Powered by Deep Web Technologies
Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service...

2

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion 61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability February 21, 2011 - 7:00am Addthis PROBLEM: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability. PLATFORM: The following Java products are affected: Java SE: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK 5.0 Update 27 and prior for Solaris 9 Oracle SDK 1.4.2_29 and prior for Solaris 8 IBM JDK 6 Update SR9 and prior IBM JDK 5 Update SR12-FP3 and prior IBM JDK 1.4.2 Update SR13-FP8 and prior Java for Business: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK and JRE 5.0 Update 27 and prior for Windows, Solaris, and Linux

3

Improving Floating Point Compression  

NLE Websites -- All DOE Office Websites (Extended Search)

Improving Improving Floating Point Compression through Binary Masks Leonardo A. Bautista Gomez Argonne National Laboratory Franck Cappello Argonne National Laboratory Abstract-Modern scientific technology such as particle accel- erators, telescopes and supercomputers are producing extremely large amounts of data. That scientific data needs to be processed using systems with high computational capabilities such as supercomputers. Given that the scientific data is increasing in size at an exponential rate, storing and accessing the data is becoming expensive in both, time and space. Most of this scientific data is stored using floating point representation. Scientific applications executed in supercomputers spend a large amount of CPU cycles reading and writing floating point values, making data compression techniques an interesting way to increase computing efficiency.

4

Strategies for sharing a floating point unit between SPEs  

E-Print Network (OSTI)

Floating Point Unit . . . . . . . . . . . . . . . . . . .compliant floating point unit”. In DATE ’06: Proceedings offor sharing a Floating Point Unit between SPEs A Thesis

Lugo Martinez, Jose E.

2010-01-01T23:59:59.000Z

5

Improvements in floating point addition/subtraction operations  

DOE Patents (OSTI)

Apparatus is described for decreasing the latency time associated with floating point addition and subtraction in a computer, using a novel bifurcated, pre-normalization/post-normalization approach that distinguishes between differences of floating point exponents.

Farmwald, P.M.

1984-02-24T23:59:59.000Z

6

Portable execution of legacy binaries on the Java virtual machine  

Science Conference Proceedings (OSTI)

The move toward pure managed-code environments is held back by the vast amount of legacy software available only as statically compiled binaries for some legacy instruction set architecture (ISA). Catering to this legacy software requires all sorts of ... Keywords: legacy software, system emulation

Alexander Yermolovich; Andreas Gal; Michael Franz

2008-09-01T23:59:59.000Z

7

Quantifying the Impact of Single Bit Flips on Floating Point Arithmetic  

SciTech Connect

In high-end computing, the collective surface area, smaller fabrication sizes, and increasing density of components have led to an increase in the number of observed bit flips. If mechanisms are not in place to detect them, such flips produce silent errors, i.e. the code returns a result that deviates from the desired solution by more than the allowed tolerance and the discrepancy cannot be distinguished from the standard numerical error associated with the algorithm. These phenomena are believed to occur more frequently in DRAM, but logic gates, arithmetic units, and other circuits are also susceptible to bit flips. Previous work has focused on algorithmic techniques for detecting and correcting bit flips in specific data structures, however, they suffer from lack of generality and often times cannot be implemented in heterogeneous computing environment. Our work takes a novel approach to this problem. We focus on quantifying the impact of a single bit flip on specific floating-point operations. We analyze the error induced by flipping specific bits in the most widely used IEEE floating-point representation in an architecture-agnostic manner, i.e., without requiring proprietary information such as bit flip rates and the vendor-specific circuit designs. We initially study dot products of vectors and demonstrate that not all bit flips create a large error and, more importantly, expected value of the relative magnitude of the error is very sensitive on the bit pattern of the binary representation of the exponent, which strongly depends on scaling. Our results are derived analytically and then verified experimentally with Monte Carlo sampling of random vectors. Furthermore, we consider the natural resilience properties of solvers based on the fixed point iteration and we demonstrate how the resilience of the Jacobi method for linear equations can be significantly improved by rescaling the associated matrix.

Elliott, James J [ORNL; Mueller, Frank [North Carolina State University; Stoyanov, Miroslav K [ORNL; Webster, Clayton G [ORNL

2013-08-01T23:59:59.000Z

8

Generating and executing programs for a floating point single instruction multiple data instruction set architecture  

DOE Patents (OSTI)

Mechanisms for generating and executing programs for a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA) are provided. A computer program product comprising a computer recordable medium having a computer readable program recorded thereon is provided. The computer readable program, when executed on a computing device, causes the computing device to receive one or more instructions and execute the one or more instructions using logic in an execution unit of the computing device. The logic implements a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA), based on data stored in a vector register file of the computing device. The vector register file is configured to store both scalar and floating point values as vectors having a plurality of vector elements.

Gschwind, Michael K

2013-04-16T23:59:59.000Z

9

A comparison of floating point and logarithmic number systems for FPGAs.  

SciTech Connect

There have been many papers proposing the use of logarithmic numbers (LNS) as an alternative to floating point because of simpler multiplication, division and exponentiation computations. However, this advantage comes at the cost of complicated, inexact addition and subtraction, as well as the need to convert between the formats. In this work, we created a parameterized LNS library of computational units and compared them to an existing floating point library. Specifically, we considered multiplication, division, addition, subtraction, and format conversion to determine when one format should be used over the other and when it is advantageous to change formats during a calculation.

Hauck, Scott (University of Washington, Seattle, WA); Wood, Aaron (University of Washington, Seattle, WA); Beauchamp, Michael (University of Washington, Seattle, WA); Haselman, Michael (University of Washington, Seattle, WA); Hemmert, K. Scott; Underwood, Keith Douglas

2005-02-01T23:59:59.000Z

10

Preliminary Results of a RANS Simulation for a Floating Point Absorber Wave Energy System Under Extreme Wave Conditions  

SciTech Connect

This paper presents the results of a preliminary study on the hydrodynamics of a moored floating-point absorber (FPA) wave energy system under extreme wave conditions.

Yu, Y.; Li, Y.

2011-10-01T23:59:59.000Z

11

Performance Evaluation of Decimal Floating-Point Arithmetic Michael J. Schulte, Nick Lindberg, and Anitha Laxminarain  

E-Print Network (OSTI)

arithmetic is available from http://mesa.ece.wisc.edu and http://www2.hursley.ibm.com/decimal/. 2. Decimal¢£¨% G¡4£¦¥¨§4© ¦¡¤£2% ¡&EX¨9¦§¨¦ Y 0B14§¨© 3¦% ¡ 4£ T¡4V¨£45 `Ha a b¨c d ef¨b gBh b¨i p¦d eq 4r. and J. L. White, "How to Print Floating- Point Numbers Accurately," Proceedings of the ACM SIGPLAN 1990

Schulte, Mike

12

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability IBM and Oracle Java products contain a vulnerability that could allow an...

13

RANS Simulation of the Heave Response of a Two-Body Floating Point Wave Absorber: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

RANS Simulation of the Heave RANS Simulation of the Heave Response of a Two-Body Floating Point Wave Absorber Preprint Y. Yu and Y. Li To be presented at ISOPE 2011 Maui, Hawaii June 19-24, 2011 Conference Paper NREL/CP-5000-50980 March 2011 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (Alliance), a contractor of the US Government under Contract No. DE-AC36-08GO28308. Accordingly, the US Government and Alliance retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty,

14

Experimental Investigation of the Power Generation Performance of Floating-Point Absorber Wave Energy Systems: Preprint  

DOE Green Energy (OSTI)

The extraction of energy from ocean waves has gained interest in recent years. The floating-point absorber (FPA) is one of the most promising devices among a wide variety of wave energy conversion technologies. Early theoretical studies mainly focused on understanding the hydrodynamics of the system and on predicting the maximum power that could be extracted by a heaving body. These studies evolve from the investigation of floating-body interactions in offshore engineering and naval architecture disciplines. To our best knowledge, no systematic study has been reported about the investigation of the power generation performance of an FPA with a close-to-commercial design. A series of experimental tests was conducted to investigate the power extraction performance of an FPA system.

Li, Y.; Yu, Y.; Epler, J.; Previsic, M.

2012-04-01T23:59:59.000Z

15

RANS Simulation of the Heave Response of a Two-Body Floating Point Wave Absorber: Preprint  

DOE Green Energy (OSTI)

A preliminary study on a two-body floating wave absorbers is presented in this paper. A Reynolds-Averaged Navier-Stokes computational method is applied for analyzing the hydrodynamic heave response of the absorber in operational wave conditions. The two-body floating wave absorber contains a float section and a submerged reaction section. For validation purposes, our model is first assumed to be locked. The two sections are forced to move together with each other. The locked single body model is used in a heave decay test, where the RANS result is validated with the experimental measurement. For the two-body floating point absorber simulation, the two sections are connected through a mass-spring-damper system, which is applied to simulate the power take-off mechanism under design wave conditions. Overall, the details of the flow around the absorber and its nonlinear interaction with waves are investigated, and the power absorption efficiency of the two-body floating wave absorber in waves with a constant value spring-damper system is examined.

Yu, Y.; Li, Y.

2011-03-01T23:59:59.000Z

16

Java XMGR  

SciTech Connect

The XMGR5 graphing package [1] for drawing RELAP5 [2] plots is being re-written in Java [3]. Java is a robust programming language that is available at no cost for most computer platforms from Sun Microsystems, Inc. XMGR5 is an extension of an XY plotting tool called ACE/gr extended to plot data from several US Nuclear Regulatory Commission (NRC) applications. It is also the most popular graphing package worldwide for making RELAP5 plots. In Section 1, a short review of XMGR5 is given, followed by a brief overview of Java. In Section 2, shortcomings of both tkXMGR [4] and XMGR5 are discussed and the value of converting to Java is given. Details of the conversion to Java are given in Section 3. The progress to date, some conclusions and future work are given in Section 4. Some screen shots of the Java version are shown.

Dr. George L. Mesina; Steven P. Miller

2004-08-01T23:59:59.000Z

17

Preliminary Results of a RANS Simulation for a Floating Point Absorber Wave Energy System Under Extreme Wave Conditions  

NLE Websites -- All DOE Office Websites (Extended Search)

Preliminary Results of a RANS Preliminary Results of a RANS Simulation for a Floating Point Absorber Wave Energy System Under Extreme Wave Conditions Y. Yu and Y. Li Presented at the 30 th International Conference on Ocean, Offshore, and Arctic Engineering Rotterdam, The Netherlands June 19 - 24, 2011 Conference Paper NREL/CP-5000-50967 October 2011 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (Alliance), a contractor of the US Government under Contract No. DE-AC36-08GO28308. Accordingly, the US Government and Alliance retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

18

High energy SEU test results for the commercially available MIPS R3000 microprocessor and R3010 floating point unit  

Science Conference Proceedings (OSTI)

Single event upset (SEU) cross sections and total dose hardness of commercially available MIPS R3000 microprocessors (CPU) and R3010 floating point units (FPU) were obtained by exposing these parts to 256 MeV protons from the linear accelerator (LINAC) at the Los Alamos Meson Physics Facility (LAMPF). Parts from several manufacturers were tested. The CPUs and FPUs were tested dynamically during radiation exposure with specially designed assembly language codes which exercised a subset of the available instructions in order to simulate the actual operation of each part. Cross sections derived from the SEU data were used to calculate expected upset rate for a 500-km orbit during quiet solar conditions, the King 1972 solar flare, and the August 4, 1972, event modeled by Adams et al. 16 refs., 16 figs., 3 tabs.

Shaeffer, D.L.; Kimbrough, J.R.; Denton, S.M.; Kaschimitter, J.L.; Wilburn, J.W.; Davis, R.W.; Colella, N.J. (Lawrence Livermore National Lab., CA (United States)); Holtkamp, D.B. (Los Alamos National Lab., NM (United States))

1991-08-15T23:59:59.000Z

19

High energy proton SEU test results for the commercially available MIPS R3000 microprocessor and R3010 floating point unit  

SciTech Connect

This paper reports on proton single event upset (SEU) cross sections and proton total dose hardness of commercially available MIPS R3000 microprocessors (CPU) and R3010 floating point units (FPU) that were obtained by exposing these parts to 256 MeV protons from the linear accelerator (LINAC) at the Los Alamos Meson Physics Facility (LAMPF). Parts from several manufacturers were tested. The CPUs and FPUs were tested dynamically during radiation exposure with specially designed assembly language codes which exercised a subset of the available instructions. Cross sections derived from the SEU data were used to calculate expected upset rates for a 500-km, 60-degree inclination, orbit during quiet solar conditions and during the August 4, 1972, King solar flare event.

Shaeffer, D.L.; Kimbrough, J.R.; Denton, S.M.; Kaschmiter, J.L.; Wilburn, J.W.; Davis, R.W.; Colella, N.J. (Lawrence Livermore National Lab., CA (United States)); Holtkamp, D.B. (Los Alamos National Lab., NM (United States))

1991-12-01T23:59:59.000Z

20

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Sandia secure processor : a native Java processor.  

SciTech Connect

The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. The complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.

Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

2003-08-01T23:59:59.000Z

22

Java PathFinder A Translator from Java to Promela  

E-Print Network (OSTI)

nterrupts, and perhaps most importantly: thread operations. Among major concepts not translated are: packages, method overloading and overriding, method recursion, strings, and floating point numbers. Finally, the class library is not translated. References

Klaus Havelund

1999-01-01T23:59:59.000Z

23

A Java Math.BigDecimal Implementation of Core Mathematical Functions  

E-Print Network (OSTI)

The mathematical functions log(x), exp(x), root[n]x, sin(x), cos(x), tan(x), arcsin(x), arctan(x), x^y, sinh(x), cosh(x), tanh(x) and Gamma(x) have been implemented for arguments x in the real domain in a native Java library on top of the multi-precision BigDecimal representation of floating point numbers. This supports scientific applications where more than the double precision accuracy of the library of the Standard Edition is desired. The full source code is made available.

Mathar, Richard J

2009-01-01T23:59:59.000Z

24

The Java memory model  

Science Conference Proceedings (OSTI)

This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations ... Keywords: Java, concurrency, memory model, multithreading

Jeremy Manson; William Pugh; Sarita V. Adve

2005-01-01T23:59:59.000Z

25

Java and Numerical Computing  

Science Conference Proceedings (OSTI)

Java represents both a challenge and an opportunity to practitioners of numerical computing. This article analyzes the current state of Java in numerical computing and identifies some directions for the realization of its full potential.

Ronald F. Boisvert; José Moreira; Michael Philippsen; Roldan Pozo

2001-01-01T23:59:59.000Z

26

Java Numerics: Main  

Science Conference Proceedings (OSTI)

... Workshop onJava in High Performance Computing at HPCN Eurpe 2001 Conference, Amsterdam, The Netherlands (June 25 - 27, 2001); ...

2012-11-20T23:59:59.000Z

27

Diffusion Java Applets - TMS  

Science Conference Proceedings (OSTI)

Mar 8, 2007 ... Citation: Glicksman, M.E. and Lupulescu, A. "Java Applets and Additional Presentations." Department of Materials Science and Engineering.

28

The ENSDF Java Package  

Science Conference Proceedings (OSTI)

A package of computer codes has been developed to process and display nuclear structure and decay data stored in the ENSDF (Evaluated Nuclear Structure Data File) library. The codes were written in an object-oriented fashion using the java language. This allows for an easy implementation across multiple platforms as well as deployment on web pages. The structure of the different java classes that make up the package is discussed as well as several different implementations.

Sonzogni, A.A. [National Nuclear Data Center, Brookhaven National Laboratory, Upton, NY 11973-5000 (United States)

2005-05-24T23:59:59.000Z

29

Specifying java iterators with JML and Esc/Java2  

Science Conference Proceedings (OSTI)

The 2006 SAVCBS Workshop has posed a Challenge Problem on the topic of specifying iterators. This note provides a specification in the Java Modeling Language (JML) [1, 2] for the Java interfaces Iterator and Iterable that captures the interactions ... Keywords: ESC/Java2, JML, specification, static analysis, verification

David R. Cok

2006-11-01T23:59:59.000Z

30

JAVA SCRIPT IS DISABLED  

Office of Scientific and Technical Information (OSTI)

This application needs JavaScript to work correctly but your browser does not have it enabled. How do I enable JavaScript??? - follow the instructions below... If your browser is not listed, please contact your system administrator. Internet Explorer (6.0) Select 'Tools' from the top menu Choose 'Internet Options' Click on the 'Security' tab Click on 'Custom Level' Scroll down until you see section labled 'Scripting' Under 'Active Scripting', select 'Enable' and click OK Internet Explorer (7.0) Select Tools > Internet Options. Click on the Security tab. Click the Custom Level button. Scroll down to the Scripting section. Select Enable for Active Scripting and Scripting of Java Applets. Click OK. Select YES if a box appears to confirm. Click OK. Close window.

31

Java Metadata Facility  

SciTech Connect

The Java Metadata Facility is introduced by Java Specification Request (JSR) 175 [1], and incorporated into the Java language specification [2] in version 1.5 of the language. The specification allows annotations on Java program elements: classes, interfaces, methods, and fields. Annotations give programmers a uniform way to add metadata to program elements that can be used by code checkers, code generators, or other compile-time or runtime components. Annotations are defined by annotation types. These are defined the same way as interfaces, but with the symbol {at} preceding the interface keyword. There are additional restrictions on defining annotation types: (1) They cannot be generic; (2) They cannot extend other annotation types or interfaces; (3) Methods cannot have any parameters; (4) Methods cannot have type parameters; (5) Methods cannot throw exceptions; and (6) The return type of methods of an annotation type must be a primitive, a String, a Class, an annotation type, or an array, where the type of the array is restricted to one of the four allowed types. See [2] for additional restrictions and syntax. The methods of an annotation type define the elements that may be used to parameterize the annotation in code. Annotation types may have default values for any of its elements. For example, an annotation that specifies a defect report could initialize an element defining the defect outcome submitted. Annotations may also have zero elements. This could be used to indicate serializability for a class (as opposed to the current Serializability interface).

Buttler, D J

2008-03-06T23:59:59.000Z

32

A Java commodity grid kit.  

SciTech Connect

In this paper we report on the features of the Java Commodity Grid Kit. The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework. Java CoG Kit middleware is general enough to design a variety of advanced Grid applications with quite different user requirements. Access to the Grid is established via Globus protocols, allowing the Java CoG Kit to communicate also with the C Globus reference implementation. Thus, the Java CoG Kit provides Grid developers with the ability to utilize the Grid, as well as numerous additional libraries and frameworks developed by the Java community to enable network, Internet, enterprise, and peer-to peer computing. A variety of projects have successfully used the client libraries of the Java CoG Kit to access Grids driven by the C Globus software. In this paper we also report on the efforts to develop server side Java CoG Kit components. As part of this research we have implemented a prototype pure Java resource management system that enables one to run Globus jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

von Laszewski, G.; Foster, I.; Gawor, J.; Lane, P.; Mathematics and Computer Science

2001-07-01T23:59:59.000Z

33

T-558: Oracle Java SE and Java for Business Critical Patch Update...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011...

34

Java support on genepool: java6 (jdk1.6) will be removed on 08...  

NLE Websites -- All DOE Office Websites (Extended Search)

Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox security updates Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox...

35

Java Vertexing Tools  

SciTech Connect

This document describes the implementation of the topological vertex finding algorithm ZVTOP within the org.lcsim reconstruction and analysis framework. At the present date, Java vertexing tools allow users to perform topological vertexing on tracks that have been obtained from a Fast MC simulation. An implementation that will be able to handle fully reconstructed events is being designed from the ground up for longevity and maintainability.

Strube, Jan; /Oregon U.; Graf, Norman; /SLAC

2006-03-03T23:59:59.000Z

36

Converting java programs to use generic libraries  

Science Conference Proceedings (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ... Keywords: JSR-14, Java 1.5, Java 5, generic types, instantiation types, parameterized types, parametric polymorphism, raw types, type inference

Alan Donovan; Adam Kiežun; Matthew S. Tschantz; Michael D. Ernst

2004-10-01T23:59:59.000Z

37

Practical pluggable types for Java.  

E-Print Network (OSTI)

??This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines… (more)

Papi, Matthew M

2008-01-01T23:59:59.000Z

38

Converting Java Programs to Use Generic Libraries  

E-Print Network (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ...

Donovan, Alan

2004-03-30T23:59:59.000Z

39

Converting Java programs to use generic libraries  

E-Print Network (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practise makes heavy use of ...

Donovan, Alan A. A., 1976-

2004-01-01T23:59:59.000Z

40

An improved slicer for Java  

Science Conference Proceedings (OSTI)

We present an improved slicing algorithm for Java. The best algorithm known so far, first presented in [11], is not always precise if nested objects are used as actual parameters. The new algorithm presented in this paper always generates correct and ... Keywords: Java, object trees, static program slicing

Christian Hammer; Gregor Snelting

2004-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Formalizing the safety of Java, the Java virtual machine, and Java card  

Science Conference Proceedings (OSTI)

We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smartcards. The conclusion is that although a lot of good work has been done, a more concerted effort is ... Keywords: Common criteria, programming

Pieter H. Hartel; Luc Moreau

2001-12-01T23:59:59.000Z

42

Template_JavaOne03  

Science Conference Proceedings (OSTI)

... | JavaOne 2003 | Session #1024. 9. S-CSCF. MGCF. MGW. HSS. Application Server. SIP for J2ME. JAIN SIP. SIP for J2ME. JAIN SIP. SIP for J2ME. ...

2009-02-03T23:59:59.000Z

43

Refactoring for parameterizing Java classes  

E-Print Network (OSTI)

Type safety and expressiveness of many existing Java libraries and theirclient applications would improve, if the libraries were upgraded to definegeneric classes. Efficient and accurate tools exist to assist clientapplications ...

Kiezun, Adam

2006-09-05T23:59:59.000Z

44

Mechanisms of Java Rainfall Anomalies  

Science Conference Proceedings (OSTI)

The large-scale circulation departure patterns associated with the interannual variability of (July–June) rainfall in Java are studied on the basis of ship observations (1911–73) in the Indian Ocean and surface station records. Circulation ...

Eric C. Hackert; Stefan Hastenrath

1986-04-01T23:59:59.000Z

45

Practical pluggable types for Java  

E-Print Network (OSTI)

This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines type qualifiers and their semantics, and a compiler ...

Papi, Matthew M

2008-01-01T23:59:59.000Z

46

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java....

47

Redefining Agrarian Power: Resurgent Agrarian Movements in West Java, Indonesia  

E-Print Network (OSTI)

Agrarian Movements in West Java, Indonesia Suraya Afiff Noeron agrarian change in Java in the 1970s and has, moreand agrarian change in Java, West Kalimantan, and other

Afiff, Suraya; Fauzi, Noer; Hart, Gillian; Ntsebeza, Lungisile; Peluso, Nancy

2005-01-01T23:59:59.000Z

48

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing 5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java. IMPACT: Apache can be exploited by malicious people to conduct spoofing attacks. SOLUTION: The vendor has issued a fix. Addthis Related Articles

49

Animation projects in CS1 from scheme to Java  

Science Conference Proceedings (OSTI)

Scheme animation projects are transformed into Java projects. Keywords: computer science for liberal arts, introductory programming course, java programming

Mirela Djordjevi?

2011-06-01T23:59:59.000Z

50

Platform Independence Java Virtual Machine (JVM)  

E-Print Network (OSTI)

of User Appliances and Communications Links But completely compatible Because the Market demandsIFace area = new Area(); java.rmi.Naming.bind(url, area) Client: AreaIFace area = (AreaIFace) java.rmi.Naming.lookup

Martin, Jonathan E.

51

Transparent Consistent Replication of Java RMI Objects  

Science Conference Proceedings (OSTI)

The Java Remote Method Invocation (JRMI) specification simplifies the development of distributed Java applications, but provides little support to guarantee reliable, highly available operation. The Aroma System is middleware that transparently enhances ...

N. Narasimhan; L. E. Moser; P. M. Melliar-Smith

2000-09-01T23:59:59.000Z

52

Advanced Transactions in Enterprise JavaBeans  

Science Conference Proceedings (OSTI)

Enterprise JavaBeans (EJB) is a new technology that aims at supporting distributed transactional component-based applications written in Java. In recent years, a lot of new advanced software applications have arisen, which have new requirements for transaction ...

Marek Prochazka

2000-11-01T23:59:59.000Z

53

Remote Invocation in Java G52CON Concepts of Concurrency Remote Invocation in Java  

E-Print Network (OSTI)

.out.println(account.balance()); } catch (Exception e) { // Error handling } } } Remote Invocation in Java G52CON ­ Concepts of Concurrency1 Remote Invocation in Java G52CON ­ Concepts of Concurrency Remote Invocation in Java · Provided by the java.rmi package · Based on a model of remote method invocation (RMI), equivalent to remote procedure

Mills, Steven

54

Symbolic Script Programming for Java  

E-Print Network (OSTI)

Computer algebra in Java is a promising field of development. It has not yet reached an industrial strength, in part because of a lack of good user interfaces. Using a general purpose scripting language can bring a natural mathematical notation, akin to the one of specialized interfaces included in most computer algebra systems. We present such an interface for Java computer algebra libraries, using scripts available in the JSR 223 framework. We introduce the concept of `symbolic programming' and show its usefulness by prototypes of symbolic polynomials and polynomial rings.

Jolly, Raphael

2009-01-01T23:59:59.000Z

55

JAVA based LCD Reconstruction and Analysis Tools  

Science Conference Proceedings (OSTI)

We summarize the current status and future developments of the North American Group's Java-based system for studying physics and detector design issues at a linear collider. The system is built around Java Analysis Studio (JAS) an experiment-independent Java-based utility for data analysis. Although the system is an integrated package running in JAS, many parts of it are also standalone Java utilities.

Bower, G.

2004-10-11T23:59:59.000Z

56

Features of the Java commodity grid kit.  

SciTech Connect

In this paper we report on the features of the Java Commodity Grid Kit (Java CoG Kit). The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework. Java CoG Kit middleware is general enough to design a variety of advanced Grid applications with quite different user requirements. Access to the Grid is established via Globus Toolkit protocols, allowing the Java CoG Kit to also communicate with the services distributed as part of the C Globus Toolkit reference implementation. Thus, the Java CoG Kit provides Grid developers with the ability to utilize the Grid, as well as numerous additional libraries and frameworks developed by the Java community to enable network, Internet, enterprise and peer-to-peer computing. A variety of projects have successfully used the client libraries of the Java CoG Kit to access Grids driven by the C Globus Toolkit software. In this paper we also report on the efforts to develop serverside Java CoG Kit components. As part of this research we have implemented a prototype pure Java resource management system that enables one to run Grid jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

von Laszewski, G.; Gawor, J.; Lane, P.; Rehn, N.; Russell, M.; Mathematics and Computer Science

2002-11-01T23:59:59.000Z

57

ESC/Java2 Implementation Notes  

E-Print Network (OSTI)

Abstract: ESC/Java2 is a tool for statically checking program specifications. It expands significantly upon ESC/Java, on which it is built. It is consistent with the definition of JML and of Java 1.4. It adds additional static checking to that in ESC/Java; most significantly, it adds support for checking frame conditions and annotations containing method calls. This document describes the status of the final release of ESC/Java2, along with some notes regarding the details of that implementation.

David R. Cok; Joseph R. Kiniry; Dermot Cochran

2008-01-01T23:59:59.000Z

58

Integrating multiple clinical information systems using the Java Message Service framework  

E-Print Network (OSTI)

Information Systems using the Java Message Service FrameworkInformation Systems using the Java Message Service Frameworkusing Sun Microsystems’ Java programming language. The Java

Tellis, W M; Andriole, K P

2004-01-01T23:59:59.000Z

59

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

60

Identifying Reference Objects by Hierarchical Clustering in Java Environment  

E-Print Network (OSTI)

Recently Java programming environment has become so popular. Java programming language is a language that is designed to be portable enough to be executed in wide range of computers ranging from cell phones to supercomputers. Computer programs written in Java are compiled into Java Byte code instructions that are suitable for execution by a Java Virtual Machine implementation. Java virtual Machine is commonly implemented in software by means of an interpreter for the Java Virtual Machine instruction set. As an object oriented language, Java utilizes the concept of objects. Our idea is to identify the candidate objects' references in a Java environment through hierarchical cluster analysis using reference stack and execution stack.

Saha, Rahul

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Java 1.5.0 API Sun’s Java Tutorial Ed Faulkner’s Java Reference  

E-Print Network (OSTI)

Put these lines in your.environment: add 6.186 add-f java_v1.5.0 setenv JAVA_HOME /mit/java_v1.5.0 setenv CLASSPATH /mit/6.186/2005/maslab.jar:. If you’re Serverphobic, just ask for help. You’ll learn fast, and you’ll be glad you did. Using the Documentation

Yuran Lu Agenda; Threading Java; On Server; Maslab Api

2005-01-01T23:59:59.000Z

62

MESURE Tool to benchmark Java Card platforms  

E-Print Network (OSTI)

The advent of the Java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behavior of these platforms is becoming crucial. To meet this need, we present in this paper a novel benchmarking framework to test and evaluate the performance of Java Card platforms. MESURE tool is the first framework which accuracy and effectiveness are independent from the particular Java Card platform tested and CAD used.

Bouzefrane, Samia; Paradinas, Pierre

2009-01-01T23:59:59.000Z

63

Object and Reference Immutability using Java Generics  

E-Print Network (OSTI)

A compiler-checked immutability guarantee provides useful documentation, facilitates reasoning, and enables optimizations. This paper presents Immutability Generic Java (IGJ), a novel language extension that expresses ...

Zibin, Yoav

2007-03-16T23:59:59.000Z

64

OpenMath JavaBeans - CECM  

E-Print Network (OSTI)

Sep 24, 1998 ... The technology studied in this project uses Java to construct components, ... It is also a general communications standard which supports the ...

65

SystemRequirements java Repository CRAN  

E-Print Network (OSTI)

Description Low-level interface to Java VM very much like.C/.Call and friends. Allows creation of objects, calling methods and accessing fields.

Simon Urbanek; Maintainer Simon Urbanek; Depends R; R Topics Documented

2010-01-01T23:59:59.000Z

66

Emerging Java Technologies for Math Education  

E-Print Network (OSTI)

PIMS-CECM Workshop on Emerging Java Technologies for Math Education. Centre For Experimental and Constructive Mathematics logo. A Workshop at the  ...

67

Overcoming JVM HotSwap constraints via binary rewriting  

Science Conference Proceedings (OSTI)

Java HotSpot VM provides a facility for replacing classes at runtime called HotSwap. One design property of HotSwap is that the signature of a replaced class must remain the same between different versions, which significantly constrains the programmer ... Keywords: HotSwap, JVM languages, binary refactoring, virtual superclass

Dong Kwan Kim; Eli Tilevich

2008-10-01T23:59:59.000Z

68

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

69

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

70

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

71

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

72

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

73

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

74

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August...

75

Recoverable Class Loaders for a Fast Restart of Java Applications  

Science Conference Proceedings (OSTI)

Nov 8, 2008 ... able a fast start-up and recovery of Java applications. This is achieved by snapshooting the static state of Java applications namely the class ...

76

Stability of Java interfaces: a preliminary investigation  

Science Conference Proceedings (OSTI)

The attribute of stability is regarded by some as an important attribute of software. Some claims regarding software design quality imply that what are called interfaces in Java are stable. This paper introduces some new metrics for investigating ... Keywords: java interface, software metrics, stability

Jonathan Chow; Ewan Tempero

2011-05-01T23:59:59.000Z

77

Formalising Java RMI with explicit code mobility  

Science Conference Proceedings (OSTI)

This paper presents an object-oriented, Java-like core language with primitives for distributed programming and explicit code mobility. We apply our formulation to prove the correctness of several optimisations for distributed programs. Our language ... Keywords: Code mobility, Distribution, Java, Optimisation, RMI, Runtime, Types

Alexander Ahern; Nobuko Yoshida

2007-12-01T23:59:59.000Z

78

First International Workshop on Persistence and Java  

Science Conference Proceedings (OSTI)

These proceedings record the First International Workshop on Persistence and Java, which was held in Drymen, Scotland in September 1996. The focus of this workshop was the relationship between the Java languages and long-term data storage, such as databases ...

Malcolm Atkinson; Mick Jordan

1996-11-01T23:59:59.000Z

79

Testing of java web services for robustness  

Science Conference Proceedings (OSTI)

This paper presents a new compile-time analysis that enables a testing methodology for white-box coverage testing of error recovery code (i.e., exception handlers) in Java web services using compiler-directed fault injection. The analysis allows compiler-generated ... Keywords: def-use testing, exceptions, java, test coverage metrics

Chen Fu; Barbara G. Ryder; Ana Milanova; David Wonnacott

2004-07-01T23:59:59.000Z

80

T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update 8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 February 16, 2011 - 7:00am Addthis PROBLEM: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011. PLATFORM: JDK and JRE 6 Update 23 and earlier for Windows, Solaris, and Linux JDK 5.0 Update 27 and earlier for Solaris 9 SDK 1.4.2_29 and earlier for Solaris 8 JDK and JRE 6 Update 23 and earlier for Windows, Solaris and Linux JDK and JRE 5.0 Update 27 and earlier for Windows, Solaris and Linux SDK and JRE 1.4.2_29 and earlier for Windows, Solaris and Linux ABSTRACT: This Critical Patch Update contains 21 new security fixes for Oracle Java SE and Java for Business. 19 of these vulnerabilities may be remotely

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Java fundamentals i and ii (video training), First edition  

Science Conference Proceedings (OSTI)

Java Fundamentals I and II will show you everything you need to know to start building robust, powerful software with Java SE. This collection provides $2,000 (USD) worth of expert Java training! Your instructor, Paul Deitel, has personally taught Java ...

Paul J. Deitel

2008-02-01T23:59:59.000Z

82

Sawja: Static Analysis Workshop for Java  

E-Print Network (OSTI)

Static analysis is a powerful technique for automatic verification of programs but raises major engineering challenges when developing a full-fledged analyzer for a realistic language such as Java. This paper describes the Sawja library: a static analysis framework fully compliant with Java 6 which provides OCaml modules for efficiently manipulating Java bytecode programs. We present the main features of the library, including (i) efficient functional data-structures for representing program with implicit sharing and lazy parsing, (ii) an intermediate stack-less representation, and (iii) fast computation and manipulation of complete programs.

Hubert, Laurent; Besson, Frédéric; Demange, Delphine; Jensen, Thomas; Monfort, Vincent; Pichardie, David; Turpin, Tiphaine

2010-01-01T23:59:59.000Z

83

Java persistence with hibernate, Second edition  

Science Conference Proceedings (OSTI)

Persistence -- the ability of data to outlive an instance of a program -- is central to modern applications. Hibernate, the most popular Java persistence tool, provides automatic and transparent object/relational mapping so it's a snap to work with SQL ...

Christian Bauer; Gavin King

2006-11-01T23:59:59.000Z

84

Computer algebra in Java: libraries and scripting  

E-Print Network (OSTI)

We have developed two computer algebra systems (CAS) written in Java [Jolly:2007,Kredel:2006]. The Java libraries can be used as any of the numerous other Java library packages. For the use-case of interactively entering and manipulating mathematical expressions there is a need of a scripting front-end for our libraries. Most other CAS invent and implement their own scripting interface for this purpose. We, however, do not want to reinvent the wheel and propose to use a contemporary scripting language with access to Java code. In this paper we discuss the requirements for a scripting language in computer algebra and check whether the languages Python, Ruby, Groovy and Scala meet these requirements. We conclude, that with minor problems any of these languages is suitable for our purpose.

Jolly, Raphael

2008-01-01T23:59:59.000Z

85

Javarifier : inference of reference immutability in Java  

E-Print Network (OSTI)

Javari is an extension of Java that supports reference immutability constraints. Programmers write Javari type qualifiers, such as the readonly type qualifier, in their programs, and the Javari typechecker detects mutation ...

Quinonez, Jamie

2008-01-01T23:59:59.000Z

86

Verification for Java's Reentrant Multithreading Concept  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. the concurrency model offers coordination via lock-synchronization, and communication by ...

Erika Ábrahám-Mumm; Frank S. de Boer; Willem P. de Roever; Martin Steffen

2002-04-01T23:59:59.000Z

87

JavaScript Error, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Services Web Services Enabling JavaScript or Active Scripting We're Sorry, you don't seem to have JavaScript enabled in your browser. Some functions in this site may not work properly without it enabled or your web browser is running an older version of JavaScript. Please enabled your JavaScript, then go back and try again or upgrade your browser version to view this web page correctly. Press the button below to see if you have JavaScript enabled. If nothing happened, then it is possible that JavaScript is disabled on your browser. The following instructions shown below describes how to enable JavaScript or Active Scripting in your browser. If your browser isn't listed, please consult its online help pages. JavaScript Test ITD Homepage Need Help? How to Enable JavaScript

88

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

89

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

90

Hyper-Threaded Java: Use the Java Concurrency API to Speed Up Time-Consuming Tasks  

SciTech Connect

This is for a Java World article that was already published on Nov 21, 2006. When I originally submitted the draft, Java World wasn't in the available lists of publications. Now that it is, Hanford Library staff recommended that I resubmit so it would be counted. Original submission ID: PNNL-SA-52490

Scarberry, Randy

2006-11-21T23:59:59.000Z

91

Java Jr.: Fully abstract trace semantics for a core Java language.  

E-Print Network (OSTI)

actions which represent interaction across package boundaries. A detailed example based on the Observer, subset of the Java language which allows for the declaration of classes and interfaces in packages. It includes two extensions of Java: it allows for packages to contain object declarations (rather than

Jeffrey, Alan

92

JR: Flexible Distributed Programming in an Extended Java  

Science Conference Proceedings (OSTI)

Abstract: Java provides a clean object-oriented programming model and allows for inherently system-independent programs. Unfortunately, Java has a limited concurrency model, providing only threads and remote method invocation (RMI). The JR programming ...

