Powered by Deep Web Technologies
Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August...

2

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of 686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August 8, 2011 - 3:00pm Addthis PROBLEM: A vulnerability in the Java Runtime Environment allows unauthenticated network attacks ( i.e. it may be exploited over a network without the need for a username and password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061 Secunia Advisory: SA45556 CVE-2010-4476 IMPACT ASSESSMENT: Medium Discussion: IBM has acknowledged a vulnerability in IBM Tivoli Integrated Portal, which can be exploited by malicious people to cause a DoS (Denial of Service).

3

T-581: Novell Access Manager Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

4

T-581: Novell Access Manager Java Double Literal Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in the 3.1.3 IR1 patch. Download the FPUpdater tool. Download and Copy to fpupdater.jar file Related References: DOE-CIRC Tech Bulletin T-558 Addthis Related Articles T-561:...

5

Kilogram/Liter  

Science Conference Proceedings (OSTI)

Kilogram/Liter. ca. 1905 NIST Museum Collection. The kilogram/liter was a hollow gold-plated brass sphere having a mass ...

6

Java XMGR  

SciTech Connect

The XMGR5 graphing package [1] for drawing RELAP5 [2] plots is being re-written in Java [3]. Java is a robust programming language that is available at no cost for most computer platforms from Sun Microsystems, Inc. XMGR5 is an extension of an XY plotting tool called ACE/gr extended to plot data from several US Nuclear Regulatory Commission (NRC) applications. It is also the most popular graphing package worldwide for making RELAP5 plots. In Section 1, a short review of XMGR5 is given, followed by a brief overview of Java. In Section 2, shortcomings of both tkXMGR [4] and XMGR5 are discussed and the value of converting to Java is given. Details of the conversion to Java are given in Section 3. The progress to date, some conclusions and future work are given in Section 4. Some screen shots of the Java version are shown.

Dr. George L. Mesina; Steven P. Miller

2004-08-01T23:59:59.000Z

7

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

8

ABBREVIATIONS: Eng Engine Volume in Liters Cyl  

NLE Websites -- All DOE Office Websites (Extended Search)

ABBREVIATIONS: Eng ........... Engine Volume in Liters Cyl ............ Number of Cylinders Cty ............ MPG on City Test Procedure Hwy .......... MPG on Highway Test Procedure Trans ........ Transmission Type Auto ......... Automatic Transmission Man .......... Manual Transmission ) ........ LPG vehicle available D ........ Ethanol vehicle available 0. ....... Electric vehicle available 5 ........ Diesel vehicle available + ....... CNG vehicle available ✔ ......... Most fuel-efficient manual or automatic per class P ............... Premium Gasoline T ............... Turbocharger/Supercharger $ ............... Subject to Gas Guzzler Tax M Mode .... Multi-mode transmission SOHC ....... Single Overhead Cam DOHC ...... Double Overhead Cam VTEC ....... Variable Valve Timing and Lift Electronic Control

9

The Java memory model  

Science Conference Proceedings (OSTI)

This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations ... Keywords: Java, concurrency, memory model, multithreading

Jeremy Manson; William Pugh; Sarita V. Adve

2005-01-01T23:59:59.000Z

10

Java and Numerical Computing  

Science Conference Proceedings (OSTI)

Java represents both a challenge and an opportunity to practitioners of numerical computing. This article analyzes the current state of Java in numerical computing and identifies some directions for the realization of its full potential.

Ronald F. Boisvert; José Moreira; Michael Philippsen; Roldan Pozo

2001-01-01T23:59:59.000Z

11

Java Numerics: Main  

Science Conference Proceedings (OSTI)

... Workshop onJava in High Performance Computing at HPCN Eurpe 2001 Conference, Amsterdam, The Netherlands (June 25 - 27, 2001); ...

2012-11-20T23:59:59.000Z

12

Diffusion Java Applets - TMS  

Science Conference Proceedings (OSTI)

Mar 8, 2007 ... Citation: Glicksman, M.E. and Lupulescu, A. "Java Applets and Additional Presentations." Department of Materials Science and Engineering.

13

The ENSDF Java Package  

Science Conference Proceedings (OSTI)

A package of computer codes has been developed to process and display nuclear structure and decay data stored in the ENSDF (Evaluated Nuclear Structure Data File) library. The codes were written in an object-oriented fashion using the java language. This allows for an easy implementation across multiple platforms as well as deployment on web pages. The structure of the different java classes that make up the package is discussed as well as several different implementations.

Sonzogni, A.A. [National Nuclear Data Center, Brookhaven National Laboratory, Upton, NY 11973-5000 (United States)

2005-05-24T23:59:59.000Z

14

Specifying java iterators with JML and Esc/Java2  

Science Conference Proceedings (OSTI)

The 2006 SAVCBS Workshop has posed a Challenge Problem on the topic of specifying iterators. This note provides a specification in the Java Modeling Language (JML) [1, 2] for the Java interfaces Iterator and Iterable that captures the interactions ... Keywords: ESC/Java2, JML, specification, static analysis, verification

David R. Cok

2006-11-01T23:59:59.000Z

15

JAVA SCRIPT IS DISABLED  

Office of Scientific and Technical Information (OSTI)

This application needs JavaScript to work correctly but your browser does not have it enabled. How do I enable JavaScript??? - follow the instructions below... If your browser is not listed, please contact your system administrator. Internet Explorer (6.0) Select 'Tools' from the top menu Choose 'Internet Options' Click on the 'Security' tab Click on 'Custom Level' Scroll down until you see section labled 'Scripting' Under 'Active Scripting', select 'Enable' and click OK Internet Explorer (7.0) Select Tools > Internet Options. Click on the Security tab. Click the Custom Level button. Scroll down to the Scripting section. Select Enable for Active Scripting and Scripting of Java Applets. Click OK. Select YES if a box appears to confirm. Click OK. Close window.

16

Java Metadata Facility  

SciTech Connect

The Java Metadata Facility is introduced by Java Specification Request (JSR) 175 [1], and incorporated into the Java language specification [2] in version 1.5 of the language. The specification allows annotations on Java program elements: classes, interfaces, methods, and fields. Annotations give programmers a uniform way to add metadata to program elements that can be used by code checkers, code generators, or other compile-time or runtime components. Annotations are defined by annotation types. These are defined the same way as interfaces, but with the symbol {at} preceding the interface keyword. There are additional restrictions on defining annotation types: (1) They cannot be generic; (2) They cannot extend other annotation types or interfaces; (3) Methods cannot have any parameters; (4) Methods cannot have type parameters; (5) Methods cannot throw exceptions; and (6) The return type of methods of an annotation type must be a primitive, a String, a Class, an annotation type, or an array, where the type of the array is restricted to one of the four allowed types. See [2] for additional restrictions and syntax. The methods of an annotation type define the elements that may be used to parameterize the annotation in code. Annotation types may have default values for any of its elements. For example, an annotation that specifies a defect report could initialize an element defining the defect outcome submitted. Annotations may also have zero elements. This could be used to indicate serializability for a class (as opposed to the current Serializability interface).

Buttler, D J

2008-03-06T23:59:59.000Z

17

A Java commodity grid kit.  

SciTech Connect

In this paper we report on the features of the Java Commodity Grid Kit. The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework. Java CoG Kit middleware is general enough to design a variety of advanced Grid applications with quite different user requirements. Access to the Grid is established via Globus protocols, allowing the Java CoG Kit to communicate also with the C Globus reference implementation. Thus, the Java CoG Kit provides Grid developers with the ability to utilize the Grid, as well as numerous additional libraries and frameworks developed by the Java community to enable network, Internet, enterprise, and peer-to peer computing. A variety of projects have successfully used the client libraries of the Java CoG Kit to access Grids driven by the C Globus software. In this paper we also report on the efforts to develop server side Java CoG Kit components. As part of this research we have implemented a prototype pure Java resource management system that enables one to run Globus jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

von Laszewski, G.; Foster, I.; Gawor, J.; Lane, P.; Mathematics and Computer Science

2001-07-01T23:59:59.000Z

18

T-558: Oracle Java SE and Java for Business Critical Patch Update...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011...

19

Java support on genepool: java6 (jdk1.6) will be removed on 08...  

NLE Websites -- All DOE Office Websites (Extended Search)

Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox security updates Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox...

20

Java Vertexing Tools  

SciTech Connect

This document describes the implementation of the topological vertex finding algorithm ZVTOP within the org.lcsim reconstruction and analysis framework. At the present date, Java vertexing tools allow users to perform topological vertexing on tracks that have been obtained from a Fast MC simulation. An implementation that will be able to handle fully reconstructed events is being designed from the ground up for longevity and maintainability.

Strube, Jan; /Oregon U.; Graf, Norman; /SLAC

2006-03-03T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Converting java programs to use generic libraries  

Science Conference Proceedings (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ... Keywords: JSR-14, Java 1.5, Java 5, generic types, instantiation types, parameterized types, parametric polymorphism, raw types, type inference

Alan Donovan; Adam Kiežun; Matthew S. Tschantz; Michael D. Ernst

2004-10-01T23:59:59.000Z

22

Practical pluggable types for Java.  

E-Print Network (OSTI)

??This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines… (more)

Papi, Matthew M

2008-01-01T23:59:59.000Z

23

Converting Java Programs to Use Generic Libraries  

E-Print Network (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ...

Donovan, Alan

2004-03-30T23:59:59.000Z

24

Converting Java programs to use generic libraries  

E-Print Network (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practise makes heavy use of ...

Donovan, Alan A. A., 1976-

2004-01-01T23:59:59.000Z

25

An improved slicer for Java  

Science Conference Proceedings (OSTI)

We present an improved slicing algorithm for Java. The best algorithm known so far, first presented in [11], is not always precise if nested objects are used as actual parameters. The new algorithm presented in this paper always generates correct and ... Keywords: Java, object trees, static program slicing

Christian Hammer; Gregor Snelting

2004-06-01T23:59:59.000Z

26

Formalizing the safety of Java, the Java virtual machine, and Java card  

Science Conference Proceedings (OSTI)

We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smartcards. The conclusion is that although a lot of good work has been done, a more concerted effort is ... Keywords: Common criteria, programming

Pieter H. Hartel; Luc Moreau

2001-12-01T23:59:59.000Z

27

Template_JavaOne03  

Science Conference Proceedings (OSTI)

... | JavaOne 2003 | Session #1024. 9. S-CSCF. MGCF. MGW. HSS. Application Server. SIP for J2ME. JAIN SIP. SIP for J2ME. JAIN SIP. SIP for J2ME. ...

2009-02-03T23:59:59.000Z

28

Refactoring for parameterizing Java classes  

E-Print Network (OSTI)

Type safety and expressiveness of many existing Java libraries and theirclient applications would improve, if the libraries were upgraded to definegeneric classes. Efficient and accurate tools exist to assist clientapplications ...

Kiezun, Adam

2006-09-05T23:59:59.000Z

29

Mechanisms of Java Rainfall Anomalies  

Science Conference Proceedings (OSTI)

The large-scale circulation departure patterns associated with the interannual variability of (July–June) rainfall in Java are studied on the basis of ship observations (1911–73) in the Indian Ocean and surface station records. Circulation ...

Eric C. Hackert; Stefan Hastenrath

1986-04-01T23:59:59.000Z

30

Practical pluggable types for Java  

E-Print Network (OSTI)

This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines type qualifiers and their semantics, and a compiler ...

Papi, Matthew M

2008-01-01T23:59:59.000Z

31

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java....

32

Redefining Agrarian Power: Resurgent Agrarian Movements in West Java, Indonesia  

E-Print Network (OSTI)

Agrarian Movements in West Java, Indonesia Suraya Afiff Noeron agrarian change in Java in the 1970s and has, moreand agrarian change in Java, West Kalimantan, and other

Afiff, Suraya; Fauzi, Noer; Hart, Gillian; Ntsebeza, Lungisile; Peluso, Nancy

2005-01-01T23:59:59.000Z

33

CHIP House Takes Design to Different Heights (Literally) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CHIP House Takes Design to Different Heights (Literally) CHIP House Takes Design to Different Heights (Literally) CHIP House Takes Design to Different Heights (Literally) May 12, 2011 - 5:49pm Addthis A model of the SCI-Arc/Caltech Solar Deacthlon team's CHIP house. | Photo Courtesy of the Solar Decathlon's Flickr photostream A model of the SCI-Arc/Caltech Solar Deacthlon team's CHIP house. | Photo Courtesy of the Solar Decathlon's Flickr photostream April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs How can I participate? The next Solar Decathlon will be held Sept. 23-Oct. 2, 2011, at the National Mall's West Potomac Park in Washington, D.C. In honor of the U.S Department of Energy's Solar Decathlon -- which challenges 20 collegiate teams to design, build, and operate solar-powered

34

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing 5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java. IMPACT: Apache can be exploited by malicious people to conduct spoofing attacks. SOLUTION: The vendor has issued a fix. Addthis Related Articles

35

Animation projects in CS1 from scheme to Java  

Science Conference Proceedings (OSTI)

Scheme animation projects are transformed into Java projects. Keywords: computer science for liberal arts, introductory programming course, java programming

Mirela Djordjevi?

2011-06-01T23:59:59.000Z

36

Platform Independence Java Virtual Machine (JVM)  

E-Print Network (OSTI)

of User Appliances and Communications Links But completely compatible Because the Market demandsIFace area = new Area(); java.rmi.Naming.bind(url, area) Client: AreaIFace area = (AreaIFace) java.rmi.Naming.lookup

Martin, Jonathan E.

37

Transparent Consistent Replication of Java RMI Objects  

Science Conference Proceedings (OSTI)

The Java Remote Method Invocation (JRMI) specification simplifies the development of distributed Java applications, but provides little support to guarantee reliable, highly available operation. The Aroma System is middleware that transparently enhances ...

N. Narasimhan; L. E. Moser; P. M. Melliar-Smith

2000-09-01T23:59:59.000Z

38

Advanced Transactions in Enterprise JavaBeans  

Science Conference Proceedings (OSTI)

Enterprise JavaBeans (EJB) is a new technology that aims at supporting distributed transactional component-based applications written in Java. In recent years, a lot of new advanced software applications have arisen, which have new requirements for transaction ...

Marek Prochazka

2000-11-01T23:59:59.000Z

39

Remote Invocation in Java G52CON Concepts of Concurrency Remote Invocation in Java  

E-Print Network (OSTI)

.out.println(account.balance()); } catch (Exception e) { // Error handling } } } Remote Invocation in Java G52CON ­ Concepts of Concurrency1 Remote Invocation in Java G52CON ­ Concepts of Concurrency Remote Invocation in Java · Provided by the java.rmi package · Based on a model of remote method invocation (RMI), equivalent to remote procedure

Mills, Steven

40

Symbolic Script Programming for Java  

E-Print Network (OSTI)

Computer algebra in Java is a promising field of development. It has not yet reached an industrial strength, in part because of a lack of good user interfaces. Using a general purpose scripting language can bring a natural mathematical notation, akin to the one of specialized interfaces included in most computer algebra systems. We present such an interface for Java computer algebra libraries, using scripts available in the JSR 223 framework. We introduce the concept of `symbolic programming' and show its usefulness by prototypes of symbolic polynomials and polynomial rings.

Jolly, Raphael

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

JAVA based LCD Reconstruction and Analysis Tools  

Science Conference Proceedings (OSTI)

We summarize the current status and future developments of the North American Group's Java-based system for studying physics and detector design issues at a linear collider. The system is built around Java Analysis Studio (JAS) an experiment-independent Java-based utility for data analysis. Although the system is an integrated package running in JAS, many parts of it are also standalone Java utilities.

Bower, G.

2004-10-11T23:59:59.000Z

42

Features of the Java commodity grid kit.  

SciTech Connect

In this paper we report on the features of the Java Commodity Grid Kit (Java CoG Kit). The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework. Java CoG Kit middleware is general enough to design a variety of advanced Grid applications with quite different user requirements. Access to the Grid is established via Globus Toolkit protocols, allowing the Java CoG Kit to also communicate with the services distributed as part of the C Globus Toolkit reference implementation. Thus, the Java CoG Kit provides Grid developers with the ability to utilize the Grid, as well as numerous additional libraries and frameworks developed by the Java community to enable network, Internet, enterprise and peer-to-peer computing. A variety of projects have successfully used the client libraries of the Java CoG Kit to access Grids driven by the C Globus Toolkit software. In this paper we also report on the efforts to develop serverside Java CoG Kit components. As part of this research we have implemented a prototype pure Java resource management system that enables one to run Grid jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

von Laszewski, G.; Gawor, J.; Lane, P.; Rehn, N.; Russell, M.; Mathematics and Computer Science

2002-11-01T23:59:59.000Z

43

ESC/Java2 Implementation Notes  

E-Print Network (OSTI)

Abstract: ESC/Java2 is a tool for statically checking program specifications. It expands significantly upon ESC/Java, on which it is built. It is consistent with the definition of JML and of Java 1.4. It adds additional static checking to that in ESC/Java; most significantly, it adds support for checking frame conditions and annotations containing method calls. This document describes the status of the final release of ESC/Java2, along with some notes regarding the details of that implementation.

David R. Cok; Joseph R. Kiniry; Dermot Cochran

2008-01-01T23:59:59.000Z

44

Integrating multiple clinical information systems using the Java Message Service framework  

E-Print Network (OSTI)

Information Systems using the Java Message Service FrameworkInformation Systems using the Java Message Service Frameworkusing Sun Microsystems’ Java programming language. The Java

Tellis, W M; Andriole, K P

2004-01-01T23:59:59.000Z

45

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

46

Identifying Reference Objects by Hierarchical Clustering in Java Environment  

E-Print Network (OSTI)

Recently Java programming environment has become so popular. Java programming language is a language that is designed to be portable enough to be executed in wide range of computers ranging from cell phones to supercomputers. Computer programs written in Java are compiled into Java Byte code instructions that are suitable for execution by a Java Virtual Machine implementation. Java virtual Machine is commonly implemented in software by means of an interpreter for the Java Virtual Machine instruction set. As an object oriented language, Java utilizes the concept of objects. Our idea is to identify the candidate objects' references in a Java environment through hierarchical cluster analysis using reference stack and execution stack.

Saha, Rahul

2011-01-01T23:59:59.000Z

47

Java 1.5.0 API Sun’s Java Tutorial Ed Faulkner’s Java Reference  

E-Print Network (OSTI)

Put these lines in your.environment: add 6.186 add-f java_v1.5.0 setenv JAVA_HOME /mit/java_v1.5.0 setenv CLASSPATH /mit/6.186/2005/maslab.jar:. If you’re Serverphobic, just ask for help. You’ll learn fast, and you’ll be glad you did. Using the Documentation

Yuran Lu Agenda; Threading Java; On Server; Maslab Api

2005-01-01T23:59:59.000Z

48

MESURE Tool to benchmark Java Card platforms  

E-Print Network (OSTI)

The advent of the Java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behavior of these platforms is becoming crucial. To meet this need, we present in this paper a novel benchmarking framework to test and evaluate the performance of Java Card platforms. MESURE tool is the first framework which accuracy and effectiveness are independent from the particular Java Card platform tested and CAD used.

Bouzefrane, Samia; Paradinas, Pierre

2009-01-01T23:59:59.000Z

49

Object and Reference Immutability using Java Generics  

E-Print Network (OSTI)

A compiler-checked immutability guarantee provides useful documentation, facilitates reasoning, and enables optimizations. This paper presents Immutability Generic Java (IGJ), a novel language extension that expresses ...

Zibin, Yoav

2007-03-16T23:59:59.000Z

50

OpenMath JavaBeans - CECM  

E-Print Network (OSTI)

Sep 24, 1998 ... The technology studied in this project uses Java to construct components, ... It is also a general communications standard which supports the ...

51

SystemRequirements java Repository CRAN  

E-Print Network (OSTI)

Description Low-level interface to Java VM very much like.C/.Call and friends. Allows creation of objects, calling methods and accessing fields.

Simon Urbanek; Maintainer Simon Urbanek; Depends R; R Topics Documented

2010-01-01T23:59:59.000Z

52

Emerging Java Technologies for Math Education  

E-Print Network (OSTI)

PIMS-CECM Workshop on Emerging Java Technologies for Math Education. Centre For Experimental and Constructive Mathematics logo. A Workshop at the  ...

53

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

54

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

55

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

56

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

57

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

58

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

59

Recoverable Class Loaders for a Fast Restart of Java Applications  

Science Conference Proceedings (OSTI)

Nov 8, 2008 ... able a fast start-up and recovery of Java applications. This is achieved by snapshooting the static state of Java applications namely the class ...

60

Stability of Java interfaces: a preliminary investigation  

Science Conference Proceedings (OSTI)

The attribute of stability is regarded by some as an important attribute of software. Some claims regarding software design quality imply that what are called interfaces in Java are stable. This paper introduces some new metrics for investigating ... Keywords: java interface, software metrics, stability

Jonathan Chow; Ewan Tempero

2011-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Formalising Java RMI with explicit code mobility  

Science Conference Proceedings (OSTI)

This paper presents an object-oriented, Java-like core language with primitives for distributed programming and explicit code mobility. We apply our formulation to prove the correctness of several optimisations for distributed programs. Our language ... Keywords: Code mobility, Distribution, Java, Optimisation, RMI, Runtime, Types

Alexander Ahern; Nobuko Yoshida

2007-12-01T23:59:59.000Z

62

First International Workshop on Persistence and Java  

Science Conference Proceedings (OSTI)

These proceedings record the First International Workshop on Persistence and Java, which was held in Drymen, Scotland in September 1996. The focus of this workshop was the relationship between the Java languages and long-term data storage, such as databases ...

Malcolm Atkinson; Mick Jordan

1996-11-01T23:59:59.000Z

63

Testing of java web services for robustness  

Science Conference Proceedings (OSTI)

This paper presents a new compile-time analysis that enables a testing methodology for white-box coverage testing of error recovery code (i.e., exception handlers) in Java web services using compiler-directed fault injection. The analysis allows compiler-generated ... Keywords: def-use testing, exceptions, java, test coverage metrics

Chen Fu; Barbara G. Ryder; Ana Milanova; David Wonnacott

2004-07-01T23:59:59.000Z

64

Sandia secure processor : a native Java processor.  

SciTech Connect

The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. The complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.

Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

2003-08-01T23:59:59.000Z

65

T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update 8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 February 16, 2011 - 7:00am Addthis PROBLEM: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011. PLATFORM: JDK and JRE 6 Update 23 and earlier for Windows, Solaris, and Linux JDK 5.0 Update 27 and earlier for Solaris 9 SDK 1.4.2_29 and earlier for Solaris 8 JDK and JRE 6 Update 23 and earlier for Windows, Solaris and Linux JDK and JRE 5.0 Update 27 and earlier for Windows, Solaris and Linux SDK and JRE 1.4.2_29 and earlier for Windows, Solaris and Linux ABSTRACT: This Critical Patch Update contains 21 new security fixes for Oracle Java SE and Java for Business. 19 of these vulnerabilities may be remotely

66

Java fundamentals i and ii (video training), First edition  

Science Conference Proceedings (OSTI)

Java Fundamentals I and II will show you everything you need to know to start building robust, powerful software with Java SE. This collection provides $2,000 (USD) worth of expert Java training! Your instructor, Paul Deitel, has personally taught Java ...

Paul J. Deitel

2008-02-01T23:59:59.000Z

67

Sawja: Static Analysis Workshop for Java  

E-Print Network (OSTI)

Static analysis is a powerful technique for automatic verification of programs but raises major engineering challenges when developing a full-fledged analyzer for a realistic language such as Java. This paper describes the Sawja library: a static analysis framework fully compliant with Java 6 which provides OCaml modules for efficiently manipulating Java bytecode programs. We present the main features of the library, including (i) efficient functional data-structures for representing program with implicit sharing and lazy parsing, (ii) an intermediate stack-less representation, and (iii) fast computation and manipulation of complete programs.

Hubert, Laurent; Besson, Frédéric; Demange, Delphine; Jensen, Thomas; Monfort, Vincent; Pichardie, David; Turpin, Tiphaine

2010-01-01T23:59:59.000Z

68

Java persistence with hibernate, Second edition  

Science Conference Proceedings (OSTI)

Persistence -- the ability of data to outlive an instance of a program -- is central to modern applications. Hibernate, the most popular Java persistence tool, provides automatic and transparent object/relational mapping so it's a snap to work with SQL ...

Christian Bauer; Gavin King

2006-11-01T23:59:59.000Z

69

Computer algebra in Java: libraries and scripting  

E-Print Network (OSTI)

We have developed two computer algebra systems (CAS) written in Java [Jolly:2007,Kredel:2006]. The Java libraries can be used as any of the numerous other Java library packages. For the use-case of interactively entering and manipulating mathematical expressions there is a need of a scripting front-end for our libraries. Most other CAS invent and implement their own scripting interface for this purpose. We, however, do not want to reinvent the wheel and propose to use a contemporary scripting language with access to Java code. In this paper we discuss the requirements for a scripting language in computer algebra and check whether the languages Python, Ruby, Groovy and Scala meet these requirements. We conclude, that with minor problems any of these languages is suitable for our purpose.

Jolly, Raphael

2008-01-01T23:59:59.000Z

70

Javarifier : inference of reference immutability in Java  

E-Print Network (OSTI)

Javari is an extension of Java that supports reference immutability constraints. Programmers write Javari type qualifiers, such as the readonly type qualifier, in their programs, and the Javari typechecker detects mutation ...

Quinonez, Jamie

2008-01-01T23:59:59.000Z

71

Verification for Java's Reentrant Multithreading Concept  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. the concurrency model offers coordination via lock-synchronization, and communication by ...

Erika Ábrahám-Mumm; Frank S. de Boer; Willem P. de Roever; Martin Steffen

2002-04-01T23:59:59.000Z

72

JavaScript Error, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Services Web Services Enabling JavaScript or Active Scripting We're Sorry, you don't seem to have JavaScript enabled in your browser. Some functions in this site may not work properly without it enabled or your web browser is running an older version of JavaScript. Please enabled your JavaScript, then go back and try again or upgrade your browser version to view this web page correctly. Press the button below to see if you have JavaScript enabled. If nothing happened, then it is possible that JavaScript is disabled on your browser. The following instructions shown below describes how to enable JavaScript or Active Scripting in your browser. If your browser isn't listed, please consult its online help pages. JavaScript Test ITD Homepage Need Help? How to Enable JavaScript

73

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

74

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

75

Hyper-Threaded Java: Use the Java Concurrency API to Speed Up Time-Consuming Tasks  

SciTech Connect

This is for a Java World article that was already published on Nov 21, 2006. When I originally submitted the draft, Java World wasn't in the available lists of publications. Now that it is, Hanford Library staff recommended that I resubmit so it would be counted. Original submission ID: PNNL-SA-52490

Scarberry, Randy

2006-11-21T23:59:59.000Z

76

Java Jr.: Fully abstract trace semantics for a core Java language.  

