  

Science Journals Connector (OSTI)

Many organizations have started to fight Internet abuse by setting up Internet usage policies (Siau et al. 2002), conducting management training (Young and Case 2004), and monitoring and blocking employeesí abuse

Chen-Huei Chou; Atish P. SinhaÖ

2008-09-01T23:59:59.000Z

170

Ghost at the machine : Internet addiction and compulsive computer use  

E-Print Network [OSTI]

Technology use-particularly the use of the Internet-is a pervasive component of modem society. The Internet has changed the way we work and the way we play, creating new possibilities for self expression and communication. ...

VanCott, Rachel Diane

2008-01-01T23:59:59.000Z

171

The internet as a source of drugs of abuse  

Science Journals Connector (OSTI)

The Internet is a vital medium for communication, entertainment ... to the many positive functions served by the Internet, it also has been used to facilitate ... and then actually sellócontrolled substances over...

Robert F. Forman PhD; Douglas B. Marlowe JD; PhDÖ

2006-01-01T23:59:59.000Z

172

Assessing mathematics automatically using computer algebra and the internet  

Science Journals Connector (OSTI)

......against the most obvious forms of student abuse exist within the system. Students are...evaluation of students' work over the internet provides the pragmatic educator with significant...Algebraic Computation (ISSAC2002), Internet Accessible Mathematical Computation 2002......

Chris Sangwin

2004-03-01T23:59:59.000Z

173

Economics of advertising: Emerging functions of Internet advertising  

Science Journals Connector (OSTI)

This paper intends to highlight the emerging force of the Internet as an advertising medium. The economic functions of Internet advertising are examined. Moreover, the paper aims to evaluate the relative impacts ...

Marcus Ling; Kevin Lawler; Norman McBain; Alfredo Moscardini

174

CAPRI: A Common Architecture for Distributed Probabilistic Internet Fault Diagnosis  

E-Print Network [OSTI]

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J.

2007-06-04T23:59:59.000Z

175

CAPRI : a common architecture for distributed probabilistic Internet fault diagnosis  

E-Print Network [OSTI]

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J. (George Janbing), 1979-

2007-01-01T23:59:59.000Z

176

Language Independent Icon-Based Interface for Accessing Internet  

Science Journals Connector (OSTI)

With the advancement of the information technology, Internet becomes an essential part in our every sphere of life. However, the benefits of Internet are limited to only educated people who can read and write in ...

Santa Maiti; Debasis Samanta; Satya Ranjan DasÖ

2011-01-01T23:59:59.000Z

177

The Internet of Things Helping Utilities | OpenEI Community  

Open Energy Info (EERE)

The Internet of Things Helping Utilities Home > Groups > Smart Grid Dc's picture Submitted by Dc(107) Contributor 16 October, 2014 - 12:21 The Internet of Things (IoT) is helping...

178

How the Internet is influencing today's E&P business  

Science Journals Connector (OSTI)

...between. So, how can this technology tool be used to best advantage...management. The Internet (and Intranet) support and encourage knowledge...management. The Internet (and Intranet) support and encourage knowledge...Encouragetheuseandvalueofhigher end information, technology, and interpretation methodologies...

Jon Fuller; Joe Fay

179

Biomass Webinar Text Version | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Text Version Biomass Webinar Text Version Dowload the text version of the audio from the DOE Office of Indian Energy webinar on biomass. DOE Office of Indian Energy Foundational...

180

Solar Webinar Text Version | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Text Version Solar Webinar Text Version Download the text version of the audio from the DOE Office of Indian Energy webinar on solar renewable energy. DOE Office of Indian Energy...

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Knowledge Flow Analysis for Security Protocols  

E-Print Network [OSTI]

Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...

Torlak, Emina

2005-10-19T23:59:59.000Z

182

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure December 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.8 The Transmission Control Protocol

Bonaventure, Olivier

183

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3.8 The Transmission Control Protocol

Bonaventure, Olivier

184

Who's Who in the Internet: Biographies of IAB, IESG and IRSG Members  

Science Journals Connector (OSTI)

This FYI RFC contains biographical information about members of the Internet Activities Board (IAB), the Internet Engineering Steering Group (IESG) of the Internet Engineering Task Force (IETF), and the the Internet Research Steering Group (IRSG) of ...

G. Malkin

1992-05-01T23:59:59.000Z

185

Characterizing Internet Performance to Support Wide-area Application Development  

E-Print Network [OSTI]

-of-the-way places, like Islamabad (Pakistan) or Paramaribo (Suriname), not just the Internet covering the USA

Tanenbaum, Andrew S.

186

DipZoom: The Internet Measurements Marketplace  

E-Print Network [OSTI]

DipZoom: The Internet Measurements Marketplace (Position Paper) Michael Rabinovich, Sipat Triukose measurements. Unlike existing approaches that face a difficult challenge of building a measurement platform with suf- ficiently diverse measurements and measuring hosts, DipZoom offers a matchmaking service instead

Rabinovich, Michael "Misha"

187

New platforms of the violence in internet  

Science Journals Connector (OSTI)

Over the last few decades, some of the most defining sociological changes involve communications, especially in the permeation of information technologies and its effects in all areas of life. However, does this virtual world replicate the same problems ... Keywords: cyberculture, cybersex, cyberviolence, internet, new technologies

MarŪa del Mar RamŪrez-Alvarado; Inmaculada Gordillo

2010-10-01T23:59:59.000Z

188

Language of the Internet NAOMI S. BARON  

E-Print Network [OSTI]

processing to facilitate working on the Internet and the World Wide Web (1.3) Section 2 Linguistic Issues for Communicating via the Web 1 As with so many aspects of the computing world, the nature of the language of this chapter. #12;2 summarize the types of Web coding systems (4.1) present an overview of Web markup languages

Carlini, David

189

Acoustic Lexemes for Organizing Internet Audio  

E-Print Network [OSTI]

Acoustic Lexemes for Organizing Internet Audio Michael A. Casey In this article, a method is proposed for automatic fine-scale audio description that draws inspiration from ontological sound automation of audio description at the level of sound objects for indexing and retrieving sound segments

Casey, Michael

190

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

191

Compact Routing on Internet-Like Graphs Dmitri Krioukov  

E-Print Network [OSTI]

Compact Routing on Internet-Like Graphs Dmitri Krioukov Email: dima@krioukov.net Kevin Fall Intel and simulation, we derive the stretch distribution of this routing scheme on Internet-like interdomain topologies that the average TZ stretch is quite low and virtually independent of . In particular, for the Internet interdomain

Yang, Xiaowei

192

Experimental Design of Worldwide Internet Voting System using PKI  

E-Print Network [OSTI]

easily participate in voting over the Internet. It is consid- ered as a good solution for the recent interest for Internet voting as a good solution to make voting more accessible and convenient, it is widely voting together with good e√?ciency. In this research, we design Internet voting system us- ing public key

Kim, Kwangjo

193

WEB N.0, THE NEW DEVELOPMENT TREND OF INTERNET  

E-Print Network [OSTI]

energy which can be equal to the mainstream market. The internet provides a good groundWEB N.0, THE NEW DEVELOPMENT TREND OF INTERNET Zhiguo Sun, Wensheng Wang Agricultural Information: This article analyzes the Internet basic theory, the network foundation environment and the user behavior

Boyer, Edmond

194

Pricing the Internet Jerey K. MacKie-Mason  

E-Print Network [OSTI]

. Currently, the several Internet backbone networks are public goods with exclusion: usage is essentially freePricing the Internet by Jerey K. MacKie-Mason Hal R. Varian University of Michigan April 1993 to the Internet," JFK School of Government, May 26­27 , 1993. We describe the technology and cost structure

Varian, Hal R.

195

Visualising Internet Traffic Data with Three-Dimensional Spherical Display  

E-Print Network [OSTI]

successful in this respect has proven to give good predictions about structural features of the InternetVisualising Internet Traffic Data with Three-Dimensional Spherical Display Ben Yip1 , Shea Goyette1 of visualising internet traffic data using the underlying spherical nature of the globe. The method uses data

Hong,Seokhee

196

Internet Routing Resilience to Failures: Analysis and Implications  

E-Print Network [OSTI]

Internet Routing Resilience to Failures: Analysis and Implications Jian Wu Ying Zhang Z. Morley Mao Kang G. Shin University of Michigan ABSTRACT Internet interdomain routing is policy-driven, and thus phys- ical connectivity does not imply reachability. On average, routing on today's Internet works

Mao, Zhuoqing Morley

197

Modeling Internet Topology Kenneth L. Calvert, Georgia Tech  

E-Print Network [OSTI]

such as the Internet, has a strong bearing on many management and performance issues. Good models of the topologicalModeling Internet Topology Kenneth L. Calvert, Georgia Tech Matthew B. Doar, Ascom Nexion Ellen W aspects of locality and hierarchy present in the Internet. Two implemen­ tations that generate networks

Zegura, Ellen W.

198

Ethical implications of internet monitoring: A comparative study  

Science Journals Connector (OSTI)

Organizations have become increasingly concerned about employee use of the Internet for personal reasons while at work. Monitoring Internet usage has become more and more prevalent in the workplace. While there may be legitimate business functions such ... Keywords: Autonomy, Fairness, Internet monitoring, University, Workplace

Frances S. Grodzinsky; Andra Gumbus; Stephen Lilley

2010-09-01T23:59:59.000Z

199

Independent Oversight Appraisal Process Protocols  

Broader source: Energy.gov (indexed) [DOE]

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

200

Independent Oversight Appraisal Process Protocols  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Memory cost of quantum protocols  

E-Print Network [OSTI]

In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-12-16T23:59:59.000Z

202

Chapter 14: Chiller Evaluation Protocol  

SciTech Connect (OSTI)

This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

Tiessen, A.

2014-09-01T23:59:59.000Z

203

AN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS AN EDGE DEVICE FOR SUPPORTING INTERNET  

E-Print Network [OSTI]

parts of the Internet where the un- derlying link layer technology would be able to give good supportAN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS AN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS H. Hussmann Dresden

204

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

205

Efficient storage of versioned matrices  

E-Print Network [OSTI]

Versioned-matrix storage is increasingly important in scientific applications. Various computer-based scientific research, from astronomy observations to weather predictions to mechanical finite-element analyses, results ...

Seering, Adam B

2011-01-01T23:59:59.000Z

206

Checkpointing in speculative versioning caches  

DOE Patents [OSTI]

Mechanisms for generating checkpoints in a speculative versioning cache of a data processing system are provided. The mechanisms execute code within the data processing system, wherein the code accesses cache lines in the speculative versioning cache. The mechanisms further determine whether a first condition occurs indicating a need to generate a checkpoint in the speculative versioning cache. The checkpoint is a speculative cache line which is made non-speculative in response to a second condition occurring that requires a roll-back of changes to a cache line corresponding to the speculative cache line. The mechanisms also generate the checkpoint in the speculative versioning cache in response to a determination that the first condition has occurred.

Eichenberger, Alexandre E; Gara, Alan; Gschwind, Michael K; Ohmacht, Martin

2013-08-27T23:59:59.000Z

207

Schonlau M. Will web surveys ever become part of mainstream research? Journal of Medical Internet Research. 2004; 6(3):e31. Available at http://www.jmir.org/2004/3/e31/.  

E-Print Network [OSTI]

Schonlau M. Will web surveys ever become part of mainstream research? Journal of Medical Internet the pre-publication version in this document. Guest Editorial Will web surveys ever become part Santa Monica, CA 90407 email: matt@rand.org This journal issue contains two interesting papers on web

Schonlau, Matt

208

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Broader source: Energy.gov (indexed) [DOE]

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

209

VChemLab: A Virtual Chemistry Laboratory. The Storage, Retrieval, and Display of Chemical Information Using Standard Internet Tools  

Science Journals Connector (OSTI)

Within the last 18 months, a number of developers have begun to target the corporate ĎIntranet' market by providing modeling tools ? structure drawing, query handling, data presentation & analysis ? with a consistent Web-based interface that can be easily learned by Ďweb-aware' researchers and chemists. ... Corporate Intranets, which use Internet standards and protocols as a means of communication, are being rapidly developed as a cost-effective method of sharing data resources and distributing reusable software components. ... We will report in a future article the scaleable characteristics of this system for large molecular object databases. ...

Henry S. Rzepa; Alan P. Tonge

1998-09-04T23:59:59.000Z

210

ARM - Carlos Sousa Interview (English Version)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DeployementCarlos Sousa Interview (English Version) DeployementCarlos Sousa Interview (English Version) Azores Deployment AMF Home Graciosa Island Home Data Plots and Baseline Instruments Satellite Retrievals Experiment Planning CAP-MBL Proposal Abstract and Related Campaigns Science Questions Science Plan (PDF, 4.4M) Rob Wood Website Outreach Backgrounders English Version (PDF, 363K) Portuguese Version (PDF, 327K) AMF Posters, 2009 English Version Portuguese Version Education Flyers English Version Portuguese Version News Campaign Images Carlos Sousa Interview (English Version) From Graciosa to India. Thanks to the Atmospheric Station. (From AŌāoriano Oriental, March 5, 2012) Carlos Sousa works on an instrument at the ARM India site. Carlos Sousa works on an instrument at the ARM India site. To be at the right place at the right time, can change a person's life.