2001-04-01T23:59:59.000Z

93

Inductive Proof Outlines for Exceptions in Multithreaded Java  

Science Conference Proceedings (OSTI)

In this paper we give an operational semantics and introduce an assertional proof system for exceptions in a multithreaded Java sublanguage. Keywords: Java, exceptions, multi-threading, proof systems

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2006-05-01T23:59:59.000Z

94

JR: Flexible distributed programming in an extended Java  

Science Conference Proceedings (OSTI)

Java provides a clean object-oriented programming model and allows for inherently system-independent programs. Unfortunately, Java has a limited concurrency model, providing only threads and remote method invocation (RMI).The JR programming language ... Keywords: Concurrency, Java, SR, concurrent object-oriented programming

Aaron W. Keen; Tingjian Ge; Justin T. Maris; Ronald A. Olsson

2004-05-01T23:59:59.000Z

95

Discrete-event simulation in Java: a practitioner's experience  

Science Conference Proceedings (OSTI)

The experience of a simulation practitioner with development of a new Java simulation engine and its application to a large simulation model is described. Our simulation engine is implemented as a simple extension of the Java programming language and ... Keywords: Java, discrete-event simulation, parallel processing, practitioner, supply chain

D. H. King; Harvey S. Harrison

2010-07-01T23:59:59.000Z

96

Specification and Runtime Verification of Java Card Programs  

Science Conference Proceedings (OSTI)

Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to ... Keywords: Compiler, JCML, JML, Java Card, Runtime Verification

Umberto Souza da Costa; Anamaria Martins Moreira; Martin A. Musicante; Plácido A. Souza Neto

2009-07-01T23:59:59.000Z

97

Enterprise JavaBeans 3.1  

Science Conference Proceedings (OSTI)

Learn how to code, package, deploy, and test functional Enterprise JavaBeans with the latest edition of this bestselling guide. Written by the developers of JBoss EJB 3.1, this book not only brings you up to speed on each component type and container ...

Andrew Lee Rubinger; Bill Burke

2010-09-01T23:59:59.000Z

98

Enforcing Secure Object Initialization in Java  

E-Print Network (OSTI)

Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high. The solution currently used to enforce object initialization is to implement a coding pattern proposed by Sun, which is not formally checked. We propose a modular type system to formally specify the initialization policy of libraries or programs and a type checker to statically check at load time that all loaded classes respect the policy. This allows to prove the absence of bugs which have allowed some famous privilege escalations in Java. Our experimental results show that our safe default policy allows to prove 91% of classes of java.lang, java.security and javax.security safe without any annotation and by adding 57 simple annotations we proved all classes but four safe. The type system and its soundness theorem have been formalized and machine checked using Coq.

Hubert, Laurent; Monfort, Vincent; Pichardie, David

2010-01-01T23:59:59.000Z

99

JAVA & Parallelism/Real-time systems  

E-Print Network (OSTI)

Windowing Toolkit (AWT) in a memory-efficient way. JAVA Application Environment (JAE) Support enables the same applets and applications to run on other servers or platforms running the JAVA Virtual Machine. CHAPTER 2 Embedded and Real-Time JAVA According to the designers at Sun Microsystems, is JAVA also suitable for Embedded or Real-Time systems. Before proceeding further it is worth trying to define the phrase `real-time system' more precisely. 2.1 Definition of a real-time system There are many interpretations of the exact nature of a real-time system; however, they all have in common the notion of response time, the time taken for the system to generate output from some associated input. The Oxford Dictionary of Computing [48] gives the following definition of a real-time system. A real-time system is... Any system in which the time at which output is produced is significant. This is usually because the input corresponds to some movement in the physical world, and the output ha...

D. F. Nooren

1998-01-01T23:59:59.000Z

100

Automatic translation from Circus to Java  

Science Conference Proceedings (OSTI)

Circus is a combination of Z and CSP that supports the development of state-rich reactive systems based on refinement. In this paper we present JCircus, a tool that automatically translates Circus programs into Java, for the purpose of animation and ...

Angela Freitas; Ana Cavalcanti

2006-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Formal Development of Safe and Secure Java Card Applets  

E-Print Network (OSTI)

This thesis is concerned with different aspects of JAVA CARD application development and use of formal methods in the JAVA CARD world. JAVA CARD is a technology that provides means to program smart (chip) cards with (a subset of) the JAVA language. The use of formal methods in the JAVA CARD context is highly justified due to the criticality of JAVA CARD applications. First of all, JAVA CARD applications are usually security critical (e.g., authentication, electronic cash), second, they are cost critical (i.e. they are distributed in large amounts making updates quite difficult) and finally, they can also be legally critical (e.g., when the digital signature law is considered). Thus the robustness and correctness of JAVA CARD applications should be enforced by the best means possible, i.e. by the use of formal verification techniques. At the same time JAVA CARD seems to be a good target for formal verification—due to the relative simplicity of JAVA CARD applications (as compared to full JAVA), formal verification becomes a feasible and manageable task. In this thesis, we touch upon different

Wojciech Mostowski; Wojciech Mostowski; C Wojciech Mostowski

2005-01-01T23:59:59.000Z

102

A Compact DSP Core with Static Floating-Point Arithmetic  

Science Conference Proceedings (OSTI)

A multimedia system-on-a-chip (SoC) usually contains one or more programmable digital signal processors (DSP) to accelerate data-intensive computations. But most of these DSP cores are designed originally for standalone applications, and they must have ...

Tay-Jyi Lin; Hung-Yueh Lin; Chie-Min Chao; Chih-Wei Liu; Chih-Wei Jen

2006-02-01T23:59:59.000Z

103

MIPS Assembler Exercise "Integer Implementation of Floating-Point Addition"  

E-Print Network (OSTI)

it to .Mfc When both parents guard the eggs simultaneously, mor- tality is reduced to a fraction equal and guard broods "sequentially"). However, in most fish and certain insects, males can keep mating and collecting additional eggs while continuing to guard broods obtained earlier (i.e., males guard "overlapping

Bakos, Jason D.

104

IDebug: An Advanced Debugging Framework for Java  

E-Print Network (OSTI)

IDebug, the Infospheres debugging framework, is an advanced debugging framework for Java. This framework provides the standard core debugging and specification constructs such as assertions, debug levels and categories, stack traces, and specialized exceptions. Debugging functionality can be fine-tuned to a per-thread and/or a per-class basis, debugging contexts can be stored to and recovered from persistent storage, and several aspects of the debugging run-time are configurable at the meta-level. Additionally, the framework is designed for extensibility. Planned improvements include support for debugging distributed object systems via currying call stacks across virtual machine contexts and debug information logging with a variety of networking media including unicast, multicast, RMI, distributed events, and JavaSpaces. Finally, we are adding support for debugging mobile agent systems by providing mobile debug logs. 1 Introduction Programming technologies have evolved greatly over th...

Joseph R. Kiniry

1998-01-01T23:59:59.000Z

105

The New Sundanese Peasants' Union: Peasant Movements, Changes in Land Control, and Agrarian Questions in Garut, West Java  

E-Print Network (OSTI)

of the Association of West Java Plantations; and Ir. H.Questions in Garut, West Java *) Noer Fauzi Berkeleyorganization in West Java, Indonesia, was extraordinarily

Fauzi, Noer

2005-01-01T23:59:59.000Z

106

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

107

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

108

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

109

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

110

Redefining Agrarian Power: Resurgent Agrarian Movements in West Java, Indonesia  

E-Print Network (OSTI)

Movements in West Java, Indonesia Suraya Afiff Noer Fauzienvironmental change in Indonesia since 1985. She receivedenvironmental change in Indonesia since the 1990s. In Fall

Afiff, Suraya; Fauzi, Noer; Hart, Gillian; Ntsebeza, Lungisile; Peluso, Nancy

2005-01-01T23:59:59.000Z

111

OpenMath and Java for Math Education - CECM  

E-Print Network (OSTI)

The intent of this web page is to organize resources and information related to the development of OpenMath compliant Java based web applications for math ...

112

Main-Memory Management to Support Orthogonal Persistence for Java  

E-Print Network (OSTI)

Daynes,L. Atkinson,M.P. Proceedings of the Second International Workshop on Persistence and Java pp 37-60

Daynes, L.

113

Instructional JAVA modules based on molecular simulation - TMS  

Science Conference Proceedings (OSTI)

Nov 9, 2007 ... This website contains a selection of instructional JAVA modules designed to increase understanding of molecular simulations and molecular ...

114

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2011 1: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

115

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Oracle Java SE Critical Patch Update Advisory - June 2011 41: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

116

RTZen: Highly Predictable, Real-time Java Middleware for Distributed and Embedded Systems  

E-Print Network (OSTI)

Real-Time Speci?cation for Java. Addison-Wesley (2000) 8.Vitek, J. : Real-time java scoped memory: Design patternsof the jRate Real-Time Java Implementation. In Meersman,

Raman, Krishna; Zhang, Yue; Panahi, Mark; Colmenares, Juan A; Klefstad, Raymond; Harmon, Trevor

2005-01-01T23:59:59.000Z

117

Review of Correspondence Analysis and Data Coding with Java and R  

E-Print Network (OSTI)

and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

de Leeuw, Jan

2005-01-01T23:59:59.000Z

118

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

119

Review of Correspondence Analysis and Data Coding with Java and R  

E-Print Network (OSTI)

and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

Jan de Leeuw

2011-01-01T23:59:59.000Z

120

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Another step towards a smart compilation manager for Java  

Science Conference Proceedings (OSTI)

In a recent work we have proposed a compilation strategy (that is, a way to decide which unchanged sources have to be recompiled) for a substantial subset of Java which has been shown to be sound and minimal. That is, an unchanged source ... Keywords: Java, separate compilation

G. Lagorio

2004-03-01T23:59:59.000Z

122

Object Oriented Verification Kernels for Secure Java Applications  

Science Conference Proceedings (OSTI)

This paper presents an approach to the verification of large Java programs. The focus lies on programs that implement a distributed communicating system e.g. in a Mor E-Commerce scenario. When trying to verify such programs, thousands of Java classes ...

Holger Grandy; Kurt Stenzel; Wolfgang Reif

2005-09-01T23:59:59.000Z

123

Proceedings of the Second International Workshop on Persistence and Java  

Science Conference Proceedings (OSTI)

These proceedings record the Second International Workshop on Persistence and Java, that was held in Half Moon Bay in the San Francisco Bay Area, in August 1997. The focus of the workshop series is the relationship between the Java platform and longterm ...

Malcolm Atkinson; Mick Jordan

1997-12-01T23:59:59.000Z

124

RTVR: a flexible java library for interactive volume rendering  

Science Conference Proceedings (OSTI)

This paper presents several distinguishing design features of RTVR - a Java-based library for real-time volume rendering. We describe, how the careful design of data structures, which in our case are based on voxel enumeration, and an intelligent use ... Keywords: interactive volume visualization, internet-based visualization, java

Lukas Mroz; Helwig Hauser

2001-10-01T23:59:59.000Z

125

JAVA SWING-BASED PLOTTING PACKAGE RESIDING WITHIN XAL  

Science Conference Proceedings (OSTI)

A data plotting package residing in the XAL tools set is presented. This package is based on Java SWING, and therefore it has the same portability as Java itself. The data types for charts, bar-charts, and color-surface plots are described. The algorithms, performance, interactive capabilities, limitations, and the best usage practices of this plotting package are discussed.

Shishlo, Andrei P [ORNL; Chu, Paul [Stanford University; Pelaia II, Tom [ORNL

2007-01-01T23:59:59.000Z

126

Groebner bases in Java with applications in computer graphics  

E-Print Network (OSTI)

In this paper we present a Java implementation of the algorithm that computes Buchbereger's and reduced Groebner's basis step by step. The Java application enables graphical representation of the intersection of two surfaces in 3-dimensional space and determines conditions of existence and planarity of the intersection.

Malesevic, Branko; Campara, Milan

2010-01-01T23:59:59.000Z

127

Towards a program logic for JavaScript  

Science Conference Proceedings (OSTI)

JavaScript has become the most widely used language for client-side web programming. The dynamic nature of JavaScript makes understanding its code notoriously difficult, leading to buggy programs and a lack of adequate static-analysis tools. We believe ... Keywords: javascript, separation logic, web

Philippa Anne Gardner; Sergio Maffeis; Gareth David Smith

2012-01-01T23:59:59.000Z

128

CS1, arcade games and the free Java book  

Science Conference Proceedings (OSTI)

Computer game programming has been adopted by some instructors and schools in an effort to motivate students and make the learning more relevant to the student's world than the console programs many of their instructors learned with. This paper describes ... Keywords: acm java, cs1, free java book, games

Daniel L. Schuster

2010-03-01T23:59:59.000Z

129

Reflexes: Abstractions for integrating highly responsive tasks into Java applications  

Science Conference Proceedings (OSTI)

Achieving submillisecond response times in a managed language environment such as Java or C# requires overcoming significant challenges. In this article, we propose Reflexes, a programming model and runtime system infrastructure that lets developers ... Keywords: Java virtual machine, Real-time systems, memory management

Jesper Honig Spring; Filip Pizlo; Jean Privat; Rachid Guerraoui; Jan Vitek

2010-08-01T23:59:59.000Z

130

Software application implement in java for electrical lines dimensioning  

Science Conference Proceedings (OSTI)

In this paper it was present a software package implemented in java useful for dimensioning of low voltage lines mono phase and three phases (AC and DC). The modeled networks are tree type. This software with graphical user interface allows the estimation ... Keywords: computer software, electrical lines, java, optimal dimensioning

Cristian Abrudean; Manuela Panoiu

2008-11-01T23:59:59.000Z

131

Java-Applet For Radio Spectra Analysis  

E-Print Network (OSTI)

New services for Clusters of Galaxies Database created in the Astronomical Institute of SPbU have been constructed. The detailed description of database and its content is available at http://www.astro.spbu.ru/CLUSTERS/. The information contained in the database can be used for solution of the specific astronomical problems. One of these problems is the researches of radio emission spectra of clusters' objects. The researches can give help in solution of the problems of origin and evolution of extragalactic radio sources. Spectra of radio galaxies contain important information about radio power in the processes responsible for their activity. This report presents the software for the database that provides work with radio spectra of extragalactic sources. This client-application has been released as the Java-applet and thus provides a Web based interface that is supported on many operating systems. The facilities of the applet such as approximations of spectra measurement points and calculation of spectral parameters are illustrated in the report. Also we demonstrate new version of the application that realized on Java2 and gave access to additional functions such as printing.

A. S. Trushkina; A. G. Gubanov

2000-12-29T23:59:59.000Z

132

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

133

T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 June 30, 2011 - 3:22pm Addthis PROBLEM: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 PLATFORM: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.6 and later, Mac OS X Server v10.6.6 and later ABSTRACT: Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26. Further information is available via the Java

134

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

135

Object-Oriented Programming 2CSE 1325: Object-Oriented Programming in Java  

E-Print Network (OSTI)

1 Object-Oriented Programming in Java 2CSE 1325: Object-Oriented Programming in Java Take control, practice! #12;2 3CSE 1325: Object-Oriented Programming in Java Course Contents · Introduction to object-oriented large, high-quality software systems. 4CSE 1325: Object-Oriented Programming in Java Buzzwords

Lei, Jeff Yu

136

FAMIX Java language plugin 1.0 Author Sander Tichelaar (tichel@iam.unibe.ch)  

E-Print Network (OSTI)

packages in Java map directly to the directory structure of source code, i.e. the source code for a certain parameters and local variables 1.1.x ­> 1.2.x: ­ Addition of a new keyword (strictfp) #12; 3.2 Package (interpreted) Package Figure 2: Package A Package maps in Java to the Java package construct. Packages in Java

Nierstrasz, Oscar

137

RTJBench: A RealTime Java Benchmarking Framework  

E-Print Network (OSTI)

Abstract. The paper gives an overview of RTJBench, a framework designed to assist in the task of benchmarking programs written in the Real-Time Specification for Java, but with potentially more general applicability. RTJBench extends the JUnit framework for unit testing of Java applications with tools for real-time environment configuration, simple data processing and configurable graphical presentation services. We present design principles of RTJBench and give an example of a benchmarking suite we have been using for daily regression benchmarking of the Open Virtual Machine. Keywords: Benchmarking, regression benchmarking, Real-Time Specification for Java

Marek Prochazka; Andrey Madan; Jan Vitek; Wenchang Liu

2004-01-01T23:59:59.000Z

138

Prototyping Faithful Execution in a Java virtual machine.  

SciTech Connect

This report presents the implementation of a stateless scheme for Faithful Execution, the design for which is presented in a companion report, ''Principles of Faithful Execution in the Implementation of Trusted Objects'' (SAND 2003-2328). We added a simple cryptographic capability to an already simplified class loader and its associated Java Virtual Machine (JVM) to provide a byte-level implementation of Faithful Execution. The extended class loader and JVM we refer to collectively as the Sandia Faithfully Executing Java architecture (or JavaFE for short). This prototype is intended to enable exploration of more sophisticated techniques which we intend to implement in hardware.

Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

2003-09-01T23:59:59.000Z

139

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

140

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

A Deductive Proof System for Multithreaded Java with Exceptions  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides that, the language offers a flexible exception mechanism for handling errors or ...

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2008-07-01T23:59:59.000Z

142

Visualising Memory Graphs: Interactive Debugging using Java3D  

E-Print Network (OSTI)

that three dimensional visualisation cau be a useful tool for debugging, program analysis, and a viable - 3D Modelling in Java 6 3 Requirements 9 4 Design 10 4.1 Preliminaries 10 4.1.1 Creating

Oxford, University of

143

A Deductive Proof System for Multithreaded Java with Exceptions  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides that, the language offers a flexible exception mechanism for handling errors or ...

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2008-12-01T23:59:59.000Z

144

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

145

Pointer analysis for Java programs : novel techniques and applications  

E-Print Network (OSTI)

This dissertation presents a pointer analysis for Java programs, together with several practical analysis applications. For each program point, the analysis is able to construct a points-to graph that describes how local ...

S?lcianu, Alexandru D. (Alexandru Doru), 1975-

2006-01-01T23:59:59.000Z

146

Implementing fast javaTM monitors with relaxed-locks  

Science Conference Proceedings (OSTI)

The JavaTM Programming Language permits synchronization operations (lock, unlock, wait, notify) on any object. Synchronization is very common in applications and is endemic in the library code upon which applications depend. It is therefore ...

David Dice

2001-04-01T23:59:59.000Z

147

Automatic certification of Java source code in rewriting logic  

Science Conference Proceedings (OSTI)

In this paper we propose an abstract certification techniquefor Java which is based on rewriting logic, a very general logical and semanticframework efficiently implemented in the functional programminglanguage Maude. Starting from a specification of ...

Mauricio Alba-Castro; María Alpuente; Santiago Escobar

2007-07-01T23:59:59.000Z

148

Predictability of Java Monsoon Rainfall Anomalies: A Case Study  

Science Conference Proceedings (OSTI)

A substantial portion of the interannual variability of rainfall at Jakarta, Java, can be predicted from antecedent pressure anomalies at Darwin, northern Australia; the pressure persistence, the concurrent correlation of pressure and rainfall, ...

Stefan Hastenrath

1987-01-01T23:59:59.000Z

149

Swizzle barrier optimizations for orthogonal persistence in Java  

E-Print Network (OSTI)

Brahnmath,K. Nystrom,N. Hosking,A.L. Cutts,Q.I. Proceedings of the Third International Workshop on Persistence and Java (Tiburon, California, September 1998), Advances in Persistent Object Systems pp 268-278 Morgan Kaufmann

Brahnmath, K.; Nystrom, N.; Hosking, A.L.; Cutts, Q.I.

150

Refactoring Sequential Java Code for Concurrency via Concurrent Libraries  

E-Print Network (OSTI)

Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 packagejava.util.concurrent (j.u.c.) supports writing concurrent programs: much of the complexity of writing threads-safe and ...

Ernst, Michael D.

2008-09-30T23:59:59.000Z

151

Analysing, Profiling and Optimising Orthogonal Persistence for Java  

E-Print Network (OSTI)

Cutts,Q.I. Hosking,A. Proceedings of the Second International Workshop on Persistence and Java (PJW2), Half Moon Bay, CA, USA (Atkinson, M., Jordan, M. Eds) pp 107-115 Sun Microsystems Inc.

Cutts, Q.I.

152

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

153

Java Automation Controller and Real-Time Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Java Automation Controller and Real-Time Systems Java Automation Controller and Real-Time Systems Speaker(s): Greg Bollella Date: June 29, 2009 - 12:00pm Location: 90-3122 Java has always been a disruptive technology and now it is breaking the mold in industrial, process, building, and transportation automation systems. For many years, programmable logic controllers (PLCs), the digital versions of old relay-based control systems (such as that used in the NYC Subway system in the late 1800s) have primarily controlled these systems. PLCs are the workhorses of the controls industry but the market is characterized by proprietary, closed, expensive, special-purpose solutions. A Java-based automation controller breaks the mold by allowing control algorithms, which require strict real-time capabilities, to run on

154

Java Performance for Scientific Applications on LLNL Computer Systems  

Science Conference Proceedings (OSTI)

Languages in use for high performance computing at the laboratory--Fortran (f77 and f90), C, and C++--have many years of development behind them and are generally considered the fastest available. However, Fortran and C do not readily extend to object-oriented programming models, limiting their capability for very complex simulation software. C++ facilitates object-oriented programming but is a very complex and error-prone language. Java offers a number of capabilities that these other languages do not. For instance it implements cleaner (i.e., easier to use and less prone to errors) object-oriented models than C++. It also offers networking and security as part of the language standard, and cross-platform executables that make it architecture neutral, to name a few. These features have made Java very popular for industrial computing applications. The aim of this paper is to explain the trade-offs in using Java for large-scale scientific applications at LLNL. Despite its advantages, the computational science community has been reluctant to write large-scale computationally intensive applications in Java due to concerns over its poor performance. However, considerable progress has been made over the last several years. The Java Grande Forum [1] has been promoting the use of Java for large-scale computing. Members have introduced efficient array libraries, developed fast just-in-time (JIT) compilers, and built links to existing packages used in high performance parallel computing.

Kapfer, C; Wissink, A

2002-05-10T23:59:59.000Z

155

Org.Lcsim: Event Reconstruction in Java  

SciTech Connect

Maximizing the physics performance of detectors being designed for the International Linear Collider, while remaining sensitive to cost constraints, requires a powerful, efficient, and flexible simulation, reconstruction and analysis environment to study the capabilities of a large number of different detector designs. The preparation of Letters Of Intent for the International Linear Collider involved the detailed study of dozens of detector options, layouts and readout technologies; the final physics benchmarking studies required the reconstruction and analysis of hundreds of millions of events. We describe the Java-based software toolkit (org.lcsim) which was used for full event reconstruction and analysis. The components are fully modular and are available for tasks from digitization of tracking detector signals through to cluster finding, pattern recognition, track-fitting, calorimeter clustering, individual particle reconstruction, jet-finding, and analysis. The detector is defined by the same xml input files used for the detector response simulation, ensuring the simulation and reconstruction geometries are always commensurate by construction. We discuss the architecture as well as the performance.

Graf, Norman A.; /SLAC

2012-04-19T23:59:59.000Z

156

Physics of Binary Information  

E-Print Network (OSTI)

Basic concepts of theoretical particle physics, including quantum mechanics and Poincar\\'e invariance, the leptonic mass spectrum and the proton mass, can be derived, without reference to first principles, from intrinsic properties of the simplest elements of information represented by binary data. What we comprehend as physical reality is, therefore, a reflection of mathematically determined logical structures, built from elements of binary data.

Walter Smilga

2005-05-05T23:59:59.000Z

157

A Political Ecology of the Citarum River Basin: Exploring "Integrated Water Resources Management" in West Java, Indonesia  

E-Print Network (OSTI)

Management” in West Java, Indonesia By Jenna CavelleBandung in the province of West Java 1 . From here the rivermakes its exodus at the Java Sea slightly east of Indonesia’

Cavelle, Jenna

2013-01-01T23:59:59.000Z

158

Power, Labor, and Livelihood: Processes of Change in Rural Java: Notes and Reflections on a Village Revisited  

E-Print Network (OSTI)

two upland villages in Central Java. We returned to one ofDevelopment in Rural Java: A Study of the OrganizationalKecamatan Cibadak, West Java, and Kecamatan Kendal, Central

Hart, Gillian

2004-01-01T23:59:59.000Z

159

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

160

Translating Nondeterministic Functional Language based on Attribute Grammars into Java  

E-Print Network (OSTI)

Knowledge-based systems are suitable for realizing advanced functions that require domain-specific expert knowledge, while knowledge representation languages and their supporting environments are essential for realizing such systems. Although Prolog is useful and effective in realizing such a supporting environment, the language interoperability with other implementation languages, such as Java, is often an important issue in practical application development. This paper describes the techniques for translating a knowledge representation language that is a nondeterministic functional language based on attribute grammars into Java. The translation is based on binarization and the techniques proposed for Prolog to Java translation although the semantics are different from those of Prolog. A continuation unit is introduced to handle continuation efficiently, while the variable and register management on backtracking is simplified by using the single and unidirectional assignment features of variables. An experim...

Umeda, Masanobu; Sone, Hiroaki; Katamine, Keiichi

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Jeannie: Granting Java native interface developers their wishes  

E-Print Network (OSTI)

Higher-level languages interface with lower-level languages such as C to access platform functionality, reuse legacy libraries, or improve performance. This raises the issue of how to best integrate different languages while also reconciling productivity, safety, portability, and efficiency. This paper presents Jeannie, a new language design for integrating Java with C. In Jeannie, both Java and C code are nested within each other in the same file and compile down to JNI, the Java platform’s standard foreign function interface. By combining the two languages ’ syntax and semantics, Jeannie eliminates verbose boiler-plate code, enables static error detection across the language boundary, and simplifies dynamic resource management. We describe the Jeannie language and its compiler, while also highlighting lessons from composing two mature programming languages.

Martin Hirzel; Robert Grimm

2007-01-01T23:59:59.000Z

162

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

163

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

164

V-143: Fresh Java issues being exploited in the wild | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Fresh Java issues being exploited in the wild 3: Fresh Java issues being exploited in the wild V-143: Fresh Java issues being exploited in the wild April 26, 2013 - 6:00am Addthis PROBLEM: A new Metasploit module for the Java 7u17 sandbox bypass emerged PLATFORM: All versions of Java SE-7 (including the recently released 1.7.0_21-b11) ABSTRACT: Java issues are being exploited in the wild by exploit kits, with Cool and Redkit specifically being known to use these bugs, and others likely to follow shortly. REFERENCE LINKS: SecList SE-2012-01 Security Explorations IMPACT ASSESSMENT: Medium DISCUSSION: It can be used to achieve a complete Java security sandbox bypass on a target system. IMPACT: Manipulation of data System access SOLUTION: Vendor recommends patch systems immediately Addthis Related Articles V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

165

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

166

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

167

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

168

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

169

JACK: a tool for validation of security and behaviour of Java applications  

Science Conference Proceedings (OSTI)

We describe the main features of JACK (Java Applet Correctness Kit), a tool for the validation of Java applications, annotated with JML specifications. JACK has been especially designed to improve the quality of trusted personal device applications. ...

Gilles Barthe; Lilian Burdy; Julien Charles; Benjamin Grégoire; Marieke Huisman; Jean-Louis Lanet; Mariela Pavlova; Antoine Requet

2006-11-01T23:59:59.000Z

170

V-072: Red Hat update for java-1.7.0-openjdk | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for...

171

Concurrencer: a tool for retrofitting concurrency into sequential Java applications via concurrent libraries  

E-Print Network (OSTI)

Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 package java.util.concurrent (j.u.c.) supports writing concurrent programs. To use this package, programmers still need to ...

Dig, Danny

172

6.092 Introduction to Software Engineering in Java, January (IAP) 2009  

E-Print Network (OSTI)

This course is an introduction to Java programming and software engineering. It is designed for those who have little or no programming experience in Java and covers concepts useful to 6.005. The focus is on developing ...

Jones, Evan

173

Add Java extensions to your wiki: Java applets can bring dynamic functionality to your wiki pages  

SciTech Connect

Virtually everyone familiar with today’s world wide web has encountered the free online encyclopedia Wikipedia many times. What you may not know is that Wikipedia is driven by an excellent open-source product called MediaWiki which is available to anyone for free. This has led to a proliferation of wiki sites devoted to just about any topic one can imagine. Users of a wiki can add content -- all that is required of them is that they type in their additions into their web browsers using the simple markup language called wikitext. Even better, the developers of wikitext made it extensible. With a little server-side development of your own, you can add your own custom syntax. Users aware of your extensions can then utilize them on their wiki pages with a few simple keystrokes. These extensions can be custom decorations, formatting, web applications, and even instances of the venerable old Java applet. One example of a Java applet extension is the Jmol extension (REF), used to embed a 3-D molecular viewer. This article will walk you through the deployment of a fairly elaborate applet via a MediaWiki extension. By no means exhaustive -- an entire book would be required for that -- it will demonstrate how to give the applet resize handles using using a little Javascript and CSS coding and some popular Javascript libraries. It even describes how a user may customize the extension somewhat using a wiki template. Finally, it explains a rudimentary persistence mechanism which allows applets to save data directly to the wiki pages on which they reside.

Scarberry, Randall E.

2008-08-12T23:59:59.000Z

174

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

175

Implementing the Gaia Astrometric Global Iterative Solution (AGIS) in Java  

E-Print Network (OSTI)

This paper provides a description of the Java software framework which has been constructed to run the Astrometric Global Iterative Solution for the Gaia mission. This is the mathematical framework to provide the rigid reference frame for Gaia observations from the Gaia data itself. This process makes Gaia a self calibrated, and input catalogue independent, mission. The framework is highly distributed typically running on a cluster of machines with a database back end. All code is written in the Java language. We describe the overall architecture and some of the details of the implementation.

O'Mullane, William; Lindegren, Lennart; Hernandez, Jose; Hobbs, David

2011-01-01T23:59:59.000Z

176

Object-oriented Programming Laws for Annotated Java Programs  

E-Print Network (OSTI)

Object-oriented programming laws have been proposed in the context of languages that are not combined with a behavioral interface specification language (BISL). The strong dependence between source-code and interface specifications may cause a number of difficulties when transforming programs. In this paper we introduce a set of programming laws for object-oriented languages like Java combined with the Java Modeling Language (JML). The set of laws deals with object-oriented features taking into account their specifications. Some laws deal only with features of the specification language. These laws constitute a set of small transformations for the development of more elaborate ones like refactorings.

Freitas, Gabriel Falconieri; Massoni, Tiago; Gheyi, Rohit; 10.4204/EPTCS.21.6

2010-01-01T23:59:59.000Z

177

A Non-Null Annotation Inferencer for Java Bytecode  

E-Print Network (OSTI)

We present a non-null annotations inferencer for the Java bytecode language. We previously proposed an analysis to infer non-null annotations and proved it soundness and completeness with respect to a state of the art type system. This paper proposes extensions to our former analysis in order to deal with the Java bytecode language. We have implemented both analyses and compared their behaviour on several benchmarks. The results show a substantial improvement in the precision and, despite being a whole-program analysis, production applications can be analyzed within minutes.

Hubert, Laurent

2010-01-01T23:59:59.000Z

178

Double Degenerate Binary Systems  

Science Conference Proceedings (OSTI)

In this study, angular momentum loss via gravitational radiation in double degenerate binary (DDB)systems (NS + NS, NS + WD, WD + WD, and AM CVn) is studied. Energy loss by gravitational waves has been estimated for each type of systems.

Yakut, K. [University of Ege, Department of Astronomy and Space Sciences, 35100-Izmir (Turkey)

2011-09-21T23:59:59.000Z

179

Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics  

Science Conference Proceedings (OSTI)

Java+ITP is an experimental tool for the verification of properties of a sequential imperative subset of the Java language. It is based on an algebraic continuation passing style (CPS) semantics of this fragment as an equational theory in Maude. It supports ... Keywords: Hoare logic, Java, algebraic semantics, program verification

Ralf Sasse; José Meseguer

2007-07-01T23:59:59.000Z

180

JCML: A specification language for the runtime verification of Java Card programs  

Science Conference Proceedings (OSTI)

Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to ... Keywords: JCML, JML, Java Card, Runtime verification

Umberto Souza da Costa; Anamaria Martins Moreira; Martin A. Musicante; Plácido A. Souza Neto

2012-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Development of Java multi-threaded simulation for chemical reacting flow of ethanol  

Science Conference Proceedings (OSTI)

Multi-threading in Java enhances computational performance and facilitates the development of parallel software. To obtain high performance on multi-core systems, this study develops a multi-threaded simulation code using Java for the chemical reacting ... Keywords: Benchmark, Chemical reaction, Computational fluid dynamics, Ethanol detonation, Java, Multi-thread

E. Yamada; T. Shimada; A. K. Hayashi

2012-12-01T23:59:59.000Z

182

The Use of Java in High Performance Computing: A Data Mining Example  

E-Print Network (OSTI)

The Use of Java in High Performance Computing: A Data Mining Example David Walker and Omer Rana in high performance computing is discussed with particular reference to the efforts of the Java Grande Java, Parallel Computing, Neu­ ral Networks, Distributed Objects 1 Introduction High performance

Walker, David W.

183

V-137: Apple Mac OS X update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apple Mac OS X update for Java V-137: Apple Mac OS X update for Java April 18, 2013 - 6:00am Addthis PROBLEM: Apple Mac OS X update for Java PLATFORM: Mac OS X 10.6, OS X Lion...

184

Poplar: Java composition with labels and AI planning  

Science Conference Proceedings (OSTI)

Class evolution in object-oriented programming often causes so-called breaking changes, largely because of the rigidity of component interconnections in the form of explicit method calls and field accesses. We present a Java extension, Poplar, which ... Keywords: adaptation, ai planning, code synthesis, components, composition, evolution, object-oriented programming, protocols

Johan T. Nyström Persson; Shinichi Honiden

2011-10-01T23:59:59.000Z

185

Expanding and extending the security features of java  

Science Conference Proceedings (OSTI)

The popularity of the web has had several significant impacts, two of note here: (1) increasing sophistication of web pages, including more regular use of Java and other mobile code, and (2) decreasing average level of sophistication as the user population ...

Nimisha V. Mehta; Karen R. Sollins

1998-01-01T23:59:59.000Z

186

Java^TM RemoteMethod Invocation Specification  

E-Print Network (OSTI)

2.7 Exception Handling in Remote Method Invocation. . . . . 11 2.8 Object Methods Overridden Handling in Remote Method Invocation . Object Methods Overridden by the RemoteObject Class . The Semantics.7 Exception Handling in Remote Method Invocation Since remote methods include java.rmi.Remote

Demurjian, Steven A.

187

A provenly correct translation of Fickle into Java  

Science Conference Proceedings (OSTI)

We present a translation from Fickle, a small object-oriented language allowing objects to change their class at runtime, into Java. The translation is provenly correct in the sense that it preserves the static and dynamic semantics. Moreover, ... Keywords: Type and effect systems, semantics preserving translation

D. Ancona; C. Anderson; F. Damiani; S. Drossopoulou; P. Giannini; E. Zucca

2007-04-01T23:59:59.000Z

188

HEP data analysis using jHepWork and Java  

E-Print Network (OSTI)

A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

Chekanov, S

2008-01-01T23:59:59.000Z

189

A Combined Pointer and Purity Analysis for Java Programs  

E-Print Network (OSTI)

We present a new method purity analysis for Java programs.A method is pure if it does not mutate any location that exists in the program state right before method invocation.Our analysis is built on top of a combined pointer ...

Salcianu, Alexandru

2004-05-17T23:59:59.000Z

190

HEP data analysis using jHepWork and Java  

E-Print Network (OSTI)

A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

S. Chekanov

2008-09-04T23:59:59.000Z

191

jYang : A YANG parser in java  

E-Print Network (OSTI)

The NETCONF con?guration protocol of the IETF Network Work- ing Group provides mechanisms to manipulate the con?guration of network devices. YANG is the language currently under consideration within the IETF to specify the data models to be used in NETCONF . This report describes the design and development of a syntax and semantics parser for YANG in java.

Nataf, Emmanuel

2009-01-01T23:59:59.000Z

192

Refactoring Composite to Visitor and Inverse Transformation in Java  

E-Print Network (OSTI)

We describe how to use refactoring tools to transform a Java program conforming to the Composite design pattern into a program conforming to the Visitor design pattern with the same external behavior. We also describe the inverse transformation. We use the refactoring tools provided by IntelliJ IDEA and Eclipse.

Ajouli, Akram

2011-01-01T23:59:59.000Z

193

HEP data analysis using jHepWork and Java.  

SciTech Connect

A role of Java in high-energy physics (HEP) and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

Chekanov, S.; High Energy Physics

2009-03-23T23:59:59.000Z

194

Supplement V.F: Packages For Introduction to Java Programming  

E-Print Network (OSTI)

. · To protect classes. Packages provide protection so that the protected members of the classes are accessible of the package name and the file system directory structure. For the package named com.prenhall.mypackage, youSupplement V.F: Packages For Introduction to Java Programming By Y. Daniel Liang 1 Introduction

Liang, Y. Daniel

195

Nested parallelism for multi-core HPC systems using Java  

Science Conference Proceedings (OSTI)

Since its introduction in 1993, the Message Passing Interface (MPI) has become a de facto standard for writing High Performance Computing (HPC) applications on clusters and Massively Parallel Processors (MPPs). The recent emergence of multi-core processor ... Keywords: Java MPI, MPJ, MPJ express, Multi-core messaging

Aamir Shafi; Bryan Carpenter; Mark Baker

2009-06-01T23:59:59.000Z

196

FAMIX Java language plug-in 1.0 Author Sander Tichelaar (tichel@iam.unibe.ch)  

E-Print Network (OSTI)

packages in Java map directly to the directory structure of source code, i.e. the source code for a certain parameters and local variables 1.1.x -> 1.2.x: - Addition of a new keyword (strictfp) #12;3.2 Package (interpreted) Package Figure 2: Package A Package maps in Java to the Java package construct. Packages in Java

Nierstrasz, Oscar

197

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

05:Oracle Java SE Critical Patch Update Advisory 05:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

198

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5:Oracle Java SE Critical Patch Update Advisory 5:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

199

Binary ferrihydrite catalysts  

DOE Patents (OSTI)

A method of preparing a catalyst precursor comprises dissolving an iron salt and a salt of an oxoanion forming agent, in water so that a solution of the iron salt and oxoanion forming agent salt has a ratio of oxoanion/Fe of between 0.0001:1 to 0.5:1. Next is increasing the pH of the solution to 10 by adding a strong base followed by collecting of precipitate having a binary ferrihydrite structure. A binary ferrihydrite catalyst precursor is also prepared by dissolving an iron salt in water. The solution is brought to a pH of substantially 10 to obtain ferrihydrite precipitate. The precipitate is then filtered and washed with distilled water and subsequently admixed with a hydroxy carboxylic acid solution. The admixture is mixed/agitated and the binary ferrihydrite precipitate is then filtered and recovered. 3 figs.

Huffman, G.P.; Zhao, J.; Feng, Z.