E-Print Network (OSTI)

actions which represent interaction across package boundaries. A detailed example based on the Observer, subset of the Java language which allows for the declaration of classes and interfaces in packages. It includes two extensions of Java: it allows for packages to contain object declarations (rather than

Jeffrey, Alan

77

JR: Flexible Distributed Programming in an Extended Java  

Science Conference Proceedings (OSTI)

Abstract: Java provides a clean object-oriented programming model and allows for inherently system-independent programs. Unfortunately, Java has a limited concurrency model, providing only threads and remote method invocation (RMI). The JR programming ...

2001-04-01T23:59:59.000Z

78

Inductive Proof Outlines for Exceptions in Multithreaded Java  

Science Conference Proceedings (OSTI)

In this paper we give an operational semantics and introduce an assertional proof system for exceptions in a multithreaded Java sublanguage. Keywords: Java, exceptions, multi-threading, proof systems

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2006-05-01T23:59:59.000Z

79

JR: Flexible distributed programming in an extended Java  

Science Conference Proceedings (OSTI)

Java provides a clean object-oriented programming model and allows for inherently system-independent programs. Unfortunately, Java has a limited concurrency model, providing only threads and remote method invocation (RMI).The JR programming language ... Keywords: Concurrency, Java, SR, concurrent object-oriented programming

Aaron W. Keen; Tingjian Ge; Justin T. Maris; Ronald A. Olsson

2004-05-01T23:59:59.000Z

80

Discrete-event simulation in Java: a practitioner's experience  

Science Conference Proceedings (OSTI)

The experience of a simulation practitioner with development of a new Java simulation engine and its application to a large simulation model is described. Our simulation engine is implemented as a simple extension of the Java programming language and ... Keywords: Java, discrete-event simulation, parallel processing, practitioner, supply chain

D. H. King; Harvey S. Harrison

2010-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Specification and Runtime Verification of Java Card Programs  

Science Conference Proceedings (OSTI)

Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to ... Keywords: Compiler, JCML, JML, Java Card, Runtime Verification

Umberto Souza da Costa; Anamaria Martins Moreira; Martin A. Musicante; Plácido A. Souza Neto

2009-07-01T23:59:59.000Z

82

Enterprise JavaBeans 3.1  

Science Conference Proceedings (OSTI)

Learn how to code, package, deploy, and test functional Enterprise JavaBeans with the latest edition of this bestselling guide. Written by the developers of JBoss EJB 3.1, this book not only brings you up to speed on each component type and container ...

Andrew Lee Rubinger; Bill Burke

2010-09-01T23:59:59.000Z

83

Enforcing Secure Object Initialization in Java  

E-Print Network (OSTI)

Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high. The solution currently used to enforce object initialization is to implement a coding pattern proposed by Sun, which is not formally checked. We propose a modular type system to formally specify the initialization policy of libraries or programs and a type checker to statically check at load time that all loaded classes respect the policy. This allows to prove the absence of bugs which have allowed some famous privilege escalations in Java. Our experimental results show that our safe default policy allows to prove 91% of classes of java.lang, java.security and javax.security safe without any annotation and by adding 57 simple annotations we proved all classes but four safe. The type system and its soundness theorem have been formalized and machine checked using Coq.

Hubert, Laurent; Monfort, Vincent; Pichardie, David

2010-01-01T23:59:59.000Z

84

JAVA & Parallelism/Real-time systems  

E-Print Network (OSTI)

Windowing Toolkit (AWT) in a memory-efficient way. JAVA Application Environment (JAE) Support enables the same applets and applications to run on other servers or platforms running the JAVA Virtual Machine. CHAPTER 2 Embedded and Real-Time JAVA According to the designers at Sun Microsystems, is JAVA also suitable for Embedded or Real-Time systems. Before proceeding further it is worth trying to define the phrase `real-time system' more precisely. 2.1 Definition of a real-time system There are many interpretations of the exact nature of a real-time system; however, they all have in common the notion of response time, the time taken for the system to generate output from some associated input. The Oxford Dictionary of Computing [48] gives the following definition of a real-time system. A real-time system is... Any system in which the time at which output is produced is significant. This is usually because the input corresponds to some movement in the physical world, and the output ha...

D. F. Nooren

1998-01-01T23:59:59.000Z

85

Automatic translation from Circus to Java  

Science Conference Proceedings (OSTI)

Circus is a combination of Z and CSP that supports the development of state-rich reactive systems based on refinement. In this paper we present JCircus, a tool that automatically translates Circus programs into Java, for the purpose of animation and ...

Angela Freitas; Ana Cavalcanti

2006-08-01T23:59:59.000Z

86

Formal Development of Safe and Secure Java Card Applets  

E-Print Network (OSTI)

This thesis is concerned with different aspects of JAVA CARD application development and use of formal methods in the JAVA CARD world. JAVA CARD is a technology that provides means to program smart (chip) cards with (a subset of) the JAVA language. The use of formal methods in the JAVA CARD context is highly justified due to the criticality of JAVA CARD applications. First of all, JAVA CARD applications are usually security critical (e.g., authentication, electronic cash), second, they are cost critical (i.e. they are distributed in large amounts making updates quite difficult) and finally, they can also be legally critical (e.g., when the digital signature law is considered). Thus the robustness and correctness of JAVA CARD applications should be enforced by the best means possible, i.e. by the use of formal verification techniques. At the same time JAVA CARD seems to be a good target for formal verification—due to the relative simplicity of JAVA CARD applications (as compared to full JAVA), formal verification becomes a feasible and manageable task. In this thesis, we touch upon different

Wojciech Mostowski; Wojciech Mostowski; C Wojciech Mostowski

2005-01-01T23:59:59.000Z

87

IDebug: An Advanced Debugging Framework for Java  

E-Print Network (OSTI)

IDebug, the Infospheres debugging framework, is an advanced debugging framework for Java. This framework provides the standard core debugging and specification constructs such as assertions, debug levels and categories, stack traces, and specialized exceptions. Debugging functionality can be fine-tuned to a per-thread and/or a per-class basis, debugging contexts can be stored to and recovered from persistent storage, and several aspects of the debugging run-time are configurable at the meta-level. Additionally, the framework is designed for extensibility. Planned improvements include support for debugging distributed object systems via currying call stacks across virtual machine contexts and debug information logging with a variety of networking media including unicast, multicast, RMI, distributed events, and JavaSpaces. Finally, we are adding support for debugging mobile agent systems by providing mobile debug logs. 1 Introduction Programming technologies have evolved greatly over th...

Joseph R. Kiniry

1998-01-01T23:59:59.000Z

88

The New Sundanese Peasants' Union: Peasant Movements, Changes in Land Control, and Agrarian Questions in Garut, West Java  

E-Print Network (OSTI)

of the Association of West Java Plantations; and Ir. H.Questions in Garut, West Java *) Noer Fauzi Berkeleyorganization in West Java, Indonesia, was extraordinarily

Fauzi, Noer

2005-01-01T23:59:59.000Z

89

WIPP Safety Is Paramount Top to Bottom, Literally | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WIPP Safety Is Paramount Top to Bottom, Literally WIPP Safety Is Paramount Top to Bottom, Literally WIPP Safety Is Paramount Top to Bottom, Literally March 28, 2013 - 12:00pm Addthis WIPP surface maintenance employees tail a new steel head rope over the hoist drum. The hoist is used to transport TRU waste 2,150 underground for final disposal. WIPP surface maintenance employees tail a new steel head rope over the hoist drum. The hoist is used to transport TRU waste 2,150 underground for final disposal. The WIPP shaft crew installs rigging onto a new 2,300-foot-long head rope on the first floor. The WIPP shaft crew installs rigging onto a new 2,300-foot-long head rope on the first floor. WIPP surface maintenance employees tail a new steel head rope over the hoist drum. The hoist is used to transport TRU waste 2,150 underground for final disposal.

90

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

91

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

92

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

93

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

94

Redefining Agrarian Power: Resurgent Agrarian Movements in West Java, Indonesia  

E-Print Network (OSTI)

Movements in West Java, Indonesia Suraya Afiff Noer Fauzienvironmental change in Indonesia since 1985. She receivedenvironmental change in Indonesia since the 1990s. In Fall

Afiff, Suraya; Fauzi, Noer; Hart, Gillian; Ntsebeza, Lungisile; Peluso, Nancy

2005-01-01T23:59:59.000Z

95

OpenMath and Java for Math Education - CECM  

E-Print Network (OSTI)

The intent of this web page is to organize resources and information related to the development of OpenMath compliant Java based web applications for math ...

96

Main-Memory Management to Support Orthogonal Persistence for Java  

E-Print Network (OSTI)

Daynes,L. Atkinson,M.P. Proceedings of the Second International Workshop on Persistence and Java pp 37-60

Daynes, L.

97

Instructional JAVA modules based on molecular simulation - TMS  

Science Conference Proceedings (OSTI)

Nov 9, 2007 ... This website contains a selection of instructional JAVA modules designed to increase understanding of molecular simulations and molecular ...

98

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2011 1: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

99

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Oracle Java SE Critical Patch Update Advisory - June 2011 41: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

100

RTZen: Highly Predictable, Real-time Java Middleware for Distributed and Embedded Systems  

E-Print Network (OSTI)

Real-Time Speci?cation for Java. Addison-Wesley (2000) 8.Vitek, J. : Real-time java scoped memory: Design patternsof the jRate Real-Time Java Implementation. In Meersman,

Raman, Krishna; Zhang, Yue; Panahi, Mark; Colmenares, Juan A; Klefstad, Raymond; Harmon, Trevor

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Review of Correspondence Analysis and Data Coding with Java and R  

E-Print Network (OSTI)

and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

de Leeuw, Jan

2005-01-01T23:59:59.000Z

102

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

103

Review of Correspondence Analysis and Data Coding with Java and R  

E-Print Network (OSTI)

and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

Jan de Leeuw

2011-01-01T23:59:59.000Z

104

A Java Math.BigDecimal Implementation of Core Mathematical Functions  

E-Print Network (OSTI)

The mathematical functions log(x), exp(x), root[n]x, sin(x), cos(x), tan(x), arcsin(x), arctan(x), x^y, sinh(x), cosh(x), tanh(x) and Gamma(x) have been implemented for arguments x in the real domain in a native Java library on top of the multi-precision BigDecimal representation of floating point numbers. This supports scientific applications where more than the double precision accuracy of the library of the Standard Edition is desired. The full source code is made available.

Mathar, Richard J

2009-01-01T23:59:59.000Z

105

ICT for low-literate youth in ethiopia: the usability challenge  

Science Conference Proceedings (OSTI)

How much can you do with a computer if you are not able to read or write like many people in Africa? This paper discusses the preliminary outcomes of a study into how Information and Communication Technology (ICT) can be made more usable for low-literate ...

Marije Geldof

2007-07-01T23:59:59.000Z

106

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

107

Another step towards a smart compilation manager for Java  

Science Conference Proceedings (OSTI)

In a recent work we have proposed a compilation strategy (that is, a way to decide which unchanged sources have to be recompiled) for a substantial subset of Java which has been shown to be sound and minimal. That is, an unchanged source ... Keywords: Java, separate compilation

G. Lagorio

2004-03-01T23:59:59.000Z

108

Object Oriented Verification Kernels for Secure Java Applications  

Science Conference Proceedings (OSTI)

This paper presents an approach to the verification of large Java programs. The focus lies on programs that implement a distributed communicating system e.g. in a Mor E-Commerce scenario. When trying to verify such programs, thousands of Java classes ...

Holger Grandy; Kurt Stenzel; Wolfgang Reif

2005-09-01T23:59:59.000Z

109

Proceedings of the Second International Workshop on Persistence and Java  

Science Conference Proceedings (OSTI)

These proceedings record the Second International Workshop on Persistence and Java, that was held in Half Moon Bay in the San Francisco Bay Area, in August 1997. The focus of the workshop series is the relationship between the Java platform and longterm ...

Malcolm Atkinson; Mick Jordan

1997-12-01T23:59:59.000Z

110

RTVR: a flexible java library for interactive volume rendering  

Science Conference Proceedings (OSTI)

This paper presents several distinguishing design features of RTVR - a Java-based library for real-time volume rendering. We describe, how the careful design of data structures, which in our case are based on voxel enumeration, and an intelligent use ... Keywords: interactive volume visualization, internet-based visualization, java

Lukas Mroz; Helwig Hauser

2001-10-01T23:59:59.000Z

111

JAVA SWING-BASED PLOTTING PACKAGE RESIDING WITHIN XAL  

Science Conference Proceedings (OSTI)

A data plotting package residing in the XAL tools set is presented. This package is based on Java SWING, and therefore it has the same portability as Java itself. The data types for charts, bar-charts, and color-surface plots are described. The algorithms, performance, interactive capabilities, limitations, and the best usage practices of this plotting package are discussed.

Shishlo, Andrei P [ORNL; Chu, Paul [Stanford University; Pelaia II, Tom [ORNL

2007-01-01T23:59:59.000Z

112

Groebner bases in Java with applications in computer graphics  

E-Print Network (OSTI)

In this paper we present a Java implementation of the algorithm that computes Buchbereger's and reduced Groebner's basis step by step. The Java application enables graphical representation of the intersection of two surfaces in 3-dimensional space and determines conditions of existence and planarity of the intersection.

Malesevic, Branko; Campara, Milan

2010-01-01T23:59:59.000Z

113

Towards a program logic for JavaScript  

Science Conference Proceedings (OSTI)

JavaScript has become the most widely used language for client-side web programming. The dynamic nature of JavaScript makes understanding its code notoriously difficult, leading to buggy programs and a lack of adequate static-analysis tools. We believe ... Keywords: javascript, separation logic, web

Philippa Anne Gardner; Sergio Maffeis; Gareth David Smith

2012-01-01T23:59:59.000Z

114

CS1, arcade games and the free Java book  

Science Conference Proceedings (OSTI)

Computer game programming has been adopted by some instructors and schools in an effort to motivate students and make the learning more relevant to the student's world than the console programs many of their instructors learned with. This paper describes ... Keywords: acm java, cs1, free java book, games

Daniel L. Schuster

2010-03-01T23:59:59.000Z

115

Reflexes: Abstractions for integrating highly responsive tasks into Java applications  

Science Conference Proceedings (OSTI)

Achieving submillisecond response times in a managed language environment such as Java or C# requires overcoming significant challenges. In this article, we propose Reflexes, a programming model and runtime system infrastructure that lets developers ... Keywords: Java virtual machine, Real-time systems, memory management

Jesper Honig Spring; Filip Pizlo; Jean Privat; Rachid Guerraoui; Jan Vitek

2010-08-01T23:59:59.000Z

116

Software application implement in java for electrical lines dimensioning  

Science Conference Proceedings (OSTI)

In this paper it was present a software package implemented in java useful for dimensioning of low voltage lines mono phase and three phases (AC and DC). The modeled networks are tree type. This software with graphical user interface allows the estimation ... Keywords: computer software, electrical lines, java, optimal dimensioning

Cristian Abrudean; Manuela Panoiu

2008-11-01T23:59:59.000Z

117

Java-Applet For Radio Spectra Analysis  

E-Print Network (OSTI)

New services for Clusters of Galaxies Database created in the Astronomical Institute of SPbU have been constructed. The detailed description of database and its content is available at http://www.astro.spbu.ru/CLUSTERS/. The information contained in the database can be used for solution of the specific astronomical problems. One of these problems is the researches of radio emission spectra of clusters' objects. The researches can give help in solution of the problems of origin and evolution of extragalactic radio sources. Spectra of radio galaxies contain important information about radio power in the processes responsible for their activity. This report presents the software for the database that provides work with radio spectra of extragalactic sources. This client-application has been released as the Java-applet and thus provides a Web based interface that is supported on many operating systems. The facilities of the applet such as approximations of spectra measurement points and calculation of spectral parameters are illustrated in the report. Also we demonstrate new version of the application that realized on Java2 and gave access to additional functions such as printing.

A. S. Trushkina; A. G. Gubanov

2000-12-29T23:59:59.000Z

118

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

119

T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 June 30, 2011 - 3:22pm Addthis PROBLEM: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 PLATFORM: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.6 and later, Mac OS X Server v10.6.6 and later ABSTRACT: Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26. Further information is available via the Java

120

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Object-Oriented Programming 2CSE 1325: Object-Oriented Programming in Java  

E-Print Network (OSTI)

1 Object-Oriented Programming in Java 2CSE 1325: Object-Oriented Programming in Java Take control, practice! #12;2 3CSE 1325: Object-Oriented Programming in Java Course Contents · Introduction to object-oriented large, high-quality software systems. 4CSE 1325: Object-Oriented Programming in Java Buzzwords

Lei, Jeff Yu

122

FAMIX Java language plugin 1.0 Author Sander Tichelaar (tichel@iam.unibe.ch)  

E-Print Network (OSTI)

packages in Java map directly to the directory structure of source code, i.e. the source code for a certain parameters and local variables 1.1.x ­> 1.2.x: ­ Addition of a new keyword (strictfp) #12; 3.2 Package (interpreted) Package Figure 2: Package A Package maps in Java to the Java package construct. Packages in Java

Nierstrasz, Oscar

123

RTJBench: A RealTime Java Benchmarking Framework  

E-Print Network (OSTI)

Abstract. The paper gives an overview of RTJBench, a framework designed to assist in the task of benchmarking programs written in the Real-Time Specification for Java, but with potentially more general applicability. RTJBench extends the JUnit framework for unit testing of Java applications with tools for real-time environment configuration, simple data processing and configurable graphical presentation services. We present design principles of RTJBench and give an example of a benchmarking suite we have been using for daily regression benchmarking of the Open Virtual Machine. Keywords: Benchmarking, regression benchmarking, Real-Time Specification for Java

Marek Prochazka; Andrey Madan; Jan Vitek; Wenchang Liu

2004-01-01T23:59:59.000Z

124

Prototyping Faithful Execution in a Java virtual machine.  

SciTech Connect

This report presents the implementation of a stateless scheme for Faithful Execution, the design for which is presented in a companion report, ''Principles of Faithful Execution in the Implementation of Trusted Objects'' (SAND 2003-2328). We added a simple cryptographic capability to an already simplified class loader and its associated Java Virtual Machine (JVM) to provide a byte-level implementation of Faithful Execution. The extended class loader and JVM we refer to collectively as the Sandia Faithfully Executing Java architecture (or JavaFE for short). This prototype is intended to enable exploration of more sophisticated techniques which we intend to implement in hardware.

Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

2003-09-01T23:59:59.000Z

125

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

126

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

127

A Deductive Proof System for Multithreaded Java with Exceptions  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides that, the language offers a flexible exception mechanism for handling errors or ...

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2008-07-01T23:59:59.000Z

128

Visualising Memory Graphs: Interactive Debugging using Java3D  

E-Print Network (OSTI)

that three dimensional visualisation cau be a useful tool for debugging, program analysis, and a viable - 3D Modelling in Java 6 3 Requirements 9 4 Design 10 4.1 Preliminaries 10 4.1.1 Creating

Oxford, University of

129

A Deductive Proof System for Multithreaded Java with Exceptions  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides that, the language offers a flexible exception mechanism for handling errors or ...

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2008-12-01T23:59:59.000Z

130

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

131

Pointer analysis for Java programs : novel techniques and applications  

E-Print Network (OSTI)

This dissertation presents a pointer analysis for Java programs, together with several practical analysis applications. For each program point, the analysis is able to construct a points-to graph that describes how local ...

S?lcianu, Alexandru D. (Alexandru Doru), 1975-

2006-01-01T23:59:59.000Z

132

Implementing fast javaTM monitors with relaxed-locks  

Science Conference Proceedings (OSTI)

The JavaTM Programming Language permits synchronization operations (lock, unlock, wait, notify) on any object. Synchronization is very common in applications and is endemic in the library code upon which applications depend. It is therefore ...

David Dice

2001-04-01T23:59:59.000Z

133

Automatic certification of Java source code in rewriting logic  

Science Conference Proceedings (OSTI)

In this paper we propose an abstract certification techniquefor Java which is based on rewriting logic, a very general logical and semanticframework efficiently implemented in the functional programminglanguage Maude. Starting from a specification of ...

Mauricio Alba-Castro; María Alpuente; Santiago Escobar

2007-07-01T23:59:59.000Z

134

Predictability of Java Monsoon Rainfall Anomalies: A Case Study  

Science Conference Proceedings (OSTI)

A substantial portion of the interannual variability of rainfall at Jakarta, Java, can be predicted from antecedent pressure anomalies at Darwin, northern Australia; the pressure persistence, the concurrent correlation of pressure and rainfall, ...

Stefan Hastenrath

1987-01-01T23:59:59.000Z

135

Swizzle barrier optimizations for orthogonal persistence in Java  

E-Print Network (OSTI)

Brahnmath,K. Nystrom,N. Hosking,A.L. Cutts,Q.I. Proceedings of the Third International Workshop on Persistence and Java (Tiburon, California, September 1998), Advances in Persistent Object Systems pp 268-278 Morgan Kaufmann

Brahnmath, K.; Nystrom, N.; Hosking, A.L.; Cutts, Q.I.

136

Refactoring Sequential Java Code for Concurrency via Concurrent Libraries  

E-Print Network (OSTI)

Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 packagejava.util.concurrent (j.u.c.) supports writing concurrent programs: much of the complexity of writing threads-safe and ...

Ernst, Michael D.

2008-09-30T23:59:59.000Z

137

Analysing, Profiling and Optimising Orthogonal Persistence for Java  

E-Print Network (OSTI)

Cutts,Q.I. Hosking,A. Proceedings of the Second International Workshop on Persistence and Java (PJW2), Half Moon Bay, CA, USA (Atkinson, M., Jordan, M. Eds) pp 107-115 Sun Microsystems Inc.

Cutts, Q.I.

138

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

139

Java Automation Controller and Real-Time Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Java Automation Controller and Real-Time Systems Java Automation Controller and Real-Time Systems Speaker(s): Greg Bollella Date: June 29, 2009 - 12:00pm Location: 90-3122 Java has always been a disruptive technology and now it is breaking the mold in industrial, process, building, and transportation automation systems. For many years, programmable logic controllers (PLCs), the digital versions of old relay-based control systems (such as that used in the NYC Subway system in the late 1800s) have primarily controlled these systems. PLCs are the workhorses of the controls industry but the market is characterized by proprietary, closed, expensive, special-purpose solutions. A Java-based automation controller breaks the mold by allowing control algorithms, which require strict real-time capabilities, to run on

140

Java Performance for Scientific Applications on LLNL Computer Systems  

Science Conference Proceedings (OSTI)

Languages in use for high performance computing at the laboratory--Fortran (f77 and f90), C, and C++--have many years of development behind them and are generally considered the fastest available. However, Fortran and C do not readily extend to object-oriented programming models, limiting their capability for very complex simulation software. C++ facilitates object-oriented programming but is a very complex and error-prone language. Java offers a number of capabilities that these other languages do not. For instance it implements cleaner (i.e., easier to use and less prone to errors) object-oriented models than C++. It also offers networking and security as part of the language standard, and cross-platform executables that make it architecture neutral, to name a few. These features have made Java very popular for industrial computing applications. The aim of this paper is to explain the trade-offs in using Java for large-scale scientific applications at LLNL. Despite its advantages, the computational science community has been reluctant to write large-scale computationally intensive applications in Java due to concerns over its poor performance. However, considerable progress has been made over the last several years. The Java Grande Forum [1] has been promoting the use of Java for large-scale computing. Members have introduced efficient array libraries, developed fast just-in-time (JIT) compilers, and built links to existing packages used in high performance parallel computing.

Kapfer, C; Wissink, A

2002-05-10T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Org.Lcsim: Event Reconstruction in Java  

SciTech Connect

Maximizing the physics performance of detectors being designed for the International Linear Collider, while remaining sensitive to cost constraints, requires a powerful, efficient, and flexible simulation, reconstruction and analysis environment to study the capabilities of a large number of different detector designs. The preparation of Letters Of Intent for the International Linear Collider involved the detailed study of dozens of detector options, layouts and readout technologies; the final physics benchmarking studies required the reconstruction and analysis of hundreds of millions of events. We describe the Java-based software toolkit (org.lcsim) which was used for full event reconstruction and analysis. The components are fully modular and are available for tasks from digitization of tracking detector signals through to cluster finding, pattern recognition, track-fitting, calorimeter clustering, individual particle reconstruction, jet-finding, and analysis. The detector is defined by the same xml input files used for the detector response simulation, ensuring the simulation and reconstruction geometries are always commensurate by construction. We discuss the architecture as well as the performance.

Graf, Norman A.; /SLAC

2012-04-19T23:59:59.000Z

142

A Political Ecology of the Citarum River Basin: Exploring "Integrated Water Resources Management" in West Java, Indonesia  

E-Print Network (OSTI)

Management” in West Java, Indonesia By Jenna CavelleBandung in the province of West Java 1 . From here the rivermakes its exodus at the Java Sea slightly east of Indonesia’

Cavelle, Jenna

2013-01-01T23:59:59.000Z

143

Power, Labor, and Livelihood: Processes of Change in Rural Java: Notes and Reflections on a Village Revisited  

E-Print Network (OSTI)

two upland villages in Central Java. We returned to one ofDevelopment in Rural Java: A Study of the OrganizationalKecamatan Cibadak, West Java, and Kecamatan Kendal, Central

Hart, Gillian

2004-01-01T23:59:59.000Z

144

CHARACTERIZATION AND ALUMINUM DISSOLUTION DEMONSTRATION WITH A 3 LITER TANK 51H SAMPLE  

Science Conference Proceedings (OSTI)

A 3-liter sludge slurry sample was sent to SRNL for demonstration of a low temperature aluminum dissolution process. The sludge was characterized before and after the aluminum dissolution. Post aluminum dissolution sludge settling and the stability of the decanted supernate were also observed. The characterization of the as-received 3-liter sample of Tank 51H sludge slurry shows a typical high aluminum HM sludge. The XRD analysis of the dried solids indicates Boehmite is the predominant crystalline form of aluminum in the sludge solids. However, amorphous phases of aluminum present in the sludge would not be identified using this analytical technique. The low temperature (55 C) aluminum dissolution process was effective at dissolving aluminum from the sludge. Over the three week test, {approx}42% of the aluminum was dissolved out of the sludge solids. The process appears to be selective for aluminum with no other metals dissolving to any appreciable extent. At the termination of the three week test, the aluminum concentration in the supernate had not leveled off indicating more aluminum could be dissolved from the sludge with longer contact times or higher temperatures. The slow aluminum dissolution rate in the test may indicate the dissolution of the Boehmite form of aluminum however; insufficient kinetic data exists to confirm this hypothesis. The aluminum dissolution process appears to have minimal impact on the settling rate of the post aluminum dissolution sludge. However, limited settling data were generated during the test to quantify the effects. The sludge settling was complete after approximately twelve days. The supernate decanted from the settled sludge after aluminum dissolution appears stable and did not precipitate aluminum over the course of several months. A mixture of the decanted supernate with Tank 11 simulated supernate was also stable with respect to precipitation.