211

Transportation Protocols Working Group First Conference Call...  

Broader source: Energy.gov (indexed) [DOE]

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

212

SSF Experimental Protocols -- Lignocellulosic Biomass Hydrolysis...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SSF Experimental Protocols - Lignocellulosic Biomass Hydrolysis and Fermentation Laboratory Analytical Procedure (LAP) Issue Date: 10302001 N. Dowe and J. McMillan Technical...

213

ESPC ENABLE Measurement and Verification Protocol  

Broader source: Energy.gov [DOE]

Document provides an overview of the Measurement and Verification (M&V) Protocol utilized within ENABLE energy savings performance contract projects.

214

Superior Energy Performance Measurement and Verification Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Verification Protocol for Industry (November 2012) More Documents & Publications Energy Intensity Baselining and Tracking Guidance EnPI V4.0 Tool Algorithm Superior Energy...

215

Potential Internet Applications in Forest Products Exporting and  

E-Print Network [OSTI]

of Respondents #12;Adoption of Internet Technologies 0.0% 39.8% 57.0% 3.2% 0% 20% 40% 60% 80% 100 to Other Industries (n=93) #12;Adoption of Internet Technologies 2.2% 51.1% 22.8%23.9% 0% 20% 40% 60% 80 (n=54) 0% 20% 40% 60% 80% 100% Intranet Internet EDI Extranet VPN Do not use Use within next two

216

Analysis of Internet Banking Security Crack Through Messenger Hacking  

Science Journals Connector (OSTI)

The messenger is a free information and communication means for easy information exchange with acquaintances connected to the Internet during ordinary work process. Therefore, acquaintances (automatically) connec...

Dea-Woo Park; Kyong-Ha Roo

2013-01-01T23:59:59.000Z

217

University Policy Process Short Version  

E-Print Network [OSTI]

Rev. 5/09 University Policy Process Short Version Conduct Analysis Draft Documents Get Approvals. Identify policy owner 3. Assemble team 4. Engage Stakeholders 5. Draft policy 6. Submit proposed policy approves (or not) Do we need a policy? 11. Plan communication & training 12. UPO posts approved policy

Mohanty, Saraju P.

218

IES version 6.1  

Broader source: Energy.gov [DOE]

On this page you'll find information about the IES version 6.1 qualified computer software (buildings.energy.gov/qualified_software.html), which calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

219

IES version 6.3  

Broader source: Energy.gov [DOE]

On this page you'll find information about the IES version 6.3 qualified computer software (buildings.energy.gov/qualified_software.html), which calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings.

220

Already a pressing global issue, internet governance is growing in importance in international debates. With internet  

E-Print Network [OSTI]

Already a pressing global issue, internet governance is growing in importance in international, including those falling under: the United Nations General Assembly (UNGA), the International related to these processes are then weaved around two particular forums ­ the ITU Plenipotentiary in 2014

Chen, Yiling

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

222

Adaptive best effort protocols for video delivery  

E-Print Network [OSTI]

This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

Madhwaraj, Ashwin Raj

2012-06-07T23:59:59.000Z

223

Advantages of a Leveled Commitment Contracting Protocol  

E-Print Network [OSTI]

Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R. Lesser 7, 1995 #12; Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R, contracts have traditionally been binding. Such contracts do not al­ low agents to efficiently accommodate

Massachusetts at Amherst, University of

224

The Bitcoin Backbone Protocol: Analysis and Applications  

E-Print Network [OSTI]

The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

225

Geothermal Webinar Presentation Slides and Text Version | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Geothermal Webinar Presentation Slides and Text Version Geothermal Webinar Presentation Slides and Text Version Download presentation slides and a text version of the audio from...

226

Genome Majority Vote (GMV), Version 0.x  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Genome Majority Vote (GMV), Version 0.x Genome Majority Vote (GMV), Version 0.x The pipeline runs PRODIGAL gene predictions on all genomes, runs pan-reciprocal BLAST, and...

227

House Simulation Protocols Report | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Residential Buildings ¬Ľ Building America ¬Ľ House Simulation Residential Buildings ¬Ľ Building America ¬Ľ House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

228

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect (OSTI)

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15T23:59:59.000Z

229

Strategic Energy Planning Webinar Text Version  

Broader source: Energy.gov [DOE]

Download the text version of the audio from the DOE Office of Indian Energy webinar on strategic energy planning.

230

Gestion de versions incertaines de documents XML  

E-Print Network [OSTI]

D RA FT Gestion de versions incertaines de documents XML M. Lamine Ba Talel Abdessalem Pierre incertitude, nous utilisons un mod`ele XML probabiliste. Chaque version d'un document partag¬īe est repr¬īesent¬īe par un arbre XML et le do- cument tout en entier, incluant toutes ses versions, par un document XML

Senellart, Pierre

231

Five Deaths Resulting from Abuse of Dextromethorphan Sold Over the Internet  

Science Journals Connector (OSTI)

......Resulting from Abuse of Dextromethorphan Sold Over the Internet Barry K. Logan...resulting from abuse of dextromethorphan sold over the internet. | Dextromethorphan...Resulting from Abuse of Dextromethorphan Sold Over the Internet Reproduction......

Barry K. Logan; Gary Goldfogel; Rebecca Hamilton; James Kuhlman

2009-03-01T23:59:59.000Z

232

How To Setup EHSS Landing Page As Default Home Page For Internet...  

Energy Savers [EERE]

Internet Explorer How To Setup EHSS Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http:energy.govehss. Once the EHSS site...

233

How To Setup EA Landing Page As Default Home Page For Internet...  

Energy Savers [EERE]

Internet Explorer How To Setup EA Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http:energy.goviea. Once the EA site loads,...

234

DAD-MPR Flooding Protocol, Convergence Evaluation Through Simulation  

Science Journals Connector (OSTI)

In this paper, we present the convergence evaluation of DAD-MPR flooding protocol through simulation. DAD-MPR flooding protocol is the autoconfiguration protocol we proposed ... OLSR nodes with multiple interface...

Saadi Boudjit; Cťdric Adjih; Paul Muhlethaler

2007-01-01T23:59:59.000Z

235

End-to-end routing behavior in the internet  

Science Journals Connector (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

2006-10-01T23:59:59.000Z

236

End-to-end routing behavior in the Internet  

Science Journals Connector (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

1996-08-01T23:59:59.000Z

237

Touring the Internet in a TCP Sidecar Rob Sherwood  

E-Print Network [OSTI]

Touring the Internet in a TCP Sidecar Rob Sherwood Department of Computer Science University, College Park nspring@cs.umd.edu ABSTRACT An accurate router-level topology of the Internet would benefit. The combined approach mitigates problems associated with traceroute-based topology discovery, including abuse

Gruner, Daniel S.

238

MEASURING INTERNET TELEPHONY QUALITY: WHERE ARE WE TODAY ?  

E-Print Network [OSTI]

MEASURING INTERNET TELEPHONY QUALITY: WHERE ARE WE TODAY ? Olof Hagsand SICS Sweden Kjell Hanson Ericsson Business Networks Sweden Ian Marsh SICS Sweden Abstract Users of Internet telephony applications demand good quality audio playback. This quality is largely dependent on the instantaneous network

239

INTERNET AND E-COMMERCE PATENTS Bradley C. Wright  

E-Print Network [OSTI]

INTERNET AND E-COMMERCE PATENTS Bradley C. Wright The digital world is getting crowded. The number become pervasive, companies with an Internet presence have labored to distinguish their Web sites and marketing techniques from the offerings of others. Consumers who purchase goods and services over

Shamos, Michael I.

240

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network [OSTI]

of household Internet usage, 89% of 93 families needed support from a computer help desk in the 1st year for Technical Help 1.3. Theoretical Analysis 2. METHOD 2.1. Requests for Support From the Help Desk 2Troubles With the Internet: The Dynamics of Help at Home Sara Kiesler, Bozena Zdaniuk, Vicki

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network [OSTI]

help desk in the 1st year they used the Internet. However, usually only the most technically involved aspects of technological change and communication systems. Bozena Zdaniuk is Data Management Coordinator 2.1. Requests for Support From the Help Desk 2.2. Internet Usage 2.3. Questionnaire Measures 2

Kiesler, Sara

242

Models for a selfmanaged Internet By Frank Kelly  

E-Print Network [OSTI]

Models for a self­managed Internet By Frank Kelly Centre for Mathematical Sciences, University. Kelly that some current Internet traffic needs large buffers, causing unacceptable queue­ ing delays, Crowcroft & Oechslin 1998; Gibbens & Kelly 1999a; Key & McAuley 1999a). Its premise is that a simple packet

Kelly, Frank

243

A look behind the future internet architectures efforts  

Science Journals Connector (OSTI)

The Future Internet Architectures (FIA) constitutes a 10-year effort by the U.S. National Science Foundation (NSF) that was launched in 2006, with the announcement of the Future INternet Design (FIND) research area within a Network Technologies and Systems ...

Darleen Fisher

2014-07-01T23:59:59.000Z

244

CACHING CHARACTERISTICS OF INTERNET AND INTRANET WEB PROXY TRACES  

E-Print Network [OSTI]

CACHING CHARACTERISTICS OF INTERNET AND INTRANET WEB PROXY TRACES Arthur Goldberg, Ilya Pevzner} This paper studies the caching characteristics of HTTP requests and responses that pass through production a large Internet Service Provider (ISP) and 2.0 million entries from an Intranet firewall are studied. We

Goldberg, Arthur P.

245

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

­lennox­sip­reg­payload­01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

246

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network [OSTI]

­lennox­sip­reg­payload­00.ps Columbia University March 6, 2000 Expires: September 2000 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

247

Enabling Performance Intelligence for Application Adaptation in the Future Internet  

E-Print Network [OSTI]

plat- form. Achieving autonomicity in the Future Internet will require a performance architecture that such "Future Internet Perfor- mance Architecture" (FIPA), and present our reference implementation of FIPA in virtualization [1] technology at end-hosts and core network switches/routers. The Global Envir

Calyam, Prasad

248

Spelling and searching the internet: An overlooked problem  

Science Journals Connector (OSTI)

Misspellings, phonetic spellings, deliberately idiosyncratic spellings, typographical, and other errors are examined in relation to the Internetís lack of standardization. Despite the dramatic effect different spellings have on the outcome of searches, this topic has not been adequately addressed in the literature nor have solutions been suggested hitherto.

Edward Proctor

2002-01-01T23:59:59.000Z

249

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh  

E-Print Network [OSTI]

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh M. Satyanarayanan, Carnegie to suspend work at one machine and to resume it at another. Our key insight is that this capability can a machine at one Internet site, then travel to some other site and resume my work there on another machine

Satyanarayanan, Mahadev "Satya"

250

Intelligent fault prediction system based on internet of things  

Science Journals Connector (OSTI)

Fault prediction is the key technology to ensure the safe operation of large equipment. Based on the investigation of current and developing research of fault prediction, an intelligent fault prediction system based on internet of things is proposed ... Keywords: Fault prediction, Intelligent computer information processing, Internet of things, Mechanical equipment groups, Predictive maintenance

Xiaoli Xu; Tao Chen; Mamoru Minami

2012-09-01T23:59:59.000Z

251

Life Cycle Environmental Assessment of the Internet: The Benefits and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Thomas McKone This seminar starts by providing a short introduction to the field of Environmental Life Cycle Assessment (LCA) through a practical example of packaging. It will then develop the case of the Life Cycle Benefits and Impacts of the Internet; raising the different scientific challenges that LCA faces to provide relevant results for innovative technologies.--The rapid development of the Internet and the related potential impacts on and benefits for the environment deserves attention. The infrastructure that supports a university's use of the Internet has been comprehensively

252

Protective Force Protocols for ESS Supported Performance Tests...  

Broader source: Energy.gov (indexed) [DOE]

Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12,...

253

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ash Loading Protocol Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Neutron Imaging of Advanced Engine Technologies...

254

International performance measurement and verification protocol for new construction  

E-Print Network [OSTI]

Performance Measurement and Verification Protocol for New1. INTRODUCTION Measurement and Verification (M&V) of energyPerformance Measurement & Verification Protocol.

2002-01-01T23:59:59.000Z

255

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

256

A Discussion of Testing Protocols and LANL's Contribution to...  

Broader source: Energy.gov (indexed) [DOE]

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes...

257

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...  

Office of Environmental Management (EM)

Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents & Publications Slide 1 LPP Risk Management Plan...

258

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department...

259

Police Officersí Perceptions of their Reactions to Viewing Internet Child Exploitation Material  

Science Journals Connector (OSTI)

Internet child exploitation (ICE) material, commonly referred to as internet child pornography or child sexual abuse images, refers to sexualised depictions of children ... produced, distributed, accessed or stor...