1996-12-03T23:59:59.000Z

200

Binary ferrihydrite catalysts  

DOE Patents (OSTI)

A method of preparing a catalyst precursor comprises dissolving an iron salt and a salt of an oxoanion forming agent, in water so that a solution of the iron salt and oxoanion forming agent salt has a ratio of oxoanion/Fe of between 0.0001:1 to 0.5:1. Next is increasing the pH of the solution to 10 by adding a strong base followed by collecting of precipitate having a binary ferrihydrite structure. A binary ferrihydrite catalyst precursor is also prepared by dissolving an iron salt in water. The solution is brought to a pH of substantially 10 to obtain ferrihydrite precipitate. The precipitate is then filtered and washed with distilled water and subsequently admixed with a hydroxy carboxylic acid solution. The admixture is mixed/agitated and the binary ferrihydrite precipitate is then filtered and recovered.

Huffman, Gerald P. (Lexington, KY); Zhao, Jianmin (Lexington, KY); Feng, Zhen (Lexington, KY)

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Poplar: A Java Extension for Evolvable Component Integration  

E-Print Network (OSTI)

The Java programming language contains many features that aid component-based software development (CBSD), such as interfaces, visibility levels, and strong support for encapsulation. However, component evolution often causes so-called breaking changes, largely because of the rigidity of component interconnections in the form of explicit method calls and field accesses. We present a Java extension, Poplar, which we are currently developing. In Poplar, inter-component dependencies are expressed using declarative queries; concrete linking code, generated using a planning algorithm, replaces these at compile time. Poplar includes a minimal specification language based on typestate-like protocols and labels, and a lightweight effect system, which ensures the absence of unwanted interference between hand-written code and generated code. We give several examples of fully automatic component integration using Poplar, and demonstrate its potential to simplify object-oriented software development greatly through evolv...

Nyström-Persson, Johan

2011-01-01T23:59:59.000Z

202

Java Technology : a Strategic Solution for Interactive Distributed Applications  

E-Print Network (OSTI)

In a world demanding the best performance from financial investments, distributed applications occupy the first place among the proposed solutions. This particularity is due to their distributed architecture which is able to acheives high performance. Currently, many research works aim to develop tools that facilitate the implementation of such applications. The urgent need for such applications in all areas pushes researchers to accelerate this process. However, the lack of standardization results in the absence of strategic decisions taken by computer science community. In this article, we argue that Java technology represents an elegant compromise ahead of the list of the currently available solutions. In fact, by promoting the independence of hardware and software, Java technology makes it possible to overcome pitfalls that are inherent to the creation of distributed applications.

Alustwani, Husam; Mostefaoui, Ahmed; Salomon, Michel

2009-01-01T23:59:59.000Z

203

Creating A Model HTTP Server Program Using java  

E-Print Network (OSTI)

HTTP Server is a computer programs that serves webpage content to clients. A webpage is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a computer screen. This information is usually in HTML format, and may provide navigation to other webpage's via hypertext links. WebPages may be retrieved from a local computer or from a remote HTTP Server. WebPages are requested and served from HTTP Servers using Hypertext Transfer Protocol (HTTP). WebPages may consist of files of static or dynamic text stored within the HTTP Server's file system. Client-side scripting can make WebPages more responsive to user input once in the client browser. This paper encompasses the creation of HTTP server program using java language, which is basically supporting for HTML and JavaScript.

Veerasamy, Bala Dhandayuthapani

2010-01-01T23:59:59.000Z

204

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

205

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

206

GIS on the fly » to realize wireless GIS network by Java mobile phone  

E-Print Network (OSTI)

Java cellular phone has arrived in the marketplace as the latest device of a mobile gear. The gear is very compact, allowing 10KB for Java program size and 5KB for data size. Although small in size, it features innovative computer system architecture. Java program can be sent dynamically to the gear in a streaming manner over wireless network. In addition, compared to conventional mobile computers, Java cell phone is very cheap both in hardware price and in communication cost. Java cell phone has an enormous potential as a mobile gear. In this paper, we discuss our trial of constructing a extensive wireless GIS network by utilizing Java cell phone as a GIS terminal. 1.

Shuichi Takino

2001-01-01T23:59:59.000Z

207

Using Java for distributed computing in the Gaia satellite data processing  

E-Print Network (OSTI)

In recent years Java has matured to a stable easy-to-use language with the flexibility of an interpreter (for reflection etc.) but the performance and type checking of a compiled language. When we started using Java for astronomical applications around 1999 they were the first of their kind in astronomy. Now a great deal of astronomy software is written in Java as are many business applications. We discuss the current environment and trends concerning the language and present an actual example of scientific use of Java for high-performance distributed computing: ESA's mission Gaia. The Gaia scanning satellite will perform a galactic census of about 1000 million objects in our galaxy. The Gaia community has chosen to write its processing software in Java. We explore the manifold reasons for choosing Java for this large science collaboration. Gaia processing is numerically complex but highly distributable, some parts being embarrassingly parallel. We describe the Gaia processing architecture and its realisation...

O'Mullane, William; Parsons, Paul; Lammers, Uwe; Hoar, John; Hernandez, Jose

2011-01-01T23:59:59.000Z

208

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

209

Binary Tetrahedral Flavor Symmetry  

E-Print Network (OSTI)

A study of the T' Model and its variants utilizing Binary Tetrahedral Flavor Symmetry. We begin with a description of the historical context and motivations for this theory, together with some conceptual background for added clarity, and an account of our theory's inception in previous works. Our model endeavors to bridge two categories of particles, leptons and quarks, a unification made possible by the inclusion of additional Higgs particles, shared between the two fermion sectors and creating a single coherent system. This is achieved through the use of the Binary Tetrahedral symmetry group and an investigation of the Tribimaximal symmetry evidenced by neutrinos. Our work details perturbations and extensions of this T' Model as we apply our framework to neutrino mixing, quark mixing, unification, and dark matter. Where possible, we evaluate model predictions against experimental results and find excellent matching with the atmospheric and reactor neutrino mixing angles, an accurate prediction of the Cabibb...

Eby, David A

2013-01-01T23:59:59.000Z

210

Java on the MScIT Course at the University of Glasgow  

E-Print Network (OSTI)

Poet,R.R. Belhadj-Mostefa,K. Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University)

Poet, R.R.; Belhadj-Mostefa, K.; Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University) [More Details

211

Accretion in Compact Binaries  

E-Print Network (OSTI)

Compact binaries have long been a paradigm for accretion theory. Much of our present view of how accretion occurs comes directly from the comparison of theory with observations of these sources. Since theory differs little for other objects such as active galaxies, increasing efforts have recently gone into searching for correspondences in observed behaviour. This chapter aims at giving a concise summary of the field, with particular emphasis on new developments since the previous edition of this book. These developments have been significant. Much of the earlier literature implicitly assumed that accreting binaries were fairly steady sources accreting most of the mass entering their vicinity, often with main-sequence companions, and radiating the resulting accretion luminosity in rough isotropy. We shall see that in reality these assumptions fail for the majority of systems. Most are transient; mass ejection in winds and jets is extremely common; a large (sometimes dominant) fraction of even short-period systems have evolved companions whose structure deviates significantly from the zero-age main sequence; and the radiation pattern of many objects is significantly anisotropic. It is now possible to give a complete characterization of the observed incidence of transient and persistent sources in terms of the disc instability model and formation constraints. X-ray populations in external galaxies, particularly the ultraluminous sources, are revealing important new insights into accretion processes and compact binary evolution.

Andrew R. King

2003-01-07T23:59:59.000Z

212

Integrating multiple clinical information systems using the Java message service framework to enable the delivery of urgent exam results at the point of care  

E-Print Network (OSTI)

Systems using the Java Message Service Framework. J DigitInformation Systems using the Java Message Service FrameworkED) physician. A web and Java Message Service (JMS) based

Tellis, W M; Andriole, K P

2005-01-01T23:59:59.000Z

213

Grain - A Java Analysis Framework for Total Data Readout  

E-Print Network (OSTI)

Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

P. Rahkila

2007-11-21T23:59:59.000Z

214

Binary Cultivation in Photobioreactors - Available ...  

The approach uses binary cultivation—inside photobioreactors—to facilitate growth by creating a closed system in ... ranging from CO2 from power plant ...

215

Exploiting static application knowledge in a Java compiler for embedded systems: a case study  

Science Conference Proceedings (OSTI)

Offering many benefits in terms of productivity and reliability, Java is becoming an attractive choice for the field of embedded computing. However, its programming model that relies on the capabilities of just-in-time compilation limits the opportunities ... Keywords: Java, KESO, embedded systems

Christoph Erhardt; Michael Stilkerich; Daniel Lohmann; Wolfgang Schröder-Preikschat

2011-09-01T23:59:59.000Z

216

Managing programmed instruction and collaborative peer tutoring in the classroom: Applications in teaching JavaTM  

Science Conference Proceedings (OSTI)

To fulfill part of the course requirements, 34 undergraduate students in two courses completed an online programmed instruction tutor as the first technical training exercise in a Java(TM) programming course designed for information systems majors. The ... Keywords: Collaborative peer tutoring, Interteaching, Java training, Programmed instruction

Henry H. Emurian; Heather K. Holden; Rachel A. Abarbanel

2008-03-01T23:59:59.000Z

217

Use of XML and Java for collaborative petroleum reservoir modeling on the Internet  

Science Conference Proceedings (OSTI)

The GEMINI (Geo-Engineering Modeling through INternet Informatics) is a public-domain, web-based freeware that is made up of an integrated suite of 14 Java-based software tools to accomplish on-line, real-time geologic and engineering reservoir modeling. ... Keywords: GEMINI, Java, Petroleum web-based software, Reservoir modeling, Web start, XML

John Victorine; W. Lynn Watney; Saibal Bhattacharya

2005-11-01T23:59:59.000Z

218

Sound-colour synaesthesia, chromatic representation of sounds waves in Java applets  

Science Conference Proceedings (OSTI)

The paper herein presents a way in which sound waves are chromatically represented in Java language. It intends to be, as its' title reveals, an instructional material providing help in developing interactive tools for efficient education in sciences, ... Keywords: RGB light, education, java applets, music, sounds waves

Stela Dragulin; Livia Sangeorzan; Mircea Parpalea

2010-09-01T23:59:59.000Z

219

Using You Tube to enhance student class preparation in an introductory Java course  

Science Conference Proceedings (OSTI)

We provided 21 short YouTube videos for an Introduction to Programming in Java course. Students were surveyed on how often they watched the videos and did the readings, and how much these activites contributed to their learning. When professors ... Keywords: java, videos, youtube

Martin C. Carlisle

2010-03-01T23:59:59.000Z

220

SableVM: a research framework for the efficient execution of java bytecode  

Science Conference Proceedings (OSTI)

SableVM is an open-source virtual machine for Java intended as a research framework for efficient execution of Java bytecode. The framework is essentially composed of an extensible bytecode interpreter using state-of-the-art and innovative techniques. ...

Etienne M. Gagnon; Laurie J. Hendren

2001-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

9 Modelling the CoCoME with the JAVA/A Component Model  

E-Print Network (OSTI)

-founded and coherent modelling and programming concepts for components: based on sound theoretical foundations it en and a Java-based architectural programming language. 9.1.1 Goals and Scope of the Component Model The JAVA is the representation of software architecture entities in a programming language. For this purpose we introduced

Gilmore, Stephen

222

An evaluation of Java's I/O capabilities for high-performance computing.  

SciTech Connect

Java is quickly becoming the preferred language for writing distributed applications because of its inherent support for programming on distributed platforms. In particular, Java provides compile-time and run-time security, automatic garbage collection, inherent support for multithreading, support for persistent objects and object migration, and portability. Given these significant advantages of Java, there is a growing interest in using Java for high-performance computing applications. To be successful in the high-performance computing domain, however, Java must have the capability to efficiently handle the significant I/O requirements commonly found in high-performance computing applications. While there has been significant research in high-performance I/O using languages such as C, C++, and Fortran, there has been relatively little research into the I/O capabilities of Java. In this paper, we evaluate the I/O capabilities of Java for high-performance computing. We examine several approaches that attempt to provide high-performance I/O--many of which are not obvious at first glance--and investigate their performance in both parallel and multithreaded environments. We also provide suggestions for expanding the I/O capabilities of Java to better support the needs of high-performance computing applications.

Dickens, P. M.; Thakur, R.

2000-11-10T23:59:59.000Z

223

Mechanisms for Secure Modular Programming in Java Lujo Bauer Andrew W. Appel Edward W. Felten  

E-Print Network (OSTI)

structure the interaction between different parts of a program. They must do this not only to protect Java packages, however, is the ability to structure modules so as to provide different views, protected, package-scope, or public) aren't expressive enough, so Java resorts to using a security manager

Appel, Andrew W.

224

Reconstructed streamflow for Citarum River, Java, Indonesia: linkages to tropical climate dynamics  

E-Print Network (OSTI)

Reconstructed streamflow for Citarum River, Java, Indonesia: linkages to tropical climate dynamics Abstract The Citarum river basin of western Java, Indonesia, which supplies water to 10 million residents in drought and flood prone regions of the globe (e.g. Boer 2007). In Indonesia, integrated action is needed

Ummenhofer, Caroline C.

225

Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1  

E-Print Network (OSTI)

Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1 Rob Wilson,2 reconstruct the boreal autumn (October­November) Palmer Drought Severity Index (PDSI) for Java, Indonesia between the climate of Indonesia and the large scale tropical Indo-Pacific climate system. Citation: D

226

The Java-Sumatra Aerial Mega-Tramway  

E-Print Network (OSTI)

A mega-tramway based on the Indonesian islands of Sumatra and Java is proposed to span Sunda Strait. The Java-Sumatra Aerial Mega-Tramway (JSAMT) will be self-elevating and will regularly and cheaply launch passengers and cargoes via two conveyor belt-like facilities using standard winged shipping containers like those currently used by international trucking and ocean shipping industries that are volplaned across the Sunda Strait. The JSAMT will be a self-sustaining toll facility free of any requirement for international loans or funding guarantees for its construction. Its existence will remove any immediate need for an expensive to dig/maintain Nusantara Tunnel. We offer the formative basic technical specifications for the JSAMT and indicate some of the physical and cultural geographical facts underpinning our macro-engineering proposal; offshoots of a perfected and tested JSAMT may be installed at Palk Strait between India and Sri Lanka, the Gibraltar Strait and the Bering Strait by mid-21st Century.

Alexander Bolonkin; Richard Cathcart

2007-01-09T23:59:59.000Z

227

Event Reconstruction for Many-core Architectures using Java  

SciTech Connect

Although Moore's Law remains technically valid, the performance enhancements in computing which traditionally resulted from increased CPU speeds ended years ago. Chip manufacturers have chosen to increase the number of core CPUs per chip instead of increasing clock speed. Unfortunately, these extra CPUs do not automatically result in improvements in simulation or reconstruction times. To take advantage of this extra computing power requires changing how software is written. Event reconstruction is globally serial, in the sense that raw data has to be unpacked first, channels have to be clustered to produce hits before those hits are identified as belonging to a track or shower, tracks have to be found and fit before they are vertexed, etc. However, many of the individual procedures along the reconstruction chain are intrinsically independent and are perfect candidates for optimization using multi-core architecture. Threading is perhaps the simplest approach to parallelizing a program and Java includes a powerful threading facility built into the language. We have developed a fast and flexible reconstruction package (org.lcsim) written in Java that has been used for numerous physics and detector optimization studies. In this paper we present the results of our studies on optimizing the performance of this toolkit using multiple threads on many-core architectures.

Graf, Norman A.; /SLAC

2012-04-19T23:59:59.000Z

228

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

229

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of 686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August 8, 2011 - 3:00pm Addthis PROBLEM: A vulnerability in the Java Runtime Environment allows unauthenticated network attacks ( i.e. it may be exploited over a network without the need for a username and password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061 Secunia Advisory: SA45556 CVE-2010-4476 IMPACT ASSESSMENT: Medium Discussion: IBM has acknowledged a vulnerability in IBM Tivoli Integrated Portal, which can be exploited by malicious people to cause a DoS (Denial of Service).

230

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

231

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

232

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

233

T-581: Novell Access Manager Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

234

Binary Tetrahedral Flavor Symmetry  

E-Print Network (OSTI)

A study of the T' Model and its variants utilizing Binary Tetrahedral Flavor Symmetry. We begin with a description of the historical context and motivations for this theory, together with some conceptual background for added clarity, and an account of our theory's inception in previous works. Our model endeavors to bridge two categories of particles, leptons and quarks, a unification made possible by the inclusion of additional Higgs particles, shared between the two fermion sectors and creating a single coherent system. This is achieved through the use of the Binary Tetrahedral symmetry group and an investigation of the Tribimaximal symmetry evidenced by neutrinos. Our work details perturbations and extensions of this T' Model as we apply our framework to neutrino mixing, quark mixing, unification, and dark matter. Where possible, we evaluate model predictions against experimental results and find excellent matching with the atmospheric and reactor neutrino mixing angles, an accurate prediction of the Cabibbo angle, and a dark matter candidate that remains outside the limits of current tests. Additionally, we include mention of a number of unanswered questions and remaining areas of interest for future study. Taken together, we believe these results speak to the promising potential of finite groups and flavor symmetries to act as an approximation of nature.

David A. Eby

2013-04-15T23:59:59.000Z

235

Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME  

Science Conference Proceedings (OSTI)

In their analysis of the use of Java as a first teaching language, the ACM Java Task Force (JTF) identified a number of issues with the Java language and APIs which caused significant pedagogic problems. The focus of their work, and hence of their characterisation ... Keywords: introductory programming, programming languages

Ian Utting

2006-06-01T23:59:59.000Z

236

V-072: Red Hat update for java-1.7.0-openjdk | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Red Hat update for java-1.7.0-openjdk 2: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for java-1.7.0-openjdk. PLATFORM: The vulnerabilities are reported in Red Hat Enterprise Linux 5 and 6 ABSTRACT: Red Hat has issued an update for java-1.7.0-openjdk. REFERENCE LINKS: Secunia Advisory SA51858 RHSA-2013:0165-1 CVE-2012-3174 CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. IMPACT: Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. SOLUTION: Vendor advises to upgrade to these updated packages, which resolve these

237

Modular Workflow Engine for Distributed Services using Lightweight Java Clients  

E-Print Network (OSTI)

In this article we introduce the concept and the first implementation of a lightweight client-server-framework as middleware for distributed computing. On the client side an installation without administrative rights or privileged ports can turn any computer into a worker node. Only a Java runtime environment and the JAR files comprising the workflow client are needed. To connect all clients to the engine one open server port is sufficient. The engine submits data to the clients and orchestrates their work by workflow descriptions from a central database. Clients request new task descriptions periodically, thus the system is robust against network failures. In the basic set-up, data up- and downloads are handled via HTTP communication with the server. The performance of the modular system could additionally be improved using dedicated file servers or distributed network file systems. We demonstrate the design features of the proposed engine in real-world applications from mechanical engineering. We have used ...

Vetter, R -M; Peetz, J -V

2009-01-01T23:59:59.000Z

238

Binary Quantum Search  

E-Print Network (OSTI)

Database search has wide applications and is used as a subroutine in many important algorithms. We shall consider a database with one target item. Quantum algorithm finds the target item in a database faster than any classical algorithm. It frequently occurs in practice that only a portion of information about the target item is interesting, or we need to find a group of items sharing some common feature as the target item. This problem is in general formulated as search for a part of the database [a block] containing the target item, instead of the item itself. This is partial search. Partial search trades accuracy for speed, i.e. it works faster than a full search. Partial search algorithm was discovered by Grover and Radhakrishnan. We shall consider optimized version of the algorithm and call it GRK. It can be applied successively [in a sequence]. First the database is partitioned into blocks and we use GRK to find the target block. Then this target block is partitioned into sub-blocks and we use GRK again to find the target sub-block. [We can call it binary quantum search.] Another possibility is to partition the database into sub-blocks directly and use GRK to find the target sub-block in one time. In this paper we prove that the latter is faster [makes less queries to the oracle].

Vladimir Korepin; Ying Xu

2007-05-06T23:59:59.000Z

239

Co-synthesis of FPGA-based application-specific floating point simd accelerators  

Science Conference Proceedings (OSTI)

The constant push for feature richness in mobile and embedded devices has significantly increased computational demand. However, stringent energy constraints typically remain in place. Embedding processor cores in FPGAs offers a path to having customized ... Keywords: co-synthesis, custom instructions, simd

Andrei Hagiescu; Weng-Fai Wong

2011-02-01T23:59:59.000Z

240

Resource-constrained multiprocessor synthesis for floating-point applications on FPGAs  

Science Conference Proceedings (OSTI)

Although state-of-the-art field-programmable gate arrays offer exciting new opportunities in exploring low-cost high-performance architectures for data-intensive scientific applications, they also present serious challenges. Multiprocessor-on-programmable-chip, ... Keywords: FPGA design and synthesis, Multiprocessor-on-programmable-chip, heterogeneous multiprocessors, mixed-mode parallel processing, resource-constrained optimization

Xiaofang Wang; Pallav Gupta

2011-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-087: HP-UX update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP-UX update for Java 7: HP-UX update for Java U-087: HP-UX update for Java January 24, 2012 - 7:00am Addthis PROBLEM: HP issued an update for Java in HP-UX to address multiple vulnerabilities. PLATFORM: HP-UX 11.x ABSTRACT: Multiple vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information. reference LINKS: Secunia Advisory 47709 Secunia Advisory 46512 HP Support Document IMPACT ASSESSMENT: High Discussion: The vulnerabilities are reported in versions B.11.11, B.11.23, and B.11.31 running HP JDK and JRE 6.0.12 and prior. Vulnerabilities inlcude the ability to hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a

242

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

243

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

244

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

245

Dynamic Information Flow Analysis for JavaScript in a Web Browser  

E-Print Network (OSTI)

Flow Analysis for JavaScript in a Web Browser by Thomas H.a central technology of the web, but it is also the sourceinformation flows in javascript web applications. In ACM

Austin, Thomas Howard

2013-01-01T23:59:59.000Z

246

Kopitiam: modular incremental interactive full functional static verification of java code  

Science Conference Proceedings (OSTI)

We are developing Kopitiam, a tool to interactively prove full functional correctness of Java programs using separation logic by interacting with the interactive theorem prover Coq. Kopitiam is an Eclipse plugin, enabling seamless integration into the ...

Hannes Mehnert

2011-04-01T23:59:59.000Z

247

Interannual Variability of Sea Surface Temperature off Java and Sumatra in a Global GCM  

Science Conference Proceedings (OSTI)

Using results from the Simple Ocean Data Assimilation (SODA), this study assesses the mixed layer heat budget to identify the mechanisms that control the interannual variation of sea surface temperature (SST) off Java and Sumatra. The analysis ...

Yan Du; Tangdong Qu; Gary Meyers

2008-06-01T23:59:59.000Z

248

Code for Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation  

E-Print Network (OSTI)

This archive contains the code and data for running the evaluations described in: Finlayson, Mark Alan (2014) "Java Libraries for Accessing the Princeton Wordnet: comparison and Evaluation" in Proceedings of the 7th Global ...

Finlayson, Mark Alan

2013-11-01T23:59:59.000Z

249

Comparison between CPBPV, ESC/Java, CBMC, Blast, EUREKA and Why for Bounded Program Verification  

E-Print Network (OSTI)

This report describes experimental results for a set of benchmarks on program verification. It compares the capabilities of CPBVP "Constraint Programming framework for Bounded Program Verification" [4] with the following frameworks: ESC/Java, CBMC, Blast, EUREKA and Why.

Collavizza, Hélène; Van Hentenryck, Pascal

2008-01-01T23:59:59.000Z

250

JConstHide: A Framework for Java Source Code Constant Hiding  

E-Print Network (OSTI)

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called byte codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks . But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. We in this paper are proposing a framework named JConstHide for hiding constants, especially integers in the java source codes, to defeat reverse en...

Sivadasan, Praveen

2009-01-01T23:59:59.000Z

251

InterProlog: Towards a declarative embedding of logic programming in Java  

E-Print Network (OSTI)

Abstract. InterProlog is the first Prolog-Java interface to support multiple Prolog systems through the same API; currently XSB and SWI Prolog, with GNU Prolog and YAP under development – on Windows, Linux and Mac OS X. It promotes coarse-grained integration between logic and object-oriented layers, by providing the ability to bidirectionally map any class data structure to a Prolog term; integration is done either through the Java Native Interface or TCP/IP sockets. It is proposed as a first step towards a common standard Java + Prolog API, gifting the Java developer with the best inference engines, and the logic programmer with simple access to the mainstream object-oriented platform. 1

Miguel Calejo

2004-01-01T23:59:59.000Z

252

Predictors Of Java Programming Self Efficacy Among Engineering Students In A Nigerian University  

E-Print Network (OSTI)

The study examined the relationship between Java programming self-efficacy and programming background of engineering students in a Nigerian University. One hundred and ninety two final year engineering students randomly selected from six engineering departments of the university participated in the study. Two research instruments: Programming Background Questionnaire and Java Programming Self-Efficacy Scale were used in collecting relevant information from the subjects. The resulting data were analyzed using Pearson product correlation and Multiple regression analysis. Findings revealed that Java Programming self-efficacy has no significant relationship with each of the computing and programming background factors. It was additionally obtained that the number of programming courses offered and programming courses weighed scores were the only predictors of Java self-efficacy.

Jegede, Philip Olu

2009-01-01T23:59:59.000Z

253

Nues ardentes of 22 November 1994 at Merapi volcano, Java, Indonesia E.K Abdurachmanab  

E-Print Network (OSTI)

Nuées ardentes of 22 November 1994 at Merapi volcano, Java, Indonesia E.K Abdurachmanab J Volcanological Survey of Indonesia, Jl. Diponegoro 57, Bandung 40122, Indonesia c Centre de Recherches

Paris-Sud XI, Université de

254

6.092 Introduction to Software Engineering in Java, January (IAP) 2008  

E-Print Network (OSTI)

This course is an introduction to software engineering, using the Java™ programming language; it covers concepts useful to 6.005. The focus is on developing high quality, working software that solves real problems. Students ...

Akeju, Usman O.

255

V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2013 1: Oracle Java SE Critical Patch Update Advisory - June 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 June 19, 2013 - 1:06am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2013 PLATFORM: Version(s): 5.0 Update 45, 6 Update 45, 7 Update 21; and prior versions ABSTRACT: Multiple vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Oracle Java SE Critical Patch Update June 2013 SecurityTracker Alert ID: 1028679 CVE-2013-1500, CVE-2013-1571 CVE-2013-2400, CVE-2013-2407 CVE-2013-2412, CVE-2013-2437 CVE-2013-2442, CVE-2013-2443 CVE-2013-2444, CVE-2013-2445 CVE-2013-2446, CVE-2013-2447 CVE-2013-2448, CVE-2013-2449 CVE-2013-2450, CVE-2013-2451 CVE-2013-2452, CVE-2013-2453 CVE-2013-2454, CVE-2013-2455 CVE-2013-2456, CVE-2013-2457

256

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

257

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

258

Binary Cycle Power Plant | Open Energy Information  

Open Energy Info (EERE)

Binary Cycle Power Plant Binary Cycle Power Plant (Redirected from Binary) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Binary Cycle Power Plant General List of Binary Plants Binary power plant process diagram - DOE EERE 2012 Binary cycle geothermal power generation plants differ from Dry Steam and Flash Steam systems in that the water or steam from the geothermal reservoir never comes in contact with the turbine/generator units. Low to moderately heated (below 400°F) geothermal fluid and a secondary (hence, "binary") fluid with a much lower boiling point that water pass through a heat exchanger. Heat from the geothermal fluid causes the secondary fluid to flash to vapor, which then drives the turbines and subsequently, the generators. Binary cycle power plants are closed-loop systems and virtually nothing

259

Searching for the biofuel energy crisis in rural Java  

SciTech Connect

Biofuel shortage in peasant economies is often reported to reach crisis proportions in conditions of high population density. As a group, peasants are portrayed as engaging in irrational biofuel resource abuse. At times this abuse is treated as the inevitable outcome of excess biofuel demand. Otherwise, an explanation is often given in terms of resource-use problems inherent in common property. An alternative explanation is proposed in this dissertation. Rather than the effect of common property (a structure), such crises are more likely the result of capitalist expansion (a process). Systems of common foraging are prone to ownership conflict during transitions to private property. This conflict provides a more cogent explanation for biofuel shortage than any structural flaw in common-use systems. Contemporary rural Java contradicts mechanistic applications of supply/demand models of biofuel shortage. Despite high population pressure, biofuel is not inordinately scarce. There is little basis for the crisis predictions. While assessments of biofuel demand and supply can provide scarcity indicators, they ought not be used to predict overuse. The traditional crisis predictions of supply/demand balancing and common property analysis must be replaced by a more skeptical multi-disciplinary approach.

McGranahan, G.

1986-01-01T23:59:59.000Z

260

An electrically powered binary star?  

E-Print Network (OSTI)

We propose a model for stellar binary systems consisting of a magnetic and a non-magnetic white-dwarf pair which is powered principally by electrical energy. In our model the luminosity is caused by resistive heating of the stellar atmospheres due to induced currents driven within the binary. This process is reminiscent of the Jupiter-Io system, but greatly increased in power because of the larger companion and stronger magnetic field of the primary. Electrical power is an alternative stellar luminosity source, following on from nuclear fusion and accretion. We find that this source of heating is sufficient to account for the observed X-ray luminosity of the 9.5-min binary RX J1914+24, and provides an explanation for its puzzling characteristics.

Kinwah Wu; Mark Cropper; Gavin Ramsay; Kazuhiro Sekiguchi

2001-11-19T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

High-performance file I/O in Java : existing approaches and bulk I/O extensions.  

Science Conference Proceedings (OSTI)

There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

2001-07-01T23:59:59.000Z

262

Metadata driven memory optimizations in dynamic binary translator  

Science Conference Proceedings (OSTI)

A dynamic binary translator offers solutions for translating and running source architecture binaries on target architecture at runtime. Regardless of its growing popularity, practical dynamic binary translators usually suffer from the limited optimizations ... Keywords: dynamic binary translator, memory optimizations, metadata

Chaohao Xu; Jianhui Li; Tao Bao; Yun Wang; Bo Huang

2007-06-01T23:59:59.000Z

263

Binary Cycle Power Plant | Open Energy Information  

Open Energy Info (EERE)

Binary Cycle Power Plant Binary Cycle Power Plant (Redirected from Binary Cycle Power Plants) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Binary Cycle Power Plant General List of Binary Plants Binary power plant process diagram - DOE EERE 2012 Binary cycle geothermal power generation plants differ from Dry Steam and Flash Steam systems in that the water or steam from the geothermal reservoir never comes in contact with the turbine/generator units. Low to moderately heated (below 400°F) geothermal fluid and a secondary (hence, "binary") fluid with a much lower boiling point that water pass through a heat exchanger. Heat from the geothermal fluid causes the secondary fluid to flash to vapor, which then drives the turbines and subsequently, the generators.

264

Spectral analysis of X-ray binaries  

E-Print Network (OSTI)

In this thesis, I present work from three separate research projects associated with observations of X-ray binaries. Two of those revolve around spectral characteristics of neutron star low-mass X-ray binaries (NS-LMXBs), ...

Fridriksson, Joel Karl

2011-01-01T23:59:59.000Z

265

Binary Cultivation in Photobioreactors - Energy Innovation Portal  

Biomass and Biofuels Advanced Materials Binary ... The processes of photosynthesis and photosynthate conversion into a target product are spatially separated ;

266

Stochastic binary sensor networks for noisy environments  

Science Conference Proceedings (OSTI)

This paper proposes a stochastic framework for detecting anomalies or gathering events of interest in a noisy environment using a network consisting of binary sensors. A binary sensor is an extremely coarse sensor, capable of measuring data to only 1-bit ... Keywords: energy consumption, energy efficiency, noisy environments, sensor networks, simulation, stochastic binary sensors, wireless networks

T. Nguyen; Dong Nguyen; Huaping Liu; Duc A. Tran

2007-07-01T23:59:59.000Z

267

Gain Time Reclaiming in High Performance Real-Time Java Systems  

E-Print Network (OSTI)

The run-time characteristics of Java, such as high frequency of method invocation, dynamic dispatching and dynamic loading, make Java more difficult than other object-oriented programming languages, such as C++, for conducting Worst-Case Execution Time (WCET) analysis. To offer a more flexible way to develop object-oriented real-time applications in the realtime Java environment without loss of predicability and performance, we propose a novel gain time reclaiming framework integrated with WCET analysis. This paper demonstrates how to improve the utilisation and performance of the whole system by reclaiming gain time at run-time. Our approach shows that integrating WCET with gain time reclaiming can not only provide a more flexible environment, but it also does not necessarily result in unsafe or unpredictable timing behaviour.

Erik Yu-Shing Hu; Andy Wellings; Guillem Bernat

2003-01-01T23:59:59.000Z

268

JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes  

E-Print Network (OSTI)

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called 'byte' codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks. But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. Hence programmers resort to adhoc manual ways of obscuring their program which makes it difficult for its maintenance and usability. To address thi...

Sivadasan, Praveen; Sivadasan, Naveen

2008-01-01T23:59:59.000Z

269

Object-Oriented Intensional Programming: Intensional Classes Using Java and Lucid  

E-Print Network (OSTI)

This article introduces Object-Oriented Intensional Programming (OO-IP), a new hybrid language between Object-Oriented and Intensional Programming Languages in the sense of the latest evolutions of Lucid. This new hybrid language combines the essential characteristics of Lucid and Java, and introduces the notion of object streams which makes it is possible that each element in a Lucid stream to be an object with embedded intensional properties. Interestingly, this hybrid language also brings to Java objects the power to explicitly express and manipulate the notion of context, creating the novel concept of intensional object, i.e. objects whose evaluation is context-dependent, which are here demonstrated to be translatable into standard objects. By this new approach, we extend the use and meaning of the notion of intensional objects and enrich the meaning of object streams in Lucid and semantics of intensional objects in Java.

Wu, Aihua; Mokhov, Serguei A

2009-01-01T23:59:59.000Z

270

Measuring Sulphur Dioxide (SO2) Emissions in October, 2010 Catastrophic Eruption from Merapi Volcano in Java, Indonesia  

E-Print Network (OSTI)

Volcano in Java, Indonesia with Ozone Monitoring Instrument (OMI) José A. Morales-Collazo Geology This paper discusses sulfur dioxide (SO2) cloud emissions from Merapi Volcano in Java, Indonesia during, Indonesia. In October 26th , 2010, a catastrophic eruption was reported from Merapi causing nearly 386

Gilbes, Fernando

271

Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays  

E-Print Network (OSTI)

Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays. The class method definition codes are obscured through index transformation and constant hiding. The instantiated objects of these classes are used for source code writing. A tool named JDATATRANS is developed for generating classes and to the best of our knowledge this is the first tool available for array restructuring, on java source codes.

Sivadasan, Praveen

2008-01-01T23:59:59.000Z

272

jContractor: Introducing Design-by-Contract to Java Using Reflective Bytecode Instrumentation  

Science Conference Proceedings (OSTI)

Design by Contract is a software engineering practice that allows semantic information to be added to a class or interface to precisely specify the conditions that are required for its correct operation. The basic constructs of Design by Contract are ... Keywords: Design by Contract, Java, bytecode instrumentation, jContractor

Murat Karaorman; Parker Abercrombie

2005-11-01T23:59:59.000Z

273

DESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH  

E-Print Network (OSTI)

for incoming calls to the exported remote object. The others are worker threads for handling each accepted-time worker threads for handling incoming calls to exported remote objects. We have modified the run() methodDESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH Sangig Rho Samsung

Choi, Byung K.

274

Hard Real-Time Garbage Collection for a Java Chip Multi-Processor  

E-Print Network (OSTI)

or hard copies of all or part of this work for personal or classroom use is granted without fee provided, these approaches implement substantial parts or all of the garbage collector in hard- ware. In contrast, ourHard Real-Time Garbage Collection for a Java Chip Multi-Processor Wolfgang Puffitsch Institute

275

CSY3019 -Graphics Programming Assignment 2: Development of 3D graphics software: Java 2D (50%)  

E-Print Network (OSTI)

CSY3019 - Graphics Programming Assignment 2: Development of 3D graphics software: Java 2D (50 and/or strip lights). · User defined or loaded geometry (i.e. not primitive shapes). · The room & Title Page · Table of contents · Introduction · Analysis · Design · Implementation · Testing

Hill, Gary

276

Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators  

E-Print Network (OSTI)

This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

Tucci, Robert R

2008-01-01T23:59:59.000Z

277

Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators  

E-Print Network (OSTI)

This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

Robert R. Tucci

2008-02-17T23:59:59.000Z

278

A High Integrity Profile for Memory Safe Programming in Real-time Java  

E-Print Network (OSTI)

the structure of Real-time Java programs. By giving an additional mean- ing to the package construct, we, de be allocated within any package ­ but will be prevented from abstract class ScopeGate { protected Scope, we moved classes amongst packages so that Scoped Zen's package structure matched the scope structure

Zhao, Tian

279

Real-time remote control of a robot manipulator using Java and client-server architecture  

Science Conference Proceedings (OSTI)

The control of complex systems through PC networks is becoming increasingly important nowadays, both in the industries and in R&D centers. In this paper, a novel architecture is described which provides 24-h-a-day access to a remote system for remote ... Keywords: RS232, client, communication protocol, internet, java, planar manipulator, real-time, remote control, server

F. M. Raimondi; L. S. Ciancimino; M. Melluso

2005-03-01T23:59:59.000Z

280

Proceedings of the 3rd international symposium on Principles and practice of programming in Java  

Science Conference Proceedings (OSTI)

It gives me great pleasure to welcome you to Las Vegas, Nevada for the 3rd International Conference on Principles and Practice of Programming in Java.Forty one papers were submitted and a total of twenty four (58%) have been selected for presentation ...

John Waldron

2004-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Binary Cycle Power Plant | Open Energy Information  

Open Energy Info (EERE)

GEOTHERMAL ENERGYGeothermal Home GEOTHERMAL ENERGYGeothermal Home Binary Cycle Power Plant General List of Binary Plants Binary power plant process diagram - DOE EERE 2012 Binary cycle geothermal power generation plants differ from Dry Steam and Flash Steam systems in that the water or steam from the geothermal reservoir never comes in contact with the turbine/generator units. Low to moderately heated (below 400°F) geothermal fluid and a secondary (hence, "binary") fluid with a much lower boiling point that water pass through a heat exchanger. Heat from the geothermal fluid causes the secondary fluid to flash to vapor, which then drives the turbines and subsequently, the generators. Binary cycle power plants are closed-loop systems and virtually nothing (except water vapor) is emitted to the atmosphere. Resources below 400°F

282

Compact binary mergers: an astrophysical perspective  

E-Print Network (OSTI)

This paper reviews the current understanding of double neutron star and neutron star black hole binaries. It addresses mainly (nuclear) astrophysics aspects of compact binary mergers and thus complements recent reviews that have emphasized the numerical relativity viewpoint. In particular, the paper discusses different channels to release neutron-rich matter into the host galaxy, connections between compact binary mergers and short Gamma-ray bursts and accompanying electromagnetic signals.