Hay, M; John Pareizs, J; Cj Bannochie, C; Michael Stone, M; Damon Click, D; Daniel McCabe, D

2008-02-29T23:59:59.000Z

145

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

146

Translating Nondeterministic Functional Language based on Attribute Grammars into Java  

E-Print Network (OSTI)

Knowledge-based systems are suitable for realizing advanced functions that require domain-specific expert knowledge, while knowledge representation languages and their supporting environments are essential for realizing such systems. Although Prolog is useful and effective in realizing such a supporting environment, the language interoperability with other implementation languages, such as Java, is often an important issue in practical application development. This paper describes the techniques for translating a knowledge representation language that is a nondeterministic functional language based on attribute grammars into Java. The translation is based on binarization and the techniques proposed for Prolog to Java translation although the semantics are different from those of Prolog. A continuation unit is introduced to handle continuation efficiently, while the variable and register management on backtracking is simplified by using the single and unidirectional assignment features of variables. An experim...

Umeda, Masanobu; Sone, Hiroaki; Katamine, Keiichi

2011-01-01T23:59:59.000Z

147

Jeannie: Granting Java native interface developers their wishes  

E-Print Network (OSTI)

Higher-level languages interface with lower-level languages such as C to access platform functionality, reuse legacy libraries, or improve performance. This raises the issue of how to best integrate different languages while also reconciling productivity, safety, portability, and efficiency. This paper presents Jeannie, a new language design for integrating Java with C. In Jeannie, both Java and C code are nested within each other in the same file and compile down to JNI, the Java platform’s standard foreign function interface. By combining the two languages ’ syntax and semantics, Jeannie eliminates verbose boiler-plate code, enables static error detection across the language boundary, and simplifies dynamic resource management. We describe the Jeannie language and its compiler, while also highlighting lessons from composing two mature programming languages.

Martin Hirzel; Robert Grimm

2007-01-01T23:59:59.000Z

148

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

149

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

150

V-143: Fresh Java issues being exploited in the wild | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Fresh Java issues being exploited in the wild 3: Fresh Java issues being exploited in the wild V-143: Fresh Java issues being exploited in the wild April 26, 2013 - 6:00am Addthis PROBLEM: A new Metasploit module for the Java 7u17 sandbox bypass emerged PLATFORM: All versions of Java SE-7 (including the recently released 1.7.0_21-b11) ABSTRACT: Java issues are being exploited in the wild by exploit kits, with Cool and Redkit specifically being known to use these bugs, and others likely to follow shortly. REFERENCE LINKS: SecList SE-2012-01 Security Explorations IMPACT ASSESSMENT: Medium DISCUSSION: It can be used to achieve a complete Java security sandbox bypass on a target system. IMPACT: Manipulation of data System access SOLUTION: Vendor recommends patch systems immediately Addthis Related Articles V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

151

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

152

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

153

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

154

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

155

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service...

156

JACK: a tool for validation of security and behaviour of Java applications  

Science Conference Proceedings (OSTI)

We describe the main features of JACK (Java Applet Correctness Kit), a tool for the validation of Java applications, annotated with JML specifications. JACK has been especially designed to improve the quality of trusted personal device applications. ...

Gilles Barthe; Lilian Burdy; Julien Charles; Benjamin Grégoire; Marieke Huisman; Jean-Louis Lanet; Mariela Pavlova; Antoine Requet

2006-11-01T23:59:59.000Z

157

V-072: Red Hat update for java-1.7.0-openjdk | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for...

158

Concurrencer: a tool for retrofitting concurrency into sequential Java applications via concurrent libraries  

E-Print Network (OSTI)

Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 package java.util.concurrent (j.u.c.) supports writing concurrent programs. To use this package, programmers still need to ...

Dig, Danny

159

6.092 Introduction to Software Engineering in Java, January (IAP) 2009  

E-Print Network (OSTI)

This course is an introduction to Java programming and software engineering. It is designed for those who have little or no programming experience in Java and covers concepts useful to 6.005. The focus is on developing ...

Jones, Evan

160

Add Java extensions to your wiki: Java applets can bring dynamic functionality to your wiki pages  

SciTech Connect

Virtually everyone familiar with today’s world wide web has encountered the free online encyclopedia Wikipedia many times. What you may not know is that Wikipedia is driven by an excellent open-source product called MediaWiki which is available to anyone for free. This has led to a proliferation of wiki sites devoted to just about any topic one can imagine. Users of a wiki can add content -- all that is required of them is that they type in their additions into their web browsers using the simple markup language called wikitext. Even better, the developers of wikitext made it extensible. With a little server-side development of your own, you can add your own custom syntax. Users aware of your extensions can then utilize them on their wiki pages with a few simple keystrokes. These extensions can be custom decorations, formatting, web applications, and even instances of the venerable old Java applet. One example of a Java applet extension is the Jmol extension (REF), used to embed a 3-D molecular viewer. This article will walk you through the deployment of a fairly elaborate applet via a MediaWiki extension. By no means exhaustive -- an entire book would be required for that -- it will demonstrate how to give the applet resize handles using using a little Javascript and CSS coding and some popular Javascript libraries. It even describes how a user may customize the extension somewhat using a wiki template. Finally, it explains a rudimentary persistence mechanism which allows applets to save data directly to the wiki pages on which they reside.

Scarberry, Randall E.

2008-08-12T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

162

Implementing the Gaia Astrometric Global Iterative Solution (AGIS) in Java  

E-Print Network (OSTI)

This paper provides a description of the Java software framework which has been constructed to run the Astrometric Global Iterative Solution for the Gaia mission. This is the mathematical framework to provide the rigid reference frame for Gaia observations from the Gaia data itself. This process makes Gaia a self calibrated, and input catalogue independent, mission. The framework is highly distributed typically running on a cluster of machines with a database back end. All code is written in the Java language. We describe the overall architecture and some of the details of the implementation.

O'Mullane, William; Lindegren, Lennart; Hernandez, Jose; Hobbs, David

2011-01-01T23:59:59.000Z

163

Object-oriented Programming Laws for Annotated Java Programs  

E-Print Network (OSTI)

Object-oriented programming laws have been proposed in the context of languages that are not combined with a behavioral interface specification language (BISL). The strong dependence between source-code and interface specifications may cause a number of difficulties when transforming programs. In this paper we introduce a set of programming laws for object-oriented languages like Java combined with the Java Modeling Language (JML). The set of laws deals with object-oriented features taking into account their specifications. Some laws deal only with features of the specification language. These laws constitute a set of small transformations for the development of more elaborate ones like refactorings.

Freitas, Gabriel Falconieri; Massoni, Tiago; Gheyi, Rohit; 10.4204/EPTCS.21.6

2010-01-01T23:59:59.000Z

164

A Non-Null Annotation Inferencer for Java Bytecode  

E-Print Network (OSTI)

We present a non-null annotations inferencer for the Java bytecode language. We previously proposed an analysis to infer non-null annotations and proved it soundness and completeness with respect to a state of the art type system. This paper proposes extensions to our former analysis in order to deal with the Java bytecode language. We have implemented both analyses and compared their behaviour on several benchmarks. The results show a substantial improvement in the precision and, despite being a whole-program analysis, production applications can be analyzed within minutes.

Hubert, Laurent

2010-01-01T23:59:59.000Z

165

Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics  

Science Conference Proceedings (OSTI)

Java+ITP is an experimental tool for the verification of properties of a sequential imperative subset of the Java language. It is based on an algebraic continuation passing style (CPS) semantics of this fragment as an equational theory in Maude. It supports ... Keywords: Hoare logic, Java, algebraic semantics, program verification

Ralf Sasse; José Meseguer

2007-07-01T23:59:59.000Z

166

JCML: A specification language for the runtime verification of Java Card programs  

Science Conference Proceedings (OSTI)

Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to ... Keywords: JCML, JML, Java Card, Runtime verification

Umberto Souza da Costa; Anamaria Martins Moreira; Martin A. Musicante; Plácido A. Souza Neto

2012-04-01T23:59:59.000Z

167

Development of Java multi-threaded simulation for chemical reacting flow of ethanol  

Science Conference Proceedings (OSTI)

Multi-threading in Java enhances computational performance and facilitates the development of parallel software. To obtain high performance on multi-core systems, this study develops a multi-threaded simulation code using Java for the chemical reacting ... Keywords: Benchmark, Chemical reaction, Computational fluid dynamics, Ethanol detonation, Java, Multi-thread

E. Yamada; T. Shimada; A. K. Hayashi

2012-12-01T23:59:59.000Z

168

The Use of Java in High Performance Computing: A Data Mining Example  

E-Print Network (OSTI)

The Use of Java in High Performance Computing: A Data Mining Example David Walker and Omer Rana in high performance computing is discussed with particular reference to the efforts of the Java Grande Java, Parallel Computing, Neu­ ral Networks, Distributed Objects 1 Introduction High performance

Walker, David W.

169

V-137: Apple Mac OS X update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apple Mac OS X update for Java V-137: Apple Mac OS X update for Java April 18, 2013 - 6:00am Addthis PROBLEM: Apple Mac OS X update for Java PLATFORM: Mac OS X 10.6, OS X Lion...

170

Poplar: Java composition with labels and AI planning  

Science Conference Proceedings (OSTI)

Class evolution in object-oriented programming often causes so-called breaking changes, largely because of the rigidity of component interconnections in the form of explicit method calls and field accesses. We present a Java extension, Poplar, which ... Keywords: adaptation, ai planning, code synthesis, components, composition, evolution, object-oriented programming, protocols

Johan T. Nyström Persson; Shinichi Honiden

2011-10-01T23:59:59.000Z

171

Expanding and extending the security features of java  

Science Conference Proceedings (OSTI)

The popularity of the web has had several significant impacts, two of note here: (1) increasing sophistication of web pages, including more regular use of Java and other mobile code, and (2) decreasing average level of sophistication as the user population ...

Nimisha V. Mehta; Karen R. Sollins

1998-01-01T23:59:59.000Z

172

Java^TM RemoteMethod Invocation Specification  

E-Print Network (OSTI)

2.7 Exception Handling in Remote Method Invocation. . . . . 11 2.8 Object Methods Overridden Handling in Remote Method Invocation . Object Methods Overridden by the RemoteObject Class . The Semantics.7 Exception Handling in Remote Method Invocation Since remote methods include java.rmi.Remote

Demurjian, Steven A.

173

A provenly correct translation of Fickle into Java  

Science Conference Proceedings (OSTI)

We present a translation from Fickle, a small object-oriented language allowing objects to change their class at runtime, into Java. The translation is provenly correct in the sense that it preserves the static and dynamic semantics. Moreover, ... Keywords: Type and effect systems, semantics preserving translation

D. Ancona; C. Anderson; F. Damiani; S. Drossopoulou; P. Giannini; E. Zucca

2007-04-01T23:59:59.000Z

174

HEP data analysis using jHepWork and Java  

E-Print Network (OSTI)

A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

Chekanov, S

2008-01-01T23:59:59.000Z

175

A Combined Pointer and Purity Analysis for Java Programs  

E-Print Network (OSTI)

We present a new method purity analysis for Java programs.A method is pure if it does not mutate any location that exists in the program state right before method invocation.Our analysis is built on top of a combined pointer ...

Salcianu, Alexandru

2004-05-17T23:59:59.000Z

176

HEP data analysis using jHepWork and Java  

E-Print Network (OSTI)

A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

S. Chekanov

2008-09-04T23:59:59.000Z

177

jYang : A YANG parser in java  

E-Print Network (OSTI)

The NETCONF con?guration protocol of the IETF Network Work- ing Group provides mechanisms to manipulate the con?guration of network devices. YANG is the language currently under consideration within the IETF to specify the data models to be used in NETCONF . This report describes the design and development of a syntax and semantics parser for YANG in java.

Nataf, Emmanuel

2009-01-01T23:59:59.000Z

178

Refactoring Composite to Visitor and Inverse Transformation in Java  

E-Print Network (OSTI)

We describe how to use refactoring tools to transform a Java program conforming to the Composite design pattern into a program conforming to the Visitor design pattern with the same external behavior. We also describe the inverse transformation. We use the refactoring tools provided by IntelliJ IDEA and Eclipse.

Ajouli, Akram

2011-01-01T23:59:59.000Z

179

HEP data analysis using jHepWork and Java.  

SciTech Connect

A role of Java in high-energy physics (HEP) and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

Chekanov, S.; High Energy Physics

2009-03-23T23:59:59.000Z

180

Supplement V.F: Packages For Introduction to Java Programming  

E-Print Network (OSTI)

. · To protect classes. Packages provide protection so that the protected members of the classes are accessible of the package name and the file system directory structure. For the package named com.prenhall.mypackage, youSupplement V.F: Packages For Introduction to Java Programming By Y. Daniel Liang 1 Introduction

Liang, Y. Daniel

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Nested parallelism for multi-core HPC systems using Java  

Science Conference Proceedings (OSTI)

Since its introduction in 1993, the Message Passing Interface (MPI) has become a de facto standard for writing High Performance Computing (HPC) applications on clusters and Massively Parallel Processors (MPPs). The recent emergence of multi-core processor ... Keywords: Java MPI, MPJ, MPJ express, Multi-core messaging

Aamir Shafi; Bryan Carpenter; Mark Baker

2009-06-01T23:59:59.000Z

182

FAMIX Java language plug-in 1.0 Author Sander Tichelaar (tichel@iam.unibe.ch)  

E-Print Network (OSTI)

packages in Java map directly to the directory structure of source code, i.e. the source code for a certain parameters and local variables 1.1.x -> 1.2.x: - Addition of a new keyword (strictfp) #12;3.2 Package (interpreted) Package Figure 2: Package A Package maps in Java to the Java package construct. Packages in Java

Nierstrasz, Oscar

183

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

05:Oracle Java SE Critical Patch Update Advisory 05:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

184

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5:Oracle Java SE Critical Patch Update Advisory 5:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

185

Poplar: A Java Extension for Evolvable Component Integration  

E-Print Network (OSTI)

The Java programming language contains many features that aid component-based software development (CBSD), such as interfaces, visibility levels, and strong support for encapsulation. However, component evolution often causes so-called breaking changes, largely because of the rigidity of component interconnections in the form of explicit method calls and field accesses. We present a Java extension, Poplar, which we are currently developing. In Poplar, inter-component dependencies are expressed using declarative queries; concrete linking code, generated using a planning algorithm, replaces these at compile time. Poplar includes a minimal specification language based on typestate-like protocols and labels, and a lightweight effect system, which ensures the absence of unwanted interference between hand-written code and generated code. We give several examples of fully automatic component integration using Poplar, and demonstrate its potential to simplify object-oriented software development greatly through evolv...

Nyström-Persson, Johan

2011-01-01T23:59:59.000Z

186

Java Technology : a Strategic Solution for Interactive Distributed Applications  

E-Print Network (OSTI)

In a world demanding the best performance from financial investments, distributed applications occupy the first place among the proposed solutions. This particularity is due to their distributed architecture which is able to acheives high performance. Currently, many research works aim to develop tools that facilitate the implementation of such applications. The urgent need for such applications in all areas pushes researchers to accelerate this process. However, the lack of standardization results in the absence of strategic decisions taken by computer science community. In this article, we argue that Java technology represents an elegant compromise ahead of the list of the currently available solutions. In fact, by promoting the independence of hardware and software, Java technology makes it possible to overcome pitfalls that are inherent to the creation of distributed applications.

Alustwani, Husam; Mostefaoui, Ahmed; Salomon, Michel

2009-01-01T23:59:59.000Z

187

Creating A Model HTTP Server Program Using java  

E-Print Network (OSTI)

HTTP Server is a computer programs that serves webpage content to clients. A webpage is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a computer screen. This information is usually in HTML format, and may provide navigation to other webpage's via hypertext links. WebPages may be retrieved from a local computer or from a remote HTTP Server. WebPages are requested and served from HTTP Servers using Hypertext Transfer Protocol (HTTP). WebPages may consist of files of static or dynamic text stored within the HTTP Server's file system. Client-side scripting can make WebPages more responsive to user input once in the client browser. This paper encompasses the creation of HTTP server program using java language, which is basically supporting for HTML and JavaScript.

Veerasamy, Bala Dhandayuthapani

2010-01-01T23:59:59.000Z

188

Criticality experiments with planar arrays of three-liter bottles containing plutonium nitrate solution  

SciTech Connect

The objective of these experiments was to provide benchmark data to validate calculational codes used in critically safety assessments of plant configurations. Arrays containing up to as many as sixteen three-liter bottles filled with plutonium nitrate were used in the experiments. A split-table device was used in the final assembly of the arrays. Ths planar arrays were reflected with close fitting plexiglas on each side and on the bottom but not the top surface. The experiments addressed a number of factors effecting criticality: the critical air gap between bottles in an array of fixed number of bottles, the number of bottles required for criticality if the bottles were touching, and the effect on critical array spacing and critical bottle number due to the insertion of an hydrogeneous substance into the air gap between bottles. Each bottle contained about 2.4l of Pu(NO{sub 3}){sub 4} solution at a Pu concentration of 105g Pu/l, with the {sup 240}Pu content being 2.9 wt% at a free acid molarity H{sup +} of 5.1. After the initial series of experiments were performed with bottles separated by air gaps, plexiglas shells of varying thicknesses were placed around each bottle to investigate how moderation between bottles affects both the number of bottles required for criticality and the critical spacing between each bottle. The minimum of bottles required for criticality was found to be 10.9 bottles, occurring for a square array with bottles in contact. As the bottles were spaced apart, the critical number increased. For sixteen bottles in a square array, the critical separation between surfaces in both x and y direction was 0.96 cm. The addition of plexiglas around each bottle decreased the critical bottle number, compared to those separated in air, but the critical bottle number, even with interstitial plastic in place was always greater than 10.9 bottles. The most reactive configuration was a tightly packed array of bottles with no intervening material.

Durst, B.M.; Clayton, E.D.; Smith, J.H.

1985-01-01T23:59:59.000Z

189

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

190

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

191

GIS on the fly » to realize wireless GIS network by Java mobile phone  

E-Print Network (OSTI)

Java cellular phone has arrived in the marketplace as the latest device of a mobile gear. The gear is very compact, allowing 10KB for Java program size and 5KB for data size. Although small in size, it features innovative computer system architecture. Java program can be sent dynamically to the gear in a streaming manner over wireless network. In addition, compared to conventional mobile computers, Java cell phone is very cheap both in hardware price and in communication cost. Java cell phone has an enormous potential as a mobile gear. In this paper, we discuss our trial of constructing a extensive wireless GIS network by utilizing Java cell phone as a GIS terminal. 1.

Shuichi Takino

2001-01-01T23:59:59.000Z

192

Using Java for distributed computing in the Gaia satellite data processing  

E-Print Network (OSTI)

In recent years Java has matured to a stable easy-to-use language with the flexibility of an interpreter (for reflection etc.) but the performance and type checking of a compiled language. When we started using Java for astronomical applications around 1999 they were the first of their kind in astronomy. Now a great deal of astronomy software is written in Java as are many business applications. We discuss the current environment and trends concerning the language and present an actual example of scientific use of Java for high-performance distributed computing: ESA's mission Gaia. The Gaia scanning satellite will perform a galactic census of about 1000 million objects in our galaxy. The Gaia community has chosen to write its processing software in Java. We explore the manifold reasons for choosing Java for this large science collaboration. Gaia processing is numerically complex but highly distributable, some parts being embarrassingly parallel. We describe the Gaia processing architecture and its realisation...

O'Mullane, William; Parsons, Paul; Lammers, Uwe; Hoar, John; Hernandez, Jose

2011-01-01T23:59:59.000Z

193

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

194

Java on the MScIT Course at the University of Glasgow  

E-Print Network (OSTI)

Poet,R.R. Belhadj-Mostefa,K. Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University)

Poet, R.R.; Belhadj-Mostefa, K.; Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University) [More Details

195

Integrating multiple clinical information systems using the Java message service framework to enable the delivery of urgent exam results at the point of care  

E-Print Network (OSTI)

Systems using the Java Message Service Framework. J DigitInformation Systems using the Java Message Service FrameworkED) physician. A web and Java Message Service (JMS) based

Tellis, W M; Andriole, K P

2005-01-01T23:59:59.000Z

196

Grain - A Java Analysis Framework for Total Data Readout  

E-Print Network (OSTI)

Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

P. Rahkila

2007-11-21T23:59:59.000Z

197

Exploiting static application knowledge in a Java compiler for embedded systems: a case study  

Science Conference Proceedings (OSTI)

Offering many benefits in terms of productivity and reliability, Java is becoming an attractive choice for the field of embedded computing. However, its programming model that relies on the capabilities of just-in-time compilation limits the opportunities ... Keywords: Java, KESO, embedded systems

Christoph Erhardt; Michael Stilkerich; Daniel Lohmann; Wolfgang Schröder-Preikschat

2011-09-01T23:59:59.000Z

198

Managing programmed instruction and collaborative peer tutoring in the classroom: Applications in teaching JavaTM  

Science Conference Proceedings (OSTI)

To fulfill part of the course requirements, 34 undergraduate students in two courses completed an online programmed instruction tutor as the first technical training exercise in a Java(TM) programming course designed for information systems majors. The ... Keywords: Collaborative peer tutoring, Interteaching, Java training, Programmed instruction

Henry H. Emurian; Heather K. Holden; Rachel A. Abarbanel

2008-03-01T23:59:59.000Z

199

Use of XML and Java for collaborative petroleum reservoir modeling on the Internet  

Science Conference Proceedings (OSTI)

The GEMINI (Geo-Engineering Modeling through INternet Informatics) is a public-domain, web-based freeware that is made up of an integrated suite of 14 Java-based software tools to accomplish on-line, real-time geologic and engineering reservoir modeling. ... Keywords: GEMINI, Java, Petroleum web-based software, Reservoir modeling, Web start, XML

John Victorine; W. Lynn Watney; Saibal Bhattacharya

2005-11-01T23:59:59.000Z

200

Sound-colour synaesthesia, chromatic representation of sounds waves in Java applets  

Science Conference Proceedings (OSTI)

The paper herein presents a way in which sound waves are chromatically represented in Java language. It intends to be, as its' title reveals, an instructional material providing help in developing interactive tools for efficient education in sciences, ... Keywords: RGB light, education, java applets, music, sounds waves

Stela Dragulin; Livia Sangeorzan; Mircea Parpalea

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Using You Tube to enhance student class preparation in an introductory Java course  

Science Conference Proceedings (OSTI)

We provided 21 short YouTube videos for an Introduction to Programming in Java course. Students were surveyed on how often they watched the videos and did the readings, and how much these activites contributed to their learning. When professors ... Keywords: java, videos, youtube

Martin C. Carlisle

2010-03-01T23:59:59.000Z

202

SableVM: a research framework for the efficient execution of java bytecode  

Science Conference Proceedings (OSTI)

SableVM is an open-source virtual machine for Java intended as a research framework for efficient execution of Java bytecode. The framework is essentially composed of an extensible bytecode interpreter using state-of-the-art and innovative techniques. ...

Etienne M. Gagnon; Laurie J. Hendren

2001-04-01T23:59:59.000Z

203

9 Modelling the CoCoME with the JAVA/A Component Model  

E-Print Network (OSTI)

-founded and coherent modelling and programming concepts for components: based on sound theoretical foundations it en and a Java-based architectural programming language. 9.1.1 Goals and Scope of the Component Model The JAVA is the representation of software architecture entities in a programming language. For this purpose we introduced

Gilmore, Stephen

204

An evaluation of Java's I/O capabilities for high-performance computing.  

SciTech Connect

Java is quickly becoming the preferred language for writing distributed applications because of its inherent support for programming on distributed platforms. In particular, Java provides compile-time and run-time security, automatic garbage collection, inherent support for multithreading, support for persistent objects and object migration, and portability. Given these significant advantages of Java, there is a growing interest in using Java for high-performance computing applications. To be successful in the high-performance computing domain, however, Java must have the capability to efficiently handle the significant I/O requirements commonly found in high-performance computing applications. While there has been significant research in high-performance I/O using languages such as C, C++, and Fortran, there has been relatively little research into the I/O capabilities of Java. In this paper, we evaluate the I/O capabilities of Java for high-performance computing. We examine several approaches that attempt to provide high-performance I/O--many of which are not obvious at first glance--and investigate their performance in both parallel and multithreaded environments. We also provide suggestions for expanding the I/O capabilities of Java to better support the needs of high-performance computing applications.

Dickens, P. M.; Thakur, R.

2000-11-10T23:59:59.000Z

205

Mechanisms for Secure Modular Programming in Java Lujo Bauer Andrew W. Appel Edward W. Felten  

E-Print Network (OSTI)

structure the interaction between different parts of a program. They must do this not only to protect Java packages, however, is the ability to structure modules so as to provide different views, protected, package-scope, or public) aren't expressive enough, so Java resorts to using a security manager

Appel, Andrew W.

206

Reconstructed streamflow for Citarum River, Java, Indonesia: linkages to tropical climate dynamics  

E-Print Network (OSTI)

Reconstructed streamflow for Citarum River, Java, Indonesia: linkages to tropical climate dynamics Abstract The Citarum river basin of western Java, Indonesia, which supplies water to 10 million residents in drought and flood prone regions of the globe (e.g. Boer 2007). In Indonesia, integrated action is needed

Ummenhofer, Caroline C.

207

Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1  

E-Print Network (OSTI)

Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1 Rob Wilson,2 reconstruct the boreal autumn (October­November) Palmer Drought Severity Index (PDSI) for Java, Indonesia between the climate of Indonesia and the large scale tropical Indo-Pacific climate system. Citation: D

208

The Java-Sumatra Aerial Mega-Tramway  

E-Print Network (OSTI)

A mega-tramway based on the Indonesian islands of Sumatra and Java is proposed to span Sunda Strait. The Java-Sumatra Aerial Mega-Tramway (JSAMT) will be self-elevating and will regularly and cheaply launch passengers and cargoes via two conveyor belt-like facilities using standard winged shipping containers like those currently used by international trucking and ocean shipping industries that are volplaned across the Sunda Strait. The JSAMT will be a self-sustaining toll facility free of any requirement for international loans or funding guarantees for its construction. Its existence will remove any immediate need for an expensive to dig/maintain Nusantara Tunnel. We offer the formative basic technical specifications for the JSAMT and indicate some of the physical and cultural geographical facts underpinning our macro-engineering proposal; offshoots of a perfected and tested JSAMT may be installed at Palk Strait between India and Sri Lanka, the Gibraltar Strait and the Bering Strait by mid-21st Century.

