Powered by Deep Web Technologies
Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

as appropriate. Consider using in solicitations involving M&O as appropriate. Consider using in solicitations involving M&O contracts, management of major facilities, and any acquisition which could involve the direct or indirect purchase of Information Technology equipment that uses Internet Protocol (IP) technology. DOE-H-__ COMPLIANCE WITH INTERNET PROTOCOL VERSION 6 (IPV6) IN ACQUIRING INFORMATION TECHNOLOGY (JULY 2011) This contract involves the acquisition of Information Technology (IT) that uses Internet Protocol (IP) technology. The Contractor agrees that (1) all deliverables that involve IT that uses IP (products, services, software, etc.) comply with IPv6 standards and interoperate with both IPv6 and IPv4 systems and products; and (2) it has IPv6 technical support for fielded product management, development and

2

NFS version 4 Protocol  

Science Conference Proceedings (OSTI)

NFS (Network File System) version 4 is a distributed file system protocol which owes heritage to NFS protocol versions 2 [RFC1094] and 3 [RFC1813]. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2000-12-01T23:59:59.000Z

3

Unified Theory of Relativistic Identification of Information in a Systems Age: Proposed Convergence of Unique Identification with Syntax and Semantics through Internet Protocol version 6  

E-Print Network (OSTI)

This paper proposes to utilize internet protocol version six (IPv6) to uniquely identify not only things (objects) but also processes, relationships (syntax, semantics) and interfaces (sensors). Convergence of identification ...

Datta, Shoumen

2008-07-31T23:59:59.000Z

4

Accountable internet protocol (aip)  

Science Conference Proceedings (OSTI)

This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding ... Keywords: accountability, address, internet architecture, scalability, security

David G. Andersen; Hari Balakrishnan; Nick Feamster; Teemu Koponen; Daekyeong Moon; Scott Shenker

2008-08-01T23:59:59.000Z

5

Network File System (NFS) version 4 Protocol  

Science Conference Proceedings (OSTI)

The Network File System (NFS) version 4 is a distributed filesystem protocol which owes heritage to NFS protocol version 2, RFC 1094, and version 3, RFC 1813. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2003-04-01T23:59:59.000Z

6

Internet Security Glossary, Version 2  

E-Print Network (OSTI)

not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007).

R. Shirey

2006-01-01T23:59:59.000Z

7

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service...

8

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

9

Using standard Internet Protocols and applications in space  

Science Conference Proceedings (OSTI)

This paper discusses approaches for using standard Internet technologies to meet the communication needs of future space missions. It summarizes work done by the Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC since 1997. That ... Keywords: Internet in space, Internet space missions, Space communication protocols, Space shuttle STS-107, Spacecraft networking

Keith Hogie; Ed Criscuolo; Ron Parise

2005-04-01T23:59:59.000Z

10

Internet Printing Protocol/1.1: Model and Semantics  

Science Conference Proceedings (OSTI)

This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document ...

R. Herriot; R. deBry; S. Isaacson; P. Powell / T. Hastings

2000-09-01T23:59:59.000Z

11

EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE.  

E-Print Network (OSTI)

??The current internet architecture allows hosts to send arbitrary IP packets across a network, which may not reflect valid source address information. IP spoofing and… (more)

Maaz, Khan

2011-01-01T23:59:59.000Z

12

Internet voting protocol based on implicit data security  

E-Print Network (OSTI)

This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security of votes depends on multiple servers such that each vote is divided into partitions and these partitions are distributed among the servers, all of which need to be brought together to reconstruct the votes. Such a protocol has potential applications in bargaining and electronic commerce.

Parakh, Abhishek

2010-01-01T23:59:59.000Z

13

The intergroup protocols: Scalable group communication for the internet  

SciTech Connect

Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

Berket, K.

2000-11-01T23:59:59.000Z

14

An experiment using Mec: Eurotri, Physical Layer Protocol Implemented Version  

E-Print Network (OSTI)

This work describes a part of a cooperation between LaBRI and Schlumberger Industries for developping eletricity meters. This part deals with the design and the conception of communication protocols to provide a distributed kernel with safe rendezvous primitives. The implemented version of the protocol is detailed and its safety proven using Mec. Contents 1 Industrial Environment 2 2 Hardware and Inter-Processor Communication 2 2.1 Physical Aspects : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2 Potential Problems and Solutions : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.1 Loss of data due to polling rate : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.2 Loss or spontaneous creation of data on the line : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 3 2.2.3 Transmission errors : : : : : : : : : : : : : : : : : : : : :...

Didier Egay Paul; Alain Griffault; Jean-pierre Radoux

1994-01-01T23:59:59.000Z

15

Voice over Internet Protocol (VoIP) : the dynamics of technology and regulation  

E-Print Network (OSTI)

"What Voice over Internet Protocol (VoIP) is going to do is start to weaken the foundation of the way we've done things for 100 years...Congress already should be discussing the next telecom bill," said Federal Communications ...

Vaishnav, Chintan

2006-01-01T23:59:59.000Z

16

Study of Heart and Renal Protection (SHARP) Final Protocol (Version 5: 12th  

E-Print Network (OSTI)

1 Study of Heart and Renal Protection (SHARP) Final Protocol (Version 5: 12th July 2005) DOES with pre-existing coronary heart disease, large-scale randomized trials have demonstrated that lowering LDL, arrhythmia, and heart failure) may not be as dependent on cholesterol levels. Finally, the long-term safety

Johnston, Michael

17

Commercial Building Energy Asset Score Program Overview and Technical Protocol (Version 1.1)  

SciTech Connect

The U.S. Department of Energy (DOE) is developing a voluntary national scoring system for commercial buildings to help building owners and managers assess a building’s energy-related systems independent of operations. The goal of the score is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system, known as the Commercial Building Energy Asset Score, will allow building owners and managers to compare their building infrastructure against peers and track building upgrades over time. The system will also help other building stakeholders (e.g., building investors, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset scoring tool. The alternative methods that were considered prior to developing the current approach are described in the Program Overview and Technical Protocol Version 1.0.

Wang, Na; Goel, Supriya; Makhmalbaf, Atefe

2013-08-09T23:59:59.000Z

18

Security Implications and Considerations for Serial to Internet Protocol-Based Supervisory Control and Data Acquisition Migration  

Science Conference Proceedings (OSTI)

This technical update report describes the requirements, risks, benefits, vulnerabilities, and potential compliance issues with North American Electric Reliability Corporation (NERC) critical infrastructure protection (CIP) standards that utilities might face when migrating their supervisory control and data acquisition (SCADA) systems from serial-based communications to communications based on the Internet protocol (IP) suite. The report is based on a survey of several utilities that have taken ...

2012-09-20T23:59:59.000Z

19

Securing Block Storage Protocols over IP  

Science Conference Proceedings (OSTI)

This document discusses how to secure block storage and storage discovery protocols running over IP (Internet Protocol) using IPsec and IKE (Internet Key Exchange). Threat models and security protocols are developed for iSCSI (Internet Protocol Small ...

B. Aboba; J. Tseng; J. Walker; V. Rangan; F. Travostino

2004-04-01T23:59:59.000Z

20

The Internet of Things: Key Applications and Protocols, 2nd edition  

Science Conference Proceedings (OSTI)

An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the ...

Olivier Hersent; David Boswarthick; Omar Elloumi

2012-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices  

DOE Patents (OSTI)

A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

Kouchri, Farrokh Mohammadzadeh

2012-11-06T23:59:59.000Z

22

Advanced overview of version 2.0 of the open archives initiative protocol for metadata harvesting  

Science Conference Proceedings (OSTI)

This tutorial is a follow-on to "Introduction to the Open Archives Initiative Protocol for Metadata Harvesting" (OAI-PMH), given earlier the same day. It is appropriate for those who have completed the earlier tutorial or are already familiar with OAI-PMH. ... Keywords: OAI, OAI-PMH, harvesting, interoperability, metadata

Michael L. Nelson; Herbert Van de Sompel; Simeon Warner

2002-07-01T23:59:59.000Z

23

Commercial Building Energy Asset Score System: Program Overview and Technical Protocol (Version 1.0)  

SciTech Connect

The U.S. Department of Energy (DOE) is developing a national voluntary energy asset score system that includes an energy asset score tool to help building owners evaluate their buildings with respect to the score system. The goal of the energy asset score system is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system will allow building owners and managers to compare their building infrastructure against peers and track building upgrade progress over time. The system can also help other building stakeholders (e.g., building operators, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from their operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset score tool. This report also describes alternative methods that were considered prior to developing the current approach. Finally, this report describes a few features of the program where alternative approaches are still under evaluation.

Wang, Na; Gorrissen, Willy J.

2013-01-11T23:59:59.000Z

24

Technical Assessment of State-of-the-Art, Internet-Based Commercial Building Control Systems: Unrestricted version  

Science Conference Proceedings (OSTI)

Advancements in building automation and controls technology, most notably Internet-enablement, are providing ever more powerful information and control capabilities to the fingertips of building owners and managers. It would serve utilities well to understand this technology, become acquainted with leading vendors and products on the market, and consider potential business opportunities that the technology might enable. This study is intended help a utility marketing professional, such as an account man...

2004-06-24T23:59:59.000Z

25

5 Internet Services & Protocols Example Internet  

E-Print Network (OSTI)

Why spend a whole course studying it?! ? Arguably one of the most important developments of the last 2 decades » Information Sharing

Jasleen Kaur; Meaningless Facebook; Timeline Photo

2013-01-01T23:59:59.000Z

26

Proactive techniques for correct and predictable Internet routing  

E-Print Network (OSTI)

The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

Feamster, Nicholas G. (Nicholas Greer), 1979-

2006-01-01T23:59:59.000Z

27

Research challenges towards the Future Internet  

Science Conference Proceedings (OSTI)

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture ... Keywords: Cognitive networks, Data and communication security, Future internet, Green networking, Internet architecture and protocols, Optical networks, System security, Wireless networks

Marco Conti; Song Chong; Serge Fdida; Weijia Jia; Holger Karl; Ying-Dar Lin; Petri Mähönen; Martin Maier; Refik Molva; Steve Uhlig; Moshe Zukerman

2011-12-01T23:59:59.000Z

28

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

29

Internet Fish  

E-Print Network (OSTI)

I have invented "Internet Fish," a novel class of resource-discovery tools designed to help users extract useful information from the Internet. Internet Fish (IFish) are semi-autonomous, persistent information brokers; ...

LaMacchia, Brian A.

1996-08-01T23:59:59.000Z

30

BMC Health Services Research BioMed Central Study protocol A randomised trial of an internet weight control resource: The UK  

E-Print Network (OSTI)

© 2003 Kirk et al; licensee BioMed Central Ltd. This is an Open Access article: verbatim copying and redistribution of this article are permitted in all media for any purpose, provided this notice is preserved along with the article's original URL. Background: Obesity treatment is notoriously unsuccessful and one of the barriers to successful weight loss reported by patients is a lack of social support. The Internet offers a novel and fast approach to the delivery of health information, enabling 24-hour access to help and advice. However, much of the health information available on the Internet is unregulated or not written by qualified health professionals to provide unbiased information. The proposed study aims to compare a web-based weight loss package with traditional dietary treatment of obesity in participants. The project aims to deliver high quality information to the patient and to evaluate the effectiveness of this information, both in terms of weight loss outcomes and cost-effectiveness. Methods: This study is a randomised controlled trial of a weight loss package against usual care provided within General Practice (GP) surgeries in Leeds, UK. Participants will be recruited via posters placed in participating practices. A target recruitment figure of 220 will enable 180 people to be recruited (allowing for 22 % dropout). Participants agreeing to take part in the study will be

Weight Control Trial [isrctn; Sara Fl Kirk; Emma L Harvey; Aine Mcconnon; Jennie E Pollard; Darren C Greenwood; James D Thomas; Joan K Ransley Open Access; Jennie E Pollard; Darren C Greenwood; James D Thomas; Joan K Ransley

2003-01-01T23:59:59.000Z

31

The Evolution of the Internet Community and the "Yet-to-Evolve" Smart Grid Community: Parallels and Lessons-to-be-Learned  

E-Print Network (OSTI)

The Evolution of the Internet Community and the “Yet-to-The Evolution of the Internet Community and the “Yet-to-Keywords: Smart Grid, Internet protocols, Internet ecosphere

McParland, Charles

2010-01-01T23:59:59.000Z

32

The Internet and the Millennium Problem (Year 2000)  

Science Conference Proceedings (OSTI)

The Year 2000 Working Group (WG) has conducted an investigation into the millennium problem as it regards Internet related protocols. This investigation only targeted the protocols as documented in the Request For Comments Series (RFCs). This investigation ...

P. Nesser, II

1999-06-01T23:59:59.000Z

33

Configuring Networks and Devices with Simple Network Management Protocol (SNMP)  

Science Conference Proceedings (OSTI)

This document is written for readers interested in the Internet Standard Management Framework and its protocol, the Simple Network Management Protocol (SNMP). In particular, it offers guidance in the effective use of SNMP for configuration management. ...

M. MacFaden; D. Partain; J. Saperia; W. Tackabury

2003-04-01T23:59:59.000Z

34

Building an "Engery Internet": Internet Protocols for the Smart ...  

Science Conference Proceedings (OSTI)

... elements of the Smart Grid—from electrical transmission networks and generation systems down to the small household appliances that they will ...

2012-05-21T23:59:59.000Z

35

Internet 0  

E-Print Network (OSTI)

The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

Krikorian, Raffi Chant, 1978-

2004-01-01T23:59:59.000Z

36

Components of Internet GIS  

E-Print Network (OSTI)

Internet GIS: a research field A research and application area that utilize Internet and other Internetworking systems to facilitate:

Imad Abugessaisa; M. Tsou

2007-01-01T23:59:59.000Z

37

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

38

Antikerezeption im Internet.  

E-Print Network (OSTI)

??Die Dissertation 'Antikerezeption im Internet' untersucht, wie das Wissen über die Antike im Medium Internet erscheint. Zunächst wird mit Rekurs auf die konstruktivistische Systemtheorie ein… (more)

Bechthold-Hengelhaupt, Tilman

2012-01-01T23:59:59.000Z

39

On inferring and characterizing internet routing policies  

Science Conference Proceedings (OSTI)

Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although a significant number of studies have been focused on the Internet topology, ... Keywords: BGP, routing policies, traffic engineering

Feng Wang; Lixin Gao

2003-10-01T23:59:59.000Z

40

Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice  

Science Conference Proceedings (OSTI)

Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting ... Keywords: Interactive & Multimedia, Internet, Networking

Rogelio Martinez Perea

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Effective Protocols for Mobile Communications and Networking  

SciTech Connect

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

42

Record Sheet For The Internet  

NLE Websites -- All DOE Office Websites (Extended Search)

Record Sheet for Internet Information Student Names Brief Description of Information Internet URL...

43

BGP-lens: patterns and anomalies in internet routing updates  

Science Conference Proceedings (OSTI)

The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stability of Internet routing. Here we make two contributions: firstly we ... Keywords: BGP monitoring, anomalies, patterns, self-similarity

B. Aditya Prakash; Nicholas Valler; David Andersen; Michalis Faloutsos; Christos Faloutsos

2009-06-01T23:59:59.000Z

44

PROTOCOLS MANUAL  

NLE Websites -- All DOE Office Websites (Extended Search)

as your end-user's. For instance, if you always issue the same set of commands when you enter SPIRES, you can assemble the commands in a protocol and add it, with your account as...

45

Strategy formulation by internet entrepreneurs.  

E-Print Network (OSTI)

??[Truncated abstract] Poor strategy development by Internet entrepreneurs has been linked to the failure of Internet firms. Unfortunately, little is known about successful Internet entrepreneurs… (more)

Mahadim, Batiah

2011-01-01T23:59:59.000Z

46

CogNet: an architectural foundation for experimental cognitive radio networks within the future internet  

Science Conference Proceedings (OSTI)

This paper describes a framework for research on architectural tradeoffs and protocol designs for cognitive radio networks at both the local network and the global internetwork levels. Several key architectural issues for cognitive radio networks are ... Keywords: cognitive radio, internet architecture, network protocols, protocols

Dipankar Raychaudhuri; Narayan B. Mandayam; Joseph B. Evans; Benjamin J. Ewy; Srinivasan Seshan; Peter Steenkiste

2006-12-01T23:59:59.000Z

47

A Simulation Model of the DOCSIS Protocol  

Science Conference Proceedings (OSTI)

The number of households and businesses using hybrid fiber coaxial cable networks for Internet access is rapidly approaching 40 million in the United States. The cable industry has standardized on a single medium access control (MAC) and physical layer ... Keywords: Data Over Cable Service Interface Specification (DOCSIS), Simulation methods, Transmission Control Protocol (TCP) performance, broadband access, hybrid fiber coaxial cable networks

Jim Martin; James Westall

2007-02-01T23:59:59.000Z

48

Overview of the InterGroup protocols  

SciTech Connect

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

2001-03-01T23:59:59.000Z

49

Reading Comprehension - Internet Safety  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Safety Twenty hours days weeks years ago, kids in school had never even heard of the internet. Now, I'll bet you can't find a single person in your school who...

50

Internet Control Architecture for Internet-Based Personal Robot  

Science Conference Proceedings (OSTI)

This paper proposes a novel direct internet control architecture for internet-based personal robot, which is insensitive to the inherent internet time delay. The personal robot can be controlled using a simulator provided at a local site. Since the internet ... Keywords: internet control, internet interface, personal robot, remote control, telerobotics

Kuk-Hyun Han; Sinn Kim; Yong-Jae Kim; Jong-Hwan Kim

2001-03-01T23:59:59.000Z

51

Entanglement percolation on a quantum internet with scale-free and clustering characters  

SciTech Connect

The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

Wu Liang; Zhu Shiqun [School of Physical Science and Technology, Soochow University, Suzhou, Jiangsu 215006 (China)

2011-11-15T23:59:59.000Z

52

Security Survey of Internet Browsers Data Managers  

E-Print Network (OSTI)

The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

Boja, Catalin

2011-01-01T23:59:59.000Z

53

BGP-S: a protocol for terrestrial and satellite network integration in network layer  

Science Conference Proceedings (OSTI)

To accomplish network layer integration of terrestrial and satellite IP networks, special exterior gateway protocols are needed. In this work, a new exterior gateway protocol called Border Gateway Protocol-Satellite version (BGP-S) is introduced that ... Keywords: BGP-4, IP-based routing, exterior gateway protocol, satellite networks

Eylem Ekici; Chao Chen

2004-09-01T23:59:59.000Z

54

Proof of Security of a High-Capacity Quantum Key Distribution Protocol  

E-Print Network (OSTI)

We prove the security of a high-capacity quantum key distribution protocol over noisy channels. By using entanglement purification protocol, we construct a modified version of the protocol in which we separate it into two consecutive stages. We prove their securities respectively and hence the security of the whole protocol.

Xiao-Wei Zhang; Kai Wen; Gui Lu Long

2005-12-25T23:59:59.000Z

55

Impact of Internet Literacy, Internet Addiction Symptoms, and Internet Activities on Academic Performance  

Science Conference Proceedings (OSTI)

This study examines the interrelationships among Internet literacy, Internet addiction symptoms, Internet activities, and academic performance. Data were gathered from a probability sample of 718 children and adolescents, aged 9-19, in Hong Kong, using ... Keywords: Internet activities, Internet addiction symptoms, Internet literacy, academic performance, adolescents and children

Louis Leung; Paul S. N. Lee

2012-11-01T23:59:59.000Z

56

U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Novell GroupWise Internet Agent "Content-Length" Integer 1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September 17, 2012 - 6:00am Addthis PROBLEM: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability PLATFORM: The vulnerability is confirmed in version 8.0.2 HP3 and reported in version 2012. Other versions may also be affected. ABSTRACT: A vulnerability was reported in Novell GroupWise Internet Agent reference LINKS: Novell SecurityTracker Alert ID: 1027536 Secunia Advisory SA50622 CVE-2012-0271 IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted request with the HTTP 'Content-Length' header value of '-1' to the administration interface via

57

Legal Status of the Internet: Are There Lessons to be Learnt from Domain Names and Trade Marks Disputes?  

E-Print Network (OSTI)

and trademark registration system, it is important to understand their concept and definition. A Domain name is basically a database function that works like Legal Status of the Internet 91 telephone directory and number assigned to it. In simple term... to information about an organization. Therefore, when an Internet user types in a domain name such as www.Bhutanstudies.com that domain name is translated into the Internet Protocol number, which can be in a numerical form.8 To remember lengthy Internet...

Dubgyur, Lungten

2002-01-01T23:59:59.000Z

58

Internet Users’ Glossary  

E-Print Network (OSTI)

Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them. Acknowledgements This document is the work of the User Glossary Working Group of the

G. Malkin; Xylogics Inc; T. Laquey Parker

1993-01-01T23:59:59.000Z

59

Central Internet Database (CID)  

Office of Environmental Management (EM)

RADCM-13 Reports Central Internet Database CID Photo Banner RADCM-13 Archived Reports By State California Adobe PDF Document Colorado Adobe PDF Document Idaho Adobe PDF Document...

60

Internet Banking System Prototype  

E-Print Network (OSTI)

Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained through Internet Banking may mirror products and services offered through other bank delivery channels. In this paper, Internet Banking System Prototype has been proposed in order to illustrate the services which is provided by the Bank online services.

Alnaqeib, Rami; Jalab, Hamid A; Zaidan, M A; Hmood, Ali K

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Towards a pluralist internet using a virtual machine server for network customization  

Science Conference Proceedings (OSTI)

The Internet success is frequently credited to its basic pillars, the end-to-end argument and the TCP/IP protocol stack. Nevertheless, this simple architecture does not facilitate the addition of new services such as mobility, security, and quality of ... Keywords: future internet, virtual machine server, virtualization

Rafael dos Santos Alves; Miguel Elias M. Campista; Luís Henrique M. K. Costa; Otto Carlos M. B. Duarte

2012-11-01T23:59:59.000Z

62

Internet of Food  

Science Conference Proceedings (OSTI)

Today, more and more "things" have an IP identity and thus are able to communicate with each other though the Internet. According to the definition of WIKIPEDIA [1], The IP identity of things (or Internet of Things), refers to uniquely identifiable objects ...

Jean-Paul Kouma; Li Liu

2011-10-01T23:59:59.000Z

63

Depleted UF6 Internet Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

DUF6 Guide DU Uses DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home Internet Resources Depleted UF6 Internet Resources Links...

64

Licklider Transmission Protocol- Security Extensions Status of This Memo  

E-Print Network (OSTI)

This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. IESG Note This RFC is not a candidate for any level of Internet Standard. It represents the consensus of the Delay Tolerant Networking (DTN) Research Group of the Internet Research Task Force (IRTF). It may be considered for standardization by the IETF in the future, but the IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. See RFC 3932 for more information.

S. Farrell; M. Ramadas; S. Burleigh

2008-01-01T23:59:59.000Z

65

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.gov/upload/noticeoog.jsp" Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "MONTHLY NATURAL GAS MARKETER SURVEY" "FORM EIA-910" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

66

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" Microsoft Internet Explorer 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "MONTHLY UNDERGROUND GAS STORAGE REPORT" "FORM EIA-191" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

67

A Clean Slate Design of Internet's Congestion Control Algorithm  

E-Print Network (OSTI)

A Clean Slate Design of Internet's Congestion Control Algorithm Nandita Dukkipati (Collaborators. Slow additive increase means flows take a long time to acquire spare capacity 2. Unsustainable large delay 1 RT T p = 3/(2w2 ) #12;Explicit Control Protocol (XCP) · Proposed by Katabi et. al Sigcomm 2002

Duffy, Ken

68

Two decades of internet video streaming: A retrospective view  

Science Conference Proceedings (OSTI)

For over two decades, video streaming over the Internet has received a substantial amount of attention from both academia and industry. Starting from the design of transport protocols for streaming video, research interests have later shifted to the ... Keywords: HTTP streaming, P2P streaming, Video streaming, cloud computing, multicast, multimedia streaming, social media

Baochun Li, Zhi Wang, Jiangchuan Liu, Wenwu Zhu

2013-10-01T23:59:59.000Z

69

Solar Webinar Text Version  

Energy.gov (U.S. Department of Energy (DOE))

Download the text version of the audio from the DOE Office of Indian Energy webinar on solar renewable energy.

70

Firewall Enhancement Protocol (FEP)  

Science Conference Proceedings (OSTI)

Internet Transparency via the end-to-end architecture of the Internet has allowed vast innovation of new technologies and services [1]. However, recent developments in Firewall technology have altered this model and have been shown to inhibit innovation. ...

M. Gaynor; S. Bradner

2001-04-01T23:59:59.000Z

71

Performance comparison of router assisted congestion control protocols: XCP vs. RCP  

Science Conference Proceedings (OSTI)

In the current Internet, network overload is prevented by the congestion control of the Transmission Control Protocol (TCP). The traditional TCP congestion control is an end-to-end mechanism that suffers from some inherent shortcomings. A design alternative ...

Magnus Proebster; Michael Scharf; Simon Hauger

2009-03-01T23:59:59.000Z

72

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

73

Delta Coherence Protocols: The Home Update Protocol  

SciTech Connect

We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

Williams, C.; Reynolds, P.F.; de Supinoki, B.