Martine Powell; Peter Cassematis; Mairi BensonÖ

2014-04-01T23:59:59.000Z

260

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Broader source: Energy.gov (indexed) [DOE]

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

(for Gene Recognition Analysis Internet Link),  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 6/1/2011 5 6/1/2011 6.6 Speeding Up the Process of Gene Discovery The human genome contains information that could be used to prevent birth defects and treat or cure devastating diseases, but it is written in a language that scientists are only beginning to understand. To help decipher the code, Ed Uberbacher and colleagues at Oak Ridge National Laboratory combined cutting- edge computer technology with their knowledge of human biology to develop GRAIL (for Gene Recognition Analysis Internet Link), a "thinking" computer program that imitates the human learning process as it searches for genetic meaning. GRAIL and successor software programs can rapidly identify key instructions in genes from within vast stretches of DNA that appear to be meaningless-a critical contribution to the

262

Fermilab Leadership Institute Integrating Internet, Instruction and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fermilab Leadership Institute Integrating Fermilab Leadership Institute Integrating Internet, Instruction and Curriculum Online Materials Projects ACT Program Information Example ACT Class Page Example LInC Class Page Please sign up here to be notified of future LInC program opportunities. Fermilab LInC Online is creating a cadre of educational leaders who effectively integrate technology in their classrooms to support engaged learning student investigations on real-world issues. Participants range from classroom teachers and technology coordinators through library media specialists, who create engaged learning projects that incorporate the best uses of technology. The new Fermilab LInC ACT course guides teachers through the process of evaluating, selecting and customizing an inquiry-based online project to

263

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

264

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Archived Data Dictionary Archived Data Dictionary Central Internet Database CID Photo Banner Archived Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Stream Disposition Quantity* EM Corp - The quantity of material or waste dispositioned for the stream during a specified year or range of years. Annual Stream Inventory Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be stored as of a particular year or range of years. Annual Stream Source Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be generated new, generated as process outputs (secondary), or added through a receipt from another DOE or non-DOE site, in a particular year or range of years.

265

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Data Dictionary Data Dictionary Central Internet Database CID Photo Banner Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Disposition WIMS - Planned disposition quantity (total volume of container, as disposed, in m3) reported for each year: FY08 through FY50. B C Chemical Name TRI - (Form R - Part II - Section 1.2) The name of the toxic chemical that has been released and/or transferred during the reporting year. Listed toxic chemicals are those chemicals on the list in Committee Print Number 99-169 of the Senate Committee on Environment and Public Works, titled "Toxic Chemicals Subject to Section 313 of the Emergency Planning and Community Right-To-Know Act of 1986" (42 U.S.C. 11023). Currently, there are over 600 toxic chemicals included on the list subject to reporting.

266

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

267

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect (OSTI)

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

268

Kyoto Protocol Response (Alabama) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

269

PEP Classroom Observation Protocol Project # _______ District __________________________ School ________________________________________  

E-Print Network [OSTI]

PEP Classroom Observation Protocol Project # _______ District __________________________ School (mark all that apply) Demonstrate or confirm known concepts/procedures Demonstrate or confirm known concepts/procedures Explore ideas, test conjectures, look for patterns Explore ideas, test conjectures

Lee, Carl

270

The Kyoto Protocol and developing countries  

E-Print Network [OSTI]

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

271

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

272

Entanglement Distillation Protocols and Number Theory  

E-Print Network [OSTI]

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

273

Entanglement distillation protocols and number theory  

SciTech Connect (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z{sub D}{sup n} associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z{sub D}{sup n} into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

Bombin, H.; Martin-Delgado, M.A. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid (Spain)

2005-09-15T23:59:59.000Z

274

Adaptive protocols for the quantum depolarizing channel  

E-Print Network [OSTI]

In the first part, we present a family of entanglement purification protocols that generalize four previous methods, namely the recurrence method, the modified recurrence method, and the two methods proposed by Maneva-Smolin ...

Leung, Alan W

2007-01-01T23:59:59.000Z

275

NREL Test-to-Failure Protocol (Presentation)  

SciTech Connect (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

276

Membrane and MEA Accelerated Stress Test Protocols  

Broader source: Energy.gov (indexed) [DOE]

and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

277

BPA's Proposed Oversupply Management Protocol Presentation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

M I N I S T R A T I O N BPA's Proposed Oversupply Management Protocol February 14, 2012 BPA Rates Hearing Room To participate by phone please call (888) 296-1938 and enter 563088...

278

Sensornet Protocol Tuning Using Principled Engineering Methods  

Science Journals Connector (OSTI)

......equally applicable to both energy-ignorant and energy-aware protocols...reasons including high cost, risk of low solution...3. 2. RELATED WORK Energy awareness and energy...typically small and non- renewable. Energy consumption......

Jonathan Tate; Iain Bate

2010-09-01T23:59:59.000Z

279

Verifying multicast-based security protocols using the inductive method  

Science Journals Connector (OSTI)

Multicast, originally designed as an efficient way of broadcasting content, is being used in security protocols. Multicast security protocols are difficult to verify using model checking because they typically involve a large number of participants. ... Keywords: formal verification, multicast protocols, security protocols

Jean E. Martina; Lawrence C. Paulson

2013-03-01T23:59:59.000Z

280

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

E-Print Network [OSTI]

time. † Savings † measurement † and † verification † (M&V) †Performance † Measurement † and † Verification † Protocol: †

Jump, David

2014-01-01T23:59:59.000Z

282

FLIP: an Internetwork Protocol for Supporting Distributed Systems  

E-Print Network [OSTI]

of communication are not well supported by protocols such as TCP/IP, X.25, and OSI TP4. As part of our ongoing. Although the ISO OSI protocols are not widely used, the OSI model is con- venient for describing where-performance RPC protocol rather than a byte-stream protocol like TCP or OSI TP4

Tanenbaum, Andrew S.

283

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells  

Broader source: Energy.gov [DOE]

Accelerated Stress Test Protocols for PEM Fuel Cells, Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies

284

TEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE  

E-Print Network [OSTI]

://www.ncemch.org/pubs/PDFs/breastfeedingTIB.pdf Internet monograph (standard citation to a part) Inhalent abuse [Internet]. Bethesda (MD): NationalTEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE Excellence in library recommendations for Internet citations using the CSE style are taken from the National Library of Medicine

285

A framework for nation-centric classification and observation of the internet  

Science Journals Connector (OSTI)

The Internet has matured to a mission-critical infrastructure, and recently attracted much attention at political and legal levels in many countries. Civil actions regarding the Internet infrastructure require a thorough understanding of the national ... Keywords: AS-level classification, German internet graph, methodology, nation-state internet routing

Matthias Wšhlisch; Sebastian Meiling; Thomas C. Schmidt

2010-11-01T23:59:59.000Z

286

Internet Engineering Task Force INTERNETDRAFT J. Lennox, J.Rosenberg, H.Schulzrinne  

E-Print Network [OSTI]

Internet Engineering Task Force INTERNET­DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne draft Status of this Memo This document is an Internet­Draft. Internet­Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also

Lennox, Jonathan

287

On Power-Law Relationships of the Internet Topology Michalis Faloutsos  

E-Print Network [OSTI]

On Power-Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp the apparent randomness of the Internet, we dis- cover some surprisingly simple power-laws of the Internet topology. These power-laws hold for three snapshots of the Internet, between November 1997 and December

288

Community Internet Access in Rural Areas: Solving the Economic Sustainability Puzzle  

E-Print Network [OSTI]

- oping nations. In researching and studying the economic self-sustainability of the Internet in rural

289

Hydroelectric Webinar Presentation Slides and Text Version  

Broader source: Energy.gov [DOE]

Download presentation slides and a text version of the audio from the DOE Office of Indian Energy webinar on†hydroelectric renewable energy.†

290

Manufacturing Ecosystems and Keystone Technologies (Text Version)  

Broader source: Energy.gov [DOE]

This is a text version of the Manufacturing Ecosystems and Keystone Technologies video, originally presented on March 12, 2012 at the MDF Workshop held in Chicago, Illinois.

291

OSTI Pact with Internet Archive Ensures Uninterrupted Research Access |  

Office of Scientific and Technical Information (OSTI)

Pact with Internet Archive Ensures Uninterrupted Research Access Pact with Internet Archive Ensures Uninterrupted Research Access E-print Network One sure thing about the World Wide Web: like the weather, it will change. Given this dynamic nature of the Web and the importance of preservation of scientific information in a digital environment, OSTI recently partnered with Internet Archive to ensure uninterrupted access to more than 1 million online research papers from the E-print Network. The DOE E-print Network is the largest collection that a federal institution has undertaken in an on-going effort to preserve their own documents and history through Archive-It. "As a result of the pioneering partnership between the Internet Archive and OSTI, we are ensuring long-term, continuous access to the growing body of cutting-edge

292

Using end-user latency to manage internet infrastructure  

Science Journals Connector (OSTI)

Performance is a requirement for all interactive applications. For Internet-based distributed applications, the need is even more acute - users have a choice about where they browse, and if a site's performance frustrates them they may never return. ...

J. Bradley Chen; Michael Perkowitz

2002-12-01T23:59:59.000Z

293

Chapter 6 Use [and Abuse] of Multistakeholderism in the Internet  

Science Journals Connector (OSTI)

Multistakeholderism has become the Internet governance regime choice of many. While it is certain that everyone does not have the same modalities in mind when they utter the term, it is apparent that for many ...

Avri Doria

2014-01-01T23:59:59.000Z

294

The CATI Project: Charging and Accounting Technology for the Internet  

E-Print Network [OSTI]

The CATI Project: Charging and Accounting Technology for the Internet Burkhard Stiller1, Torsten, Switzerland 1 E-Mail: [stiller | plattner]@tik.ee.ethz.ch, 2 E-Mail: [braun | mguenter]@iam.unibe.ch Abstract

Braun, Torsten

295

The Internet, children, and privacy: the case against parental monitoring  

Science Journals Connector (OSTI)

Raising children with access to the Internet is still a relatively new phenomenon. It ... childrenís on-line communication exchanges, is not good. While there are reasons to think that...ethical inappropriateness

Kay Mathiesen

2013-12-01T23:59:59.000Z

296

Organization Culture Dimensions as Antecedents of Internet Technology Adoption  

Science Journals Connector (OSTI)

In recent years, growth of the Internet and the World Wide Web has had an impact on the way local, state, and national governments work. In this research, we examine the factors that influence adoption of Inte...

Subhasish Dasgupta; Babita Gupta

2013-01-01T23:59:59.000Z

297

An interoperable internet scale solution for RFID network security  

E-Print Network [OSTI]

Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for ...

Mao, Tingting

298

Towards More Efficient Delay Measurements on the Internet  

E-Print Network [OSTI]

the speed of experiments, improving the accuracy of measurement results, and reducing the amount of tra?c generated by the scan. Finally, we present architectures for performing an Internet scale measurement scan. We found that with custom drivers...

Webster, Patrick Jordan

2013-07-22T23:59:59.000Z

299

A calculus for cryptographic protocols: The spi calculus  

E-Print Network [OSTI]

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.

Martin Abadi; Andrew D. Gordon

1999-01-01T23:59:59.000Z

300

Hybrid protocol of remote implementations of quantum operations  

E-Print Network [OSTI]

We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

Ning Bo Zhao; An Min Wang

2007-08-04T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Interpolation of recurrence and hashing entanglement distillation protocols  

SciTech Connect (OSTI)

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

302

Population internet penetration rate and channel supply chain players' performances  

Science Journals Connector (OSTI)

With the rapid development of the internet, the population internet penetration rate plays a strategic importance in the dual-channel supply chain. In this research, we use a game-theoretic approach to examine the effect of the population internet penetration rate on the performances of the manufacturer and traditional retailer under the Stackelberg and Bertrand competitive models. Our results suggest that an increase in the population internet penetration rate always has a negative impact on the manufacturer and traditional retailer's profits. Furthermore, when the product is more suitable for the online market, the traditional retailer will be hurt more by the population internet penetration rate. For the manufacturer, although a larger product web fit can increase profits, the population internet penetration rate has a stronger impact on profitability, thus decreasing profits even as the product web fit increases. Our results also suggest that both the manufacturer and the retailer can adopt either of the Stackelberg and Bertrand competitive market structures in the dual-channel supply chain since their profits are unaffected by the two models. The managerial implications of our results are discussed and the probable paths of future research are identified.

Ruiliang Yan; John Wang; Sanjoy Ghose

2009-01-01T23:59:59.000Z

303

Policies and procedures to manage employee Internet abuse  

Science Journals Connector (OSTI)

Industry analysts estimate that billions of dollars in lost revenue were attributed to employee Internet abuse. Trends also suggest that lost job productivity and corporate liability have emerged as new workplace concerns due to growth of new online technologies and mobile computing. Such employee Internet misuse creates new management dilemmas on how to respond to incidences of such misuse as well poses network security risks and drains on network bandwidth. Within an organization, it is imperative to ensure that employees are using computing resources effectively and appropriately. Utilizing the previous literature in the field, this paper proposed a revised framework to manage employee Internet abuse. The former model proposed did not account for new digital media and recommended screening applicants for Internet addiction, using more of a clinical test than a job performance test. This new model describes both prevention and intervention methods to address incidents of online misuse in the workplace and refocuses hiring decisions into post-employment training. It also examines the new hiring concerns with the new iGeneration of college graduates and it examines how organizations should best utilize acceptable Internet use policies with clear methods of Internet monitoring to enforce that workers are complying with company policies. This paper also talks about the potential benefits of rehabilitation approaches to manage employees who abuse instead of terminating them to decrease job turnover and improve job retention. Implications for current management practices are also discussed.