Alexander Bolonkin; Richard Cathcart

2007-01-09T23:59:59.000Z

209

Event Reconstruction for Many-core Architectures using Java  

SciTech Connect

Although Moore's Law remains technically valid, the performance enhancements in computing which traditionally resulted from increased CPU speeds ended years ago. Chip manufacturers have chosen to increase the number of core CPUs per chip instead of increasing clock speed. Unfortunately, these extra CPUs do not automatically result in improvements in simulation or reconstruction times. To take advantage of this extra computing power requires changing how software is written. Event reconstruction is globally serial, in the sense that raw data has to be unpacked first, channels have to be clustered to produce hits before those hits are identified as belonging to a track or shower, tracks have to be found and fit before they are vertexed, etc. However, many of the individual procedures along the reconstruction chain are intrinsically independent and are perfect candidates for optimization using multi-core architecture. Threading is perhaps the simplest approach to parallelizing a program and Java includes a powerful threading facility built into the language. We have developed a fast and flexible reconstruction package (org.lcsim) written in Java that has been used for numerous physics and detector optimization studies. In this paper we present the results of our studies on optimizing the performance of this toolkit using multiple threads on many-core architectures.

Graf, Norman A.; /SLAC

2012-04-19T23:59:59.000Z

210

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

211

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

212

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

213

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

214

Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME  

Science Conference Proceedings (OSTI)

In their analysis of the use of Java as a first teaching language, the ACM Java Task Force (JTF) identified a number of issues with the Java language and APIs which caused significant pedagogic problems. The focus of their work, and hence of their characterisation ... Keywords: introductory programming, programming languages

Ian Utting

2006-06-01T23:59:59.000Z

215

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion 61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability February 21, 2011 - 7:00am Addthis PROBLEM: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability. PLATFORM: The following Java products are affected: Java SE: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK 5.0 Update 27 and prior for Solaris 9 Oracle SDK 1.4.2_29 and prior for Solaris 8 IBM JDK 6 Update SR9 and prior IBM JDK 5 Update SR12-FP3 and prior IBM JDK 1.4.2 Update SR13-FP8 and prior Java for Business: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK and JRE 5.0 Update 27 and prior for Windows, Solaris, and Linux

216

V-072: Red Hat update for java-1.7.0-openjdk | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Red Hat update for java-1.7.0-openjdk 2: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for java-1.7.0-openjdk. PLATFORM: The vulnerabilities are reported in Red Hat Enterprise Linux 5 and 6 ABSTRACT: Red Hat has issued an update for java-1.7.0-openjdk. REFERENCE LINKS: Secunia Advisory SA51858 RHSA-2013:0165-1 CVE-2012-3174 CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. IMPACT: Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. SOLUTION: Vendor advises to upgrade to these updated packages, which resolve these

217

Modular Workflow Engine for Distributed Services using Lightweight Java Clients  

E-Print Network (OSTI)

In this article we introduce the concept and the first implementation of a lightweight client-server-framework as middleware for distributed computing. On the client side an installation without administrative rights or privileged ports can turn any computer into a worker node. Only a Java runtime environment and the JAR files comprising the workflow client are needed. To connect all clients to the engine one open server port is sufficient. The engine submits data to the clients and orchestrates their work by workflow descriptions from a central database. Clients request new task descriptions periodically, thus the system is robust against network failures. In the basic set-up, data up- and downloads are handled via HTTP communication with the server. The performance of the modular system could additionally be improved using dedicated file servers or distributed network file systems. We demonstrate the design features of the proposed engine in real-world applications from mechanical engineering. We have used ...

Vetter, R -M; Peetz, J -V

2009-01-01T23:59:59.000Z

218

Design and construction of a 7,500 liter immobilized cell reactor-separator for ethanol production from whey  

DOE Green Energy (OSTI)

A 7,500 liter reactor/separator has been constructed for the production of ethanol from concentrated whey permeate. This unit is sited in Hopkinton IA, across the street from a whey generating cheese plant A two phase construction project consisting of (1) building and testing a reactor/separator with a solvent absorber in a single unified housing, and (2) building and testing an extractive distillation/product stripper for the recovery of anhydrous ethanol is under way. The design capacity of this unit is 250,000 gal/yr of anhydrous product. Design and construction details of the reactor/absorber separator are given, and design parameters for the extractive distillation system are described.

Dale, M.C.

1992-12-31T23:59:59.000Z

219

U-087: HP-UX update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP-UX update for Java 7: HP-UX update for Java U-087: HP-UX update for Java January 24, 2012 - 7:00am Addthis PROBLEM: HP issued an update for Java in HP-UX to address multiple vulnerabilities. PLATFORM: HP-UX 11.x ABSTRACT: Multiple vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information. reference LINKS: Secunia Advisory 47709 Secunia Advisory 46512 HP Support Document IMPACT ASSESSMENT: High Discussion: The vulnerabilities are reported in versions B.11.11, B.11.23, and B.11.31 running HP JDK and JRE 6.0.12 and prior. Vulnerabilities inlcude the ability to hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a

220

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

222

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

223

Dynamic Information Flow Analysis for JavaScript in a Web Browser  

E-Print Network (OSTI)

Flow Analysis for JavaScript in a Web Browser by Thomas H.a central technology of the web, but it is also the sourceinformation flows in javascript web applications. In ACM

Austin, Thomas Howard

2013-01-01T23:59:59.000Z

224

Kopitiam: modular incremental interactive full functional static verification of java code  

Science Conference Proceedings (OSTI)

We are developing Kopitiam, a tool to interactively prove full functional correctness of Java programs using separation logic by interacting with the interactive theorem prover Coq. Kopitiam is an Eclipse plugin, enabling seamless integration into the ...

Hannes Mehnert

2011-04-01T23:59:59.000Z

225

Interannual Variability of Sea Surface Temperature off Java and Sumatra in a Global GCM  

Science Conference Proceedings (OSTI)

Using results from the Simple Ocean Data Assimilation (SODA), this study assesses the mixed layer heat budget to identify the mechanisms that control the interannual variation of sea surface temperature (SST) off Java and Sumatra. The analysis ...

Yan Du; Tangdong Qu; Gary Meyers

2008-06-01T23:59:59.000Z

226

Code for Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation  

E-Print Network (OSTI)

This archive contains the code and data for running the evaluations described in: Finlayson, Mark Alan (2014) "Java Libraries for Accessing the Princeton Wordnet: comparison and Evaluation" in Proceedings of the 7th Global ...

Finlayson, Mark Alan

2013-11-01T23:59:59.000Z

227

Comparison between CPBPV, ESC/Java, CBMC, Blast, EUREKA and Why for Bounded Program Verification  

E-Print Network (OSTI)

This report describes experimental results for a set of benchmarks on program verification. It compares the capabilities of CPBVP "Constraint Programming framework for Bounded Program Verification" [4] with the following frameworks: ESC/Java, CBMC, Blast, EUREKA and Why.

Collavizza, Hélène; Van Hentenryck, Pascal

2008-01-01T23:59:59.000Z

228

JConstHide: A Framework for Java Source Code Constant Hiding  

E-Print Network (OSTI)

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called byte codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks . But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. We in this paper are proposing a framework named JConstHide for hiding constants, especially integers in the java source codes, to defeat reverse en...

Sivadasan, Praveen

2009-01-01T23:59:59.000Z

229

InterProlog: Towards a declarative embedding of logic programming in Java  

E-Print Network (OSTI)

Abstract. InterProlog is the first Prolog-Java interface to support multiple Prolog systems through the same API; currently XSB and SWI Prolog, with GNU Prolog and YAP under development – on Windows, Linux and Mac OS X. It promotes coarse-grained integration between logic and object-oriented layers, by providing the ability to bidirectionally map any class data structure to a Prolog term; integration is done either through the Java Native Interface or TCP/IP sockets. It is proposed as a first step towards a common standard Java + Prolog API, gifting the Java developer with the best inference engines, and the logic programmer with simple access to the mainstream object-oriented platform. 1

Miguel Calejo

2004-01-01T23:59:59.000Z

230

Predictors Of Java Programming Self Efficacy Among Engineering Students In A Nigerian University  

E-Print Network (OSTI)

The study examined the relationship between Java programming self-efficacy and programming background of engineering students in a Nigerian University. One hundred and ninety two final year engineering students randomly selected from six engineering departments of the university participated in the study. Two research instruments: Programming Background Questionnaire and Java Programming Self-Efficacy Scale were used in collecting relevant information from the subjects. The resulting data were analyzed using Pearson product correlation and Multiple regression analysis. Findings revealed that Java Programming self-efficacy has no significant relationship with each of the computing and programming background factors. It was additionally obtained that the number of programming courses offered and programming courses weighed scores were the only predictors of Java self-efficacy.

Jegede, Philip Olu

2009-01-01T23:59:59.000Z

231

Nues ardentes of 22 November 1994 at Merapi volcano, Java, Indonesia E.K Abdurachmanab  

E-Print Network (OSTI)

Nuées ardentes of 22 November 1994 at Merapi volcano, Java, Indonesia E.K Abdurachmanab J Volcanological Survey of Indonesia, Jl. Diponegoro 57, Bandung 40122, Indonesia c Centre de Recherches

Paris-Sud XI, Université de

232

6.092 Introduction to Software Engineering in Java, January (IAP) 2008  

E-Print Network (OSTI)

This course is an introduction to software engineering, using the Java™ programming language; it covers concepts useful to 6.005. The focus is on developing high quality, working software that solves real problems. Students ...

Akeju, Usman O.

233

V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2013 1: Oracle Java SE Critical Patch Update Advisory - June 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 June 19, 2013 - 1:06am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2013 PLATFORM: Version(s): 5.0 Update 45, 6 Update 45, 7 Update 21; and prior versions ABSTRACT: Multiple vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Oracle Java SE Critical Patch Update June 2013 SecurityTracker Alert ID: 1028679 CVE-2013-1500, CVE-2013-1571 CVE-2013-2400, CVE-2013-2407 CVE-2013-2412, CVE-2013-2437 CVE-2013-2442, CVE-2013-2443 CVE-2013-2444, CVE-2013-2445 CVE-2013-2446, CVE-2013-2447 CVE-2013-2448, CVE-2013-2449 CVE-2013-2450, CVE-2013-2451 CVE-2013-2452, CVE-2013-2453 CVE-2013-2454, CVE-2013-2455 CVE-2013-2456, CVE-2013-2457

234

Searching for the biofuel energy crisis in rural Java  

SciTech Connect

Biofuel shortage in peasant economies is often reported to reach crisis proportions in conditions of high population density. As a group, peasants are portrayed as engaging in irrational biofuel resource abuse. At times this abuse is treated as the inevitable outcome of excess biofuel demand. Otherwise, an explanation is often given in terms of resource-use problems inherent in common property. An alternative explanation is proposed in this dissertation. Rather than the effect of common property (a structure), such crises are more likely the result of capitalist expansion (a process). Systems of common foraging are prone to ownership conflict during transitions to private property. This conflict provides a more cogent explanation for biofuel shortage than any structural flaw in common-use systems. Contemporary rural Java contradicts mechanistic applications of supply/demand models of biofuel shortage. Despite high population pressure, biofuel is not inordinately scarce. There is little basis for the crisis predictions. While assessments of biofuel demand and supply can provide scarcity indicators, they ought not be used to predict overuse. The traditional crisis predictions of supply/demand balancing and common property analysis must be replaced by a more skeptical multi-disciplinary approach.

McGranahan, G.

1986-01-01T23:59:59.000Z

235

High-performance file I/O in Java : existing approaches and bulk I/O extensions.  

Science Conference Proceedings (OSTI)

There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

2001-07-01T23:59:59.000Z

236

Double Crystal Analyzer System  

Science Conference Proceedings (OSTI)

... 2002 Page 2. Bloomberg Center for Physics & Astronomy • Johns Hopkins University • Baltimore • Maryland MACS Double ...

2002-02-25T23:59:59.000Z

237

Gain Time Reclaiming in High Performance Real-Time Java Systems  

E-Print Network (OSTI)

The run-time characteristics of Java, such as high frequency of method invocation, dynamic dispatching and dynamic loading, make Java more difficult than other object-oriented programming languages, such as C++, for conducting Worst-Case Execution Time (WCET) analysis. To offer a more flexible way to develop object-oriented real-time applications in the realtime Java environment without loss of predicability and performance, we propose a novel gain time reclaiming framework integrated with WCET analysis. This paper demonstrates how to improve the utilisation and performance of the whole system by reclaiming gain time at run-time. Our approach shows that integrating WCET with gain time reclaiming can not only provide a more flexible environment, but it also does not necessarily result in unsafe or unpredictable timing behaviour.

Erik Yu-Shing Hu; Andy Wellings; Guillem Bernat

2003-01-01T23:59:59.000Z

238

JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes  

E-Print Network (OSTI)

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called 'byte' codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks. But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. Hence programmers resort to adhoc manual ways of obscuring their program which makes it difficult for its maintenance and usability. To address thi...

Sivadasan, Praveen; Sivadasan, Naveen

2008-01-01T23:59:59.000Z

239

Object-Oriented Intensional Programming: Intensional Classes Using Java and Lucid  

E-Print Network (OSTI)

This article introduces Object-Oriented Intensional Programming (OO-IP), a new hybrid language between Object-Oriented and Intensional Programming Languages in the sense of the latest evolutions of Lucid. This new hybrid language combines the essential characteristics of Lucid and Java, and introduces the notion of object streams which makes it is possible that each element in a Lucid stream to be an object with embedded intensional properties. Interestingly, this hybrid language also brings to Java objects the power to explicitly express and manipulate the notion of context, creating the novel concept of intensional object, i.e. objects whose evaluation is context-dependent, which are here demonstrated to be translatable into standard objects. By this new approach, we extend the use and meaning of the notion of intensional objects and enrich the meaning of object streams in Lucid and semantics of intensional objects in Java.

Wu, Aihua; Mokhov, Serguei A

2009-01-01T23:59:59.000Z

240

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

401 - 15410 of 28,905 results. 401 - 15410 of 28,905 results. Download REQUEST FOR RECORDS DISPOSITION AUTHORITY http://energy.gov/cio/downloads/request-records-disposition-authority-23 Article T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability Novell Access Manager Java Double Literal Denial of Service Vulnerability. http://energy.gov/cio/articles/t-581-novell-access-manager-java-double-literal-denial-service-vulnerability Article V-160: Wireshark Multiple Bugs Let Remote Users Deny Service Multiple vulnerabilities have been reported in Wireshark http://energy.gov/cio/articles/v-160-wireshark-multiple-bugs-let-remote-users-deny-service Download Before the House Science and Technology Subcommittee on Energy and Environment Subject: Marine and Hydrokinetic Energy Technology: Finding the Path to

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Measuring Sulphur Dioxide (SO2) Emissions in October, 2010 Catastrophic Eruption from Merapi Volcano in Java, Indonesia  

E-Print Network (OSTI)

Volcano in Java, Indonesia with Ozone Monitoring Instrument (OMI) José A. Morales-Collazo Geology This paper discusses sulfur dioxide (SO2) cloud emissions from Merapi Volcano in Java, Indonesia during, Indonesia. In October 26th , 2010, a catastrophic eruption was reported from Merapi causing nearly 386

Gilbes, Fernando

242

Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays  

E-Print Network (OSTI)

Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays. The class method definition codes are obscured through index transformation and constant hiding. The instantiated objects of these classes are used for source code writing. A tool named JDATATRANS is developed for generating classes and to the best of our knowledge this is the first tool available for array restructuring, on java source codes.

Sivadasan, Praveen

2008-01-01T23:59:59.000Z

243

jContractor: Introducing Design-by-Contract to Java Using Reflective Bytecode Instrumentation  

Science Conference Proceedings (OSTI)

Design by Contract is a software engineering practice that allows semantic information to be added to a class or interface to precisely specify the conditions that are required for its correct operation. The basic constructs of Design by Contract are ... Keywords: Design by Contract, Java, bytecode instrumentation, jContractor

Murat Karaorman; Parker Abercrombie

2005-11-01T23:59:59.000Z

244

DESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH  

E-Print Network (OSTI)

for incoming calls to the exported remote object. The others are worker threads for handling each accepted-time worker threads for handling incoming calls to exported remote objects. We have modified the run() methodDESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH Sangig Rho Samsung

Choi, Byung K.

245

Hard Real-Time Garbage Collection for a Java Chip Multi-Processor  

E-Print Network (OSTI)

or hard copies of all or part of this work for personal or classroom use is granted without fee provided, these approaches implement substantial parts or all of the garbage collector in hard- ware. In contrast, ourHard Real-Time Garbage Collection for a Java Chip Multi-Processor Wolfgang Puffitsch Institute

246

CSY3019 -Graphics Programming Assignment 2: Development of 3D graphics software: Java 2D (50%)  

E-Print Network (OSTI)

CSY3019 - Graphics Programming Assignment 2: Development of 3D graphics software: Java 2D (50 and/or strip lights). · User defined or loaded geometry (i.e. not primitive shapes). · The room & Title Page · Table of contents · Introduction · Analysis · Design · Implementation · Testing

Hill, Gary

247

Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators  

E-Print Network (OSTI)

This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

Tucci, Robert R

2008-01-01T23:59:59.000Z

248

Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators  

E-Print Network (OSTI)

This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

Robert R. Tucci

2008-02-17T23:59:59.000Z

249

A High Integrity Profile for Memory Safe Programming in Real-time Java  

E-Print Network (OSTI)

the structure of Real-time Java programs. By giving an additional mean- ing to the package construct, we, de be allocated within any package ­ but will be prevented from abstract class ScopeGate { protected Scope, we moved classes amongst packages so that Scoped Zen's package structure matched the scope structure

Zhao, Tian

250

Real-time remote control of a robot manipulator using Java and client-server architecture  

Science Conference Proceedings (OSTI)

The control of complex systems through PC networks is becoming increasingly important nowadays, both in the industries and in R&D centers. In this paper, a novel architecture is described which provides 24-h-a-day access to a remote system for remote ... Keywords: RS232, client, communication protocol, internet, java, planar manipulator, real-time, remote control, server

F. M. Raimondi; L. S. Ciancimino; M. Melluso

2005-03-01T23:59:59.000Z

251

Proceedings of the 3rd international symposium on Principles and practice of programming in Java  

Science Conference Proceedings (OSTI)

It gives me great pleasure to welcome you to Las Vegas, Nevada for the 3rd International Conference on Principles and Practice of Programming in Java.Forty one papers were submitted and a total of twenty four (58%) have been selected for presentation ...

John Waldron

2004-06-01T23:59:59.000Z

252

A Time-Lagged Ensemble Simulation on the Modulation of Precipitation over West Java in January–February 2007  

Science Conference Proceedings (OSTI)

A numerical experiment using a regional nonhydrostatic model is performed to investigate the synoptic condition related to the heavy precipitation event that occurred at Jakarta in West Java, Indonesia, in January–February 2007. A time-lagged ...

Nurjanna J. Trilaksono; Shigenori Otsuka; Shigeo Yoden

2012-02-01T23:59:59.000Z

253

A Java Library for the Generation and Scheduling of PTX Assembly  

SciTech Connect

This paper discusses an ongoing progress regarding the development of a Java-based library for rapid kernel prototyping in NVIDIA PTX and PTX instruction scheduling. It is aimed at developers seeking total control of emitted PTX, highly parametric emission of, and tunable instruction reordering. It is primarily used for code development at ICHEC but is also hoped that NVIDIA GPU community will also find it beneficial.

Kartsaklis, Christos [ORNL; Civario, G [Irish Centre for High-End Computing

2010-01-01T23:59:59.000Z

254

SoapRMI C++/Java 1.1: Design and Implementation  

E-Print Network (OSTI)

Java RMI provides a simple and elegant paradigm for communication with objects in remote address spaces. RMI is a de facto standard for communication in distributed systems that are written in different languages and optimized to run in disparate environments. XML [10] has emerged as a promising standard for language-independent data representation, and HTTP as a widely-used firewall-friendly network protocol. It is now possible to design and develop a communication system that combines the elegance and strength of Java RMI with the ubiquity of HTTP and platform and language independence of XML. SOAP [12] defines XML based communication and SOAP RPC precisely states the protocol for using XML as the data format and HTTP as the network protocol. This paper presents the design issues in layering a C++ and Java based RMI system on top of SOAP RPC along with an efficient XML Pull Parser that we designed to parse SOAP calls. We explain the various features of the resulting SoapRMI system: dynamic proxies, stub-skeleton generation from XML specification, interoperability, exception handling and different "Naming" services. Key Words: RMI, Distributed Systems, XML, SOAP, Naming 1

Aleksander Slominski; Madhusudhan Govindaraju; Dennis Gannon; Randall Bramley

2001-01-01T23:59:59.000Z

255

Double Degenerate Binary Systems  

Science Conference Proceedings (OSTI)

In this study, angular momentum loss via gravitational radiation in double degenerate binary (DDB)systems (NS + NS, NS + WD, WD + WD, and AM CVn) is studied. Energy loss by gravitational waves has been estimated for each type of systems.

Yakut, K. [University of Ege, Department of Astronomy and Space Sciences, 35100-Izmir (Turkey)

2011-09-21T23:59:59.000Z

256

In Proceedings of the Internet Society Symp. on Network and Distributed System Security, San Diego, CA, March 1988 Implementing Protection Domains in the Java TM Development Kit 1.2  

E-Print Network (OSTI)

­ pals. The new class java.security.ProtectionDomain is package­private, and is transparent to most Java.security package. #12; From within Java code, the protection domain of a given class is obtained by invoking the static method getProtectionDomain(CodeSource), again a private method within the package. For each class

Krintz, Chandra

257

A matterless double slit  

E-Print Network (OSTI)

Double-slits provide incoming photons with a choice. Those that survive the passage have chosen from two possible paths which interfere to distribute them in a wave-like manner. Such wave-particle duality continues to be challenged and investigated in a broad range of disciplines with electrons, neutrons, helium atoms, C60 fullerenes, Bose-Einstein condensates and biological molecules. All variants have hitherto involved material constituents. We present a matterless double-slit scenario in which photons generated from virtual electron-positron pair annihilation in head-on collisions of a probe laser field with two ultra-intense laser beams form a double-slit interference pattern. Such electromagnetic fields are predicted to induce material-like behaviour in the vacuum, supporting elastic scattering between photons. Our double-slit scenario presents on the one hand a realisable method to observe photon-photon scattering, and demonstrates on the other, the possibility of both controlling light with light and non-locally investigating features of the quantum vacuum's structure.

B. King; A. Di Piazza; C. H. Keitel

2013-01-29T23:59:59.000Z

258

DOUBLE MAJORS Imaging Science + ...  

E-Print Network (OSTI)

DOUBLE MAJORS Imaging Science + ... Applied Mathematics Biomedical Sciences Computer Science Undergraduate Research Internships and Cooperative Education (Co-op) (optional) Study Abroad WHY IMAGING SCIENCE Science: BS, MS, PhD Color Science: MS, PhD BS + MS/PhD Combos HUMAN VISION BIO- MEDICAL ASTRO- PHYSICS

Zanibbi, Richard

259

Double-digit growth  

SciTech Connect

The global need for additional generating capacity continues to grow at double digit rates in some cases. Opportunities for partnerships and joint ventures vary considerably by country and region. A closer look is taken at five countries where the playing fields are increasingly tipping to favor outside partners in power development projects -- India, Indonesia, Malaysia, Thailand, and Mexico.

Cartselos, T.; Meade, W.; Hernandez, L.

1993-09-01T23:59:59.000Z

260

Design of an XML based Interoperable RMI System: SoapRMI C++/Java 1.1  

E-Print Network (OSTI)

and remote exception handling between the C++ and Java implementations of SoapRMI. The paper explores JVM as the remote object and handles communication with the stub. The registry is used to manage for communication with objects in remote address spaces. RMI is a de facto standard for communication in distributed

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

CSY3019 -Graphics Programming Assignment 2: Development of 2D/3D graphics software: Java 3D (50%)  

E-Print Network (OSTI)

CSY3019 - Graphics Programming Assignment 2: Development of 2D/3D graphics software: Java 3D (50, directional, point and spot lighting (to model windows and/or strip lights). · User defined or loaded geometry. Front Sheet & Title Page · Table of contents · Introduction · Analysis · Design · Implementation

Hill, Gary

262

Jiazzi: New-Age Components for Old-Fashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

, the structure of classes in a unit's imported and exported packages can be described using package signatures structure of classes in a Java package. In Figure 2, the package signature ui s describes a UI library Program. In the package signature the structure of a class is described using a class signature. The class

Hsieh, Wilson

263

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated, and Buffered Indices  

E-Print Network (OSTI)

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated structures. This could happen if you want the students in your database class to implement some basic index structures such as the B+-tree and the linear hashing. Alternatively, you may want your Ph.D. students

Zhang, Donghui

264

Jiazzi: New-Age Components for Old-Fashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

this language, the structure of classes in a unit's imported and exported packages can be described using that are used to describe the visi- ble structure of classes in a Java package. In Figure 2, the package applet s describes an application with class Program. In the package signature the structure of a class

Flatt, Matthew

265

Jiazzi: NewAge Components for OldFashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

this language, the structure of classes in a unit's imported and exported packages can be described using that are used to describe the visi­ ble structure of classes in a Java package. In Figure 2, the package applet s describes an application with class Program. In the package signature the structure of a class

Utah, University of

266

A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James M. Russell a  

E-Print Network (OSTI)

A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James of Mining and Petroleum Engineering, Institut Teknologi Bandung, Bandung 40132, Indonesia d Department Available online Keywords: Drought Indonesia Indo-Pacific Warm Pool El Niño-Southern Oscillation Little Ice

Vuille, Mathias

267

Fluid transport properties and estimation of overpressure at the Lusi mud volcano, East Java Basin (Tanikawa et al., 2010)  

E-Print Network (OSTI)

Java Basin (Tanikawa et al., 2010) Richard Daviesa, , Michael Mangab , Mark Tingayc , Richard was caused by drilling of the Banjar Panji 1 gas exploration well (Davies et al., 2007; Manga, 2007; Davies et al., 2008; Tingay et al., 2008) or due to the Yogyakarta earthquake that occurred at 05:54 am

Manga, Michael

268

LinguisticBelief: a java application for linguistic evaluation using belief, fuzzy sets, and approximate reasoning.  

Science Conference Proceedings (OSTI)

LinguisticBelief is a Java computer code that evaluates combinations of linguistic variables using an approximate reasoning rule base. Each variable is comprised of fuzzy sets, and a rule base describes the reasoning on combinations of variables fuzzy sets. Uncertainty is considered and propagated through the rule base using the belief/plausibility measure. The mathematics of fuzzy sets, approximate reasoning, and belief/ plausibility are complex. Without an automated tool, this complexity precludes their application to all but the simplest of problems. LinguisticBelief automates the use of these techniques, allowing complex problems to be evaluated easily. LinguisticBelief can be used free of charge on any Windows XP machine. This report documents the use and structure of the LinguisticBelief code, and the deployment package for installation client machines.