S. Rosswog

2010-12-04T23:59:59.000Z

283

Segregation in noninteracting binary mixture  

E-Print Network (OSTI)

Process of stripe formation is analyzed numerically in a binary mixture. The system consists of particles of two sizes, without any direct mutual interactions. Overlapping of large particles, surrounded by a dense system of smaller particles induces indirect entropy driven interactions between large particles. Under an influence of an external driving force the system orders and stripes are formed. Mean width of stripes grows logarithmically with time, in contrast to a typical power law temporal increase observed for driven interacting lattice gas systems. We describe the mechanism responsible for this behavior and attribute the logarithmic growth to a random walk of large particles in a random potential due to the small ones.

Filip Krzyzewski; Magdalena Zaluska-Kotur

2007-08-06T23:59:59.000Z

284

Target tracking with binary proximity sensors  

Science Conference Proceedings (OSTI)

We explore fundamental performance limits of tracking a target in a two-dimensional field of binary proximity sensors, and design algorithms that attain those limits while providing minimal descriptions of the estimated target trajectory. Using geometric ... Keywords: Sensor networks, binary sensing, distributed algorithms, fundamental limits, target tracking

Nisheeth Shrivastava; Raghuraman Mudumbai; Upamanyu Madhow; Subhash Suri

2009-11-01T23:59:59.000Z

285

Mostly static program partitioning of binary executables  

Science Conference Proceedings (OSTI)

We have built a runtime compilation system that takes unmodified sequential binaries and improves their performance on off-the-shelf multiprocessors using dynamic vectorization and loop-level parallelization techniques. Our system, Azure, is purely software ... Keywords: Continuous compilation and optimization, binary translation, dynamic parallelization

Efe Yardimci; Michael Franz

2009-06-01T23:59:59.000Z

286

Numerical Investigations of Kuiper Belt Binaries  

E-Print Network (OSTI)

Observations of the Kuiper Belt indicate that a larger than expected percentage of KBO's (approximately 8 out of 500) are in binary pairs. The formation and survival of such objects presents a conundrum [1]. Two competing theories have been postulated to try to solve this problem. One entails the physical collision of bodies [2] while the other utilizes dynamical friction or a third body to dissipate excess momentum and energy from the system [3]. Although in general known binaries tend to differ significantly in mass, such as seen in the Earth-Moon or asteroid binary systems [4], Kuiper binaries discovered to date tend to instead be of similar size [5, 6]. This paper investigates the stability, development and lifetimes for Kuiper Belt binaries by tracking their orbital dynamics and subsequent evolution. Section two details the numerical model while Section three discusses the initial conditions. Finally, in Section four the results are discussed with Section five containing the conclusions.

R. C. Nazzario; T. W. Hyde

2005-01-20T23:59:59.000Z

287

Binary central stars of planetary nebulae  

E-Print Network (OSTI)

Abstract. Only a handful of binary central stars of planetary nebulae (PNe) are known today, due to the difficulty of detecting their companions. Preliminary results from radial velocity surveys, however, seem to indicate that binarity plays a fundamental, rather than marginal role in the evolution of PNe and that the close binary fraction might be much larger than the currently known value of 10-15%. In this review, we list all the known binary central stars, giving an updated census of their numbers and selected characteristics. A review is also given of the techniques used to detect binaries as well as selected characteristics of related stellar classes which might provide constraints (or additional puzzles) to the theory of PN evolution. Finally, we will formulate the conjecture that all PNe derive from binary interactions and suggest that this is not inconsistent with our current knowledge. 1.

Orsola De Marco

2006-01-01T23:59:59.000Z

288

A Time-Lagged Ensemble Simulation on the Modulation of Precipitation over West Java in January–February 2007  

Science Conference Proceedings (OSTI)

A numerical experiment using a regional nonhydrostatic model is performed to investigate the synoptic condition related to the heavy precipitation event that occurred at Jakarta in West Java, Indonesia, in January–February 2007. A time-lagged ...

Nurjanna J. Trilaksono; Shigenori Otsuka; Shigeo Yoden

2012-02-01T23:59:59.000Z

289

Changes related to "A Flashing Binary Combined Cycle For Geothermal...  

Open Energy Info (EERE)

Twitter icon Changes related to "A Flashing Binary Combined Cycle For Geothermal Power Generation" A Flashing Binary Combined Cycle For Geothermal Power Generation...

290

A Java Library for the Generation and Scheduling of PTX Assembly  

SciTech Connect

This paper discusses an ongoing progress regarding the development of a Java-based library for rapid kernel prototyping in NVIDIA PTX and PTX instruction scheduling. It is aimed at developers seeking total control of emitted PTX, highly parametric emission of, and tunable instruction reordering. It is primarily used for code development at ICHEC but is also hoped that NVIDIA GPU community will also find it beneficial.

Kartsaklis, Christos [ORNL; Civario, G [Irish Centre for High-End Computing

2010-01-01T23:59:59.000Z

291

SoapRMI C++/Java 1.1: Design and Implementation  

E-Print Network (OSTI)

Java RMI provides a simple and elegant paradigm for communication with objects in remote address spaces. RMI is a de facto standard for communication in distributed systems that are written in different languages and optimized to run in disparate environments. XML [10] has emerged as a promising standard for language-independent data representation, and HTTP as a widely-used firewall-friendly network protocol. It is now possible to design and develop a communication system that combines the elegance and strength of Java RMI with the ubiquity of HTTP and platform and language independence of XML. SOAP [12] defines XML based communication and SOAP RPC precisely states the protocol for using XML as the data format and HTTP as the network protocol. This paper presents the design issues in layering a C++ and Java based RMI system on top of SOAP RPC along with an efficient XML Pull Parser that we designed to parse SOAP calls. We explain the various features of the resulting SoapRMI system: dynamic proxies, stub-skeleton generation from XML specification, interoperability, exception handling and different "Naming" services. Key Words: RMI, Distributed Systems, XML, SOAP, Naming 1

Aleksander Slominski; Madhusudhan Govindaraju; Dennis Gannon; Randall Bramley

2001-01-01T23:59:59.000Z

292

Solving Non-binary CSPs Using the Hidden Variable Encoding  

Science Conference Proceedings (OSTI)

Non-binary constraint satisfaction problems (CSPs) can be solved in two different ways. We can either translate the problem into an equivalent binary one and solve it using well-established binary CSP techniques or use extended versions of binary techniques ...

Nikos Mamoulis; Kostas Stergiou

2001-11-01T23:59:59.000Z

293

On target tracking with binary proximity sensors  

Science Conference Proceedings (OSTI)

We consider the use of binary proximity sensors for tracking targets. Such sensors provide only 1-bit information regarding a target's presence or absence in their vicinity, albeit with less than 100% reliability. A novel tracking method employing such ...

Wooyoung Kim; Kirill Mechitov; Jeung-Yoon Choi; Soo Ham

2005-04-01T23:59:59.000Z

294

ROTATIONAL DOPPLER BEAMING IN ECLIPSING BINARIES  

SciTech Connect

In eclipsing binaries the stellar rotation of the two components will cause a rotational Doppler beaming during eclipse ingress and egress when only part of the eclipsed component is covered. For eclipsing binaries with fast spinning components this photometric analog of the well-known spectroscopic Rossiter-McLaughlin effect can exceed the strength of the orbital effect. Example light curves are shown for a detached double white dwarf binary, a massive O-star binary and a transiting exoplanet case, similar to WASP-33b. Inclusion of the rotational Doppler beaming in eclipsing systems is a prerequisite for deriving the correct stellar parameters from fitting high-quality photometric light curves and can be used to determine stellar obliquities as well as, e.g., an independent measure of the rotational velocity in those systems that may be expected to be fully synchronized.

Groot, Paul J., E-mail: pgroot@astro.ru.nl [Cahill Center for Astronomy and Astrophysics, California Institute of Technology, 1200 East California Boulevard, Pasadena, CA 91125 (United States)

2012-01-20T23:59:59.000Z

295

Binary distillation column design using mathematica  

Science Conference Proceedings (OSTI)

The accurate design of distillation columns is a very important topic in chemical industry. In this paper, we describe a Mathematica program for the design of distillation columns for binary mixtures. For simplicity, it is assumed that the columns are ...

Akemi Gálvez; Andrés Iglesias

2003-06-01T23:59:59.000Z

296

Optimization of naïve dynamic binary instrumentation Tools/  

E-Print Network (OSTI)

The proliferation of dynamic program analysis tools has done much to ease the burden of developing complex software. However, creating such tools remains a challenge. Dynamic binary instrumentation frameworks such as ...

Kleckner, Reid (Reid N.)

2011-01-01T23:59:59.000Z

297

Analysis of binary vapor turbines  

DOE Green Energy (OSTI)

The effect the binary mixture has on the turbine is examined in terms of design and cost. Several flow theories for turbines and turbine blading are reviewed. The similarity method, which uses dimensionless parameters, is used in determining rotative speeds and diameters for a variety of inlet temperatures and exit pressures. It is shown that the ratio of exit to inlet specific volume for each component in the mixture is the same for each specie. The specific volume ratio constraints are combined with the temperature equalities, the condenser pressure, and the total inlet entropy to form the constraints necessary to determine the exit state uniquely in an isentropic expansion. The non-isentropic exit state is found in a similar manner. The expansion process is examined for several cases and compared with the expansion of a single component vapor. Finally, in order to maintain high efficiency and to meet the criteria which makes the similarity method valid at high inlet temperatures, turbine multistaging is examined and a sample case is given for a two stage turbine.

Bliss, R.W.; Boehm, R.F.; Jacobs, H.R.

1976-12-01T23:59:59.000Z

298

Binary module test. Final report  

DOE Green Energy (OSTI)

The objective of this project was to design and test a binary loop module representative of and scaleable to commercial size units. The design was based on state-of-the-art heat exchanger technology, and the purpose of the tests was to confirm performance of a supercritical boiling cycle using isobutane and a mixture of isobutane and isopentane as the secondary working fluid. The module was designed as one percent of a 50 MW unit. It was installed at Magma Power's East Mesa geothermal field and tested over a period of approximately 4 months. Most of the test runs were with isobutane but some data were collected for hydrocarbon mixtures. The results of the field tests are reported. In general these results indicate reasonably good heat balances and agreement with overall heat transfer coefficients calculated by current stream analysis methods and available fluid property data; however, measured pressure drops across the heat exchangers were 20 percent higher than estimated. System operation was stable under all conditions tested.

Schilling, J.R.; Colley, T.C.; Pundyk, J.

1980-12-01T23:59:59.000Z

299

Double Precision Computation of the Logistic Map Depends on Computational Modes of the Floating-point Processing Unit  

E-Print Network (OSTI)

Today's most popular CPU can operate in two different computational modes for double precision computations. This fact is not very widely recognized among scientific computer users. The present paper reports the differences the modes bring about using the most thoroughly studied system in chaos theory, the logistic map. Distinct virtual periods due to finite precision come about depending on the computational modes for the parameter value corresponding to fully developed chaos. For other chaotic regime various virtual periods emerge depending on the computational modes and the mathematical expressions of the map. Differences in the bifurcation diagrams due to the modes and the expressions are surveyed exhaustively. A quantity to measure those differences is defined and calculated.

Michiro Yabuki; Takashi Tsuchiya

2013-05-14T23:59:59.000Z

300

Investigating Dark Energy with Black Hole Binaries  

E-Print Network (OSTI)

The accelerated expansion of the universe is ascribed to the existence of dark energy. Black holes accretion of dark energy induces a mass change proportional to the energy density and pressure of the background dark energy fluid. The time scale during which the mass of black holes changes considerably is too long relative to the age of the universe, thus beyond detection possibilities. We propose to take advantage of the modified black hole masses for exploring the equation of state $w[z]$ of dark energy, by investigating the evolution of supermassive black hole binaries on a dark energy background. Deriving the signatures of dark energy accretion on the evolution of binaries, we find that dark energy imprints on the emitted gravitational radiation and on the changes in the orbital radius of the binary can be within detection limits for certain supermassive black hole binaries. In this talk I describe how binaries can provide a useful tool in obtaining complementary information on the nature of dark energy, based on the work done with A.Kelleher.

Laura Mersini-Houghton; Adam Kelleher

2009-06-08T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Modeling Flows Around Merging Black Hole Binaries  

E-Print Network (OSTI)

Coalescing massive black hole binaries are produced by the mergers of galaxies. The final stages of the black hole coalescence produce strong gravitational radiation that can be detected by the space-borne LISA. In cases where the black hole merger takes place in the presence of gas and magnetic fields, various types of electromagnetic signals may also be produced. Modeling such electromagnetic counterparts of the final merger requires evolving the behavior of both gas and fields in the strong-field regions around the black holes. We have taken a step towards solving this problem by mapping the flow of pressureless matter in the dynamic, 3-D general relativistic spacetime around the merging black holes. We find qualitative differences in collision and outflow speeds, including a signature of the merger when the net angular momentum of the matter is low, between the results from single and binary black holes, and between nonrotating and rotating holes in binaries. If future magnetohydrodynamic results confirm ...

van Meter, James R; Miller, M Coleman; Reynolds, Christopher S; Centrella, Joan M; Baker, John G; Boggs, William D; Kelly, Bernard J; McWilliams, Sean T

2009-01-01T23:59:59.000Z

302

In Proceedings of the Internet Society Symp. on Network and Distributed System Security, San Diego, CA, March 1988 Implementing Protection Domains in the Java TM Development Kit 1.2  

E-Print Network (OSTI)

­ pals. The new class java.security.ProtectionDomain is package­private, and is transparent to most Java.security package. #12; From within Java code, the protection domain of a given class is obtained by invoking the static method getProtectionDomain(CodeSource), again a private method within the package. For each class

Krintz, Chandra

303

Auto-correlation of Binary stars  

E-Print Network (OSTI)

Speckle interferometric technique is used to record a series of short exposure images of several close binary stars with sub-arcsecond separation through a narrow band filter centred at H$\\alpha$ at the Cassegrain focus of the 2.34 meter Vainu Bappu telescope (VBT), situated at Vainu Bappu Observatory (VBO), Kavalur. The auto-correlation method is developed under Image Reduction Analysis Facility (IRAF). Wiener filter is included in the programme to eliminate spurious high frequency contributions; a few sets of data provide the optimised results. The auto-correlated image of these stars gives the separation of the binary components.

S. K. Saha; D. Maitra

2001-06-07T23:59:59.000Z

304

Speckle interferometric observations of close binary stars  

E-Print Network (OSTI)

Speckle interferometric technique is employed to record a series of hundreds of short-exposure images of several close binary stars with sub-arcsecond separation through a narrow band filter at the Cassegrain focus of the 2.34 meter (m) Vainu Bappu telescope (VBT), situated at Vainu Bappu Observatory (VBO), Kavalur, India. The data are recorded sequentially by a Peltier-cooled intensified CCD camera with 10 ms exposure. The auto-correlation method is applied to determine the angular separations and position angles of these binary systems.

S. K. Saha; V. Chinnappan; L. Yeswanth; P. Anbazhagan

2002-09-20T23:59:59.000Z

305

Simple reconstruction of binary near-perfect phylogenetic trees  

Science Conference Proceedings (OSTI)

We consider the problem of reconstructing near-perfect phylogenetic trees using binary character states (referred to as BNPP). A perfect phylogeny assumes that every character mutates at most once in the evolutionary tree, yielding an algorithm for binary ...

Srinath Sridhar; Kedar Dhamdhere; Guy E. Blelloch; Eran Halperin; R. Ravi; Russell Schwartz

2006-05-01T23:59:59.000Z

306

Time distribution analysis for binary search of a linked list  

Science Conference Proceedings (OSTI)

The aim of this article is to determine the probability distribution of sorting time for different sized linked lists utilizing binary search method and its comparison with results for sequential and binary tree search methods. In [1] the concept of ...

Firooz Khosraviyani; Mohammad H. Moadab; Douglas F. Hale

1991-11-01T23:59:59.000Z

307

Design of an XML based Interoperable RMI System: SoapRMI C++/Java 1.1  

E-Print Network (OSTI)

and remote exception handling between the C++ and Java implementations of SoapRMI. The paper explores JVM as the remote object and handles communication with the stub. The registry is used to manage for communication with objects in remote address spaces. RMI is a de facto standard for communication in distributed

308

CSY3019 -Graphics Programming Assignment 2: Development of 2D/3D graphics software: Java 3D (50%)  

E-Print Network (OSTI)

CSY3019 - Graphics Programming Assignment 2: Development of 2D/3D graphics software: Java 3D (50, directional, point and spot lighting (to model windows and/or strip lights). · User defined or loaded geometry. Front Sheet & Title Page · Table of contents · Introduction · Analysis · Design · Implementation

Hill, Gary

309

Jiazzi: New-Age Components for Old-Fashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

, the structure of classes in a unit's imported and exported packages can be described using package signatures structure of classes in a Java package. In Figure 2, the package signature ui s describes a UI library Program. In the package signature the structure of a class is described using a class signature. The class

Hsieh, Wilson

310

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated, and Buffered Indices  

E-Print Network (OSTI)

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated structures. This could happen if you want the students in your database class to implement some basic index structures such as the B+-tree and the linear hashing. Alternatively, you may want your Ph.D. students

Zhang, Donghui

311

Jiazzi: New-Age Components for Old-Fashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

this language, the structure of classes in a unit's imported and exported packages can be described using that are used to describe the visi- ble structure of classes in a Java package. In Figure 2, the package applet s describes an application with class Program. In the package signature the structure of a class

Flatt, Matthew

312

Jiazzi: NewAge Components for OldFashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

this language, the structure of classes in a unit's imported and exported packages can be described using that are used to describe the visi­ ble structure of classes in a Java package. In Figure 2, the package applet s describes an application with class Program. In the package signature the structure of a class

Utah, University of

313

A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James M. Russell a  

E-Print Network (OSTI)

A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James of Mining and Petroleum Engineering, Institut Teknologi Bandung, Bandung 40132, Indonesia d Department Available online Keywords: Drought Indonesia Indo-Pacific Warm Pool El Niño-Southern Oscillation Little Ice

Vuille, Mathias

314

Fluid transport properties and estimation of overpressure at the Lusi mud volcano, East Java Basin (Tanikawa et al., 2010)  

E-Print Network (OSTI)

Java Basin (Tanikawa et al., 2010) Richard Daviesa, , Michael Mangab , Mark Tingayc , Richard was caused by drilling of the Banjar Panji 1 gas exploration well (Davies et al., 2007; Manga, 2007; Davies et al., 2008; Tingay et al., 2008) or due to the Yogyakarta earthquake that occurred at 05:54 am

Manga, Michael

315

Control of binary distillation column using fuzzy PI controllers  

Science Conference Proceedings (OSTI)

In this paper the automatic control of a binary distillation column is described. This control is done with fuzzy logic controllers. After a short explanation of the function and dynamic of a binary distillation column, it's operating and control strategies ... Keywords: binary distillation column, fuzzy inference system, simulation

Shahram Javadi; Jabber Hosseini

2009-08-01T23:59:59.000Z

316

Accretion Processes in BlackHole Binaries  

E-Print Network (OSTI)

Accretion Processes in Black­Hole Binaries Roberto Soria A thesis submitted for the degree presented in ``Measuring the Mass of the Black Hole in GRO J1655\\Gamma40'', Soria, R., Wickramasinghe, D. T processes in black­hole bina­ ries, theoretically and observationally, focussing on the role of outflows

Soria, Roberto

317

Improving the efficiency of binary cycles  

SciTech Connect

The performance of binary geothermal power plants can be improved through the proper choice of a working fluid, and optimization of component designs and operating conditions. This paper summarizes the investigations at the Idaho National Engineering Laboratory (INEL) which are examining binary cycle performance improvements for moderate temperature (350 to 400 F) resources. These investigations examine performance improvements resulting from the supercritical vaporization and countercurrent integral condensation of mixed hydrocarbon working fluids, as well as the modification of the turbine inlet state points to achieve supersaturated turbine vapor expansions. For resources, with the brine outlet temperature restricted, the use of turbine exhaust recuperators is examined. The reference plant used to determine improvements in plant performance in these studies operates at conditions similar to the 45 MW Heber binary plant. The brine effectiveness (watt-hours per pound of brine) is used as an indicator for improvements in performance. The performance of the binary cycle can be improved by 25 to 30% relative to the reference plant through the selection of the optimum working fluids and operating conditions, achieving countercurrent integral condensation, and allowing supersaturated vapor expansions in the turbine. 9 refs., 5 figs.

Mines, G.L.; Bliem, C.J.

1988-01-01T23:59:59.000Z

318

CSP for binary conservative relational structures  

E-Print Network (OSTI)

We prove that whenever A is a 3-conservative relational structure with only binary and unary relations then the algebra of polymorphisms of A either has no Taylor operation (i.e. CSP(A) is NP-complete), or generates a congruence meet semidistributive variety (i.e. CSP(A) has bounded width).

Kazda, Alexandr

2011-01-01T23:59:59.000Z

319

Modeling Flows Around Merging Black Hole Binaries  

E-Print Network (OSTI)

Coalescing massive black hole binaries are produced by the mergers of galaxies. The final stages of the black hole coalescence produce strong gravitational radiation that can be detected by the space-borne LISA. In cases where the black hole merger takes place in the presence of gas and magnetic fields, various types of electromagnetic signals may also be produced. Modeling such electromagnetic counterparts of the final merger requires evolving the behavior of both gas and fields in the strong-field regions around the black holes. We have taken a step towards solving this problem by mapping the flow of pressureless matter in the dynamic, 3-D general relativistic spacetime around the merging black holes. We find qualitative differences in collision and outflow speeds, including a signature of the merger when the net angular momentum of the matter is low, between the results from single and binary black holes, and between nonrotating and rotating holes in binaries. If future magnetohydrodynamic results confirm these differences, it may allow assessment of the properties of the binaries as well as yielding an identifiable electromagnetic counterpart to the attendant gravitational wave signal.

James R. van Meter; John H. Wise; M. Coleman Miller; Christopher S. Reynolds; Joan M. Centrella; John G. Baker; William D. Boggs; Bernard J. Kelly; Sean T. McWilliams

2009-07-31T23:59:59.000Z

320

Binary power multiplier for electromagnetic energy  

DOE Patents (OSTI)

A technique for converting electromagnetic pulses to higher power amplitude and shorter duration, in binary multiples, splits an input pulse into two channels, and subjects the pulses in the two channels to a number of binary pulse compression operations. Each pulse compression operation entails combining the pulses in both input channels and selectively steering the combined power to one output channel during the leading half of the pulses and to the other output channel during the trailing half of the pulses, and then delaying the pulse in the first output channel by an amount equal to half the initial pulse duration. Apparatus for carrying out each of the binary multiplication operation preferably includes a four-port coupler (such as a 3 dB hybrid), which operates on power inputs at a pair of input ports by directing the combined power to either of a pair of output ports, depending on the relative phase of the inputs. Therefore, by appropriately phase coding the pulses prior to any of the pulse compression stages, the entire pulse compression (with associated binary power multiplication) can be carried out solely with passive elements.

Farkas, Zoltan D. (203 Leland Ave., Menlo Park, CA 94025)

1988-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Using binary search on a linked list  

Science Conference Proceedings (OSTI)

In this article a variation of binary search applicable to a linked list structure is examined. There are no additional data structure properties imposed on the list; that is the list may be singly or multiply linked, but it is not required that the ...

Firooz Khosraviyani

1990-08-01T23:59:59.000Z

322

On binary Kloosterman sums divisible by 3  

Science Conference Proceedings (OSTI)

By counting the coset leaders for cosets of weight 3 of the Melas code we give a new proof for the characterization of Kloosterman sums divisible by 3 for Keywords: 11L05, 11T71, 94B15, Binary Kloosterman sum, Cap, Melas code, Nonlinear function

Kseniya Garaschuk; Petr Lison?k

2008-12-01T23:59:59.000Z

323

Session 9: Heber Geothermal Binary Demonstration Project  

DOE Green Energy (OSTI)

The Heber Binary Project had its beginning in studies performed for the Electric Power Research Institute (EPRI), which identified the need for commercial scale (50 Mw or larger) demonstration of the binary cycle technology. In late 1980, SDG&E and the Department of Energy (DOE) signed a Cooperative Agreement calling for DOE to share in 50 percent of the Project costs. Similarly, SDG&E signed Project participation agreements with EPRI, the Imperial Irrigation District, California Department of Water Resources, and Southern California Edison Company, which provided the remaining 50 percent of the required funding. In 1982, the State of California also joined the Project. The objectives of the Heber Binary Project are to demonstrate the potential of moderate-temperature (below 410 F) geothermal energy to produce economic electric power with binary cycle conversion technology, and to establish schedule, cost and equipment performance, reservoir performance, and the environmental acceptability of such plants. The plant will be the first large-scale power generating facility in the world utilizing the binary conversion process, and it is expected that information resulting from this Project will be applicable to a wide range of moderate-temperature hydrothermal reservoirs, which represent 80 percent of geothermal resources in the United States. To accomplish the plant engineering, design, and equipment procurement, SDG&E has hired Fluor Engineers, Inc., Power Division, of Irvine, California. In early 1982, SDG&E contracted for construction management services with Dravo Constructors, Inc. (DCI) of New York. DCI is responsible for casting the Fluor design into construction packages, letting the construction contracts, and overseeing the construction in the field.

Allen, Richard F.; Nelson, Tiffany T.

1983-12-01T23:59:59.000Z

324

LinguisticBelief: a java application for linguistic evaluation using belief, fuzzy sets, and approximate reasoning.  

Science Conference Proceedings (OSTI)

LinguisticBelief is a Java computer code that evaluates combinations of linguistic variables using an approximate reasoning rule base. Each variable is comprised of fuzzy sets, and a rule base describes the reasoning on combinations of variables fuzzy sets. Uncertainty is considered and propagated through the rule base using the belief/plausibility measure. The mathematics of fuzzy sets, approximate reasoning, and belief/ plausibility are complex. Without an automated tool, this complexity precludes their application to all but the simplest of problems. LinguisticBelief automates the use of these techniques, allowing complex problems to be evaluated easily. LinguisticBelief can be used free of charge on any Windows XP machine. This report documents the use and structure of the LinguisticBelief code, and the deployment package for installation client machines.

Darby, John L.

2007-03-01T23:59:59.000Z

325

Java Tool Framework for Automation of Hardware Commissioning and Maintenance Procedures  

Science Conference Proceedings (OSTI)

The National Ignition Facility (NIF) is a 192-beam laser system designed to study high energy density physics. Each beam line contains a variety of line replaceable units (LRUs) that contain optics, stepping motors, sensors and other devices to control and diagnose the laser. During commissioning and subsequent maintenance of the laser, LRUs undergo a qualification process using the Integrated Computer Control System (ICCS) to verify and calibrate the equipment. The commissioning processes are both repetitive and tedious when we use remote manual computer controls, making them ideal candidates for software automation. Maintenance and Commissioning Tool (MCT) software was developed to improve the efficiency of the qualification process. The tools are implemented in Java, leveraging ICCS services and CORBA to communicate with the control devices. The framework provides easy-to-use mechanisms for handling configuration data, task execution, task progress reporting, and generation of commissioning test reports. The tool framework design and application examples will be discussed.

Ho, J C; Fisher, J M; Gordon, J B; Lagin, L J; West, S L

2007-10-02T23:59:59.000Z

326

A distributed hard real-time Java system for high mobility components  

E-Print Network (OSTI)

In this work we propose a methodology for providing real-time capabilities to component-based, on-the-fly recon?gurable, distributed systems. In such systems, software components migrate across computational resources at run-time to allow applications to adapt to changes in user requirements or to external events. We describe how we achieve run-time recon?guration in distributed Java applications by appropriately migrating servers. Guaranteed-rate schedulers at the servers provide the necessary temporal protection and so simplify remote method invocation management. We describe how we manage overhead and resource utilization by controlling the parameters of the server schedulers. According to our measurements, this methodology provides real-time capability to component-based recon?gurable distributed systems in an effcient and effective way. In addition, we propose a new resource discovery protocol, REALTOR, which is based on a combination of pull-based and push-based resource information dissemination. REALTOR has been designed for real-time component-based distributed applications in very dynamic or adverse environments. REALTOR supports survivability and information assurance by allowing the migration of components to safe locations under emergencies suchas externalattack, malfunction, or lackofresources. Simulation studies show that under normal and heavy load conditions REALTOR remains very effective in finding available resources, and does so with a reasonably low communication overhead.REALTOR 1)effectively locates resources under highly dynamic conditions, 2) has an overhead that is system-size independent, and 3) works well in highlyadverse environments.We evaluate the effectiveness of a REALTOR implementation as part of Agile Objects, an infrastructure for real-time capable, highly mobile Java components.

Rho, Sangig

2004-12-01T23:59:59.000Z

327

GRAVITY DARKENING AND BRIGHTENING IN BINARIES  

SciTech Connect

We apply a von Zeipel gravity darkening model to corotating binaries to obtain a simple, analytical expression for the emergent radiative flux from a tidally distorted primary orbiting a point-mass secondary. We adopt a simple Roche model to determine the envelope structure of the primary, assumed massive and centrally condensed, and use the results to calculate the flux. As for single rotating stars, gravity darkening reduces the flux along the stellar equator of the primary, but, unlike for rotating stars, we find that gravity brightening enhances the flux in a region around the stellar poles. We identify a critical limiting separation beyond which hydrostatic equilibrium no longer is possible, whereby the flux vanishes at the point on the stellar equator of the primary facing the companion. For equal-mass binaries, the total luminosity is reduced by about 13% when this limiting separation is reached.

White, Helen E.; Baumgarte, Thomas W. [Department of Physics and Astronomy, Bowdoin College, Brunswick, ME 04011 (United States); Shapiro, Stuart L. [Department of Physics, University of Illinois at Urbana-Champaign, Urbana, IL 61801 (United States)

2012-06-20T23:59:59.000Z

328

Automated pupil remapping with binary optics  

DOE Patents (OSTI)

Methods and apparatuses for pupil remapping employing non-standard lenslet shapes in arrays; divergence of lenslet focal spots from on-axis arrangements; use of lenslet arrays to resize two-dimensional inputs to the array; and use of lenslet arrays to map an aperture shape to a different detector shape. Applications include wavefront sensing, astronomical applications, optical interconnects, keylocks, and other binary optics and diffractive optics applications.

Neal, Daniel R. (Tijeras, NM); Mansell, Justin (Albuquerque, NM)

1999-01-01T23:59:59.000Z

329

ORBITAL EVOLUTION OF COMPACT WHITE DWARF BINARIES  

SciTech Connect

The newfound prevalence of extremely low mass (ELM, M{sub He} < 0.2 M{sub Sun }) helium white dwarfs (WDs) in tight binaries with more massive WDs has raised our interest in understanding the nature of their mass transfer. Possessing small (M{sub env} {approx} 10{sup -3} M{sub Sun }) but thick hydrogen envelopes, these objects have larger radii than cold WDs and so initiate mass transfer of H-rich material at orbital periods of 6-10 minutes. Building on the original work of D'Antona et al., we confirm the 10{sup 6} yr period of continued inspiral with mass transfer of H-rich matter and highlight the fact that the inspiraling direct-impact double WD binary HM Cancri likely has an ELM WD donor. The ELM WDs have less of a radius expansion under mass loss, thus enabling a larger range of donor masses that can stably transfer matter and become a He mass transferring AM CVn binary. Even once in the long-lived AM CVn mass transferring stage, these He WDs have larger radii due to their higher entropy from the prolonged H-burning stage.

Kaplan, David L. [Physics Department, University of Wisconsin-Milwaukee, Milwaukee, WI 53211 (United States); Bildsten, Lars [Kavli Institute for Theoretical Physics and Department of Physics, Kohn Hall, University of California, Santa Barbara, CA 93106 (United States); Steinfadt, Justin D. R., E-mail: kaplan@uwm.edu, E-mail: bildsten@kitp.ucsb.edu, E-mail: jdrsteinfadt@gmail.com [Department of Physics, Broida Hall, University of California, Santa Barbara, CA 93106 (United States)

2012-10-10T23:59:59.000Z

330

One dimensional P wave velocity structure of the crust beneath west Java and accurate hypocentre locations from local earthquake inversion  

SciTech Connect

A one-dimensional (1-D) velocity model and station corrections for the West Java zone were computed by inverting P-wave arrival times recorded on a local seismic network of 14 stations. A total of 61 local events with a minimum of 6 P-phases, rms 0.56 s and a maximum gap of 299 Degree-Sign were selected. Comparison with previous earthquake locations shows an improvement for the relocated earthquakes. Tests were carried out to verify the robustness of inversion results in order to corroborate the conclusions drawn out from our reasearch. The obtained minimum 1-D velocity model can be used to improve routine earthquake locations and represents a further step toward more detailed seismotectonic studies in this area of West Java.

Supardiyono; Santosa, Bagus Jaya [Physics Department, Faculty of Mathematics and Natural Sciences, State University of Surabaya, Surabaya (Indonesia) and Physics Department, Faculty of Mathematics and Natural Sciences, Sepuluh Nopember Institute of Technology, Surabaya (Indonesia); Physics Department, Faculty of Mathematics and Natural Sciences, Sepuluh Nopember Institute of Technology, Surabaya (Indonesia)

2012-06-20T23:59:59.000Z

331

Candidate spectroscopic binaries in the Sloan Digital Sky Survey  

E-Print Network (OSTI)

We have examined the radial velocity data for stars spectroscopically observed by the Sloan Digital Sky Survey (SDSS) more than once to investigate the incidence of spectroscopic binaries, and to evaluate the accuracy of the SDSS stellar radial velocities. We find agreement between the fraction of stars with significant velocity variations and the expected fraction of binary stars in the halo and thick disk populations. The observations produce a list of 675 possible new spectroscopic binary stars and orbits for eight of them.

D. Pourbaix; G. R. Knapp; P. Szkody; Z. Ivezic; S. J. Kleinman; D. Long; S. A. Snedden; A. Nitta; M. Harvanek; J. Krzesinski; H. J. Brewington; J. C. Barentine; E. H. Neilsen; J. Brinkman

2005-08-29T23:59:59.000Z

332

Candidate spectroscopic binaries in the Sloan Digital Sky Survey  

E-Print Network (OSTI)

We have examined the radial velocity data for stars spectroscopically observed by the Sloan Digital Sky Survey (SDSS) more than once to investigate the incidence of spectroscopic binaries, and to evaluate the accuracy of the SDSS stellar radial velocities. We find agreement between the fraction of stars with significant velocity variations and the expected fraction of binary stars in the halo and thick disk populations. The observations produce a list of 675 possible new spectroscopic binary stars and orbits for eight of them.

Pourbaix, D; Szkody, P; Ivezic, Z; Kleinman, S J; Long, D; Snedden, S A; Nitta, A; Harvanek, M; Krzesínski, J; Brewington, H J; Barentine, J C; Neilsen, E H; Brinkmann, J

2005-01-01T23:59:59.000Z

333

Structural Competition and Phase Transformations in Binary Ti-Nb ...  

Science Conference Proceedings (OSTI)

Structural Competition and Phase Transformations in Binary Ti-Nb Alloys for Biomedical Applications · Structure and Fracture Resistance of Armored Fish Scales.

334

Binary Equilibrium Phase Diagrams and the Third Law of ...  

Science Conference Proceedings (OSTI)

I will make suggestions of probable configurations of binary phase diagrams at low temperatures. This leads to an expansion of the concept of “improbable ...

335

Excess volumes and excess viscosities of binary mixtures of 1 ...  

Science Conference Proceedings (OSTI)

Excess volumes V E, excess viscosities 1/E, and excess free energies of activation ... KEY WORDS: activation energy; binary mixtures; free energy; l-

336

A Molecular-Thermodynamic Lattice Model for Binary Mixtures  

E-Print Network (OSTI)

A Molecular-Thermodynamic Lattice Model for Binary Mixtures*was much interest in the thermodynamic properties of binarythat end, we use the thermodynamic perturbation method,

Qin, Yuan; Prausnitz, John M.

2005-01-01T23:59:59.000Z

337

Mining Truth Tables and Straddling Biclusters in Binary Datasets.  

E-Print Network (OSTI)

??As the world swims deeper into a deluge of data, binary datasets relating objects to properties can be found in many different fields. Such datasets… (more)

Owens, Clifford Conley

2010-01-01T23:59:59.000Z

338

Stochastic binary problems with simple penalties for capacity ...  

E-Print Network (OSTI)

Mar 24, 2009 ... Abstract: This paper studies stochastic programs with first-stage binary variables and capacity constraints, using simple penalties for capacities ...

339

DESTRUCTION OF BINARY MINOR PLANETS DURING NEPTUNE SCATTERING  

Science Conference Proceedings (OSTI)

The existence of extremely wide binaries in the low-inclination component of the Kuiper Belt provides a unique handle on the dynamical history of this population. Some popular frameworks of the formation of the Kuiper Belt suggest that planetesimals were moved there from lower semimajor axis orbits by scattering encounters with Neptune. We test the effects such events would have on binary systems and find that wide binaries are efficiently destroyed by the kinds of scattering events required to create the Kuiper Belt with this mechanism. This indicates that a binary-bearing component of the cold Kuiper Belt was emplaced through a gentler mechanism or was formed in situ.