2000-07-21T23:59:59.000Z

74

Internet Topology over Time  

E-Print Network (OSTI)

There are few studies that look closely at how the topology of the Internet evolves over time; most focus on snapshots taken at a particular point in time. In this paper, we investigate the evolution of the topology of the Autonomous Systems graph of the Internet, examining how eight commonly-used topological measures change from January 2002 to January 2010. We find that the distributions of most of the measures remain unchanged, except for average path length and clustering coefficient. The average path length has slowly and steadily increased since 2005 and the average clustering coefficient has steadily declined. We hypothesize that these changes are due to changes in peering policies as the Internet evolves. We also investigate a surprising feature, namely that the maximum degree has changed little, an aspect that cannot be captured without modeling link deletion. Our results suggest that evaluating models of the Internet graph by comparing steady-state generated topologies to snapshots of the real data ...

Edwards, Benjamin; Stelle, George; Forrest, Stephanie

2012-01-01T23:59:59.000Z

75

Airborne Internet : market & opportunity  

E-Print Network (OSTI)

The purpose of this thesis to evaluate the opportunity for service provider entry and of the airborne internet, to analyze the disruptive impact technology used by AirCell and AeroSat has had on the development of an ...

Bhadouria, Anand

2007-01-01T23:59:59.000Z

76

The intergroup protocols: Scalable group communication for the internet  

E-Print Network (OSTI)

A TP object regarding control processes A and B . ttl : Thedistance in TTL between control process A and controlidenti er of the sender. ttl : The TTL with which the

Berket, Karlo

2000-01-01T23:59:59.000Z

77

Tech Beat March 2, 2010  

Science Conference Proceedings (OSTI)

... M. Liu, V. Bandaru, JP ... Protocol version 6 (IPv6), the next generation Internet Protocol. ... analyzes IPv6's new and expanded protocols, services and ...

2010-09-08T23:59:59.000Z

78

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

79

SSH - Secure Login Connections over the Internet  

E-Print Network (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or threekey triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection. 1 Introduction The Internet has become the most economical means for communication between two remote sites. Its uses include comm...

Tatu Ylonen Ssh; Tatu Ylonen; Tatu Ylonen

1996-01-01T23:59:59.000Z

80

SSH - Secure Login Connections over the Internet  

E-Print Network (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or threekey triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection. 1 Introduction The Internet has become the most economical means for communication between two remote sites. Its uses include commun...

Tatu Ylönen

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security Content Automation Protocol (SCAP) Version 1.2 ...  

Science Conference Proceedings (OSTI)

... of the product, then the vendor should enter validation for ... Appendix A lists terms and definitions ... for using the dictionary, such as how to search for a ...

2013-07-25T23:59:59.000Z

82

Financial Metrics Data Collection Protocol, Version 1.0  

SciTech Connect

Brief description of data collection process and plan that will be used to collect financial metrics associated with sustainable design.

Fowler, Kimberly M.; Gorrissen, Willy J.; Wang, Na

2010-04-30T23:59:59.000Z

83

Test Protocol for Smart Inverter Grid Support Functions: Version 1  

Science Conference Proceedings (OSTI)

Smart inverters are capable of providing grid support that is important to accommodate higher penetrations of distributed energy resources (DERs) on the distribution circuits. With the exception of a few countries in Europe, especially Germany, there are currently no clear and consistent performance requirements defined for the smart inverter advanced support functions. Currently, widely adopted grid interconnection standard IEEE Std. 1547 (2003) and the associated conformance test standard IEEE ...

2013-12-20T23:59:59.000Z

84

Internet Engineering Task Force (IETF) Request for Comments: 6521  

E-Print Network (OSTI)

This document describes a home agent-assisted route optimization functionality for the IPv4 Network Mobility Protocol. The function is designed to facilitate optimal routing in cases where all nodes are connected to a single home agent; thus, the use case is route optimization within a single organization or similar entity. The functionality enables the discovery of eligible peer nodes (based on information received from the home agent) and their network prefixes, and the establishment of a direct tunnel between such nodes. Status of This Memo This document is not an Internet Standards Track specification; it is published for examination, experimental implementation, and evaluation. This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at

A. Makela; J. Korhonen

2012-01-01T23:59:59.000Z

85

Characterizing internet scams through underground infrastructure infiltration  

E-Print Network (OSTI)

Charac- terizing Internet Scam Hosting Infrastructure. In2010. [29] Ironport. 2008 Internet Security Trends. http://DrugRevenue) emerge as major Internet threats. http://

Kanich, Christopher William

2012-01-01T23:59:59.000Z

86

Graph Algorithms in the Internet Age  

E-Print Network (OSTI)

given expected degrees. Internet Mathematics, 1(1), 2003. [law relationships of the internet topology. SIGCOMM, pagesto generate annotated internet topologies. SIGCOMM, pages [

Stanton, Isabelle Lesley

2012-01-01T23:59:59.000Z

87

Algorithms for Large-Scale Internet Measurements  

E-Print Network (OSTI)

As the Internet has grown in size and importance to society, it has become increasingly difficult to generate global metrics of interest that can be used to verify proposed algorithms or monitor performance. This dissertation tackles the problem by proposing several novel algorithms designed to perform Internet-wide measurements using existing or inexpensive resources. We initially address distance estimation in the Internet, which is used by many distributed applications. We propose a new end-to-end measurement framework called Turbo King (T-King) that uses the existing DNS infrastructure and, when compared to its predecessor King, obtains delay samples without bias in the presence of distant authoritative servers and forwarders, consumes half the bandwidth, and reduces the impact on caches at remote servers by several orders of magnitude. Motivated by recent interest in the literature and our need to find remote DNS nameservers, we next address Internet-wide service discovery by developing IRLscanner, whose main design objectives have been to maximize politeness at remote networks, allow scanning rates that achieve coverage of the Internet in minutes/hours (rather than weeks/months), and significantly reduce administrator complaints. Using IRLscanner and 24-hour scan durations, we perform 20 Internet-wide experiments using 6 different protocols (i.e., DNS, HTTP, SMTP, EPMAP, ICMP and UDP ECHO). We analyze the feedback generated and suggest novel approaches for reducing the amount of blowback during similar studies, which should enable researchers to collect valuable experimental data in the future with significantly fewer hurdles. We finally turn our attention to Intrusion Detection Systems (IDS), which are often tasked with detecting scans and preventing them; however, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast stealth techniques that can remain virtually undetectable at large-scale. To address these questions, we propose a novel model for the windowexpiration rules of popular IDS tools (i.e., Snort and Bro), derive the probability that existing scan patterns (i.e., uniform and sequential) are detected by each of these tools, and prove the existence of stealth-optimal patterns.

Leonard, Derek Anthony

2010-12-01T23:59:59.000Z

88

Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network  

Science Conference Proceedings (OSTI)

A Dynamic Host Configuration Protocol (DHCP) server is a well-known server deployed at a network to manage Internet Protocol (IP) addresses temporarily rentable to hosts in the network. Besides, a DHCP server provides hosts with important network information ... Keywords: AHCM, ARP, Autoconfiguration, Automatic host configuration, DHCP, Free IP address

Tzu-Chi Huang; Kuo-Chih Chu

2011-11-01T23:59:59.000Z

89

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network (OSTI)

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil. This fact alone tells us that oil is a finite resource, which in turn means that it is subject to depletion1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict

Keeling, Stephen L.

90

A new busy signal-based MAC protocol supporting QoS for ad-hoc networks with hidden nodes  

Science Conference Proceedings (OSTI)

This article presents three versions of a novel MAC protocol for IEEE 802.11 ad-hoc networks called Busy Signal-based Mechanism turned On (BusySiMOn) (This is an extended version of our conference paper: [15]). The key idea of the proposed solution is ... Keywords: EDCA, Hidden nodes, MAC protocol, QoS, Wireless communications

Katarzyna Kosek-Szott; Marek Natkaniec; Andrzej R. Pach

2013-08-01T23:59:59.000Z

91

Internet Evolution and Social Impact  

E-Print Network (OSTI)

Earlier HomeNet publications reported small but reliable negative effects of using the Internet on measures of social involvement and psychological well-being among new Internet users in a sample of Pittsburgh families in 1995--1996. The effects were called a "paradox" because participants in the sample used the Internet heavily for communication, which typically has positive effects on well-being. Since that first study, the Internet changed markedly, giving people much greater choice of contacts, activities, and information.

Sara Kiesler; Robert Kraut; Jonathon Cummings; Vicki Helgeson; Anne Crawford

2002-01-01T23:59:59.000Z

92

An intermittent energy internet architecture  

Science Conference Proceedings (OSTI)

We examine how to re-design the Internet for an energy-constrained future powered by diffuse, intermittent, and expensive power sources. We consider the types of constraints this might place upon the Internet architecture and the manner in which important ... Keywords: energy, internet architecture

Barath Raghavan; David Irwin; Jeannie Albrecht; Justin Ma; Adam Streed

2012-05-01T23:59:59.000Z

93

IPS - Secure Internet Payment System  

Science Conference Proceedings (OSTI)

There are a number of questions one might ask about security of money transactions on the Internet. A first question might be: "Why do we need to protect money transaction on the Internet?" The Internet is an insecure and unreliable communication medium ...

Zoran Djuric

2005-04-01T23:59:59.000Z

94

Internet geolocation: Evasion and counterevasion  

Science Conference Proceedings (OSTI)

Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to ... Keywords: Internet geolocation, Tor, adversarial environment, anonymizing network, evasion

James A. Muir; Paul C. Van Oorschot

2009-12-01T23:59:59.000Z

95

Status of this Memo Time To Live (TTL) Processing in Multi-Protocol Label Switching (MPLS) Networks  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2003). All Rights Reserved. This document describes Time To Live (TTL) processing in hierarchical Multi-Protocol Label Switching (MPLS) networks and is motivated by the need to formalize a TTL-transparent mode of operation for an MPLS label-switched path. It updates RFC 3032, "MPLS Label Stack Encoding". TTL processing in both Pipe and Uniform Model hierarchical tunnels are specified with examples for both "push " and "pop " cases. The document also complements RFC 3270, "MPLS Support of Differentiated Services " and ties together the terminology introduced in that document with TTL processing in hierarchical MPLS networks. Conventions used in this document

P. Agarwal; B. Akyol; Cisco Systems

2003-01-01T23:59:59.000Z

96

Migrating Home Agents Towards Internet-scale Mobility Deployments  

E-Print Network (OSTI)

While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these technologies, in order to hide location changes of the mobile nodes from the rest of the Internet, a specific router called a home agent is used. However, this equipment generates resilience and performance issues such as protocol scalability and longer paths. In order to solve these problems, we describe and analyze a new concept called Home Agent Migration. The main feature of this solution is the distribution of home agents inside the current Internet topology to reduce distances to end-nodes. As is usually done for anycast routing, they advertise the same network prefix from different locations; moreover they also exchange information

Ryuji Wakikawa; Guillaume Valadon

2006-01-01T23:59:59.000Z

97

A Cognitive Radio Based Internet Access Framework for Disaster Response Network Deployment  

E-Print Network (OSTI)

In this paper, we propose a cognitive radio based Internet access framework for disaster response network deployment in challenged environments. The proposed architectural framework is designed to help the existent but partially damaged networks to restore their connectivity and to connect them to the global Internet. This architectural framework provides the basis to develop algorithms and protocols for the future cognitive radio network deployments in challenged environments.

Rehmani, Mubashir Husain; Khalife, Hicham; Fdida, Serge

2010-01-01T23:59:59.000Z

98

Så kommer vi alltid in på internet; Everything concerns internet.  

E-Print Network (OSTI)

?? Internet har i över 20 år påverkat samhällets förutsättningar, så även skolans arbetssätt och undervisningssituation. Förändringarna i samhällssektorn avspeglar sig inte minst i samhällskunskapsämnet… (more)

Dahlström, Täpp Ida

2013-01-01T23:59:59.000Z

99

Commercial Buildings Communications protocols  

Science Conference Proceedings (OSTI)

There are many automation and control protocols in use in commercial building and residential sectors today. For both commercial building and residential sectors there are several thousand manufacturers throughout the world that supply end-use electrical appliances and other building fixtures that communicate using these automation and control protocols. Some of these protocols are based on open standards (for example, BACnet, DALI) while others are semi-proprietary (for example, Zigbee, LonWorks, Modbus...

2008-05-15T23:59:59.000Z

100

House Simulation Protocols Report  

Energy.gov (U.S. Department of Energy (DOE))

Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and...

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Internet Support for Engaged Learning  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Support for Student Engagement in Science Skills and strategies students need to be successful today and in the future are effectively taught through engagement in...

102

Central Internet Database (CID) Home  

Office of Environmental Management (EM)

Banner Welcome to the updated Central Internet Database (CID) The CID is a gateway to waste management and facility information from current and archived Department of Energy...

103

Web Recency Maintenance Protocol  

Science Conference Proceedings (OSTI)

In this paper, we propose a new protocol namely Web Recency Maintenance Protocol (WRMP) that employs "push" mechanism to maintain the currency of the World Wide Web (WWW) at Search Engine (SE) site. As of this writing SEs are adopting "pull" technology, ...

K. Satya Sai Prakash; S. V. Raghavan

2002-12-01T23:59:59.000Z

104

From the internet of computers to the internet of things  

Science Conference Proceedings (OSTI)

This paper discusses the vision, the challenges, possible usage scenarios and technological building blocks of the "Internet of Things". In particular, we consider RFID and other important technological developments such as IP stacks and web servers ... Keywords: RFID, internet of things, smart objects, wireless sensor networks

Friedemann Mattern; Christian Floerkemeier

2010-01-01T23:59:59.000Z

105

QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks  

Science Conference Proceedings (OSTI)

QoS (Quality of Service) guarantee is highly desirable for many service-oriented computer and network applications on the Internet. This paper focuses on the timeliness aspect of QoS, especially the end-to-end delay guarantee. Resource reSerVation Protocol ... Keywords: Quality of Service, end-to-end delay, network simulation, reservation and service protocol

Nong Ye; Xiaoyun Xu; Patrick Hurley

2008-12-01T23:59:59.000Z

106

Office Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Oversight » Safety & Emergency Management Evaluations Services » Oversight » Safety & Emergency Management Evaluations » Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

107

Metadata Efficiency in Versioning File Systems  

Science Conference Proceedings (OSTI)

Versioning file systems retain earlier versions of modified files, allowing recovery from user mistakes or system corruption. Unfortunately, conventional versioning systems do not efficiently record large numbers of versions. In particular, versioned ...

Craig A. N. Soules; Garth R. Goodson; John D. Strunk; Gregory R. Ganger

2003-03-01T23:59:59.000Z

108

Metadata efficiency in versioning file systems  

Science Conference Proceedings (OSTI)

Versioning file systems retain earlier versions of modified files, allowing recovery from user mistakes or system corruption. Unfortunately, conventional versioning systems do not efficiently record large numbers of versions. In particular, versioned ...

Craig A. N. Soules; Garth R. Goodson; John D. Strunk; Gregory R. Ganger

2003-03-01T23:59:59.000Z

109

Network Markup Language Base Schema version 1  

NLE Websites -- All DOE Office Websites (Extended Search)

GFD-R-P.206 GFD-R-P.206 NML-WG nml-wg@ogf.org Jeroen van der Ham, UvA (editor) Freek Dijkstra, SURFsara Roman Łapacz, PSNC Jason Zurawski, Internet2 May 2013 Network Markup Language Base Schema version 1 Status of This Document Grid Final Draft (GFD), Proposed Recommendation (R-P). Copyright Notice Copyright c Open Grid Forum (2008-2013). Some Rights Reserved. Distribution is unlim- ited. Abstract This document describes a set of normative schemas which allow the description of computer network topologies. Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1 Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3 Notational Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

110

Internet governance: A personal perspective  

Science Conference Proceedings (OSTI)

Internet governance is one of the hot issues that emerged during the World Summit on the Information Society (WSIS) in Tunis November 2005. The discussions did not start then but much earlier. This article gives an overview of the International Telecommunciation ... Keywords: ITU, WSIS, governance, internet

Houlin Zhao

2007-01-01T23:59:59.000Z

111

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

112

Information Security Policies Made Easy Version 11, Version 11 edition  

Science Conference Proceedings (OSTI)

Information Security Policies Made Easy, Version 11 is the new and updated version of the gold standard information security policy resource used by over 7000 organizations worldwide. Based on the 25 year consulting and security experience of Charles ...

Charles Cresson Wood; Dave Lineman

2009-09-01T23:59:59.000Z

113

EPICS Version 4 - Implementing Complex Data Types  

SciTech Connect

Through phase 1 and phase 2 SBIR grants, s fully functional I/O Controller and communication protocol for version 4 of EPICS is completed. This new software architecture provides a flexible and extendible architecture. Version 4 is implemented fully in Java. The performance metrics look promising. The final portion of phase 2 is to optimize the communication mechanisms. Subsequent work on different aspects of this are required to provide a viable solutions in various areas. Version 3 of EPICS is able to provide a platform for implementing channel based control, because the channel and attributes for time stamping, alarm, display and control were narrow, well defined, and complete. To extend EPICS functionality beyond this, it is necessary to define attributes needed for archive data, array, image data, and directory services. The proper handling of several array types enables the development of middle layer servers such as orbit and bump control in accelerators. Phase 1 should produce a well defined, reviewed, and agreed upon definition of the metadata required for these services. A Phase 2 grant would provide tools that implemented archiving, general array, imaging, and directory applications.

Marty Kraimer,; John dalesio

2012-11-27T23:59:59.000Z

114

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

115

INTERNET PRIVACY, IG-0493 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home INTERNET PRIVACY, IG-0493 INTERNET PRIVACY, IG-0493 Recently enacted appropriations law required agency Inspectors General to report within 60 days on the collection...

116

Selections: internet voting with over-the-shoulder coercion-resistance  

Science Conference Proceedings (OSTI)

We present Selections, a new cryptographic voting protocol that is end-to-end verifiable and suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in an arbitrary number of elections. We say a system provides ...

Jeremy Clark; Urs Hengartner

2011-02-01T23:59:59.000Z

117

Official Microsoft Internet Explorer 4.0 Book with Cdrom, 2nd edition  

Science Conference Proceedings (OSTI)

From the Publisher:Version 4 is a complete suite of products for communicating and working together via the Internet or intranets. And here you'll learn to work with them all - Outlook Express for e-mail, NetMeeting video and data conferencing. NetShow ...

Bryan Pfaffenberger

1997-10-01T23:59:59.000Z

118

PVWatts Version 1 Technical Reference  

NLE Websites -- All DOE Office Websites (Extended Search)

Meteorological Year (TMY) version 2 or version 3 1 This report is available at no cost from the National Renewable Energy Laboratory (NREL) at www.nrel.govpublications. 3...

119

SCADA protocol vulnerabilities  

Science Conference Proceedings (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

120

The SUPDUP Protocol  

E-Print Network (OSTI)

The SUPDUP protocol provides for login to a remote system over a network with terminal-independent output, so that only the local system need know how to handle the user's terminal. It offers facilities for graphics and ...

Stallman, Richard M.

1983-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

The cacheand-forward network architecture for efficient mobile content delivery services in the future internet  

E-Print Network (OSTI)

This paper presents a novel “cache-and-forward ” (CNF) protocol architecture for mobile content delivery services in the future Internet. The CNF architecture can be implemented as an overlay on top of the Internet Protocol (IP), or as a clean slate protocol for next-generation networks. CNF is based on the concept of store-and-forward routers with large storage, providing for opportunistic delivery to occasionally disconnected mobile users and for in-network caching of content. The proposed CNF protocol uses reliable hop-by-hop transfer of large data files between CNF routers in place of an end-to-end transport protocol like TCP. This approach makes it possible to serve mobile users with intermittent connectivity, while also mitigating selfinterference problems which arise in multi-hop wireless scenarios. Hop-by-hop transport is similarly useful in wired networks where router storage can help to smooth out link congestion bottlenecks which arise in TCP/IP networks. A second key feature of the CNF protocol is the integration of addressbased and content-based routing to support various content delivery modes that take advantage of in-network storage. An overview of the CNF architecture and major protocol components is given, and preliminary performance evaluation results are summarized to validate the main design principles.

Sanjoy Paul; Roy Yates; Dipankar Raychaudhuri; Jim Kurose

2008-01-01T23:59:59.000Z

122

version 3 | OpenEI Community  

Open Energy Info (EERE)

utility Utility Companies utility rate Utility Rates version 1 version 2 version 3 web service Smart meter After several months of development and testing, the next...

123

version 2 | OpenEI Community  

Open Energy Info (EERE)

utility Utility Companies utility rate Utility Rates version 1 version 2 version 3 web service Smart meter After several months of development and testing, the next...

124

version 1 | OpenEI Community  

Open Energy Info (EERE)

utility Utility Companies utility rate Utility Rates version 1 version 2 version 3 web service Smart meter After several months of development and testing, the next...

125

Utility Communications Architecture (UCA (TM)) Version 2.0  

Science Conference Proceedings (OSTI)

EPRI has developed The Utility Communications Architecture (UCA (TM)) to integrate communications for "real-time" utility operations. The UCA is the only existing protocol that provides interoperability among different monitoring and control equipment and interconnectivity among databases for utility operations. The UCA Version 2 Specification has been recently published by the Institute of Electrical and Electronic Engineers (IEEE) Standards Board as Technical Report TR1550. EPRI takes great pride that ...

1999-12-13T23:59:59.000Z

126

An empirical study of TCP/IP performance over ATM1This paper was also presented at the Transport Protocols for High Speed Broadband Networks Workshop, at Globecom'96, in Westminster, London, UK, on 22 November, 1996. 1  

Science Conference Proceedings (OSTI)

This paper outlines some basic performance characteristics of the Transmission Control Protocol/Internet Protocol (TCP/IP) over Asynchronous Transfer Mode (ATM). It also discusses a few solutions to assure acceptable TCP/IP performance over ATM which ... Keywords: ATM, Physical layer convergence protocol, TCP/IP performance

Is?L SebüKtekin; Tony J Bogovic; Padma Krishnaswamy

1998-08-01T23:59:59.000Z

127

Automated Personalization of Internet News  

Science Conference Proceedings (OSTI)

A systems approach to the automatic and adaptive personalization of Internet news is described. Implemented on the client side as a lightweight, transparent software system, this approach is based on implicit user feedback, thereby preserving privacy ...

Aditya V. Sunderam

2002-05-01T23:59:59.000Z

128

Legal aspects of Internet governance reform  

Science Conference Proceedings (OSTI)

The Internet has moved on from its early almost lawless nature. There are now multiple organisations and legal aspects associated with Internet governance. Whether the issue on the Internet is network security, intellectual property rights (IPRs), e-commerce, ... Keywords: ICANN, WGIG, WSIS, cybercrime, framework, governance, internet, law, reform, treaty

David Satola

2007-01-01T23:59:59.000Z

129

Optimal protocols for nonlocality distillation  

Science Conference Proceedings (OSTI)

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

130

Wind Webinar Text Version | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Text Version Wind Webinar Text Version Download the text version of the audio from the DOE Office of Indian Energy webinar on wind renewable energy. Text Version of the DOE Office...

131

BBSLA – Kazakhstan (032610) Kazakh (Global Version ...  

Science Conference Proceedings (OSTI)

BBSLA – Kazakhstan (032610) Kazakh (Global Version 031010) 1 BLACKBERRY SOLUTION ??????????? ???????? ????????????? ...

132

BBSLA - Kazakhstan (032610) Russian (Global Version ...  

Science Conference Proceedings (OSTI)

BBSLA - Kazakhstan (032610) Russian (Global Version 031010) 1 ???????????? ?????????? ?? ????????????? ??????? ...

133

Efficient Data Transfer Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

134

APS Protocol for  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

135

Engineering Technical Training Module - Cable Separation, Version 1.0  

Science Conference Proceedings (OSTI)

This ETTM provides a self-paced, asynchronous learning experience for engineers to be accessed on their own time in their nuclear power plant environment. This training will be used primarily by engineers to train them on cable and wire separation, including the types and classifications of separation used in commercial nuclear power plants. Browser: Internet Explorerversion 7.0/8.0/9.0, Mozilla version 3.0 Operating System: WindowsXP, Vistaand 7 Screen Resolution: 1024 x 768 Animations: AdobeFlash Playe...

2012-08-03T23:59:59.000Z

136

NIST Periodic Table: Version History  

Science Conference Proceedings (OSTI)

... [Type of medium] Available: URL [Access date]. ... Version 4 September 2003, The ionization energy value was updated for Po; fourth printing of NIST ...

2013-05-28T23:59:59.000Z

137

IP Telephony: Deploying VoIP Protocols and IMS Infrastructure, 2nd edition  

Science Conference Proceedings (OSTI)

All you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructureThis book provides a comprehensive and practical overview of the technology behind Internet ...

Olivier Hersent

2010-12-01T23:59:59.000Z

138

BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection  

Science Conference Proceedings (OSTI)

Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of the current botnet detection approaches work only on specific botnet command and control (C&C) protocols ...