Darby, John L.

2007-03-01T23:59:59.000Z

269

Java Tool Framework for Automation of Hardware Commissioning and Maintenance Procedures  

Science Conference Proceedings (OSTI)

The National Ignition Facility (NIF) is a 192-beam laser system designed to study high energy density physics. Each beam line contains a variety of line replaceable units (LRUs) that contain optics, stepping motors, sensors and other devices to control and diagnose the laser. During commissioning and subsequent maintenance of the laser, LRUs undergo a qualification process using the Integrated Computer Control System (ICCS) to verify and calibrate the equipment. The commissioning processes are both repetitive and tedious when we use remote manual computer controls, making them ideal candidates for software automation. Maintenance and Commissioning Tool (MCT) software was developed to improve the efficiency of the qualification process. The tools are implemented in Java, leveraging ICCS services and CORBA to communicate with the control devices. The framework provides easy-to-use mechanisms for handling configuration data, task execution, task progress reporting, and generation of commissioning test reports. The tool framework design and application examples will be discussed.

Ho, J C; Fisher, J M; Gordon, J B; Lagin, L J; West, S L

2007-10-02T23:59:59.000Z

270

A distributed hard real-time Java system for high mobility components  

E-Print Network (OSTI)

In this work we propose a methodology for providing real-time capabilities to component-based, on-the-fly recon?gurable, distributed systems. In such systems, software components migrate across computational resources at run-time to allow applications to adapt to changes in user requirements or to external events. We describe how we achieve run-time recon?guration in distributed Java applications by appropriately migrating servers. Guaranteed-rate schedulers at the servers provide the necessary temporal protection and so simplify remote method invocation management. We describe how we manage overhead and resource utilization by controlling the parameters of the server schedulers. According to our measurements, this methodology provides real-time capability to component-based recon?gurable distributed systems in an effcient and effective way. In addition, we propose a new resource discovery protocol, REALTOR, which is based on a combination of pull-based and push-based resource information dissemination. REALTOR has been designed for real-time component-based distributed applications in very dynamic or adverse environments. REALTOR supports survivability and information assurance by allowing the migration of components to safe locations under emergencies suchas externalattack, malfunction, or lackofresources. Simulation studies show that under normal and heavy load conditions REALTOR remains very effective in finding available resources, and does so with a reasonably low communication overhead.REALTOR 1)effectively locates resources under highly dynamic conditions, 2) has an overhead that is system-size independent, and 3) works well in highlyadverse environments.We evaluate the effectiveness of a REALTOR implementation as part of Agile Objects, an infrastructure for real-time capable, highly mobile Java components.

Rho, Sangig

2004-12-01T23:59:59.000Z

271

Double domino driver  

DOE Patents (OSTI)

The double domino driver is fully differential and is optimized for low switching noise and power. The noise behavior and power dissipation is improved by limiting the signal swing. The domino driver consists of a combination of mini drivers, each of which is switched on in two steps. In the first step a voltage equal to a fraction of the supply voltage propagates through the chain of mini drivers and turn them partially on. In the second step the voltage is increased to its maximum value and is made to propagate through the chain, turning the mini drivers completely on. The rise and fall time of the output signal can be increased by adding mini drivers. For a 5 volt supply voltage with 5 mini drivers the switching noise in decreased to levels less than 100 micro volts. The power dissipation with this driver is least as compared to ECL and other logic systems. The double domino driver is useful in communication and VLSI systems.

Vanstraelen, G.F.

1992-01-01T23:59:59.000Z

272

One dimensional P wave velocity structure of the crust beneath west Java and accurate hypocentre locations from local earthquake inversion  

SciTech Connect

A one-dimensional (1-D) velocity model and station corrections for the West Java zone were computed by inverting P-wave arrival times recorded on a local seismic network of 14 stations. A total of 61 local events with a minimum of 6 P-phases, rms 0.56 s and a maximum gap of 299 Degree-Sign were selected. Comparison with previous earthquake locations shows an improvement for the relocated earthquakes. Tests were carried out to verify the robustness of inversion results in order to corroborate the conclusions drawn out from our reasearch. The obtained minimum 1-D velocity model can be used to improve routine earthquake locations and represents a further step toward more detailed seismotectonic studies in this area of West Java.

Supardiyono; Santosa, Bagus Jaya [Physics Department, Faculty of Mathematics and Natural Sciences, State University of Surabaya, Surabaya (Indonesia) and Physics Department, Faculty of Mathematics and Natural Sciences, Sepuluh Nopember Institute of Technology, Surabaya (Indonesia); Physics Department, Faculty of Mathematics and Natural Sciences, Sepuluh Nopember Institute of Technology, Surabaya (Indonesia)

2012-06-20T23:59:59.000Z

273

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 8, 2011 T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. August 5, 2011 T-685: Cisco Warranty CD May Load Malware From a Remote Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. August 3, 2011 T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. August 2, 2011 T-682:Double free vulnerability in MapServer MapServer developers have discovered flaws in the OGC filter support in

274

StrBioLib: a Java library for development of custom computationalstructural biology applications  

SciTech Connect

Summary: StrBioLib is a library of Java classes useful fordeveloping software for computational structural biology research.StrBioLib contains classes to represent and manipulate proteinstructures, biopolymer sequences, sets of biopolymer sequences, andalignments between biopolymers based on either sequence or structure.Interfaces are provided to interact with commonly used bioinformaticsapplications, including (PSI)-BLAST, MODELLER, MUSCLE, and Primer3, andtools are provided to read and write many file formats used to representbioinformatic data. The library includes a general-purpose neural networkobject with multiple training algorithms, the Hooke and Jeeves nonlinearoptimization algorithm, and tools for efficient C-style string parsingand formatting. StrBioLib is the basis for the Pred2ary secondarystructure prediction program, is used to build the ASTRAL compendium forsequence and structure analysis, and has been extensively tested throughuse in many smaller projects. Examples and documentation are available atthe site below.Availability: StrBioLib may be obtained under the terms ofthe GNU LGPL license from http://strbio.sourceforge.net/Contact:JMChandonia@lbl.gov

Chandonia, John-Marc

2007-05-14T23:59:59.000Z

275

Chemical Weathering of New Pyroclastic Deposits from Mt. Merapi (Java), Indonesia  

SciTech Connect

Java Island, Indonesia with abundant amount of pyroclastic deposits is located in the very active and dynamic Pacific Ring of Fires. Studying the geochemical weathering indices of these pyroclastic deposits is important to get a clear picture about weathering profiles on deposits resulting from the eruption of Mt. Merapi. Immediately after the first phase of the eruption (March to June 2006), moist and leached pyroclastic deposits were collected. These pyroclastic deposits were found to be composed of volcanic glass, plagioclase feldspar in various proportions, orthopyroxene, clinopyroxene, olivine, amphibole, and titanomagnetite. Total elemental composition of the bulk samples (including trace elements and heavy metals) were determined by wet chemical methods and X-ray fluorescence (XRF) analyses. Weathering of the pyroclastic deposits was studied using various weathering indices. The Ruxton ratio, weathering index of Parker, Vought resudual index and chemical index of weathering of moist pyroclastic are lower than the leached sample but the alteration indices (chemical and plagioclase) are slightly higher in the moist compared to the leached pyroclastic deposits.

Fiantis, Dian; Nelson, Malik; Van Ranst, Eric; Shamshudin, Josup; Qafoku, Nikolla

2009-09-01T23:59:59.000Z

276

A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode  

E-Print Network (OSTI)

We propose a light-weight approach for certification of monitor inlining for sequential Java bytecode using proof-carrying code. The goal is to enable the use of monitoring for quality assurance at development time, while minimizing the need for post-shipping code rewrites as well as changes to the end-host TCB. Standard automaton-based security policies express constraints on allowed API call/return sequences. Proofs are represented as JML-style program annotations. This is adequate in our case as all proofs generated in our framework are recognized in time polynomial in the size of the program. Policy adherence is proved by comparing the transitions of an inlined monitor with those of a trusted "ghost" monitor represented using JML-style annotations. At time of receiving a program with proof annotations, it is sufficient for the receiver to plug in its own trusted ghost monitor and check the resulting verification conditions, to verify that inlining has been performed correctly, of the correct policy. We ha...

Dam, Mads

2010-01-01T23:59:59.000Z

277

Double acting bit holder  

DOE Patents (OSTI)

A double acting bit holder that permits bits held in it to be resharpened during cutting action to increase energy efficiency by reducing the amount of small chips produced. The holder consist of: a stationary base portion capable of being fixed to a cutter head of an excavation machine and having an integral extension therefrom with a bore hole therethrough to accommodate a pin shaft; a movable portion coextensive with the base having a pin shaft integrally extending therefrom that is insertable in the bore hole of the base member to permit the moveable portion to rotate about the axis of the pin shaft; a recess in the movable portion of the holder to accommodate a shank of a bit; and a biased spring disposed in adjoining openings in the base and moveable portions of the holder to permit the moveable portion to pivot around the pin shaft during cutting action of a bit fixed in a turret to allow front, mid and back positions of the bit during cutting to lessen creation of small chip amounts and resharpen the bit during excavation use.

Morrell, Roger J. (Blommington, MN); Larson, David A. (Minneapolis, MN); Ruzzi, Peter L. (Eagan, MN)

1994-01-01T23:59:59.000Z

278

Celestijnenlaan 200A – B-3001 Heverlee (Belgium) Verification of data-race-freedom of a Java chat server with VeriFast  

E-Print Network (OSTI)

Even now, when computers have become a vital part of our society, software errors are still common, and their effects can be devastating. From the recent rise of multicores emerged the need for multi-threading software and a way to cope with its typical software errors such as data-races and deadlocks. This paper shows how Veri-Fast can be used to verify the data-race-freedom of a multi-threaded Java application, by means of a simple Java chat server example. We will cover the verification of jar files in general, how to deal with Java core classes and interfaces such as ArrayList and the specifics of verifying a multi-threaded Java application, using Thread, Runnable and Semaphore as building blocks. To achieve this, we need to take a closer look at VeriFast elements such as predicate families, predicate constructors and fractional permissions. This paper is intended as an experience report. We will conclude with some suggested improvements and possible future work. Verification of data-race-freedom of a Java chat server with

Cedric Cuypers; Bart Jacobs; Frank Piessens; Cedric Cuypers; Bart Jacobs; Frank Piessens; Cedric Cuypers; Bart Jacobs; Frank Piessens

2009-01-01T23:59:59.000Z

279

Alloy by Double Mechanical Milling  

Science Conference Proceedings (OSTI)

The results show that the morphology of double mechanical milling powder is regular and the TiAl phase and Ti3Al phase were observed in the powders.

280

Double-super-connected digraphs  

Science Conference Proceedings (OSTI)

A strongly connected digraph D is said to be super-connected if every minimum vertex-cut is the out-neighbor or in-neighbor set of a vertex. A strongly connected digraph D is said to be double-super-connected if every minimum vertex-cut is both the out-neighbor ... Keywords: Cartesian product, Double-super-connected, Lexicographic product, Line digraphs, Super-connected

Juan Liu; Jixiang Meng; Zhao Zhang

2010-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 30, 2011 March 30, 2011 T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. March 18, 2011 T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space. March 17, 2011 T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability Novell Access Manager Java Double Literal Denial of Service Vulnerability. March 16, 2011 T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections

282

Decimal System and Double Digits  

NLE Websites -- All DOE Office Websites (Extended Search)

Decimal System and Double Digits Decimal System and Double Digits Name: Ken Status: other Grade: other Country: Canada Date: April 2011 Question: If the origin of the decimal system reflects counting on ten fingers and if zero came into use after the decimal system had been established why did we not create a single symbol for our tenth digit rather than use the double digit 10? If T were to represent the tenth number this would have created a counting system where the number series 1,2...9,T is followed by the same series having a 1 to the left then followed by the same series having a 2 to the left, etc. The T would be the last number in a series of ten single digits rather than be the first number in a series of double digits. The symbol zero would be used only between negative one and positive one because it represents the existence of nothing and, therefore, would have no other function.

283

Hierarchy in a double braneworld  

Science Conference Proceedings (OSTI)

We show that the hierarchy between the Planck and the weak scales can follow from the tendency of gravitons and fermions to localize at different edges of a thick double wall embedded in an AdS{sub 5} spacetime without reflection symmetry. This double wall is a stable BPS thick-wall solution with two subwalls located at its edges; fermions are coupled to the scalar field through Yukawa interactions, but the lack of reflection symmetry forces them to be localized in one of the subwalls. We show that the graviton zero-mode wave function is suppressed in the fermion edge by an exponential function of the distance between the subwalls, and that the massive modes decouple so that Newtonian gravity is recuperated.

Guerrero, Rommel; Rodriguez, R. Omar [Unidad de Investigacion en Ciencias Matematicas, Universidad Centroccidental Lisandro Alvarado, 400 Barquisimeto (Venezuela); Melfo, Alejandra; Pantoja, Nelson [Centro de Fisica Fundamental, Universidad de Los Andes, Merida (Venezuela)

2006-10-15T23:59:59.000Z

284

A Double Smoothing Technique for Constrained Convex ...  

E-Print Network (OSTI)

In this paper, we propose an efficient approach for solving a class of convex opti- ... accelerate our scheme, we introduce a novel double smoothing technique ...

285

Micromegas readouts for double beta decay searches  

E-Print Network (OSTI)

Double beta $\\beta\\beta$ decay experiments are one of the most active research topics in Neutrino Physics. The measurement of the neutrinoless mode $0\

Cebrián, S; Ferrer-Ribas, E; Galán, J; García, J A; Giomataris, I; Gómez, H; Herrera, D C; Iguaz, F J; Irastorza, I G; Luzón, G; Rodríguez, A; Seguí, L; Tomás, A

2010-01-01T23:59:59.000Z

286

Micromegas readouts for double beta decay searches  

E-Print Network (OSTI)

Double beta $\\beta\\beta$ decay experiments are one of the most active research topics in Neutrino Physics. The measurement of the neutrinoless mode $0\

S. Cebrián; T. Dafni; E. Ferrer-Ribas; J. Galán; J. A. García; I. Giomataris; H. Gómez; D. C. Herrera; F. J. Iguaz; I. G. Irastorza; G. Luzón; A. Rodríguez; L. Seguí; A. Tomás

2010-09-09T23:59:59.000Z

287

Double perovskite catalysts for oxidative coupling  

DOE Patents (OSTI)

Alkali metal doped double perovskites containing manganese and at least one of cobalt, iron and nickel are useful in the oxidative coupling of alkane to higher hydrocarbons.

Campbell, K.D.

1991-01-01T23:59:59.000Z

288

Double Patenting--One Patent per Invention  

Science Conference Proceedings (OSTI)

Double Patenting—One Patent per Invention. Arnold B. Silverman. Patent claims recite the scope of protection provided by a patent. The Patent Statute ...

289

Kernridge project does double duty  

SciTech Connect

The huge volume of steam that Kernridge Oil Co. generates to increase production of heavy crude oil from California's South Belridge field may do double duty. The company, a subsidiary of Shell Oil Co., is in the planning stages with a cogeneration project that would produce enough electricity to meet the electric needs of a community of more than 200,000 people. Meanwhile, Kernridge continues to exceed projections used in the acquisition assessment for the former Belridge Oil Co. properties which the Kernridge parent, Shell, bought in December 1979. The company formed Kernridge early in 1980 to operate the former Belridge properties. Since taking over, Kernridge has pursued development aggressively and has increased production to 65,000 bopd from the previous owner's 42,000 bopd.

Not Available

1981-10-01T23:59:59.000Z

290

Improved double planar probe data analysis technique  

Science Conference Proceedings (OSTI)

Plasma electron number density and ion number density in a dc multidipole weakly collisional Ar plasma are measured with a single planar Langmuir probe and a double planar probe, respectively. A factor of two discrepancy between the two density measurements is resolved by applying Sheridan's empirical formula [T. E. Sheridan, Phys. Plasmas 7, 3084 (2000)] for sheath expansion to the double probe data.

Ghim, Young-chul; Hershkowitz, Noah [Department of Engineering Physics, University of Wisconsin-Madison, Madison, Wisconsin 53706 (United States)

2009-03-15T23:59:59.000Z

291

Double bevel construction of a diamond anvil  

DOE Patents (OSTI)

A double or multiple bevel culet geometry is used on a diamond anvil in a high pressure cell apparatus to provide increased sample pressure and stability for a given force applied to the diamond tables. Double or multiple bevel culet geometries can also be used for sapphire or other hard crystal anvils. Pressures up to and above 5 Megabars can be reached. 8 figs.

Moss, W.C.

1988-10-11T23:59:59.000Z

292

White Paper Sun Java Workstation W1100z and W2100z Architecture On the Web sun.com Sun Java TM Workstation W1100z and W2100z Architecture  

E-Print Network (OSTI)

All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. Sun, Sun Microsystems, the Sun logo, Java, Solaris, Solaris JumpStart, Sun N1, Sun Ray, and Net Beans are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun ™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.

unknown authors

2004-01-01T23:59:59.000Z

293

Reliability Estimation for Double Containment Piping  

Science Conference Proceedings (OSTI)

Double walled or double containment piping is considered for use in the ITER international project and other next-generation fusion device designs to provide an extra barrier for tritium gas and other radioactive materials. The extra barrier improves confinement of these materials and enhances safety of the facility. This paper describes some of the design challenges in designing double containment piping systems. There is also a brief review of a few operating experiences of double walled piping used with hazardous chemicals in different industries. This paper recommends approaches for the reliability analyst to use to quantify leakage from a double containment piping system in conceptual and more advanced designs. The paper also cites quantitative data that can be used to support such reliability analyses.

L. Cadwallader; T. Pinna

2012-08-01T23:59:59.000Z

294

A parametric study of double-shell tank response to internal high-frequency pressure loading  

DOE Green Energy (OSTI)

The double-shell waste tank 241SY101 (SY101) is a 3,785,400-liter tank used to store radioactive waste at the Hanford Site near Richland, Washington. The tank waste has formed two layers of sludge in the tank; a convective and a nonconvective layer. Ongoing reactions in the waste cause a buildup of hydrogen molecules that become trapped within the nonconvective layer of the waste. Various means of preventing the buildup of hydrogen molecules in the nonconvective layer have been investigated, including the use of a sonic probe that would transmit high-frequency acoustic pressure waves into the nonconvective layer of the waste. During the operation of the sonic probe, the pressure waves transmitted from the probe induce pressure time history loading on the inside surface of the primary tank. For low-frequency fluid-structure interaction loads, such as those associated with seismic events, the convective and impulsive effects of the waste-filled tank are well documented. However, for high-frequency loading, such as that associated with acoustic pressure waves, interactions between the waste and the primary tank are not understood. The pressure time history is represented by a harmonic function with a frequency range between 30 and 100 Hz. Structural analyses of the double-shell tank have been performed that address the tank`s response to the sonic probe acoustic pressure loads. This paper addresses the variations in the tank response as a function of percent waste mass considered to be effective in the dynamic excitation of the tank. It also compares results predicted by analyses that discretely model the liquid waste and presents recommendations for the simplified effective mass approach. Also considered in the parametric study is the effect of damping on the tank response for the same pressure loading.

Baliga, R.; Choi, K.; Shulman, J.S. [ADVENT Engineering Services, Inc., San Ramon, CA (United States); Strehlow, J.P.; Abatt, G. [Westinghouse Hanford Co., Richland, WA (United States)

1995-02-01T23:59:59.000Z

295

Seismic facies and growth history of Miocene carbonate platforms, Wonocolo Formation, North Madura area, East Java Basin, Indonesia  

E-Print Network (OSTI)

The Miocene Wonocolo Formation in the North Madura area, East Java Basin, contains numerous isolated carbonate platforms that are broadly distributed across a ~3000 sq km area of the Indonesian back-arc region. The Wonocolo platforms provide an interesting test for comparing the different growth histories of closely spaced individual platforms, where eustatic history was the same for all the platforms, but where subtle differences in other extrinsic factors influenced their growth. A grid of 2D seismic data and information from several wells across the region were used to map all Wonocolo platforms across the study area. Five growth phases are recognizable in the platforms, based on seismic facies analysis and internal seismic-stratigraphic relationships. Platforms from the western part of the study area are larger in plan view than age-equivalent platforms to the east and record a complex history of platform initiation, backstepping, progradation, coalescence into larger composite platforms, and termination. Although all five growth phases are also recognizable in some Wonocolo platforms from the eastern part of the study area, the eastern platforms are different in that they: 1) are much smaller in plan view, 2) are spaced farther apart, 3) tend to have steeper platform margins, 4) have largely aggradational stratal geometries, 5) are slightly thicker overall than the western platforms, and 6) the tops of the platforms are at greater burial depths than the tops of the western platforms. Most of these differences in platform morphology and growth history can be attributed to slightly faster subsidence rates in the eastern part of the study area. Faster subsidence rates in the eastern part of the study area from 12 - 6 Ma (the age range for the Wonocolo platforms) are probably related to differential surface loading by the Indonesian volcanic arc.

Adhyaksawan, Rahadian

2002-01-01T23:59:59.000Z

296

Why DNA is a double helix  

NLE Websites -- All DOE Office Websites (Extended Search)

Guest14 Location: NA Country: NA Date: NA Question: Why is DNA in a double-helix shape? Replies: The why questions are always the worst. Why is anything the way it is? The...

297

Double layer capacitors : automotive applications and modeling  

E-Print Network (OSTI)

This thesis documents the work on the modeling of double layer capacitors (DLCs) and the validation of the modeling procedure. Several experiments were conducted to subject the device under test to a variety of ...

New, David Allen, 1976-

2004-01-01T23:59:59.000Z

298

D-branes and doubled geometry  

E-Print Network (OSTI)

We define the open string version of the nonlinear sigma model on doubled geometry introduced by Hull and Reid-Edwards, and derive its boundary conditions. These conditions include the restriction of D-branes to maximally isotropic submanifolds as well as a compatibility condition with the Lie algebra structure on the doubled space. We demonstrate a systematic method to derive and classify D-branes from the boundary conditions, in terms of embeddings both in the doubled geometry and in the physical target space. We apply it to the doubled three-torus with constant H-flux and find D0-, D1-, and D2-branes, which we verify transform consistently under T-dualities mapping the system to f-, Q- and R-flux backgrounds.

Cecilia Albertsson; Tetsuji Kimura; Ronald A. Reid-Edwards

2008-06-11T23:59:59.000Z

299

Double Bottom Line Project Report:Assessing Social Impact In Double Bottom Line Ventures  

E-Print Network (OSTI)

of Key Characteristics Glossary Method Summaries Theories ofin double bottom line ventures methods catalog glossary ofterms glossary of terms This glossary defines the variables

Rosenzweig, William

2004-01-01T23:59:59.000Z

300

Running with Java  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC Powering Scientific Discovery Since 1974 Login Site Map | My NERSC search... Go Home About Overview NERSC Mission Contact us Staff Org Chart NERSC History NERSC Stakeholders...

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Keyword programming in Java  

E-Print Network (OSTI)

Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of unordered keywords provided by the user into a valid expression. ...

Little, Danny Greg

302

The double-arm barn door tracker  

NLE Websites -- All DOE Office Websites (Extended Search)

How to build a double-arm barn door tracker How to build a double-arm barn door tracker | Jefferson Lab Home Page | Science Education Home Page | Construction Notes/Photos Page | Sources: Sky & Telescope April 1989 (p436 - p441) [very good] Sky & Telescope February 1988 (p213 - p214) Original concept by Dave Trott A single-arm barn door tracker, driven by a straight screw, accumulates tangent error as time passes. Most of this error can be eliminated by adding a second hinged arm to the standard arrangement. There are four types of double-arm trackers, each with a different geometry. A comparison of accumulated error (in arc seconds) and construction parameters is given below: Error Chart [Apparently Type 1 is very bad and not worth constructing?? The two Type 4 drives vary in beta. This results in shifting the region of maximum error

303

The double-beta decay: Theoretical challenges  

Science Conference Proceedings (OSTI)

Neutrinoless double beta decay is a unique process that could reveal physics beyond the Standard Model of particle physics namely, if observed, it would prove that neutrinos are Majorana particles. In addition, it could provide information regarding the neutrino masses and their hierarchy, provided that reliable nuclear matrix elements can be obtained. The two neutrino double beta decay is an associate process that is allowed by the Standard Model, and it was observed for about ten nuclei. The present contribution gives a brief review of the theoretical challenges associated with these two process, emphasizing the reliable calculation of the associated nuclear matrix elements.

Horoi, Mihai [Department of Physics, Central Michigan University, Mount Pleasant, Michigan, 48859 (United States)

2012-11-20T23:59:59.000Z

304

Scintillating bolometers for Double Beta Decay search  

E-Print Network (OSTI)

In the field of Double Beta Decay (DBD) searches, the use of high resolution detectors in which background can be actively discriminated is very appealing. Scintillating bolometers containing a Double Beta Decay emitter can largely fulfill this very interesting possibility. In this paper we present the latest results obtained with CdWO4 and CaMoO4 crystals. Moreover we report, for the first time, a very interesting feature of CaMoO4 bolometers: the possibility to discriminate beta-gamma events from those induced by alpha particles thanks to different thermal pulse shape.

Gironi, Luca

2009-01-01T23:59:59.000Z

305

Scintillating bolometers for Double Beta Decay search  

E-Print Network (OSTI)

In the field of Double Beta Decay (DBD) searches, the use of high resolution detectors in which background can be actively discriminated is very appealing. Scintillating bolometers containing a Double Beta Decay emitter can largely fulfill this very interesting possibility. In this paper we present the latest results obtained with CdWO4 and CaMoO4 crystals. Moreover we report, for the first time, a very interesting feature of CaMoO4 bolometers: the possibility to discriminate beta-gamma events from those induced by alpha particles thanks to different thermal pulse shape.

Luca Gironi

2009-11-05T23:59:59.000Z

306

A Microscopic Double-Slit Experiment  

NLE Websites -- All DOE Office Websites (Extended Search)

A Microscopic Double-Slit A Microscopic Double-Slit Experiment A Microscopic Double-Slit Experiment Print Wednesday, 29 February 2012 00:00 Two centuries ago, Thomas Young performed the classic demonstration of the wave nature of light. He placed a screen with two tiny slits in front of a single light source, effectively converting it into a two-centered source. On a second screen far away, he saw a pattern of light and dark diffraction fringes, a well-known hallmark of wave interference. Along with later studies using particles instead of light, the experiment played a crucial role in establishing the validity of wave-particle duality, a puzzling concept that has ultimately become central to the interpretation of complementarity in quantum mechnanics. In a new twist on this classic experiment, the double slit (with light waves) has been replaced by a diatomic molecule (with electron waves). At ALS Beamline 10.0.1, researchers have shown that diatomic molecules can serve as two-center emitters of electron waves and that traces of electron-wave interference can be directly observed in precise measurements of vibrationally resolved photoionization spectra.