Parker, Alex H. [Department of Astronomy, University of Victoria, BC (Canada); Kavelaars, J. J., E-mail: alexhp@uvic.c [Herzberg Institute of Astrophysics, National Research Council of Canada (Canada)

2010-10-20T23:59:59.000Z

340

StrBioLib: a Java library for development of custom computationalstructural biology applications  

SciTech Connect

Summary: StrBioLib is a library of Java classes useful fordeveloping software for computational structural biology research.StrBioLib contains classes to represent and manipulate proteinstructures, biopolymer sequences, sets of biopolymer sequences, andalignments between biopolymers based on either sequence or structure.Interfaces are provided to interact with commonly used bioinformaticsapplications, including (PSI)-BLAST, MODELLER, MUSCLE, and Primer3, andtools are provided to read and write many file formats used to representbioinformatic data. The library includes a general-purpose neural networkobject with multiple training algorithms, the Hooke and Jeeves nonlinearoptimization algorithm, and tools for efficient C-style string parsingand formatting. StrBioLib is the basis for the Pred2ary secondarystructure prediction program, is used to build the ASTRAL compendium forsequence and structure analysis, and has been extensively tested throughuse in many smaller projects. Examples and documentation are available atthe site below.Availability: StrBioLib may be obtained under the terms ofthe GNU LGPL license from http://strbio.sourceforge.net/Contact:JMChandonia@lbl.gov

Chandonia, John-Marc

2007-05-14T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Chemical Weathering of New Pyroclastic Deposits from Mt. Merapi (Java), Indonesia  

SciTech Connect

Java Island, Indonesia with abundant amount of pyroclastic deposits is located in the very active and dynamic Pacific Ring of Fires. Studying the geochemical weathering indices of these pyroclastic deposits is important to get a clear picture about weathering profiles on deposits resulting from the eruption of Mt. Merapi. Immediately after the first phase of the eruption (March to June 2006), moist and leached pyroclastic deposits were collected. These pyroclastic deposits were found to be composed of volcanic glass, plagioclase feldspar in various proportions, orthopyroxene, clinopyroxene, olivine, amphibole, and titanomagnetite. Total elemental composition of the bulk samples (including trace elements and heavy metals) were determined by wet chemical methods and X-ray fluorescence (XRF) analyses. Weathering of the pyroclastic deposits was studied using various weathering indices. The Ruxton ratio, weathering index of Parker, Vought resudual index and chemical index of weathering of moist pyroclastic are lower than the leached sample but the alteration indices (chemical and plagioclase) are slightly higher in the moist compared to the leached pyroclastic deposits.

Fiantis, Dian; Nelson, Malik; Van Ranst, Eric; Shamshudin, Josup; Qafoku, Nikolla

2009-09-01T23:59:59.000Z

342

A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode  

E-Print Network (OSTI)

We propose a light-weight approach for certification of monitor inlining for sequential Java bytecode using proof-carrying code. The goal is to enable the use of monitoring for quality assurance at development time, while minimizing the need for post-shipping code rewrites as well as changes to the end-host TCB. Standard automaton-based security policies express constraints on allowed API call/return sequences. Proofs are represented as JML-style program annotations. This is adequate in our case as all proofs generated in our framework are recognized in time polynomial in the size of the program. Policy adherence is proved by comparing the transitions of an inlined monitor with those of a trusted "ghost" monitor represented using JML-style annotations. At time of receiving a program with proof annotations, it is sufficient for the receiver to plug in its own trusted ghost monitor and check the resulting verification conditions, to verify that inlining has been performed correctly, of the correct policy. We ha...

Dam, Mads

2010-01-01T23:59:59.000Z

343

DYNAMICAL CAPTURE BINARY NEUTRON STAR MERGERS  

SciTech Connect

We study dynamical capture binary neutron star mergers as may arise in dense stellar regions such as globular clusters. Using general-relativistic hydrodynamics, we find that these mergers can result in the prompt collapse to a black hole or in the formation of a hypermassive neutron star, depending not only on the neutron star equation of state but also on impact parameter. We also find that these mergers can produce accretion disks of up to a tenth of a solar mass and unbound ejected material of up to a few percent of a solar mass. We comment on the gravitational radiation and electromagnetic transients that these sources may produce.

East, William E.; Pretorius, Frans [Department of Physics, Princeton University, Princeton, NJ 08544 (United States)

2012-11-20T23:59:59.000Z

344

Thermodynamics of magnetized binary compact objects  

Science Conference Proceedings (OSTI)

Binary systems of compact objects with electromagnetic field are modeled by helically symmetric Einstein-Maxwell spacetimes with charged and magnetized perfect fluids. Previously derived thermodynamic laws for helically symmetric perfect-fluid spacetimes are extended to include the electromagnetic fields, and electric currents and charges; the first law is written as a relation between the change in the asymptotic Noether charge {delta}Q and the changes in the area and electric charge of black holes, and in the vorticity, baryon rest mass, entropy, charge and magnetic flux of the magnetized fluid. Using the conservation laws of the circulation of magnetized flow found by Bekenstein and Oron for the ideal magnetohydrodynamic fluid, and also for the flow with zero conducting current, we show that, for nearby equilibria that conserve the quantities mentioned above, the relation {delta}Q=0 is satisfied. We also discuss a formulation for computing numerical solutions of magnetized binary compact objects in equilibrium with emphasis on a first integral of the ideal magnetohydrodynamic-Euler equation.

Uryu, Koji [Department of Physics, University of the Ryukyus, Senbaru, Nishihara, Okinawa 903-0213 (Japan); Gourgoulhon, Eric [Laboratoire Univers et Theories, UMR 8102 du CNRS, Observatoire de Paris, Universite Paris Diderot, F-92190 Meudon (France); Markakis, Charalampos [Department of Physics, University of Wisconsin-Milwaukee, Post Office Box 413, Milwaukee, Wisconsin 53201 (United States)

2010-11-15T23:59:59.000Z

345

TIDAL INTERACTIONS IN MERGING WHITE DWARF BINARIES  

SciTech Connect

The recently discovered system J0651 is the tightest known detached white dwarf (WD) binary. Since it has not yet initiated Roche-lobe overflow, it provides a relatively clean environment for testing our understanding of tidal interactions. I investigate the tidal heating of each WD, parameterized in terms of its tidal Q parameter. Assuming that the heating can be radiated efficiently, the current luminosities are consistent with Q {sub 1} {approx} 7 x 10{sup 10} and Q {sub 2} {approx} 2 x 10{sup 7}, for the He and C/O WDs, respectively. Conversely, if the observed luminosities are merely from the cooling of the WDs, these estimated values of Q represent the upper limits. A large Q {sub 1} for the He WD means its spin velocity will be slower than that expected if it was tidally locked, which, since the binary is eclipsing, may be measurable via the Rossiter-McLaughlin effect. After one year, gravitational wave emission shifts the time of eclipses by 5.5 s, but tidal interactions cause the orbit to shrink more rapidly, changing the time by up to an additional 0.3 s after a year. Future eclipse timing measurements may therefore infer the degree of tidal locking.

Piro, Anthony L., E-mail: piro@caltech.edu [Theoretical Astrophysics, California Institute of Technology, 1200 East California Boulevard, M/C 350-17, Pasadena, CA 91125 (United States)

2011-10-20T23:59:59.000Z

346

Binary self-dual codes with automorphisms of order 23  

Science Conference Proceedings (OSTI)

The only example of a binary doubly-even self-dual [120,60,20] code was found in 2005 by Gaborit et al. (IEEE Trans Inform theory 51, 402---407 2005). In this work we present 25 new binary doubly-even self-dual [120,60,20] ... Keywords: 94B05, Algorithms, Automorphisms, Self-dual codes

Radinka Yorgova; Alfred Wassermann

2008-08-01T23:59:59.000Z

347

Identification of Wiener systems with binary-valued output observations  

Science Conference Proceedings (OSTI)

This work is concerned with identification of Wiener systems whose outputs are measured by binary-valued sensors. The system consists of a linear FIR (finite impulse response) subsystem of known order, followed by a nonlinear function with a known parametrization ... Keywords: Binary-valued observations, Identification, Joint identifiability, Parameter estimation, Periodic inputs, Sensor thresholds, Wiener systems

Yanlong Zhao; Le Yi Wang; G. George Yin; Ji-Feng Zhang

2007-10-01T23:59:59.000Z

348

Modelling light curves of binary systems: accounting for extended winds  

E-Print Network (OSTI)

We suggest a simple synthesis model of an eclipsing binary system which includes one component with strong stellar wind. Numerical simulations show that the shape of the light curve (and in particularly the widths of the minima) strongly depends on wind parameters. Wind effects are crucial in modelling light curves of binaries including e.g., WR stars.

Antokhina, E A; Cherepashchuk, A M

2013-01-01T23:59:59.000Z

349

Information---Theoretic Multiclass Classification Based on Binary Classifiers  

Science Conference Proceedings (OSTI)

In this paper, we consider the multiclass classification problem based on sets of independent binary classifiers. Each binary classifier represents the output of a quantized projection of training data onto a randomly generated orthonormal basis vector ... Keywords: Classification, Coding matrix design, Complexity, Maximum number of classes, Reliability

Sviatoslav Voloshynovskiy; Oleksiy Koval; Fokko Beekhof; Taras Holotyak

2011-12-01T23:59:59.000Z

350

Layered Binary-Dielectrics for Energy Applications: Limitations and Potentials  

Science Conference Proceedings (OSTI)

In this Letter, an attempt is made to illustrate how performance of an electrically insulating material, a dielectric, can be improved by constructing a layered binary-dielectric structure that employs a weak insulator with high dielectric permittivity. It is shown that layered binary-dielectrics could have a signicant impact on energy storage and electrical insulation.

Tuncer, Enis [ORNL

2012-01-01T23:59:59.000Z

351

A Flashing Binary Combined Cycle For Geothermal Power Generation | Open  

Open Energy Info (EERE)

Flashing Binary Combined Cycle For Geothermal Power Generation Flashing Binary Combined Cycle For Geothermal Power Generation Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A Flashing Binary Combined Cycle For Geothermal Power Generation Details Activities (0) Areas (0) Regions (0) Abstract: The performance of a flashing binary combined cycle for geothermal power generation is analysed. It is proposed to utilize hot residual brine from the separator in flashing-type plants to run a binary cycle, thereby producing incremental power. Parametric variations were carried out to determine the optimum performance of the combined cycle. Comparative evaluation with the simple flashing plant was made to assess its thermodynamic potential and economic viability. Results of the analyses indicate that the combined cycle can generate 13-28% more power than the

352

Pages that link to "A Flashing Binary Combined Cycle For Geothermal...  

Open Energy Info (EERE)

Twitter icon Pages that link to "A Flashing Binary Combined Cycle For Geothermal Power Generation" A Flashing Binary Combined Cycle For Geothermal Power Generation...

353

Celestijnenlaan 200A – B-3001 Heverlee (Belgium) Verification of data-race-freedom of a Java chat server with VeriFast  

E-Print Network (OSTI)

Even now, when computers have become a vital part of our society, software errors are still common, and their effects can be devastating. From the recent rise of multicores emerged the need for multi-threading software and a way to cope with its typical software errors such as data-races and deadlocks. This paper shows how Veri-Fast can be used to verify the data-race-freedom of a multi-threaded Java application, by means of a simple Java chat server example. We will cover the verification of jar files in general, how to deal with Java core classes and interfaces such as ArrayList and the specifics of verifying a multi-threaded Java application, using Thread, Runnable and Semaphore as building blocks. To achieve this, we need to take a closer look at VeriFast elements such as predicate families, predicate constructors and fractional permissions. This paper is intended as an experience report. We will conclude with some suggested improvements and possible future work. Verification of data-race-freedom of a Java chat server with

Cedric Cuypers; Bart Jacobs; Frank Piessens; Cedric Cuypers; Bart Jacobs; Frank Piessens; Cedric Cuypers; Bart Jacobs; Frank Piessens

2009-01-01T23:59:59.000Z

354

Estimation of binary Markov random fields  

E-Print Network (OSTI)

The theoryand practiceof estimationof binary Markov random fields on lattices is reviewedand advanced. The natural objects of inference are the local conditionaldistributions, which define an exponential family owing to the equivalence between Markov and Gibbs random fields. Maximumlikelihoodestimation generally is impracticable. Methods of asymptotic, or otherwise approximate, maximum likelihood estimation do not easily apply in all cases likely to be of practical interest. The only generallypracticableprocedures available thus far are the Coding Method and MaximumPseudo-Likelihood. A new estimation procedure is suggestedthat is strongly consistentfor processesdefined by translation-invariant families of local conditionaldistributions. The procedure is analogous to minimum logit chi-squareestimation in logistic regression, does not involve non-linearoptimization, and decisively beats Maximum Pseudo-Likelihood in mean squarederror. Subsarnpling techniques can be employed to assess precision,and to increase efficiency, in estimation.

Antonio Possolo; Anond Possolo

1986-01-01T23:59:59.000Z

355

High-energy emission from pulsar binaries  

E-Print Network (OSTI)

Unpulsed, high-energy emission from pulsar binaries can be attributed to the interaction of a pulsar wind with that of a companion star. At the shock between the outflows, particles carried away from the pulsar magnetosphere are accelerated and radiate both in synchrotron and inverse Compton processes. This emission constitutes a significant fraction of the pulsar spin-down luminosity. It is not clear however, how the highly magnetized pulsar wind could convert its mainly electromagnetic energy into the particles with such high efficiency. Here we investigate a scenario in which a pulsar striped wind converts into a strong electromagnetic wave before reaching the shock. This mode can be thought of as a shock precursor that is able to accelerate particles to ultrarelativistic energies at the expense of the electromagnetic energy it carries. Radiation of the particles leads to damping of the wave. The efficiency of this process depends on the physical conditions imposed by the external medium. Two regimes can b...

Mochol, Iwona

2013-01-01T23:59:59.000Z

356

Binary hyper-redundant robotic manipulator concept  

E-Print Network (OSTI)

Continuously actuated robotic manipulators are the most common type of manipulators even though they require sophisticated and expensive control and sensor systems to function with high accuracy and repeatability. Binary hyper-redundant (Bi-HR) robotic manipulators are potential candidates to be used in applications where high repeatability and reasonable accuracy are required. Such applications include pick-and-place, spot welding and assistants to people with disabilities. Generally, the Bi-HR manipulator is relatively inexpensive, lightweight, and has a high payload to arm weight ratio. This paper discusses a concept of Bi-HR manipulator, influencing concepts to the Bi-HR, examples of applications, and its advantages and disadvantages. 1.

Jackrit Suthakorn

2004-01-01T23:59:59.000Z

357

Extracting the three- and four-graviton vertices from binary pulsars and coalescing binaries  

E-Print Network (OSTI)

Using a formulation of the post-Newtonian expansion in terms of Feynman graphs, we discuss how various tests of General Relativity (GR) can be translated into measurement of the three- and four-graviton vertices. In problems involving only the conservative dynamics of a system, a deviation of the three-graviton vertex from the GR prediction is equivalent, to lowest order, to the introduction of the parameter beta_{PPN} in the parametrized post-Newtonian formalism, and its strongest bound comes from lunar laser ranging, which measures it at the 0.02% level. Deviation of the three-graviton vertex from the GR prediction, however, also affects the radiative sector of the theory. We show that the timing of the Hulse-Taylor binary pulsar provides a bound on the deviation of the three-graviton vertex from the GR prediction at the 0.1% level. For coalescing binaries at interferometers we find that, because of degeneracies with other parameters in the template such as mass and spin, the effects of modified three- and four-graviton vertices is just to induce an error in the determination of these parameters and, at least in the restricted PN approximation, it is not possible to use coalescing binaries for constraining deviations of the vertices from the GR prediction.

Umberto Cannella; Stefano Foffa; Michele Maggiore; Hillary Sanctuary; Riccardo Sturani

2009-07-13T23:59:59.000Z

358

Equilibrium, Stability and Orbital Evolution of Close Binary Systems  

E-Print Network (OSTI)

We present a new analytic study of the equilibrium and stability properties of close binary systems containing polytropic components. Our method is based on the use of ellipsoidal trial functions in an energy variational principle. We consider both synchronized and nonsynchronized systems, constructing the compressible generalizations of the classical Darwin and Darwin-Riemann configurations. Our method can be applied to a wide variety of binary models where the stellar masses, radii, spins, entropies, and polytropic indices are all allowed to vary over wide ranges and independently for each component. We find that both secular and dynamical instabilities can develop before a Roche limit or contact is reached along a sequence of models with decreasing binary separation. High incompressibility always makes a given binary system more susceptible to these instabilities, but the dependence on the mass ratio is more complicated. As simple applications, we construct models of double degenerate systems and of low-mass main-sequence-star binaries. We also discuss the orbital evolution of close binary systems under the combined influence of fluid viscosity and secular angular momentum losses from processes like gravitational radiation. We show that the existence of global fluid instabilities can have a profound effect on the terminal evolution of coalescing binaries. The validity of our analytic solutions is examined by means of detailed comparisons with the results of recent numerical fluid calculations in three dimensions.

D. Lai; F. A. Rasio; S. L. Shapiro

1993-07-22T23:59:59.000Z

359

Light and Life: Exotic Photosynthesis in Binary Star Systems  

E-Print Network (OSTI)

The potential for hosting photosynthetic life on Earth-like planets within binary/multiple stellar systems was evaluated by modelling the levels of photosynthetically active radiation (PAR) such planets receive. Combinations of M and G stars in: (i) close-binary systems; (ii) wide-binary systems and (iii) three-star systems were investigated and a range of stable radiation environments found to be possible. These environmental conditions allow for the possibility of familiar, but also more exotic forms of photosynthetic life, such as infrared photosynthesisers and organisms specialised for specific spectral niches.

O'Malley-James, J T; Cockell, C S; Greaves, J S

2011-01-01T23:59:59.000Z

360

THE ASTROPHYSICS OF ULTRA-COMPACT BINARIES A WHITE PAPER FOR THE ASTRO2010 DECADAL REVIEW  

E-Print Network (OSTI)

THE ASTROPHYSICS OF ULTRA-COMPACT BINARIES A WHITE PAPER FOR THE ASTRO2010 DECADAL REVIEW G interact- ing AM CVn stars, ultra-compact X-ray binaries, detached double white dwarfs, double neutron stars, white dwarf/neutron star binaries and as yet unobserved binaries such as black holes with neutron

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

THE DISPERSAL OF PROTOPLANETARY DISKS AROUND BINARY STARS  

SciTech Connect

I present models of disk evolution around young binary stars. I show that the primary factor in determining circumbinary disk lifetimes is the rate of disk photoevaporation. I also find that photoevaporative clearing leaves a signature on the distribution of circumbinary disk lifetimes, with a sharp increase in disk lifetimes for binary separations a {approx}< 0.3-1 AU. Observations of young binary stars can therefore be used to test models of disk evolution, and I show that current data set a strong upper limit to the rate of on-going photoevaporation (<10{sup -9} M{sub Sun} yr{sup -1}). Finally I discuss the implications of these results for planet formation and suggest that circumbinary planets around close (a {approx}< 1 AU) binaries should be relatively common.

Alexander, Richard, E-mail: richard.alexander@leicester.ac.uk [Department of Physics and Astronomy, University of Leicester, Leicester LE1 7RH (United Kingdom)

2012-10-01T23:59:59.000Z

362

Maximin D-optimal designs for binary longitudinal responses  

Science Conference Proceedings (OSTI)

Optimal design problems for logistic mixed effects models for binary longitudinal responses are considered. A function of the approximate information matrix under the framework of the Penalized Quasi Likelihood (PQL) and a generalized linear mixed model ...

Fetene B. Tekle; Frans E. S. Tan; Martijn P. F. Berger

2008-08-01T23:59:59.000Z

363

N-body integrators for planets in binary star systems  

E-Print Network (OSTI)

Symplectic integrators are the tool of choice for many researchers studying dynamical systems because of their good long-term energy conservation properties. For systems with a dominant central mass, symplectic integrators are also highly efficient. In this chapter, I describe the theory of symplectic integrators in terms of Lie series. I show how conventional symplectic algorithms have been adapted for use in binary-star systems to study problems such as the dynamical stability of multi-planet systems and the accretion of planets from planetesimals. This is achieved by devising new coordinate systems for the wide-binary and close-binary cases separately. I show how the performance of these algorithms can be improved at little extra cost using symplectic correctors. Finally, I discuss drawbacks of these algorithms, in particular in dealing with close encounters with one or both members of the binary, and the prospects for overcoming these problems.

Chambers, John E

2007-01-01T23:59:59.000Z

364

N-body integrators for planets in binary star systems  

E-Print Network (OSTI)

Symplectic integrators are the tool of choice for many researchers studying dynamical systems because of their good long-term energy conservation properties. For systems with a dominant central mass, symplectic integrators are also highly efficient. In this chapter, I describe the theory of symplectic integrators in terms of Lie series. I show how conventional symplectic algorithms have been adapted for use in binary-star systems to study problems such as the dynamical stability of multi-planet systems and the accretion of planets from planetesimals. This is achieved by devising new coordinate systems for the wide-binary and close-binary cases separately. I show how the performance of these algorithms can be improved at little extra cost using symplectic correctors. Finally, I discuss drawbacks of these algorithms, in particular in dealing with close encounters with one or both members of the binary, and the prospects for overcoming these problems.

John E. Chambers

2007-05-22T23:59:59.000Z

365

STAR HOPPERS: PLANET INSTABILITY AND CAPTURE IN EVOLVING BINARY SYSTEMS  

SciTech Connect

Many planets are observed in stellar binary systems, and their frequency may be comparable to that of planetary systems around single stars. Binary stellar evolution in such systems influences the dynamical evolution of the resident planets. Here, we study the evolution of a single planet orbiting one star in an evolving binary system. We find that stellar evolution can trigger dynamical instabilities that drive planets into chaotic orbits. This instability leads to planet-star collisions, exchange of the planet between the binary stars ('star hoppers'), and ejection of the planet from the system. The means by which planets can be recaptured is similar to the pull-down capture mechanism for irregular solar system satellites. Because planets often suffer close encounters with the primary on the asymptotic giant branch, captures during a collision with the stellar envelope are also possible for more massive planets. Such capture could populate the habitable zone around white dwarfs.

Kratter, Kaitlin M.; Perets, Hagai B. [Institute for Theory and Computation, Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States)

2012-07-01T23:59:59.000Z

366

Green's functions and hydrodynamics for isotopic binary diffusion  

E-Print Network (OSTI)

We study classical binary fluid mixtures in which densities vary on very short time (ps) and length (nm) scales, such that hydrodynamics does not apply. In a pure fluid with a localized heat pulse the breakdown of hydrodynamics was overcome using Green's functions which connect the initial densities to those at later times. Numerically it appeared that for long times the results from the Green's functions would approach hydrodynamics. In this paper we extend the Green's functions theory to binary mixtures. For the case of isothermal isobaric mutual diffusion in isotopic binary mixtures and ideal binary mixtures, which is easier to handle than heat conduction yet still non-trivial, we show analytically that in the Green's function approach one recovers hydrodynamic behaviour at long time scales provided the system reaches local equilibrium at long times. This is a first step toward giving the Green's function theory a firmer basis because it can for this case be considered as an extension of hydrodynamics.

R. van Zon; E. G. D. Cohen

2005-08-10T23:59:59.000Z

367

BinSlayer: accurate comparison of binary executables  

Science Conference Proceedings (OSTI)

As the volume of malware inexorably rises, comparison of binary code is of increasing importance to security analysts as a method of automatically classifying new malware samples; purportedly new examples of malware are frequently a simple evolution ...

Martial Bourquin; Andy King; Edward Robbins

2013-01-01T23:59:59.000Z

368

Modular Wellhead Binary Power System: Preliminary Design Results  

Science Conference Proceedings (OSTI)

To provide the utility industry with effective and flexible binary-cycle power plants, preliminary engineering analyses were conducted on a standardized design being developed for a modular wellhead binary-cycle power system. This design will use heat sources, such as geothermal or waste heat, in the 300-450 degrees F temperature range and will meet utility requirements for small geothermal resource capacity needs.

1990-09-13T23:59:59.000Z

369

DK And: Reclassification as EW Binary from CCD Observations  

E-Print Network (OSTI)

This paper describes the reclassification of DK And, formerly classified as a RRc type star, as EW binary. 1599 CCD unfiltered and filtered (V and R band) observations between 1999 and 2005 show, that the star is actually an eclipsing binary star with a period of P = 0.4892224 +/- 0.0000002 [d] with epoch E0 = 2451435.4353 +/- 0.0010 (if all historic data were taken into account). From our new observations 12 timings of minimum light are given.

F. -J. Hambsch; D. Husar

2006-07-26T23:59:59.000Z

370

Anisotropic mass ejection in binary mergers  

E-Print Network (OSTI)

We investigate the mass loss from a rotationally distorted envelope following the early, rapid in-spiral of a companion star inside a common envelope. For initially wide, massive binaries (M_1+M_2=20M_{\\odot}, P\\sim 10 yr), the primary has a convective envelope at the onset of mass transfer and is able to store much of the available orbital angular momentum in its expanded envelope. Three-dimensional smoothed particle hydrodynamics calculations show that mass loss is enhanced at mid-latitudes due to shock reflection from a torus-shaped outer envelope. Mass ejection in the equatorial plane is completely suppressed if the shock wave is too weak to penetrate the outer envelope in the equatorial direction (typically when the energy deposited in the star is less than about one-third of the binding energy of the envelope). We present a parameter study to show how the geometry of the ejecta depends on the angular momentum and the energy deposited in the envelope during a merging event. Applications to the nearly axisymmetric, but very non-spherical nebulae around SN1987A and Sheridan 25 are discussed, as well as possible links to RY Scuti and the Small Magellanic Cloud object R4.

T. Morris; Ph. Podsiadlowski

2005-02-15T23:59:59.000Z

371

Microlensing Binaries Discovered through High-Magnification Channel  

E-Print Network (OSTI)

Microlensing can provide a useful tool to probe binary distributions down to low-mass limits of binary companions. In this paper, we analyze the light curves of 8 binary lensing events detected through the channel of high-magnification events during the seasons from 2007 to 2010. The perturbations, which are confined near the peak of the light curves, can be easily distinguished from the central perturbations caused by planets. However, the degeneracy between close and wide binary solutions cannot be resolved with a 3 \\sigma confidence level for 3 events, implying that the degeneracy would be an important obstacle in studying binary distributions. From investigating the dependence of the degeneracy on the lensing parameters, we find that the degeneracy becomes severe as the binary separation and the mass ratio deviate from the values of resonant caustics. The measured mass ratio of the event OGLE-2008-BLG-510/MOA-2008-BLG-369 is q~0.1, making the companion of the lens a strong brown-dwarf candidate.

Shin, I -G; Park, S -Y; Han, C; Allen, W; Bos, M; Christie, G W; Depoy, D L; Dong, S; Drummond, J; Gal-Yam, A; Gaudi, B S; Gould, A; Hung, L -W; Janczak, J; Kaspi, S; Lee, C -U; Mallia, F; Maoz, D; Maury, A; McCormick, J; Monard, L A G; Moorhouse, D; Munoz, J A; Natusch, T; Nelson, C; Park, B -G; Pogge, R W; Polishook, D; Shvartzvald, Y; Shporer, A; Thornley, G; Yee, J C; Abe, F; Bennett, D P; Bond, I A; Botzler, C S; Fukui, A; Furusawa, K; Hayashi, F; Hearnshaw, J B; Hosaka, S; Itow, Y; Kamiya, K; Kilmartin, P M; Kobara, S; Korpela, A; Lin, W; Ling, C H; Makita, S; Masuda, K; Matsubara, Y; Miyake, N; Muraki, Y; Nagaya, M; Nishimoto, K; Ohnishi, K; Okumura, T; Omori, K; Perrott, Y C; Rattenbury, N; Saito, To; Skuljan, L; Sullivan, D J; Sumi, T; Suzuki, D; Sweatman, W L; Tristram, P J; Wada, K; Yock, P C M; Szymanski, M K; Kubiak, M; Pietrzynski, G; Soszynski, I; Szewczyk, O; Udalski, A; Ulaczyk, K; Wyrzykowski, L; Albrow, M D; Batista, V; Beaulieu, J -P; Brillant, S; Cassan, A; Cole, A; Corrales, E; Coutures, Ch; Dieters, S; Prester, D Dominis; Donatowicz, J; Fouque, P; Greenhill, J; Kane, S R; Menzies, J; Sahu, K C; Wambsganss, J; Williams, A; Zub, M; Allan, A; Bramich, D M; Browne, P; Dominik, M; Horne, K; Kains, N; Snodgrass, C; Steele, I; Street, R; Tsapras, Y; Bozza, V; Burgdorf, M J; Novati, S Calchi; Dreizler, S; Finet, F; Glitrup, M; Grundahl, F; Harpsoe, K; Hinse, T C; Hundertmark, M; Jorgensen, U G; Liebig, C; Maier, G; Mancini, L; Mathiasen, M; Rahvar, S; Ricci, D; Scarpetta, G; Skottfelt, J; Surdej, J; Southworth, J; Zimmer, F

2011-01-01T23:59:59.000Z

372

Diverse spreading behavior of binary polymer nanodroplets.  

SciTech Connect

Molecular dynamics simulations are used to study the spreading of binary polymer nanodroplets in a cylindrical geometry. The polymers, described by the bead-spring model, spread on a flat surface with a surface-coupled Langevin thermostat to mimic the effects of a corrugated surface. Each droplet consists of chains of length 10 or 100 monomers with {approx}350,000 monomers total. The qualitative features of the spreading dynamics are presented for differences in chain length, surface interaction strength, and composition. When the components of the droplet differ only in the surface interaction strength, the more strongly wetting component forms a monolayer film on the surface even when both materials are above or below the wetting transition. In the case where the only difference is the polymer chain length, the monolayer film beneath the droplet is composed of an equal amount of short chain and long chain monomers even when one component (the shorter chain length) is above the wetting transition and the other is not. The fraction of short and long chains in the precursor foot depends on whether both the short and the long chains are in the wetting regime. Diluting the concentration of the strongly wetting component in a mixture with a weakly wetting component decreases the rate of diffusion of the wetting material from the bulk to the surface and limits the spreading rate of the precursor foot, but the bulk spreading rate actually increases when both components are present. This may be due to the strongly wetting material pushing out the weakly wetting material as it moves toward the precursor foot.

Webb, Edmund Blackburn, III; Grest, Gary Stephen; Heine, David R.

2005-01-01T23:59:59.000Z

373

Thin shell morphology in the circumstellar medium of massive binaries  

E-Print Network (OSTI)

We investigate the morphology of the collision front between the stellar winds of binary components in two long-period binary systems, one consisting of a hydrogen rich Wolf-Rayet star (WNL) and an O-star and the other of a Luminous Blue Variable (LBV) and an O-star. Specifically, we follow the development and evolution of instabilities that form in such a shell, if it is sufficiently compressed, due to both the wind interaction and the orbital motion. We use MPI-AMRVAC to time-integrate the equations of hydrodynamics, combined with optically thin radiative cooling, on an adaptive mesh 3D grid. Using parameters for generic binary systems, we simulate the interaction between the winds of the two stars. The WNL+O star binary shows a typical example of an adiabatic wind collision. The resulting shell is thick and smooth, showing no instabilities. On the other hand, the shell created by the collision of the O star wind with the LBV wind, combined with the orbital motion of the binary components, is susceptible to...

van Marle, Allard Jan; Meliani, Zakaria

2010-01-01T23:59:59.000Z

374

DOUBLE-LINED SPECTROSCOPIC BINARY STARS IN THE RAVE SURVEY  

Science Conference Proceedings (OSTI)

We devise a new method for the detection of double-lined binary stars in a sample of the Radial Velocity Experiment (RAVE) survey spectra. The method is both tested against extensive simulations based on synthetic spectra and compared to direct visual inspection of all RAVE spectra. It is based on the properties and shape of the cross-correlation function, and is able to recover {approx}80% of all binaries with an orbital period of order 1 day. Systems with periods up to 1 yr are still within the detection reach. We have applied the method to 25,850 spectra of the RAVE second data release and found 123 double-lined binary candidates, only eight of which are already marked as binaries in the SIMBAD database. Among the candidates, there are seven that show spectral features consistent with the RS CVn type (solar type with active chromosphere) and seven that might be of W UMa type (over-contact binaries). One star, HD 101167, seems to be a triple system composed of three nearly identical G-type dwarfs. The tested classification method could also be applicable to the data of the upcoming Gaia mission.

Matijevic, G.; Zwitter, T. [Faculty of Mathematics and Physics, University of Ljubljana, Ljubljana (Slovenia); Munari, U.; Siviero, A. [INAF Osservatorio Astronomico di Padova, Asiago (Italy); Bienayme, O.; Siebert, A. [Observatorie de Strasbourg, Strasbourg (France); Binney, J. [Rudolf Pierls Center for Theoretical Physics, University of Oxford, Oxford (United Kingdom); Bland-Hawthorn, J. [Sydney Institute for Astronomy, School of Physics, University of Sydney, Sydney (Australia); Boeche, C.; Steinmetz, M. [Astrophysikalisches Institut Potsdam, Potsdam (Germany); Campbell, R. [Western Kentucky University, Bowling Green, KY (United States); Freeman, K. C. [RSAA, Australian National University, Camberra (Australia); Gibson, B. [University of Central Lancashire, Preston (United Kingdom); Gilmore, G. [Institute of Astronomy, Cambridge (United Kingdom); Grebel, E. K. [Astronomisches Rechen-Institut, Zentrum fuer Astronomie der Universitaet Heidelberg, Heidelberg (Germany); Helmi, A. [Kapteyn Astronomical Institute, University of Groningen, Groningen (Netherlands); Navarro, J. F. [University of Victoria, Victoria (Canada); Parker, Q. A. [Macquarie University, Sydney (Australia); Seabroke, G. M. [e2v Centre for Electronic Imaging, Planetary and Space Sciences Research Institute, Open University, Walton Hall, Milton Keynes (United Kingdom); Watson, F. G., E-mail: gal.matijevic@fmf.uni-lj.s [Anglo-Australian Observatory, Sydney (Australia)

2010-07-15T23:59:59.000Z

375

Mergers of binary neutron stars with realistic spin  

E-Print Network (OSTI)

Simulations of binary neutron stars have seen great advances in terms of physical detail and numerical quality. However, the spin of the neutron stars, one of the simplest global parameters of binaries, remains mostly unstudied. We present the first, fully nonlinear general relativistic dynamical evolutions of the last three orbits for constraint satisfying initial data of spinning neutron star binaries, with astrophysically realistic spins aligned and anti-aligned to the orbital angular momentum. The initial data is computed with the constant rotational velocity approach. The dynamics of the systems is analyzed in terms of gauge-invariant binding energy vs. orbital angular momentum curves. By comparing to a binary black hole configuration we can estimate the different tidal and spin contributions to the binding energy for the first time. First results on the gravitational wave forms are presented. The phase evolution during the orbital motion is significantly affected by spin-orbit interactions, leading to delayed or early mergers. Furthermore, a frequency shift in the main emission mode of the hyper massive neutron star is observed. Our results suggest that a detailed modeling of merger waveforms requires the inclusion of spin, even for the moderate magnitudes observed in binary neutron star systems.

Sebastiano Bernuzzi; Tim Dietrich; Wolfgang Tichy; Bernd Bruegmann

2013-11-18T23:59:59.000Z

376

Binary Pulsar Shock Emissions as Galactic Gamma-Ray Sources  

E-Print Network (OSTI)

We address several issues regarding the interpretation of galactic \\ggg-ray sources. We consider powerful pulsars in binaries producing X-ray and gamma-ray {\\it unpulsed} emission from the shock interaction of relativistic pulsar winds with circumbinary material. Nebular mass outflows from companion stars of binary pulsars can provide the right {\\it calorimeters} to transform a fraction of the electromagnetic and kinetic energy of pulsar winds into high energy radiation. We discuss the physics of interaction of relativistic pulsar winds with gaseous material and show that the conditions in pulsar binary systems might be ideal to constrain shock acceleration mechanisms and pulsar wind composition and structure. We briefly discuss the example of the 47~ms pulsar PSR~1259-63 orbiting around a massive Be~star companion and monitored by X-ray and gamma-ray instruments during its recent periastron passage. In addition to young pulsars in massive binaries, also a class of recycled millisecond pulsars in low-mass binaries can be interesting high energy emitters.

M. Tavani

1995-02-10T23:59:59.000Z

377

Beowawe Bottoming Binary Project Geothermal Project | Open Energy  

Open Energy Info (EERE)

Beowawe Bottoming Binary Project Geothermal Project Beowawe Bottoming Binary Project Geothermal Project Jump to: navigation, search Last modified on July 22, 2011. Project Title Beowawe Bottoming Binary Project Project Type / Topic 1 Recovery Act: Geothermal Technologies Program Project Type / Topic 2 Geothermal Energy Production from Low Temperature Resources, Coproduced Fluids from Oil and Gas Wells, and Geopressured Resources Project Type / Topic 3 Low Temperature Resources Project Description The proposed two-year project supports the DOE GTP's goal of promoting the development and commercial application of energy production from low-temperature geothermal fluids, i.e., between 150°F and 300°F. State Nevada Objectives Demonstrate the technical and economic feasibility of electricity generation from nonconventional geothermal resources of 205°F using the first commercial use of a cycle at a geothermal power plant inlet temperature of less than 300°F.

378

Russell Hulse, the First Binary Pulsar, and Science Education  

NLE Websites -- All DOE Office Websites (Extended Search)

Russell Hulse, the First Binary Pulsar, and Science Education Russell Hulse, the First Binary Pulsar, and Science Education Resources with Additional Information 'Dr. Russell A. Hulse of Princeton University, the discoverer of the first binary pulsar and co-recipient of the 1993 Nobel Prize in physics, will affiliate with The University of Texas at Dallas (UTD) as a visiting professor of physics and of science and math education, beginning in January 2004. Russell Hulse Courtesy Princeton Plasma Physics Laboratory Hulse will be involved with developing innovative science and mathematics education programs for primary and secondary schools, including those in several Texas school districts, as well as with developing activities in more informal settings, such as libraries. During his appointment at UTD, Hulse will retain his affiliation with Princeton University, where he is a principal research physicist at the U.S. Department of Energy's Princeton Plasma Physics Laboratory.

379

Short period eclipsing binary candidates identified using SuperWASP  

E-Print Network (OSTI)

We present light curves and periods of 53 candidates for short period eclipsing binary stars identified by SuperWASP. These include 48 newly identified objects with periods <2x10^4 seconds (~0.23d), as well as the shortest period binary known with main sequence components (GSC2314-0530 = 1SWASP J022050.85+332047.6) and four other previously known W UMa stars (although the previously reported periods for two of these four are shown to be incorrect). The period distribution of main sequence contact binaries shows a sharp cut-off at a lower limit of around 0.22d, but until now, very few systems were known close to this limit. These new candidates will therefore be important for understanding the evolution of low mass stars and to allow investigation of the cause of the period cut-off.

Norton, A J; Evans, T; West, R G; Wheatley, P J; Anderson, D R; Barros, S C C; Butters, O W; Cameron, A Collier; Christian, D J; Enoch, B; Faedi, F; Haswell, C A; Hellier, C; Holmes, S; Horne, K D; Lister, T A; Maxted, P F L; Parley, N; Pollacco, D; Simpson, E K; Skillen, I; Smalley, B; Southworth, J; Street, R A

2011-01-01T23:59:59.000Z

380

Determining the Porosity and Saturated Hydraulic Conductivity of Binary Mixtures  

SciTech Connect

Gravels and coarse sands make up significant portions of some environmentally important sediments, while the hydraulic properties of the sediments are typically obtained in the laboratory using only the fine fraction (e.g., <2 mm or 4.75 mm). Researchers have found that the content of gravel has significant impacts on the hydraulic properties of the bulk soils. Laboratory experiments were conducted to measure the porosity and the saturated hydraulic conductivity of binary mixtures with different fractions of coarse and fine components. We proposed a mixing-coefficient model to estimate the porosity and a power-averaging method to determine the effective particle diameter and further to predict the saturated hydraulic conductivity of binary mixtures. The proposed methods could well estimate the porosity and saturated hydraulic conductivity of the binary mixtures for the full range of gravel contents and was successfully applied to two data sets in the literature.