Guofei Gu; Roberto Perdisci; Junjie Zhang; Wenke Lee

2008-07-01T23:59:59.000Z

139

Protocols from perceptual observations  

Science Conference Proceedings (OSTI)

This paper presents a cognitive vision system capable of autonomously learning protocols from perceptual observations of dynamic scenes. The work is motivated by the aim of creating a synthetic agent that can observe a scene containing interactions between ... Keywords: Autonomous learning, Cognitive vision, Inductive logic programming, Spatio-temporal reasoning, Symbol grounding, Unsupervised clustering

Chris J. Needham; Paulo E. Santos; Derek R. Magee; Vincent Devin; David C. Hogg; Anthony G. Cohn

2005-09-01T23:59:59.000Z

140

Internet Slang and China's Social Culture: A Case Study of Internet Users in Guiyang.  

E-Print Network (OSTI)

??The number of Chinese Internet users has surpassed 300,000 people over the past decade, and the Internet boom has brought with it an upsurge in… (more)

Draggeim, Alexandra V

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Internet Data Analysis for the Undergraduate Statistics Curriculum  

E-Print Network (OSTI)

Haythornthwaite edts. (2002). The Internet in Everyday Life.Where Mathematics meets the Internet. Notices of the AMS,Internet Data Analysis for the Undergraduate Statitics

Juana Sanchez; Yan He

2011-01-01T23:59:59.000Z

142

Internet ware cloud computing :Challenges  

E-Print Network (OSTI)

After decades of engineering development and infrastructural investment, Internet connections have become commodity product in many countries, and Internet scale "cloud computing" has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internet ware Cloud Computing is termed as the next big thing in the modern corporate world. Apart from the present day software and technologies, cloud computing will have a growing impact on enterprise IT and business activities in many large organizations. This paper provides an insight to cloud computing, its impacts and discusses various issues that business organizations face while implementing cloud computing. Further, it recommends various strategies that organizations need to adopt while migrating to cloud computing. The purpose of this paper is to develop an understanding of cloud computing in the modern world and its impact on organizations and businesse...

Qamar, S; Singh, Mrityunjay

2010-01-01T23:59:59.000Z

143

Internet Data logging and Display  

E-Print Network (OSTI)

The current energy savings technology relies on conventional data logging systems, in which two major barriers exist. Formost is the fact that retrieving the energy data is not convenient, and the cost of the data logging equipment is high. The solution presented here is to accomplish these goals is to include a miniature web server in a remote-logging module, which we designed as part of our device. Thus allowing data to be accessed more frequently, via the Internet. As it currently stands, the state of California in the United States is experiencing power grid problems as residential and industrial energy demands increase. If an energy savings program is to be implemented, then an energy monitoring strategy must also devised. Our Internet appliance provides a solution, and this paper summarizes our implementation details and provides a computer screen-capture of the data being posted onto the Internet.

Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

2001-01-01T23:59:59.000Z

144

RadNet: Open network protocol for radiation data  

SciTech Connect

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

145

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

146

Sustaining the Internet with hyperbolic mapping  

E-Print Network (OSTI)

The Internet infrastructure is severely stressed. Rapidly growing overhead associated with the primary function of the Internet---routing information packets between any two computers in the world---causes concerns among Internet experts that the existing Internet routing architecture may not sustain even another decade; parts of the Internet have started sinking into black holes already. Here we present a method to map the Internet to a hyperbolic space. Guided with the constructed map, which we release with this paper, Internet routing exhibits scaling properties close to theoretically best possible, thus resolving serious scaling limitations that the Internet faces today. Besides this immediate practical viability, our network mapping method can provide a different perspective on the community structure in complex networks.

Boguna, Marian; Krioukov, Dmitri

2010-01-01T23:59:59.000Z

147

Internet Politics: Resist, Die, or Exploit?  

E-Print Network (OSTI)

In this paper, we disclose and explain Internet politics, an “invisible hand ” that inherently affects Internet research. We show that it could cause significant underutilization of constructive research ideas and a vicious cycle of bias in mainstream research ideas. However, we also expose that it is possible to gradually alleviate effects of the Internet politics by well understanding it. To this end, we propose Internet politics analysis, a systematic approach that can potentially well address the research dilemmas caused by the Internet politics. In addition, we propose a simple but effective model for the Internet politics which can significantly facilitate the Internet politics analysis. As a result, it may lead to dramatic gains for the future Internet research.

Leiwen Deng; Ar Kuzmanovic

2008-01-01T23:59:59.000Z

148

Coping with Internet channel conflict  

Science Conference Proceedings (OSTI)

If you do not sell your products directly over the Internet, people will go to your competitors who do, while if you do sell your products directly, your distributors and dealers will desert you and only carry products from manufacturers who do not compete ...

Younghwa Lee; Zoonky Lee; Kai R. T. Larsen

2003-07-01T23:59:59.000Z

149

Comparison shopping on the internet  

Science Conference Proceedings (OSTI)

Though comparison shopping is used widely by online shoppers, very little research exists about how comparison shoppers differ from those who are not involved in comparison shopping. A survey of 208 US consumers identified comparison shoppers, both on ... Keywords: USA, United States, comparison shopping, consumer attitudes, e-commerce, e-shopping, e-tailing, electronic commerce, electronic retailing, factors, internet, online shopping

Michael Klassen; Pola Gupta; Matthew P. Bunker

2009-05-01T23:59:59.000Z

150

Study of Proposed Internet Congestion Control Algorithms*  

Science Conference Proceedings (OSTI)

... Algorithms* Kevin L. Mills, NIST (joint ... Page 2. Study of Proposed Internet Congestion Control Algorithms – Mills et al. Innovations ...

2013-04-01T23:59:59.000Z

151

The Evolution of International Internet Telephony  

E-Print Network (OSTI)

International Internet Telephony has been evolving since its introduction in 1996. In 1996, the typical player was

McGarty, Terrence

152

F E A T U R E 1089-7801/97/$10.00 1997 IEEE IEEE INTERNET COMPUTING  

E-Print Network (OSTI)

F E A T U R E 58 1089-7801/97/$10.00 ©1997 IEEE IEEE INTERNET COMPUTING AGENT TCL: Targeting in more detail. Agent Tcl is a mobile-agent system whose agents can be written in Tcl, Java, and Scheme, although the version available to the public supports only Tcl at present. Agent Tcl has extensive

Kotz, David

153

F E A T U R E 1089 7801/97/$10.00 1997 IEEE IEEE INTERNET COMPUTING  

E-Print Network (OSTI)

F E A T U R E 58 1089 7801/97/$10.00 ©1997 IEEE IEEE INTERNET COMPUTING AGENT TCL: Targeting in more detail. Agent Tcl is a mobile­agent system whose agents can be written in Tcl, Java, and Scheme, although the version available to the public supports only Tcl at present. Agent Tcl has extensive

154

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol  

Energy.gov (U.S. Department of Energy (DOE))

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol (November 1985, Rev. 1)

155

Internet market strategies: Antecedents and implications  

Science Conference Proceedings (OSTI)

The Web is a new market channel that has become a serious alternative to traditional channels. At present, there is little strategy analysis available to guide a company's decision about its involvement in the internet market. In this paper, we differentiate ... Keywords: Creative pricing policies, IMS model, Internet competition, Internet market, Mixed strategy, Pure strategy, Resource-based theory, Traditional markets

Jaeki Song; Fatemeh Mariam Zahedi

2006-03-01T23:59:59.000Z

156

Toward a Framework for Assessing Internet Channels  

Science Conference Proceedings (OSTI)

The emergence of the Internet has forced a large number of firms to introduce Internet-based channels of distribution into existing distribution systems to market their products. In multiple channels context, there has been a call for better performance ... Keywords: Internet channels, strategic profit model (SPM), analytic network process (ANP), performance evaluation

Hung-Jen Tu; Chia-Yang Wong

2010-05-01T23:59:59.000Z

157

Commercial Internet filters: Perils and opportunities  

Science Conference Proceedings (OSTI)

Organizations are becoming increasingly aware of Internet abuse in the workplace. Such abuse results in loss of workers' productivity, network congestion, security risks, and legal liabilities. To address this problem, organizations have started to adopt ... Keywords: Internet abuse, Internet filters, Text classification, Text mining

Chen-Huei Chou; Atish P. Sinha; Huimin Zhao

2010-03-01T23:59:59.000Z

158

Workshop on internet economics (WIE2011) report  

Science Conference Proceedings (OSTI)

The second Workshop on Internet Economics [2], hosted by CAIDA and Georgia Institute of Technology on December 1-2, 2011, brought together network technology and policy researchers with providers of commercial Internet facilities and services (network ... Keywords: economics, internet, network management

kc claffy

2012-03-01T23:59:59.000Z

159

Security of internet-connected computer networks  

Science Conference Proceedings (OSTI)

The security of computer networks connected to the internet is an important, vital and hotly contested real-world issue. Once the computer networks get connected to the internet, the number of attacks, their strength and intensity grow exponentially. ... Keywords: attack detection, attacks, computer networks, digital signature, incidents, internet, network security, security breaches, security policy

I. Tutanescu; E. Sofron; M. Ali

2010-02-01T23:59:59.000Z

160

Robustness provided by internet monitoring systems  

Science Conference Proceedings (OSTI)

Internet applications such as Wealth Management Banking Programs require a very high degree of robustness. To attain this continuous testing - that is monitoring the systems over a period of time - is suggested. The preparation of an appropriate site-monitoring ... Keywords: continuous testing, internet, internet offering, monitoring systems, requirements, robustness, site monitoring, soft launch, test environment, testing recommendation, transitional state

Barry Dellar

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Next Generation Integrated Environment for Collaborative Work Across Internets  

Science Conference Proceedings (OSTI)

We are now well-advanced in our development, prototyping and deployment of a high performance next generation Integrated Environment for Collaborative Work. The system, aimed at using the capability of ESnet and Internet2 for rapid data exchange, is based on the Virtual Room Videoconferencing System (VRVS) developed by Caltech. The VRVS system has been chosen by the Internet2 Digital Video (I2-DV) Initiative as a preferred foundation for the development of advanced video, audio and multimedia collaborative applications by the Internet2 community. Today, the system supports high-end, broadcast-quality interactivity, while enabling a wide variety of clients (Mbone, H.323) to participate in the same conference by running different standard protocols in different contexts with different bandwidth connection limitations, has a fully Web-integrated user interface, developers and administrative APIs, a widely scalable video network topology based on both multicast domains and unicast tunnels, and demonstrated multiplatform support. This has led to its rapidly expanding production use for national and international scientific collaborations in more than 60 countries. We are also in the process of creating a 'testbed video network' and developing the necessary middleware to support a set of new and essential requirements for rapid data exchange, and a high level of interactivity in large-scale scientific collaborations. These include a set of tunable, scalable differentiated network services adapted to each of the data streams associated with a large number of collaborative sessions, policy-based and network state-based resource scheduling, authentication, and optional encryption to maintain confidentiality of inter-personal communications. High performance testbed video networks will be established in ESnet and Internet2 to test and tune the implementation, using a few target application-sets.

Harvey B. Newman

2009-02-24T23:59:59.000Z

162

Biomass Webinar Text Version | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Text Version Biomass Webinar Text Version Dowload the text version of the audio from the DOE Office of Indian Energy webinar on biomass. DOE Office of Indian Energy Foundational...

163

Biomass Webinar Text Version | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Biomass Webinar Text Version Biomass Webinar Text Version Dowload the text version of the audio from the DOE Office of Indian Energy webinar on biomass. DOE Office of Indian Energy...

164

Soy Protein Products - Electronic Version  

Science Conference Proceedings (OSTI)

Soybeans as Functional Foods and Ingredients is written to serve as a reference for food product developers, food technologists, nutritionists, plant breeders, academic and government professionals... Soy Protein Products - Electronic Version eChapters F

165

Gasoline prices decrease (long version)  

U.S. Energy Information Administration (EIA) Indexed Site

Gasoline prices decrease (long version) The U.S. average retail price for regular gasoline fell to 3.70 a gallon on Monday. That's down 1.4 cents from a week ago, based on the...

166

Appraisal Process Protocols, Independent Oversight - November...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Protocols, Independent Oversight - November 2012 Appraisal Process Protocols, Independent Oversight - November 2012 November 2012 Updated Independent Oversight...

167

Mobile Internet iPhone + iTouch Desktop Internet  

E-Print Network (OSTI)

www.morganstanley.com/techresearch Morgan Stanley does and seeks to do business with companies covered in Morgan Stanley Research. As a result, investors should be aware that the firm may have a conflict of interest that could affect the objectivity of Morgan Stanley Research. Investors should consider Morgan Stanley Research as only a single factor in making their investment decision. For analyst certification and other important disclosures, refer to the Disclosure Section, located at the end of this report. Internet Trends Outline

unknown authors

2010-01-01T23:59:59.000Z

168

User Empowerment in the Internet of Things  

E-Print Network (OSTI)

This paper focuses on the characteristics of two big triggers that facilitated wide user adoption of the Internet: Web 2.0 and online social networks. We detect brakes for reproduction of these events in Internet of things. To support our hypothesis we first compare the difference between the ways of use of the Internet with the future scenarios of Internet of things. We detect barriers that could slow down apparition of this kind of social events during user adoption of Internet of Things and we propose a conceptual framework to solve these problems.

Munjin, Dejan

2011-01-01T23:59:59.000Z

169

Multimedia: Energy 101: Daylighting (Text Version)  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

EERE Multimedia Printable Version Share this resource Send a link to Multimedia: Energy 101: Daylighting (Text Version) to someone by E-mail Share Multimedia: Energy 101:...

170

Characterizing Internet Worm Infection Structure  

E-Print Network (OSTI)

Internet worm infection continues to be one of top security threats. Moreover, worm infection has been widely used by botnets to recruit new bots and construct P2P-based botnets. In this work, we attempt to characterize the network structure of Internet worm infection and shed light on the micro-level information of "who infects whom." Our work quantifies the infection ability of individual hosts and reveals the key characteristics of the underlying topologies formed by worm infection, i.e., the number of children and the generation of the Internet worm infection family tree. Specifically, we first analyze the infection tree of a wide class of worms, for which a new victim is compromised by each existing infected host with equal probability. We find that the number of children has asymptotically a geometric distribution with parameter 0.5. We also discover that the generation follows closely a Poisson distribution and the average path length of the worm infection family tree increases approximately logarithmi...

Wang, Qian; Chen, Chao

2010-01-01T23:59:59.000Z

171

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

172

Energy Efficiency Savings Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

173

Packet Drop Avoidance for High-speed network transmission protocol  

SciTech Connect

As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

Jin, Guojun

2004-05-01T23:59:59.000Z

174

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

175

BBSLA – Argentina (031710) Spanish (Global Version ...  

Science Conference Proceedings (OSTI)

BBSLA – Argentina (031710) Spanish (Global Version 031010) CONTRATO DE LICENCIA DE SOLUCIÓN BLACKBERRY FAVOR LEER ESTE ...

176

BBSLA – Malaysia (032410) English (Global Version 031010) ...  

Science Conference Proceedings (OSTI)

BBSLA – Malaysia (032410) English (Global Version 031010) 1 BLACKBERRY SOLUTION LICENSE AGREEMENT PLEASE READ THIS ...

177

BBSLA - South Africa (031910) English (Global Version ...  

Science Conference Proceedings (OSTI)

BBSLA - South Africa (031910) English (Global Version 031010) 1 BLACKBERRY SOLUTION LICENSE AGREEMENT PLEASE READ THIS ...

178

BBSLA – Thailand (032410) English (Global Version 031010) ...  

Science Conference Proceedings (OSTI)

BBSLA – Thailand (032410) English (Global Version 031010) 1 BLACKBERRY SOLUTION LICENSE AGREEMENT PLEASE READ THIS ...

179

BBSLA – Pakistan (032310) English (Global Version 031010) ...  

Science Conference Proceedings (OSTI)

BBSLA – Pakistan (032310) English (Global Version 031010) 1 BLACKBERRY SOLUTION LICENSE AGREEMENT PLEASE READ THIS ...

180

Internet Media Types and the Web  

E-Print Network (OSTI)

draft-masinter-mime-web-info-00 This document describes some of the ways in which parts of the MIME system, originally designed for electronic mail, have been used in the web, and some of the ways in which those uses have resulted in difficulties. This informational document is intended as background and justification for a companion Best Current Practice which makes some changes to the registry of Internet Media Types and other specifications and practices, in order to facilitate Web application design and standardization. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at

L. Masinter

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Regulation and Censorship of the Internet.  

E-Print Network (OSTI)

??The Internet is probably one of the greatest inventions of mankind and one of the best things that happened in my generation. It has become… (more)

Okeke, Innocent

2012-01-01T23:59:59.000Z

182

Practice of Internet Marketing in Destination Branding.  

E-Print Network (OSTI)

??This study provides information about destination branding and the effect of Internet marketing on tourism. Tourism branding generates interest in a destination as well as,… (more)

Duong, Linh

2012-01-01T23:59:59.000Z

183

Evaluation and testing of internet firewalls  

Science Conference Proceedings (OSTI)

In this article we propose a testing methodology for evaluating Internet firewalls and apply it to compare two popular firewalls. Copyright © 1999 John Wiley & Sons, Ltd.

Khalid Al-Tawil; Ibrahim A. Al-Kaltham

1999-05-01T23:59:59.000Z

184

Internet, the Web, and Mathematical Science - CECM  

E-Print Network (OSTI)

The dominant mechanism, recently, for distribution of electronic preprints have ... On a simpler level, from the days of the first-generation Internet, before the web ...

185

Internet Engineering Task Force KK Ramakrishnan ...  

Science Conference Proceedings (OSTI)

... Engineering Task Force KK Ramakrishnan INTERNET DRAFT AT&T Labs Research draft-kksjf-ecn-00.txt Sally Floyd LBNL November 1997 ...

2009-08-19T23:59:59.000Z

186

WEB RESOURCE: Central Internet Database - TMS  

Science Conference Proceedings (OSTI)

May 15, 2007 ... Topic Title: WEB RESOURCE: Central Internet Database Topic Summary: DOE. Integrates waste management and cleanup data from multiple ...

187

Quantum deduction rules (preliminary version)  

E-Print Network (OSTI)

Quantum deduction rules (preliminary version) Pavel Pudlâ??ak # March 27, 2007 Abstract We define propositional quantum Frege proof systems and compare it with classical Frege proof systems. 1 Introduction In this paper we shall address the question whether quantum circuits could help us prove theorems faster than

Pudlák, Pavel

188

Protocols and Systems Services  

E-Print Network (OSTI)

Current data-centers rely on TCP/IP over Fast- and Gigabit-Ethernet for data communication even within the cluster environment for costeffective designs, thus limiting their maximum capacity. Together with raw performance, such data-centers also lack in efficient support for intelligent services, such as requirements for caching documents, managing limited physical resources, load-balancing, controlling overload scenarios, and prioritization and QoS mechanisms, that are becoming a common requirement today. On the other hand, the System Area Network (SAN) technology is making rapid advances during the recent years. Besides high performance, these modern interconnects are providing a range of novel features and their support in hardware (e.g., RDMA, atomic operations, QoS support). In this paper, we address the capabilities of these current generation SAN technologies in addressing the limitations of existing data-centers. Specifically, we present a novel framework comprising of three layers (communication protocol support, data-center service primitives and advanced data-center services) that work together to tackle the issues associated with existing data-centers. We also present preliminary results in the various aspects of the framework, which demonstrate close to an order of magnitude performance benefits achievable by our framework as compared to existing data-centers in several cases.

Balaji Vaidyanathan Narravula; P. Balaji; K. Vaidyanathan; S. Narravula; H. -w. Jin; D. K. Panda

2006-01-01T23:59:59.000Z

189

V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

2: Cisco ASA Software TFTP Protocol Inspection Denial of 2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - 4:00am Addthis PROBLEM: A vulnerability has been reported in Cisco ASA Software, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x, Cisco Adaptive Security Appliance (ASA) 9.x, Cisco ASA 5500-X Series Adaptive Security Appliances ABSTRACT: The vulnerability is reported in versions 8.4(5.7), 8.4(6), 9.0(2.3), 9.1(1.5), and 9.1(2.1). Other versions may also be affected. REFERENCE LINKS: Secunia Advisory SA54699 CVE-2013-3463 Cisco (CSCuh13899) IMPACT ASSESSMENT: Low DISCUSSION: A vulnerability has been reported in Cisco ASA Software, which can be

190

Clean Power for the Internet  

E-Print Network (OSTI)

Data centers have been increasingly large users of energy over the past 10 years. With the rapid increase in Internet use, these facilities continue to be built, stressing the local electricity grids with their immense energy needs, and typically with the backup support of diesel generators belching pollution into the sky. The extent of these impacts is unknown. The change in market dynamics in the year 2001 resulted in a slower growth rate in data centers, as it did with the rest of the Internet industry, but it opened up an opportunity for incorporating energy efficient technologies into the design of power delivery to these buildings. More energy-efficient design will ease pressure on the electric grid and also decrease pollution in these areas, many of which are already areas of pollution non-attainment. This paper discusses the air quality impact of data centers, their impact on the electric grid, and the possibility of using clean distributed energy resources (DER) to meet their power reliability and quantity needs. Current DER installation and its success in maintaining the needed reliability are reviewed. The environmental and economic impact of the use of DER in these buildings are also reviewed and ways to overcome the potential barriers to this technology are discussed.

Brown, E.; Elliott, R. N.; Shipley, A.

2002-04-01T23:59:59.000Z

191

ARM - Carlos Sousa Interview (English Version)  

NLE Websites -- All DOE Office Websites (Extended Search)

DeployementCarlos Sousa Interview (English Version) DeployementCarlos Sousa Interview (English Version) Azores Deployment AMF Home Graciosa Island Home Data Plots and Baseline Instruments Satellite Retrievals Experiment Planning CAP-MBL Proposal Abstract and Related Campaigns Science Questions Science Plan (PDF, 4.4M) Rob Wood Website Outreach Backgrounders English Version (PDF, 363K) Portuguese Version (PDF, 327K) AMF Posters, 2009 English Version Portuguese Version Education Flyers English Version Portuguese Version News Campaign Images Carlos Sousa Interview (English Version) From Graciosa to India. Thanks to the Atmospheric Station. (From Aςoriano Oriental, March 5, 2012) Carlos Sousa works on an instrument at the ARM India site. Carlos Sousa works on an instrument at the ARM India site. To be at the right place at the right time, can change a person's life.

192

Don't optimize existing protocols, design optimizable protocols  

Science Conference Proceedings (OSTI)

As networks grow in size and complexity, network management has become an increasingly challenging task. Many protocols have tunable parameters, and optimization is the process of setting these parameters to optimize an objective. In recent years, optimization ...

Jiayue He; Jennifer Rexford; Mung Chiang

2007-07-01T23:59:59.000Z

193

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; L. Masinter; P. Leach; T. Berners-Lee

1999-06-01T23:59:59.000Z

194

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; T. Berners-Lee

1997-01-01T23:59:59.000Z

195

Why the Internet is so 'small'?  

E-Print Network (OSTI)

During the last three decades the Internet has experienced fascinating evolution, both exponential growth in traffic and rapid expansion in topology. The size of the Internet becomes enormous, yet the network is very `small' in the sense that it is extremely efficient to route data packets across the global Internet. This paper provides a brief review on three fundamental properties of the Internet topology at the autonomous systems (AS) level. Firstly the Internet has a power-law degree distribution, which means the majority of nodes on the Internet AS graph have small numbers of links, whereas a few nodes have very large numbers of links. Secondly the Internet exhibits a property called disassortative mixing, which means poorly-connected nodes tend to link with well-connected nodes, and vice versa. Thirdly the best-connected nodes, or the rich nodes, are tightly interconnected with each other forming a rich-club. We explain that it is these structural properties that make the global Internet so 'small'.