307

The Dynamics of Double Monsoon Onsets  

Science Conference Proceedings (OSTI)

Double monsoon onset develops when the strong convection in the Bay of Bengal is accompanied by the monsoonlike circulation and appears in the Indian Ocean in early May, which is about 3 weeks earlier than the climatological date of the onset (1 ...

Maria K. Flatau; Piotr J. Flatau; Daniel Rudnick

2001-11-01T23:59:59.000Z

308

Double?Quantum Light Scattering by Molecules  

Science Conference Proceedings (OSTI)

Double?quantum light scattering by a system of molecules is discussed in this paper. Expressions have been obtained for the scattered light intensity considering both the coherent and incoherent contributions. In that coherent contributions are also considered in this treatment

R. Bersohn; Yoh?Han Pao; H. L. Frisch

1966-01-01T23:59:59.000Z

309

Carports with Solar Panels do Double Duty for Navy | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Carports with Solar Panels do Double Duty for Navy Carports with Solar Panels do Double Duty for Navy May 14, 2010 - 12:22pm Addthis Joshua DeLung What does this project do? In...

310

EA-1136: Double Tracks Test Site, Nye County, Nevada | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Double Tracks Test Site, Nye County, Nevada EA-1136: Double Tracks Test Site, Nye County, Nevada SUMMARY This EA evaluates the environmental impacts of the proposal for the U.S....

311

The Small Quantum Group as a Quantum Double  

E-Print Network (OSTI)

We prove that the quantum double of the quasi-Hopf algebra View the MathML source of We prove that the quantum double of the quasi-Hopf algebra Aq(g)

Etingof, Pavel I.

312

(DDBS) System Doubles Pot Suction, Reduces Roof Emission  

Science Conference Proceedings (OSTI)

... Suction (DDBS) System Doubles Pot Suction, Reduces Roof Emission .... Phase Change Materials in Thermal Energy Storage for Concentrating Solar Power ...

313

Search for ? + / EC double beta decay of 120 Te  

Science Conference Proceedings (OSTI)

We present a search for ? + / EC double beta decay of 120 Te performed with the CUORICINO experiment

C. Tomei; The CUORICINO Collaboration

2011-01-01T23:59:59.000Z

314

System Specification for the Double Shell Tank (DST) System  

Science Conference Proceedings (OSTI)

This document establishes the functional, performance, design, development, interface and test requirements for the Double-Shell Tank System.

GRENARD, C.E.

2000-04-21T23:59:59.000Z

315

Tank characterization for Double-Shell Tank 241-AP-102  

SciTech Connect

This document provides the characterization information and interprets the data for Double-Shell Tank AP-102.

DeLorenzo, D.S.; DiCenso, A.T.; Amato, L.C.; Weyns-Rollosson, M.I.; Smith, D.J. [Los Alamos Technical Associates, Inc., Kennewick, WA (United States); Simpson, B.C.; Welsh, T.L. [Westinghouse Hanford Co., Richland, WA (United States)

1994-08-01T23:59:59.000Z

316

Double layer capacitance of carbon foam electrodes  

DOE Green Energy (OSTI)

We have evaluated a wide variety of microcellular carbon foams prepared by the controlled pyrolysis and carbonization of several polymers including: polyacrylonitrile (PAN), polymethacrylonitrile (PMAN), resorcinol/formaldehyde (RF), divinylbenzene/methacrylonitrile (DVB), phenolics (furfuryl/alcohol), and cellulose polymers such as Rayon. The porosity may be established by several processes including: Gelation (1-5), phase separation (1-3,5-8), emulsion (1,9,10), aerogel/xerogel formation (1,11,12,13), replication (14) and activation. In this report we present the complex impedance analysis and double layer charging characteristics of electrodes prepared from one of these materials for double layer capacitor applications, namely activated cellulose derived microcellular carbon foam.

Delnick, F.M.; Ingersoll, D. [Sandia National Labs., Albuquerque, NM (United States); Firsich, D. [EG& G Mound Lab., Miamisburg, OH (United States)

1993-11-01T23:59:59.000Z

317

Double-clad nuclear fuel safety rod  

DOE Patents (OSTI)

A device for shutting down a nuclear reactor during an undercooling or overpower event, whether or not the reactor's scram system operates properly. This is accomplished by double-clad fuel safety rods positioned at various locations throughout the reactor core, wherein melting of a secondary internal cladding of the rod allows the fuel column therein to shift from the reactor core to place the reactor in a subcritical condition.

McCarthy, William H. (Los Altos, CA); Atcheson, Donald B. (Cupertino, CA); Vaidyanathan, Swaminathan (San Jose, CA)

1984-01-01T23:59:59.000Z

318

A Microscopic Double-Slit Experiment  

NLE Websites -- All DOE Office Websites (Extended Search)

A Microscopic Double-Slit Experiment Print A Microscopic Double-Slit Experiment Print Two centuries ago, Thomas Young performed the classic demonstration of the wave nature of light. He placed a screen with two tiny slits in front of a single light source, effectively converting it into a two-centered source. On a second screen far away, he saw a pattern of light and dark diffraction fringes, a well-known hallmark of wave interference. Along with later studies using particles instead of light, the experiment played a crucial role in establishing the validity of wave-particle duality, a puzzling concept that has ultimately become central to the interpretation of complementarity in quantum mechnanics. In a new twist on this classic experiment, the double slit (with light waves) has been replaced by a diatomic molecule (with electron waves). At ALS Beamline 10.0.1, researchers have shown that diatomic molecules can serve as two-center emitters of electron waves and that traces of electron-wave interference can be directly observed in precise measurements of vibrationally resolved photoionization spectra.

319

A Microscopic Double-Slit Experiment  

NLE Websites -- All DOE Office Websites (Extended Search)

A Microscopic Double-Slit Experiment Print A Microscopic Double-Slit Experiment Print Two centuries ago, Thomas Young performed the classic demonstration of the wave nature of light. He placed a screen with two tiny slits in front of a single light source, effectively converting it into a two-centered source. On a second screen far away, he saw a pattern of light and dark diffraction fringes, a well-known hallmark of wave interference. Along with later studies using particles instead of light, the experiment played a crucial role in establishing the validity of wave-particle duality, a puzzling concept that has ultimately become central to the interpretation of complementarity in quantum mechnanics. In a new twist on this classic experiment, the double slit (with light waves) has been replaced by a diatomic molecule (with electron waves). At ALS Beamline 10.0.1, researchers have shown that diatomic molecules can serve as two-center emitters of electron waves and that traces of electron-wave interference can be directly observed in precise measurements of vibrationally resolved photoionization spectra.

320

A background free double beta decay experiment  

E-Print Network (OSTI)

We present a new detection scheme for rejecting backgrounds in neutrino less double beta decay experiments. It relies on the detection of Cherenkov light emitted by electrons in the MeV region. The momentum threshold is tuned to reach a good discrimination between background and good events. We consider many detector concepts and a range of target materials. The most promising is a high-pressure 136Xe emitter for which the required energy threshold is easily adjusted. Combination of this concept and a high pressure Time Projection Chamber could provide an optimal solution. A simple and low cost effective solution is to use the Spherical Proportional Counter that provides two delayed signals from ionization and Cherenkov light. In solid-state double beta decay emitters, because of their higher density, the considered process is out of energy range. An alternative solution could be the development of double decay emitters with lower density by using for instance the aerogel technique. It is surprising that a technology used for particle identification in high-energy physics becomes a powerful tool for rejecting backgrounds in such low-energy experiments.

Ioannis Giomataris

2010-12-20T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Optical double-slit particle measuring system  

DOE Patents (OSTI)

A method for in situ measurement of particle size is described. The size information is obtained by scanning an image of the particle across a double-slit mask and observing the transmitted light. This method is useful when the particle size of primary interest is 3..mu..m and larger. The technique is well suited to applications in which the particles are non-spherical and have unknown refractive index. It is particularly well suited to high temperature environments in which the particle incandescence provides the light source.

Tichenor, D.A.; Wang, J.C.F.; Hencken, K.R.

1982-03-25T23:59:59.000Z

322

Massive Type II in Double Field Theory  

E-Print Network (OSTI)

We provide an extension of the recently constructed double field theory formulation of the low-energy limits of type II strings, in which the RR fields can depend simultaneously on the 10-dimensional space-time coordinates and linearly on the dual winding coordinates. For the special case that only the RR one-form of type IIA carries such a dependence, we obtain the massive deformation of type IIA supergravity due to Romans. For T-dual configurations we obtain a `massive' but non-covariant formulation of type IIB, in which the 10-dimensional diffeomorphism symmetry is deformed by the mass parameter.

Olaf Hohm; Seung Ki Kwak

2011-08-24T23:59:59.000Z

323

Double Photoionization of excited Lithium and Beryllium  

SciTech Connect

We present total, energy-sharing and triple differential cross sections for one-photon, double ionization of lithium and beryllium starting from aligned, excited P states. We employ a recently developed hybrid atomic orbital/ numerical grid method based on the finite-element discrete-variable representation and exterior complex scaling. Comparisons with calculated results for the ground-state atoms, as well as analogous results for ground-state and excited helium, serve to highlight important selection rules and show some interesting effects that relate to differences between inter- and intra-shell electron correlation.

Yip, Frank L.; McCurdy, C. William; Rescigno, Thomas N.

2010-05-20T23:59:59.000Z

324

Double Photoionization of Aligned Molecular Hydrogen  

SciTech Connect

We present converged, completely ab initio calculations ofthe triple differential cross sections for double photoionization ofaligned H2 molecules for a photon energy of 75.0 eV. The method ofexterior complex scaling, implemented with both the discrete variablerepresentation and B-splines, is used to solve the Schroedinger equationfor a correlated continuum wave function corresponding to a single photonhaving been absorbed by a correlated initial state. Results for a fixedinternuclear distance are compared with recent experiments and show thatintegration over experimental angular and energy resolutions is necessaryto produce good qualitative agreement, but does not eliminate somediscrepancies. Limitations of current experimental resolution are shownto sometimes obscure interesting details of the crosssection.

Vanroose, Wim; Horner, Daniel A.; Martin, Fernando; Rescigno,Thomas N.; McCurdy, C. William

2006-07-21T23:59:59.000Z

325

Double acting stirling engine phase control  

DOE Patents (OSTI)

A mechanical device for effecting a phase change between the expansion and compression volumes of a double-acting Stirling engine uses helical elements which produce opposite rotation of a pair of crankpins when a control rod is moved, so the phase between two pairs of pistons is changed by +.psi. and the phase between the other two pairs of pistons is changed by -.psi.. The phase can change beyond .psi.=90.degree. at which regenerative braking and then reversal of engine rotation occurs.

Berchowitz, David M. (Scotia, NY)

1983-01-01T23:59:59.000Z

326

Neutrinoless double beta decay and neutrino masses  

SciTech Connect

Neutrinoless double beta decay (0{nu}{beta}{beta}) is a promising test for lepton number violating physics beyond the standard model (SM) of particle physics. There is a deep connection between this decay and the phenomenon of neutrino masses. In particular, we will discuss the relation between 0{nu}{beta}{beta} and Majorana neutrino masses provided by the so-called Schechter-Valle theorem in a quantitative way. Furthermore, we will present an experimental cross check to discriminate 0{nu}{beta}{beta} from unknown nuclear background using only one isotope, i.e., within one experiment.

Duerr, Michael [Max-Planck-Institut fuer Kernphysik, Saupfercheckweg 1, 69117 Heidelberg (Germany)

2012-07-27T23:59:59.000Z

327

GalaxyCount: a JAVA calculator of galaxy counts and variances in multiband wide-field surveys to 28 AB mag  

E-Print Network (OSTI)

We provide a consistent framework for estimating galaxy counts and variances in wide-field images for a range of photometric bands. The variances include both Poissonian noise and variations due to large scale structure. We demonstrate that our statistical theory is consistent with the counts in the deepest multiband surveys available. The statistical estimates depend on several observational parameters (e.g. seeing, signal to noise ratio), and include a sophisticated treatment of detection completeness. The JAVA calculator is freely available and offers the user the option to adopt our consistent framework or a different scheme. We also provide a summary table of statistical measures in the different bands for a range of different fields of view. Reliable estimation of the background counts has profound consequences in many areas of observational astronomy. We provide two such examples. One is from a recent study of the Sculptor galaxy NGC 300 where stellar photometry has been used to demonstrate that the outer disc extends to 10 effective radii, far beyond what was thought possible for a normal low-luminosity spiral. We confirm this finding by a reanalysis of the background counts. Secondly, we determine the luminosity function of the galaxy cluster Abell 2734, both through spectroscopically determined cluster membership, and through statistical subtraction of the background galaxies using the calculator and offset fields. We demonstrate very good agreement, suggesting that expensive spectroscopic follow-up, or off-source observations, may often be bypassed via determination of the galaxy background with GalaxyCount.

S. C. Ellis; J. Bland-Hawthorn

2006-02-27T23:59:59.000Z

328

The Double Chooz reactor neutrino experiment  

E-Print Network (OSTI)

The Double Chooz reactor neutrino experiment will be the next detector to search for a non vanishing theta13 mixing angle with unprecedented sensitivity, which might open the way to unveiling CP violation in the leptonic sector. The measurement of this angle will be based in a precise comparison of the antineutrino spectrum at two identical detectors located at different distances from the Chooz nuclear reactor cores in France. Double Chooz is particularly attractive because of its capability to measure sin2(2theta13) to 3 sigmas if sin2(2theta13) > 0.05 or to exclude sin2(2theta13) down to 0.03 at 90% C.L. for Dm2 = 2.5 x 10-3 eV2 in three years of data taking with both detectors. The construction of the far detector starts in 2008 and the first neutrino results are expected in 2009. The current status of the experiment, its physics potential and design and expected performance of the detector are reviewed.

I. Gil-Botella

2007-10-23T23:59:59.000Z

329

Glass Does a Double-Take | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Highlights rss feed Glass Does a Double-Take APRIL 4, 2008 Bookmark and Share Predicted phase diagram as a function of reduced temperature () and volume fraction (). Inset...

330

Duality Invariance: From M-theory to Double Field Theory  

E-Print Network (OSTI)

We show how the duality invariant approach to M-theory formulated by Berman and Perry relates to the double field theory proposed by Hull and Zwiebach. In doing so we provide suggestions as to how Ramond fields can be incorporated into the double field theory. We find that the standard dimensional reduction procedure has a duality invariant (doubled) analogue in which the gauge fields of the doubled Kaluza-Klein ansatz encode the Ramond potentials. We identify the internal gauge index of these gauge fields with a spinorial index of O(d,d).

Daniel C. Thompson

2011-06-20T23:59:59.000Z

331

Design and Synthesis of Double Perovskite Substrate Materials  

Science Conference Proceedings (OSTI)

Presentation Title, A Firm Foundation for Sr2FeMoO6: Design and Synthesis of Double Perovskite Substrate Materials. Author(s), Alexanne Holcombe, Patricia ...

332

Exclusive Double Charmonium Production from $?$ Decay  

E-Print Network (OSTI)

The exclusive decay of $\\Upsilon$ to a vector plus pseudoscalar charmonium is studied in perturbative QCD. The corresponding branching ratios are predicted to be of order $10^{-6}$ for first three $\\Upsilon$ resonances, and we expect these decay modes should be discovered in the prospective high-luminosity $e^+e^-$ facilities such as super $B$ experiment. As a manifestation of the short-distance loop contribution, the relative phases among strong, electromagnetic and radiative decay amplitudes can be deduced. It is particularly interesting to find that the relative phase between strong and electromagnetic amplitudes is nearly orthogonal. The resonance-continuum interference effect for double charmonium production near various $\\Upsilon$ resonances in $e^+e^-$ annihilation is addressed.

Yu Jia

2007-06-25T23:59:59.000Z

333

Double-shell tank waste pretreatment  

SciTech Connect

Double-shell tanks contain most of the transuranic/high-level chemical processing waste generated at the Hanford Site in recent years. A small mass fraction of this waste is responsible for its characterization as transuranic/high-level waste. Pretreatment will partition the waste into a small fraction containing most of the transuranic/high-level components and a large fraction that is a low-level waste. The operations for achieving this objective include dissolution of water-soluble salts, dissolution of precipitated metal oxides in acid, clarification of the resulting dissolver liquors, transuranium element removal by solvent extraction and cesium removal by ion exchange. The primary benefit of pretreatment is a reduction in the overall cost of waste disposal.

Orme, R.M.; Appel, J.N.

1990-01-01T23:59:59.000Z

334

Double Shell Tank (DST) Utilities Specification  

SciTech Connect

This specification establishes the performance requirements and provides the references to the requisite codes and standards to he applied during the design of the Double-Shell Tank (DST) Utilities Subsystems that support the first phase of waste feed delivery (WFD). The DST Utilities Subsystems provide electrical power, raw/potable water, and service/instrument air to the equipment and structures used to transfer low-activity waste (LAW) and high-level waste (HLW) to designated DST staging tanks. The DST Utilities Subsystems also support the equipment and structures used to deliver blended LAW and HLW feed from these staging tanks to the River Protection Project (RPP) Privatization Contractor facility where the waste will be immobilized. This specification is intended to be the basis for new projects/installations. This specification is not intended to retroactively affect previously established project design criteria without specific direction by the program.

SUSIENE, W.T.

2000-04-27T23:59:59.000Z

335

Spin polarization in ordered and disordered double-perovskites  

Science Conference Proceedings (OSTI)

Recently, the double perovskites family A2MM'O6 (A being a divalent or trivalent cation and M, M' two transition metals) has attracted considerable interest with the view of using these materials in spin electronics. This has ... Keywords: Double perovskites, Magnetoresistance, Metal-insulator transition

B. Aguilar; O. Navarro; M. Avignon

2008-03-01T23:59:59.000Z

336

Method for double-sided processing of thin film transistors  

DOE Patents (OSTI)

This invention provides methods for fabricating thin film electronic devices with both front- and backside processing capabilities. Using these methods, high temperature processing steps may be carried out during both frontside and backside processing. The methods are well-suited for fabricating back-gate and double-gate field effect transistors, double-sided bipolar transistors and 3D integrated circuits.

Yuan, Hao-Chih (Madison, WI); Wang, Guogong (Madison, WI); Eriksson, Mark A. (Madison, WI); Evans, Paul G. (Madison, WI); Lagally, Max G. (Madison, WI); Ma, Zhenqiang (Middleton, WI)

2008-04-08T23:59:59.000Z

337

Research Report Predictability and novelty in literal language comprehension  

E-Print Network (OSTI)

the domain of mills and that of social talk that includes correspondences between the mill (such as a flour conceptual domains. Lee (2002), for example, notes that the expression rumor mill involves a mapping between mill) and the people who gossip, the process of industrial production and the talk, as well as between

Kirsh, David

338

Double-duct liquid metal magnetohydrodynamic engine  

DOE Patents (OSTI)

An internal combustion, liquid metal (LM) magnetohydrodynamic (MHD) engine and an alternating current (AC) magnetohydrodynamic generator, are used in combination to provide useful AC electric energy output. The engine design has-four pistons and a double duct configuration, with each duct containing sodium potassium liquid metal confined between free pistons located at either end of the duct. The liquid metal is forced to flow back and forth in the duct by the movement of the pistons, which are alternatively driven by an internal combustion process. In the MHD generator, the two LM-MHD ducts pass in close proximity through a Hartmann duct with output transformer. AC power is produced by operating the engine with the liquid metal in the two generator ducts always flowing in counter directions. The amount of liquid metal maintained in the ducts may be varied. This provides a variable stroke length for the pistons. The engine/generator provides variable AC power at variable frequencies that correspond to the power demands of the vehicular propulsion. Also the engine should maintain nearly constant efficiency throughout the range of power usage. Automobiles and trucks could be powered by the invention, with no transmission or power converter devices being required.

Haaland, Carsten M. (Oak Ridge, TN)

1995-01-01T23:59:59.000Z

339

Double-duct liquid metal magnetohydrodynamic engine  

DOE Patents (OSTI)

An internal combustion, liquid metal (LM) magnetohydrodynamic (MHD) engine and an alternating current (AC) magnetohydrodynamic generator, are used in combination to provide useful AC electric energy output. The engine design has four pistons and a double duct configuration, with each duct containing sodium potassium liquid metal confined between free pistons located at either end of the duct. The liquid metal is forced to flow back and forth in the duct by the movement of the pistons, which are alternatively driven by an internal combustion process. In the MHD generator, the two LM-MHD ducts pass in close proximity through a Hartmann duct with output transformer. AC power is produced by operating the engine with the liquid metal in the two generator ducts always flowing in counter directions. The amount of liquid metal maintained in the ducts may be varied. This provides a variable stroke length for the pistons. The engine/generator provides variable AC power at variable frequencies that correspond to the power demands of the vehicular propulsion. Also the engine should maintain nearly constant efficiency throughout the range of power usage. Automobiles and trucks could be powered by the invention, with no transmission or power converter devices being required.

Haaland, Carsten M. (Oak Ridge, TN)

1997-01-01T23:59:59.000Z

340

Discovery of Peculiar Double-Mode Pulsations and Period Doubling in KEPLER RRc Variables  

E-Print Network (OSTI)

We analyzed the Long Cadence photometry of 4 first overtone RR Lyr-type stars (RRc stars) observed by the KEPLER telescope. All studied variables are multiperiodic. The strongest secondary peak appears for f_2/f_1 = 1.58-1.63, or P_2/P_1 = 0.61-0.63. In each star we detect at least one subharmonic of f_2, either at ~1/2 f_2 or at ~3/2 f_2. The presence of subharmonics is a characteristic signature of a period doubling.

Moskalik, P; Kolenberg, K; Nemec, J; Kunder, A; Chadid, M; Kopacki, G; Szabó, R; members, KEPLER WG#13

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Instability and Diapycnal Momentum Transport in a Double-Diffusive, Stratified Shear Layer  

Science Conference Proceedings (OSTI)

The linear stability of a double-diffusively stratified, inflectional shear flow is investigated. Double-diffusive stratification has little effect on shear instability except when the density ratio R? is close to unity. Double-diffusive ...

William D. Smyth; Satoshi Kimura

2007-06-01T23:59:59.000Z

342

Double Chooz: Searching for theta13 with reactor neutrinos  

E-Print Network (OSTI)

The Double Chooz experiment is meant to search for the neutrino mixing angle theta13 taking advantage of the neutrinos generated at the nuclear power plant of Chooz. Double Chooz relies on neutrino flux measurements at two different locations, the so-called far and near detectors, although the first phase runs only with the far detector. The commissioning of the far detector started in January 2011 and first results improving the current limit on theta13 are expected by the summer 2011. The status of the Double Chooz experiment is presented.

Novella, P

2011-01-01T23:59:59.000Z

343

Double Chooz: Searching for theta13 with reactor neutrinos  

E-Print Network (OSTI)

The Double Chooz experiment is meant to search for the neutrino mixing angle theta13 taking advantage of the neutrinos generated at the nuclear power plant of Chooz. Double Chooz relies on neutrino flux measurements at two different locations, the so-called far and near detectors, although the first phase runs only with the far detector. The commissioning of the far detector started in January 2011 and first results improving the current limit on theta13 are expected by the summer 2011. The status of the Double Chooz experiment is presented.

P. Novella; for the Double Chooz collaboration

2011-05-30T23:59:59.000Z

344

Java PathFinder A Translator from Java to Promela  

E-Print Network (OSTI)

nterrupts, and perhaps most importantly: thread operations. Among major concepts not translated are: packages, method overloading and overriding, method recursion, strings, and floating point numbers. Finally, the class library is not translated. References

Klaus Havelund

1999-01-01T23:59:59.000Z

345

Supplement: Java Packages For Introduction to Java Programming  

E-Print Network (OSTI)

conveniently. Packages group related classes so that they can be easily distributed. To protect classes. Packages provide protection so that the protected members of the classes are accessible to the classes of the package name and the file system directory structure. For the package named com.prenhall.mypackage, you

Liang, Y. Daniel

346

DUF6 Project Doubles Production in 2013 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DUF6 Project Doubles Production in 2013 DUF6 Project Doubles Production in 2013 DUF6 Project Doubles Production in 2013 November 26, 2013 - 12:00pm Addthis LEXINGTON, Ky. - The conversion plants at EM's Paducah and Portsmouth sites surpassed a fiscal year 2013 goal by converting 13,679 metric tons of depleted uranium hexafluoride (DUF6), more than doubling production a year earlier. EM's Portsmouth Paducah Project Office (PPPO) and contractor Babcock & Wilcox Conversion Services LLC (BWCS) began operations in 2011 to convert the nation's 800,000-metric-ton inventory of DUF6 to more benign forms for sale, ultimate disposal or long-term storage. "Since 2011, we have been ramping up production to determine and achieve the safe, sustainable operating rate of the plants," said George E.

347

DUF6 Project Doubles Production in 2013 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DUF6 Project Doubles Production in 2013 DUF6 Project Doubles Production in 2013 DUF6 Project Doubles Production in 2013 November 26, 2013 - 12:00pm Addthis LEXINGTON, Ky. - The conversion plants at EM's Paducah and Portsmouth sites surpassed a fiscal year 2013 goal by converting 13,679 metric tons of depleted uranium hexafluoride (DUF6), more than doubling production a year earlier. EM's Portsmouth Paducah Project Office (PPPO) and contractor Babcock & Wilcox Conversion Services LLC (BWCS) began operations in 2011 to convert the nation's 800,000-metric-ton inventory of DUF6 to more benign forms for sale, ultimate disposal or long-term storage. "Since 2011, we have been ramping up production to determine and achieve the safe, sustainable operating rate of the plants," said George E.

348

Non-Double-Couple Microearthquakes At Long Valley Caldera, California,  

Open Energy Info (EERE)

Non-Double-Couple Microearthquakes At Long Valley Caldera, California, Non-Double-Couple Microearthquakes At Long Valley Caldera, California, Provide Evidence For Hydraulic Fracturing Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Non-Double-Couple Microearthquakes At Long Valley Caldera, California, Provide Evidence For Hydraulic Fracturing Details Activities (1) Areas (1) Regions (0) Abstract: Most of 26 small (0.4<~M<~3.1) microearthquakes at Long Valley caldera in mid-1997, analyzed using data from a dense temporary network of 69 digital three-component seismometers, have significantly non-double-couple focal mechanisms, inconsistent with simple shear faulting. We determined their mechanisms by inverting P- and S-wave polarities and amplitude ratios using linear-programming methods, and

349

Lee-Wave Resonances over Double Bell-Shaped Obstacles  

Science Conference Proceedings (OSTI)

Lee-wave resonance over double bell-shaped obstacles is investigated through a series of idealized high-resolution numerical simulations with the nonhydrostatic Coupled Ocean–Atmosphere Mesoscale Prediction System (COAMPS) model using a free-slip ...