Kimberly Young

2010-01-01T23:59:59.000Z

304

AIRS Version 6 Release Level 2 Product User Guide AIRS/AMSU/HSB Version 6  

E-Print Network [OSTI]

AIRS Version 6 Release Level 2 Product User Guide Page 1 AIRS/AMSU/HSB Version 6 Level 2 Product Questions to: http://airs.jpl.nasa.gov/AskAirs #12;AIRS Version 6 Release Level 2 Product User Guide Page 2............................................................................................. 7 1.1 EXAMPLE: LEVEL 2 PHYSICAL RETRIEVAL PRODUCT FILE NAMES

Waliser, Duane E.

305

Money flows in the Internet ecosystem : strategic opportunities for telecom operators and other Internet agents in the digital age  

E-Print Network [OSTI]

The question about where the money goes is something really interesting for all the companies in the Internet ecosystem. While there is a huge interest, no clear answers have been provided, partially because the ecosystem ...

Valentin Vinagrero, Israel

2014-01-01T23:59:59.000Z

306

Chapter 15: Commercial New Construction Protocol  

SciTech Connect (OSTI)

This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

Keates, S.

2014-09-01T23:59:59.000Z

307

Chapter 22: Compressed Air Evaluation Protocol  

SciTech Connect (OSTI)

Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

Benton, N.

2014-11-01T23:59:59.000Z

308

The Kyoto Protocol: A business perspective  

SciTech Connect (OSTI)

Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

Malin, C.B. [International Chamber of Commerce, Paris (France)

1998-01-19T23:59:59.000Z

309

Surfing the internet with a BCI mouse  

Science Journals Connector (OSTI)

In this paper, we present a new web browser based on a two-dimensional (2D) brainĖcomputer interface (BCI) mouse, where our major concern is the selection of an intended target in a multi-target web page. A real-world web page may contain tens or even hundreds of targets, including hyperlinks, input elements, buttons, etc. In this case, a target filter designed in our system can be used to exclude most of those targets of no interest. Specifically, the user filters the targets of no interest out by inputting keywords with a P300-based speller, while keeps those containing the keywords. Such filtering largely facilitates the target selection task based on our BCI mouse. When there are only several targets in a web page (either an original sparse page or a target-filtered page), the user moves the mouse toward the target of interest using his/her electroencephalographic signal. The horizontal movement and vertical movement are controlled by motor imagery and P300 potential, respectively. If the mouse encounters a target of no interest, the user rejects it and continues to move the mouse. Otherwise the user selects the target and activates it. With the collaboration of the target filtering and a series of mouse movements and target selections/rejections, the user can select an intended target in a web page. Based on our browser system, common navigation functions, including history rolling forward and backward, hyperlink selection, page scrolling, text input, etc, are available. The system has been tested on seven subjects. Experimental results not only validated the efficacy of the proposed method, but also showed that free internet surfing with a BCI mouse is feasible.

Tianyou Yu; Yuanqing Li; Jinyi Long; Zhenghui Gu

2012-01-01T23:59:59.000Z

310

Internet Key Exchange (IKE) with MQV Yongge Wang  

E-Print Network [OSTI]

to work in an arbitrary finite group. The MQV protocol has been standardized in ANSI X9.42 [1], ANSI X9 in an arbitrary finite group. The MQV protocol has been standardized in ANSI X9.42 [1], ANSI X9.63 [2], and IEEE

Wang, Yongge

311

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Broader source: Energy.gov (indexed) [DOE]

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

312

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Broader source: Energy.gov (indexed) [DOE]

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

313

Automotive and MHE Fuel Cell System Cost Analysis (Text Version...  

Broader source: Energy.gov (indexed) [DOE]

Automotive and MHE Fuel Cell System Cost Analysis (Text Version) Automotive and MHE Fuel Cell System Cost Analysis (Text Version) Below is the text version of the webinar titled...

314

Secretary of Energy Moniz Keynote (Text Version) | Department...  

Energy Savers [EERE]

Secretary of Energy Moniz Keynote (Text Version) Secretary of Energy Moniz Keynote (Text Version) Below is the text version for the Keynote: The Honorable Ernest J. Moniz, U.S....

315

Biomass 2013: Register Now (Text Version) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2013: Register Now (Text Version) Biomass 2013: Register Now (Text Version) Below is the text version for the Biomass 2013: Register Now video. The Video opens with "U.S....

316

Optimal Decentralized Protocols for Electric Vehicle Charging  

E-Print Network [OSTI]

1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging. The algorithms exploit the elasticity and controllability of electric vehicle loads in order to fill the valleys

Low, Steven H.

317

Russia's role in the Kyoto Protocol  

E-Print Network [OSTI]

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

318

Measuring Transport Protocol Potential for Energy Efficiency  

E-Print Network [OSTI]

Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras, Greece {skontog, emamatas, ipsaras, vtsaousi}@ee.duth.gr Abstract. We investigate the energy-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

Tsaoussidis, Vassilis

319

Utility, informativity and protocols Robert van Rooy  

E-Print Network [OSTI]

Utility, informativity and protocols Robert van Rooy ILLC/University of Amsterdam R particular natural assumptions the utility of questions and answers reduces to their informativity, and that the ordering relation induced by utility sometimes even reduces to the logical relation of entailment

van Rooij, Robert

320

Transport Control Protocol (TCP) In Heterogeneous Networks  

E-Print Network [OSTI]

Sprint Transport Control Protocol (TCP) In Heterogeneous Networks Objectives · Principles of TCP functional modules: slow start, congestion avoidance, fast transmission and fast recovery. ­ Maintain · Packet dropping is the only indication signal for network congestion (Maybe?) · Different transmission

Shihada, Basem

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Routing protocols in ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc networking involves computers, typically wireless mobile nodes (MNs), that cooperatively form a network without specific user administration or configuration. In other words, ad hoc networking allows an arbitrary collection of MNs to create a ... Keywords: associativity-based routing (ABR), distributed bellman-ford (DBF), dynamic source routing (DSR), on-demand routing protocols

Dan Galatchi; Roxana Zoican

2005-03-01T23:59:59.000Z

322

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 12/31/2011" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2009.02" "MONTHLY REPORT OF NATURAL GAS PURCHASES AND DELIVERIES TO CONSUMERS" "FORM EIA-857" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

323

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/notice912.jsp" 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/notice912.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "WEEKLY UNDERGROUND NATURAL GAS STORAGE REPORT" "FORM EIA-912" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

324

ENERGY STAR Certified Homes, Version 3 (Rev. 07) National Program...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

National Program Requirements ENERGY STAR Certified Homes, Version 3 (Rev. 07) National Program Requirements ENERGY STAR Certified Homes, Version 3 (Rev. 07) National Program...

325

Energy Code Compliance and Enforcement Best Practices (Text Version...  

Broader source: Energy.gov (indexed) [DOE]

Energy Code Compliance and Enforcement Best Practices (Text Version) Energy Code Compliance and Enforcement Best Practices (Text Version) Curtis Framel: Good afternoon, and good...

326

Energy Saving Performance Contracting (ESPC) Basics (Text Version...  

Broader source: Energy.gov (indexed) [DOE]

Saving Performance Contracting (ESPC) Basics (Text Version) Energy Saving Performance Contracting (ESPC) Basics (Text Version) Chani Vines: Hello. We'll be starting in five...

327

Version Tracking Document for DOE Challenge Homes, National Program...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03) Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev....

328

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

329

A New Protocol for Evaluating Concrete Curing Effectiveness  

E-Print Network [OSTI]

and qualify the curing compound, a new evaluation protocol is introduced in this study. The new protocol consists of using measured relative humidity and temperature to calculate an effectiveness index (EI) which serves as an indicator of the effectiveness...

Sun, Peizhi

2013-07-22T23:59:59.000Z

330

Latent Class Models in action: Bridging social capital & Internet usage  

Science Journals Connector (OSTI)

Abstract This paper explores how Latent Class Models (LCM) can be applied in social research, when the basic assumptions of regression models cannot be validated. We examine the usefulness of this method with data collected from a study on the relationship between bridging social capital and the Internet. Social capital is defined here as the resources that are potentially available in oneís social ties. Bridging is a dimension of social capital, usually related to weak ties (acquaintances), and a source of instrumental resources such as information. The study surveyed a stratified random sample of 417 inhabitants of Lisbon, Portugal. We used LCM to create the variable bridging social capital, but also to estimate the relationship between bridging social capital and Internet usage when we encountered convergence problems with the logistic regression analysis. We conclude by showing a positive relationship between bridging and Internet usage, and by discussing the potential of LCM for social science research.

Barbara Barbosa Neves; Jaime R.S. Fonseca

2015-01-01T23:59:59.000Z

331

Internet-based calibration of a multifunction calibrator  

SciTech Connect (OSTI)

A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

2000-04-17T23:59:59.000Z

332

Value creation and the internet: entrepreneurial behaviour in Dutch SMEs  

Science Journals Connector (OSTI)

Although almost all Small- and Medium-sized Enterprises (SMEs) have adopted the internet and e-mail, only those entrepreneurs that realise how these innovations can be applied in their business are able to recognise opportunities to create value. Based on a sample of 614 Dutch SMEs, we examine what factors determine the recognition of such opportunities. Particularly, we argue that the use of the internet and e-mail has a positive relationship to organisational and strategic value creation; that organisational value creation precedes strategic value creation; and that entrepreneurs who are able to actually create strategic value Ė and thus have actually recognised entrepreneurial opportunities from these technologies Ė have higher levels of knowledge and experience, are more proactive networkers and have higher levels of entrepreneurial orientation. Our findings suggest that there are clear possibilities for SMEs to capitalise on adopting the internet and e-mail because all the associated factors can be enhanced through choices consciously made by the entrepreneurs.

Marijke Van Der Veen; Ingrid Wakkee

2009-01-01T23:59:59.000Z

333

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley  

E-Print Network [OSTI]

and relies on the skill of the protocol designer. Saidi [32] proposes a semi-automatic design tool based

Foley, Simon

334

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network [OSTI]

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

335

ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

ESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer a long lifetime of the sensor network and the application it is important to save energy. A sensor node control (MAC) protocol for wireless sensor networks, called Energy Saving Token Ring Protocol (ESTR). ESTR

Ungerer, Theo

336

A semantic translation method for data communication protocols  

Science Journals Connector (OSTI)

Protocol translation is a method for transforming pieces of information from a source protocol into relevant target protocol formats in order to communicate between heterogeneous legacy systems in interoperability environments. There are some existing ... Keywords: Gateway system, Heterogeneous system, Interoperability, Message translation, Semantic translation, Semantic-centric communication

Jingyu Kim; Sungwon Kang; Jihyun Lee; Bong Wan Choi

2012-12-01T23:59:59.000Z

337

A Program Logic for Verifying Secure Routing Protocols  

E-Print Network [OSTI]

reasoning. Existing protocol analysis tools [7, 12, 14] are rarely used in analyzing rout- ing protocolsA Program Logic for Verifying Secure Routing Protocols Chen Chen1 , Limin Jia2 , Hao Xu1 , Cheng done to understand and verify the formal security guarantees of proposed secure inter-domain routing

Pennsylvania, University of

338

A Program Logic for Verifying Secure Routing Protocols  

E-Print Network [OSTI]

protocol analysis tools [7, 11, 13] are rarely used in analyzing routing protocols becauseA Program Logic for Verifying Secure Routing Protocols (Technical Report) Chen Chen1 , Limin Jia2 done to understand and verify the formal security guarantees of proposed secure inter-domain routing

Sandholm, Tuomas W.

339

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

340

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Utilisation des Protocoles HARQ pour la Radio Cognitive  

E-Print Network [OSTI]

Utilisation des Protocoles HARQ pour la Radio Cognitive Romain Tajan encadré/01/2012 #12;Plan 1 Introduction 2 La Radio Cognitive Techniques de la Radio Cognitive Méthodes d'accès 3 performances du protocole IR-HARQ 4 Utilisation des protocoles HARQ pour la Radio Cognitive Utilisation de l

Dobigeon, Nicolas

342

Simplified VO M&V Protocol Simplified Voltage Optimization (VO)  

E-Print Network [OSTI]

Simplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification Protocol 1.0 Introduction 1.1 Purpose The Simplified Voltage Optimization (VO) Measurement and Verification requirements, and measurement and verification formulations are included as part of this Protocol. 1

343

A Multi-Sender Asynchronous Extension to the AER Protocol  

E-Print Network [OSTI]

A Multi-Sender Asynchronous Extension to the AER Protocol John Lazzaro and John Wawrzynek Computer-event representation (AER) is an asynchronous point-to-point communi- cations protocol for silicon neural systems. This paper describes an extension of the AER protocol that allows multiple AER senders to share a common bus

Lazzaro, John

344

MDF Form and Function (Text Version)  

Broader source: Energy.gov [DOE]

This is a text version of the Manufacturing Demonstration Facilities (MDF) Form and Function video, originally presented on March 12, 2012 at the MDF Workshop held in Chicago, Illinois.