Zhou, Shi

2010-01-01T23:59:59.000Z

196

Internet governance on a dollar a day  

Science Conference Proceedings (OSTI)

The submissions of ICANN and ISOC to the WSIS suggested Internet governance was purely about technical standardisation, addresses, domains and some service-related issues. Under this definition, there is little for poor people to worry about. At the ... Keywords: WGIG, WSIS, access, developing countries, development, internet

Charles Kenny

2007-01-01T23:59:59.000Z

197

The energy and emergy of the internet  

Science Conference Proceedings (OSTI)

Recent years have seen a flurry of energy-efficient networking research. But does decreasing the energy used by the Internet actually save society much energy? To answer this question, we estimate the Internet's energy consumption. We include embodied ... Keywords: consumption, emergy, energy, sustainability

Barath Raghavan; Justin Ma

2011-11-01T23:59:59.000Z

198

Modeling the World from Internet Photo Collections  

Science Conference Proceedings (OSTI)

There are billions of photographs on the Internet, comprising the largest and most diverse photo collection ever assembled. How can computer vision researchers exploit this imagery? This paper explores this question from the standpoint of 3D scene modeling ... Keywords: 3D navigation, 3D scene analysis, Internet imagery, Photo browsers, Structure from motion

Noah Snavely; Steven M. Seitz; Richard Szeliski

2008-11-01T23:59:59.000Z

199

Trinocular: Understanding Internet Reliability Through Adaptive Probing  

E-Print Network (OSTI)

and human factors cause Internet outages--from big events like Hurricane Sandy in 2012 and the Egyptian, increasing In- ternet "background radiation" by less than 0.7%. Trinocular is also predictable and precise require little traffic, a single machine can track 3.4M /24 IPv4 blocks, all of the Internet currently

Heidemann, John

200

Measuring the evolution of internet peering agreements  

Science Conference Proceedings (OSTI)

There is much interest in studying the structure and evolution of the Internet at the Autonomous System (AS) level. However, limitations of public data sources in detecting settlement-free peering links meant that prior work focused almost exclusively ... Keywords: autonomous systems, economics, internet topology, peering

Amogh Dhamdhere; Himalatha Cherukuru; Constantine Dovrolis; Kc Claffy

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Parasitism and Internet auction fraud: An exploration  

Science Conference Proceedings (OSTI)

Most research on Internet auction fraud focuses exclusively on the relationship between the con-artist and victim. However, the con-artist and victim are situated in an ecology comprising the auction house, police, and auction community. This paper employs ... Keywords: Auction fraud, Internet crime, Metaphor, Parasitism

Cecil Eng Huang Chua; Jonathan Wareham

2008-10-01T23:59:59.000Z

202

In Pursuit of Privacy on a Public Internet  

E-Print Network (OSTI)

In Pursuit of Privacy on a Public Internet by Marc MendoncaUser privacy on the Internet has been an increasing concernof Privacy on a Public Internet A thesis submitted in

Mendonca, Marc

2012-01-01T23:59:59.000Z

203

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocols Report This image shows a cover of a report titled "Building America House Simulation Protocols." The Building America logo is shown in the lower left corner of...

204

Privacy Preservation Technologies in Internet of Things  

E-Print Network (OSTI)

Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

Sen, Jaydip

2010-01-01T23:59:59.000Z

205

Simulatable security for quantum protocols  

E-Print Network (OSTI)

The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a larger one. Recently, these methods have received much attention in the quantum cryptographic community. We give a short introduction to simulatable security in general and proceed by sketching the many different definitional choices together with their advantages and disadvantages. Based on the reactive simulatability modelling of Backes, Pfitzmann and Waidner we then develop a quantum security model. By following the BPW modelling as closely as possible, we show that composable quantum security definitions for quantum protocols can strongly profit from their classical counterparts, since most of the definitional choices in the modelling are independent of the underlying machine model. In particular, we give a proof for the simple composition theorem in our framework.

Dominique Unruh

2004-09-18T23:59:59.000Z

206

PTLOAD version 6.2  

Science Conference Proceedings (OSTI)

The PTLOAD Version 6.2 software allows users to compute operating temperatures and ratings for power transformers. Description Power transformers are one of the most expensive components of any transmission system. Energy companies need to maximize utilization of these assets, while at the same time protecting them from damage and ensuring system reliability. To assist utilities in planning transformer loading, PTLOAD implements calculation methods from Institute of Electrical and Electronics Engineers (...

2007-10-15T23:59:59.000Z

207

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

208

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

209

Impacts of IPv6 on Infrastructure Control Systems | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Control Systems This document presents information on the impacts of adopting Internet Protocol version 6 (IPv6) into infrastructure control systems. The investigation was...

210

FEDERAL ACQUISITION CIRCULAR 2005-38 SUMMARY Item Subject FAR...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Card 2006-026 Restrictions for Treasury Offset Program Debts. I11 ... Internet Protocol Version 6 (IPv6) 2005-04 1 IV ... Federal Food Donation Act of...

211

WS-BPEL Extensions for Versioning  

Science Conference Proceedings (OSTI)

This article proposes specific extensions for WS-BPEL (Business Process Execution Language) to support versioning of processes and partner links. It introduces new activities and extends existing activities, including partner links, invoke, receive, ... Keywords: BPEL, Business processes, SOA, Versioning

Matjaz B. Juric; Ana Sasa; Ivan Rozman

2009-08-01T23:59:59.000Z

212

Genome Majority Vote (GMV), Version 0.x  

NLE Websites -- All DOE Office Websites (Extended Search)

Genome Majority Vote (GMV), Version 0.x Genome Majority Vote (GMV), Version 0.x The pipeline runs PRODIGAL gene predictions on all genomes, runs pan-reciprocal BLAST, and...

213

COMPUTER PROGRAM CCC USER'S MANUAL VERSION II.  

E-Print Network (OSTI)

1PUTER PROGRAM CCC USER'S MANUAL VERSION II D.C. Mangold,COMPUTER PROGRAM CCC USER'S MANUAL Version II (January,Ll COMPUTER PROGRAM CCC--USER'S MANUAL D. C. Mangold, M, J,

Mangold, D.C.

2013-01-01T23:59:59.000Z

214

Internet Kiosks in Rural India: What Influences Success?#  

E-Print Network (OSTI)

effects. Internet Kiosks in Rural India: What Influences62. Internet Kiosks in Rural India: What Influences Success?2005), Enabling ICT for Rural India, Project Report,

Kendall, Jake; Singh, Nirvikar

2007-01-01T23:59:59.000Z

215

DOE Site Facility Management Contracts Internet Posting | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Facility Management Contracts Internet Posting DOE Site Facility Management Contracts Internet Posting DOE-NNSA Site Facility Mgmt Contracts AUG 2013.pdf More Documents &...

216

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

217

from Savannah River Nuclear Solutions, LLC NEWS Internet Food...  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Food Service for SRS Employees Sought Greater Aiken-Augusta area food service companies are invited to consider providing meal ordering via the internet for delivery to...

218

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

219

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution...

220

The Locational Determinants of Internet Usage in Asia and Nepal.  

E-Print Network (OSTI)

??This study examines the relationship between internet development and various socio- economic factors that are assumed to affect internet infrastructure development decision. The data collected… (more)

Chand, Smriti

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Future Internet Architecture and Cyber-assisted Energy Efficiency...  

NLE Websites -- All DOE Office Websites (Extended Search)

Louis Host: Raj Kettimuthu Despite their huge differences, the Internet and the power grid share similar delivery patterns in the sense that the Internet delivers information...

222

Assessing Energy Resources Webinar Text Version  

Energy.gov (U.S. Department of Energy (DOE))

Download the text version of the audio from the DOE Office of Indian Energy webinar on assessing energy resources.

223

Strategic Energy Planning Webinar Text Version  

Energy.gov (U.S. Department of Energy (DOE))

Download the text version of the audio from the DOE Office of Indian Energy webinar on strategic energy planning.

224

Investigator Manual Version 3.0  

E-Print Network (OSTI)

Investigator Manual Version 3.0 January 2013 Human Subjects Protection Program The University;Investigator Manual Version 3.0: 01/2013 Page 2 of 70 ©2009 Huron Consulting Services, LLC. Huron Consulting Manual Version 3.0: 01/2013 Page 3 of 70 ©2009 Huron Consulting Services, LLC. Huron Consulting Group Use

Arizona, University of

225

IETF Internet-Draft Intended status: Informational  

E-Print Network (OSTI)

Towards an Information-Centric Internet with more Things draft-kutscher-icn-iwmt-00 The Internet is already made of things. However, we expect there to be many more less-capable things, such as sensors and actuators, connected to the Internet in years to come. In parallel, Internet applications are more and more being used to perform operations on named (information) objects, and various Information-Centric Networking (ICN) approaches are being researched in order to allow such applications to work effectively at scale and with various forms of mobility and in networking environments that are more challenging than a traditional access network and data center. In this position paper, we outline some benefits that may accrue, and issues that arise, should the Internet, with many more things, make use of the ICN approach to networking and we argue that ICN concepts should be considered when planning for increases in the number of things connected to the Internet. Status of this Memo This Internet-Draft is submitted in full conformance with the

D. Kutscher; S. Farrell

2011-01-01T23:59:59.000Z

226

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

227

Formal apparatus for measurement of lightweight protocols  

Science Conference Proceedings (OSTI)

Lightweight protocols are an important topic in the area of computer communications. With the proliferation of security services not only ordinary communication protocols, but also cryptographic protocols, i.e. security services, have become a subject ... Keywords: Lightweight protocols, Security, Security services metrics, Standardization, Ubiquitous computing

Denis Tr?ek; Damjan Kova?

2009-02-01T23:59:59.000Z

228

IntelliGrid Security Lessons Learned from Existing Internet Protocol Based Technologies in Shared Networks  

Science Conference Proceedings (OSTI)

The Metering, Network, On the Field Operations, and Information System (MENOFIS) platform, developed by EdF Research and Development (RD), tested the technology aspects of three RD projects of the Measurement and Information System for the EdF RD Electric Network Department. These projects focus on three business needs of French distribution system operators: 1) metering issues, 2) new issues associated with network monitoring, and 3) mobility needs. The MENOFIS platform deploys an automated meter manage...

2011-04-25T23:59:59.000Z

229

Selection and Testing of an Internet Protocol Video Camera for the Bird Activity Monitor  

Science Conference Proceedings (OSTI)

Avian interactions such as collisions and electrocutions with overhead power lines, communication towers, wind turbines, and other utility structures are subjects of increasing concern among utilities, regulatory agencies, and environmental organizations. However, our ability to quantify the temporal and spatial extent of the problem or the efficacy of mitigating measures is severely hampered by a lack of standard monitoring methods and tools. EPRI initiated a project in 2000 that led to the development ...

2010-11-24T23:59:59.000Z

230

Embrittlement data base, version 1  

Science Conference Proceedings (OSTI)

The aging and degradation of light-water-reactor (LWR) pressure vessels is of particular concern because of their relevance to plant integrity and the magnitude of the expected irradiation embrittlement. The radiation embrittlement of reactor pressure vessel (RPV) materials depends on many different factors such as flux, fluence, fluence spectrum, irradiation temperature, and preirradiation material history and chemical compositions. These factors must be considered to reliably predict pressure vessel embrittlement and to ensure the safe operation of the reactor. Based on embrittlement predictions, decisions must be made concerning operating parameters and issues such as low-leakage-fuel management, possible life extension, and the need for annealing the pressure vessel. Large amounts of data from surveillance capsules and test reactor experiments, comprising many different materials and different irradiation conditions, are needed to develop generally applicable damage prediction models that can be used for industry standards and regulatory guides. Version 1 of the Embrittlement Data Base (EDB) is such a comprehensive collection of data resulting from merging version 2 of the Power Reactor Embrittlement Data Base (PR-EDB). Fracture toughness data were also integrated into Version 1 of the EDB. For power reactor data, the current EDB lists the 1,029 Charpy transition-temperature shift data points, which include 321 from plates, 125 from forgoings, 115 from correlation monitor materials, 246 from welds, and 222 from heat-affected-zone (HAZ) materials that were irradiated in 271 capsules from 101 commercial power reactors. For test reactor data, information is available for 1,308 different irradiated sets (352 from plates, 186 from forgoings, 303 from correlation monitor materials, 396 from welds and 71 from HAZs) and 268 different irradiated plus annealed data sets.

Wang, J.A.

1997-08-01T23:59:59.000Z

231

Summary Protocol: Identification, Characterization, Designation, Remedial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

232

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

233

FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL  

E-Print Network (OSTI)

the SCADA networks protocols. Here the critical features of some common SCADA protocols will be presented

Dutertre, Bruno

234

Overview and Principles of Internet Traffic Engineering  

Science Conference Proceedings (OSTI)

This memo describes the principles of Traffic Engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks, and to provide a common basis for the development ...

D. Awduche; A. Chiu; A. Elwalid; I. Widjaja; X. Xiao

2002-05-01T23:59:59.000Z

235

Analytical Study on Internet Banking System  

E-Print Network (OSTI)

The Internet era is a period in the information age in which communication and commerce via the Internet became a central focus for businesses, consumers, government, and the media. The Internet era also marks the convergence of the computer and communications industries and their associated services and products. Nowadays, the availability of the Internet make it widely used for everyday life. In order to led business to success, the business and specially the services should provide comfort use to its costumer. The bank system is one of the most important businesses who may use the website. The using for the web-based systems should contain special requirements to achieve the business goal. Since that the paper will present the functional and non-functional for the web-based banking system.

AlAbdullah, Fadhel S; Alnaqeib, Rami; Jalab, Hamid A; Zaidan, A A; Zaidan, B B

2010-01-01T23:59:59.000Z

236

NIRA : a new Internet routing architecture  

E-Print Network (OSTI)

(cont.) mechanism, a user only needs to know a small region of the Internet in order to select a route to reach a destination. In addition, a novel route representation and packet forwarding scheme is designed such that a ...

Yang, Xiaowei, 1974-

2004-01-01T23:59:59.000Z

237

Central Internet Database (CID) Contact Us  

Office of Environmental Management (EM)

Contact Us Central Internet Database CID Photo Banner Contact Us DOE Contact: Doug Tonkay Phone: (301) 903-7212 Email: douglas.tonkay@em.doe.gov Last ReviewedUpdated 3252011...

238

Some Internet Architectural Guidelines and Philosophy  

Science Conference Proceedings (OSTI)

This document extends RFC 1958 by outlining some of the philosophical guidelines to which architects and designers of Internet backbone networks should adhere. We describe the Simplicity Principle, which states that complexity is the primary mechanism ...

R. Bush; D. Meyer

2002-12-01T23:59:59.000Z

239

The Internet — past, present and future  

Science Conference Proceedings (OSTI)

This paper charts the transformation of the Internet from its military and academic origins to its current status as a global network for multimedia information publishing and retrieval. It explains the basic technologies that have enabled this transformation ...

S. P. Sim; S. Rudkin

1997-04-01T23:59:59.000Z

240

Market Protocols for SPP Integrated Marketplace Version 2.0 7/12/2011 584  

E-Print Network (OSTI)

Combined Cycle (Resource) Resource comprised of many operational configurations such as 1 gas turbine & 1 steam turbine or 2 gas turbines and 1 steam turbine etc. CM Commercial Model The financial entities

Tesfatsion, Leigh

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

IoT-IMS Communication Platform for Future Internet  

Science Conference Proceedings (OSTI)

In recent years, Internet of Things (IoT) and Cloud Computing are the hottest issues of Future Internet. However, there is a lack of common fabric for integrating IoT and Cloud. In telecommunications, the IMS (IP Multimedia Subsystem), based on the All-IP ... Keywords: Cloud Computing, Future Internet, IP Multimedia Subsystem, Internet of Things, Next Generation Network

Chi-Yuan Chen; Yuh-Shyan Chen; Han-Chieh Chao; Tin-Yu Wu; Chun-I Fan; Jiann-Liang Chen; Jenq-Muh Hsu

2011-10-01T23:59:59.000Z

242

Balance of Power: Dynamic Thermal Management for Internet Data Centers  

Science Conference Proceedings (OSTI)

The advent of Internet-based applications and their resulting multitier distributed architecture has changed the focus of design for large-scale Internet computing. Internet server applications execute in a horizontally scalable topology across hundreds ... Keywords: dynamic thermal management, thermal-load balancing, Internet data center, row-wise and regional thermal management, thermal policies

Ratnesh K. Sharma; Cullen E. Bash; Chandrakant D. Patel; Richard J. Friedrich; Jeffrey S. Chase

2005-01-01T23:59:59.000Z

243

Internet of Things: Applications and Challenges in Technology and Standardization  

Science Conference Proceedings (OSTI)

The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and ... Keywords: Internet of Things (IoT), Interoperability, Network protoocl, Privacy, Security, Wireless networks

Debasis Bandyopadhyay; Jaydip Sen

2011-05-01T23:59:59.000Z

244

The Internet Ecosystem- The Potential for Discrimination  

E-Print Network (OSTI)

The Federal Communication Commission is considering rules enforcing “network neutrality ” and legislation proposing similar goals have been discussed in Congress. The goals of the proposed regulation and legislation are preserve an “open Internet”, but are specifically directed toward access networks, or the first link that directly connects users to the Internet. We argue that preserving open competition in a host of “higher level” Internet services is equally if not more important, but since the rate of technology innovation typically out-paces the need for regulation, there is no need to impose regulation at this time. Using specific examples focused on the “visible Internet ” as well as new services and applications that enable rapid innovation, we argue that the Internet has fostered a history of technological and business solutions that overcome what seems to be certain market dominance. A key enabler of these changes is the emergence of technologies that lower the barrier for entry in developing and deploying new services. We argue that regulators should be aware of the potential for anti-competitive practices, but should carefully consider the effects of regulation on the full Internet ecosystem. We

Dirk Grunwald

2010-01-01T23:59:59.000Z

245

FLIP: A flexible interconnection protocol for heterogeneous internetworking  

E-Print Network (OSTI)

This paper describes the Flexible Interconnection Protocol, or FLIP, whose main goal is to allow interconnection of heterogeneous devices with varying power, processing, and communication capabilities, ranging from simple sensors to more powerful computing devices such as laptops and desktops. The vision is that FLIP will be used to interconnect such devices forming clouds in the farthest branches/leaves of the Internet, while still providing connectivity with the existing IP-based Internet infrastructure. Through its flexible, customizable headers FLIP integrates just the functions required by a given application and that can be handled by the underlying device. Simple devices like sensors will benefit from incurring close to optimal overhead saving not only bandwidth, but, more importantly, energy. More sophisticated devices in the cloud can be responsible for implementing more complex functions like reliable/ordered data delivery, communication with other device clouds and with the IP infrastructure. FLIP is designed to provide a basic substrate on which to build network- and transport-level functionality. In heterogeneous environments, FLIP allows devices with varying capabilities to coexist and interoperate under the same network infrastructure. We present the basic design of FLIP and describe its implementation under Linux. We also report on FLIP’s performance when providing IPv4 and IPv6 as well as transport-layer functionality a la TCP and UDP. We show FLIP’s energy efficiency in different sensor network scenarios. For example, we use FLIP to implement the directed diffusion communication paradigm and obtain an improvement of 50 % in energy savings over an existing directed diffusion implementation. Finally, we showcase FLIP’s flexibility by demonstrating its ability to incorporate new protocol functions

Ignacio Solis; Katia Obraczka

2004-01-01T23:59:59.000Z

246

Abstract Routing Challenges and Directions for Smart Objects in Future Internet of Things  

E-Print Network (OSTI)

The Future Internet of things will consist of smart objects that will form distributed and autonomous peripheral wireless networks near the user end. The distributed nature of smart object networks, also termed ad hoc networks, require novel cooperative effective and efficient protocols for dynamic environment. It is therefore very important to provide a unified flexible framework for Ad hoc smart object communication that will allow adaptive, hybrid routing in order to satisfy Ad hoc networking requirements as proposed by the Cognitive and Adaptive Module (CAM) in [15]. 1.

T. A. Ramrekha; E. Panaousis; C. Politis

2011-01-01T23:59:59.000Z

247

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

248

IPv6 Advanced Protocols Implementation  

Science Conference Proceedings (OSTI)

This book is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not ...

Qing Li; Jinmei Tatuya; Keiichi Shima

2007-04-01T23:59:59.000Z

249

Hydroelectric Webinar Presentation Slides and Text Version  

Energy.gov (U.S. Department of Energy (DOE))

Download presentation slides and a text version of the audio from the DOE Office of Indian Energy webinar on hydroelectric renewable energy. 

250

NIST Photoionization of CO2 Version History  

Science Conference Proceedings (OSTI)

CO2-button Photoionization of CO 2. Version History. Example ... 1.0). [Online] Available: http://physics.nist.gov/CO2 [year, month day]. ...

2010-10-05T23:59:59.000Z

251

Energy Basics: Wind Power Animation (Text Version)  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Energy Basics Renewable Energy Printable Version Share this resource Biomass Geothermal Hydrogen Hydropower Ocean Solar Wind Wind Turbines Wind Resources Wind Power...

252

NIST Elemental Data Index Version History  

Science Conference Proceedings (OSTI)

... RA (2011), Elemental Data Index (version 2.2). ... the Ground Levels and Ionization Energies for the ... to two new, online databases: "Energy Levels of ...

2011-12-09T23:59:59.000Z

253

Internet Use and Political Engagement: The Role of E-Campaigning as a Pathway to Online Political Participation  

E-Print Network (OSTI)

Information Poverty, and the Internet. Cambridge: Cambridgeparticipations and the internet: assessing effects, causalthe Representativeness of Internet Political Participation’,

Cantijoch, Marta; Cutts , David; Gibson, Rachel

2013-01-01T23:59:59.000Z

254

Six virtual inches to the left: The problem with IPng  

SciTech Connect

This memo describes an Internet information track protocol for the Internet community. It proposes that a locator address (TA) be assigned to Transmission Control Protocol (TCP). The purpose of this TA is to uniquely identify an Internet node without specifing any routing information. This new version of TCP would contain support for high bandwidth-delay networks. Support for multiple network layer (Internet Protocol) protocols is also possible with this new TCP. Distribution of this document is unlimited. This RFC suggests that a new version of TCP be developed (TCPv11) and deployed. This version of TCP would contain a globally unique transport protocol address (TA). Assiging an address to TCP would allow for the support of multiple network layer protocols (IPng`s). The Ta would identify the location of an Internet node. The IPng layer would provide routing information to the Internet. Seperating the location and routing functions will greatly increase the versitily of the Internet.

Carlson, R. [Argonne National Lab., IL (United States); Ficarella, D. [Motorola (United States)

1994-05-01T23:59:59.000Z

255

Cryptographic voting protocols: a systems perspective  

Science Conference Proceedings (OSTI)

Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software ...

Chris Karlof; Naveen Sastry; David Wagner

2005-07-01T23:59:59.000Z

256

Improving Accelerated Weathering Protocols to Anticipate ...  

Science Conference Proceedings (OSTI)

... Step # Water Spray Irradiance ... water sprays during the dark cycle augmented with numerous shorter sprays ? New Protocol correctly ...

2013-04-19T23:59:59.000Z

257

Independent Oversight Appraisal Process Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

258

Independent Oversight Appraisal Process Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

259

Former Worker Program Medical Protocol | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medical Protocol Former Worker Program Medical Protocol April 2013 The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which...

260

Can Emergency Medicine Residents Reliably Use the Internet to Answer Clinical Questions?  

E-Print Network (OSTI)

Google as a diagnostic aid: internet based study. BMJ. 2006;Engine Watch. Estimated Internet pages. Search Engine WatchResidents Reliably Use the Internet to Answer Clinical

Krause, Richard; Moscati, Ronald; Halpern, Shravanti; Schwartz, Diane G.; Abbas, June

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

International Spanish/English Internet Smoking Cessation Trial Yields 20% Abstinence Rates at 1 Year  

E-Print Network (OSTI)

trial . Journal of Medical Internet Research , 10 , e36 .Journal of Medical Internet Research , 7 , e2 . Eysenbach ,Journal of Medical Internet Research , 7 , e11 . Feil , E.

Muñoz, Ricardo F.; Barrera, Alinne Z.; Delucchi, Kevin; Penilla, Carlos; Torres, Leandro D.; Pérez-Stable, Eliseo J.

2009-01-01T23:59:59.000Z

262

The NCEP Climate Forecast System Version 2  

Science Conference Proceedings (OSTI)

The second version of the NCEP Climate Forecast System (CFSv2) was made operational at NCEP in March 2011. This version has upgrades to nearly all aspects of the data assimilation and forecast model components of the system. A coupled Reanalysis ...

Suranjana Saha; Shrinivas Moorthi; Xingren Wu; Jiande Wang; Sudhir Nadiga; Patrick Tripp; David Behringer; Yu-Tai Hou; Hui-ya Chuang; Mark Iredell; Michael Ek; Jesse Meng; Rongqian Yang; Malaquías Peña Mendez; Huug van den Dool; Qin Zhang; Wanqiu Wang; Mingyue Chen; Emily Becker

263

UPGRADES TO Monteburns, VERSION 3.0  

SciTech Connect

Monteburns VERSION 3.0 is an upgrade of the existing Monteburns code available through RSICC. The new version includes modern programming style, increased parallel computing, more accurate capture gamma calculations and an automated input generator. This capability was demonstrated through a small PWR core simulation.

Galloway, Jack D [Los Alamos National Laboratory; Trellue, Holly R [Los Alamos National Laboratory

2012-06-22T23:59:59.000Z

264

Internet Resource Pricing Models, Mechanisms, and Methods  

E-Print Network (OSTI)

With the fast development of video and voice network applications, CDN (Content Distribution Networks) and P2P (Peer-to-Peer) content distribution technologies have gradually matured. How to effectively use Internet resources thus has attracted more and more attentions. For the study of resource pricing, a whole pricing strategy containing pricing models, mechanisms and methods covers all the related topics. We first introduce three basic Internet resource pricing models through an Internet cost analysis. Then, with the evolution of service types, we introduce several corresponding mechanisms which can ensure pricing implementation and resource allocation. On network resource pricing methods, we discuss the utility optimization in economics, and emphasize two classes of pricing methods (including system optimization and entities' strategic optimizations). Finally, we conclude the paper and forecast the research direction on pricing strategy which is applicable to novel service situation in the near future.