Zhang, Z. F.; Ward, Anderson L.; Keller, Jason M.

2009-09-27T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Determining the Porosity and Saturated Hydraulic Conductivity of Binary Mixtures  

SciTech Connect

Gravels and coarse sands make up significant portions of some environmentally important sediments, while the hydraulic properties of the sediments are typically obtained in the laboratory using only the fine fraction (e.g., <2 mm or 4.75 mm). Researchers have found that the content of gravel has significant impacts on the hydraulic properties of the bulk soils. Laboratory experiments were conducted to measure the porosity and the saturated hydraulic conductivity of binary mixtures with different fractions of coarse and fine components. We proposed a mixing-coefficient model to estimate the porosity and a power-averaging method to determine the effective particle diameter and further to predict the saturated hydraulic conductivity of binary mixtures. The proposed methods could well estimate the porosity and saturated hydraulic conductivity of the binary mixtures for the full range of gravel contents and was successfully applied to two data sets in the literature.

Zhang, Z. F.; Ward, Anderson L.; Keller, Jason M.

2011-02-14T23:59:59.000Z

382

Mock LISA data challenge for the Galactic white dwarf binaries  

SciTech Connect

We present data analysis methods used in the detection and estimation of parameters of gravitational-wave signals from the white dwarf binaries in the mock LISA data challenge. Our main focus is on the analysis of challenge 3.1, where the gravitational-wave signals from more than 6x10{sup 7} Galactic binaries were added to the simulated Gaussian instrumental noise. The majority of the signals at low frequencies are not resolved individually. The confusion between the signals is strongly reduced at frequencies above 5 mHz. Our basic data analysis procedure is the maximum likelihood detection method. We filter the data through the template bank at the first step of the search, then we refine parameters using the Nelder-Mead algorithm, we remove the strongest signal found and we repeat the procedure. We detect reliably and estimate parameters accurately of more than ten thousand signals from white dwarf binaries.

Blaut, Arkadiusz; Babak, Stanislav; Krolak, Andrzej [Institute of Theoretical Physics, University of Wroclaw, Pl. Maxa Borna 9, Pl-50-204 Wroclaw (Poland); Albert Einstein Institute, Am Muchlenberg 1, D-14476 Golm (Germany); Institute of Mathematics, Polish Academy of Sciences, Sniadeckich 8, 00-950 Warsaw (Poland) and Andrzej Soltan Institute for Nuclear Studies, 05-400 Swierk-Otwock (Poland)

2010-03-15T23:59:59.000Z

383

Binary fish passage models for uniform and nonuniform flows  

Science Conference Proceedings (OSTI)

Binary fish passage models are considered by many fisheries managers to be the best 21 available practice for culvert inventory assessments and for fishway and barrier design. 22 Misunderstandings between different binary passage modeling approaches often arise, 23 however, due to differences in terminology, application and presentation. In this paper 24 one-dimensional binary fish passage models are reviewed and refined to clarify their 25 origins and applications. For uniform flow, a simple exhaustion-threshold (ET) model 26 equation is derived that predicts the flow speed threshold in a fishway or velocity barrier 27 that causes exhaustion at a given maximum distance of ascent. Flow speeds at or above 28 the threshold predict failure to pass (exclusion). Flow speeds below the threshold predict 29 passage. The binary ET model is therefore intuitive and easily applied to predict passage 30 or exclusion. It is also shown to be consistent with the distance-maximizing model. The 31 ET model s limitation to uniform flow is addressed by deriving a passage model that 32 accounts for nonuniform flow conditions more commonly found in the field, including 33 backwater profiles and drawdown curves. Comparison of these models with 34 experimental observations of volitional passage for Gambusia affinis in uniform and 35 nonuniform flows indicates reasonable prediction of binary outcomes (passage or 36 exclusion) if the flow speed is not near the threshold flow velocity. More research is 37 needed on fish behavior, passage strategies under nonuniform flow regimes and 38 stochastic methods that account for individual differences in swimming performance at or 39 near the threshold flow speed. Future experiments should track and measure ground 40 speeds of ascending fish to test nonuniform flow passage strategies and to improve model 41 predictions. Stochastic models, such as Monte-Carlo techniques, that account for 42 different passage performance among individuals and allow prediction of the percentage 43 of fish passing would be particularly useful near flow speed thresholds where binary 44 passage models are clearly limited.

Neary, Vincent S [ORNL

2011-01-01T23:59:59.000Z

384

COMPACT BINARY PROGENITORS OF SHORT GAMMA-RAY BURSTS  

SciTech Connect

In recent years, detailed observations and accurate numerical simulations have provided support to the idea that mergers of compact binaries containing either two neutron stars (NSs) or an NS and a black hole (BH) may constitute the central engine of short gamma-ray bursts (SGRBs). The merger of such compact binaries is expected to lead to the production of a spinning BH surrounded by an accreting torus. Several mechanisms can extract energy from this system and power the SGRBs. Here we connect observations and numerical simulations of compact binary mergers, and use the current sample of SGRBs with measured energies to constrain the mass of their powering tori. By comparing the masses of the tori with the results of fully general-relativistic simulations, we are able to infer the properties of the binary progenitors that yield SGRBs. By assuming a constant efficiency in converting torus mass into jet energy, {epsilon}{sub jet} = 10%, we find that most of the tori have masses smaller than 0.01 M{sub Sun }, favoring 'high-mass' binary NSs mergers, i.e., binaries with total masses {approx}> 1.5 the maximum mass of an isolated NS. This has important consequences for the gravitational wave signals that may be detected in association with SGRBs, since 'high-mass' systems do not form a long-lived hypermassive NS after the merger. While NS-BH systems cannot be excluded to be the engine of at least some of the SGRBs, the BH would need to have an initial spin of {approx}0.9 or higher.

Giacomazzo, Bruno [JILA, University of Colorado and National Institute of Standards and Technology, Boulder, CO 80309 (United States); Perna, Rosalba [JILA and Department of Astrophysical and Planetary Sciences, University of Colorado, Boulder, CO 80309 (United States); Rezzolla, Luciano [Max-Planck-Institut fuer Gravitationsphysik, Albert-Einstein-Institut, Potsdam D-14476 (Germany); Troja, Eleonora [NASA Goddard Space Flight Center, Greenbelt, MD 20771 (United States); Lazzati, Davide [Department of Physics, NC State University, 2401 Stinson Drive, Raleigh, NC 27695-8202 (United States)

2013-01-10T23:59:59.000Z

385

Interacting black holes on the brane: the seeding of binaries  

E-Print Network (OSTI)

We consider the evolution of sub-horizon-sized black holes which are formed during the high energy phase of the braneworld scenario. These black holes are long-lived due to modified evaporation and accretion of radiation during the radiation dominated era. We argue that an initial mass difference between any two neighbouring black holes is always amplified because of their exchange of energy with the surrounding radiation. We present a scheme of binary formation based on mass differences suggesting that such a scenario could lead to binaries with observable signatures.

A. S. Majumdar; A. Mehta; J. M. Luck

2003-11-06T23:59:59.000Z

386

Bounding the mass of the graviton using binary pulsar observations  

E-Print Network (OSTI)

The close agreement between the predictions of dynamical general relativity for the radiated power of a compact binary system and the observed orbital decay of the binary pulsars PSR B1913+16 and PSR B1534+12 allows us to bound the graviton mass to be less than 7.6 x 10^{-20} eV with 90% confidence. This bound is the first to be obtained from dynamic, as opposed to static-field, relativity. The resulting limit on the graviton mass is within two orders of magnitude of that from solar system measurements, and can be expected to improve with further observations.

Lee Samuel Finn; Patrick J. Sutton

2001-09-13T23:59:59.000Z

387

Binary Segmentation of Video Sequences in Real Time Francisco J. HernandezLopez and Mariano Rivera  

E-Print Network (OSTI)

Binary Segmentation of Video Sequences in Real Time Francisco J. Hernandez­Lopez and Mariano Rivera [8, 9]. Francisco Hernandez-Lopez and Mariano Rivera, Binary Segmentation of Video Sequences in Real

Rivera, Mariano

388

A complete minimal system of covariants for the binary form of degree 7  

Science Conference Proceedings (OSTI)

A minimal system of 147 homogeneous generators of the algebra of covariants for the binary form of degree 7 is calculated. Keywords: Classical invariant theory, Covariants of binary form, Derivations

Leonid Bedratyuk

2009-02-01T23:59:59.000Z

389

binOb+: a framework for potent and stealthy binary obfuscation  

Science Conference Proceedings (OSTI)

Reverse engineering is the process of discovering a high-level structure and its semantics from a lower-level structure. In order to prevent malicious use of reverse engineering against binaries, various techniques have been developed called binary obfuscation. ... Keywords: binary obfuscation, exception handling, reverse engineering, stealth, windows SEH

Byoungyoung Lee; Yuna Kim; Jong Kim

2010-04-01T23:59:59.000Z

390

THE ROLE OF KOZAI CYCLES IN NEAR-EARTH BINARY ASTEROIDS  

SciTech Connect

We investigate the Kozai mechanism in the context of near-Earth binaries and the Sun. The Kozai effect can lead to changes in eccentricity and inclination of the binary orbit, but it can be weakened or completely suppressed by other sources of pericenter precession, such as the oblateness of the primary body. Through numerical integrations including primary oblateness and three bodies (the two binary components and the Sun), we show that Kozai cycles cannot occur for the closely separated near-Earth binaries in our sample. We demonstrate that this is due to pericenter precession around the oblate primary, even for very small oblateness values. Since the majority of observed near-Earth binaries are not well separated, we predict that Kozai cycles do not play an important role in the orbital evolution of most near-Earth binaries. For a hypothetical wide binary modeled after 1998 ST27, the separation is large at 16 primary radii and so the orbital effects of primary oblateness are lessened. For this wide binary, we illustrate the possible excursions in eccentricity and inclination due to Kozai cycles as well as depict stable orientations for the binary's orbital plane. Unstable orientations lead to collisions between binary components, and we suggest that the Kozai effect acting in wide binaries may be a route to the formation of near-Earth contact binaries.

Fang, Julia; Margot, Jean-Luc [Department of Physics and Astronomy, University of California, Los Angeles, CA 90095 (United States)

2012-03-15T23:59:59.000Z

391

A constrained binary knapsack approximation for shortest path network interdiction  

Science Conference Proceedings (OSTI)

A modified shortest path network interdiction model is approximated in this work by a constrained binary knapsack which uses aggregated arc maximum flow as the objective function coefficient. In the modified shortest path network interdiction problem, ... Keywords: Approximation techniques, Homeland security, Integer programming, Network interdiction

Justin Yates; Kavitha Lakshmanan

2011-11-01T23:59:59.000Z

392

On complexity of optimal recombination for binary representations of solutions  

Science Conference Proceedings (OSTI)

We consider the optimization problem of finding the best possible offspring as a result of a recombination operator in an evolutionary algorithm, given two parent solutions. The optimal recombination is studied in the case where a vector of binary variables ... Keywords: Complexity, evolutionary algorithm, optimal recombination, optimized crossover

Anton V. Eremeev

2008-03-01T23:59:59.000Z

393

Coal liquefaction process using pretreatment with a binary solvent mixture  

DOE Patents (OSTI)

An improved process for thermal solvent refining or hydroliquefaction of non-anthracitic coal at elevated temperatures under hydrogen pressure in a hydrogen donor solvent comprises pretreating the coal with a binary mixture of an aromatic hydrocarbon and an aliphatic alcohol at a temperature below 300.degree. C. before the hydroliquefaction step. This treatment generally increases both conversion of coal and yields of oil.

Miller, Robert N. (Allentown, PA)

1986-01-01T23:59:59.000Z

394

Final Binary Stars Results From The VLT Lunar Occultations Program  

E-Print Network (OSTI)

We report on 13 sub-arcsecond binaries, detected by means of lunar occultations in the near-infrared at the ESO Very Large Telescope. They are all first-time detections, except for the visual binary HD~158122 which we resolved for the first time in the near infrared. The primaries have magnitudes in the range $K$=4.5 to 10.0, and the companions in the range $K$=6.8 to 11.1. The magnitude differences have a median value of 2.4, with the largest being 4.6. The projected separations are in the range 4 to 168 milliarcseconds with a median of 13 milliarcseconds. We discuss and compare our results with the available literature. With this paper, we conclude the mining for binary star detections in the volume of 1226 occultations recorded at the VLT with the ISAAC instrument. We expect that the majority of these binaries may be unresolvable by adaptive optics on current telescopes, and they might be challenging for long-baseline interferometry. However they constitute an interesting sample for future larger telescope...

Richichi, Andrea; Cusano, Felice; Ivanov, Valentin

2014-01-01T23:59:59.000Z

395

Heber Geothermal Binary Demonstration Plant: Design, Construction, and Early Startup  

Science Conference Proceedings (OSTI)

Binary-cycle technology could almost double the electric energy yield from known hydrothermal resources. The 45-MWe Heber geothermal demonstration plant--now in a three-year test and demonstration program--has successfully passed through a series of feasibility studies, design stages, and field experiments that show its promise to tap these resources.

1987-10-09T23:59:59.000Z

396

Ph.D.Thesis Binary inversion of gravity  

E-Print Network (OSTI)

Ph.D.Thesis Binary inversion of gravity data for salt imaging Richard A. Krahenbuhl Center for Gravity, Electrical & Magnetic Studies Colorado School of Mines Department of Geophysics Colorado School of gravity data for salt imaging Richard A. Krahenbuhl Center for Gravity, Electrical & Magnetic Studies

397

Combining subsumption and binary methods: an object calculus with views  

Science Conference Proceedings (OSTI)

We presen t an object-oriented calculus whic hallows arbitrary hiding of methods in protot ypes, even in the presence of binary methods and friend functions. This combination of features permits complete control of the in terface a class exposes to the ...

Jérôme Vouillon

2001-01-01T23:59:59.000Z

398

A binary LP model to the facility layout problem Abstract  

E-Print Network (OSTI)

Domschke and Drexl [4] and the other by Francis, McGinnis and White [5], ... In this paper a simple pure-binary linear programming (PBLP) model has been developed to find the ..... AB AC AD AE AF BC BD BE BF CD CE CF DE DF EF. 12. X*.

399

A detection pipeline for galactic binaries in LISA data  

E-Print Network (OSTI)

The Galaxy is suspected to contain hundreds of millions of binary white dwarf systems, a large fraction of which will have sufficiently small orbital period to emit gravitational radiation in band for space-based gravitational wave detectors such as the Laser Interferometer Space Antenna (LISA). LISA's main science goal is the detection of cosmological events (supermassive black hole mergers, etc.) however the gravitational signal from the galaxy will be the dominant contribution to the data -- including instrumental noise -- over approximately two decades in frequency. The catalogue of detectable binary systems will serve as an unparalleled means of studying the Galaxy. Furthermore, to maximize the scientific return from the mission, the data must be "cleansed" of the galactic foreground. We will present an algorithm that can accurately resolve and subtract >10000 of these sources from simulated data supplied by the Mock LISA Data Challenge Task Force. Using the time evolution of the gravitational wave frequency, we will reconstruct the position of the recovered binaries and show how LISA will sample the entire compact binary population in the Galaxy.

Tyson B. Littenberg

2011-06-30T23:59:59.000Z

400

Advanced binary geothermal power plants: Limits of performance  

SciTech Connect

The Heat Cycle Research Program is currently investigating the potential improvements to power cycles utilizing moderate temperature geothermal resources to produce electrical power. Investigations have specifically examined Rankine cycle binary power systems. Binary Rankine cycles are more efficient than the flash steam cycles at moderate resource temperatures, achieving a higher net brine effectiveness. At resource conditions similar to those at the Heber binary plant, it has been shown that mixtures of saturated hydrocarbons (alkanes) or halogenated hydrocarbons operating with a supercritical Rankine cycle gave improved performance over Rankine cycles with the pure working fluids executing single boiling cycles. Recently, in addition to the supercritical Rankine Cycle, other types of cycles have been proposed for binary geothermal service. This paper explores the limits on efficiency of a feasibility plant and discusses the methods used in these advanced concept plants to achieve the maximum possible efficiency. The advanced plants considered appear to be approaching the feasible limit of performance so that the designer must weigh all considerations to find the best plant for a given service. 16 refs., 12 figs.

Bliem, C.J.; Mines, G.L.

1990-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Description of interest regions with local binary patterns  

Science Conference Proceedings (OSTI)

This paper presents a novel method for interest region description. We adopted the idea that the appearance of an interest region can be well characterized by the distribution of its local features. The most well-known descriptor built on this idea is ... Keywords: Image matching, Local binary patterns, Object recognition, Region description, Region detection, SIFT

Marko Heikkilä; Matti Pietikäinen; Cordelia Schmid

2009-03-01T23:59:59.000Z

402

Binary populations and stellar dynamics in young clusters  

E-Print Network (OSTI)

We first summarize work that has been done on the effects of binaries on theoretical population synthesis of stars and stellar phenomena. Next, we highlight the influence of stellar dynamics in young clusters by discussing a few candidate UFOs (unconventionally formed objects) like intermediate mass black holes, Eta Carinae, Zeta Puppis, Gamma Velorum and WR 140.

D. Vanbeveren; H. Belkus; J. Van Bever; N. Mennekens

2008-01-17T23:59:59.000Z

403

Binary populations and stellar dynamics in young clusters  

E-Print Network (OSTI)

We first summarize work that has been done on the effects of binaries on theoretical population synthesis of stars and stellar phenomena. Next, we highlight the influence of stellar dynamics in young clusters by discussing a few candidate UFOs (unconventionally formed objects) like intermediate mass black holes, Eta Carinae, Zeta Puppis, Gamma Velorum and WR 140.

Vanbeveren, D; Van Bever, J; Mennekens, N

2008-01-01T23:59:59.000Z

404

Application for testing control configurations of binary distillation columns  

Science Conference Proceedings (OSTI)

The paper addresses the problem of testing various control configurations for binary distillation columns. Analyzing from plantwide control point of view the place of distillation column within the plant, the result will be the best control configuration. ... Keywords: composition control, distillation columns, dynamic simulations, plantwide control

Sanda Mihalache; Marian Popescu

2007-08-01T23:59:59.000Z

405

Binary pulsar shock emissions as galactic gamma-ray sources  

E-Print Network (OSTI)

We address several issues regarding the interpretation of galactic \\ggg-ray sources. We consider powerful pulsars in binaries producing X-ray and gamma-ray {\\it unpulsed} emission from the shock interaction of relativistic pulsar winds with circumbinary material. Nebular mass outflows from companion stars of binary pulsars can provide the right {\\it calorimeters} to transform a fraction of the electromagnetic and kinetic energy of pulsar winds into high energy radiation. We discuss the physics of interaction of relativistic pulsar winds with gaseous material and show that the conditions in pulsar binary systems might be ideal to constrain shock acceleration mechanisms and pulsar wind composition and structure. We briefly discuss the example of the 47~ms pulsar PSR~1259-63 orbiting around a massive Be~star companion and monitored by X-ray and gamma-ray instruments during its recent periastron passage. In addition to young pulsars in massive binaries, also a class of recycled millisecond pulsars in low-mass bin...

Tavani, M

1995-01-01T23:59:59.000Z

406

KEPLER ECLIPSING BINARY STARS. III. CLASSIFICATION OF KEPLER ECLIPSING BINARY LIGHT CURVES WITH LOCALLY LINEAR EMBEDDING  

Science Conference Proceedings (OSTI)

We present an automated classification of 2165 Kepler eclipsing binary (EB) light curves that accompanied the second Kepler data release. The light curves are classified using locally linear embedding, a general nonlinear dimensionality reduction tool, into morphology types (detached, semi-detached, overcontact, ellipsoidal). The method, related to a more widely used principal component analysis, produces a lower-dimensional representation of the input data while preserving local geometry and, consequently, the similarity between neighboring data points. We use this property to reduce the dimensionality in a series of steps to a one-dimensional manifold and classify light curves with a single parameter that is a measure of 'detachedness' of the system. This fully automated classification correlates well with the manual determination of morphology from the data release, and also efficiently highlights any misclassified objects. Once a lower-dimensional projection space is defined, the classification of additional light curves runs in a negligible time and the method can therefore be used as a fully automated classifier in pipeline structures. The classifier forms a tier of the Kepler EB pipeline that pre-processes light curves for the artificial intelligence based parameter estimator.

Matijevic, Gal [Faculty of Mathematics and Physics, University of Ljubljana, Jadranska 19, 1000 Ljubljana (Slovenia); Prsa, Andrej [Department of Astronomy and Astrophysics, Villanova University, 800 E Lancaster Ave, Villanova, PA 19085 (United States); Orosz, Jerome A.; Welsh, William F. [Department of Astronomy, San Diego State University, 5500 Campanile Dr., San Diego, CA 92182 (United States); Bloemen, Steven [Instituut voor Sterrenkunde, KU Leuven, Celestijnenlaan 200 D, B-3001 Leuven (Belgium); Barclay, Thomas, E-mail: gal.matijevic@fmf.uni-lj.si, E-mail: andrej.prsa@villanova.edu [NASA Ames Research Center/BAER Institute, Moffett Field, CA 94035 (United States)

2012-05-15T23:59:59.000Z

407

Training a Binary Classifier with the Quantum Adiabatic Algorithm  

E-Print Network (OSTI)

This paper describes how to make the problem of binary classification amenable to quantum computing. A formulation is employed in which the binary classifier is constructed as a thresholded linear superposition of a set of weak classifiers. The weights in the superposition are optimized in a learning process that strives to minimize the training error as well as the number of weak classifiers used. No efficient solution to this problem is known. To bring it into a format that allows the application of adiabatic quantum computing (AQC), we first show that the bit-precision with which the weights need to be represented only grows logarithmically with the ratio of the number of training examples to the number of weak classifiers. This allows to effectively formulate the training process as a binary optimization problem. Solving it with heuristic solvers such as tabu search, we find that the resulting classifier outperforms a widely used state-of-the-art method, AdaBoost, on a variety of benchmark problems. Moreover, we discovered the interesting fact that bit-constrained learning machines often exhibit lower generalization error rates. Changing the loss function that measures the training error from 0-1 loss to least squares maps the training to quadratic unconstrained binary optimization. This corresponds to the format required by D-Wave's implementation of AQC. Simulations with heuristic solvers again yield results better than those obtained with boosting approaches. Since the resulting quadratic binary program is NP-hard, additional gains can be expected from applying the actual quantum processor.

Hartmut Neven; Vasil S. Denchev; Geordie Rose; William G. Macready

2008-11-04T23:59:59.000Z

408

BINARY FREQUENCIES IN A SAMPLE OF GLOBULAR CLUSTERS. I. METHODOLOGY AND INITIAL RESULTS  

SciTech Connect

Binary stars are thought to be a controlling factor in globular cluster evolution, since they can heat the environmental stars by converting their binding energy to kinetic energy during dynamical interactions. Through such interaction, the binaries determine the time until core collapse. To test predictions of this model, we have determined binary fractions for 35 clusters. Here we present our methodology with a representative globular cluster NGC 4590. We use Hubble Space Telescope archival Advanced Camera for Surveys data in the F606W and F814W bands and apply point-spread-function-fitting photometry to obtain high quality color-magnitude diagrams. We formulate the star superposition effect as a Poisson probability distribution function, with parameters optimized through Monte Carlo simulations. A model-independent binary fraction of (6.2 {+-} 0.3)% is obtained by counting stars that extend to the red side of the residual color distribution after accounting for the photometric errors and the star superposition effect. A model-dependent binary fraction is obtained by constructing models with a known binary fraction and an assumed binary mass-ratio distribution function. This leads to a binary fraction range of 6.8%-10.8%, depending on the assumed shape to the binary mass-ratio distribution, with the best fit occurring for a binary distribution that favors low mass ratios (and higher binary fractions). We also represent the method for radial analysis of the binary fraction in the representative case of NGC 6981, which shows a decreasing trend for the binary fraction toward the outside, consistent with theoretical predictions for the dynamical effect on the binary fraction.

Ji Jun; Bregman, Joel N., E-mail: jijun@umich.edu, E-mail: jbregman@umich.edu [Department of Astronomy, University of Michigan, Ann Arbor, MI 48109 (United States)

2013-05-10T23:59:59.000Z

409

White Paper Sun Java Workstation W1100z and W2100z Architecture On the Web sun.com Sun Java TM Workstation W1100z and W2100z Architecture  

E-Print Network (OSTI)

All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. Sun, Sun Microsystems, the Sun logo, Java, Solaris, Solaris JumpStart, Sun N1, Sun Ray, and Net Beans are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun ™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.

unknown authors

2004-01-01T23:59:59.000Z

410

Jordan-Wigner formalism for classical simulation beyond binary matchgates  

E-Print Network (OSTI)

The unitary matchgate circuits introduced by Valiant provide an interesting class of quantum circuits that are classically efficiently simulatable. They were shown by Terhal & DiVincenzo and Knill to be related to the physics of non-interacting fermions. The Jordan-Wigner (JW) formalism provides an efficient classical simulation of the latter, which turns out to be equivalent to the restricted case of circuits of binary (2-qubit) matchgates. Valiant's formalism allows further unitary gates: in particular we may include arbitrary 1-qubit gates on the first qubit line at any stage within a binary matchgate circuit. In this note we show how the JW formalism may be extended to provide an efficient classical simulation of such extended circuits, and we show how the simulability also follows from some elementary Lie algebra theory. The essential ingredients have been indicated previously by Knill in a condensed and abstract form, and our purpose is to make these results explicit and transparent.

Richard Jozsa; Akimasa Miyake

2013-11-13T23:59:59.000Z

411

A Close Binary Star Resolved from Occultation by 87 Sylvia  

E-Print Network (OSTI)

The star BD+29 1748 was resolved to be a close binary from its occultation by the asteroid 87 Sylvia on 2006 December 18 UT. Four telescopes were used to observe this event at two sites separated by some 80 km apart. Two flux drops were observed at one site, whereas only one flux drop was detected at the other. From the long-term variation of Sylvia, we inferred the probable shape of the shadow during the occultation, and this in turn constrains the binary parameters: the two components of BD+29 1748 have a projected separation of 0.097" to 0.110" on the sky with a position angle 104 deg to 107 deg. The asteroid was clearly resolved with a size scale ranging from 130 to 290 km, as projected onto the occultation direction. No occultation was detected for either of the two known moonlets of 87 Sylvia.

Lin, Chi-Long; Chen, W P; King, Sun-Kun; Lin, Hung-Chin; Bianco, F B; Lehner, M J; Coehlo, N K; Wang, J -H; Mondal, S; Alcock, C; Axelrod, T; Byun, Y -I; Cook, K H; Davé, R; De Pater, I; Porrata, R; Kim, D -W; Lee, T; Lissauer, J J; Marshall, S L; Rice, J A; Schwamb, M E; Wang, S -Y; Wen, C -Y

2009-01-01T23:59:59.000Z

412

General Relativistic Binary Merger Simulations and Short Gamma Ray Bursts  

E-Print Network (OSTI)

The recent localization of some short-hard gamma ray bursts (GRBs) in galaxies with low star formation rates has lent support to the suggestion that these events result from compact object binary mergers. We discuss how new simulations in general relativity are helping to identify the central engine of short-hard GRBs. Motivated by our latest relativistic black hole-neutron star merger calculations, we discuss a scenario in which these events may trigger short-hard GRBs, and compare this model to competing relativistic models involving binary neutron star mergers and the delayed collapse of hypermassive neutron stars. Distinguishing features of these models may help guide future GRB and gravitational wave observations to identify the nature of the sources.

Joshua A. Faber; Thomas W. Baumgarte; Stuart L. Shapiro; Keisuke Taniguchi

2006-03-10T23:59:59.000Z

413

Mechanisms producing fissionlike binary fragments in heavy collisions  

E-Print Network (OSTI)

The mixing of the quasifission component to the fissionlike cross section causes ambiguity in the quantitative estimation of the complete fusion cross section from the observed angular and mass distributions of the binary products. We show that the partial cross section of quasifission component of binary fragments covers the whole range of the angular momentum values leading to capture. The calculated angular momentum distributions for the compound nucleus and dinuclear system going to quasifission may overlap: competition between complete fusion and quasifission takes place at all values of initial orbital angular momentum. Quasifission components formed at large angular momentum of the dinuclear system can show isotropic angular distribution and their mass distribution can be in mass symmetric region similar to the characteristics of fusion-fission components. As result the unintentional inclusion of the quasifission contribution into the fusion-fission fragment yields can lead to overestimation of the probability of the compound nucleus formation.

A. K. Nasirov; A. I. Muminov; G. Giardina; G. Mandaglio; M. Manganaro

2009-12-11T23:59:59.000Z

414

Supersaturated Turbine Expansions for Binary Geothermal Power Plants  

DOE Green Energy (OSTI)

The Heat Cycle Research project is developing the technology base that will permit a much greater utilization of the moderate-temperature, liquid-dominated geothermal resources, particularly for the generation of electrical power. The emphasis in the project has been the improvement of the performance of binary power cycles. The investigations have been examining concepts projected to improve the brine utilization by 20% relative to a ''Heber-type'' binary plant; these investigations are nearing completion. preparations are currently underway in the project to conduct field investigations of the condensation behavior of supersaturated turbine expansions. These investigations will evaluate whether the projected additional 8% to 10% improvement in brine utilization can be realized by allowing these expansions. Future program efforts will focus on the problems associated with heat rejection and on the transfer of the technology being developed to industry.

Bliem, C.J.; Mines, G.L.

1992-03-24T23:59:59.000Z

415

Stellar Collisions and Ultracompact X-ray Binary Formation  

E-Print Network (OSTI)

(abridged) We report the results of SPH calculations of parabolic collisions between a subgiant or slightly evolved red-giant star and a neutron star (NS). Such collisions are likely to form ultracompact X-ray binaries (UCXBs) observed today in old globular clusters. In particular, we compute collisions of a 1.4 Msun NS with realistically modelled parent stars of initial masses 0.8 and 0.9 Msun, each at three different evolutionary stages (corresponding to three different radii R). The distance of closest approach for the initial orbit varies from 0.04 R (nearly head-on) to 1.3 R (grazing). These collisions lead to the formation of a tight binary, composed of the NS and the subgiant or red-giant core, embedded in an extremely diffuse common envelope (CE) typically of mass ~0.1 to 0.3 Msun. Our calculations follow the binary for many hundreds of orbits, ensuring that the orbital parameters we determine at the end of the calculations are close to final. Some of the fluid initially in the envelope of the (sub)giant, from 0.003 to 0.023 Msun in the cases we considered, is left bound to the NS. The eccentricities of the resulting binaries range from about 0.2 for our most grazing collision to about 0.9 for the nearly head-on cases. In almost all the cases we consider, gravitational radiation alone will cause sufficiently fast orbital decay to form a UCXB within a Hubble time, and often on a much shorter timescale. Our hydrodynamics code implements the recent SPH equations of motion derived with a variational approach by Springel & Hernquist and by Monaghan. Numerical noise is reduced by enforcing an analytic constraint equation that relates the smoothing lengths and densities of SPH particles. We present tests of these new methods to help demonstrate their improved accuracy.

J. C. Lombardi Jr.; Z. F. Proulx; K. L. Dooley; E. M. Theriault; N. Ivanova; F. A. Rasio

2005-09-17T23:59:59.000Z

416

Surface instability of binary compounds caused by sputter yield amplification  

Science Conference Proceedings (OSTI)

It is demonstrated that the flat surface of a binary material that is subjected to normal-incidence ion bombardment can be unstable even if the curvature dependence of the sputter yields is negligibly small. This unforeseen instability is brought about by sputter yield amplification, and it results in the formation of a disordered array of nanodots with the lighter of the two atomic species concentrated at the peaks of the dots.

Mark Bradley, R. [Department of Physics, Colorado State University, Fort Collins, Colorado 80523 (United States)

2012-06-01T23:59:59.000Z

417

Advanced binary geothermal power plants: Limits of performance  

SciTech Connect

The Heat Cycle Research Program is investigating potential improvements to power cycles utilizing moderate temperature geothermal resources to produce electrical power. Investigations have specifically examined Rankine cycle binary power systems. Binary Rankine cycles are more efficient than the flash steam cycles at moderate resource temperature, achieving a higher net brine effectiveness. At resource conditions similar to those at the Heber binary plant, it has been shown that mixtures of saturated hydrocarbons (alkanes) or halogenated hydrocarbons operating in a supercritical Rankine cycle gave improved performance over Rankine cycles with the pure working fluids executing single or dual boiling cycles or supercritical cycles. Recently, other types of cycles have been proposed for binary geothermal service. This report explores the feasible limits on efficiency of a plant given practical limits on equipment performance and discusses the methods used in these advanced concept plants to achieve the maximum possible efficiency. (Here feasible is intended to mean reasonably achievable and not cost-effective.) No direct economic analysis has been made because of the sensitivity of economic results to site specific input. The limit of performance of three advanced plants were considered in this report. The performance predictions were taken from the developers of each concept. The advanced plants considered appear to be approaching the feasible limit of performance. Ultimately, the plant designer must weigh the advantages and disadvantages of the the different cycles to find the best plant for a given service. In addition, this report presents a standard of comparison of the work which has been done in the Heat Cycle Research Program and in the industrial sector by Exergy, Inc. and Polythermal Technologies. 18 refs., 16 figs., 1 tab.

Bliem, C.J.; Mines, G.L.

1991-01-01T23:59:59.000Z

418

Coal liquefaction process using pretreatment with a binary solvent mixture  

DOE Patents (OSTI)

An improved process for thermal solvent refining or hydroliquefaction of non-anthracitic coal at elevated temperatures under hydrogen pressure in a hydrogen donor solvent comprises pretreating the coal with a binary mixture of an aromatic hydrocarbon and an aliphatic alcohol at a temperature below 300 C before the hydroliquefaction step. This treatment generally increases both conversion of coal and yields of oil. 1 fig.

Miller, R.N.

1986-10-14T23:59:59.000Z

419

A Search for Rapid Photometric Variability in Symbiotic Binaries  

E-Print Network (OSTI)

We report on our survey for rapid (time scale of minutes) photometric variability in symbiotic binaries. These binaries are becoming an increasingly important place to study accretion onto white dwarfs since they are candidate Type Ia supernovae progenitors. Unlike in most cataclysmic variables, the white dwarfs in symbiotics typically accrete from a wind, at rates greater than or equal to 10^{-9} solar masses per year. In order to elucidate the differences between symbiotics and other white dwarf accretors, as well as search for magnetism in symbiotic white dwarfs, we have studied 35 primarily northern symbiotic binaries via differential optical photometry. Our study is the most comprehensive to date of rapid variability in symbiotic binaries. We have found one magnetic accretor, Z And, previously reported by Sokoloski & Bildsten (1999). In four systems (EG And, BX Mon, CM Aql, and BF Cyg), some evidence for flickering at a low level (roughly 10 mmag) is seen for the first time. These detections are, however, marginal. For 25 systems, we place tight upper limits (order of mmag) on both aperiodic and periodic variability, highlighting a major difference between symbiotics and cataclysmic variables. The remaining five of the objects included in our sample (the 2 recurrent novae RS Oph and T CrB, plus CH Cyg, o Ceti, and MWC 560) had previous detections of large-amplitude optical flickering, and we present our extensive observations of these systems in a separate paper. We discuss the impact of our results on the ``standard'' picture of wind-fed accretion, and speculate on the possibility that in most symbiotics, light from quasi-steady nuclear burning on the surface of the white dwarf hides the fluctuating emission from accretion.

J. L. Sokoloski; Lars Bildsten; Wynn C. G. Ho

2001-04-02T23:59:59.000Z

420

ON THE FORMATION OF HOT JUPITERS IN STELLAR BINARIES  

Science Conference Proceedings (OSTI)

We study the production of hot Jupiters (HJs) in stellar binaries. We show that the 'eccentric Kozai-Lidov' (EKL) mechanism can play a key role in the dynamical evolution of a star-planet-star triple system. We run a large set of Monte Carlo simulations including the secular evolution of the orbits, general relativistic precession, and tides, and we determine the semimajor axis, eccentricity, inclination, and spin-orbit angle distributions of the HJs that are produced. We explore the effect of different tidal friction parameters on the results. We find that the efficiency of forming HJs when taking the EKL mechanism into account is higher then previously estimated. Accounting for the frequency of stellar binaries, we find that this production mechanism can account for about 30% of the observed HJ population. Current observations of spin-orbit angles are consistent with this mechanism producing {approx}30% of all HJs, and up to 100% of the misaligned systems. Based on the properties of binaries without an HJ in our simulations, we predict the existence of many Jupiter-like planets with moderately eccentric and inclined orbits and semimajor axes of several AU.

Naoz, Smadar [Harvard Smithsonian Center for Astrophysics, Institute for Theory and Computation, 60 Garden Street, Cambridge, MA 02138 (United States); Farr, Will M.; Rasio, Frederic A. [Center for Interdisciplinary Exploration and Research in Astrophysics (CIERA), Northwestern University, Evanston, IL 60208 (United States)

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

FRAGILE BINARY CANDIDATES IN THE SDSS DR8 SPECTROSCOPIC ARCHIVE  

Science Conference Proceedings (OSTI)

We present a catalog of 80 very wide fragile binary candidates (projected separations >10,000 AU) from the Sloan Digital Sky Survey Data Release Eight spectral archive. The pairs were selected based on proper motion, radial velocity, metallicity, and photometric parallax criteria. The angular separations of these pairs range from 3'' to 250''. The peak in the metallicity distribution of these pairs is about -0.5 dex of solar metallicity. Space motions and reduced proper motion diagrams indicate that all these pairs are members of the disk. The chromospheric activity index S{sub HK} of each component in 38 binary candidates having spectra of high signal-to-noise ratio and member stars of three open clusters (NGC 2420, M67, and NGC 6791) were measured. The S{sub HK} versus color relation for these binary candidates is consistent with the trend seen in these open clusters. The ages implied by this relation suggest that fragile wide pairs can survive longer than 8 Gyr.