345

Free probability and combinatorics Preliminary version  

E-Print Network [OSTI]

Free probability and combinatorics Preliminary version Michael Anshelevich c 2012 December 4, 2012 #12;Preface These notes were used in a topics course Free probability and combinatorics taught topics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3 Free

Anshelevich, Michael

346

Efficient Versioning for Scientific Array Databases  

E-Print Network [OSTI]

In this paper, we describe a versioned database storage manager we are developing for the SciDB scientific database. The system is designed to efficiently store and retrieve array-oriented data, exposing a "no-overwrite" ...

Seering, Adam

347

Version Date: July 2012 COPYRIGHT & TRADEMARKS  

E-Print Network [OSTI]

WEB Clock Version Date: July 2012 #12;COPYRIGHT & TRADEMARKS Copyright © 1998, 2011, Oracle and Guide WEB Clock Page iii Table of Contents WEB Clock ........................................................................................................................ 1 WEB Clock Procedure

348

Lab protocols A. Preparation of competent Cells  

E-Print Network [OSTI]

for 30- 60 min. #12;Lab protocols C. Solutions RF1 Compound RbCl MnCl2 4H2O Potassium acetate CaCl2.2H2O-rinsed 0.22 u membrane. RF2 Compound MOPS RbCl CaCl2.2H2O Glycerol Amount/liter 20 ml of 0.5 M (pH6.8) 1

Oliver, Douglas L.

349

Building America 2014 House Simulation Protocols  

Broader source: Energy.gov [DOE]

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

350

CSP 550: Internet Programming Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and Paradigms, 2002.  

E-Print Network [OSTI]

CSP 550: Internet Programming Texts Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and SOAP 9 hours Total 45 hours Edited March 2006 (html, css checks) CSP 550: Internet Programming - CS

Heller, Barbara

351

Internet-based Abuse Prevention Training www.PraesidiumInc.com  

E-Print Network [OSTI]

Internet-based Abuse Prevention Training www.PraesidiumInc.com Quick Start Guide Welcome to Armatus page, an orange arrow will appear. Click the orange arrow to move forward. Do not use your Internet

Subramanian, Venkat

352

Building trust over the Internet : design and prototyping of an advocacy website  

E-Print Network [OSTI]

The Internet has empowered consumers with information, options, and a simple mechanism for transaction. Although the Internet has not completely replaced traditional shopping methods, it has brought about a change in the ...

Ma, Sha, 1981-

2004-01-01T23:59:59.000Z

353

E-Print Network 3.0 - art internet database Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

internet database Search Powered by Explorit Topic List Advanced Search Sample search results for: art internet database Page: << < 1 2 3 4 5 > >> 1 This is a guide to finding...

354

Routing Approach in IPv6 Ubiquitous Internet-Based Home Automation Network  

Science Journals Connector (OSTI)

Internet-based home automation system allows home owners to monitor and control connected devices in the home using any Internet enabled device. The homeís low power and low data rate, ... needs are catered for u...

Ardiansyah Musa Efendi; Oh Seung KyoÖ

2013-01-01T23:59:59.000Z

355

The Use of Internet and Intranet In American Convention and Visitors Bureaus  

Science Journals Connector (OSTI)

The emergence of the Internet/Intranet offers new promise to American Convention and ... extent of the various capabilities of the Internet/Intranet are used by CVBs to augment marketing ... directors have not re...

Y. Y. Yuan; D. R. Fesenmaier; L. XiaÖ

1999-01-01T23:59:59.000Z

356

Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"  

E-Print Network [OSTI]

The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coalóthe PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

Koomey, Jonathan G.

2008-01-01T23:59:59.000Z

357

E-Print Network 3.0 - arthritis-related internet web Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

related internet web Search Powered by Explorit Topic List Advanced Search Sample search results for: arthritis-related internet web Page: << < 1 2 3 4 5 > >> 1 COP 6930 Advanced...

358

Employee Use of the Internet and Acceptable Use Policies in the Academic Workplace: Controlling Abuse while Creating Culture.  

E-Print Network [OSTI]

?? The use of the Internet has grown substantially, especially since the late 1990s. Businesses are relying increasingly on the Internet and intranet as toolsÖ (more)

King, B.J.

2007-01-01T23:59:59.000Z

359

Text-Alternative Version: LED Essentials- Technology, Applications, Advantages, Disadvantages  

Broader source: Energy.gov [DOE]

Below is the text-alternative version of the LED Essentials - Technology, Applications, Advantages, Disadvantages webcast.

360

ARTIGO INTERNET IST estreia laboratrio de medicina regenerativa  

E-Print Network [OSTI]

ARTIGO INTERNET IST estreia laboratório de medicina regenerativa in http://www.boasnoticias.pt/ Data: 2011-9-20 Link: http://www.boasnoticias.pt/not ... IST estreia laboratório de medicina Células Estaminais e Medicina Regenerativa. O objetivo deste espaço vai centrar-se na investigação em

Instituto de Sistemas e Robotica

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Roaming and investments in the mobile internet market  

Science Journals Connector (OSTI)

This model discusses mobile network operators' (MNOs) incentives to invest in their network facilities such as new 4G networks under various regimes of data roaming charge regulation. Given an induced externality of investments (spillovers) due to the ... Keywords: Investment spillover, Mobile internet, National roaming, Regulation

Torben StŁHmeier

2012-09-01T23:59:59.000Z

362

ENERGY MANAGEMENT REAL-TIME MULTI-TIER INTERNET SERVICES  

E-Print Network [OSTI]

ENERGY MANAGEMENT IN REAL-TIME MULTI-TIER INTERNET SERVICES A Dissertation Presented to the faculty This dissertation has been read and approved by the examining Committee: Kevin Skadron (Advisor) Sudhanva Gurumurthi and Applied Science: James H. Aylor (Dean) May 2008 #12;Abstract Energy management only recently emerged

Skadron, Kevin

363

Search Technology Internet Start-Ups Business Computing Companies  

E-Print Network [OSTI]

#12;Search Technology Internet Start-Ups Business Computing Companies Inside Technology Bits Blog engineer at Google, uses statistical analysis of data to help improve the company's search engine ¬Ľ Cellphones, Cameras, Computers and more Personal Tech ¬Ľ Advertise on NYTimes.com Search All NYTimes

Oyet, Alwell

364

Rocky K. C. Chang Internet Infrastructure and Security Group  

E-Print Network [OSTI]

10 July 2012 Measuring and Understanding Internet Performance: A Personal View #12;2 Graduate Forum, SunYat-sen University July 2012 #12;Measuring end-to-end performance Source:Akamai's network performance comparison3 Graduate Forum, SunYat-sen University July 2012 #12;Why measuring network path

Chang, Rocky Kow-Chuen

365

Energy Router: Architectures and Functionalities toward Energy Internet  

E-Print Network [OSTI]

, such as sunlight, wind, hydro, tide, geothermal, and waste [1]. Besides the utilization of renewable energyEnergy Router: Architectures and Functionalities toward Energy Internet Yi Xu, Jianhua Zhang, Wenye Wang, Avik Juneja, and Subhashish Bhattacharya Future Renewable Electric Energy Delivery and Management

Wang, Wenye

366

ARTIGO INTERNET PLUX vence Prmio "Biggest Innovation" em concurso  

E-Print Network [OSTI]

concorreram aos prémios "Biggest Innovation", "Greatest Social Value" e "Potential for Biggest Social ImpactNewsSearch ARTIGO INTERNET PLUX vence Prémio "Biggest Innovation" em concurso internacional in http://www.cienciapt.net Data: 2010-8-16 Link: http://www.cienciapt.net/pt/in ... PLUX vence Prémio "Biggest Innovation" em

Instituto de Sistemas e Robotica

367

Technology acceptance model for internet banking: an invariance analysis  

Science Journals Connector (OSTI)

The technology acceptance model (TAM) has been applied in different contexts to investigate a wide range of information technologies (IT), and a cumulative tradition has already been developed in this stream of research. Most TAM studies have been empirical ... Keywords: internet banking, invariance analysis, technology acceptance model

Vincent S. Lai; Honglei Li

2005-01-01T23:59:59.000Z

368

Acculturation to the global culture and internet adoption  

Science Journals Connector (OSTI)

Globalization is felt in most parts of the world and its effects on culture are becoming a topic of interest to society and in particular to the IS academic community. Our research addresses calls for research on the issue of globalization and its cultural ... Keywords: acculturation, dynamic view of culture, global culture, internet adoption, subjective norm, technology acceptance model, theory of reasoned action

Reem Ayouby; Anne-Marie Croteau; Louis Raymond

2012-11-01T23:59:59.000Z

369

Internet-Enabled Distributed Engineering (Web) Services , J. Cheng1  

E-Print Network [OSTI]

1 Internet-Enabled Distributed Engineering (Web) Services J. Peng1 , D. Liu1 , J. Cheng1 , C.S. Han in Civil Engineering. The web services model is becoming a popular approach for integrating software service approach is a promising paradigm for integrating large engineering software applications. Keywords

Stanford University

370

A dependability evaluation tool for the Internet of Things  

Science Journals Connector (OSTI)

The Internet of Things (IoT) is a promising networking paradigm which immerses objects (cell phones, goods, watches, sensing motes, TVs, etc.) in a worldwide connection. Despite its high degree of applicability, the IoT faces some challenges. One of ...

Ivanovitch Silva; Rafael Leandro; Daniel Macedo; Luiz Affonso Guedes

2013-10-01T23:59:59.000Z

371

ARTIGO INTERNET Professores visitam o maior reactor de Fuso Nuclear  

E-Print Network [OSTI]

ARTIGO INTERNET Professores visitam o maior reactor de Fus√£o Nuclear in http reactor de Fus√£o Nuclear Experi√™ncia aproxima investiga√ß√£o das futuras gera√ß√Ķes Doze professores do ensino secund√°rio visitaram o maior reactor de fus√£o nuclear da Terra (JET), no Reino Unido, na semana passada

Instituto de Sistemas e Robotica

372

Performance analysis and network path characterization for scalable internet streaming  

E-Print Network [OSTI]

Delivering high-quality of video to end users over the best-effort Internet is a challenging task since quality of streaming video is highly subject to network conditions. A fundamental issue in this area is how real-time applications cope...

Kang, Seong-Ryong

2008-10-10T23:59:59.000Z

373

Information Commons Help Desk Internet / Connectivity Wireless Access  

E-Print Network [OSTI]

Information Commons Help Desk Internet / Connectivity ¬Ľ Wireless Access ID #1912 Connecting in the Username and Password fields.5. Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help on this entry Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help

Boonstra, Rudy

374

Triple Play Support for the Next Generation Internet Mario Baldi  

E-Print Network [OSTI]

opportunity to information providers or, at least, be economically self-sustainable. In other words, Internet of accessing any type of information: it must be a profitable business or, at least, economically self- sustainable. In order to achieve this objective, services people are willing to pay for must be offered over

Baldi, Mario

375

Using the Internet to Stay Informed about Energy  

E-Print Network [OSTI]

and Oil Contract Information ....................................... http://apollo.osti.gov/htrnUeia4st2a.htm1 GasWEB Home Page ...................................................................................... http://www.gasweb.orglgasweb ... in 1997. My INTERNET e-mail address is jnp@unicomp.net. ENERGY HOMEPAGES Government: .................................................... DOE EREN - Energy Efficiency http://www.eren.doe.gov...

Phillips, J.

1996-01-01T23:59:59.000Z

376

ATLAS2000 Atlases of the Future in Internet M. Friedrich  

E-Print Network [OSTI]

ATLAS2000 ­ Atlases of the Future in Internet M. Friedrich (mafri@ipg.uni-freiburg.de) M. Melle the ecological system earth. Until recently the traditional atlas has been the pri- mary tool for collection and dissemination of geographical knowledge about the earth. To advance to concepts of the atlas it is necessary

Reiterer, Harald

377

ANALYSIS OF INTERNET TOPOLOGY DATA Hao (Johnson) Chen  

E-Print Network [OSTI]

ANALYSIS OF INTERNET TOPOLOGY DATA by Hao (Johnson) Chen B.E. in Computer Science, Shen Zhen OF SCIENCE In the School of Computing Science © Hao (Johnson) Chen 2004 SIMON FRASER UNIVERSITY April 2004, without permission of the author. #12;Approval Name: Hao (Johnson) Chen Degree: Master of Science Title

Trajkovic, Ljiljana

378

Has the ice man arrived? Tact on the Internet  

E-Print Network [OSTI]

Has the ice man arrived? Tact on the Internet Jonathan Grudin, UC Irvine and Microsoft Research. Eugene O'Neill's play The Ice Man Cometh outlines a series of calamities that occur when his characters the graded corrections via e- mail. The students produced a counter- proposal: After grading an exercise

Hearst, Marti

379

The Internet-What's Really in it for Teachers  

Science Journals Connector (OSTI)

......the filing system idea into an Intranet. An Intranet is simply a kind of internal...system but using all the same technologies as the Internet. No access...stuff again, but here with an Intranet system we have a genuine opportunity......