Vanda Grubiši?; Ivana Stiperski

2009-05-01T23:59:59.000Z

350

POWER MODULE PACKAGING WITH DOUBLE SIDED PLANAR INTERCONNECTION ...  

A double sided cooled power module package having a single phase leg topology includes two IGBT and two diode semiconductor dies. Each IGBT die is spaced apart from a ...

351

Does rotation influence double-diffusive fluxes in polar oceans?  

Science Conference Proceedings (OSTI)

The diffusive (or semi-convection) regime of double-diffusive convection (DDC) is wide-spread in the polar oceans, generating “staircases” consisting of high-gradient interfaces of temperature and salinity separated by convectively mixed layers. ...

J. R. Carpenter; M.-L. Timmermans

352

Simultaneous Spin-Charge Relaxation in Double Quantum Dots  

E-Print Network (OSTI)

We investigate phonon-induced spin and charge relaxation mediated by spin-orbit and hyperfine interactions for a single electron confined within a double quantum dot. A simple toy model incorporating both direct decay to the ground state of the double dot and indirect decay via an intermediate excited state yields an electron spin relaxation rate that varies non-monotonically with the detuning between the dots. We confirm this model with experiments performed on a GaAs double dot, demonstrating that the relaxation rate exhibits the expected detuning dependence and can be electrically tuned over several orders of magnitude. Our analysis suggests that spin-orbit mediated relaxation via phonons serves as the dominant mechanism through which the double-dot electron spin-flip rate varies with detuning.

V. Srinivasa; K. C. Nowack; M. Shafiei; L. M. K. Vandersypen; J. M. Taylor

2013-03-07T23:59:59.000Z

353

Kinetic Alfven double layer formed by electron viscosity  

SciTech Connect

The effect of the electron viscosity on the kinetic Alfven solitary wave is investigated. It is found that small electron viscosity changes the electron motion along the magnetic field producing a boundary layer, and thus that in a low beta electron-ion plasma({beta} Much-Less-Than m{sub e}/m{sub i}), an obliquely propagating kinetic solitary Alfven wave can become a double layer. This double layer can exist in the sub-Alfvenic and super-Alfvenic regimes. The length scale of density drop for this double layer is on the order of that of the conventional kinetic solitary Alfven wave, and thus this double layer can accelerate electrons on a very short length scale.

Woo, M. H.; Ryu, C.-M. [Department of Physics, Pohang University of Science and Technology, Pohang 790-784 (Korea, Republic of); Choi, C. R. [Department of Physics, Korea Advanced Institute of Science and Technology, Taejon 305-701 (Korea, Republic of)

2012-07-15T23:59:59.000Z

354

Double Shell Tank (DST) Monitor and Control Subsystem Specification  

Science Conference Proceedings (OSTI)

This specification revises the performance requirements and provides references to the requisite codes and standards to be applied during design of the Double-Shell Tank (DST) Monitor and Control Subsystem that supports the first phase of Waste Feed Delivery.

BAFUS, R.R.

2000-11-03T23:59:59.000Z

355

Double Shell Tank (DST) Process Waste Sampling Subsystem Specification  

SciTech Connect

This specification establishes the performance requirements and provides references to the requisite codes and standards to be applied to the Double-Shell Tank (DST) Process Waste Sampling Subsystem which supports the first phase of Waste Feed Delivery.

RASMUSSEN, J.H.

2000-05-03T23:59:59.000Z

356

Double Beta Decay: Historical Review of 75 Years of Research  

E-Print Network (OSTI)

Main achievements during 75 years of research on double beta decay have been reviewed. The existing experimental data have been presented and the capabilities of the next-generation detectors have been demonstrated.

A. S. Barabash

2011-04-14T23:59:59.000Z

357

Spontaneous formation of double bars in dark matter dominated galaxies  

E-Print Network (OSTI)

Although nearly one-third of barred galaxies host an inner, secondary bar, the formation and evolution of double barred galaxies remain unclear. We show here an example model of a galaxy, dominated by a live dark matter halo, in which double bars form naturally, without requiring gas, and we follow its evolution for a Hubble time. The inner bar in our model galaxy rotates almost as slowly as the outer bar, and it can reach up to half of its length. The route to the formation of a double bar may be different from that of a single strong bar. Massive dark matter halo or dynamically hot stellar disc may play an important role in the formation of double bars and their subsequent evolution.

Saha, Kanak

2013-01-01T23:59:59.000Z

358

Finescale Instabilities of the Double-Diffusive Shear Flow  

Science Conference Proceedings (OSTI)

This study examines dynamics of finescale instabilities in thermohaline–shear flows. It is shown that the presence of the background diapycnal temperature and salinity fluxes due to double diffusion has a destabilizing effect on the basic ...

Timour Radko; Melvin E. Stern

2011-03-01T23:59:59.000Z

359

The Southeast Pacific Warm Band and Double ITCZ  

Science Conference Proceedings (OSTI)

The east Pacific double intertropical convergence zone (ITCZ) in austral fall is investigated with particular focus on the growing processes of its Southern Hemisphere branch. Satellite measurements from the Tropical Rainfall Measuring Mission (...

Hirohiko Masunaga; Tristan S. L’Ecuyer

2010-03-01T23:59:59.000Z

360

Functional Analysis for Double Shell Tank (DST) Subsystems  

Science Conference Proceedings (OSTI)

This functional analysis identifies the hierarchy and describes the subsystem functions that support the Double-Shell Tank (DST) System described in HNF-SD-WM-TRD-007, System Specification for the Double-Shell Tank System. Because of the uncertainty associated with the need for upgrades of the existing catch tanks supporting the Waste Feed Delivery (WFD) mission, catch tank functions are not addressed in this document. The functions identified herein are applicable to the Phase 1 WFD mission only.

SMITH, D.F.

2000-08-22T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Cross sections for short pulse single and double ionization ofhelium  

SciTech Connect

In a previous publication, procedures were proposed for unambiguously extracting amplitudes for single and double ionization from a time-dependent wavepacket by effectively propagating for an infinite time following a radiation pulse. Here we demonstrate the accuracy and utility of those methods for describing two-photon single and one-photon double ionization of helium. In particular it is shown how narrow features corresponding to autoionizing states are easily resolved with these methods.

Palacios, Alicia; Rescigno, Thomas N.; McCurdy, C. William

2007-11-27T23:59:59.000Z

362

Jove: java as it happens  

Science Conference Proceedings (OSTI)

Dynamic software visualization is designed to provide programmers with insights as to what the program is doing. Most current dynamic visualizations either use program traces to show information about prior runs, slow the program down substantially, ... Keywords: dynamic software visualization, instrumentation, run-time monitoring

Steven P. Reiss; Manos Renieris

2005-05-01T23:59:59.000Z

363

JAS - a Java action semantics  

E-Print Network (OSTI)

Brown,D.F. Watt,D.A. Proceedings of 2nd International Workshop on Action Semantics pp 43-56 Dept of Computer Science, University of Aarhus

Brown, D.F.; Watt, D.A.

364

Providing Orthogonal Persistence for Java  

E-Print Network (OSTI)

Atkinson,M.P. Jordan,M.J. Proceedings of ECOOP'98, Object-Oriented Programming, Belgium, July 1998, Lecture Notes in Computer Science, (Jul,E., Ed), Volume No. 1445. pp 383-395 Springer

Atkinson, M.P.

365

Executable specifications for Java programs  

E-Print Network (OSTI)

In this thesis, we present a unified environment for running declarative specifications in the context of an imperative object-oriented programming language. Specifications are Alloy-like, written in first-order relational ...

Milicevic, Aleksandar, S.M. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

366

An Orthogonally Persistent Java TM  

E-Print Network (OSTI)

Atkinson,M.P. Daynes,L. Jordan,M.J. Printezis,T. Spence,S. ACM SIGMOD Record, Vol. 25 No. 4 pp 68-75 ACM

Atkinson, M.P.

367

Automatic Test Factoring for Java  

E-Print Network (OSTI)

Test factoring creates fast, focused unit tests from slow system-widetests; each new unit test exercises only a subset of the functionalityexercised by the system test. Augmenting a test suite with factoredunit tests ...

Saff, David

2005-06-08T23:59:59.000Z

368

Double pulse laser induced breakdown spectroscopy; experimental study of  

NLE Websites -- All DOE Office Websites (Extended Search)

Double pulse laser induced breakdown spectroscopy; experimental study of Double pulse laser induced breakdown spectroscopy; experimental study of lead emission intensity dependence on the wavelengths and sample matrix Title Double pulse laser induced breakdown spectroscopy; experimental study of lead emission intensity dependence on the wavelengths and sample matrix Publication Type Journal Article Year of Publication 2009 Authors Piscitelli, Vincent, Mauro A. Martinez, Alberto J. Fernandez, Jhanis J. Gonzalez, Xianglei Mao, and Richard E. Russo Journal Spectrochimica Acta Part B Volume 64 Issue 2 Pagination 147-154 Date Published 02/2009 Keywords Double pulse LIBS, laser induced breakdown spectroscopy, lead Abstract Lead (Pb) emission intensity (atomic line 405.78 nm) dependence on the sample matrix (metal alloy) was studied by means of collinear double pulse (DP)-laser induced breakdown spectroscopy (LIBS). The measurement of the emission intensity produced by three different wavelength combinations (i.e. I:532 nm-II:1064 nm, I:532 nm-II:532 nm, and I:532 nm-II:355 nm) from three series of standard reference materials showed that the lead atomic line 405.78 nm emission intensity was dependent on the sample matrix for all the combination of wavelengths, however reduced dependency was found for the wavelength combination I:532 nm-II:355 nm.

369

Time-resolved double-slit experiment with entangled photons  

E-Print Network (OSTI)

The double-slit experiment strikingly demonstrates the wave-particle duality of quantum objects. In this famous experiment, particles pass one-by-one through a pair of slits and are detected on a distant screen. A distinct wave-like pattern emerges after many discrete particle impacts as if each particle is passing through both slits and interfering with itself. While the direct event-by-event buildup of this interference pattern has been observed for massive particles such as electrons, neutrons, atoms and molecules, it has not yet been measured for massless particles like photons. Here we present a temporally- and spatially-resolved measurement of the double-slit interference pattern using single photons. We send single photons through a birefringent double-slit apparatus and use a linear array of single-photon detectors to observe the developing interference pattern. The analysis of the buildup allows us to compare quantum mechanics and the corpuscular model, which aims to explain the mystery of single-particle interference. Finally, we send one photon from an entangled pair through our double-slit setup and show the dependence of the resulting interference pattern on the twin photon's measured state. Our results provide new insight into the dynamics of the buildup process in the double-slit experiment, and can be used as a valuable resource in quantum information applications.

Piotr Kolenderski; Carmelo Scarcella; Kelsey D. Johnsen; Deny R. Hamel; Catherine Holloway; Lynden K. Shalm; Simone Tisa; Alberto Tosi; Kevin J. Resch; Thomas Jennewein

2013-04-17T23:59:59.000Z

370

HANFORD DOUBLE SHELL TANK THERMAL AND SEISMIC PROJECT SEISMIC ANALYSIS OF HANFORD DOUBLE SHELL TANKS  

Science Conference Proceedings (OSTI)

M&D Professional Services, Inc. (M&D) is under subcontract to Pacific Northwest National Laboratories (PNNL) to perform seismic analysis of the Hanford Site Double-Shell Tanks (DSTs) in support of a project entitled Double-Shell Tank (DST) Integrity Project - DST Thermal and Seismic Analyses. The original scope of the project was to complete an up-to-date comprehensive analysis of record of the DST System at Hanford in support of Tri-Party Agreement Milestone M-48-14. The work described herein was performed in support of the seismic analysis of the DSTs. The thermal and operating loads analysis of the DSTs is documented in Rinker et al. (2004). Although Milestone M-48-14 has been met, Revision I is being issued to address external review comments with emphasis on changes in the modeling of anchor bolts connecting the concrete dome and the steel primary tank. The work statement provided to M&D (PNNL 2003) required that a nonlinear soil structure interaction (SSI) analysis be performed on the DSTs. The analysis is required to include the effects of sliding interfaces and fluid sloshing (fluid-structure interaction). SSI analysis has traditionally been treated by frequency domain computer codes such as SHAKE (Schnabel, et al. 1972) and SASSI (Lysmer et al. 1999a). Such frequency domain programs are limited to the analysis of linear systems. Because of the contact surfaces, the response of the DSTs to a seismic event is inherently nonlinear and consequently outside the range of applicability of the linear frequency domain programs. That is, the nonlinear response of the DSTs to seismic excitation requires the use of a time domain code. The capabilities and limitations of the commercial time domain codes ANSYS{reg_sign} and MSC Dytran{reg_sign} for performing seismic SSI analysis of the DSTs and the methodology required to perform the detailed seismic analysis of the DSTs has been addressed in Rinker et al (2006a). On the basis of the results reported in Rinker et al. (2006a), it is concluded that time-domain SSI analysis using ANSYS{reg_sign} is justified for predicting the global response of the DSTs. The most significant difference between the current revision (Revision 1) of this report and the original issue (Revision 0) is the treatment of the anchor bolts that tie the steel dome of the primary tank to the concrete tank dome.

MACKEY TC; RINKER MW; CARPENTER BG; HENDRIX C; ABATT FG

2009-01-15T23:59:59.000Z

371

HANFORD DOUBLE SHELL TANK (DST) THERMAL & SEISMIC PROJECT SEISMIC ANALYSIS OF HANFORD DOUBLE SHELL TANKS  

Science Conference Proceedings (OSTI)

M&D Professional Services, Inc. (M&D) is under subcontract to Pacific Northwest National Laboratory (PNNL) to perform seismic analysis of the Hanford Site double-shell tanks (DSTs) in support of a project entitled ''Double-Shell Tank (DSV Integrity Project--DST Thermal and Seismic Analyses)''. The overall scope of the project is to complete an up-to-date comprehensive analysis of record of the DST system at Hanford in support of Tri-Party Agreement Milestone M-48-14, The work described herein was performed in support of the seismic analysis of the DSTs. The thermal and operating loads analysis of the DSTs is documented in Rinker et al. (2004). The work statement provided to M&D (PNNL 2003) required that the seismic analysis of the DSTs assess the impacts of potentially non-conservative assumptions in previous analyses and account for the additional soil mass due to the as-found soil density increase, the effects of material degradation, additional thermal profiles applied to the full structure including the soil-structure response with the footings, the non-rigid (low frequency) response of the tank roof, the asymmetric seismic-induced soil loading, the structural discontinuity between the concrete tank wall and the support footing and the sloshing of the tank waste. The seismic analysis considers the interaction of the tank with the surrounding soil and the effects of the primary tank contents. The DSTs and the surrounding soil are modeled as a system of finite elements. The depth and width of the soil incorporated into the analysis model are sufficient to obtain appropriately accurate analytical results. The analyses required to support the work statement differ from previous analysis of the DSTs in that the soil-structure interaction (SSI) model includes several (nonlinear) contact surfaces in the tank structure, and the contained waste must be modeled explicitly in order to capture the fluid-structure interaction behavior between the primary tank and contained waste.

MACKEY, T.C.

2006-03-17T23:59:59.000Z

372

NREL: News Feature - Nation Could Double Energy Productivity  

NLE Websites -- All DOE Office Websites (Extended Search)

Nation Could Double Energy Productivity Nation Could Double Energy Productivity February 7, 2013 Photo of NREL Director Dan Arvizu speaking at NREL. Enlarge image NREL Director Dan Arvizu and a blue-ribbon panel of 20 energy experts said that the United States can double its energy productivity by 2030 - and do so in ways that bolster the nation's economy. In this photo, Arvizu speaks to commercial building stakeholders at NREL. Credit: Dennis Schroeder Researchers at the U.S. Department of Energy's (DOE) National Renewable Energy Laboratory (NREL) have long understood that using energy more efficiently can be just as beneficial as finding new ways to produce energy more efficiently. On Feb. 7, NREL Director Dan Arvizu and a blue-ribbon panel of 20 energy experts drove that message home, declaring that the United States can

373

Neutrino-less Double Beta Decay and Particle Physics  

E-Print Network (OSTI)

We review the particle physics aspects of neutrino-less double beta decay. This process can be mediated by light massive Majorana neutrinos (standard interpretation) or by something else (non-standard interpretations). The physics potential of both interpretations is summarized and the consequences of future measurements or improved limits on the half-life of neutrino-less double beta decay are discussed. We try to cover all proposed alternative realizations of the decay, including light sterile neutrinos, supersymmetric or left-right symmetric theories, Majorons, and other exotic possibilities. Ways to distinguish the mechanisms from one another are discussed. Experimental and nuclear physics aspects are also briefly touched, alternative processes to double beta decay are discussed, and an extensive list of references is provided.

Werner Rodejohann

2011-06-07T23:59:59.000Z

374

Evaluation of the uranium double spike technique for environmental monitoring  

Science Conference Proceedings (OSTI)

Use of a uranium double spike in analysis of environmental samples showed that a {sup 235}U enrichment of 1% ({sup 235}U/{sup 238}U = 0.00732) can be distinguished from natural ({sup 235}U/{sup 238}U = 0.00725). Experiments performed jointly at Los Alamos National Laboratory (LANL) and Oak Ridge National Laboratory (ORNL) used a carefully calibrated double spike of {sup 233}U and {sup 236}U to obtain much better precision than is possible using conventional analytical techniques. A variety of different sampling media (vegetation and swipes) showed that, provided sufficient care is exercised in choice of sample type, relative standard deviations of less than {+-} 0.5% can be routinely obtained. This ability, unavailable without use of the double spike, has enormous potential significance in the detection of undeclared nuclear facilities.

Hemberger, P.H.; Rokop, D.J.; Efurd, D.W.; Roensch, F.R. [Los Alamos National Lab., NM (United States); Smith, D.H.; Turner, M.L.; Barshick, C.M.; Bayne, C.K. [Oak Ridge National Lab., TN (United States)

1998-01-01T23:59:59.000Z

375

Searching for Double Beta Decay with the Enriched Xenon Observatory  

Science Conference Proceedings (OSTI)

The Enriched Xenon Observatory (EXO) Collaboration is building a series of experiments to search for the neutrinoless double beta decay of {sup 136}Xe. The first experiment, known as EXO-200, will utilize 200 kg of xenon enriched to 80% in the isotope of interest, making it the largest double beta decay experiment to date by one order of magnitude. This experiment is rapidly being constructed, and will begin data taking in 2007. The EXO collaboration is also developing a technique to identify on an event-by-event basis the daughter barium ion of the double beta decay. If successful, this method would eliminate all conventional radioactive backgrounds to the decay, resulting in an ideal experiment. We summarize here the current status of EXO-200 construction and the barium tag R&D program.

Hall, C.; /SLAC

2007-03-16T23:59:59.000Z

376

Double Chooz: Optimizing CHOOZ for a possible theta 13 measurement  

E-Print Network (OSTI)

The proposed Double Chooz theta 13 experiment is described. Double Chooz will be an optimized reactor disappearance experiment similar to the original CHOOZ. The optimization includes an increase in the signal to noise by increasing the target volume to twice the original CHOOZ, reducing singles background with a non-scintillating oil buffer region around the target and carefully controlling systematic uncertainties by measuring the electron antineutrino flux of the source with a near detector. The Double Chooz far detector will be situated in the same cavern as CHOOZ but will detect ~50000 electron antineutrinos in three years of operation. We estimate a systematic uncertainty of 0.6%, and a reduction of the upper limit on theta 13 to 5 degrees.

Dazeley, S A

2006-01-01T23:59:59.000Z

377

Double Chooz: Optimizing CHOOZ for a possible theta 13 measurement  

E-Print Network (OSTI)

The proposed Double Chooz theta 13 experiment is described. Double Chooz will be an optimized reactor disappearance experiment similar to the original CHOOZ. The optimization includes an increase in the signal to noise by increasing the target volume to twice the original CHOOZ, reducing singles background with a non-scintillating oil buffer region around the target and carefully controlling systematic uncertainties by measuring the electron antineutrino flux of the source with a near detector. The Double Chooz far detector will be situated in the same cavern as CHOOZ but will detect ~50000 electron antineutrinos in three years of operation. We estimate a systematic uncertainty of 0.6%, and a reduction of the upper limit on theta 13 to 5 degrees.

S. A. Dazeley; for the Double Chooz Collaboration

2005-10-21T23:59:59.000Z

378

The Spacetime of Double Field Theory: Review, Remarks, and Outlook  

E-Print Network (OSTI)

We review double field theory (DFT) with emphasis on the doubled spacetime and its generalized coordinate transformations, which unify diffeomorphisms and b-field gauge transformations. We illustrate how the composition of generalized coordinate transformations fails to associate. Moreover, in dimensional reduction, the O(d,d) T-duality transformations of fields can be obtained as generalized diffeomorphisms. Restricted to a half-dimensional subspace, DFT includes `generalized geometry', but is more general in that local patches of the doubled space may be glued together with generalized coordinate transformations. Indeed, we show that for certain T-fold backgrounds with non-geometric fluxes, there are generalized coordinate transformations that induce, as gauge symmetries of DFT, the requisite O(d,d;Z) monodromy transformations. Finally we review recent results on the \\alpha' extension of DFT which, reduced to the half-dimensional subspace, yields intriguing modifications of the basic structures of generalized geometry.

Olaf Hohm; Dieter Lust; Barton Zwiebach

2013-09-11T23:59:59.000Z

379

SDSS galaxies with double-peaked emission lines: double starbursts or AGNs?  

E-Print Network (OSTI)

With the aim of investigating galaxies with two strong simultaneous starbursts, we have extracted a sample of galaxies with double-peaked emission lines in their global spectra from the SDSS spectral database. We then fitted the emission lines Halpha, Hbeta, [OIII]5007, [NII]6584, [SII]6717 and [SII]6731 of 129 spectra by two Gaussians to separate the radiation of the two (blue and red) components. A more or less reliable decomposition of the all those emission lines have been found for 55 spectra. Using a standard BPT classification diagram, we have been able to divide the galaxies from our sample into two subsamples: Sample A consisting of 18 galaxies where both components belong to the photoionised class of objects, and Sample B containing 37 galaxies which show non-thermal ionisation (AGNs). We have examined the properties of the blue and red components, and found that the differences between radial velocities of components lie within 200 - 400 km/s for galaxies of both subsamples. The equivalent number o...

Pilyugin, L S; Cedres, B; Cepa, J; Bongiovanni, A; Mattsson, L; Vilchez, J M

2011-01-01T23:59:59.000Z

380

Double-well magnetic trap for Bose-Einstein condensates  

E-Print Network (OSTI)

We present a magnetic trapping scheme for neutral atoms based on a hybrid of Ioffe-Pritchard and Time-averaged Orbiting Potential traps. The resulting double-well magnetic potential has readily controllable barrier height and well separation. This offers a new tool for studying the behavior of Bose condensates in double-well potentials, including atom interferometry and Josephson tunneling. We formulate a description for the potential of this magnetic trap and discuss practical issues such as loading with atoms, evaporative cooling and manipulating the potential.

N. R. Thomas; C. J. Foot; A. C. Wilson

2001-08-10T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Flow dynamics in a double-skin façade  

Science Conference Proceedings (OSTI)

A dynamical study of the flow in an asymmetrically heated vertical plane channel was carried out experimentally and numerically. The experiments are carried out in water for modified Rayleigh numbers (Ra*) in a range corresponding to the boundary layer ... Keywords: double skin, laminar flow, natural convection, numerical simulation, recirculation zone, vertical channel, visualization technique, wall flux

Dan Ospir; Cristian Chereches; Catalin Popa; Stéphane Fohanno; Catalin Popovici

2010-04-01T23:59:59.000Z

382

Regime Transitions in a Stochastically Forced Double-Gyre Model  

Science Conference Proceedings (OSTI)

A reduced-gravity double-gyre ocean model is used to study the influence of an additive stochastic wind stress component on the regime behavior of the wind-driven circulation. The variance of the stochastic component (spatially coherent white ...

Philip Sura; Klaus Fraedrich; Frank Lunkeit

2001-02-01T23:59:59.000Z

383

Double-shell tank waste retrieval survey package  

SciTech Connect

Westinghouse Hanford Company is seeking industry solutions to underground double-shell tank waste retrieval at the Hanford Site located in southeastern Washington. This is not a request for proposals; it is a request for information to facilitate continued discussion. Westinghouse Hanford Company will not reimburse any costs incurred for providing the information requested.

Berglin, E.J.

1995-12-01T23:59:59.000Z

384

Mixer pump test plan for double shell tank AZ-101  

Science Conference Proceedings (OSTI)

Mixer pump systems have been chosen as the method for retrieval of tank wastes contained in double shell tanks at Hanford. This document describes the plan for testing and demonstrating the ability of two 300 hp mixer pumps to mobilize waste in tank AZ-101. The mixer pumps, equipment and instrumentation to monitor the test were installed by Project W-151.

STAEHR, T.W.

1999-05-12T23:59:59.000Z

385

Geometrical tunability of plasmon excitations of double concentric metallic nanotubes  

SciTech Connect

The plasmon frequencies of a general double concentric metallic nanotube (NT) are obtained by using the plasmon hybridization method. Theoretical calculations indicate that there are four distinct plasmon modes for the system. It is shown that these two alternating layers of dielectric and metal have a greater geometrical tunability than the single metallic nanotubes of similar dimensions.

Moradi, Afshin [Department of Nano Science, Kermanshah University of Technology, Kermanshah 67178-63766 (Iran, Islamic Republic of) and Department of Nano Science, Institute for Studies in Theoretical Physics and Mathematics (IPM), Tehran 19395-5531 (Iran, Islamic Republic of)

2012-06-15T23:59:59.000Z

386

AAAS Office of Opportunities in Science The Double Bind  

E-Print Network (OSTI)

of scientists regardless of race, ethnicity or gender. Conserving of their time and energies, they tackled. Science careers in the context of gender and race or ethnic bias have been a major part of our lives of biases related to both their race or ethnicity and gender, constituting a double bind. Programs

Ortiz, Christine

387

EA-1905: Double Eagle Water System, Carlsbad, New Mexico  

Energy.gov (U.S. Department of Energy (DOE))

This EA, prepared by the U.S. Department of the Interior’s Bureau of Land Management Carlsbad Field Office and adopted by DOE, evaluates the expansion and upgrade of the City of Carlsbad’s Double Eagle Water System.

388

On the Flexible Connection of Rigid Double-Rail Track  

Science Conference Proceedings (OSTI)

To facilitate the loading and discharging of rolling stocks for train ferries, a new type of flexible double-rail track was recently invented. The geometric relationship of bending parameters of the flexible track is studied theoretically. The formulation ... Keywords: Flexible connection, Rail transport, Railway, Intermodal transport, Train ferry

Xie Xinlian; Li Meng; Liu Shiyong; Wang Shaocheng

2009-10-01T23:59:59.000Z

389

New Reactor Neutrino Experiments besides Double-CHOOZ  

E-Print Network (OSTI)

Several new reactor neutrino experiments are being considered to measure the parameter theta-13. The current plans for Angra, Braidwood, Daya Bay, KASKA and KR2DET are reviewed. A case is made that, together with Double-CHOOZ, a future world program should include at least three such experiments.