He, Huan; Liu, Ying

2011-01-01T23:59:59.000Z

265

Deriving Efficient Cache Coherence Protocols Through Refinement  

Science Conference Proceedings (OSTI)

We address the problem of developing efficient cache coherence protocols for use in distributed systems implementing distributed shared memory (DSM) using message passing. A serious drawback of traditional approaches to this problem is that the users ... Keywords: DSM protocols, communication protocols, refinement

Ratan Nalumasu; Ganesh Gopalakrishnan

2002-01-01T23:59:59.000Z

266

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 12/31/2011" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2009.02" "MONTHLY REPORT OF NATURAL GAS PURCHASES AND DELIVERIES TO CONSUMERS" "FORM EIA-857" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

267

Version No.: 2002.001  

U.S. Energy Information Administration (EIA) Indexed Site

8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/notice912.jsp" 8.0 or later or Mozilla Firefox 5.0 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/notice912.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0175" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 02/28/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2012.01" "WEEKLY UNDERGROUND NATURAL GAS STORAGE REPORT" "FORM EIA-912" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

268

Mayday: distributed filtering for internet services  

Science Conference Proceedings (OSTI)

Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentication and protocol verification, and then relay the requests to a protected ...

David G. Andersen

2003-03-01T23:59:59.000Z

269

An Internet multicast system for the stock market  

Science Conference Proceedings (OSTI)

We are moving toward an international, 24-hour, distributed, electronic stock exchange. The exchange will use the global Internet, or internet technology. This system is a natural application of multicast because there are a large number of receivers ... Keywords: multicast

2001-08-01T23:59:59.000Z

270

Cognitive processing differences between frequent and infrequent Internet users  

Science Conference Proceedings (OSTI)

The Internet is rapidly transforming a range of human activities; socio-cognitive theory assumes that engagement in transformed activities, over time, transforms human cognition. Four hundred and six college students completed four modified cognitive ... Keywords: Cognition, Internet use

G. M. Johnson

2008-09-01T23:59:59.000Z

271

E-Lections: Voting Behavior and the Internet  

E-Print Network (OSTI)

comments and suggestions. We further thank Deutsche Telekom AG for providing data on the voice telephony network and IVW for providing data on newspaper circulation. E-Lections: Voting Behavior and the Internet This paper analyses the effect of information disseminated by the Internet on voting behavior. We address endogeneity in Internet availability by exploiting regional and technological peculiarities of the preexisting voice telephony network that hinder the roll-out of fixed-line broadband infrastructure for high-speed Internet. We find small negative effects of Internet availability on voter turnout, and no evidence that the Internet systematically benefits single parties. Robustness tests including placebo estimations from the pre-Internet era confirm our results. We relate differences in the Internet effect between national and local elections to a crowding out of national but not local newspapers. JEL Codes: Keywords:

Oliver Falck; Robert Gold; Stephan Heblich; Acknowledgments We; Sascha Becker; Nina Czernich; Rob Fairlie; Ronny Freier; Tarjei Havnes; Jed Kolko; Fabian Waldinger; Ludger Woessmann

2012-01-01T23:59:59.000Z

272

The Research of Internet Shopping Customer Value Model  

Science Conference Proceedings (OSTI)

The existing empirical study of Internet shopping in literature, mostly concerned about the interaction relationship of retailer and customer, few scholars study the process of transactions between customers and other services suppliers, by assaying ... Keywords: Internet Shopping, Stakeholders, Customer Value

Xiao-bin Liu; Ming-qing Qiu

2010-05-01T23:59:59.000Z

273

Yrityksen internet-markkinoinnin kehittämissuunnitelma case Intersport Megastore Länsikeskus Turku.  

E-Print Network (OSTI)

??Tämän opinnäytetyön aiheena oli Internet-markkinoinnin kehittäminen Intersport Megastore Länsikeskukselle. Tutkimuksessa käydään läpi yleisimmät Internet-markkinoinnin muodot perinteisistä mainosbannereista aina uusimpiin muotoihin kuten sosiaaliseen mediaan. Tutkimuksessa on… (more)

Lehto, Juha

2011-01-01T23:59:59.000Z

274

Ghost at the machine : Internet addiction and compulsive computer use  

E-Print Network (OSTI)

Technology use-particularly the use of the Internet-is a pervasive component of modem society. The Internet has changed the way we work and the way we play, creating new possibilities for self expression and communication. ...

VanCott, Rachel Diane

2008-01-01T23:59:59.000Z

275

CAPRI: A Common Architecture for Distributed Probabilistic Internet Fault Diagnosis  

E-Print Network (OSTI)

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J.

2007-06-04T23:59:59.000Z

276

The dynamics of Internet publishing on the computer book industry  

E-Print Network (OSTI)

The Internet has been a disruptive force for many industries, but perhaps none more so than in the publishing business. While many segments of the publishing industry have made attempts to use the Internet to augment or ...

Allen, Robbie (Robbie C.)

2006-01-01T23:59:59.000Z

277

Fighting Internet Auction Fraud: An Assessment and Proposal  

Science Conference Proceedings (OSTI)

Although online auctions constitute one of the most successful Internet business models, auction fraud has become the largest component of all Internet fraud. Traditional government organizations have joined auction businesses in trying to develop new ...

Cecil Eng Huang Chua; Jonathan Wareham

2004-10-01T23:59:59.000Z

278

Analyzing the effect of routing protocols on media access control protocols in radio networks  

SciTech Connect

We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

279

On the Module of Internet Banking System  

E-Print Network (OSTI)

Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days. The success of the business depends on its flexibility, availability and security. Since that the web-based systems should have a special way to design the system and implement it. Nowadays, the Internet Banking System widely used and the banks looking to provide the best quality system with highly available, fast response, secure and safe to use. The Unified Modelling Language (UML) is the uniquely language which is used to analyse and design any system. In this paper, the UML diagrams has been proposed to illustrate the design phase for any banking system. The authors, presented two types of architecture which is u...

Alanazi, Hamdan O; Hmood, Ali K; Zaidan, M A; Al-Nabhani, Yahya

2010-01-01T23:59:59.000Z

280

Live Video Scheduling in Differentiated Services Internet  

Science Conference Proceedings (OSTI)

Future Internet services will be judged to a large degree by the efficient deployment of real-time applications. The issue of utilisation is especially central for the economic introduction of live video in packet switching networks; at the same time, ...

Themistoklis Rapsomanikis

2000-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

LITERATURE SEARCH TUTORIAL Open Internet Browser  

E-Print Network (OSTI)

://www.ncbi.nlm.nih.gov/entrez/query.fcgi · To search PubMed--fill in search box enter search terms, or enter author name, or journal titles--see instructions written below search box. To obtain detailed instructions on how to enter items, click on blueLITERATURE SEARCH TUTORIAL · Open Internet Browser · Go to http

Dratz, Edward A.

282

Photovoltaic system planning tool with internet access  

Science Conference Proceedings (OSTI)

This paper presents advanced planning models integrated into a GIS-computational tool, based on a Geographic Information System, for evaluating solar energy resources, selecting the most suitable photovoltaic technology, and calculating the cost associated ... Keywords: distributed generation planning, internet GIS services, photovoltaic systems

I. J. Ramírez-Rosado; P. J. Zorzano-Santamaría; L. A. Fernández-Jiménez; E. García-Garrido

2007-01-01T23:59:59.000Z

283

User and network interplay in internet telemicroscopy  

Science Conference Proceedings (OSTI)

Remote access of electron microscopes over the Internet (i.e., Telemicroscopy) is a unique network-dependent immersive multimedia application. It demands high-resolution (2D and 3D) video image transfers with simultaneous real-time mouse and keyboard ...

Prasad Calyam; Nathan Howes; Abdul Kalash; Mark Haffner

2007-10-01T23:59:59.000Z

284

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network (OSTI)

. http://docs.info.apple.com/article.html?artnum=303411 BEA Systems - 2007 Daylight Savings Time ChangesIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Shellcode Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The 2007 Daylight

285

Antitrust Analysis for the Internet Upstream Market: a BGP Approach  

E-Print Network (OSTI)

IXPs are independent organizations composed by Internet Service Providers, where they can route their traffic in a cost effective and technically efficient way. 4 These data were obtained for research purposes from the London Internet Exchange Point... , and UUNET played a major role in transporting packets across the Internet. Cossa (2000) considered a dataset from Boardwatch magazine Internet Service Providers Directory, 1999’s edition, showing the breakdown of 8,950 backbone connections from 5...

D'Ignazio, Alessio; Giovannetti, Emanuele

2006-03-14T23:59:59.000Z

286

Management of the Future Internet: Status and Challenges  

Science Conference Proceedings (OSTI)

The 4th IEEE/IFIP International Workshop on Management of the Future Internet (ManFI 2012) was held on April 16, 2012 in Maui, USA. This report summarizes the keynotes, presentations and discussions in ManFI 2012 and provides a high-level view of ideas, ... Keywords: Autonomic networking, Future Internet, Future Internet management, Management architecture, Network management, OpenFlow-based Future Internet architectures

Filip Turck; Yoshiaki Kiriha; James Won-Ki Hong

2012-12-01T23:59:59.000Z

287

Humanities and Arts: Sharing Center Stage on the Internet  

Science Conference Proceedings (OSTI)

This document is designed primarily for individuals who have limited knowledge of, or experience with, the Internet.

J. Max; W. Stickle

1997-10-01T23:59:59.000Z

288

Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe  

E-Print Network (OSTI)

In this article we propose a method for measuring internet connection stability which is fast and has negligible overhead for the process of its complexity. This method finds a relative value for representing the stability of internet connections and can also be extended for aggregated internet connections. The method is documented with help of a real time implementation and results are shared. This proposed measurement scheme uses HTTP GET method for each connections. The normalized responses to identified sites like gateways of ISPs, google.com etc are used for calculating current link stability. The novelty of the approach is that historic values are used to calculate overall link stability. In this discussion, we also document a method to use the calculated values as a dynamic threshold metric. This is used in routing decisions and for load-balancing each of the connections in an aggregated bandwidth pipe. This scheme is a very popular practice in aggregated internet connections.

M, Vipin

2009-01-01T23:59:59.000Z

289

Traffic characterization and internet usage in rural Africa  

Science Conference Proceedings (OSTI)

While Internet connectivity has reached a significant part of the world's population, those living in rural areas of the developing world are still largely disconnected. Recent efforts have provided Internet connectivity to a growing number of remote ... Keywords: internet usage, interviews, rural networks

David L. Johnson; Veljko Pejovic; Elizabeth M. Belding; Gertjan van Stam

2011-03-01T23:59:59.000Z

290

Quantifying video-QoE degradations of internet links  

Science Conference Proceedings (OSTI)

With the proliferation of multimedia content on the Internet, there is an increasing demand for video streams with high perceptual quality. The capability of present-day Internet links in delivering high-perceptual-quality streaming services, however, ... Keywords: digital video broadcasting, internet, quality of experience (QoE)

Mukundan Venkataraman; Mainak Chatterjee

2012-04-01T23:59:59.000Z

291

The emerging Internet governance mosaic: connecting the pieces  

Science Conference Proceedings (OSTI)

The report highlights key Internet governance issues raised in relation to the authors' three-tier typology. The distinctive design and governance characteristics that underpin the global Internet phenomenon are then outlined, to indicate valuable governance ... Keywords: Internet, cyberspace, governance, multi-stakeholder, policy

William H. Dutton; Malcolm Peltu

2007-01-01T23:59:59.000Z

292

Assessing the Security of a CleanSlate Internet Architecture  

E-Print Network (OSTI)

designed a clean­slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, withoutAssessing the Security of a Clean­Slate Internet Architecture Gowtham Boddapati # John Day clean­ slate internet architectures. Our own investigations into the fundamental principles

Texas at Arlington, University of

293

A Revised Version of Lettau's Evapoclimatonomy Model  

Science Conference Proceedings (OSTI)

In this paper a revised version of Lettau's evapoclimatonomy model is introduced. Climatonomy is a one-dimensional representation of mean climate, which includes a complete characterization of the surface energy and water balances. The model is ...

Sharon E. Nicholson; Andrew R. Lare; JosiéA. Marengo; Pablo Santos

1996-04-01T23:59:59.000Z

294

Gasoline prices continue to decrease (long version)  

U.S. Energy Information Administration (EIA) Indexed Site

, 2013 Gasoline prices continue to decrease (long version) The U.S. average retail price for regular gasoline fell to 3.65 a gallon on Monday. That's down 3 12 cents from a week...

295

Gasoline prices continue to fall (long version)  

U.S. Energy Information Administration (EIA) Indexed Site

Gasoline prices continue to fall (long version) The U.S. average retail price for regular gasoline decreased for the second week in a row to 3.71 a gallon on Monday. That's down...

296

Gasoline prices continue to rise (long version)  

U.S. Energy Information Administration (EIA) Indexed Site

Gasoline prices continue to rise (long version) The U.S. average retail price for regular gasoline rose to 3.67 a gallon on Monday. That's up 7 cents from a week ago, based on the...

297

Gasoline prices continue to fall (long version)  

U.S. Energy Information Administration (EIA) Indexed Site

Gasoline prices continue to fall (long version) The U.S. average retail price for regular gasoline fell to 3.61 a gallon on Monday. That's down 3.7 cents from a week ago, based on...

298

Gasoline prices inch down (long version)  

U.S. Energy Information Administration (EIA) Indexed Site

Gasoline prices inch down (long version) The U.S. average retail price for regular gasoline fell to 3.68 a gallon on Monday. That's down 1.6 cents from a week ago, based on the...

299

Free probability and combinatorics Preliminary version  

E-Print Network (OSTI)

Free probability and combinatorics Preliminary version Michael Anshelevich c 2012 December 4, 2012 #12;Preface These notes were used in a topics course Free probability and combinatorics taught topics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3 Free

Anshelevich, Michael

300

Paper Airplane user's manual : version four  

E-Print Network (OSTI)

Preface: This document provides the user with a step-by-step guide to using Paper Airplane, Version IV. Although this program can be used to design any system (once given the proper set of design equations), this manual ...

Lajoie, Ronnie M.

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Gasoline price shows small increase (long version)  

Annual Energy Outlook 2012 (EIA)

long version) The U.S. average retail price for regular gasoline showed little movement from last week. Prices rose 410 of a cent to 3.30 a gallon on Monday, based on the weekly...

302

The NCAR Climate System Model, Version One  

Science Conference Proceedings (OSTI)

The NCAR Climate System Model, version one, is described. The spinup procedure prior to a fully coupled integration is discussed. The fully coupled model has been run for 300 yr with no surface flux corrections in momentum, heat, or freshwater. ...

Byron A. Boville; Peter R. Gent

1998-06-01T23:59:59.000Z

303

The Community Climate System Model, Version 2  

Science Conference Proceedings (OSTI)

The Community Climate System Model, version 2 (CCSM2) is briefly described. A 1000-yr control simulation of the present day climate has been completed without flux adjustments. Minor modifications were made at year 350, which included all five ...

Jeffrey T. Kiehl; Peter R. Gent

2004-10-01T23:59:59.000Z

304

The Community Climate System Model Version 4  

Science Conference Proceedings (OSTI)

The fourth version of the Community Climate System Model (CCSM4) was recently completed and released to the climate community. This paper describes developments to all CCSM components, and documents fully coupled preindustrial control runs ...

Peter R. Gent; Gokhan Danabasoglu; Leo J. Donner; Marika M. Holland; Elizabeth C. Hunke; Steve R. Jayne; David M. Lawrence; Richard B. Neale; Philip J. Rasch; Mariana Vertenstein; Patrick H. Worley; Zong-Liang Yang; Minghua Zhang

2011-10-01T23:59:59.000Z

305

Snap: Robust Tool for Internet-wide Operating System Fingerprinting  

E-Print Network (OSTI)

Different approaches have been developed for TCP/IP fingerprinting, but none of these approaches is suited for Internet-wide fingerprinting. In this work, we develop approaches that rigorously tackle the issue of noise and packet loss while carrying out Internet-wide fingerprinting. We then carry out an Internet-wide scan to determine the distribution of different operating systems on the Internet. The results of our scan indicate that there are approximately 8.9 million publicly accessible web-servers on the Internet running Linux, while there are nearly 9.6 million web-servers with different embedded operating systems.

Nandwani, Ankur Bharatbhushan

2010-12-01T23:59:59.000Z

306

Connecting to the Internet Securely; Protecting Home Networks CIAC-2324  

SciTech Connect

With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

Orvis, W J; Krystosek, P; Smith, J

2002-11-27T23:59:59.000Z

307

arXiv.org help - Submission Version Availability  

NLE Websites -- All DOE Office Websites (Extended Search)

Submission Version Availability Beginning in October 1997, all official versions of papers submitted are made publicly available through the archive Web interface. An "official"...

308

Clean Cities: National Clean Fleets Partnership Video (Text Version...  

NLE Websites -- All DOE Office Websites (Extended Search)

Clean Fleets Partnership Video (Text Version) to someone by E-mail Share Clean Cities: National Clean Fleets Partnership Video (Text Version) on Facebook Tweet about Clean...

309

Internet- versus Telephone-based Local Outbreak Investigations  

E-Print Network (OSTI)

We compared 5 locally conducted, Internet-based outbreak investigations with 5 telephone-based investigations. Internet-based surveys required less completion time, and response rates were similar for both investigation methods. Participant satisfaction with Internet-based surveys was high. Although the Internet has been increasingly used in epidemiologic research, its use for investigation of infectious disease outbreaks has been less frequently described. Most reports of Internet-based outbreak investigations have described large, single outbreaks conducted by national or state public health agencies. Examples of reported Internet-based outbreak investigations include a communitywide norovirus outbreak in Finland, a communitywide Cryptosporidium outbreak in Kansas, a multistate Salmonella outbreak, and a conjunctivitis outbreak at a university (1–4). These reports noted several advantages of Internet use, including reductions in resource use, workload, and time required for survey completion and data entry (1–4). However, these advantages are not generally quantified in outbreak reports. Moreover, Internetbased outbreak investigations are seldom reported from the local health department level, where resources are often constrained compared with those of state and national agencies. We offer an analysis of several small Internetbased outbreak investigations conducted at the local level. We describe response rates to Internet-based surveys with and without telephone follow-up, the time needed to complete Internet-based outbreak surveys in comparison with traditional telephone surveys, participant satisfaction with Internet-based surveys, and differences in Internet-based outbreak investigations based on the respondents ’ setting: professional versus household.

Tista S. Ghosh; Jennifer L. Patnaik; Nisha B. Alden; Richard L. Vogt

2006-01-01T23:59:59.000Z

310

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

311

Transportation Protocols Working Group First Conference Call...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

312

Field Monitoring Protocol: Heat Pump Water Heaters  

NLE Websites -- All DOE Office Websites (Extended Search)

Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson National Renewable Energy Laboratory C.E. Hancock Mountain Energy...

313

California Energy Efficiency Evaluation Protocols | Building...  

NLE Websites -- All DOE Office Websites (Extended Search)

bpCaliforniaEnergyEfficiencyEvaluationProtocols.pdf Document Details Affiliation: California Public Utilities Commission Focus: Adoption Compliance Building Type: Commercial...

314

Specifications - The Security Content Automation Protocol ...  

Science Conference Proceedings (OSTI)

... Platform Enumeration Version: 2.3 Web site: http://scap.nist.gov/specifications/ cpe Contact Email: cpe@nist.gov Official Dictionary: https://nvd.nist ...

2013-08-12T23:59:59.000Z

315

A Model of the Fresh Internet  

E-Print Network (OSTI)

Previous models of the Web graph have highlighted some interesting properties, but have failed to describe the behavior of new content, especially how links to newly created pages appear. We experimentally study new Internet content using real-world data collected at Yandex (Russia's most popular search engine) and then we propose a new model of the Web graph, which reflects the behavior of such new content. We show through a set of experiments that this model realistically predicts the personalized PageRank and the diameter of new Internet content, something already existing models did not do. This model can be used for crawling, for example to define and tune crawl policies to improve the freshness of a search engine's index.

Lefortier, Damien; Samosvat, Egor

2012-01-01T23:59:59.000Z

316

Hybrid Trust Model for Internet Routing  

E-Print Network (OSTI)

The current Internet is based on a fundamental assumption of reliability and good intent among actors in the network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle for Internet communication. In order to improve the trustworthiness and reliability of the network infrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach, trust model is defined by combining voting and recommendation to direct trust estimation for neighbour routers located in different autonomous systems. We illustrate the impact of our approach with cases that demonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of a distrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and direct trust in a rectangular grid of 15*15 nodes (autonomous systems) with a randomly connected topology.

Rantala, Pekka; Isoaho, Jouni

2011-01-01T23:59:59.000Z

317

Internet and political communication - Macedonian case  

E-Print Network (OSTI)

Analysis how to use Internet influence to the process of political communication, marketing and the management of public relations, what kind of online communication methods are used by political parties, and to assess satisfaction, means of communication and the services they provide to their partys voters (people) and other interest groups and whether social networks can affect the political and economic changes in the state, and the political power of one party.

Emruli, Sali

2011-01-01T23:59:59.000Z

318

Correlated Resource Models of Internet End Hosts  

E-Print Network (OSTI)

Understanding and modelling resources of Internet end hosts is essential for the design of desktop software and Internet-distributed applications. In this paper we develop a correlated resource model of Internet end hosts based on real trace data taken from the SETI@home project. This data covers a 5-year period with statistics for 2.7 million hosts. The resource model is based on statistical analysis of host computational power, memory, and storage as well as how these resources change over time and the correlations between them. We find that resources with few discrete values (core count, memory) are well modeled by exponential laws governing the change of relative resource quantities over time. Resources with a continuous range of values are well modeled with either correlated normal distributions (processor speed for integer operations and floating point operations) or log-normal distributions (available disk space). We validate and show the utility of the models by applying them to a resource allocation ...

Heien, Eric M; David, Anderson

2010-01-01T23:59:59.000Z

319

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

320

Capture Effect of Randomly Addressed Polling Protocol  

Science Conference Proceedings (OSTI)

The capture effect, discussed in this paper, is generally considered to enhance the system‘s performance in a wireless network. This paper also considers the Randomly Addressed Polling (RAP) protocol in the presence of a fading mobile radio ... Keywords: capture effect, noiseless, randomly addressed polling protocol

Jiang-Whai Dai

1999-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Proof-Based design of security protocols  

Science Conference Proceedings (OSTI)

We consider the refinement-based process for the development of security protocols. Our approach is based on the Event B refinement, which makes proofs easier and which makes the design process faithfull to the structure of the protocol as the designer ...

Nazim Benaissa; Dominique Méry

2010-06-01T23:59:59.000Z

322

Security protocols, properties, and their monitoring  

Science Conference Proceedings (OSTI)

This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties ... Keywords: language-based security, monitoring of history-based properties, runtime verification, security automata, security protocols, temporal logic

Andreas Bauer; Jan Juerjens

2008-05-01T23:59:59.000Z

323

RTP Control Protocol Extended Reports (RTCP XR)  

Science Conference Proceedings (OSTI)

This document defines the Extended Report (XR) packet type for the RTP Control Protocol (RTCP), and defines how the use of XR packets can be signaled by an application if it employs the Session Description Protocol (SDP). XR packets are composed of ...

T. Friedman; R. Caceres; A. Clark

2003-11-01T23:59:59.000Z

324

Mayday: Distributed Filtering for Internet Services  

E-Print Network (OSTI)

Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentication and protocol verification, and then relay the requests to a protected server. The server is protected from outside attack by simple packet filtering rules that can be efficiently deployed even in backbone routers. Mayday generalizes

David G. Andersen

2003-01-01T23:59:59.000Z

325

BBSLA – Jordan (031210) English (Global Version 031010) 1 ...  

Science Conference Proceedings (OSTI)

BBSLA – Jordan (031210) English (Global Version 031010) 1 BLACKBERRY SOLUTION LICENSE AGREEMENT PLEASE READ THIS ...

326

MAPSS Version 1.0 Available  

NLE Websites -- All DOE Office Websites (Extended Search)

MAPSS (Mapped Atmosphere-Plant-Soil System Model) Version 1.0 Available MAPSS (Mapped Atmosphere-Plant-Soil System Model) Version 1.0 Available The ORNL NASA DAAC is please to announce the release of a new vegetation distribution model product, MAPSS: Mapped Atmosphere-Plant-Soil System Model, Version 1.0. The MAPSS model was developed by the Pacific Northwest Research Station USDA Forest Service and has been used extensively by the IPCC (Intergovernmental Panel on Climate Change) in regional and global assessments of climate change impacts on vegetation. The MAPSS model simulates the potential natural vegetation that could exist on any upland site in the world under present, past, or future climate change. It operates on the fundamental principal that ecosystems will tend to maximize the leaf area that can be supported at a site by available soil

327

House Simulation Protocols Report | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Buildings » Building America » House Simulation Residential Buildings » Building America » House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

328

Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version)  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety (Text Safety (Text Alternative Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Safety (Text Alternative Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications Newsletter Program Presentations Multimedia Conferences & Meetings

329

Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version)  

NLE Websites -- All DOE Office Websites (Extended Search)

Cars (Text Cars (Text Alternative Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Cars (Text Alternative Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications Newsletter Program Presentations Multimedia Conferences & Meetings

330

Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version)  

NLE Websites -- All DOE Office Websites (Extended Search)

Storage (Text Storage (Text Alternative Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Storage (Text Alternative Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications Newsletter Program Presentations Multimedia Conferences & Meetings

331

The Unintended Consequences of Internet Diffusion: Evidence from Malaysia  

E-Print Network (OSTI)

Job Market Paper Can the internet promote democratization by weakening government control of the media? To examine this question, I develop a model where internet penetration decreases incumbent party vote share by greatly increasing the cost of buying off the media. I test the model against evidence from Malaysia, where the incumbent coalition lost its 40 year monopoly on power in 2008. I use data matching IP addresses with physical locations to construct a measure of internet growth in Malaysia from 2004 to 2008. Using an instrumental variable approach, I find that areas with higher internet penetration experience higher turnout, higher turnover and tighter races, with the Internet accounting for a third of the 10 % swing against the incumbent party in 2008. In fact, the results suggest that in the absence of the internet, the opposition would not have achieved its historic upset in the 2008 elections.