BRYAN DYE

1998-06-01T23:59:59.000Z

380

Review of Internet Service Providers and Peering Matthew Renzelmann  

E-Print Network [OSTI]

Review of Internet Service Providers and Peering Matthew Renzelmann February 11, 2007 1 Introduction This paper discusses the issues that lead ISPs to con- sider peering or transit arrangements with one an- other. Norton considers the technical reasons for peering as well as the financial

Akella, Aditya

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

PROVISIONING AND ANALYSIS OF APPLICATION-SPECIFIC INTERNET MEASUREMENTS  

E-Print Network [OSTI]

S metrics need to be sampled with strict periodicity for accurate network weather forecasting. To addressS) metrics (e.g., delay and loss) and estimation techniques such as forecasting for initial selection, measurement scheduling techniques are presented that provision QoS metrics on the Internet with the accuracy

Calyam, Prasad

382

The GIS Manual 1 The Integration of Internet GIS  

E-Print Network [OSTI]

The GIS Manual 1 CHAPTER 48 The Integration of Internet GIS and Wireless Mobile GIS Ming, centralized GIS architecture, to an open, distributed geographic information services (GIServices) framework. With advances in computer networking and wireless communication technology, GIS is moving toward an integration

Tsou, Ming-Hsiang

383

Herding cats:Ü modelling Quality of Service for Internet applications  

Science Journals Connector (OSTI)

...Quality of Service; performance engineering 1. Introduction In this paper...erent rates. For exam- ple, audio, video, gaming and data applications...the meantime, the Internet Engineering Task Force continues to build...quality of real-time multimedia audio and video. Poster presented...

2000-01-01T23:59:59.000Z

384

Turbo King: Framework for Large-Scale Internet Delay Measurements  

E-Print Network [OSTI]

servers (which is called cache pollution) and requires large traffic overhead when deployed in large consuming half the bandwidth needed by King and reducing the impact of cache pollution by several orders building an all-to-all delay matrix between approximately 220, 000 BGP prefixes advertised in the Internet

Loguinov, Dmitri

385

Energy Internet -- Towards Smart Grid 2.0  

Science Journals Connector (OSTI)

Price rising of energy and the limitation of fossil fuel makes it an inevitable tendency to introduce distributed energy such as renewable energy to the existing supply system in the future. Different players, such as power generation, transmission, ... Keywords: energy internet, smart grid, energy router, distributed generation

Junwei Cao, Mingbo Yang

2013-12-01T23:59:59.000Z

386

Protocol, Site Leads - May 2011 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

387

Building Technologies Office: Open-Protocol Platform for Commercial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Open-Protocol Platform Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project to someone by E-mail Share Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Facebook Tweet about Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Twitter Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Google Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Delicious Rank Building Technologies Office: Open-Protocol Platform for

388

Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety (Text Safety (Text Alternative Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications Newsletter Program Presentations Multimedia Conferences & Meetings

389

Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cars (Text Cars (Text Alternative Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications Newsletter Program Presentations Multimedia Conferences & Meetings

390

Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Storage (Text Storage (Text Alternative Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications Newsletter Program Presentations Multimedia Conferences & Meetings

391

Five Deaths Resulting from Abuse of Dextromethorphan Sold Over the Internet  

Science Journals Connector (OSTI)

......obtained from the same internet supplier in each...dextromethorphan abuse and toxicity. The...Fatal Outcome Humans Internet Male Marketing legislation...Substance-Related Disorders blood Young Adult 99 Dextromethorphan...obtained from the same internet supplier in each...dextromethorphan abuse and toxicity. The......

Barry K. Logan; Gary Goldfogel; Rebecca Hamilton; James Kuhlman

2009-03-01T23:59:59.000Z

392

Addressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet  

E-Print Network [OSTI]

. In the face of potential abuse or other malice, it seems clear that future Internet designs need to addressAddressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet David jtw@lcs.mit.edu Ted Faber USC ISI faber@isi.edu ABSTRACT A system as complex as the Internet can only

Faber, Ted

393

OurStory: Exploring the Sky From the Internet to Outer Space  

E-Print Network [OSTI]

OurStory: Exploring the Sky From the Internet to Outer Space Read the "Directions" sheets for step Guide, page 1 of 2 #12;OurStory: Exploring the Sky From the Internet to Outer Space Parent Guide, page 2 (attached) Computer with Internet access Pen or pencil More information at http

Mathis, Wayne N.

394

OPPORTUNITIES FOR COMPUTERAIDED INSTRUCTION IN PHONETICS AND SPEECH COMMUNICATION PROVIDED BY THE INTERNET  

E-Print Network [OSTI]

BY THE INTERNET M. Huckvale 1 , C. Benoit 2 , C. Bowerman 3 , A. Eriksson 4 , M. Rosner 5 , M. Tatham 6 , B. Williams 7 Computer Aided Learning and Use of the Internet Working Group SOCRATES Thematic Network available on the Internet could be exploited in the education of phonetics and speech communication

Edinburgh, University of

395

ELISA: European Linkage between Internet Integrated and Differentiated Services over ATM  

E-Print Network [OSTI]

Internet does not guarantee Quality of Service for user flows, which prevents the provision of good qualityELISA: European Linkage between Internet Integrated and Differentiated Services over ATM T. V. Do-Fokus Abstract Nowadays we are witnessing the growth of Internet at an unprecedented rate. However, the current

396

Internet Evolution and Social Impact Sara Kiesler, Robert Kraut, Jonathon Cummings, Bonka Boneva,  

E-Print Network [OSTI]

that many people, especially those with good social resources, have integrated the Internet--they become instantly popular. If communication is so important to Internet users, there is good reasonChapter xx Internet Evolution and Social Impact Sara Kiesler, Robert Kraut, Jonathon Cummings

397

ETH TIK-NR. 118, JULY 2001 1 A Spectral Analysis of the Internet Topology  

E-Print Network [OSTI]

. Finally, a good understanding of the Internet topology can lead to improvements in network topologyETH TIK-NR. 118, JULY 2001 1 A Spectral Analysis of the Internet Topology Danica Vukadinovi¬īc, Polly Huang, Thomas Erlebach Abstract-- In this paper we investigate properties of the Internet topology

Huang, Polly

398

The Extensive Challenges of Internet Application Measurement Martin Arlitt Carey Williamson  

E-Print Network [OSTI]

interested in learning more about Internet measurement, the book by Crovella and Krishnamurthy [1] is a goodThe Extensive Challenges of Internet Application Measurement Martin Arlitt Carey Williamson The Internet has grown dramatically and evolved significantly over the past 10 years. While this growth

Williamson, Carey

399

A framework for flowbased accounting on the Internet HansWerner Braun  

E-Print Network [OSTI]

for accounting in the Internet reflects its historical status as bulk­funded good for the academic communityA framework for flow­based accounting on the Internet Hans­Werner Braun hwb@sdsc.edu San Diego describe steps toward an accounting mechanism to attribute Internet resource consumption based on service

Polyzos, George C.

400

Sales Taxes on the Internet: When and How to Tax? Ozlem Uzuner Lee McKnight  

E-Print Network [OSTI]

, the Internet are considered. This paper discusses sales and use taxes for electronic services and goodsSales Taxes on the Internet: When and How to Tax? Ozlem Uzuner Lee McKnight Massachusetts Institute As a first attempt to tax electronic commerce, many countries applied the existing tax laws to Internet

Uzuner, √?zlem

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

OPPORTUNITIES FOR COMPUTER-AIDED INSTRUCTION IN PHONETICS AND SPEECH COMMUNICATION PROVIDED BY THE INTERNET  

E-Print Network [OSTI]

BY THE INTERNET M. Huckvale1 , C. Benoit2 , C. Bowerman3 , A. Eriksson4 , M. Rosner5 , M. Tatham6 , B. Williams7 Computer Aided Learning and Use of the Internet Working Group SOCRATES Thematic Network in Phonetics of teaching and learning. This paper investigates how resources currently available on the Internet could

Edinburgh, University of

402

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control  

E-Print Network [OSTI]

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control Lars Rasmusson present the idea to let agents handle security issues in Internet markets. The motivation for this is the difficulties in having external or centralized control over a system as open as the Internet. The agents use

403

Measuring the Cost of Scalability and Reliability for Internet-based, server-centered applications  

E-Print Network [OSTI]

1 Measuring the Cost of Scalability and Reliability for Internet-based, server- centered, a centralized approach to Internet-based application development is not scalable and also not dependable. This paper presents a decentralized approach to dependable Internet based application development, consisting

Newcastle upon Tyne, University of

404

Endpoint-Based Routing Strategies for Improving Internet Performance and Resilience  

E-Print Network [OSTI]

to guarantee good end-to-end performance in the future Internet. We believe that the contributionsEndpoint-Based Routing Strategies for Improving Internet Performance and Resilience Aditya Akella, of any sponsoring institution, the U.S. government or any other entity. #12;Keywords: Internet routing

405

Sustaining the Internet with hyperbolic mapping Marian Bogu~na,1  

E-Print Network [OSTI]

. INTRODUCTION In the Information Age, the Internet is becoming a de facto public good, akin to roads, airportsSustaining the Internet with hyperbolic mapping Mari¬īan Bogu~n¬īa,1 Fragkiskos Papadopoulos,2, Kallipoleos 75, Nicosia 1678, Cyprus 3 Cooperative Association for Internet Data Analysis (CAIDA), University

California at San Diego, University of

406

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd,  

E-Print Network [OSTI]

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd, with contributions Introduction This note contains a discussion about formulating the research problem for Internet research the implications of these assumptions in formulating problems in Internet re- search. This process would aim

Floyd, Sally

407

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd,  

E-Print Network [OSTI]

Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd, with contributions Introduction This note contains a discussion about formulating the research problem for Internet research the implications of these assumptions in formulating problems in Internet re­ search. This process would aim

Floyd, Sally

408

Internet Size Measurements Edoardo Biagioni, Peter Hinely, Chun Liu, Xinmin Wang  

E-Print Network [OSTI]

Internet Size Measurements Edoardo Biagioni, Peter Hinely, Chun Liu, Xinmin Wang January 2000 and the performance of the Internet. Our measurements and techniques are designed to reveal the number of hosts 2000, on the order of 23 million hosts are connected to the Internet. The mean distance from our

Biagioni, Edoardo S.

409

Measurement and Interpretation of Voice Traffic on the Internet N. F. Maxemchuk S. Lo  

E-Print Network [OSTI]

Measurement and Interpretation of Voice Traffic on the Internet N. F. Maxemchuk S. Lo AT&T Labs ­ Research Lucent Tech. ­ Bell labs ABSTRACT The Internet is being used to carry voice conversations describe the results of a set of measurements on intrastate, cross country, and international Internet

Maxemchuk, Nicholas F.

410

The Workshop on Active Internet Measurements (AIMS) kc@caida.org  

E-Print Network [OSTI]

The Workshop on Active Internet Measurements (AIMS) Report kc claffy CAIDA kc@caida.org Marina Internet is a perpetually challenging task for technical, economic and policy reasons, which leaves empirical grounding. On February 12-13, 2009, CAIDA hosted the Workshop on Ac- tive Internet Measurements

California at San Diego, University of

411

EndpointBased Routing Strategies for Improving Internet Performance and Resilience  

E-Print Network [OSTI]

to guarantee good end­to­end performance in the future Internet. We believe that the contributionsEndpoint­Based Routing Strategies for Improving Internet Performance and Resilience Aditya Akella, of any sponsoring institution, the U.S. government or any other entity. #12; Keywords: Internet routing

Akella, Aditya

412

Mapping the reasons for resistance to Internet banking: A means-end approach  

Science Journals Connector (OSTI)

Although Internet banking has been widely adopted in developed countries, there is still a group of customers resisting the services. In other words, Internet banking, although proven to be a successful innovation, has still not become adopted by the ... Keywords: ATM, Banking, Consumer behaviour, Innovation resistance, Internet

Tuire Kuisma; Tommi Laukkanen; Mika Hiltunen

2007-04-01T23:59:59.000Z

413

Communication strategies to overcome functional and psychological resistance to Internet banking  

Science Journals Connector (OSTI)

This paper aims to investigate how customers experiencing different kinds of resistance to Internet banking perceive the information and guidance offered by the service provider. A postal survey was conducted and 251 effective responses from Internet ... Keywords: Adoption, Banking, Consumer behavior, Internet, Resistance

Tommi Laukkanen; Suvi Sinkkonen; Pekka Laukkanen

2009-04-01T23:59:59.000Z

414

Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users  

Science Journals Connector (OSTI)

An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping efforts have derived the network structure, at the level of interconnected autonomous ... Keywords: as-level topology, bgp, internet measurement, traceroute

Kai Chen; David R. Choffnes; Rahul Potharaju; Yan Chen; Fabian E. Bustamante; Dan Pei; Yao Zhao