Zhao, J. K.; Oswalt, T. D. [Florida Institute of Technology, Melbourne, FL 32901 (United States); Zhao, G., E-mail: jzhao@fit.edu, E-mail: toswalt@fit.edu, E-mail: gzhao@bao.ac.cn [Key Laboratory of Optical Astronomy, National Astronomical Observatories, Chinese Academy of Sciences, Beijing 100012 (China)

2012-02-15T23:59:59.000Z

422

Seismic facies and growth history of Miocene carbonate platforms, Wonocolo Formation, North Madura area, East Java Basin, Indonesia  

E-Print Network (OSTI)

The Miocene Wonocolo Formation in the North Madura area, East Java Basin, contains numerous isolated carbonate platforms that are broadly distributed across a ~3000 sq km area of the Indonesian back-arc region. The Wonocolo platforms provide an interesting test for comparing the different growth histories of closely spaced individual platforms, where eustatic history was the same for all the platforms, but where subtle differences in other extrinsic factors influenced their growth. A grid of 2D seismic data and information from several wells across the region were used to map all Wonocolo platforms across the study area. Five growth phases are recognizable in the platforms, based on seismic facies analysis and internal seismic-stratigraphic relationships. Platforms from the western part of the study area are larger in plan view than age-equivalent platforms to the east and record a complex history of platform initiation, backstepping, progradation, coalescence into larger composite platforms, and termination. Although all five growth phases are also recognizable in some Wonocolo platforms from the eastern part of the study area, the eastern platforms are different in that they: 1) are much smaller in plan view, 2) are spaced farther apart, 3) tend to have steeper platform margins, 4) have largely aggradational stratal geometries, 5) are slightly thicker overall than the western platforms, and 6) the tops of the platforms are at greater burial depths than the tops of the western platforms. Most of these differences in platform morphology and growth history can be attributed to slightly faster subsidence rates in the eastern part of the study area. Faster subsidence rates in the eastern part of the study area from 12 - 6 Ma (the age range for the Wonocolo platforms) are probably related to differential surface loading by the Indonesian volcanic arc.

Adhyaksawan, Rahadian

2002-01-01T23:59:59.000Z

423

Terra-Gen Power and TAS Celebrate Innovative Binary Geothermal Technology |  

Open Energy Info (EERE)

and TAS Celebrate Innovative Binary Geothermal Technology and TAS Celebrate Innovative Binary Geothermal Technology Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Terra-Gen Power and TAS Celebrate Innovative Binary Geothermal Technology Abstract N/A Authors Terra-Gen Power and LLC Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Terra-Gen Power and TAS Celebrate Innovative Binary Geothermal Technology Citation Terra-Gen Power, LLC. Terra-Gen Power and TAS Celebrate Innovative Binary Geothermal Technology [Internet]. [updated 2011;cited 2011]. Available from: http://www.terra-genpower.com/News/TERRA-GEN-POWER-AND-TAS-CELEBRATE-INNOVATIVE-BINAR.aspx Retrieved from "http://en.openei.org/w/index.php?title=Terra-Gen_Power_and_TAS_Celebrate_Innovative_Binary_Geothermal_Technology&oldid=682514

424

Search for gravitational waves from binary black hole inspirals in LIGO data  

E-Print Network (OSTI)

We report on a search for gravitational waves from binary black hole inspirals in the data from the second science run of the LIGO interferometers. The search focused on binary systems with component masses between 3 and 20 solar masses. Optimally oriented binaries with distances up to 1 Mpc could be detected with efficiency of at least 90%. We found no events that could be identified as gravitational waves in the 385.6 hours of data that we searched.

LIGO Scientific Collaboration; B. Abbott et. al

2005-09-30T23:59:59.000Z

425

GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries  

SciTech Connect

GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

Shalf, John; Goodale, Tom

2004-02-01T23:59:59.000Z

426

GridRun: A lightweight packaging and execution environment for compact, multi-architecture binaries  

E-Print Network (OSTI)

fat” binaries will greatly simplify the distribution and management of code in heterogeneous grid environments, but these benefits will be rendered

Shalf, John; Goodale, Tom

2004-01-01T23:59:59.000Z

427

Nonconformally flat initial data for binary compact objects  

SciTech Connect

A new method is described for constructing initial data for a binary neutron-star system in quasiequilibrium circular orbit. Two formulations for nonconformally flat data, waveless and near-zone helically symmetric, are introduced; in each formulation, the Einstein-Euler system, written in 3+1 form on an asymptotically flat spacelike hypersurface, is exactly solved for all metric components, including the spatially nonconformally flat potentials, and for irrotational flow. A numerical method applicable to both formulations is explained with an emphasis on the imposition of a spatial gauge condition. Results are shown for solution sequences of irrotational binary neutron-stars with matter approximated by parametrized equations of state that use a few segments of polytropic equations of state. The binding energy and total angular momentum of solution sequences computed within the conformally flat--Isenberg-Wilson-Mathews--formulation are closer to those of the third post-Newtonian (3PN) two point particles up to the closest orbits, for the more compact stars, whereas sequences resulting from the waveless/near-zone helically symmetric formulations deviate from the 3PN curve even more for the sequences with larger compactness. We think it likely that this correction reflects an overestimation in the Isenberg-Wilson-Mathews formulation as well as in the 3PN formula, by {approx}1 cycle in the gravitational-wave phase during the last several orbits. The work suggests that imposing spatial conformal flatness results in an underestimate of the quadrupole deformation of the components of binary neutron-star systems in the last few orbits prior to merger.

Uryu, Koji [Department of Physics, University of the Ryukyus, Senbaru, Nishihara, Okinawa 903-0213 (Japan); Limousin, Francois; Gourgoulhon, Eric [Laboratoire Univers et Theories, UMR 8102 du CNRS, Observatoire de Paris, Universite Paris Diderot, F-92190 Meudon (France); Friedman, John L. [Department of Physics, University of Wisconsin-Milwaukee, P.O. Box 413, Milwaukee, Wisconsin 53201 (United States); Shibata, Masaru [Yukawa Institute for Theoretical Physics, Kyoto University, Kyoto 606-8502 (Japan)

2009-12-15T23:59:59.000Z

428

Finding binary millisecond pulsars with the Hough transform  

E-Print Network (OSTI)

The Hough transformation has been used successfully for more than four decades. Originally used for tracking particle traces in bubble chamber images, this work shows a novel approach turning the initial idea into a powerful tool to incoherently detect millisecond pulsars in binary orbits. This poster presents the method used, a discussion on how to treat the time domain data from radio receivers and create the input "image" for the Hough transformation, details about the advantages and disadvantages of this approach, and finally some results from pulsars in 47 Tucanae.

C. Aulbert

2007-01-04T23:59:59.000Z

429

Plutonium microstructures. Part 2. Binary and ternary alloys  

Science Conference Proceedings (OSTI)

This report is the second of three parts that exhibit illustrations of inclusions in plutonium metal from inherent and tramp impurities, of intermetallic and nonmetallic constituents from alloy additions, and of the effects of thermal and mechanical treatments. This part includes illustrations of the microstructures in binary cast alloys and a few selected ternary alloys that result from measured additions of diluent elements, and of the microconstituents that are characteristic of phase fields in extended alloy systems. Microhardness data are given and the etchant used in the preparation of each sample is described.

Cramer, E.M.; Bergin, J.B.

1983-12-01T23:59:59.000Z

430

ABSOLUTE PROPERTIES OF THE ECCENTRIC ECLIPSING BINARY STAR FT ORIONIS  

SciTech Connect

Accurate absolute properties are determined for the first time for the 3.15 day period eccentric eclipsing binary star FT Ori based on new absolute photometry, five differential light curves, and a radial velocity curve. The stars appear to be normal for their spectral types, A0 + A2. The orbit is highly eccentric (e = 0.409) and shows apsidal motion with a period of 536 years. The absolute properties and the degree of central mass concentration of the stars are consistent with current theoretical models at an age of 190 Myr.

Sabby, Jeffrey A. [Physics Department, Southern Illinois University Edwardsville, Edwardsville, IL 62025 (United States); Lacy, Claud H. Sandberg [Physics Department, University of Arkansas, Fayetteville, AR 72701 (United States); Ibanoglu, Cafer [Astronomy and Space Sciences Department, Science Faculty, Ege University, 35100 Boronova, Izmir (Turkey); Claret, Antonio, E-mail: jsabby@siue.edu, E-mail: clacy@uark.edu, E-mail: cafer.ibanoglu@ege.edu.tr, E-mail: claret@iaa.es [Instituto de Astrofisica de Andalucia, CSIC, Apdo. Postal 3004, E-18080 Granada (Spain)

2011-06-15T23:59:59.000Z

431

Formation of Kuiper-belt binaries through multiple chaotic scattering encounters with low-mass intruders  

E-Print Network (OSTI)

The discovery that many trans-neptunian objects exist in pairs, or binaries, is proving invaluable for shedding light on the formation, evolution and structure of the outer Solar system. Based on recent systematic searches it has been estimated that up to 10% of Kuiper-belt objects might be binaries. However, all examples discovered to-date are unusual, as compared to near-Earth and main-belt asteroid binaries, for their mass ratios of order unity and their large, eccentric orbits. In this article we propose a common dynamical origin for these compositional and orbital properties based on four-body simulations in the Hill approximation. Our calculations suggest that binaries are produced through the following chain of events: initially, long-lived quasi-bound binaries form by two bodies getting entangled in thin layers of dynamical chaos produced by solar tides within the Hill sphere. Next, energy transfer through gravitational scattering with a low-mass intruder nudges the binary into a nearby non-chaotic, stable zone of phase space. Finally, the binary hardens (loses energy) through a series of relatively gentle gravitational scattering encounters with further intruders. This produces binary orbits that are well fitted by Kepler ellipses. Dynamically, the overall process is strongly favored if the original quasi-bound binary contains comparable masses. We propose a simplified model of chaotic scattering to explain these results. Our findings suggest that the observed preference for roughly equal mass ratio binaries is probably a real effect; that is, it is not primarily due to an observational bias for widely separated, comparably bright objects. Nevertheless, we predict that a sizeable population of very unequal mass Kuiper-belt binaries is likely awaiting discovery.

Sergey A. Astakhov; Ernestine A. Lee; David Farrelly

2005-04-04T23:59:59.000Z

432

KEPLER STUDIES OF LOW-MASS ECLIPSING BINARIES. I. PARAMETERS OF THE LONG-PERIOD BINARY KIC 6131659  

SciTech Connect

KIC 6131659 is a long-period (17.5 days) eclipsing binary discovered by the Kepler mission. We analyzed six quarters of Kepler data along with supporting ground-based photometric and spectroscopic data to obtain accurate values for the mass and radius of both stars, namely, M{sub 1} = 0.922 {+-} 0.007 M{sub Sun }, R{sub 1} = 0.8800 {+-} 0.0028 R{sub Sun }, and M{sub 2} = 0.685 {+-} 0.005 M{sub Sun }, R{sub 2} = 0.6395 {+-} 0.0061 R{sub Sun }. There is a well-known issue with low-mass (M {approx}< 0.8 M{sub Sun }) stars (in cases where the mass and radius measurement uncertainties are smaller than 2% or 3%) where the measured radii are almost always 5% to 15% larger than expected from evolutionary models, i.e., the measured radii are all above the model isochrones in a mass-radius plane. In contrast, the two stars in KIC 6131659 were found to sit on the same theoretical isochrone in the mass-radius plane. Until recently, all of the well-studied eclipsing binaries with low-mass stars had periods of less than about three days. The stars in such systems may have been inflated by high levels of stellar activity induced by tidal effects in these close binaries. KIC 6131659 shows essentially no evidence of enhanced stellar activity, and our measurements support the hypothesis that the unusual mass-radius relationship observed in most low-mass stars is influenced by strong magnetic activity created by the rapid rotation of the stars in tidally locked, short-period systems. Finally, using short cadence data, we show that KIC 6131657 has one of the smallest measured non-zero eccentricities of a binary with two main-sequence stars, where ecos {omega} (4.57 {+-} 0.02) Multiplication-Sign 10{sup -5}.

Bass, Gideon; Orosz, Jerome A.; Welsh, William F.; Windmiller, Gur; Gregg, Trevor Ames; Fetherolf, Tara [Department of Astronomy, San Diego State University, 5500 Campanile Dr., San Diego, CA 92182 (United States); Wade, Richard A. [Department of Astronomy and Astrophysics, Pennsylvania State University, 525 Davey Lab, University Park, PA 16802 (United States); Quinn, Samuel N. [Department of Physics and Astronomy, Georgia State University, P.O. Box 4106, Atlanta, GA 30302 (United States)

2012-12-20T23:59:59.000Z

433

Formation and destruction of jets in X-ray binaries  

E-Print Network (OSTI)

Neutron-star and black-hole X-ray binaries (XRBs) exhibit radio jets, whose properties depend on the X-ray spectral state and history of the source. In particular, black-hole XRBs emit compact, steady radio jets when they are in the so-called hard state, the jets become eruptive as the sources move toward the soft state, disappear in the soft state, and re-appear when the sources return to the hard state. On the other hand, jets from neutron-star X-ray binaries are typically weaker radio emitters than the black-hole ones at the same X-ray luminosity and in some cases radio emission is detected in the soft state. Significant phenomenology has been accumulated so far regarding the spectral states of neutron-star and black-hole XRBs, and there is general agreement about the type of the accretion disk around the compact object in the various spectral states. Our aim is to investigate whether the phenomenology regarding the X-ray emission on one hand and the jet appearance and disappearance on the other can be put...

Kylafis, N D; Kazanas, D; Christodoulou, D M

2011-01-01T23:59:59.000Z

434

Spin Flips and Precession in Black-Hole-Binary Mergers  

E-Print Network (OSTI)

We use the `moving puncture' approach to perform fully non-linear evolutions of spinning quasi-circular black-hole binaries with individual spins not aligned with the orbital angular momentum. We evolve configurations with the individual spins (parallel and equal in magnitude) pointing in the orbital plane and 45-degrees above the orbital plane. We introduce a technique to measure the spin direction and track the precession of the spin during the merger, as well as measure the spin flip in the remnant horizon. The former configuration completes 1.75 orbits before merging, with the spin precessing by 98-degrees and the final remnant horizon spin flipped by ~72-degrees with respect to the component spins. The latter configuration completes 2.25 orbits, with the spins precessing by 151-degrees and the final remnant horizon spin flipped ~34-degrees with respect to the component spins. These simulations show for the first time how the spins are reoriented during the final stage of binary black hole mergers verifying the hypothesis of the spin-flip phenomenon. We also compute the track of the holes before merger and observe a precession of the orbital plane with frequency similar to the orbital frequency and amplitude increasing with time.

Manuela Campanelli; Carlos O. Lousto; Yosef Zlochower; Badri Krishnan; David Merritt

2006-12-13T23:59:59.000Z

435

Numerical Relativity meets Data Analysis: Spinning Binary Black Hole Case  

E-Print Network (OSTI)

We present a study of the gravitational waveforms from a series of spinning, equal-mass black hole binaries focusing on the harmonic content of the waves and the contribution of the individual harmonics to the signal-to-noise ratio. The gravitational waves were produced from two series of evolutions with black holes of initial spins equal in magnitude and anti-aligned with each other. In one series the magnitude of the spin is varied; while in the second, the initial angle between the black-hole spins and the orbital angular momentum varies. We also conduct a preliminary investigation into using these waveforms as templates for detecting spinning binary black holes. Since these runs are relativity short, containing about two to three orbits, merger and ringdown, we limit our study to systems of total mass greater than 50 solar masses. This choice ensures that our waveforms are present in the ground-based detector band without needing addition gravitational wave cycles. We find that while the mode contribution to the signal-to-noise ratio varies with the initial angle, the total mass of the system caused greater variations in the match.

Deirdre Shoemaker; Birjoo Vaishnav; Ian Hinder; Frank Herrmann

2008-02-29T23:59:59.000Z

436

The Orientation of the Eta Carinae Binary System  

E-Print Network (OSTI)

We examine a variety of observations that shed light on the orientation of the semi-major axis of the Eta Carinae massive binary system. Under several assumptions we study the following observations: The Doppler shifts of some He I P-Cygni lines that is attributed to the secondary's wind, of one Fe II line that is attributed to the primary's wind, and of the Paschen emission lines which are attributed to the shocked primary's wind, are computed in our model and compared with observations. We compute the hydrogen column density toward the binary system in our model, and find a good agreement with that deduced from X-ray observations. We calculate the ionization of surrounding gas blobs by the radiation of the hotter secondary star, and compare with observations of a highly excited [Ar III] narrow line. We find that all of these support an orientation where for most of the time the secondary - the hotter less massive star - is behind the primary star. The secondary comes closer to the observer only for a short time near periastron passage, in its highly eccentric (e~0.9) orbit. Further supporting arguments are also listed, followed by discussion of some open and complicated issues.

Amit Kashi; Noam Soker

2008-06-26T23:59:59.000Z

437

Interruption of Tidal Disruption Flares By Supermassive Black Hole Binaries  

E-Print Network (OSTI)

Supermassive black hole binaries (SMBHBs) are products of galaxy mergers, and are important in testing Lambda cold dark matter cosmology and locating gravitational-wave-radiation sources. A unique electromagnetic signature of SMBHBs in galactic nuclei is essential in identifying the binaries in observations from the IR band through optical to X-ray. Recently, the flares in optical, UV, and X-ray caused by supermassive black holes (SMBHs) tidally disrupting nearby stars have been successfully used to observationally probe single SMBHs in normal galaxies. In this Letter, we investigate the accretion of the gaseous debris of a tidally disrupted star by a SMBHB. Using both stability analysis of three-body systems and numerical scattering experiments, we show that the accretion of stellar debris gas, which initially decays with time $\\propto t^{-5/3}$, would stop at a time $T_{\\rm tr} \\simeq \\eta T_{\\rm b}$. Here, $\\eta \\sim0.25$ and $T_{\\rm b}$ is the orbital period of the SMBHB. After a period of interruption, the accretion recurs discretely at time $T_{\\rm r} \\simeq \\xi T_b$, where $\\xi \\sim 1$. Both $\\eta$ and $\\xi$ sensitively depend on the orbital parameters of the tidally disrupted star at the tidal radius and the orbit eccentricity of SMBHB. The interrupted accretion of the stellar debris gas gives rise to an interrupted tidal flare, which could be used to identify SMBHBs in non-active galaxies in the upcoming transient surveys.

F. K. Liu; S. Li; Xian Chen

2009-10-21T23:59:59.000Z

438

FORMATION OF STABLE MAGNETARS FROM BINARY NEUTRON STAR MERGERS  

Science Conference Proceedings (OSTI)

By performing fully general relativistic magnetohydrodynamic simulations of binary neutron star mergers, we investigate the possibility that the end result of the merger is a stable magnetar. In particular, we show that, for a binary composed of two equal-mass neutron stars (NSs) of gravitational mass M {approx} 1.2 M{sub Sun} and equation of state similar to Shen et al. at high densities, the merger product is a stable NS. Such NS is found to be differentially rotating and ultraspinning with spin parameter J/M{sup 2} {approx} 0.86, where J is its total angular momentum, and it is surrounded by a disk of Almost-Equal-To 0.1 M{sub Sun }. While in our global simulations the magnetic field is amplified by about two orders of magnitude, local simulations have shown that hydrodynamic instabilities and the onset of the magnetorotational instability could further increase the magnetic field strength up to magnetar levels. This leads to the interesting possibility that, for some NS mergers, a stable and magnetized NS surrounded by an accretion disk could be formed. We discuss the impact of these new results for the emission of electromagnetic counterparts of gravitational wave signals and for the central engine of short gamma-ray bursts.

Giacomazzo, Bruno [JILA, University of Colorado and National Institute of Standards and Technology, Boulder, CO 80309 (United States); Perna, Rosalba [JILA and Department of Astrophysical and Planetary Sciences, University of Colorado, Boulder, CO 80309 (United States)

2013-07-10T23:59:59.000Z

439

Pairing Functions, Boolean Evaluation and Binary Decision Diagrams  

E-Print Network (OSTI)

A ``pairing function'' J associates a unique natural number z to any two natural numbers x,y such that for two ``unpairing functions'' K and L, the equalities K(J(x,y))=x, L(J(x,y))=y and J(K(z),L(z))=z hold. Using pairing functions on natural number representations of truth tables, we derive an encoding for Binary Decision Diagrams with the unique property that its boolean evaluation faithfully mimics its structural conversion to a a natural number through recursive application of a matching pairing function. We then use this result to derive {\\em ranking} and {\\em unranking} functions for BDDs and reduced BDDs. The paper is organized as a self-contained literate Prolog program, available at \\url{http://logic.csci.unt.edu/tarau/research/2008/pBDD.zip}. {\\em Keywords:} logic programming and computational mathematics, pairing/unpairing functions, encodings of boolean functions, binary decision diagrams, natural number representations of truth tables

Tarau, Paul

2008-01-01T23:59:59.000Z

440

Running with Java  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC Powering Scientific Discovery Since 1974 Login Site Map | My NERSC search... Go Home About Overview NERSC Mission Contact us Staff Org Chart NERSC History NERSC Stakeholders...

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Keyword programming in Java  

E-Print Network (OSTI)

Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of unordered keywords provided by the user into a valid expression. ...

Little, Danny Greg

442

Stripes ordering in self-stratification experiments of binary and ternary granular mixtures  

E-Print Network (OSTI)

The self-stratification of binary and ternary granular mixtures has been experimentally investigated. Ternary mixtures lead to a particular ordering of the strates which was not accounted for in former explanations. Bouncing grains are found to have an important effect on strate formation. A complementary mechanism for self-stratification of binary and ternary granular mixtures is proposed.

N. Lecocq; N. Vandewalle

2000-04-25T23:59:59.000Z

443

WIND TOMOGRAPHY IN BINARY SYSTEMS O.Knill, R.Dgani and M.Vogel  

E-Print Network (OSTI)

WIND TOMOGRAPHY IN BINARY SYSTEMS O.Knill, R.Dgani and M.Vogel ETH-Zurich, CH-8092, Switzerland method is particularly suitable for determining the velocity laws of stellar winds. 1. WIND TOMOGRAPHY AND ABEL'S INTEGRAL Binary systems in which a compact, point-like radiation source shines through the wind

Knill, Oliver

444

Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms  

Science Conference Proceedings (OSTI)

We explore fundamental performance limits of tracking a target in a two-dimensional field of binary proximity sensors, and design algorithms that attain those limits. In particular, using geometric and probabilistic analysis of an idealized model, we ... Keywords: binary sensing, distributed algorithms, fundamental limits, sensor networks, target tracking

N. Shrivastava; R. Mudumbai U. Madhow; S. Suri

2006-10-01T23:59:59.000Z

445

Hardware/Software Partitioning of Software Binaries: A Case Study of H.264 Decode  

E-Print Network (OSTI)

Hardware/Software Partitioning of Software Binaries: A Case Study of H.264 Decode Greg Stitt whether new techniques for hardware/software partitioning of an application's binary are competitive-return, function specialization, algorithmic specialization, hardware-targeted reimplementation, global array

Vahid, Frank

446

A dual binary image watermarking based on wavelet domain and pixel distribution features  

Science Conference Proceedings (OSTI)

Considering that the binary images are featured little capability in data hiding, difficulty in watermarking embedding and two values, in order to improve the robustness and invisibility of watermarkings embedded into the binary images, a novel algorithm ... Keywords: DWT, pixel distribution features, virtual watermarking, watermarking restoration

Wei Xia; Hongwei Lu; Yizhu Zhao

2010-01-01T23:59:59.000Z

447

An Integrated Sequence Construction of Binary Zero-Correlation Zone Sequences  

Science Conference Proceedings (OSTI)

The present paper introduces an integrated construction of binary sequences having a zero-correlation zone. The cross-correlation function and the side-lobe of the auto-correlation function of the proposed sequence set is zero for the phase shifts within ... Keywords: Hadamard matrix, binary sequence, mutually orthogonal complementary sets, sequence design, zero-correlation zone

Takafumi Hayashi

2007-10-01T23:59:59.000Z

448

Heber Binary-Cycle Geothermal Demonstration Power Plant, Half-Load Testing, Performance, and Thermodynamics  

Science Conference Proceedings (OSTI)

In its second year of operation, the Heber binary-cycle geothermal demonstration plant met design expectations for part-load operation. The plant, located in Heber, California, also demonstrated the environmental acceptability and design thermodynamic performance capabilities of the binary-cycle process.

1988-08-01T23:59:59.000Z

449

Coordinated controller tuning of a boiler turbine unit with new binary particle swarm optimization algorithm  

Science Conference Proceedings (OSTI)

Coordinated controller tuning of the boiler turbine unit is a challenging task due to the nonlinear and coupling characteristics of the system. In this paper, a new variant of binary particle swarm optimization (PSO) algorithm, called probability based ... Keywords: Coordinated control, boiler turbine unit, controller tuning, particle swarm optimization (PSO), probability based binary particle swarm optimization (PBPSO)

Muhammad Ilyas Menhas; Ling Wang; Min-Rui Fei; Cheng-Xi Ma

2011-05-01T23:59:59.000Z

450

New fast binary pyramid motion estimation for MPEG2 and HDTV encoding  

Science Conference Proceedings (OSTI)

A novel fast binary pyramid motion estimation (FBPME) algorithm is presented in this paper. The proposed FBPME scheme is based on binary multiresolution layers, exclusive-or (XOR) Boolean block matching, and a N-scale tiling search scheme. Each video ...

Xudong Song; Tihao Chiang; Xiaobing Lee; Ya-Qin Zhang

2000-10-01T23:59:59.000Z

451

On application of multi-rooted binary decision diagrams to probabilistic model checking  

Science Conference Proceedings (OSTI)

In this paper we consider the applicability of multi-rooted binary decision diagrams for the probabilistic model checking. The symbolic probabilistic model checking involves manipulation of functions and matrices with the values in [0,1], and multi-terminal ... Keywords: binary decision diagrams, probabilistic model checking

Dmitry Bugaychenko

2012-01-01T23:59:59.000Z

452

A wavelet-tree-based watermarking method using distance vector of binary cluster  

Science Conference Proceedings (OSTI)

This paper proposes a wavelet-tree-based watermarking method using distance vector of binary cluster for copyright protection. In the proposed method, wavelet trees are classified into two clusters using the distance vector to denote binary watermark ... Keywords: Blind watermarking method, Copyright protection, Distance vector, Significant coefficient, Watermark, Wavelet tree

Wei-Hung Lin; Yuh-Rau Wang; Shi-Jinn Horng

2009-08-01T23:59:59.000Z

453

Calibration of Modulation Transfer Function of Surface Profilometers with 1D and 2D Binary Pseudo-random Array Standards  

E-Print Network (OSTI)

Pseudo-random Grating Standard for Calibration of SurfaceBinary Pseudorandom Grating as a Standard Test Surface for2D Binary Pseudo-random Array Standards Valeriy V. Yashchuk,

Yashchuk, Valeriy V.

2009-01-01T23:59:59.000Z

454

Binary Homogeneous Nucleation: Temperature and Relative Humidity Fluctuations, Nonlinearity, and Aspects of New Particle Production in the Atmosphere  

Science Conference Proceedings (OSTI)

Binary homogeneous nucleation of sulfuric acid and water vapor is thought to be the primary source of new particles in the marine atmosphere. The rate of binary homogeneous nucleation depends strongly on temperature and the gas-phase ...

Richard C. Easter; Leonard K. Peters

1994-07-01T23:59:59.000Z

455

Short Gamma Ray Bursts as possible electromagnetic counterpart of coalescing binary systems  

E-Print Network (OSTI)

Coalescing binary systems, consisting of two collapsed objects, are among the most promising sources of high frequency gravitational waves signals detectable, in principle, by ground-based interferometers. Binary systems of Neutron Star or Black Hole/Neutron Star mergers should also give rise to short Gamma Ray Bursts, a subclass of Gamma Ray Bursts. Short-hard-Gamma Ray Bursts might thus provide a powerful way to infer the merger rate of two-collapsed object binaries. Under the hypothesis that most short Gamma Ray Bursts originate from binaries of Neutron Star or Black Hole/Neutron Star mergers, we outline here the possibility to associate short Gamma Ray Bursts as electromagnetic counterpart of coalescing binary systems.

S. Capozziello; M. De Laurentis; I. De Martino; M. Formisano

2010-04-27T23:59:59.000Z

456

A Massive Pulsar in a Compact Relativistic Binary  

E-Print Network (OSTI)

Many physically motivated extensions to general relativity (GR) predict significant deviations in the properties of spacetime surrounding massive neutron stars. We report the measurement of a 2.01 +/- 0.04 solar mass pulsar in a 2.46-hr orbit with a 0.172 +/- 0.003 solar mass white dwarf. The high pulsar mass and the compact orbit make this system a sensitive laboratory of a previously untested strong-field gravity regime. Thus far, the observed orbital decay agrees with GR, supporting its validity even for the extreme conditions present in the system. The resulting constraints on deviations support the use of GR-based templates for ground-based gravitational wave detectors. Additionally, the system strengthens recent constraints on the properties of dense matter and provides insight to binary stellar astrophysics and pulsar recycling.

John Antoniadis; Paulo C. C. Freire; Norbert Wex; Thomas M. Tauris; Ryan S. Lynch; Marten H. van Kerkwijk; Michael Kramer; Cees Bassa; Vik S. Dhillon; Thomas Driebe; Jason W. T. Hessels; Victoria M. Kaspi; Vladislav I. Kondratiev; Norbert Langer; Thomas R. Marsh; Maura A. McLaughlin; Timothy T. Pennucci; Scott M. Ransom; Ingrid H. Stairs; Joeri van Leeuwen; Joris P. W. Verbiest; David G. Whelan

2013-04-25T23:59:59.000Z

457

ABSOLUTE PROPERTIES OF THE ECLIPSING BINARY STAR V335 SERPENTIS  

SciTech Connect

V335 Ser is now known to be an eccentric double-lined A1+A3 binary star with fairly deep (0.5 mag) partial eclipses. Previous studies of the system are improved with 7456 differential photometric observations from the URSA WebScope and 5666 from the NFO WebScope, and 67 high-resolution spectroscopic observations from the Tennessee State University 2 m automatic spectroscopic telescope. From dates of minima, the apsidal period is about 880 years. Accurate (better than 2%) masses and radii are determined from analysis of the two new light curves and the radial velocity curve. Theoretical models match the absolute properties of the stars at an age of about 380 Myr, though the age agreement for the two components is poor. Tidal theory correctly confirms that the orbit should still be eccentric, but we find that standard tidal theory is unable to match the observed asynchronous rotation rates of the components' surface layers.

Lacy, Claud H. Sandberg [Physics Department, University of Arkansas, Fayetteville, AR 72701 (United States); Fekel, Francis C. [Center of Excellence in Information Systems, Tennessee State University, Nashville, TN 37209 (United States); Claret, Antonio, E-mail: clacy@uark.edu, E-mail: fekel@evans.tsuniv.edu, E-mail: claret@iaa.es [Instituto de Astrofisica de Andalucia, CSIC, Apdo. Postal 3004, E-18080 Granada (Spain)

2012-08-15T23:59:59.000Z

458

Beowawe Bottoming Binary Unit - Final Technical Report for EE0002856  

SciTech Connect

This binary plant is the first high-output refrigeration based waste heat recovery cycle in the industry. Its working fluid is environmentally friendly and as such, the permits that would be required with a butane based cycle are not necessary. The unit is modularized, meaning that the unit’s individual skids were assembled in another location and were shipped via truck to the plant site. This project proves the technical feasibility of using low temperature brine The development of the unit led to the realization of low temperature, high output, and environmentally friendly heat recovery systems through domestic research and engineering. The project generates additional renewable energy for Nevada, resulting in cleaner air and reduced carbon dioxide emissions. Royalty and tax payments to governmental agencies will increase, resulting in reduced financial pressure on local entities. The major components of the unit were sourced from American companies, resulting in increased economic activity throughout the country.

McDonald, Dale Edward

2013-02-12T23:59:59.000Z

459

Chemical phase separation in binary iron-chromium alloys  

Science Conference Proceedings (OSTI)

A study of chromium-enriched domain growth occurring binary Fe-Cr alloys quenched from above to various temperatures within the miscibility gap has been made. We present kinetic sequences of in- situ small angle neutron scattering (SANS) data for aging times up to 75 hours on alloys containing 20, 30, and 40 atomic percent chromium. The SANS measurements are compared with partial structure functions obtained from computer simulations performed on a distributed array processor (DAP). We use a pair-potential lattice model, but simulate large systems containing up to 16 million lattice sites. We find good agreement between the scaled structure factors for our SANS data and computer simulated system. 12 refs., 4 figs.

Hawick, K.A. (Edinburgh Univ. (UK). Dept. of Physics); Epperson, J.E. (Argonne National Lab., IL (USA)); Windsor, C.G.; Rainey, V.S. (AEA Technology, London (UK))

1990-12-01T23:59:59.000Z

460

Finite-Difference Lattice Boltzmann Methods for binary fluids  

E-Print Network (OSTI)

We investigate two-fluid BGK kinetic methods for binary fluids. The developed theory works for asymmetric as well as symmetric systems. For symmetric systems it recovers Sirovich's theory and is summarized in models A and B. For asymmetric systems it contributes models C, D and E which are especially useful when the total masses and/or local temperatures of the two components are greatly different. The kinetic models are discretized based on an octagonal discrete velocity model. The discrete-velocity kinetic models and the continuous ones are required to describe the same hydrodynamic equations. The combination of a discrete-velocity kinetic model and an appropriate finite-difference scheme composes a finite-difference lattice Boltzmann method. The validity of the formulated methods is verified by investigating (i) uniform relaxation processes, (ii) isothermal Couette flow, and (iii) diffusion behavior.

Aiguo Xu

2004-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Targeted coherent search for gravitational waves from compact binary coalescences  

SciTech Connect

We introduce a method for conducting a targeted, coherent search for compact binary coalescences. The search is tailored to be used as a follow-up to electromagnetic transients such as gamma-ray bursts. We derive the coherent search statistic for Gaussian detector noise and discuss the benefits of a coherent, multidetector search over coincidence methods. To mitigate the effects of nonstationary data, we introduce a number of signal consistency tests, including the null signal-to-noise ratio, amplitude consistency, and several {chi}{sup 2} tests. We demonstrate the search performance on Gaussian noise and on data from LIGO's fourth science run and verify that the signal consistency tests are capable of removing the majority of noise transients, giving the search an efficiency comparable to that achieved in Gaussian noise.

Harry, I. W.; Fairhurst, S. [School of Physics and Astronomy, Cardiff University, Queens Buildings, The Parade, Cardiff, CF24 3AA (United Kingdom)

2011-04-15T23:59:59.000Z

462

Advanced VIRGO: detector optimization for gravitational waves by inspiralling binaries  

E-Print Network (OSTI)

For future configurations, we study the relation between the abatement of the noise sources and the Signal to Noise Ratio (SNR) for coalescing binaries. Our aim is not the proposition of a new design, but an indication of where in the bandwidth or for which noise source, a noise reduction would be most efficient. We take VIRGO as the reference for our considerations, solely applicable to the inspiralling phase of a coalescing binary. Thus, only neutron stars and small black holes of few solar masses are encompassed by our analysis. The contributions to the SNR given by final merge and quasi-normal ringing are neglected. It is identified that i) the reduction in the mirror thermal noise band provides the highest gain for the SNR, when the VIRGO bandwidth is divided according to the dominant noises; ii) it exists a specific frequency at which lies the potential largest increment in the SNR, and that the enlargement of the bandwidth, where the noise is reduced, produces a shift of such optimal frequency to higher values; iii) the abatement of the pendulum thermal noise provides the largest, but modest, gain, when noise sources are considered separately. Our recent astrophysical analysis on event rates for neutron stars leads to a detection rate of one every 148 or 125 years for VIRGO and LIGO, respectively, while a recently proposed and improved, but still conservative, VIRGO configuration would provide an increase to 1.5 events per year. Instead, a bi-monthly event rate, similar to advanced LIGO, requires a 16 times gain. We analyse the 3D (pendulum, mirror, shot noises) parameter space showing how such gain could be achieved.

Alessandro D. A. M. Spallicci; Sofiane Aoudia; Jose De Freitas Pacheco; Giorgio Frossati; Tania Regimbau

2004-06-20T23:59:59.000Z

463

THE INTERACTING EARLY-TYPE BINARY V382 Cyg  

Science Conference Proceedings (OSTI)

We analyze photometric and spectroscopic data and study the orbital period of the early-type interacting binary system V382 Cyg by using all the available data. We obtain a simultaneous light and radial velocity curve solution. The derived physical parameters of the primary and secondary stellar components are M{sub 1} = 27.9(5) M{sub Sun }, M{sub 2} = 20.8(4) M{sub Sun }, R{sub 1} = 9.7(2) R{sub Sun }, R{sub 2} = 8.5(2) R{sub Sun }, log ({sub 1}/L{sub Sun }) = 5.152(20), and log (L{sub 2}/L{sub Sun }) = 4.954(19) while the separation of the components is a = 23.4 R{sub Sun }. Newly obtained parameters yield the distance of the system to be 1466(76) pc. Analyses of the mid-eclipse times indicate a period increase of dP/dt = 4.2(1) Multiplication-Sign 10{sup -7} days yr{sup -1} that can be interpreted in terms of the high-mass transfer (dM/dt 6.1(5) Multiplication-Sign 10{sup -6} M{sub Sun} yr{sup -1}) from the less massive component to the more massive component. Finally, we model the evolution of the components using non-conservative codes and discuss the results obtained. The age of the binary system is estimated to be 3.85 Myr.