Luke Miner; Greg Fischer; Alan Manning; George Michaelson; Kian Ming Ong; Yeong-chuan Lim; Henry Overman; Steve Pischke; Danny Quah; Ramasamy Ramach; Yasuyuki Sawada; Ibrahim Suffian; Dr. Fadhlullah Suhaimi

2011-01-01T23:59:59.000Z

332

What is the Internet doing for and to you?  

Science Conference Proceedings (OSTI)

Many HEP sites have been participating in a project to monitor end-to-end Internet performance. A few sites have acted as central collection, analysis and report generation points for the large amount of data generated. The reports are useful for short term trouble identification, long term projections, and the evaluation of Internet services. The work is illustrated by examples of both detailed and more general Internet performance.

Cottrell, R.L.A.; Logg, C.A. [Stanford Linear Accelerator Center, Menlo Park, CA (United States); Martin, D.E. [Fermi National Accelerator Center, Batavia, IL (United States). HEP Network Resource Center

1997-06-01T23:59:59.000Z

333

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses  

E-Print Network (OSTI)

We propose a model of operation for next generation wireless Internet, in which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses. Each correspondent is distributed a different disposable home address. If attacked on a given home address, the mobile user can block packets to that address and become unreachable to the attacker. Blocking one address does not affect other addresses. Other correspondents can still reach the mobile host. A new home address can also be requested via e-mail, instant messaging, or directly from the target host using a protocol that we develop. This model is especially useful against battery exhausting Denial-of-Service (DoS) attacks and CPU exhausting distributed DoS attacks, since it seems to be the only viable solution, currently. We show however that this model can also be used to defeat other attacks and also to stop spam.

Mutaf, Pars

2011-01-01T23:59:59.000Z

334

Google's Auction for TV Ads Preliminary version  

E-Print Network (OSTI)

Google's Auction for TV Ads Preliminary version Noam Nisan Jason Bayer Deepak Chandra Tal Franji Robert Gardner Yossi Matias Neil Rhodes Misha Seltzer Danny Tom Hal Varian Dan Zigmond Google Inc. Abstract This document describes the auction system used by Google for allocation and pricing of TV ads

Nisan, Noam

335

SAVE: static analysis on versioning entities  

Science Conference Proceedings (OSTI)

Insufficiently tested software releases provoque a competition between 'exploiters' versus 'patchers'. Developing secure software from scratch greatly reduces maintenance effort. The integration of regular security checks combined with patch proposals ... Keywords: incremental analysis, secure software development, static analysis, version control system

Bastian Braun

2008-05-01T23:59:59.000Z

336

Release Version Parabolic Dish Microphone System  

E-Print Network (OSTI)

Release Version Parabolic Dish Microphone System Prepared by: Zhixin Chen (Ph.D. Student), with the assistance of Robert C. Maher (Associate Professor) Montana State University A parabolic dish microphone is like a mirror telescope for sound. A parabolic reflector is used to collect and focus sound waves

Maher, Robert C.

337

NMR Sample Policy Version: 20 Jul 2006  

E-Print Network (OSTI)

NMR Sample Policy Version: 20 Jul 2006 Task: NMR Sample Preparation Equipment Used: Centrifuge, pH meter, NMR spectrometers, fumehood, fridges, freezers, tube cleaner Location: Rooms G14, G16, G23 and G24 in the Henry Wellcome Building for Biomolecular NMR Spectroscopy, University of Birmingham Hazards

Birmingham, University of

338

NSIT Computer Time Services: Internet Time Service (ITS) ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 250-59 NIST Computer Time Services: Internet Time Service (ITS), Automated Computer Time Service (ACTS), ...

2012-09-16T23:59:59.000Z

339

EDI MOVES FROM THE VAN TO THE INTERNET  

Science Conference Proceedings (OSTI)

... 6. Nash, Kim S., "Internet EDI on horizon: users worry that steep do-it-yourself security costs may spoil the view." Computerworld. ...

1996-10-28T23:59:59.000Z

340

Communication and information: alternative uses of the Internet in households  

Science Conference Proceedings (OSTI)

Keywords: Email, Internet, World Wide Web, computer-mediated communication, family communication, interpersonal communication, online services, social impact, technology adoption, user studies

Robert Kraut; Tridas Mukhopadhyay; Janusz Szczypula; Sara Kiesler; William Scherlis

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A New Addressing and Forwarding Architecture for the Internet.  

E-Print Network (OSTI)

??The current Internet routing and addressing architecture is facing a serious scalability problem. The default free zone (DFZ) routing table size grows at an increasing… (more)

Guo, Cong

2011-01-01T23:59:59.000Z

342

Impact of the Internet on Tourism and Hospitality in Kenya.  

E-Print Network (OSTI)

??This thesis gives an insight into the importance of the use of the Internet in tourism and hospitality industries in Kenya. The aim of this… (more)

Njung'e, Mercyanne

2013-01-01T23:59:59.000Z

343

Automatisierte Wahl von Kommunikationsprotokollen für das heutige und zukünftige Internet.  

E-Print Network (OSTI)

??Das erfolgreiche Internet basiert auf einer großen Anzahl unterschiedlicher Kommunikationsprotokolle. Diese erfüllen wesentliche Aufgaben, wie Adressierung, Datentransport oder sichere Kommunikation. Wählt man die richtigen Protokolle… (more)

Völker, Lars

2012-01-01T23:59:59.000Z

344

The regulation of internet interconnection : assessing network market power  

E-Print Network (OSTI)

Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, ...

Maida, Elisabeth M. (Elisabeth Marigo)

2013-01-01T23:59:59.000Z

345

What You Don't Know About the Internet  

Science Conference Proceedings (OSTI)

... different from disseminating the information through a home page on the World Wide Web. Another very important consideration on the Internet is security.

346

Internet Banking in Greece: Development, Evaluation and Perspectives.  

E-Print Network (OSTI)

??Revolutionary developments in marketing, information and communications technology continue to transform the banking and financial industry. Distribution of banking services through the Internet is an… (more)

Papandreou, Andreas-Nikolaos

2006-01-01T23:59:59.000Z

347

Materials Reliability Program: Background of Reactor Vessel Material Surveillance Programs and Recommended Data Validation Protocol for the Radiation Embrittlement Archive Project (REAP) Database (MRP-369)  

Science Conference Proceedings (OSTI)

The U.S. Nuclear Regulatory Commission (NRC) staff is currently developing an updated, comprehensive reactor vessel surveillance database as a replacement for the Power Reactor Embrittlement Database Version 3 (PR-EDB). The new database—called “Radiation Embrittlement Archive Project,” or REAP—will be available to the public via the Internet. The REAP database contains essential information on the materials and test results from surveillance capsules in U.S. plants; these ...

2013-07-25T23:59:59.000Z

348

Routing Protocols and Concepts, CCNA Exploration Companion Guide  

Science Conference Proceedings (OSTI)

Routing Protocols and Concepts CCNA Exploration Companion Guide Routing Protocols and Concepts, CCNA Exploration Companion Guide is the official supplemental textbook for the Routing Protocols and Concepts course in the Cisco Networking Academy CCNA ...

Rick Graziani; Allan Johnson

2007-12-01T23:59:59.000Z

349

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

350

Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence  

Science Conference Proceedings (OSTI)

Internet deception threatens the sustainability of Internet commerce because it undermines trust. This paper investigates the deceptive tactics available on the Internet and some of the factors that make them more or less likely to be adopted. An established ... Keywords: Computer Crime, Electronic Commerce, Information Security, Internet Deception, Internet Fraud

Stefano Grazioli; Sirkka L. Jarvenpaa

2003-06-01T23:59:59.000Z

351

On the internet grouping for reliable multicasting  

E-Print Network (OSTI)

Current implementation of multicasting is using UDP protocol which is unreliable. There are many problems in reliable multicasting that make it difficult to implement. A study of the problems of reliable multicasting and an algorithm for reliable multicast protocol are proposed in this thesis. Unfairness when some of the receivers are faster than the others, the overhead at the sender because of managing all the group members and the problem of the traffic congestion at the sender because of the acknowledgments from each receiver are the problems that our proposed algorithm solved. Our proposed protocol is to divide the multicast group into different subgroups in a way that all members of the subgroup are related in speeds, location etc. In this way, we will make the sender send the same message with different speeds to different receiver subgroups. The sender will send as many times as the number of the subgroups. This solution has the advantage that fast receivers will not wait for slow receivers until they receive their message, which will improve the performance of fast receivers. To reduce the number of acknowledgments at the sender, we select from each subgroup a member that sends acknowledgment to the sender. In this way, only one acknowledgment from the subgroup is sent to the receiver rather than every member sending an acknowledgment to the sender, which solves the problem of many acknowledgments at the sender.

Ghanem, Mohamed M.

1996-01-01T23:59:59.000Z

352

In Search of Copyright’s Lost Ark: Interpreting the Right to Distribute in the Internet Age  

E-Print Network (OSTI)

photographs posted on internet website implicated Playboy's§ 512 in holding that an Internet provider which serves,Statutory Damages in the Internet Age (in process) (

Menell, Peter S

2010-01-01T23:59:59.000Z

353

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Name The Greenhouse Gas Protocol Initiative: Allocation...

354

High Performance Computing Data Center Metering Protocol | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

355

Event:GHG Protocol Latin America and Caribbean Regional Training...  

Open Energy Info (EERE)

GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol...

356

Kyoto Protocol Response (Alabama) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

357

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

358

NREL Test-to-Failure Protocol (Presentation)  

DOE Green Energy (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

359

The Kyoto Protocol and developing countries  

E-Print Network (OSTI)

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

360

A decision maker for transport protocol configuration  

Science Conference Proceedings (OSTI)

This paper proposes an approach, called Protocol Configuration Decision Maker, for TCP to dynamically adapt to a network environment. The proposed mechanism monitors the network condition with parameters like loss rate. Then it consults a knowledge ...

Jae-Hyun Hwang; Jin-Hee Choi; Chuck Yoo

2006-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Making sensornet MAC protocols robust against interference  

Science Conference Proceedings (OSTI)

Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external interference on state-of-the-art sensornet MAC protocols. Our experiments ...

Carlo Alberto Boano; Thiemo Voigt; Nicolas Tsiftes; Luca Mottola; Kay Römer; Marco Antonio Zúñiga

2010-02-01T23:59:59.000Z

362

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

363

Entanglement Distillation Protocols and Number Theory  

E-Print Network (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

364

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

365

The security of Ping-Pong protocol  

E-Print Network (OSTI)

Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

Jian-Chuan Tan; An Min Wang

2008-08-28T23:59:59.000Z

366

Transition from Legacy Protocols to IEC 61850  

Science Conference Proceedings (OSTI)

Implementation of International Electrotechnical Commission (IEC) standard 61850, “Substation Automation,” within a utility is not necessarily easy or straightforward, especially when it is carried out within existing substations. During the transition, it is usually necessary to operate with both older devices supporting only legacy protocols and new, intelligent electronic devices, which now come with the IEC 61850 protocol. Both must coexist for a certain period in a substation ...

2012-12-31T23:59:59.000Z

367

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

368

The broadband bonus: Estimating broadband Internet's economic value  

Science Conference Proceedings (OSTI)

How much economic value did broadband Internet create? Despite the importance of this question for national policy, no research has estimated broadband's incremental contribution to U.S. GDP by calibrating against historical adoption and incorporating ... Keywords: Broadband, Economic value, Internet, Surplus

Shane Greenstein; Ryan C. McDevitt

2011-08-01T23:59:59.000Z

369

Forecasting broadband Internet adoption on trains in Belgium  

Science Conference Proceedings (OSTI)

Thanks to the massive success of mobile access devices such as netbooks or Apple's iPhone 3G, Internet on the move has become one of the prominent features of today's information society. With the emergence of wireless and mobile communication networks, ... Keywords: Railroad industry, Segmentation forecasting, User-centric research, Wireless Internet services

Tom Evens; Dimitri Schuurman; Lieven De Marez; Gino Verleye

2010-02-01T23:59:59.000Z

370

of Internet-based Capabilities References: See Attachment 1  

E-Print Network (OSTI)

responsible and effective use of Internet-based capabilities, including social networking services (SNS). This policy recognizes that Internet-based capabilities are integral to operations across the Department of Defense. This DTM is effective immediately; it will be converted to a new

unknown authors

2012-01-01T23:59:59.000Z

371

Online Harassment in Context: Trends From Three Youth Internet  

E-Print Network (OSTI)

Objective: The current study examines an increase in youth online harassment over the last decade in order to better explore the implications of the trend for prevention initiatives. Method: The Youth Internet Safety Surveys (YISSs) involved 3 crosssectional, nationally representative telephone surveys of 4,561 youth Internet users,

Lisa M. Jones; Kimberly J. Mitchell; David Finkelhor; Lisa M. Jones; Kimberly J. Mitchell; David Finkelhor

2012-01-01T23:59:59.000Z

372

Associating Internet usage with depressive behavior among college students  

E-Print Network (OSTI)

Abstract — Depression is a mental health problem affecting a large population of college students. Since college students are active users of the Internet today, investigating associations between symptoms of depression and Internet usage has been an active area of research. While existing studies do provide critical insights, they are limited due to the fact that Internet usage of subjects is characterized by means of self-reported surveys only. In this paper, we report our findings on a month long experiment conducted at Missouri University of Science and Technology on associating depressive symptoms among college students and Internet usage using real Internet data collected continuously, unobtrusively and preserving privacy. In our study, 216 undergraduates were surveyed for depressive symptoms using the CES-D scale. We then collected their on-campus Internet usage via Cisco NetFlow records. Subsequent analysis revealed that several Internet usage features like average packets per flow, peer-to-peer (octets, packets and duration), chat octets, mail (packets and duration), ftp duration, and remote file octets exhibit a statistically significant correlation with depressive symptoms. Additionally, Mann-Whitney U-tests revealed that average packets per flow, remote file octets, chat (octets, packets and duration) and flow duration entropy demonstrate statistically significant differences in the mean values across groups with and without depressive symptoms. To the best of our knowledge, this is the first study that associates depressive symptoms among college students with continuously collected real Internet data.

Raghavendra Kotikalapudi; Frances Montgomery; Donald Wunsch

2012-01-01T23:59:59.000Z

373

Controlling access to the Internet: The role of filtering  

Science Conference Proceedings (OSTI)

Controlling access to the Internet by means of filtering software has become a growth industry in the U.S. and elsewhere. Its use has increased as the mandatory response to the current plagues of society, namely, pornography, violence, hate, and ... Keywords: Internet, United States, ethics, filters, free speech, laws, libraries

R. S. Rosenberg

2001-05-01T23:59:59.000Z

374

ICTs and Internet adoption in China's tourism industry  

Science Conference Proceedings (OSTI)

The fast development of information communication technologies (ICTs) and the expansion of the Internet have changed industry structures around the world. New technologies have been adopted in the tourism industry in Europe and America for more than ... Keywords: China, ICT, Internet, Tourism

Jennifer Xiaoqiu Ma; Dimitrios Buhalis; Haiyan Song

2003-12-01T23:59:59.000Z

375

Vehicular networks and the future of the mobile internet  

Science Conference Proceedings (OSTI)

The first DARPA experiment with wireless mobile Internet - the Packet Radio Network or PRNET - was completely independent of the infrastructure. This model was consistent with DARPA military goals as the PRNET was designed to support tactical operations ... Keywords: Mobile Internet, VANET, Vehicular network, Wireless network architecture

Mario Gerla; Leonard Kleinrock

2011-02-01T23:59:59.000Z

376

Understanding and modeling the internet topology: economics and evolution perspective  

Science Conference Proceedings (OSTI)

In this paper, we seek to understand the intrinsic reasons for the well-known phenomenon of heavy-tailed degree in the Internet AS graph and argue that in contrast to traditional models based on preferential attachment and centralized optimization, the ... Keywords: autonomous systems, clustering coefficient, degree distribution, internet topology, random walk, wealth evolution

Xiaoming Wang; Dmitri Loguinov

2010-02-01T23:59:59.000Z

377

Farm management systems and the Future Internet era  

Science Conference Proceedings (OSTI)

Smart/precision farming systems are expected to play an important role in improving farming activities. During the past years, sophisticated farm management systems have emerged to replace outdated complex and monolithic farm systems and software tools. ... Keywords: Farm management system, Future Internet, Generic enablers, Internet of Things

Alexandros Kaloxylos; Robert Eigenmann; Frederick Teye; Zoi Politopoulou; Sjaak Wolfert; Claudia Shrank; Markus Dillinger; Ioanna Lampropoulou; Eleni Antoniou; Liisa Pesonen; Huether Nicole; Floerchinger Thomas; Nancy Alonistioti; George Kormentzas

2012-11-01T23:59:59.000Z

378

Internet use and personal empowerment of hearing-impaired adolescents  

Science Conference Proceedings (OSTI)

The Internet has become an ordinary and widely accepted alternative social environment-known as cyberspace-in which many people take part in numerous activities. For the hearing-impaired, cyberspace provides extra benefits for two basic reasons: means ... Keywords: Adolescents, Empowerment, Hearing-impaired, Internet, Well-being

Azy Barak; Yael Sadovsky

2008-09-01T23:59:59.000Z

379

Identity based architecture for secure communication in future internet  

Science Conference Proceedings (OSTI)

We propose to enhance the Next Generation Internet by creating a secure and scalable communication infrastructure that mirrors the structure of the real world: people talk to people, objects, objects between themselves and, in general, entities denoted ... Keywords: digital identity, identity-to-identity, next generation internet, overlay network

Antonio F. Gomez-Skarmeta; Pedro Martinez-Julia; Joao Girao; Amardeo Sarma

2010-10-01T23:59:59.000Z

380

Evolution of internet address space deaggregation: myths and reality  

Science Conference Proceedings (OSTI)

Internet routing table size growth and BGP update churn are two prominent Internet scaling issues. There is widespread belief in a high and fast growing number of ASs that deaggregate prefixes, e.g., due to multi-homing and for the purpose of traffic ... Keywords: address deaggregation, routing table growth, traffic engineering, update churn

Luca Cittadini; Wolfgang Muhlbauer; Steve Uhlig; Randy Bush; Pierre Francois; Olaf Maennel

2010-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Assessing the Security of a Clean-Slate Internet Architecture  

E-Print Network (OSTI)

Assessing the Security of a Clean-Slate Internet Architecture Gowtham Boddapati John Day Ibrahim Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate a comprehensive approach to security. Most recently, there have been attempts to design clean- slate internet

Texas at Arlington, University of

382

Understanding the Internet: A Guide for Materials Scientists and ...  

Science Conference Proceedings (OSTI)

Archie, the first Internet-wide archive index, allows users to search for files by name and .... Terminal access meant that users had to enter different commands for each .... One of the oldest and still best guides to the Internet, both in terms of ...

383

The diffusion of the Internet: A cross-country analysis  

Science Conference Proceedings (OSTI)

This paper analyzes the process of Internet diffusion across the world using a panel of 214 countries during the period 1990-2004. Countries are classified as low- or high-income and it is shown that the diffusion process is characterized by a different ... Keywords: Digital divide, Internet, Network externalities, O14, O33, O57, S-shape curve, Technological diffusion

Luis Andrés; David Cuberes; Mame Diouf; Tomás Serebrisky

2010-06-01T23:59:59.000Z

384

End-to-end routing behavior in the internet  

Science Conference Proceedings (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

2006-10-01T23:59:59.000Z

385

End-to-end routing behavior in the Internet  

Science Conference Proceedings (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

1996-08-01T23:59:59.000Z

386

DOE site facility mgt contracts Internet Posting 5-2-11.xlsx...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

site facility mgt contracts Internet Posting 5-2-11.xlsx DOE site facility mgt contracts Internet Posting 5-2-11.xlsx DOE site facility mgt contracts Internet Posting 5-2-11.xlsx...

387

Review: Oral Tradition and the Internet: Pathways of the Mind by John Miles Foley  

E-Print Network (OSTI)

Oral tradition and the Internet: Pathways of the mind.Oral Tradition and the Internet: Pathways of the Mind, bybook, Oral Tradition and the Internet: Pathways of the Mind,

Litwin, Rory B

2013-01-01T23:59:59.000Z

388

Internet Self-Injury Forums as Communities of Social-Cognitive Literacy Practice  

E-Print Network (OSTI)

K. Y. A. (2004). The Internet and social life. Annual ReviewThe Oxford handbook of Internet psychology (pp. 223-236).Sage. Ess, C. (2007). Internet research ethics. In A. N.

Brett, Jeremy

2010-01-01T23:59:59.000Z

389

Influences, usage, and outcomes of Internet health information searching: Multivariate results from the Pew surveys  

E-Print Network (OSTI)

Journal of Medical Internet Research, 4(1), e2. Crow, G. ,Journal of Medical Internet Research, 5(2):e10. Retrieved onJournal of Medical Internet Research, 5(3), e21.

Rice, Ronald E

2006-01-01T23:59:59.000Z

390

Report of the national workshop on internet voting: issues and research agenda  

Science Conference Proceedings (OSTI)

As use of the Internet in commerce, education and personal communication has become common, the question of Internet voting in local and national elections naturally arises. In addition to adding convenience and precision, some believe that Internet ...

C. D. Mote, Jr.

2000-05-01T23:59:59.000Z

391

Pedro Communications Patch for All Versions  

U.S. Energy Information Administration (EIA) Indexed Site

Pedro Communications Patch for All Versions Pedro Communications Patch for All Versions Released: March 2007 NOTICE TO NEW PEDRO 6.2 USERS The following process corrects the following error: Application Terminated. Error accessing external object property hostname… This error is due to some Pedro 6.2 Installation CD's that are missing a required Pedro 6.2 ActiveX component. This component allows for the connection and transfer of your Pedro 6.2 entered survey data to the EIA anonymous ftp server. Please follow the instructions below to correct this issue: Close Pedro\Pedro Communications if either one is currently running on your PC. Click on the following link EXE. Click the Save button to save the self-extracting zip file csftp32.exe to your Desktop or temporary directory. When the Download Complete dialog box pops up, click Run to install the patch.

392

Version 2 Global Fire Emissions Database Available  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Fire Emissions Database Available Global Fire Emissions Database Available The ORNL DAAC announces the release of the data set "Global Fire Emissions Database, Version 2 (GFEDv2)." This data set, which supersedes and replaces the Global Fire Emissions Database, Version 1 (GFEDv1), consists of 1 degree x 1 degree gridded monthly burned area, fuel loads, combustion completeness, and fire emissions of carbon (C), carbon dioxide (CO2), carbon monoxide (CO), methane (CH4), non-methane hydrocarbons (NMHC), molecular hydrogen (H2), nitrogen oxides (NOx), nitrous oxide (N2O), particulate matter (PM2.5), total particulate matter (TPM), total carbon (TC), organic carbon (OC), and black carbon (BC) for the time period January 1997 - December 2004. For more information or to access this data set, please see the Vegetation

393

HRA Calculator, Version 4.21 DEMO  

Science Conference Proceedings (OSTI)

HRA Calculator analyzes and calculates human error probabilities in support of probabilistic risk assessments. HRA Calculator takes a “toolbox” approach that uses a variety of HRA methods. The PRA Tools / HRA Calculator User Group was formed in 2000 to address the industry’s need for HRA tools and to encourage consistency in HRA results. Version 4.21 adds value by expanding the HRA Calculator methods applied, overcoming past limitations on particular parameters, improving the ...

2013-03-07T23:59:59.000Z

394

HRA Calculator Version 4.2  

Science Conference Proceedings (OSTI)

HRA Calculator analyzes and calculates human error probabilities in support of probabilistic risk assessments. HRA Calculator takes a 8220toolboxapproach that uses a variety of HRA methods. The PRA Tools / HRA Calculator User Group was formed in 2000 to address the industryneed for HRA tools and to encourage consistency in HRA results. Version 4.2 adds value by expanding the HRA Calculator methods applied, overcoming past limitations on particular parameters, improving the dependency analysis features, ...

2010-11-19T23:59:59.000Z

395

Spider 2, Version 2.1  

Science Conference Proceedings (OSTI)

The EPRI Spider 2, Version 2.1 software application (product ID # 1016529) allows a user to create a detailed assessment plan for evaluating the conditions of equipment, systems, processes and plans, and to make quantitative decisions based on qualitative data. Description Using basic concepts and technology developed over the years by the Electric Power Research Institute (EPRI), the Spider 2 software application provides a unique method for an organization to automate assessments of equipment, systems ...