2009-12-01T23:59:59.000Z

415

Business Models for Monetizing Internet Applications and Web Sites: Experience, Theory, and Predictions  

Science Journals Connector (OSTI)

Almost all attempts to date to monetize Internet applications targeted at individuals have focused on natural extensions of traditional media or traditional retailing. Most are either some form of consumer-focused advertising or of consumer-focused e-commerce. ... Keywords: Business Models For The Internet, Future Of Online Advertising, Monetizing The Internet, Strategic Information Systems

Eric Clemons

2009-09-01T23:59:59.000Z

416

The electronic version is the official version of this policy. Page 1 of 5 Fraud Policy  

E-Print Network [OSTI]

The electronic version is the official version of this policy. Page 1 of 5 i Fraud Policy the University's position with respect to fraud, including fraud committed for the benefit of the University; b) impose a duty on University employees to report a suspicion of fraud as defined by this policy; c

Habib, Ayman

417

MAPSS Version 1.0 Available  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MAPSS (Mapped Atmosphere-Plant-Soil System Model) Version 1.0 Available MAPSS (Mapped Atmosphere-Plant-Soil System Model) Version 1.0 Available The ORNL NASA DAAC is please to announce the release of a new vegetation distribution model product, MAPSS: Mapped Atmosphere-Plant-Soil System Model, Version 1.0. The MAPSS model was developed by the Pacific Northwest Research Station USDA Forest Service and has been used extensively by the IPCC (Intergovernmental Panel on Climate Change) in regional and global assessments of climate change impacts on vegetation. The MAPSS model simulates the potential natural vegetation that could exist on any upland site in the world under present, past, or future climate change. It operates on the fundamental principal that ecosystems will tend to maximize the leaf area that can be supported at a site by available soil

418

2014 Building America House Simulation Protocols  

SciTech Connect (OSTI)

As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

2014-03-01T23:59:59.000Z

419

Flow and Telepresence contributing to Internet Abuse: Differences according to Gender and Age  

Science Journals Connector (OSTI)

Abstract Flow describes immersive tendencies to Internet activities, and Telepresence defines the level one is absorbed in his virtual environment. The aim of this study was twofold: (a) to test whether and how Flow and Telepresence may contribute to Internet Abuse and (b) to examine group differences in Internet Abuse, Flow and Telepresence according to gender and age among adolescents. The sample consisted of 1609 adolescents, with a mean age of 16†years old. Internet Abuse was assessed with the Internet Addiction Test (Young, 1998), Flow with the Flow Questionnaire (Chen, Wigand, & Nilan, 1999) and Telepresence with the Presence II questionnaire (Witmer & Singer, 1998). Findings revealed that Flow and Telepresence were related with Internet Abuse with Telepresence positively moderating the effect of Flow. Considering group differences, males were at higher risk of Internet Abuse and were more likely to experience Flow and Telepresence, while older adolescents scored higher only in Telepresence.

Vasilis Stavropoulos; Kyriaki Alexandraki; Frosso Motti-Stefanidi

2013-01-01T23:59:59.000Z

420

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Greenhouse Gas Protocol Initiative: Sector Specific Tools | Open Energy  

Open Energy Info (EERE)

Gas Protocol Initiative: Sector Specific Tools Gas Protocol Initiative: Sector Specific Tools Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Sector Specific Tools Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Industry, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity[1] The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion[2] The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources[3]

422

Separable states improve protocols with restricted randomness  

E-Print Network [OSTI]

It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterise the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models and separable, i.e. disentangled, states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that in particular, separable states may improve the so-called random access codes, which is a class of communication problems where one party tries to read a portion of the data held by another distant party in presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

T. K. Chuan; T. Paterek

2014-10-07T23:59:59.000Z

423

Fibred Coalgebraic Logic and Quantum Protocols  

E-Print Network [OSTI]

Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

Daniel Marsden

2014-12-30T23:59:59.000Z

424

Chapter 18: Variable Frequency Drive Evaluation Protocol  

SciTech Connect (OSTI)

An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

Romberger, J.

2014-11-01T23:59:59.000Z

425

Explaining investors' reaction to internet security breach using deterrence theory  

Science Journals Connector (OSTI)

This study uses the deterrence theory to explain investors' behaviour towards the announcement of internet security breaches in the public media. Using the event study methodology, we compute the abnormal returns over a three day window. We then use decision tree induction to investigate how firm type and time affect the likelihood that an attack would lead to abnormal returns. The results reveal that investors are more likely to react negatively to announcements involving internet firms. In addition, investors are more likely to react negatively to more recent attacks. We argue that managers, especially in Net firms, should develop effective mechanisms to address security breach since investors interpret a security breach as management's failure to deter computer abusers from violating organisational security policies and controls. From a theoretical perspective, we demonstrate that event study research can use theory to explain investor's behaviour towards announcement of events in the public media.

Francis Kofi Andoh-Baidoo

2013-01-01T23:59:59.000Z

426

Chemistry on the Internet:? The Library on Your Computer  

Science Journals Connector (OSTI)

Hope is on the horizon, and the authors of ďWeaving a Better WebĒ paint a picture of the Web at the end of the millennium that uses open standards with DHTML, style sheets, a document object model, and XML in conjunction with HTML 4.0 to solve the problems commonly experienced with HTML today. ... 37 Using robots to prowl the Internet and bring back for indexing huge volumes of information, the Internet search engines have given users both enormous delight at the wealth of information available and great frustration at their relative lack of ability to fine-tune a search. ... 41 All pages manually submitted to AltaVista as well as pages brought back that day by Digital's robot, Scooter, are indexed each day and added to the database. ...

Gary Wiggins

1998-10-22T23:59:59.000Z

427

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network [OSTI]

Services Administration. 10 IEA is the International Energy Agency. ESL-IC-08-10-11 Proceedings of the Eighth International Conference for Enhanced Building Operations, Berlin, Germany, October 20-22, 2008 2 The resultant protocols are intended to provide... Building Operations, Berlin, Germany, October 20-22, 2008 3 Chapter 1: Energy (Authors: MacDonald, Haberl). In Chapter 1 the protocols for measuring the building?s energy useare presented. These protocols begin with acollection of facility information...

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

428

XML-based security for JXTA core protocols  

Science Journals Connector (OSTI)

JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a satisfactory ... Keywords: JXTA, P2P computing, PRP, XML, XMLdsig, XMLenc, ad hoc computing, authenticity, integrity, multi-hop computing, non-repudiation, peer, peer group, peer resolver protocol, peer-to-, pervasive computing, privacy, security

Joan Arnedo-Moreno; Jordi Herrera-Joancomarti

2010-12-01T23:59:59.000Z

429

Stratgie internet et pilotage de projets d'entreprise  

E-Print Network [OSTI]

;2 Strat√©gie internet et pilotage de projets d'entreprise UFR Sciences et Technologies PR√?SENTATION Objectifs √† l'intersection des technologies de l'information et de la communication, de la conduite de projet mesure de conduire et de r√©aliser l'ing√©nierie et l'int√©gration des plates formes Intranet, dont la

Sart, Remi

430

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Stationary Combustion Guidance[1] The Greenhouse Gas Protocol tool for stationary combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

431

Formal Modelling and Analysis of the NORM Multicast Protocol  

E-Print Network [OSTI]

Formal Modelling and Analysis of the NORM Multicast Protocol Using Real-Time Maude Elisabeth Lien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 iii #12;2.3.2 Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

√?lveczky, Peter Csaba

432

Security Communications Protocol Ad Hoc Working Group | Department...  

Office of Environmental Management (EM)

Protocol Ad Hoc Working Group More Documents & Publications Overview for Newcomers Isotope Program Transportation Shipping Radioactive Waste by Rail from Brookhaven National...

433

Protocol, Appraisal Process Guide - April 2008 | Department of...  

Broader source: Energy.gov (indexed) [DOE]

of Independent Oversight Appraisal Process Protocols, which describe the overall philosophy, scope, and general procedures applicable to all Independent Oversight appraisal...

434

DOE Transportation Protocols Topic Group Summary of Second Conference  

Broader source: Energy.gov (indexed) [DOE]

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

435

DOE Transportation Protocols Topic Group Conference Call Summary...  

Broader source: Energy.gov (indexed) [DOE]

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

436

The Greenhouse Gas Protocol Initiative: Measurement and Estimation...  

Open Energy Info (EERE)

Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of...

437

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...  

Open Energy Info (EERE)

search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion AgencyCompany Organization: World Resources...

438

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...  

Open Energy Info (EERE)

search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources AgencyCompany Organization: World Resources...

439

TEC Working Group Topic Groups Archives Protocols Conference...  

Office of Environmental Management (EM)

Conference Call Summaries TEC Working Group Topic Groups Archives Protocols Conference Call Summaries Conference Call Summaries May 13, 1999 April 8, 1999 March 1, 1999 More...

440

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of...

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Chapter 5, Residential Furnaces and Boilers Evaluation Protocol...  

Office of Environmental Management (EM)

primarily in single-family homes and multifamily buildings with individual heating systems for each dwelling unit. This protocol does not cover integrated heating and water...

442

A search for quantum coin-flipping protocols using optimization ...  

E-Print Network [OSTI]

Mar 3, 2014 ... We conduct two kinds of search: one for protocols. ?Department of ..... This operation maps a probability vector to a quantum state, see Sub-.

2014-03-02T23:59:59.000Z

443

NEMVP: North American energy measurement and verification protocol  

SciTech Connect (OSTI)

This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

NONE

1996-03-01T23:59:59.000Z

444

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

445

Protocol, Test Inspectors Guide - March 2008 | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide This Emergency...

446

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

447

Office of Environment, Safety and Health Assessments Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Office of Environment, Safety and Health Assessments Protocol, Development and Maintenance of Criteria Review and Approach Documents, June 2014 Office of Environment, Safety and...

448

BPA's proposed oversupply management protocol, Attachment P Narrative...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

O N 1 Oversupply Management Protocol A. Background The Bonneville Power Administration ("BPA") operates the Federal Columbia River Power System ("FCRPS") as an integrated...

449

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...  

Open Energy Info (EERE)

Purchased Electricity Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity AgencyCompany...

450

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Broader source: Energy.gov (indexed) [DOE]

Accelerated Ash-Loading Protocol for Diesel Particulate Filters Bruce G. Bunting and Todd J. Toops Oak Ridge National Laboratory Adam Youngquist and Ke Nguyen University of...

451

U-268: Oracle Database Authentication Protocol Discloses Session...  

Broader source: Energy.gov (indexed) [DOE]

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

452

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

Broader source: Energy.gov [DOE]

Webinar slides from the U.S. Department of Energy Fuel Cell Technologies Office webinar, "Hydrogen Refueling Protocols," held February 22, 2013.

453

Enhanced Internet firewall design using stateful filters final report  

SciTech Connect (OSTI)

The current state-of-the-art in firewall design provides a lot of security for company networks, but normally at the expense of performance and/or functionality. Sandia researched a new approach to firewall design which incorporates a highly stateful approach, allowing much more flexibility for protocol checking and manipulation while retaining performance. A prototype system was built and multiple protocol policy modules implemented to test the concept. The resulting system, though implemented on a low-power workstation, performed almost at the same performance as Sandia`s current firewall.