Yasarsoy, B.; Yakut, K. [Department of Astronomy and Space Sciences, University of Ege, 35100 Bornova-Izmir (Turkey)

2013-01-01T23:59:59.000Z

464

Bitraker Anvil: Binary instrumentation for rapid creation of simulation and workload analysis tools  

E-Print Network (OSTI)

A wide range of ARM developers from architects, to compiler writers, to software developers, need tools to understand, analyze, and simulate program behavior. For developers to achieve high levels of system and program correctness, performance, reliability, and power efficiency these tools must be fast and customizable to the problems at hand. BitRaker Anvil is a tool building framework allowing developers to rapidly build tools to achieve these goals. BitRaker Anvil uses binary instrumentation to modify ARM binaries for the purpose of analyzing program behavior. BitRaker Anvil equips the developer with an easy to use API that allows the user to specify the particular program characteristics to analyze. Using this API, the developer can create custom tools to perform simulation or workload analysis several orders of magnitude faster than using a cycle level simulator. Prior binary instrumentation technology requires that analysis code be merged into the same binary as the code to be analyzed. A key new feature of our binary instrumentation framework is ReHost analysis, which allows an instrumented ARM binary to make calls to analysis code that is written in the native format of the desktop machine. Using this for cross-platform ARM development results in analysis that runs orders of magnitude faster while simultaneously reducing the size of the ARM binary images. 1

Brad Calder; Todd Austin; Don Yang; Timothy Sherwood; Suleyman Sair; David Newquist; Tim Cusac

2004-01-01T23:59:59.000Z

465

Merger of white dwarf-neutron star binaries: Prelude to hydrodynamic simulations in general relativity  

E-Print Network (OSTI)

White dwarf-neutron star binaries generate detectable gravitational radiation. We construct Newtonian equilibrium models of corotational white dwarf-neutron star (WDNS) binaries in circular orbit and find that these models terminate at the Roche limit. At this point the binary will undergo either stable mass transfer (SMT) and evolve on a secular time scale, or unstable mass transfer (UMT), which results in the tidal disruption of the WD. The path a given binary will follow depends primarily on its mass ratio. We analyze the fate of known WDNS binaries and use population synthesis results to estimate the number of LISA-resolved galactic binaries that will undergo either SMT or UMT. We model the quasistationary SMT epoch by solving a set of simple ordinary differential equations and compute the corresponding gravitational waveforms. Finally, we discuss in general terms the possible fate of binaries that undergo UMT and construct approximate Newtonian equilibrium configurations of merged WDNS remnants. We use these configurations to assess plausible outcomes of our future, fully relativistic simulations of these systems. If sufficient WD debris lands on the NS, the remnant may collapse, whereby the gravitational waves from the inspiral, merger, and collapse phases will sweep from LISA through LIGO frequency bands. If the debris forms a disk about the NS, it may fragment and form planets.

Vasileios Paschalidis; Morgan MacLeod; Thomas W. Baumgarte; Stuart L. Shapiro

2009-10-29T23:59:59.000Z

466

THE ROSSITER-McLAUGHLIN EFFECT FOR EXOMOONS OR BINARY PLANETS  

SciTech Connect

In this paper, we study possible signatures of binary planets or exomoons on the Rossiter-McLaughlin (R-M) effect. Our analyses show that the R-M effect for a binary planet or an exomoon during its complete transit phase can be divided into two parts. The first is the conventional one similar to the R-M effect from the transit of a single planet, of which the mass and the projected area are the combinations of the binary components; the second is caused by the orbital rotation of the binary components, which may add a sine- or linear-mode deviation to the stellar radial velocity curve. We find that the latter effect can be up to several ten m s{sup -1}. Our numerical simulations as well as analyses illustrate that the distribution and dispersion of the latter effects obtained from multiple transit events can be used to constrain the dynamical configuration of the binary planet, such as how the inner orbit of the binary planet is inclined to its orbit rotating around the central star. We find that the signatures caused by the orbital rotation of the binary components are more likely to be revealed if the two components of a binary planet have different masses and mass densities, especially if the heavy one has a high mass density and the light one has a low density. Similar signatures on the R-M effect may also be revealed in a hierarchical triple star system containing a dark compact binary and a tertiary star.

Zhuang Quntao; Gao Xun; Yu Qingjuan, E-mail: yuqj@pku.edu.cn [Kavli Institute for Astronomy and Astrophysics, and School of Physics, Peking University, Beijing 100871 (China)

2012-10-20T23:59:59.000Z

467

MERGERS OF UNEQUAL-MASS GALAXIES: SUPERMASSIVE BLACK HOLE BINARY EVOLUTION AND STRUCTURE OF MERGER REMNANTS  

SciTech Connect

Galaxy centers are residing places for supermassive black holes (SMBHs). Galaxy mergers bring SMBHs close together to form gravitationally bound binary systems, which, if able to coalesce in less than a Hubble time, would be one of the most promising sources of gravitational waves (GWs) for the Laser Interferometer Space Antenna. In spherical galaxy models, SMBH binaries stall at a separation of approximately 1 pc, leading to the 'final parsec problem' (FPP). On the other hand, it has been shown that merger-induced triaxiality of the remnant in equal-mass mergers is capable of supporting a constant supply of stars on the so-called centrophilic orbits that interact with the binary and thus avoid the FPP. In this paper, using a set of direct N-body simulations of mergers of initially spherically symmetric galaxies with different mass ratios, we show that the merger-induced triaxiality is also able to drive unequal-mass SMBH binaries to coalescence. The binary hardening rates are high and depend only weakly on the mass ratios of SMBHs for a wide range of mass ratios q. There is, however, an abrupt transition in the hardening rates for mergers with mass ratios somewhere between q {approx} 0.05 and 0.1, resulting from the monotonic decrease of merger-induced triaxiality with mass ratio q, as the secondary galaxy becomes too small and light to significantly perturb the primary, i.e., the more massive one. The hardening rates are significantly higher for galaxies having steep cusps in comparison with those having shallow cups at centers. The evolution of the binary SMBH leads to relatively shallower inner slopes at the centers of the merger remnants. The stellar mass displaced by the SMBH binary on its way to coalescence is {approx}1-5 times the combined mass of binary SMBHs. The coalescence timescales for SMBH binary with mass {approx}10{sup 6} M{sub Sun} are less than 1 Gyr and for those at the upper end of SMBH masses 10{sup 9} M{sub Sun} are 1-2 Gyr for less eccentric binaries whereas they are less than 1 Gyr for highly eccentric binaries. SMBH binaries are thus expected to be promising sources of GWs at low and high redshifts.

Khan, Fazeel Mahmood; Preto, Miguel; Berentzen, Ingo; Just, Andreas [Astronomisches Rechen-Institut, Zentrum fuer Astronomie, University of Heidelberg, Moenchhof-Strasse 12-14, 69120 Heidelberg (Germany); Berczik, Peter; Spurzem, Rainer [National Astronomical Observatories of China, Chinese Academy of Sciences, 20A Datun Rd., Chaoyang District, 100012 Beijing (China)

2012-04-20T23:59:59.000Z

468

APSIDAL MOTION OF THE ECLIPSING BINARY AS CAMELOPARDALIS: DISCREPANCY RESOLVED  

SciTech Connect

We present a spectroscopic study of the eclipsing binary system AS Camelopardalis, the first such study based on phase-resolved CCD echelle spectra. Via a spectral disentangling analysis we measure the minimum masses of the stars to be M{sub A}sin {sup 3} i = 3.213 {+-} 0.032 M{sub sun} and M{sub B}sin {sup 3} i = 2.323 {+-} 0.032 M{sub sun}, their effective temperatures to be T{sub eff}(A) = 12, 840 {+-} 120 K and T{sub eff}(B) = 10, 580 {+-} 240 K, and their projected rotational velocities to be v{sub A}sin i{sub A} = 14.5 {+-} 0.1 km s{sup -1} and v{sub B}sin i{sub B} {<=} 4.6 {+-} 0.1 km s{sup -1}. These projected rotational velocities appear to be much lower than the synchronous values. We show that measurements of the apsidal motion of the system suffer from a degeneracy between orbital eccentricity and apsidal motion rate. We use our spectroscopically measured e = 0.164 {+-} 0.004 to break this degeneracy and measure {omega}-dot{sub obs} = 0{sup 0}.133{+-}0{sup 0}.010 yr{sup -1}. Subtracting the relativistic contribution of {omega}-dot{sub GR} = 0{sup 0}.0963{+-}0{sup 0}0002 yr{sup -1} yields the contribution due to tidal torques: {omega}-dot{sub cl} = 0{sup 0}.037{+-}0{sup 0}.010 yr{sup -1}. This value is much smaller than the rate predicted by stellar theory, 0.{sup 0}40-0.{sup 0}87 yr{sup -1}. We interpret this as a misalignment between the orbital axis of the close binary and the rotational axes of its component stars, which also explains their apparently low rotational velocities. The observed and predicted apsidal motion rates could be brought into agreement if the stars were rotating three times faster than synchronous about axes perpendicular to the orbital axis. Measurement of the Rossiter-McLaughlin effect can be used to confirm this interpretation.

Pavlovski, K.; Kolbas, V. [Department of Physics, Faculty of Sciences, University of Zagreb, Zagreb (Croatia); Southworth, J. [Astrophysics Group, Keele University, Staffordshire, ST5 5BG (United Kingdom)

2011-06-20T23:59:59.000Z

469

Supercomputers Crack Sixty-Trillionth Binary Digit of Pi-Squared |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Supercomputers Crack Sixty-Trillionth Binary Digit of Pi-Squared Supercomputers Crack Sixty-Trillionth Binary Digit of Pi-Squared Supercomputers Crack Sixty-Trillionth Binary Digit of Pi-Squared April 28, 2011 - 11:28am Addthis David H. Bailey | Photo Courtesy of Lawrence Berkely National Lab David H. Bailey | Photo Courtesy of Lawrence Berkely National Lab Linda Vu What are the key facts? Australian researchers have found the sixty-trillionth binary digit of Pi-squared. The calculation would have taken a single computer processor unit (CPU) 1,500 years to calculate, but it took just a few months on IBM's "BlueGene/P" supercomputer, which is designed to run continuously at one quadrillion calculations per second. Pi is one of the most mysterious numbers in mathematics and can never be expressed as a finite decimal number -- humanity will never have

470

Precession-tracking coordinates for simulations of compact-object-binaries  

E-Print Network (OSTI)

Binary black hole simulations with black hole excision using spectral methods require a coordinate transformation into a co-rotating coordinate system where the black holes are essentially at rest. This paper presents and discusses two coordinate transformations that are applicable to precessing binary systems, one based on Euler angles, the other on quaternions. Both approaches are found to work well for binaries with moderate precession, i.e. for cases where the orientation of the orbital plane changes by much less than 90 degrees. For strong precession, performance of the Euler-angle parameterization deteriorates, eventually failing for a 90 degree change in orientation because of singularities in the parameterization ("gimbal lock"). In contrast, the quaternion representation is invariant under an overall rotation, and handles any orientation of the orbital plane as well as the Euler-angle technique handles non-precessing binaries.

Serguei Ossokine; Lawrence E. Kidder; Harald P. Pfeiffer

2013-04-10T23:59:59.000Z

471

Search for gravitational waves from binary black hole inspiral, merger and ringdown  

E-Print Network (OSTI)

We present the first modeled search for gravitational waves using the complete binary black hole gravitational waveform from inspiral through the merger and ringdown for binaries with negligible component spin. We searched approximately 2 years of LIGO data taken between November 2005 and September 2007 for systems with component masses of 1-99 solar masses and total masses of 25-100 solar masses. We did not detect any plausible gravitational-wave signals but we do place upper limits on the merger rate of binary black holes as a function of the component masses in this range. We constrain the rate of mergers for binary black hole systems with component masses between 19 and 28 solar masses and negligible spin to be no more than 2.0 per Mpc^3 per Myr at 90% confidence.

The LIGO Scientific Collaboration; the Virgo Collaboration; J. Abadie; B. P. Abbott; R. Abbott; M. Abernathy; T. Accadia; F. Acernese; C. Adams; R. Adhikari; P. Ajith; B. Allen; G. S. Allen; E. Amador Ceron; R. S. Amin; S. B. Anderson; W. G. Anderson; F. Antonucci; M. A. Arain; M. C. Araya; M. Aronsson; Y. Aso; S. M. Aston; P. Astone; D. Atkinson; P. Aufmuth; C. Aulbert; S. Babak; P. Baker; G. Ballardin; T. Ballinger; S. Ballmer; D. Barker; S. Barnum; F. Barone; B. Barr; P. Barriga; L. Barsotti; M. Barsuglia; M. A. Barton; I. Bartos; R. Bassiri; M. Bastarrika; J. Bauchrowitz; Th. S. Bauer; B. Behnke; M. G. Beker; A. Belletoile; M. Benacquista; A. Bertolini; J. Betzwieser; N. Beveridge; P. T. Beyersdorf; I. A. Bilenko; G. Billingsley; J. Birch; S. Birindelli; R. Biswas; M. Bitossi; M. A. Bizouard; E. Black; J. K. Blackburn; L. Blackburn; D. Blair; B. Bland; M. Blom; C. Boccara; O. Bock; T. P. Bodiya; R. Bondarescu; F. Bondu; L. Bonelli; R. Bonnand; R. Bork; M. Born; V. Boschi; S. Bose; L. Bosi; B. Bouhou; M. Boyle; S. Braccini; C. Bradaschia; P. R. Brady; V. B. Braginsky; J. E. Brau; J. Breyer; D. O. Bridges; A. Brillet; M. Brinkmann; V. Brisson; M. Britzger; A. F. Brooks; D. A. Brown; R. Budzy?ski; T. Bulik; H. J. Bulten; A. Buonanno; J. Burguet-Castell; O. Burmeister; D. Buskulic; C. Buy; R. L. Byer; L. Cadonati; G. Cagnoli; J. Cain; E. Calloni; J. B. Camp; E. Campagna; P. Campsie; J. Cannizzo; K. Cannon; B. Canuel; J. Cao; C. Capano; F. Carbognani; S. Caride; S. Caudill; M. Cavaglia`; F. Cavalier; R. Cavalieri; G. Cella; C. Cepeda; E. Cesarini; O. Chaibi; T. Chalermsongsak; E. Chalkley; P. Charlton; E. Chassande-Mottin; S. Chelkowski; Y. Chen; A. Chincarini; N. Christensen; S. S. Y. Chua; C. T. Y. Chung; D. Clark; J. Clark; J. H. Clayton; F. Cleva; E. Coccia; C. N. Colacino; J. Colas; A. Colla; M. Colombini; R. Conte; D. Cook; T. R. Corbitt; N. Cornish; A. Corsi; C. A. Costa; J. -P. Coulon; D. M. Coward; D. C. Coyne; J. D. E. Creighton; T. D. Creighton; A. M. Cruise; R. M. Culter; A. Cumming; L. Cunningham; E. Cuoco; K. Dahl; S. L. Danilishin; R. Dannenberg; S. D'Antonio; K. Danzmann; K. Das; V. Dattilo; B. Daudert; M. Davier; G. Davies; A. Davis; E. J. Daw; R. Day; T. Dayanga; R. De Rosa; D. DeBra; G. Debreczeni; J. Degallaix; M. del Prete; V. Dergachev; R. DeRosa; R. DeSalvo; P. Devanka; S. Dhurandhar; L. Di Fiore; A. Di Lieto; I. Di Palma; M. Di Paolo Emilio; A. Di Virgilio; M. Díaz; A. Dietz; F. Donovan; K. L. Dooley; E. E. Doomes; S. Dorsher; E. S. D. Douglas; M. Drago; R. W. P. Drever; J. C. Driggers; J. Dueck; J. -C. Dumas; T. Eberle; M. Edgar; M. Edwards; A. Effler; P. Ehrens; G. Ely; R. Engel; T. Etzel; M. Evans; T. Evans; V. Fafone; S. Fairhurst; Y. Fan; B. F. Farr; D. Fazi; H. Fehrmann; D. Feldbaum; I. Ferrante; F. Fidecaro; L. S. Finn; I. Fiori; R. Flaminio; M. Flanigan; K. Flasch; S. Foley; C. Forrest; E. Forsi; L. A. Forte; N. Fotopoulos; J. -D. Fournier; J. Franc; S. Frasca; F. Frasconi; M. Frede; M. Frei; Z. Frei; A. Freise; R. Frey; T. T. Fricke; D. Friedrich; P. Fritschel; V. V. Frolov; P. Fulda; M. Fyffe; M. Galimberti; L. Gammaitoni; J. A. Garofoli; F. Garufi; M. E. Gáspár; G. Gemme; E. Genin; A. Gennai; I. Gholami; S. Ghosh; J. A. Giaime; S. Giampanis; K. D. Giardina; A. Giazotto; C. Gill; E. Goetz; L. M. Goggin; G. González; M. L. Gorodetsky; S. Goßler; R. Gouaty; C. Graef; M. Granata; A. Grant; S. Gras; C. Gray; R. J. S. Greenhalgh; A. M. Gretarsson; C. Greverie; R. Grosso; H. Grote; S. Grunewald; G. M. Guidi; E. K. Gustafson; R. Gustafson; B. Hage; P. Hall; J. M. Hallam; D. Hammer; G. Hammond; J. Hanks; C. Hanna; J. Hanson; J. Harms; G. M. Harry; I. W. Harry; E. D. Harstad; K. Haughian; K. Hayama; J. -F. Hayau; T. Hayler; J. Heefner; H. Heitmann; P. Hello; I. S. Heng; A. W. Heptonstall; M. Hewitson; S. Hild; E. Hirose; D. Hoak; K. A. Hodge; K. Holt; D. J. Hosken; J. Hough; E. J. Howell; D. Hoyland; D. Huet; B. Hughey; S. Husa; S. H. Huttner; T. Huynh-Dinh; D. R. Ingram; R. Inta; T. Isogai; A. Ivanov; P. Jaranowski; W. W. Johnson; D. I. Jones; G. Jones; R. Jones; L. Ju; P. Kalmus; V. Kalogera; S. Kandhasamy; J. B. Kanner; E. Katsavounidis; K. Kawabe; S. Kawamura; F. Kawazoe; W. Kells; D. G. Keppel; A. Khalaidovski; F. Y. Khalili; E. A. Khazanov; H. Kim; P. J. King; D. L. Kinzel; J. S. Kissel; S. Klimenko; V. Kondrashov; R. Kopparapu; S. Koranda; I. Kowalska; D. Kozak; T. Krause; V. Kringel; S. Krishnamurthy; B. Krishnan; A. Królak; G. Kuehn; J. Kullman; R. Kumar; P. Kwee; M. Landry; M. Lang; B. Lantz; N. Lastzka; A. Lazzarini; P. Leaci; J. Leong; I. Leonor; N. Leroy; N. Letendre; J. Li; T. G. F. Li; N. Liguori; H. Lin; P. E. Lindquist; N. A. Lockerbie; D. Lodhia; M. Lorenzini; V. Loriette; M. Lormand; G. Losurdo; P. Lu; J. Luan; M. Lubinski; A. Lucianetti; H. Lück; A. D. Lundgren; B. Machenschalk; M. MacInnis; M. Mageswaran; K. Mailand; E. Majorana

2011-02-18T23:59:59.000Z

472

Linking electromagnetic and gravitational radiation in coalescing binary neutron stars Carlos Palenzuela1  

E-Print Network (OSTI)

a fundamental role in the production of gamma ray bursts. These compact binary systems are also among the most model of short, hard gamma ray bursts (SGRBs) (see e.g. [2] for a review). This model envisions

Lumsdaine, Andrew

473

Searches for Gravitational Waves from Compact Binary Coalescences with the LIGO and Virgo Detectors  

Science Conference Proceedings (OSTI)

Among the most promising sources of gravitational waves for ground?based detectors are the signals emitted during the coalescence of compact binary systems containing neutron stars or black holes. In recent years

F. Marion; The LIGO Scientific Collaboration; The Virgo Collaboration

2010-01-01T23:59:59.000Z

474

Two-bit message passing decoders for LDPC codes over the binary symmetric channel  

E-Print Network (OSTI)

A class of two-bit message passing decoders for decoding column-weight-four LDPC codes over the binary symmetric channel is proposed. The thresholds for various decoders in this class are derived using density evolution. ...

Sassatelli, Lucille

475

The accretion process in neutron-star low-mass X-ray binaries  

E-Print Network (OSTI)

There had been long-standing fundamental problems in the spectral studies of accreting neutron stars (NSs) in low-mass X-ray binaries involving the X-ray spectral decomposition, the relations between subtypes (mainly atoll ...

Lin, Dacheng

2009-01-01T23:59:59.000Z

476

X-ray spectroscopy of neutron star low-mass X-ray binaries  

E-Print Network (OSTI)

In this thesis, I present work spanning a variety of topics relating to neutron star lowmass X-ray binaries (LMXBs) and utilize spectral information from X-ray observations to further our understanding of these sources. ...

Krauss, Miriam Ilana

2007-01-01T23:59:59.000Z

477

Binaries, cluster dynamics and population studies of stars and stellar phenomena  

E-Print Network (OSTI)

The effects of binaries on population studies of stars and stellar phenomena have been investigated over the past 3 decades by many research groups. Here we will focus mainly on the work that has been done recently in Brussels and we will consider the following topics: the effect of binaries on overall galactic chemical evolutionary models and on the rates of different types of supernova, the population of point-like X-ray sources where we distinguish the standard high mass X-ray binaries and the ULXs, a UFO-scenario for the formation of WR+OB binaries in dense star systems. Finally we critically discuss the possible effect of rotation on population studies.

Vanbeveren, D

2004-01-01T23:59:59.000Z

478

Binaries, cluster dynamics and population studies of stars and stellar phenomena  

E-Print Network (OSTI)

The effects of binaries on population studies of stars and stellar phenomena have been investigated over the past 3 decades by many research groups. Here we will focus mainly on the work that has been done recently in Brussels and we will consider the following topics: the effect of binaries on overall galactic chemical evolutionary models and on the rates of different types of supernova, the population of point-like X-ray sources where we distinguish the standard high mass X-ray binaries and the ULXs, a UFO-scenario for the formation of WR+OB binaries in dense star systems. Finally we critically discuss the possible effect of rotation on population studies.

D. Vanbeveren

2004-11-09T23:59:59.000Z

479

Modeling Seasonal Tropical Cyclone Activity in the Fiji Region as a Binary Classification Problem  

Science Conference Proceedings (OSTI)

This study presents a binary classification model for the prediction of tropical cyclone (TC) activity in the Fiji, Samoa, and Tonga regions (the FST region) using the accumulated cyclone energy (ACE) as a proxy of TC activity. A probit regression ...

Savin S. Chand; Kevin J. E. Walsh

2012-07-01T23:59:59.000Z

480

Binary and ternary gas mixtures for use in glow discharge closing switches  

SciTech Connect

Highly efficient binary and ternary gas mixtures for use in diffuse glow discharge closing switches are disclosed. The binary mixtures are combinations of helium or neon and selected perfluorides. The ternary mixtures are combinations of helium, neon, or argon, a selected perfluoride, and a small amount of gas that exhibits enhanced ionization characteristics. These mixtures are shown to be the optimum choices for use in diffuse glow discharge closing switches by virtue of the combined physio-electric properties of the mixture components.

Hunter, Scott R. (Oak Ridge, TN); Christophorou, Loucas G. (Oak Ridge, TN)

1990-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java binary floating-point" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

GAMMA-RAY BURSTS FROM NEUTRON STAR BINARIES  

E-Print Network (OSTI)

We report on general relativistic hydrodynamic studies which indicate several new physical processes which may contribute to powering gamma-ray bursts in neutron star binaries. Relativistically driven compression, heating, and collapse of the individual stars can occur many seconds before inspiral and merger. This compression may produce a neutrino burst of ? 10 53 ergs lasting several seconds. The associated thermal neutrino emission produces an e + ? e ? pair plasma by ?¯? annihilation. We show first results of a simulated burst which produces ? 10 51 erg in ?-rays. We also discuss a preliminary study of the evolution of the magnetic field lines attached to the fluid as the stars orbit. We show that the relativistically driven fluid motion might lead to the formation of extremely strong magnetic fields ( ? 10 17 gauss) in and around the stars which could affect to the formation and evolution of a gamma-ray burst. It has been speculated for some time that inspiraling neutron stars could provide a power source for cosmological gamma-ray bursts. The rate of neutron star mergers (when integrated over the number of galaxies out to high redshift) could account for the observed GRB event rate. The possibility that at least some ?-ray bursts involve

G. J. Mathews

1997-01-01T23:59:59.000Z

482

Monolithic Active Pixel Matrix with Binary Counters (MAMBO) ASIC  

SciTech Connect

Monolithic Active Matrix with Binary Counters (MAMBO) is a counting ASIC designed for detecting and measuring low energy X-rays from 6-12 keV. Each pixel contains analogue functionality implemented with a charge preamplifier, CR-RC{sup 2} shaper and a baseline restorer. It also contains a window comparator which can be trimmed by 4 bit DACs to remove systematic offsets. The hits are registered by a 12 bit ripple counter which is reconfigured as a shift register to serially output the data from the entire ASIC. Each pixel can be tested individually. Two diverse approaches have been used to prevent coupling between the detector and electronics in MAMBO III and MAMBO IV. MAMBO III is a 3D ASIC, the bottom ASIC consists of diodes which are connected to the top ASIC using {mu}-bump bonds. The detector is decoupled from the electronics by physically separating them on two tiers and using several metal layers as a shield. MAMBO IV is a monolithic structure which uses a nested well approach to isolate the detector from the electronics. The ASICs are being fabricated using the SOI 0.2 {micro}m OKI process, MAMBO III is 3D bonded at T-Micro and MAMBO IV nested well structure was developed in collaboration between OKI and Fermilab.

Khalid, Farah F.; Deptuch, Grzegorz; Shenai, Alpana; Yarema, Raymond J.; /Fermilab

2010-11-01T23:59:59.000Z

483

A burst search for gravitational waves from binary black holes  

E-Print Network (OSTI)

Compact binary coalescence (CBC) is one of the most promising sources of gravitational waves. These sources are usually searched for with matched filters which require accurate calculation of the GW waveforms and generation of large template banks. We present a complementary search technique based on algorithms used in un-modeled searches. Initially designed for detection of un-modeled bursts, which can span a very large set of waveform morphologies, the search algorithm presented here is constrained for targeted detection of the smaller subset of CBC signals. The constraint is based on the assumption of elliptical polarisation for signals received at the detector. We expect that the algorithm is sensitive to CBC signals in a wide range of masses, mass ratios, and spin parameters. In preparation for the analysis of data from the fifth LIGO-Virgo science run (S5), we performed preliminary studies of the algorithm on test data. We present the sensitivity of the search to different types of simulated CBC waveforms. Also, we discuss how to extend the results of the test run into a search over all of the current LIGO-Virgo data set.

C. Pankow; S. Klimenko; G. Mitselmakher; I. Yakushin; G. Vedovato; M. Drago; R. A. Mercer; P. Ajith

2009-05-19T23:59:59.000Z

484

SUPERMASSIVE BLACK HOLE BINARY EVOLUTION IN AXISYMMETRIC GALAXIES: THE FINAL PARSEC PROBLEM IS NOT A PROBLEM  

SciTech Connect

During a galaxy merger, the supermassive black hole (SMBH) in each galaxy is thought to sink to the center of the potential and form an SMBH binary; this binary can eject stars via three-body scattering, bringing the SMBHs ever closer. In a static spherical galaxy model, the binary stalls at a separation of about a parsec after ejecting all the stars in its loss cone-this is the well-known final parsec problem. Earlier work has shown that the centrophilic orbits in triaxial galaxy models are key in refilling the loss cone at a high enough rate to prevent the black holes from stalling. However, the evolution of binary SMBHs has never been explored in axisymmetric galaxies, so it is not clear if the final parsec problem persists in these systems. Here we use a suite of direct N-body simulations to follow SMBH binary evolution in galaxy models with a range of ellipticity. For the first time, we show that mere axisymmetry can solve the final parsec problem; we find the SMBH evolution is independent of N for an axis ratio of c/a = 0.8, and that the SMBH binary separation reaches the gravitational radiation regime for c/a = 0.75.

Khan, Fazeel Mahmood [Department of Space Science, Institute of Space Technology, P.O. Box 2750 Islamabad (Pakistan); Holley-Bockelmann, Kelly [Department of Physics and Astronomy, Vanderbilt University, Nashville, TN 37235 (United States); Berczik, Peter; Just, Andreas, E-mail: khan@ari.uni-heidelberg.de, E-mail: just@ari.uni-heidelberg.de, E-mail: berczik@ari.uni-heidelberg.de, E-mail: k.holley@vanderbilt.edu [Astronomisches Rechen-Institut, Zentrum fuer Astronomie, University of Heidelberg, Moenchhof-Strasse 12-14, D-69120 Heidelberg (Germany)

2013-08-20T23:59:59.000Z

485

A Survey for Young Spectroscopic Binary K7-M4 Stars in Ophiuchus  

E-Print Network (OSTI)

This paper describes a high-resolution, infrared spectroscopic survey of young, low-mass stars designed to identify and characterize pre-main-sequence spectroscopic binaries. This is the first large infrared radial velocity survey of very young stars to date. The frequency and mass ratio distribution of the closest, low-mass binaries bear directly on models of stellar, brown dwarf, and planetary mass companion formation. Furthermore, spectroscopic binaries can provide mass ratios and ultimately masses, independent of assumptions, needed to calibrate models of young star evolution. I present the initial results from observations of a uniform sample of 33 T Tauri M stars in the Ophiuchus molecular cloud. The average mass of this sample is less than that of other young star radial velocity surveys of similar scope by a factor of ~2. Almost every star was observed at 3-4 epochs over 3 years with the 10 meter Keck II telescope and the facility infrared spectrometer NIRSPEC. An internal precision of 0.43 km/s was obtained with standard cross-correlation calibration techniques. Four of the targets are newly discovered spectroscopic binaries, one of which is located in a sub-arcsecond, hierarchical quadruple system. Three other sub-arcsecond visual binaries were also serendipitously identified during target acquisition. The spectroscopic multiplicity of the sample is comparable to that of earlier type, pre-main-sequence objects. Therefore, there is no dearth of young, low-mass spectroscopic binary stars, at least in the Ophiuchus region.

L. Prato

2006-11-20T23:59:59.000Z

486

A CCD Imaging Search for Wide Metal-Poor Binaries  

E-Print Network (OSTI)

We explored the regions within a radius of 25 arcsec around 473 nearby, low-metallicity G- to M-type stars using (VR)I optical filters and small-aperture telescopes. About 10% of the sample was searched up to angular separations of 90 arcsec. We applied photometric and astrometric techniques to detect true physical companions to the targets. The great majority of the sample stars was drawn from the Carney-Latham surveys; their metallicities range from roughly solar to [Fe/H]=-3.5 dex. Our I-band photometric survey detected objects that are between 0 and 5 mag fainter (completeness) than the target stars; the maximum dynamical range of our exploration is 9 mag. We also investigated the literature and inspected images from the Digitized Sky Surveys to complete our search. By combining photometric and proper motion measurements, we retrieved 29 previously known companions, and identified 13 new proper motion companions. Near-infrared 2MASS photometry is provided for the great majority of them. Low-resolution optical spectroscopy (386-1000 nm) was obtained for eight of the new companion stars. These spectroscopic data confirm them as cool, late-type, metal-depleted dwarfs, with spectral classes from esdK7 to sdM3. After comparison with low-metallicity evolutionary models, we estimate the masses of the proper motion companion stars to be in the range 0.5-0.1 Msol. They are orbiting their primary stars at projected separations between ~32 and ~57000 AU. These orbital sizes are very similar to those of solar-metallicity stars of the same spectral types. Our results indicate that about 15% of the metal-poor stars have stellar companions at large orbits, which is in agreement with the binary fraction observed among main sequence G- to M-type stars and T Tauri stars.

M. R. Zapatero Osorio; E. L. Martin

2004-02-12T23:59:59.000Z

487

Molecular Design of Branched and Binary Molecules at Ordered Interfaces  

SciTech Connect

This study examined five different branched molecular architectures to discern the effect of design on the ability of molecules to form ordered structures at interfaces. Photochromic monodendrons formed kinked packing structures at the air-water interface due to the cross-sectional area mismatch created by varying number of alkyl tails and the hydrophilic polar head group. The lower generations formed orthorhombic unit cell with long range ordering despite the alkyl tails tilted to a large degree. Favorable interactions between liquid crystalline terminal groups and the underlying substrate were observed to compel a flexible carbosilane dendrimer core to form a compressed elliptical conformation which packed stagger within lamellae domains with limited short range ordering. A twelve arm binary star polymer was observed to form two dimensional micelles at the air-water interface attributed to the higher polystyrene block composition. Linear rod-coil molecules formed a multitude of packing structures at the air-water interface due to the varying composition. Tree-like rod-coil molecules demonstrated the ability to form one-dimensional structures at the air-water interface and at the air-solvent interface caused by the preferential ordering of the rigid rod cores. The role of molecular architecture and composition was examined and the influence chemically competing fragments was shown to exert on the packing structure. The amphiphilic balance of the different molecular series exhibited control on the ordering behavior at the air-water interface and within bulk structures. The shell nature and tail type was determined to dictate the preferential ordering structure and molecular reorganization at interfaces with the core nature effect secondary.

Kirsten Larson Genson

2005-12-27T23:59:59.000Z

488

GALACTIC ULTRACOMPACT X-RAY BINARIES: DISK STABILITY AND EVOLUTION  

SciTech Connect

We study the mass-transfer rates and disk stability conditions of ultracompact X-ray binaries (UCXBs) using empirical time-averaged X-ray luminosities from Paper I and compiled information from the literature. The majority of UCXBs are consistent with evolutionary tracks for white dwarf donors. Three UCXBs with orbital periods longer than 40 minutes have mass-transfer rates above 10{sup -10} M{sub Sun} yr{sup -1}, inconsistent with white dwarf donor tracks. We show that if helium star donors can retain their initial high entropy, they can explain the observed mass-transfer rates of these UCXBs. Several UCXBs show persistent luminosities apparently below the disk instability limit for irradiated He accretion disks. We point out that a predominantly C and/or O disk (as observed in the optical spectra of several) lowers the disk instability limit, explaining this disagreement. The orbital period and low time-averaged mass-transfer rate of 2S 0918-549 provide evidence that the donor star is a low-entropy C/O white dwarf, consistent with optical spectra. We combine existing information to constrain the masses of the donors in 4U 1916-053 (0.064 {+-} 0.010 M{sub Sun }) and 4U 1626-67 (<0.036 M{sub Sun} for a 1.4 M{sub Sun} neutron star). We show that 4U 1626-67 is indeed persistent, and not undergoing a transient outburst, leaving He star models as the best explanation for the donor.

Heinke, C. O.; Ivanova, N.; Engel, M. C.; Pavlovskii, K.; Sivakoff, G. R.; Gladstone, J. C. [Physics Department, University of Alberta, 4-183 CCIS, Edmonton, AB T6G 2E1 (Canada); Cartwright, T. F., E-mail: heinke@ualberta.ca [International Space University, 1 rue Jean-Dominique Cassini, 67400 Illkirch-Graffenstaden (France)

2013-05-10T23:59:59.000Z

489

Observational studies of stellar black hole binaries and ULXs  

E-Print Network (OSTI)

We outline a framework for understanding the X-ray spectra of high mass accretion rate stellar black holes based on X-ray data from RXTE and ASCA. Three spectral regimes can be separated out by the behaviour of the observed disk luminosity and temperature. The well established "standard regime" is seen when the disk dominates the spectrum, where only a small fraction of the luminosity is emitted in the power law tail. These spectra generally satisfy the standard relation expected for thermal emission from a constant area, namely that the disk bolometric luminosity, Ldisk, is proportional to its maximum temperature, Tin^4. However, at higher luminosities this starts to change to Tin^2. This "apparently standard regime" is still dominated by the disk emission, but this difference luminosity-temperature relation and subtle changes in spectral shape may show that another cooling process is required in addition to radiative cooling. At intermediate luminosities there is an anomalous regime (or weak very high state) where the disk temperature and luminosity are less clearly related. These spectra are characterized by the presence of a much stronger comptonized tail indicating high energy electrons. When observed disk emission is corrected for the the effects of comptonisation then these points lie back on the standard relation. The growth of this comptonising corona is also clearly linked to the quasi-periodic oscillations, as these are observed preferentially in the anomalous regime. This presented picture was found to explain the spectral behavior of both black hole binaries in our Galaxy and LMC. Spectral evolution of several bright ULXs observed with ASCA were also successfully explained in the same picture.

Aya Kubota; Kazuo Makishima

2005-07-12T23:59:59.000Z

490

Binary electrokinetic separation of target DNA from background DNA primers.  

Science Conference Proceedings (OSTI)

This report contains the summary of LDRD project 91312, titled ''Binary Electrokinetic Separation of Target DNA from Background DNA Primers''. This work is the first product of a collaboration with Columbia University and the Northeast BioDefense Center of Excellence. In conjunction with Ian Lipkin's lab, we are developing a technique to reduce false positive events, due to the detection of unhybridized reporter molecules, in a sensitive and multiplexed detection scheme for nucleic acids developed by the Lipkin lab. This is the most significant problem in the operation of their capability. As they are developing the tools for rapidly detecting the entire panel of hemorrhagic fevers this technology will immediately serve an important national need. The goal of this work was to attempt to separate nucleic acid from a preprocessed sample. We demonstrated the preconcentration of kilobase-pair length double-stranded DNA targets, and observed little preconcentration of 60 base-pair length single-stranded DNA probes. These objectives were accomplished in microdevice formats that are compatible with larger detection systems for sample pre-processing. Combined with Columbia's expertise, this technology would enable a unique, fast, and potentially compact method for detecting/identifying genetically-modified organisms and multiplexed rapid nucleic acid identification. Another competing approach is the DARPA funded IRIS Pharmaceutical TIGER platform which requires many hours for operation, and an 800k$ piece of equipment that fills a room. The Columbia/SNL system could provide a result in 30 minutes, at the cost of a few thousand dollars for the platform, and would be the size of a shoebox or smaller.

James, Conrad D.; Derzon, Mark Steven

2005-10-01T23:59:59.000Z

491

MULTIPLE INPUT BINARY ADDER EMPLOYING MAGNETIC DRUM DIGITAL COMPUTING APPARATUS  

DOE Patents (OSTI)

A digital computing apparatus is described for adding a plurality of multi-digit binary numbers. The apparatus comprises a rotating magnetic drum, a recording head, first and second reading heads disposed adjacent to the first and second recording tracks, and a series of timing signals recorded on the first track. A series of N groups of digit-representing signals is delivered to the recording head at time intervals corresponding to the timing signals, each group consisting of digits of the same significance in the numbers, and the signal series is recorded on the second track of the drum in synchronism with the timing signals on the first track. The multistage registers are stepped cyclically through all positions, and each of the multistage registers is coupled to the control lead of a separate gate circuit to open the corresponding gate at only one selected position in each cycle. One of the gates has its input coupled to the bistable element to receive the sum digit, and the output lead of this gate is coupled to the recording device. The inputs of the other gates receive the digits to be added from the second reading head, and the outputs of these gates are coupled to the adding register. A phase-setting pulse source is connected to each of the multistage registers individually to step the multistage registers to different initial positions in the cycle, and the phase-setting pulse source is actuated each N time interval to shift a sum digit to the bistable element, where the multistage register coupled to bistable element is operated by the phase- setting pulse source to that position in its cycle N steps before opening the first gate, so that this gate opens in synchronism with each of the shifts to pass the sum digits to the recording head.

Cooke-Yarborough, E.H.

1960-12-01T23:59:59.000Z

492

Modeling of Emission Signatures of Massive Black Hole Binaries: I Methods  

E-Print Network (OSTI)

We model the electromagnetic signatures of massive black hole binaries (MBHBs) with an associated gas component. The method comprise