2008-06-16T23:59:59.000Z

396

Life Cycle Environmental Assessment of the Internet: The Benefits and  

NLE Websites -- All DOE Office Websites (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Thomas McKone This seminar starts by providing a short introduction to the field of Environmental Life Cycle Assessment (LCA) through a practical example of packaging. It will then develop the case of the Life Cycle Benefits and Impacts of the Internet; raising the different scientific challenges that LCA faces to provide relevant results for innovative technologies.--The rapid development of the Internet and the related potential impacts on and benefits for the environment deserves attention. The infrastructure that supports a university's use of the Internet has been comprehensively

397

Randomness Quality of CI Chaotic Generators: Applications to Internet Security  

E-Print Network (OSTI)

Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.

Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

2011-01-01T23:59:59.000Z

398

Darknet-Based Inference of Internet Worm Temporal Characteristics  

E-Print Network (OSTI)

Internet worm attacks pose a significant threat to network security and management. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms from the observations of Darknet or network telescopes that monitor a routable but unused IP address space. Under the framework of Internet worm tomography, we attempt to infer Internet worm temporal behaviors, i.e., the host infection time and the worm infection sequence, and thus pinpoint patient zero or initially infected hosts. Specifically, we introduce statistical estimation techniques and propose method of moments, maximum likelihood, and linear regression estimators. We show analytically and empirically that our proposed estimators can better infer worm temporal characteristics than a naive estimator that has been used in the previous work. We also demonstrate that our estimators can be applied to worms using different scanning strategies such as random scanning and localized scanning.

Wang, Qian; Chen, Chao

2010-01-01T23:59:59.000Z

399

NREL: About NREL - NREL Overview Video (Text Version)  

NLE Websites -- All DOE Office Websites (Extended Search)

NREL Overview Video (Text Version) This is a text only version for the NREL Overview video. Learn more about NREL here on the NREL Overview page. Dr. Dan Arvizu, Laboratory...

400

A versatile and user-oriented versioning file system  

Science Conference Proceedings (OSTI)

File versioning is a useful technique for recording a history of changes. Applications of versioning include backups and disaster recovery, as well as monitoring intruders' activities. Alas, modern systems do not include an automatic and easy-to-use ...

Kiran-Kumar Muniswamy-Reddy; Charles P. Wright; Andrew Himmer; Erez Zadok

2004-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

ORNL NASA DAAC Announces Beta Test Version for Advanced Search  

NLE Websites -- All DOE Office Websites (Extended Search)

Test Version for Advanced Search The ORNL NASA DAAC is pleased to announce the public beta test release of the new version of our Mercury Advanced Search tool. Mercury is a...

402

LBNL Window & Daylighting Software -- THERM 6 Research Version  

NLE Websites -- All DOE Office Websites (Extended Search)

Certified Version THERM 6.3.46 (5252012) Release Notes NOTES: CMAST is only compatible with this version WINDOW 6.3 DOCUMENTATION KNOWLEDGE BASE FORUM Last Updated: 08302013...

403

Solid-State Lighting: Text-Alternative Version: LED Replacements...  

NLE Websites -- All DOE Office Websites (Extended Search)

Text-Alternative Version: LED Replacements for Linear Fluorescent Lamps to someone by E-mail Share Solid-State Lighting: Text-Alternative Version: LED Replacements for Linear...

404

(for Gene Recognition Analysis Internet Link),  

NLE Websites -- All DOE Office Websites (Extended Search)

5 6/1/2011 5 6/1/2011 6.6 Speeding Up the Process of Gene Discovery The human genome contains information that could be used to prevent birth defects and treat or cure devastating diseases, but it is written in a language that scientists are only beginning to understand. To help decipher the code, Ed Uberbacher and colleagues at Oak Ridge National Laboratory combined cutting- edge computer technology with their knowledge of human biology to develop GRAIL (for Gene Recognition Analysis Internet Link), a "thinking" computer program that imitates the human learning process as it searches for genetic meaning. GRAIL and successor software programs can rapidly identify key instructions in genes from within vast stretches of DNA that appear to be meaningless-a critical contribution to the

405

Fermilab Leadership Institute Integrating Internet, Instruction and  

NLE Websites -- All DOE Office Websites (Extended Search)

Fermilab Leadership Institute Integrating Fermilab Leadership Institute Integrating Internet, Instruction and Curriculum Online Materials Projects ACT Program Information Example ACT Class Page Example LInC Class Page Please sign up here to be notified of future LInC program opportunities. Fermilab LInC Online is creating a cadre of educational leaders who effectively integrate technology in their classrooms to support engaged learning student investigations on real-world issues. Participants range from classroom teachers and technology coordinators through library media specialists, who create engaged learning projects that incorporate the best uses of technology. The new Fermilab LInC ACT course guides teachers through the process of evaluating, selecting and customizing an inquiry-based online project to

406

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

407

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Archived Data Dictionary Archived Data Dictionary Central Internet Database CID Photo Banner Archived Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Stream Disposition Quantity* EM Corp - The quantity of material or waste dispositioned for the stream during a specified year or range of years. Annual Stream Inventory Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be stored as of a particular year or range of years. Annual Stream Source Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be generated new, generated as process outputs (secondary), or added through a receipt from another DOE or non-DOE site, in a particular year or range of years.

408

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Data Dictionary Data Dictionary Central Internet Database CID Photo Banner Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Disposition WIMS - Planned disposition quantity (total volume of container, as disposed, in m3) reported for each year: FY08 through FY50. B C Chemical Name TRI - (Form R - Part II - Section 1.2) The name of the toxic chemical that has been released and/or transferred during the reporting year. Listed toxic chemicals are those chemicals on the list in Committee Print Number 99-169 of the Senate Committee on Environment and Public Works, titled "Toxic Chemicals Subject to Section 313 of the Emergency Planning and Community Right-To-Know Act of 1986" (42 U.S.C. 11023). Currently, there are over 600 toxic chemicals included on the list subject to reporting.

409

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

410

NIST - Version history of the fundamental constants database  

Science Conference Proceedings (OSTI)

... Version history These are the 2010 CODATA recommended values of the fundamental physical constants, the latest CODATA values available. ...

411

BBSLA Chile (031710) Spanish (Global Version 031710) 1 ...  

Science Conference Proceedings (OSTI)

BBSLA Chile (031710) Spanish (Global Version 031710) 1 CONTRATO DE LICENCIA DE SOLUCIÓN BLACKBERRY FAVOR LEER ESTE ...

412

DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11.pdf...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

.pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11.pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11.pdf More Documents & Publications DOEMajorSiteFacilityCon...

413

DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11(1).pdf...  

NLE Websites -- All DOE Office Websites (Extended Search)

(1).pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf More Documents & Publications...

414

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

415

An Examination of Internet Pornography Usage Among Male Students at Evangelical Christian Colleges.  

E-Print Network (OSTI)

?? Internet pornography access among male students at Evangelical Christian colleges presents two dilemmas. First, Internet pornography access is institutionally prohibited based on a Biblical… (more)

Chelsen, Paul Olaf

2011-01-01T23:59:59.000Z

416

Internet as Teenager In Higher Education: Rapid Growth, Transformation, Uncertain but Bright Future  

E-Print Network (OSTI)

Internet is challenging higher education. Perhaps the mostMatkin, INTERNET AS TEENAGER IN HIGHER EDUCATION Notes “Chronicle of Higher Education,” “E-Learning: Successes and

Matkin, Gary

2007-01-01T23:59:59.000Z

417

Rethinking the Design of the Internet: End to End Arguements vs. the Brave New World  

E-Print Network (OSTI)

This paper looks at the Internet and the changing set of requirements for the Internet that are 8oriented towards the consumer, and used for a

Clark, David

418

Strategy for Verifying Security Protocols with Unbounded Message Size  

Science Conference Proceedings (OSTI)

We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy ... Keywords: automatic strategies, flaw detection, intruder model, security protocols, verification

Y. Chevalier; L. Vigneron

2004-04-01T23:59:59.000Z

419

Towards automated design of MAC protocols for underwater wireless networks  

Science Conference Proceedings (OSTI)

We present a framework for the automated design of MAC protocols for underwater acoustic wireless networks. We formulate a protocol optimization problem in which the exchange of control packets is explicitly modeled. A protocol optimization program generates ... Keywords: automation, mac, network, wireless underwater protocol

Volkan Rodoplu; Amir Aminzadeh Gohari; Wei Tang

2008-09-01T23:59:59.000Z

420

The queue protocol: a deadlock-free, homogeneous, non-two-phase locking protocol  

Science Conference Proceedings (OSTI)

The M-pitfall protocol (MPP) is the most general homogeneous non-two-phase locking protocol which supports shared and exclusive locks. It has two major disadvantages: it is not deadlock-free and it has the paradoxical property that concurrency is often ...

Udo Kelter

1988-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

A class-chest for deriving transport protocols  

SciTech Connect

Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

Strayer, W.T.

1996-10-01T23:59:59.000Z

422

Strategic motive of introducing Internet channels in a supply chain  

E-Print Network (OSTI)

Rapid advances of information technology in recent years have enabled both the manufacturers and the retailers to operate their own Internet channels. In this paper, we investigate the interaction between the capabilities of introducing the Internet channels, the pricing strategies, and the channel structure. We classify consumers into two segments: Grocery shoppers attach a higher utility from purchasing through the physical channel, whereas a priori Internet shoppers prefer purchasing online. We find that when the Internet shoppers are either highly profitable or fairly unimportant, the manufacturer prefers to facilitate the channel separation either through his own Internet channel or the retailer’s. In the intermediate region, however, the manufacturer encroaches the grocery shoppers and steals the demand from the retailer’s physical channel. With horizontal competition between retailers, a priori symmetric retailers may adopt different channel strategies as a stable market equilibrium. The manufacturer may willingly give up his Internet channel and leverage on the retailer competition. When the manufacturer sells through an online e-tailer, Internet shoppers may be induced to purchase through the physical channel. This reverse encroachment strategy emerges because selling through the e-tailer leads to a more severe double marginalization problem.

Lu Hsiao; Ying-ju Chen

2012-01-01T23:59:59.000Z

423

Interpolation of recurrence and hashing entanglement distillation protocols  

E-Print Network (OSTI)

We construct new entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method how entanglement-assisted distillation protocols can be converted into non-entanglement-assisted protocols with the same yield.

Karl Gerd H. Vollbrecht; Frank Verstraete

2004-04-20T23:59:59.000Z

424

Interpolation of recurrence and hashing entanglement distillation protocols  

Science Conference Proceedings (OSTI)

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

425

A History of Realtime Digital Speech on Packet Networks: Part II of Linear Predictive Coding and the Internet Protocol  

Science Conference Proceedings (OSTI)

In December 1974 the first realtime conversation on the ARPAnet took place between Culler-Harrison Incorporated in Goleta, California, and MIT Lincoln Laboratory in Lexington, Massachusetts. This was the first successful application of realtime digital ...

Robert M. Gray

2010-04-01T23:59:59.000Z

426

Routing Protocols to Maximize Battery Efficiency  

E-Print Network (OSTI)

In this paper we propose a routing protocol for wireless ad hoc networks whose nodes are largely battery powered. The battery capacity of the nodes is viewed as a common resource of the system and its use is to be optimized. Results from a previous study on battery management have shown that: (1) pulsed current discharge outperforms constant current discharge, (2) battery capacity can be improved by using a bursty discharge pattern due to charge recovery effects that take place during idle periods, (3) given a certain value of current drawn off the battery, higher current impulses degrade battery performance, even if the percentage of higher current impulses is relatively small. We develop a network protocol based on these findings. This protocol favors routes whose links have a low energy cost. We also distribute multihop traffic in a manner that allows all nodes a good chance to recover their battery energy reserve.

Carla F. Chiasserini; Ramesh R. Rao

2000-01-01T23:59:59.000Z

427

Solid-State Lighting: Text-Alternative Version: LED Essentials -  

NLE Websites -- All DOE Office Websites (Extended Search)

Essentials - Technology, Applications, Advantages, Disadvantages to someone Essentials - Technology, Applications, Advantages, Disadvantages to someone by E-mail Share Solid-State Lighting: Text-Alternative Version: LED Essentials - Technology, Applications, Advantages, Disadvantages on Facebook Tweet about Solid-State Lighting: Text-Alternative Version: LED Essentials - Technology, Applications, Advantages, Disadvantages on Twitter Bookmark Solid-State Lighting: Text-Alternative Version: LED Essentials - Technology, Applications, Advantages, Disadvantages on Google Bookmark Solid-State Lighting: Text-Alternative Version: LED Essentials - Technology, Applications, Advantages, Disadvantages on Delicious Rank Solid-State Lighting: Text-Alternative Version: LED Essentials - Technology, Applications, Advantages, Disadvantages on Digg

428

TOUGH2 User's Guide Version 2  

DOE Green Energy (OSTI)

TOUGH2 is a numerical simulator for nonisothermal flows of multicomponent, multiphase fluids in one, two, and three-dimensional porous and fractured media. The chief applications for which TOUGH2 is designed are in geothermal reservoir engineering, nuclear waste disposal, environmental assessment and remediation, and unsaturated and saturated zone hydrology. TOUGH2 was first released to the public in 1991; the 1991 code was updated in 1994 when a set of preconditioned conjugate gradient solvers was added to allow a more efficient solution of large problems. The current Version 2.0 features several new fluid property modules and offers enhanced process modeling capabilities, such as coupled reservoir-wellbore flow, precipitation and dissolution effects, and multiphase diffusion. Numerous improvements in previously released modules have been made and new user features have been added, such as enhanced linear equation solvers, and writing of graphics files. The T2VOC module for three-phase flows of water, air and a volatile organic chemical (VOC), and the T2DM module for hydrodynamic dispersion in 2-D flow systems have been integrated into the overall structure of the code and are included in the Version 2.0 package. Data inputs are upwardly compatible with the previous version. Coding changes were generally kept to a minimum, and were only made as needed to achieve the additional functionalities desired. TOUGH2 is written in standard FORTRAN77 and can be run on any platform, such as workstations, PCs, Macintosh, mainframe and supercomputers, for which appropriate FORTRAN compilers are available. This report is a self-contained guide to application of TOUGH2 to subsurface flow problems. It gives a technical description of the TOUGH2 code, including a discussion of the physical processes modeled, and the mathematical and numerical methods used. Illustrative sample problems are presented along with detailed instructions for preparing input data.

Pruess, K.; Oldenburg, C.M.; Moridis, G.J.

1999-11-01T23:59:59.000Z

429

Pricing the Internet - A visual 3-Dimensional Evaluation Model  

E-Print Network (OSTI)

We develop a novel visual approach to evaluating an Internet pricing scheme using a 3Dmetric model, which encompasses the dimensions of technical complexity, economic efficiency and social impact. We review the history of Internet pricing research over the last decade, summarizing the key features of the most significant models, and analyzing and evaluating them using our 3D model. Based on the analysis results, we address and discuss important factors that have inhibited the deployment of the reviewed models and suggest what might be future Internet pricing solutions.

Thuy T.T. Nguyen; Grenville J. Armitage

2003-01-01T23:59:59.000Z

430

Widget:PrintFullVersionButton | Open Energy Information  

Open Energy Info (EERE)

PrintFullVersionButton PrintFullVersionButton Jump to: navigation, search This widget creates a button, which create a button matching the PrintPDF button style, which will direct the user to the assembled page. This template assumes the existence of the PrintPDFButton widget and template. Parameters page - The wiki address of the assembled page, or full version to be printed. cover - The name of a wiki page to use as a cover page (optional) Dependencies Template:PrintFullVersionButton Template:PrintPDFButton Widget:PrintPDFButton Usage This Widget assumes the existence of HTML elements created by the PrintFullVersionButton template, and is called via that template. {{PrintFullVersionButton}} Example {{PrintFullVersionButton}} (displays in the upper right corner of the page) Retrieved from

431

Optimal query/update tradeoffs in versioned dictionaries  

E-Print Network (OSTI)

External-memory dictionaries are a fundamental data structure in file systems and databases. Versioned (or fully-persistent) dictionaries have an associated version tree where queries can be performed at any version, updates can be performed on leaf versions, and any version can be `cloned' by adding a child. Various query/update tradeoffs are known for unversioned dictionaries, many of them with matching upper and lower bounds. No fully-versioned external-memory dictionaries are known with optimal space/query/update tradeoffs. In particular, no versioned constructions are known that offer updates in $o(1)$ I/Os using O(N) space. We present the first cache-oblivious and cache-aware constructions that achieve a wide range of optimal points on this tradeoff.

Byde, Andrew

2011-01-01T23:59:59.000Z

432

On the Optimality of Basis Transformations to Secure Entanglement Swapping Based QKD Protocols  

E-Print Network (OSTI)

In this article, we discuss the optimality of basis transformations as a security measure for quantum key distribution protocols based on entanglement swapping. To estimate the security, we focus on the information an adversary obtains on the raw key bits from a generic version of a collective attack strategy. In the scenario described in this article, the application of general basis transformations serving as a counter measure by one or both legitimate parties is analyzed. In this context, we show that the angles, which describe these basis transformations can be optimized compared to the application of a Hadamard operation, which is the standard basis transformation recurrently found in literature. As a main result, we show that the adversary's information can be reduced to an amount of approximately 0.20752 when using a single basis transformation and to an amount of approximately 0.0548 when combining two different basis transformations. This is less than half the information compared to other protocols using a Hadamard operation and thus represents an advantage regarding the security of entanglement swapping based protocols.

Stefan Schauer; Martin Suda

2013-07-22T23:59:59.000Z

433

Standards as interdependent artifacts : the case of the Internet  

E-Print Network (OSTI)

This thesis has explored a new idea: viewing standards as interdependent artifacts and studying them with network analysis tools. Using the set of Internet standards as an example, the research of this thesis includes the ...

Hsieh, Mo-Han

2008-01-01T23:59:59.000Z

434

Electricity "Used by the Internet": A Cautionary Tale  

NLE Websites -- All DOE Office Websites (Extended Search)

Electricity "Used by the Internet": A Cautionary Tale Speaker(s): Jonathan Koomey Date: April 13, 2000 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Julie Osborn In...

435

A human rights approach to the mobile internet  

E-Print Network (OSTI)

2. What is a human rights approach to communication?..............................................4 3. The empowering potential of the mobile internet....................................................6 a. Citizen journalism and peer to peer information sharing.....................................................6 b. Crowdsourcing.............................................................................................................7

Lisa Horner

2011-01-01T23:59:59.000Z

436

Life Cycle Environmental Assessment of the Internet: The Benefits...  

NLE Websites -- All DOE Office Websites (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90...

437

Taming the Internet for eBusiness Use  

Science Conference Proceedings (OSTI)

Many companies nowadays realise that secure Internet access is a precursor to joining the information superhighway. This paper outlines the solution that BT's Advanced Communications Engineering (ACE) directorate produced, in a joint effort with Concert ...

R. Davison

2000-04-01T23:59:59.000Z

438

Integrating multiple internet directories by instance-based learning  

E-Print Network (OSTI)

Finding desired information on the Internet is becoming increasingly difficult. Internet directories such as Yahoo!, which organize web pages into hierarchical categories, provide one solution to this problem; however, such directories are of limited use because some bias is applied both in the collection and categorization of pages. We propose a method for integrating multiple Internet directories by instance-based learning. Our method provides the mapping of categories in order to transfer documents from one directory to another, instead of simply merging two directories into one. We present herein an effective algorithm for determining similar categories between two directories via a statistical method called the k-statistic. In order to evaluate the proposed method, we conducted experiments using two actual Internet directories, Yahoo! and Google. The results show that the proposed method achieves extensive improvements relative to both the Naive Bayes and Enhanced Naive Bayes approaches, without any text analysis on documents. 1

Ryutaro Ichise; Hiedeaki Takeda; Shinichi Honiden

2003-01-01T23:59:59.000Z

439

Understanding senior executives' use of information technology and the internet  

Science Conference Proceedings (OSTI)

The Internet and information technology (IT) have received considerable attention from senior executives, yet they still have not committed themselves fully to these technologies. Consequently, they are not reaping the full benefits. Recent studies investigated ...

Guus G. M. Pijpers

2002-01-01T23:59:59.000Z

440

On attack causality in internet-connected cellular networks  

Science Conference Proceedings (OSTI)

The emergence of connections between telecommunications networks and the Internet creates significant avenues for exploitation. For example, through the use of small volumes of targeted traffic, researchers have demonstrated a number of attacks capable ...

Patrick Traynor; Patrick McDaniel; Thomas La Porta

2007-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Internet Advertising: Market Structure and New Pricing Methods  

Science Conference Proceedings (OSTI)

In this paper the Internet advertising market is analyzed. Data and estimates confirm that the Web represents a real threat to television and newspapers. Therefore, the main characteristics of the advertising market are described in order to point out ...

Andrea Mangàni

2000-09-01T23:59:59.000Z

442

ESnet and Internet2 to launch next gen research network  

E-Print Network (OSTI)

"The Department of Energy's (DOE) Energy Sciences Network (ESnet) and Internet2 will deploy a high capacity nationwide network that will greatly enhance the capabilities of researchers across the country who participate in the DOE's scientific research efforts." (1 page)

2006-01-01T23:59:59.000Z

443

A Two-bit Differentiated Services Architecture for the Internet  

Science Conference Proceedings (OSTI)

This document was originally submitted as an internet draft in November of 1997. As one of the documents predating the formation of the IETF's Differentiated Services Working Group, many of the ideas presented here, in concert with Dave Clark's subsequent ...

K. Nichols; V. Jacobson; L. Zhang

1999-07-01T23:59:59.000Z

444

The consumer Internet in South Korea : an American's perspective  

E-Print Network (OSTI)

This thesis will explore the consumer internet industry in South Korea from the perspective of an American with Western values and sensibilities. South Korea is widely considered to be one of the most connected and ...

Byun, Jeffrey

2008-01-01T23:59:59.000Z

445

Search and Product Differentiation at an Internet Shopbot  

E-Print Network (OSTI)

Price dispersion among commodity goods is typically attributed to consumer search costs. We explore the magnitude of consumer search costs using a data set obtained from a major Internet shopbot. For the median consumer, ...

Brynjolfsson, Erik

2004-03-05T23:59:59.000Z

446

An interoperable internet scale solution for RFID network security  

E-Print Network (OSTI)

Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for ...

Mao, Tingting

447

Teaching internet use to adult learners: The LANL experience  

Science Conference Proceedings (OSTI)

The Research library at Los Alamos National Laboratory has been teaching an Internet class to adult learners since May 1994. The class is a team effort, combining lecture/demo with hands-on practice using Gopher and the World Wide Web. What started out as a small short-term project has become a weekly class available to any Lab employee or associate. More than 250 people have been taught to find basic reference materials and to navigate the Internet on the Gopher and World Wide Web. The class is one of the first classes offered by the Research Library to be filled every month, and one Laboratory group has recommended that their staff attend this class in preparation for more advanced Internet and HTML classes as part of their group training. The success of this class spurred development by the Research Library of more specific subject classes using Internet resources, specifically business and general science resources.

Smith, S.; Comstock, D.

1995-12-01T23:59:59.000Z

448

OSTI Pact with Internet Archive Ensures Uninterrupted Research Access |  

Office of Scientific and Technical Information (OSTI)

Pact with Internet Archive Ensures Uninterrupted Research Access Pact with Internet Archive Ensures Uninterrupted Research Access E-print Network One sure thing about the World Wide Web: like the weather, it will change. Given this dynamic nature of the Web and the importance of preservation of scientific information in a digital environment, OSTI recently partnered with Internet Archive to ensure uninterrupted access to more than 1 million online research papers from the E-print Network. The DOE E-print Network is the largest collection that a federal institution has undertaken in an on-going effort to preserve their own documents and history through Archive-It. "As a result of the pioneering partnership between the Internet Archive and OSTI, we are ensuring long-term, continuous access to the growing body of cutting-edge

449

In Things We Trust? Towards trustability in the Internet of Things  

E-Print Network (OSTI)

This essay discusses the main privacy, security and trustability issues with the Internet of Things.

Hoepman, Jaap-Henk

2011-01-01T23:59:59.000Z

450

Architectures for the future networks and the next generation Internet: A survey  

Science Conference Proceedings (OSTI)

Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive ... Keywords: Future Internet architecture survey, Future Internet design (FIND), Future network architecture, Global Environment for Networking Innovations (GENI), Next generation Internet

Subharthi Paul; Jianli Pan; Raj Jain

2011-01-01T23:59:59.000Z

451

MEC-IDC: joint load balancing and power control for distributed Internet Data Centers  

Science Conference Proceedings (OSTI)

Internet Data Center (IDC) supports the reliable operations of many important Internet on-line services. As the demand on Internet services and cloud computing keep increasing in recent years, the power usage associated with IDC operations has been uprising ... Keywords: cyber-physical system, distributed internet data center, load balancing, power control

Lei Rao; Xue Liu; Marija Ilic; Jie Liu

2010-04-01T23:59:59.000Z

452

Test Purpose Generation for Timed Protocol Testing  

Science Conference Proceedings (OSTI)

Test purposes are requirements, usually constructed by hand, which aim at testing critical properties on implementations. These ones are then used by testing methods to generate test cases. Writing them manually is a heavy task, this is why we propose ... Keywords: Timed protocols, conformance testing, test purpose, testability

Sébastien Salva; Antoine Rollet

2009-07-01T23:59:59.000Z

453

Symbolic protocol analysis for monoidal equational theories  

Science Conference Proceedings (OSTI)

We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved ...