Hutchins, J.A. [Sandia National Labs., Livermore, CA (United States). Infrastructure and Networking Research Dept.; Simons, R.W. [Sandia National Labs., Albuquerque, NM (United States). Decision Support Systems Architectures

1997-08-01T23:59:59.000Z

454

June 04, 2008 Version 1.0  

E-Print Network [OSTI]

June 04, 2008 Version 1.0 WebConnect 2.0 TM Reference Guide #12;Reference Guide for WebConnectTM 2.0 i Contents Chapter 1: Overview of WebConnectTM 2.0 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Illustration of WebConnectTM 2

Rodriguez, Carlos

455

User's Guide Version 1.2  

E-Print Network [OSTI]

for a given data file MUST be in the same directory in order for it to load properly. This is usually Science, Sanes Lab. Both versions use the same format of data from the application Slice and are only compatible to Slice data or other data file of the same format. This manual is not a continuation

456

Hypothetical Temporal Reasoning with History (Extended Version)  

E-Print Network [OSTI]

a history--encoding based methodology developed by Chomicki for checking dynamic database integrityHypothetical Temporal Reasoning with History Encoding (Extended Version) Marcelo Arenas constraints into a situation­calculus based specification of database updates as proposed by Reiter. By doing

Bertossi, Leopoldo

457

pdf version of the entry Time Machines  

E-Print Network [OSTI]

pdf version of the entry Time Machines http://plato.stanford.edu/archives/win2010/entries/time-machine, Stanford, CA 94305 Time Machines Copyright c 2010 by the authors John Earman and Christian W¨uthrich All rights reserved. Copyright policy: https://leibniz.stanford.edu/friends/info/copyright/ Time Machines

W√ľthrich, Christian

458

Version Auteur Monitoring the International Standardization Process  

E-Print Network [OSTI]

Version Auteur Monitoring the International Standardization Process Theoretical Choices are materialized in standards. The main purpose is to design both a methodology and specific text mining tools to investigate these standards. These tools will be implemented in a platform designed to provide cartographic

Boyer, Edmond

459

The COCONUT API Version 2.32  

E-Print Network [OSTI]

The COCONUT API Version 2.32 Reference Manual Hermann Schichl University of Vienna, Department Contents 1 COCONUT API Namespace Index 1 2 COCONUT API Hierarchical Index 1 3 COCONUT API Compound Index 8 4 COCONUT API File Index 12 5 COCONUT API Namespace Documentation 15 6 COCONUT API Class

Schichl, Hermann

460

Final version 11 April 1997 Connecticut  

E-Print Network [OSTI]

Final version 11 April 1997 Connecticut Juror Selection East Hartford Hartford West Hartford Avon, and the whole of Section 7 and Appendix B need major revision. Report to the Connecticut Public Defender The questionnaire data 12 3 Measures of disparity 17 4 The JIS data 19 5 Federal data 26 6 Connecticut population

Pollard, David

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Version:April 2014 Wind Energy EFA  

E-Print Network [OSTI]

Version:April 2014 Wind Energy EFA Wind energy has become a major source of clean energy. Wind backgrounds and knowledge of wind energy fundamentals are needed to fill these jobs. The Wind Energy EFA prepares students for a career in wind energy, and allows for completing all requirements

Kusiak, Andrew

462

Yeast Transformation (introducing plasmid vector into a yeast strain): This protocol is a modification (shortened version) of "The BEST  

E-Print Network [OSTI]

the cell pellet in 1 ml of 100 mM lithium acetate and incubate for 5 minutes at 30O C. 10. Swirl tube in this order (the order is important because the PEG "shields" the cells from the high concentration of lithium acetate): · 240 microliters of PEG (50% w/v) · 36 microliters of 1.0 M LiOAc · 5 microliters of salmon

463

A Comparison of Education, Business, and Engineering Undergraduate Studentsí Internet Use and their Experience, Confidence, and Competence in Using New Literacies of the Internet  

E-Print Network [OSTI]

, and engineering majors .............................................................................. 24 3.2 Number and percent of education students? majors ................................... 25 3.3 Number and percent of business students? majors... ............................................................. 33 4.1 Number and percent of underclassmen?s high school-related Internet use: Overall frequency of Internet use .............................................................. 35 4.2 Number and percent of underclassmen...

Kim, Su Yeon

2011-08-08T23:59:59.000Z

464

To appear in Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, August 2013. Internet Censorship in Iran: A First Look  

E-Print Network [OSTI]

, August 2013. Internet Censorship in Iran: A First Look Simurgh Aryan Aryan Censorship Project aryan censorship in Iran based on network measurements conducted from a major Iranian ISP during the lead up Introduction Iran is known as one of the leading suppressors of Internet freedom. Reporters Without Borders

Eustice, Ryan

465

Carbon footprint of movie distribution via the internet: a Swedish case study  

Science Journals Connector (OSTI)

Abstract Peer-to-peer (P2P) has been suggested as an energy-efficient means of movie distribution, indicating potential environmental benefits. An alternative option for the user would be to stream the movie from an internet protocol television (IPTV) solution. This paper presents an assessment of the carbon footprint of these two alternatives. When studying the environmental impacts of a product (goods or services), it is important to adopt a life cycle perspective in order to avoid moving the potential impacts from one part of the life cycle to another. Therefore the carbon footprint was assessed with a screening life cycle assessment (LCA). The results show that end-use equipment and distribution (in both P2P and IPTV systems) are clearly key aspects. Both manufacturing and use are important. In the use phase, the electricity for using the end-use devices and for distribution is the main contributor to the carbon footprint. For the distribution, another major contributor to the carbon footprint is the construction work involved in installing cables. Downlink/uplink bandwidth and movie size have a major influence on the environmental impact related to watching a movie by P2P, as the total time for which end-use devices need to be used is critical. Movie size determines the impact related to the distribution. In terms of the carbon footprint from the two systems, the P2P system has a higher impact, mainly caused by the end-use devices. DownlinkĖuplink bandwidth and movie size determine the overall impact of the P2P system. The carbon footprint from P2P systems could be lowered either through higher uplink bandwidth or through decreased movie size.

Elisabeth Hochschorner; GyŲrgy DŠn; Ňsa Moberg

2014-01-01T23:59:59.000Z

466

Linear Operators and Their Spectra Web Supplement, version 5  

E-Print Network [OSTI]

Linear Operators and Their Spectra Web Supplement, version 5 E Brian Davies Department to put a copy on the web, in the hope that some readers may be encouraged to buy the paper version. #12

Davies, Brian

467

Linear Operators and Their Spectra Web Supplement, version 21  

E-Print Network [OSTI]

Linear Operators and Their Spectra Web Supplement, version 21 E Brian Davies Department to put a copy on the web, in the hope that some readers may be encouraged to buy the paper version. #12

Davies, Brian

468

National Residential Efficiency Measures Database Unveiled (text version)  

Broader source: Energy.gov [DOE]

Below is the text version of the Webinar titled "National Residential Efficiency Measures Database Unveiled," originally presented on January 18, 2011. In addition to this text version of the audio...

469

Retrofit Financial Analysis Tool, Version 1.1.01  

Broader source: Energy.gov [DOE]

Download a zip file containing the Retrofit Financial Analysis Tool, Version 1.1.01, and an example version of the Tool filled in with sample data. Save the file to your computer before opening..

470

SOW and Key Performance Parameters (KPP) Handbook Final Version...  

Broader source: Energy.gov (indexed) [DOE]

SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

471

AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS  

Broader source: Energy.gov (indexed) [DOE]

AVIATION BOARD OF DIRECTORS AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS The Department of Energy strives to manage its Aviation Program toward the highest standards of safety, efficiency, fairness in contracting, preservation of competition in the private sector, open communication, prudent property management, and the best examples of resource management. Toward these ends, the Department has established a management structure led by a Board of Directors comprising active Federal employee aviation managers from the Department. AUTHORITY: The following authorities serve as basis for this structure and system: Office of Management and Budget Circular A-126, FMR 102.33, DEAR 109, DOE Order 440.2B, Aviation Management Review Team Report, March 1999, and Secretary of Energy Appointment and Delegation of Authority, April 15, 1999.

472

High Performance Computing Data Center Metering Protocol  

Broader source: Energy.gov (indexed) [DOE]

High Performance High Performance Computing Data Center Metering Protocol Prepared for: U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Federal Energy Management Program Prepared by: Thomas Wenning Michael MacDonald Oak Ridge National Laboratory September 2010 ii Introduction Data centers in general are continually using more compact and energy intensive central processing units, but the total number and size of data centers continues to increase to meet progressive computing requirements. In addition, efforts are underway to consolidate smaller data centers across the country. This consolidation is resulting in a growth of high-performance computing facilities (i.e. - supercomputers) which consume large amounts of energy to support the numerically intensive

473

Neonatal euthanasia: Lessons from the Groningen Protocol  

Science Journals Connector (OSTI)

Summary Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns.

A.A. Eduard Verhagen

2014-01-01T23:59:59.000Z

474

Building America House Simulation Protocols (Revised)  

Broader source: Energy.gov (indexed) [DOE]

House House Simulation Protocols Robert Hendron and Cheryn Engebrecht National Renewable Energy Laboratory Revised October 2010 Prepared by the National Renewable Energy Laboratory For the U.S. Department of Energy Building Technologies Program ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process,

475

OSCAR: Object Security Architecture for the Internet of Things  

E-Print Network [OSTI]

with each client. The load translates into increased energy consumption and a shortened lifetime of devices the Cooja emulator. We show significant energy savings at constrained servers and reasonable delays. We also a concern. Well designed IP security protocol suites have been ported to constrained devices of Io

Paris-Sud XI, Université de

476

Home Energy Score Post-Pilot Update Webinar (Text Version)  

Broader source: Energy.gov [DOE]

Below is the text version of the webinar, Home Energy Score Post-Pilot Update, presented in September 2011.

477

EECBG Strategies and Considerations Approaching Lenders Webcast (Text Version)  

Broader source: Energy.gov [DOE]

Below is a text version of the December 3, 2009 What Drives Consumer Borrowing for Energy Efficiency?

478

Structuring Credit Enhancements for Clean Energy Finance Programs (Text Version)  

Broader source: Energy.gov [DOE]

Below is a text version of the January 15, 2010 Structuring Loan Loss Reserve Funds for Clean Energy Finance Programs.

479

Strengthening the Workforce in Better Buildings Neighborhoods (Text Version)  

Broader source: Energy.gov [DOE]

Below is a text version of the Better Buildings Neighborhood Program "Strengthening the Workforce in Better Buildings Neighborhoods" video.

480

Text-Alternative Version: LEDs for Interior Office Applications  

Broader source: Energy.gov [DOE]

Below is the text-alternative version of the LEDs for Interior Office Applications webcast, held March 18, 2010.

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Text-Alternative Version: LED Replacements for Linear Fluorescent Lamps  

Broader source: Energy.gov [DOE]

Below is the text-alternative version of the "LED Replacements for Linear Fluorescent Lamps" webcast, held June 20, 2011.

482

Text-Alternative Version: Evaluating LED Street Lighting Solutions  

Broader source: Energy.gov [DOE]

Below is the text-alternative version of the Evaluating LED Street Lighting Solutions webcast, held July 20, 2010.

483

Indoor airPLUS Construction Specifications Version 1 (Rev. 02)  

Broader source: Energy.gov [DOE]

Indoor airPLUS Construction Specifications Version 1 (Rev. 02), November 2013, from the U.S. Environmental Protection Agency.

484

DOE Challenge Home Comprehensive Building Science Webinar (Text Version)  

Broader source: Energy.gov [DOE]

Below is the text version of the webinar, DOE Zero Energy Ready Home - Comprehensive Building Science, presented in March 2014.

485

Tax Deduction Qualified Software Tas version 9.3.1  

Broader source: Energy.gov [DOE]

Information about the Tas version 9.3.1 qualified computer software and federal tax incentive requirements for commercial buildings.

486

Text-Alternative Version: Pedestrian-Friendly Nighttime Lighting Webinar  

Broader source: Energy.gov [DOE]

Below is the text-alternative version of the "Pedestrian-Friendly Nighttime Lighting" webcast, held November 19, 2013.

487

EECLP Webinar #1: Overview and Cost Effectiveness-- Text Version  

Broader source: Energy.gov [DOE]

Below is the text version of the webinar, EECLP Webinar #1: Overview and Cost Effectiveness, presented in December 2014.

488

Text-Alternative Version: Smithsonian GATEWAY Demonstration Video  

Broader source: Energy.gov [DOE]

Following is a text version of a video about the GATEWAY demonstration project at the Smithsonian American Art Museum.

489

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self-Organization  

E-Print Network [OSTI]

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self of the HELLO protocol. This makes this HELLO protocol very important for wireless networks especially for self- organizing the network. Most of layer-3 protocols assume an ideal MAC layer. In such a case, HELLO protocol

Paris-Sud XI, Université de

490

Adapting a delay-based protocol to heterogeneous environments  

E-Print Network [OSTI]

with different mixes of PERT and SACK protocols. Delay-based protocols, being less aggressive, have problems in fully utilizing a highspeed link while operating alone. We show that a single PERT flow can fully utilize a high-speed, high-delay link. We performed...

Kotla, Kiran

2008-10-10T23:59:59.000Z

491

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network [OSTI]

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

492

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

493

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network [OSTI]

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

494

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

495

MP-DSM: A Distributed Cross Layer Network Control Protocol  

E-Print Network [OSTI]

MP-DSM: A Distributed Cross Layer Network Control Protocol Daniel C. O'Neill, Yan Li, and Stephen, transmitter powers and delay. The Direct Step Method, DSM, which captures this interaction and con- trols system performance under TCP or other protocols has been described in [1]. DSM finds optimal routes

496

Implementing a Low Power TDMA Protocol Over 802.11  

E-Print Network [OSTI]

, or wind energy to power themselves and their wireless network interface. The availability of low- powerImplementing a Low Power TDMA Protocol Over 802.11 Jim Snow, Wu-chi Feng, Wu-chang Feng (jsnow and implementation of our protocol and its performance compared to standard 802.11 in terms of throughput, power

497

Practical quantum oblivious transfer and bit commitment protocols  

E-Print Network [OSTI]

We propose a practical quantum oblivious transfer and a bit commitment protocols which replace the single-photon source with weak coherent pulses and allow error and loss in channel and detectors. These protocols can be realized with available optoelectronic apparatus.

Ya-Qi Song; Li Yang

2015-02-09T23:59:59.000Z

498

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

499

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

500

Uniform Leader Election Protocols for Radio Networks Koji Nakano  

E-Print Network [OSTI]

Uniform Leader Election Protocols for Radio Networks #3; Koji Nakano School of Information Science be distinguished by serial or manufacturing number. The leader election problem asks to designate one of the station as leader. A leader election protocol is said to be uniform if in each time slot every station

Nakano, Koji