Stéphanie Delaune; Pascal Lafourcade; Denis Lugiez; Ralf Treinen

2008-02-01T23:59:59.000Z

454

Self-Protecting Session Initiation Protocol Stack  

Science Conference Proceedings (OSTI)

We present the Self-Protecting Session Initiation Protocol Stack capable of recognizing malicious SIP messages and protecting itself in high-load conditions. The stack model is based on the two-step processing and uses hash lookup tables and cellular ... Keywords: Cellular automata, Denial of Service, SIP, Self-protecting

Zoran Rusinovic; Nikola Bogunovic

2008-09-01T23:59:59.000Z

455

On communication protocols for tactical navigation assistance  

Science Conference Proceedings (OSTI)

Using tactical navigation systems is popular for military as well as search and rescue applications. For such applications, the significance of the tactical navigation systems arises especially when groups with the same goal move together on the terrain. ... Keywords: C-TRAMAF, Gossip-based ad hoc routing, N-Gossip, communication protocols, cross layer, digital battlefield, tactical navigation

Evren Onem; H. Birkan Yilmaz; Fatih Alagöz; Tuna Tugcu

2008-02-01T23:59:59.000Z

456

Measurement Protocols for Optimized Fuel Assembly Tags  

Science Conference Proceedings (OSTI)

This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

Gerlach, David C.; Mitchell, Mark R.; Reid, Bruce D.; Gesh, Christopher J.; Hurley, David E.

2008-11-01T23:59:59.000Z

457

Power-Save Protocols Corey Andalora  

E-Print Network (OSTI)

rate, etc. Outputs Average routing time per packet Overall power consumption of network #12;Project-84, July 2001. #12;BECA Nodes independently transition to the idle state and back to the sleep state. WhenOff By One Power-Save Protocols Corey Andalora Keith Needels #12;Agenda Topic explanation Problem

Kaminsky, Alan

458

Community-Aware Scheduling Protocol for Grids  

Science Conference Proceedings (OSTI)

Much work has been done to exploit the effectiveness and efficiency of job scheduling upon distributed computational––resources. With regard to existing resource topology and administrative constraints, scheduling approaches are designed ... Keywords: Community-Aware Scheduling Protocol, CASP, Grid, Scheduling, SmartGRID, MaGate

Ye Huang; Amos Brocco; Nik Bessis; Pierre Kuonen; Beat Hirsbrunner

2010-04-01T23:59:59.000Z

459

Interaction protocols for cross-organisational workflows  

Science Conference Proceedings (OSTI)

Workflow technologies are widely used in industry and commerce to assist in the specification, execution and completion of well defined processes within organisations. As industrial and commercial relations have evolved, based on advances on information ... Keywords: Cross-organisational workflows, Hierarchical Petry nets, Interaction protocols, Knowledge-based systems, Workflow integration

FláVio Soares CorrêA Da Silva; Mirtha Lina FernáNdez Venero; Diego Mira David; Mohammad Saleem; Paul W. H. Chung

2013-01-01T23:59:59.000Z

460

Calibrating embedded protocols on asynchronous systems  

Science Conference Proceedings (OSTI)

Embedding is a method of projecting one topology into another. In one-to-one node embedding, paths in the target topology correspond to links in the original topology. A protocol running on the original topology can be modified to be executed on a target ... Keywords: Asynchronous system, Channel system, Distributed system, Fault tolerance, Graph embedding, Transient fault, Virtual topology

Yukiko Yamauchi; Doina Bein; Toshimitsu Masuzawa; Linda Morales; I. Hal Sudborough

2010-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Russia's role in the Kyoto Protocol  

E-Print Network (OSTI)

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

462

Evolution of the Internet k-dense structure  

E-Print Network (OSTI)

As the Internet AS-level topology grows over time, some of its structural properties remain unchanged. Such time- invariant properties are generally interesting, because they tend to reflect some fundamental processes or constraints behind Internet growth. As has been shown before, the time-invariant structural properties of the Internet include some most basic ones, such as the degree distribution or clustering. Here we add to this time-invariant list a non-trivial property - k-dense decomposition. This property is derived from a recursive form of edge multiplicity, defined as the number of triangles that share a given edge. We show that after proper normalization, the k- dense decomposition of the Internet has remained stable over the last decade, even though the Internet size has approximately doubled, and so has the k-density of its k-densest core. This core consists mostly of content providers peering at Internet eXchange Points, and it only loosely overlaps with the high-degree or high-rank AS core, con...

Orsini, Chiara; Lenzini, Luciano; Krioukov, Dmitri

2013-01-01T23:59:59.000Z

463

Developmental issues in environmental reporting protocols  

SciTech Connect

In this paper, we review the policy differences and associated reporting and verification protocols between three energy and/or environmental reporting programs in the United States, specifically the Conservation Verification Protocols (CVP) - a voluntary set of procedures for reporting acid rain reductions from energy conservation, the Greenhouse Gas Voluntary Reporting Program (GGVRP) to acknowledge greenhouse gas-reducing activities, and a national database on energy efficiency programs (DEEP) an informational database on utility demand-side management (DSM) programs. The most important lesson learned in developing these reporting programs is that the accuracy of the program for reporting energy savings activities is dependent upon both the estimation and verification protocols used in the program and the mapping procedures used to generate emission impacts from energy savings. Additionally, the types of protocols that may be used in the program depend upon who is participating in the program. The free market can also be a useful tool in determining how much money reporting entities want to spend on energy savings and emissions reductions estimation and verification protocols by placing a dollar value on atmospheric emissions. After such programs are implemented, the program managers should ensure that an iterative, quality control process is utilized. The reporters of such information must be made aware that their numbers will be reviewed carefully and will be questioned for accuracy. Finally, the accuracy and confidence of the reported information should be reviewed on a periodic basis to ensure that the goals and expectations of the program and the reporting entities are being met.

Schrock, D.W.; Stoops, J.L. [Pacific Northwest Lab., Richland, WA (United States); Meier, A.K.; Vine, E.L. [Lawrence Berkeley Lab., CA (United States); Solomon, B.D. [Environmental Protection Agency (United States)

1994-08-01T23:59:59.000Z

464

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

465

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

466

This version is dated: September 2007  

Buildings Energy Data Book (EERE)

7 7 D I S C L A I M E R This document was designed for the internal use of the United States Department of Energy. This document will be occasionally updated and, therefore, this copy may not reflect the most current version. This document was prepared as account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

467

The Community Climate System Model Version 4  

SciTech Connect

The fourth version of the Community Climate System Model (CCSM4) was recently completed and released to the climate community. This paper describes developments to all the CCSM components, and documents fully coupled pre-industrial control runs compared to the previous version, CCSM3. Using the standard atmosphere and land resolution of 1{sup o} results in the sea surface temperature biases in the major upwelling regions being comparable to the 1.4{sup o} resolution CCSM3. Two changes to the deep convection scheme in the atmosphere component result in the CCSM4 producing El Nino/Southern Oscillation variability with a much more realistic frequency distribution than the CCSM3, although the amplitude is too large compared to observations. They also improve the representation of the Madden-Julian Oscillation, and the frequency distribution of tropical precipitation. A new overflow parameterization in the ocean component leads to an improved simulation of the deep ocean density structure, especially in the North Atlantic. Changes to the CCSM4 land component lead to a much improved annual cycle of water storage, especially in the tropics. The CCSM4 sea ice component uses much more realistic albedos than the CCSM3, and the Arctic sea ice concentration is improved in the CCSM4. An ensemble of 20th century simulations runs produce an excellent match to the observed September Arctic sea ice extent from 1979 to 2005. The CCSM4 ensemble mean increase in globally-averaged surface temperature between 1850 and 2005 is larger than the observed increase by about 0.4 C. This is consistent with the fact that the CCSM4 does not include a representation of the indirect effects of aerosols, although other factors may come into play. The CCSM4 still has significant biases, such as the mean precipitation distribution in the tropical Pacific Ocean, too much low cloud in the Arctic, and the latitudinal distributions of short-wave and long-wave cloud forcings.

Gent, Peter R.; Danabasoglu, Gokhan; Donner, Leo J.; Holland, Marika M.; Hunke, Elizabeth C.; Jayne, Steve R.; Lawrence, David M.; Neale, Richard; Rasch, Philip J.; Vertenstein, Mariana; Worley, Patrick; Yang, Zong-Liang; Zhang, Minghua

2011-10-01T23:59:59.000Z

468

DISFRAC Version 2.0 Users Guide  

SciTech Connect

DISFRAC is the implementation of a theoretical, multi-scale model for the prediction of fracture toughness in the ductile-to-brittle transition temperature (DBTT) region of ferritic steels. Empirically-derived models of the DBTT region cannot legitimately be extrapolated beyond the range of existing fracture toughness data. DISFRAC requires only tensile properties and microstructural information as input, and thus allows for a wider range of application than empirical, toughness data dependent models. DISFRAC is also a framework for investigating the roles of various microstructural and macroscopic effects on fracture behavior, including carbide particle sizes, grain sizes, strain rates, and material condition. DISFRAC s novel approach is to assess the interaction effects of macroscopic conditions (geometry, loading conditions) with variable microstructural features on cleavage crack initiation and propagation. The model addresses all stages of the fracture process, from microcrack initiation within a carbide particle, to propagation of that crack through grains and across grain boundaries, finally to catastrophic failure of the material. The DISFRAC procedure repeatedly performs a deterministic analysis of microcrack initiation and propagation within a macroscopic crack plastic zone to calculate a critical fracture toughness value for each microstructural geometry set. The current version of DISFRAC, version 2.0, is a research code for developing and testing models related to cleavage fracture and transition toughness. The various models and computations have evolved significantly over the course of development and are expected to continue to evolve as testing and data collection continue. This document serves as a guide to the usage and theoretical foundations of DISFRAC v2.0. Feedback is welcomed and encouraged.

Cochran, Kristine B [ORNL; Erickson, Marjorie A [ORNL; Williams, Paul T [ORNL; Klasky, Hilda B [ORNL; Bass, Bennett Richard [ORNL

2013-01-01T23:59:59.000Z

469

Solid-State Lighting: Text-Alternative Version: Understanding and  

NLE Websites -- All DOE Office Websites (Extended Search)

In Situ TMP and LM-80 Reports to someone by In Situ TMP and LM-80 Reports to someone by E-mail Share Solid-State Lighting: Text-Alternative Version: Understanding and Evaluating In Situ TMP and LM-80 Reports on Facebook Tweet about Solid-State Lighting: Text-Alternative Version: Understanding and Evaluating In Situ TMP and LM-80 Reports on Twitter Bookmark Solid-State Lighting: Text-Alternative Version: Understanding and Evaluating In Situ TMP and LM-80 Reports on Google Bookmark Solid-State Lighting: Text-Alternative Version: Understanding and Evaluating In Situ TMP and LM-80 Reports on Delicious Rank Solid-State Lighting: Text-Alternative Version: Understanding and Evaluating In Situ TMP and LM-80 Reports on Digg Find More places to share Solid-State Lighting: Text-Alternative Version: Understanding and Evaluating In Situ TMP and LM-80 Reports on

470

Teapot: language support for writing memory coherence protocols  

Science Conference Proceedings (OSTI)

Recent shared-memory parallel computer systems offer the exciting possibility of customizing memory coherence protocols to fit an application's semantics and sharing patterns. Custom protocols have been used to achieve message-passing performance---while ...

Satish Chandra; Brad Richards; James R. Larus

1996-05-01T23:59:59.000Z

471

A compositional logic for proving security properties of protocols  

Science Conference Proceedings (OSTI)

We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public-key cryptography. The logic, designed around a process calculus with actions for each possible ...

Nancy Durgin; John Mitchell; Dusko Pavlovic

2003-07-01T23:59:59.000Z

472

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

473

Quorum-Oriented Multicast Protocols for Data Replication  

E-Print Network (OSTI)

this paper we have presented a family of quorum multicast protocols, called naive, reschedule, retry, and count. We have shown that these protocols provide good availability while using fewer messages and requiring less latency than a simple multicast

H. Garcia-molina; Darrell Long; Richard A. Golding; R. M. Metcalfe

1991-01-01T23:59:59.000Z

474

Mobile ID Device Best Practice Recommendation Version 1.0  

Science Conference Proceedings (OSTI)

Page 1. Mobile ID Device Best Practice Recommendation Version 1.0 Shahram Orandi R. Michael McCabe Information Access Division ...

2012-03-11T23:59:59.000Z

475

Tank Monitoring and Control System (TMACS) Version Description Document (VDD)  

SciTech Connect

This document updates the Version Description Document with the changes incorporated in the Revision 11.2 software installation on the Tank Monitor and Control System (TMACS).

BARNES, D.A.

2000-03-02T23:59:59.000Z

476

Geothermal Webinar Presentation Slides and Text Version | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Field Sites Power Marketing Administration Other Agencies You are here Home Geothermal Webinar Presentation Slides and Text Version Geothermal Webinar Presentation Slides...

477

User’s guide Version 8 - Energy Information Administration  

U.S. Energy Information Administration (EIA)

Form EIA-176 Query System User’s guide Version 8.0 Energy Information Administration U.S. Department of Energy ...

478

Energy Storage Valuation Tool (ESVT) Version 3.1  

Science Conference Proceedings (OSTI)

The Energy Storage Valuation Tool (ESVT) Version 3.1 is an energy storage cost-benefit analysis simulation tool, based on ...

2013-04-01T23:59:59.000Z

479

Electricity Grid Basics Webinar Presentation Slides and Text Version  

Energy.gov (U.S. Department of Energy (DOE))

Download presentation slides and a text version of the audio from the DOE Office of Indian Energy webinar on electricity grid basics.

480

The Internet, Youth Safety and the Problem of “Juvenoia”  

E-Print Network (OSTI)

The internet and its associated electronic technologies have provoked a considerable wave of worry and anxiety among parents and policy makers worldwide in recent years. But in this discussion a very crucial distinction has not been sufficiently made. It is one thing to say that there are risks online. The research has clearly established the point that such perils exist, from online molesters and bullies, to exposure to problematic content. But where it is easy for people to jump beyond the evidence base is when they assert, not just that there are risks, but that the Internet is a risk-promoting environment or a specially risky environment. They imply that there are features of the Internet that increase risk for young people above what they already encounter or what they encounter in other environments, or what they used to encounter. It is hard to cite any research that as yet supports that notion. Yet, this is the narrative implicit in much of what is being written. Of course, writers generally preface their discussion of risks by talking about the benefits of the Internet, making the point that it has both risks and benefits. But then they go on to describe Internet dynamics that increase risks and that increase the potential for deviance or corruption.(Pellow, 2009) In a phrase, they assert that the Internet is a risk- and social problem “amplifier.” So, for example, the contention is, not just that they can encounter sexual exploiters online, but that the Internet makes it more likely that children will be sexually abused because it has made it so easy for molesters to find them.(U.S. House of Representatives- 109th Congress,

David Finkelhor; David Finkelhor

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "internet protocol version" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Tax Deduction Qualified Software TRNSYS version 17.01.0016 TESS Libraries version 17.1.01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TRNSYS version 17.01.0016 and TESS Libraries version 17.1.01 TRNSYS version 17.01.0016 and TESS Libraries version 17.1.01 On this page you'll find information about the TRNSYS version 17.01.0016 and TESS Libraries version 17.1.01 qualified computer software (www.buildings.energy.gov/qualified_software.html), which calculates energy and power cost savings that meet federal tax incentive requirements for commercial buildings. Date Documentation Received by DOE: 21 February 2013 Statements in quotes are from the software developer. Internal Revenue Code §179D (c)(1) and (d) Regulations Notice 2006-52, Section 6 requirements as amplified by Notice 2008-40, Section 4 requirements. (1) The name, address, and (if applicable) web site of the software developer; The University of Wisconsin-Madison Solar Energy

482

Exploring Virtual Network Selection Algorithms in DSM Cache Coherence Protocols  

E-Print Network (OSTI)

lines in the modified state. In a home-based directory protocol, every cache line is assigned a home

Heinrich, Mark

483

Investigating the limits of randomized benchmarking protocols  

E-Print Network (OSTI)

In this paper, we analyze the performance of randomized benchmarking protocols on gate sets under a variety of realistic error models that include systematic rotations, amplitude damping, leakage to higher levels, and 1/f noise. We find that, in almost all cases, benchmarking provides better than a factor-of-two estimate of average error rate, suggesting that randomized benchmarking protocols are a valuable tool for verification and validation of quantum operations. In addition, we derive new models for fidelity decay curves under certain types of non-Markovian noise models such as 1/f and leakage errors. We also show that, provided the standard error of the fidelity measurements is small, only a small number of trials are required for high confidence estimation of gate errors.

Jeffrey M. Epstein; Andrew W. Cross; Easwar Magesan; Jay M. Gambetta

2013-08-13T23:59:59.000Z

484

An Evaluation of UDP Transport Protocols  

Science Conference Proceedings (OSTI)

Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

Carter, S

2004-12-21T23:59:59.000Z

485

A Protocol for Quantum Energy Distribution  

E-Print Network (OSTI)

A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

Masahiro Hotta

2008-03-11T23:59:59.000Z

486

Building America House Simulation Protocols (Revised)  

Science Conference Proceedings (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

487

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network (OSTI)

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

488

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

489

A lightweight, high performance communication protocol for grid computing  

Science Conference Proceedings (OSTI)

This paper describes a lightweight, high-performance communication protocol for the high-bandwidth, high-delay networks typical of computational Grids. One unique feature of this protocol is that it incorporates an extremely accurate classification mechanism ... Keywords: Bayesian analysis, Classification mechanisms, Grid computing, High-performance communication protocols, High-performance networking

Phillip M. Dickens

2010-03-01T23:59:59.000Z

490

Distributed Multimodal Information Processing GroupINTERNET OF THINGS  

E-Print Network (OSTI)

Small and lightweight components become more and more powerful, and at the same time cheaper. This enables the augmentation of physical objects with digital technology (e.g., information processing, communication). The interconnection of such ‘intelligent ’ devices leads away from the classical internet of computers towards the ‘Internet of Things’. This development has a wide range of implications in the dimensions of technology, applications and society. A significant area of application areas will be influenced by the ‘Internet of Things’, from private households over mobility to research and industry. In this seminar, various aspects of the Internet of Things were investigated. In the technological domain, the underlying communication technologies and hardware was discussed and an overview of interaction techniques with intelligent objects was gained. Furthermore, an overview of application domains was given and, based on selected examples, deeper investigated, such as the Internet of Vehicles. Last but not least, also economical implications and potential business models were investigated. Each of the single chapters addresses a specific topic and presents fundamental research trends and developments. This

Eckehard Steinbach; Matthias Kranz; Anas Al-nuaimi; Stefan Diewald; Andreas Möller; Luis Roalter; Florian Schweiger (editors; Technische Universität München

2013-01-01T23:59:59.000Z

491

Family factors in Internet addiction among Chinese youth: A review of English- and Chinese-language studies  

Science Conference Proceedings (OSTI)

Approximately 513 million Chinese citizens used the Internet in 2011, with adolescents reporting comparatively high levels of use. Although numerous studies (reviewed herein) indicate that Internet Addiction/Pathological Internet Use (IA/PIU) is endemic ... Keywords: Chinese youth, Family factors, Internet addiction, Pathological Internet Use, Review article

Wen Li, Eric L. Garland, Matthew O. Howard

2014-02-01T23:59:59.000Z

492

RAP: An end-to-end rate-based congestion control mechanism for realtime streams in the internet  

E-Print Network (OSTI)

Abstract-End-to-end congestion control mechanisms have been critical to the robustness and stability of the Internet. Most of today’s Internet trafftc is TCP, and we expect this to remain so in the future. Thus, having “TCP-friendly ” behavior is crucial for new applications. However, the emergence of non-congestion-controlled realtime applications threatens unfairness to competing TCP traffic and possible congestion collapse. We present an end-to-end TCP-friendly Rate Adaptation Protocol (RAP), which employs an additive-increase, multiplicativedecrease (AIMD) algorithm. It is well suited for unicast playback of realtime streams and other semi-reliable rate-based applications. Its primary goal is to be fair and TCP-friendly while separating network congestion control from application-level reliability. We evaluate RAP through extensive simulation, and conclude that bandwidth is usually evenly shared between TCP and RAP traffic. Unfairness to TCP traffic is directly determined by how TCP diverges from the AIMD algorithm. Basic RAP behaves in a TCPfriendly fashion in a wide range of likely conditions, but we also devised a fine-grain rate adaptation mechanism to extend this range further. Finally, we show that deploying RED queue management can result in an ideal fairness between TCP and RAP traffic. I.

Reza Rejaie; Mark H; Deborah Estrin

1999-01-01T23:59:59.000Z

493

African Rainfall Climatology Version 2 for Famine Early Warning Systems  

Science Conference Proceedings (OSTI)

This paper describes a new gridded, daily 29-yr precipitation estimation dataset centered over Africa at 0.1° spatial resolution. Called the African Rainfall Climatology, version 2 (ARC2), it is a revision of the first version of the ARC. ...

Nicholas S. Novella; Wassila M. Thiaw

2013-03-01T23:59:59.000Z

494

Optimal splitters for temporal and multi-version databases  

Science Conference Proceedings (OSTI)

Temporal and multi-version databases are ideal candidates for a distributed store, which offers large storage space, and parallel and distributed processing power from a cluster of (commodity) machines. A key challenge is to achieve a good load balancing ... Keywords: multi-version databases, optimal splitters, temporal data

Wangchao Le; Feifei Li; Yufei Tao; Robert Christensen

2013-06-01T23:59:59.000Z

495

Climate Sensitivity of the Community Climate System Model, Version 4  

Science Conference Proceedings (OSTI)

Equilibrium climate sensitivity of the Community Climate System Model, version 4 (CCSM4) is 3.20°C for 1° horizontal resolution in each component. This is about a half degree Celsius higher than in the previous version (CCSM3). The transient ...

C. M. Bitz; K. M. Shell; P. R. Gent; D. A. Bailey; G. Danabasoglu; K. C. Armour; M. M. Holland; J. T. Kiehl

2012-05-01T23:59:59.000Z

496

LCTA Windows Program Tutorial Learning LCTA Version 1.0  

E-Print Network (OSTI)

LCTA Windows Program Tutorial Learning LCTA Version 1.0 By William Sprouse CENTER FOR ECOLOGICAL Spring 1996 #12;LCTA Windows Program Tutorial Learning LCTA Version 1.0 Prepared by William Sprouse Cover.1.2 FUNDAMENTALS OF THE WINDOWS ENVIRONMENT 4 2.2 GETTING STARTED 5 2.2.1 STARTING A SESSION 5 2.2.2 GETTING HELP 6

497

Underwater Vehicles hal-00733797,version1-19Sep2012  

E-Print Network (OSTI)

Underwater Vehicles hal-00733797,version1-19Sep2012 Author manuscript, published in "Underwater Vehicles (2009) 525-538" #12;hal-00733797,version1-19Sep2012 #12;Underwater Vehicles Edited by Alexander V from: publication@intechweb.org First published January 2009 Printed in Croatia Underwater Vehicles

Paris-Sud XI, Université de

498

A Framework for Enabling Distributed Applications on the Internet  

E-Print Network (OSTI)

The last five years have seen the rapid rise in popularity of what we term internet distributed applications (IDAs). These are internet applications with which many users interact simultaneously. IDAs range from P2P file-sharing applications, to collaborative distributed computing projects, to massively multiplayer online games (MMOGs). Currently, there is no framework that combines IDAs collectively within a single context. We provide a basis for such a framework here. In considering IDAs collectively, we found that there was no generic description that had been applied to them as a group. We have therefore put forward such a description here. In our description, IDAs are functionality separated into three logic layers, which are designed and built individually. Each layer is represented by functionality on the software client running on each participating computer, which together comprise the overall IDA. The core contribution of this work is a framework, called the Internet Distributed Application Framewor...

McLaughlin, Mark Anthony

2011-01-01T23:59:59.000Z

499

Internet of Things: Applications and Challenges in Technology and Standardization  

E-Print Network (OSTI)

The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers,potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.

Bandyopadhyay, Debasis

2011-01-01T23:59:59.000Z

500

Battling the Internet Water Army: Detection of Hidden Paid Posters  

E-Print Network (OSTI)

We initiate a systematic study to help distinguish a special group of online users, called hidden paid posters, or termed "Internet water army" in China, from the legitimate ones. On the Internet, the paid posters represent a new type of online job opportunity. They get paid for posting comments and new threads or articles on different online communities and websites for some hidden purposes, e.g., to influence the opinion of other people towards certain social events or business markets. Though an interesting strategy in business marketing, paid posters may create a significant negative effect on the online communities, since the information from paid posters is usually not trustworthy. When two competitive companies hire paid posters to post fake news or negative comments about each other, normal online users may feel overwhelmed and find it difficult to put any trust in the information they acquire from the Internet. In this paper, we thoroughly investigate the behavioral pattern of online paid posters bas...

Chen, Cheng; Srinivasan, Venkatesh; Zhang, Xudong

2011-01-01T23:59:59.000Z