Maury Goodman

2005-01-21T23:59:59.000Z

390

New Reactor Neutrino Experiments besides Double-CHOOZ  

E-Print Network (OSTI)

Several new reactor neutrino experiments are being considered to measure the parameter ?13. The current plans for Angra, Braidwood, Daya Bay, KASKA and KR2DET are reviewed. A case is made that, together with Double-CHOOZ, a future world program should include at least three such experiments. 1. Introduction and Remarks

M. Goodman A

2005-01-01T23:59:59.000Z

391

Heat exchanger with leak detecting double wall tubes  

DOE Patents (OSTI)

A straight shell and tube heat exchanger utilizing double wall tubes and three tubesheets to ensure separation of the primary and secondary fluid and reliable leak detection of a leak in either the primary or the secondary fluids to further ensure that there is no mixing of the two fluids.

Bieberbach, George (Tampa, FL); Bongaards, Donald J. (Seminole, FL); Lohmeier, Alfred (Tampa, FL); Duke, James M. (St. Petersburg, all of, FL)

1981-01-01T23:59:59.000Z

392

First experiment with the double solenoid RIBRAS system  

Science Conference Proceedings (OSTI)

A description of the double solenoid system (RIBRAS) operating since 2004 in one of the beam lines of the Pelletron Laboratory of the Institute of Physics of the University of Sao Paulo is presented. The recent installation of the secondary scattering chamber after the second solenoid is reported and the first experiment in RIBRAS using both solenoids is described.

Lichtenthaeler, R.; Condori, R. Pampa; Lepine-Szily, A.; Pires, K. C. C.; Morais, M. C.; Leistenschneider, E.; Scarduelli, V. B.; Gasques, L. R. [Instituto de Fisica da USP, Sao Paulo, Brazil, C.P. 66318, 05314-970 (Brazil); Faria, P. N. de; Mendes, D. R. Jr. [Instituto de Fisica, Universidade Federal Fluminense, Niteroi, RJ, 24210-340 (Brazil); Shorto, J. M. B. [Instituto de Pesquisas Energeticas e Nucleares, IPEN/CNEN, Av. Lineu Prestes, 2242, 05508-000, Sao Paulo, SP (Brazil); Assuncao, M. [Departamento de Ciencias Exatas e da Terra, Universidade Federal de Sao Paulo, Campus Diadema, Sao Paulo (Brazil)

2013-05-06T23:59:59.000Z

393

Dual-cone double-helical downhole logging device  

DOE Patents (OSTI)

A broadband downhole logging device includes a double-helix coil wrapped over a dielectric support and surrounded by a dielectric shield. The device may also include a second coil longitudinally aligned with a first coil and enclosed within the same shield for measuring magnetic permeability of downhole formations and six additional coils for accurately determining downhole parameters.

Yu, Jiunn S. (Albuquerque, NM)

1984-01-01T23:59:59.000Z

394

Double-Sided Cooling Design for Novel Planar Module  

Science Conference Proceedings (OSTI)

A novel packaging structure for medium power modules featuring power semiconductor switches sandwiched between two symmetric substrates that fulfill electrical conduction and insulation functions is presented. Large bonding areas between dies and substrates allow this packaging technology to offer significant improvements in electrical, thermal performance. Double-sided cooling system was dedicatedly analyzed and designed for different applications.

Ning, Puqi [ORNL; Liang, Zhenxian [ORNL; Marlino, Laura D [ORNL; Wang, Fei [ORNL

2013-01-01T23:59:59.000Z

395

Organic thin film transistors with double insulator layers  

Science Conference Proceedings (OSTI)

We have investigated a double-layer structured gate dielectric for the organic thin films transistor (OTFT) with the purpose of improving the performance of the SiO"2 gate insulator. A 50nm PMMA layer was coated on top of the SiO"2 gate insulator as ... Keywords: Mobility, On/off ratio, Organic thin film transistor, PMMA

X. Liu; Y. Bai; L. Chen; F. X. Wei; X. B. Zhang; X. Y. Jiang; Zh. L. Zhang

2007-08-01T23:59:59.000Z

396

Industrial mixing techniques for Hanford double-shell tanks  

Science Conference Proceedings (OSTI)

Jet mixer pumps are currently the baseline technology for sludge mobilization and mixing in one-million gallon double-shell tanks at the Hanford and Savannah River Sites. Improvements to the baseline jet mixer pump technology are sought because jet mixer pumps have moving parts that may fail or require maintenance. Moreover, jet mixers are relatively expensive, they heat the waste, and, in some cases, may not mobilize enough of the sludge. This report documents a thorough literature search for commercially available applicable mixing technologies that could be used for double-shell tank sludge mobilization and mixing. Textbooks, research articles, conference proceedings, mixing experts, and the Thomas Register were consulted to identify applicable technologies. While there are many commercial methods that could be used to mobilize sludge or mix the contents of a one-million gallon tank, few will work given the geometrical constraints (e.g., the mixer must fit through a 1.07-m-diameter riser) or the tank waste properties (e.g., the sludge has such a high yield stress that it generally does not flow under its own weight). Pulsed fluid jets and submersible Flygt mixers have already been identified at Hanford and Savannah River Sites for double-shell tank mixing applications. While these mixing technologies may not be applicable for double-shell tanks that have a thick sludge layer at the bottom (since too many of these mixers would need to be installed to mobilize most of the sludge), they may have applications in tanks that do not have a settled solids layer. Retrieval projects at Hanford and other U.S. Department of Energy sites are currently evaluating the effectiveness of these mixing techniques for tank waste applications. The literature search did not reveal any previously unknown technologies that should be considered for sludge mobilization and mixing in one-million gallon double-shell tanks.

Daymo, E.A.

1997-09-01T23:59:59.000Z

397

A Simulation of the Separate Climate Effects of Middle-Atmospheric and Tropospheric CO2 Doubling  

Science Conference Proceedings (OSTI)

The separate climate effects of middle-atmospheric and tropospheric CO2 doubling have been simulated and analyzed with the ECHAM middle-atmosphere climate model. To this end, the CO2 concentration has been separately doubled in the middle-...

M. Sigmond; P. C. Siegmund; E. Manzini; H. Kelder

2004-06-01T23:59:59.000Z

398

Climate Change and the Middle Atmosphere. Part I: The Doubled CO2 Climate  

Science Conference Proceedings (OSTI)

The impact of doubled atmospheric CO2 on the climate of the middle atmosphere is investigated using the GISS global climate/middle atmosphere model. In the standard experiment, the CO2 concentration is doubled both in the stratosphere and ...

D. Rind; R. Suozzo; N. K. Balachandran; M. J. Prather

1990-02-01T23:59:59.000Z

399

New Double-Mode and Other RR Lyrae Stars from WASP Data  

E-Print Network (OSTI)

42 RRab, 46 RRc and 7 previously unidentified double-mode RR Lyrae stars were found in the publicly available data of the WASP archive. The Galactic double-mode RR Lyrae stars appear to show a bimodal period distribution.

Wils, Patrick

2010-01-01T23:59:59.000Z

400

Response of the Middle Atmosphere to CO2 Doubling: Results from the Canadian Middle Atmosphere Model  

Science Conference Proceedings (OSTI)

The Canadian Middle Atmosphere Model (CMAM) has been used to examine the middle atmosphere response to CO2 doubling. The radiative-photochemical response induced by doubling CO2 alone and the response produced by changes in prescribed SSTs are ...

V. I. Fomichev; A. I. Jonsson; J. de Grandpré; S. R. Beagley; C. McLandress; K. Semeniuk; T. G. Shepherd

2007-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

The H2 Double-Slit Experiment: Where Quantum and Classical Physics...  

NLE Websites -- All DOE Office Websites (Extended Search)

The H2 Double-Slit Experiment: Where Quantum and Classical Physics Meet Print For the first time, an international research team carried out a double-slit experiment in H2, the...

402

Speeding Up the Computation of WRF Double Moment 6-Class Microphysics Scheme with GPU  

Science Conference Proceedings (OSTI)

Weather Research and Forecasting (WRF) Double Moment 6-class (WDM6) microphysics scheme implements a double moment bulk microphysical parameterization of clouds and precipitation and is applicable in mesoscale and general circulation models. WDM6 ...

J. Mielikainen; B. Huang; H.-L. A. Huang; M. D. Goldberg; A. Mehta

403

Dynamic electric fields and double layers in laser-produced plasmas  

SciTech Connect

This paper traces the historical development of electric double layers. Properties of laser produced plasmas are discussed.

Soreq, S.E. (Nuclear Research Center, Plasma Physics Dept., Yavne (IL)); Hora, H. (New South Wales Univ., Kensington (Australia). Dept. of Theoretical Physics)

1989-12-01T23:59:59.000Z

404

NERSC's Franklin Supercomputer Upgraded to Double Its Scientific Capability  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC's Franklin NERSC's Franklin Supercomputer Upgraded to Double Its Scientific Capability NERSC's Franklin Supercomputer Upgraded to Double Its Scientific Capability July 20, 2009 OCEAN EDDIES: This image comes from a computer simulation modeling eddies in the ocean. An interesting feature is the abundance of eddies away from the equator, which is shown in the center of the image at y=0. This research collaboration led by Paola Cessi of the Scripps Institute of Oceanography performed over 15,000 years worth of deep ocean circulation simulations with 1.6 million processor core hours on the upgraded Franklin system. The Department of Energy's (DOE) National Energy Research Scientific Computing (NERSC) Center has officially accepted a series of upgrades to its Cray XT4 supercomputer, providing the facility's 3,000 users with twice

405

WATER-LITHIUM BROMIDE DOUBLE-EFFECT ABSORPTION COOLING ANALYSIS  

Office of Scientific and Technical Information (OSTI)

WATER-LITHIUM BROMIDE DOUBLE-EFFECT WATER-LITHIUM BROMIDE DOUBLE-EFFECT ABSORPTION COOLING ANALYSIS Gary C . V l i e t , Michael B . Lawson, and Rudolf0 A . Lithgow Center f o r Energy Studies The University of Texas a t Austin December 1980 Final Report f o r Contract: DE AC03-79SF10540 (Mu1 tiple-Effect Absorption Cycle Solar Cooling) with the U.S. Department of Energy DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency Thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately

406

Double Oak, Texas: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Double Oak, Texas: Energy Resources Double Oak, Texas: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 33.065122°, -97.1105669° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":33.065122,"lon":-97.1105669,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

407

Modeling of Sulfate Double-salts in Nuclear Wastes  

Science Conference Proceedings (OSTI)

Due to limited tank space at Hanford and Savannah River, the liquid nuclear wastes or supernatants have been concentrated in evaporators to remove excess water prior to the hot solutions being transferred to underground storage tanks. As the waste solutions cooled, the salts in the waste exceeded the associated solubility limits and precipitated in the form of saltcakes. The initial step in the remediation of these saltcakes is a rehydration process called saltcake dissolution. At Hanford, dissolution experiments have been conducted on small saltcake samples from five tanks. Modeling of these experimental results, using the Environmental Simulation Program (ESP), are being performed at the Diagnostic Instrumentation and Analysis Laboratory (DIAL) at Mississippi State University. The River Protection Project (RPP) at Hanford will use these experimental and theoretical results to determine the amount of water that will be needed for its dissolution and retrieval operations. A comprehensive effort by the RPP and the Tank Focus Area continues to validate and improve the ESP and its databases for this application. The initial effort focused on the sodium, fluoride, and phosphate system due to its role in the formation of pipeline plugs. In FY 1999, an evaluation of the ESP predictions for sodium fluoride, trisodium phosphate dodecahydrate, and natrophosphate clearly indicated that improvements to the Public database of the ESP were needed. One of the improvements identified was double salts. The inability of any equilibrium thermodynamic model to properly account for double salts in the system can result in errors in the predicted solid-liquid equilibria (SLE) of species in the system. The ESP code is evaluated by comparison with experimental data where possible. However, data does not cover the range of component concentrations and temperatures found in many tank wastes. Therefore, comparison of ESP with another code is desirable, and may illuminate problems with both. For this purpose, the SOLGASMIX code was used in conjunction with a small private database developed at ORNL. This code calculates thermodynamic equilibria through minimization of Gibbs Energy, and utilizes the Pitzer model for activity coefficients. The sodium nitrate-sulfate double salt and the sodium fluoride-sulfate double salt were selected for the FY 2000 validation study of ESP. Even though ESP does not include the sulfate-nitrate double salt, this study found that this omission does not appear to be a major consequence. In this case, the solubility predictions with and without the sulfate-nitrate double salt are comparable. In contrast, even though the sulfate-fluoride double salt is included within the ESP databank, comparison to previous experimental results indicates that ESP underestimates solubility. Thus, the prediction for the sulfate-fluoride system needs to be improved. A main consequence of the inability to accurately predict the SLE of double salts is its impact on the predicted ionic strength of the solution. The ionic strength has been observed to be an important factor in the formation of pipeline plugs. To improve the ESP prediction, solubility tests on the sulfate-fluoride system are underway at DIAL, and these experimental results will be incorporated into the Public database by OLI System, Inc. Preliminary ESP simulations also indicated difficulties with the SLE prediction for anhydrous sodium sulfate. The Public database for the ESP does not include fundamental parameters for this solid in mixed solutions below 32.4 C. The limitation, in the range of anhydrous sodium sulfate, leads to convergence problems in ESP and to inaccurate predictions of solubility near the invariant point when sodium sulfate decahydrate and other salts, such as sodium nitrate, were present. These difficulties were partially corrected through the use of an additional database. In conclusion, these results indicate the need for experimental data at temperatures above 25 C and in solutions containing both nitrate and hydroxide. Furthermore, the validation and do

Toghiani, B.

2000-10-30T23:59:59.000Z

408

Hanford double shell tank corrosion monitoring instrument tree prototype  

Science Conference Proceedings (OSTI)

High-level nuclear wastes at the Hanford site are stored underground in carbon steel double-shell and single-shell tanks (DSTs and SSTs). The installation of a prototype corrosion monitoring instrument tree into DST 241-A-101 was completed in December 1995. The instrument tree has the ability to detect and discriminate between uniform corrosion, pitting, and stress corrosion cracking (SCC) through the use of electrochemical noise measurements and a unique stressed element, three-electrode probe. The tree itself is constructed of AISI 304L stainless steel (UNS S30403), with probes in the vapor space, vapor/liquid interface and liquid. Successful development of these trees will allow their application to single shell tanks and the transfer of technology to other US Department of Energy (DOE) sites. Keywords: Hanford, radioactive waste, high-level waste tanks, electrochemical noise, probes, double-shell tanks, single-shell tanks, corrosion.

Nelson, J.L.; Edgemon, G.L.; Ohl, P.C.

1995-11-01T23:59:59.000Z

409

Double Shell Tank (DST) Transfer Piping Subsystem Specification  

Science Conference Proceedings (OSTI)

This specification establishes the performance requirements and provides references to the requisite codes and standards to be applied during design of the Double-Shell Tank (DST) Transfer Piping Subsystem that supports the first phase of Waste Feed Delivery. This specification establishes the performance requirements and provides references to the requisite codes and standards to be applied during design of the Double-Shell Tank (DST) Transfer Piping Subsystem that supports the first phase of waste feed delivery. This subsystem transfers waste between transfer-associated structures (pits) and to the River Protection Project (RPP) Privatization Contractor Facility where it will be processed into an immobilized waste form. This specification is intended to be the basis for new projects/installations (W-521, etc.). This specification is not intended to retroactively affect previously established project design criteria without specific direction by the program.

GRAVES, C.E.

2000-03-22T23:59:59.000Z

410

Nonperturbative theory of double photoionization of the hydrogen molecule  

DOE Green Energy (OSTI)

We present completely ab initio nonperturbative calculations of the integral and single differential cross sections for double photoionization of H2 for photon energies from 53.9 to 75.7 eV. The method of exterior complex scaling, implemented with B-splines, is used to solve the Schrodinger equation for a correlated continuum wave function corresponding to a single photon having been absorbed by a correlated initial state. The results are in good agreement with experimental integral cross sections.

Vanroose, W.; Martin, F.; Rescigno, T.N.; McCurdy, C.W.

2004-10-01T23:59:59.000Z

411

241-AN Double Shell Tanks (DST) Integrity Assessment Report  

Science Conference Proceedings (OSTI)

This report presents the results of the integrity assessment of the 241-AN double-shell tank farm facility located in the 200 East Area of the Hanford Site. The assessment included the design evaluation and integrity examinations of the tanks and concluded that the facility is adequately designed, is compatible with the waste, and is fit for use. Recommendations including subsequent examinations, are made to ensure the continued safe operation of the tanks.

JENSEN, C.E.

1999-09-21T23:59:59.000Z

412

Double-clad nuclear-fuel safety rod  

DOE Patents (OSTI)

A device for shutting down a nuclear reactor during an undercooling or overpower event, whether or not the reactor's scram system operates properly. This is accomplished by double-clad fuel safety rods positioned at various locations throughout the reactor core, wherein melting of a secondary internal cladding of the rod allows the fuel column therein to shift from the reactor core to place the reactor in a subcritical condition.

McCarthy, W.H.; Atcheson, D.B.

1981-12-30T23:59:59.000Z

413

Interval Translation Maps of three intervals reduce to Double Rotations  

E-Print Network (OSTI)

We show that any interval translation map (ITM) of three intervals can be reduced either to a rotation or a double rotation. As a consequence, the subset of ITMs of finite type in the space of all ITMs of three intervals is open, dense, and full Lebesgue measure. The set of ITMs of infinite type is a Cantor set of zero measure and of Hausdorff dimension less than full.

Volk, Denis

2012-01-01T23:59:59.000Z

414

241-AY Double Shell Tanks (DST) Integrity Assessment Report  

Science Conference Proceedings (OSTI)

This report presents the results of the integrity assessment of the 241-AY double-shell tank farm facility located in the 200 East Area of the Hanford Site. The assessment included the design evaluation and integrity examinations of the tanks and concluded that the facility is adequately designed, is compatible with the waste, and is fit for use. Recommendations including subsequent examinations. are made to ensure the continued safe operation of the tanks.

JENSEN, C.E.

1999-09-21T23:59:59.000Z

415

Period doubling route to chaos in Taylor-Green dynamo  

E-Print Network (OSTI)

We perform spectral simulations of dynamo for magnetic Prandtl number of one with Taylor-Green forcing. We observe dynamo transition through a supercritical pitchfork bifurcation. Beyond the transition, the numerical simulations reveal complex dynamo states with windows of constant, periodic, quasiperiodic, and chaotic magnetic field configurations. For some forcing amplitudes, multiple attractors were obtained for different initial conditions. We show that one of the chaotic windows follows the period-doubling route to chaos.

R. Yadav; M. Chandra; M. K. Verma; S. Paul; P. Wahi

2010-05-09T23:59:59.000Z

416

The double pulsar -- A new testbed for relativistic gravity  

E-Print Network (OSTI)

The first ever double pulsar, discovered by our team a few months ago, consists of two pulsars, one with period of 22 ms and the other with a period of 2.7 s. This binary system with a period of only 2.4-hr provides a truly unique laboratory for relativistic gravitational physics. In this contribution we summarize the published results and look at the prospects of future observations.

M. Kramer; A. G. Lyne; M. Burgay; A. Possenti; R. N. Manchester; F. Camilo; M. A. McLaughlin; D. R. Lorimer; N. D'Amico; B. C. Joshi; J. Reynolds; P. C. C. Freire

2004-05-10T23:59:59.000Z

417

Double Shell Tank (DST) Process Waste Sampling Subsystem Definition Report  

Science Conference Proceedings (OSTI)

This report defines the Double-Shell Tank (DST) Process Waste Sampling Subsystem (PWSS). This subsystem definition report fully describes and identifies the system boundaries of the PWSS. This definition provides a basis for developing functional, performance, and test requirements (i.e., subsystem specification), as necessary, for the PWSS. The resultant PWSS specification will include the sampling requirements to support the transfer of waste from the DSTs to the Privatization Contractor during Phase 1 of Waste Feed Delivery.

RASMUSSEN, J.H.

2000-04-25T23:59:59.000Z

418

An infant with double trisomy (48,XXX,+18)  

Science Conference Proceedings (OSTI)

The authors report on an infant with double trisomy 48,XXX,+18. She presented with manifestation of trisomy 18: prominent occiput, microphthalmia, small mouth, micrognathia, malformed ears, congenital heart defect, overlapping fingers, talipes equinovarus, and rockerbottom feet. An extra palmar crease was present only on the right hand. This patient was alive at 12 months. The clinical manifestations are compared with those of 10 previously reported cases. 13 refs., 3 figs., 1 tab.

Jaruratanasirikul, S.; Jinorose, U. [Prince of Songkla Univ. (Thailand)

1994-01-15T23:59:59.000Z

419

Retrieval technology development for Hanford double-shell tanks  

SciTech Connect

This paper describes the combined analytical, computational, and experimental program developed for identifying operating strategies for mobilization and retrieval of radioactive waste stored in double-shell tanks at Hanford. Sludge mobilization, slurry uniformity, and slurry retrieval investigations will produce guidelines for mixer pump and retrieval pump operation based on the physical properties of the waste and the geometric properties of the system (number of operating pumps and pump design and placement).

Bamberger, J.A.; Wise, B.M.; Miller, W.C.

1992-05-01T23:59:59.000Z

420

Manipulating Synchronous Optical Signals with a Double $?$ Atomic Ensemble  

E-Print Network (OSTI)

We analyze a double $\\Lambda $ atomic configuration interacting with two signal beams and two control beams. Because of the quantum interference between the two $\\Lambda $ channels, the four fields are phase-matched in electromagnetically induced transparency. Our numerical simulation shows that this system is able to manipulate synchronous optical signals, such as generation of optical twin signals, data correction, signal transfer and amplification in the atomic storage.

Zhuan Li; De-Zhong Cao; Kaige Wang

2004-10-06T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Free Energy of an Electrical Double Layer DEREK Y. C. CHAN AND D. JOHN MITCHELL  

E-Print Network (OSTI)

The Free Energy of an Electrical Double Layer DEREK Y. C. CHAN AND D. JOHN MITCHELL Department for the potential determining ions. The interaction free energy due to the overlap of two double layers has a simple The concept of the free energy of an elec- trical double layer is of considerable impor- tance in colloid

Chan, Derek Y C

422

Electrical characteristics of double stacked Ppy-PVA supercapacitor for powering biomedical MEMS devices  

Science Conference Proceedings (OSTI)

This paper discusses planar and double stacked supercapacitors with interwoven electrodes. Here, we study surface charge densities and capacitance performances of planar and sandwiched double stacked interdigital electrodes MEMS supercapacitors, and ... Keywords: BioMEMS, Double stacked supercapacitor, Polypyrrole (Ppy), Polyvinyl alcohol (PVA)

Hafzaliza Erny Zainal Abidin, Azrul Azlan Hamzah, Burhanuddin Yeop Majlis, Jumril Yunas, Norihan Abdul Hamid, Ummikalsom Abidin

2013-11-01T23:59:59.000Z

423

Reducing transistor count in clocked standard cells with ambipolar double-gate FETs  

Science Conference Proceedings (OSTI)

This paper presents a set of circuit design approaches to achieve clocked standard logic cell functions with ambipolar double-gate devices such as the Double Gate Carbon Nanotube FET (DG-CNTFET). The cells presented in this work use the infield controllability ... Keywords: CNTFETs, advanced technologies, ambipolar double-gate devices, dynamic logic, standard cells

K. Jabeur; D. Navarro; I. O'Connor; P. E. Gaillardon; M. H. Ben Jamaa; F. Clermidy

2010-06-01T23:59:59.000Z

424

Sensitivity of CUORE to Neutrinoless Double-Beta Decay  

SciTech Connect

In this paper, we study the sensitivity of CUORE, a bolometric double-beta decay experiment under construction at the Laboratori Nazionali del Gran Sasso in Italy. Two approaches to the computation of experimental sensitivity are discussed and compared, and the formulas and parameters used in the sensitivity estimates are provided. Assuming a background rate of 10{sup -2} cts/(keV kg y), we find that, after 5 years of live time, CUORE will have a 1#27;{sigma} sensitivity to the neutrinoless double-beta decay half-life of {caret T{sup 0{nu}}{sub 1/2}}(1{sigma}#27;) = 1.6x#2;10{sup 26} y and thus a potential to probe the effective Majorana neutrino mass down to 41-95 meV; the sensitivity at 1.64{sigma}#27;, which corresponds to 90% C.L., will be {caret T{sup 0{nu}}{sub 1/2}(1.64{sigma}#27;}) = 9.5x10{sup 25} y. This range is compared with the claim of observation of neutrinoless double-beta decay in {sup 76}Ge and the preferred range in the neutrino mass parameter space from oscillation results.

CUORE; Alessandria, F.; Andreotti, E.; Ardito, R.; Arnaboldi, C.; Avignone III, F. T.; Balata, M.; Bandac, I.; Banks, T. I.; Bari, G.; Beeman, J.; Bellini, F.; Bersani, A.; Biassoni, M.; Bloxham, T.; Brofferio, C.; Bryant, A.; Bucci, C.; Cai, X. Z.; Canonica, L.; Capelli, S.; Carbone, L.; Cardani, L.; Carrettoni, M.; Casali, N.; Chott, N.; Clemenza, M.; Cosmelli, C.; Cremonesi, O.; Creswick, R. J.; Dafinei, I.; Dally, A.; Biasi, A. De; Decowski, M. P.; Deninno, M. M.; Waard, A. de; Domizio, S. Di; Ejzak, L.; Faccini, R.; Fang, D. Q.; Farach, H. A.; Ferri, E.; Ferroni, F.; Fiorini, E.; Foggetta, L.; Franceschi, M. A.; Freedman, S. J.; Frossati, G.; Fujikawa, B. K.; Giachero, A.; Gironi, L.; Giuliani, A.; Gorla, P.; Gotti, C.; Guardincerri, E.; Gutierrez, T. D.; Haller, E. E.; Han, K.; Heeger, K. M.; Huang, H. Z.; Ichimura, K.; Kadel, R.; Kazkaz, K.; Keppel, G.; Kogler, L.; Kolomensky, Yu. G.; Kraft, S.; Lenz, D.; Li, Y. L.; Liu, X.; Longo, E.; Ma, Y. G.; Maiano, C.; Maier, G.; Maino, M.; Mancini, C.; Martinez, C.; Martinez, M.; Maruyama, R. H.; Moggi, N.; Morganti, S.; Napolitano, T.; Newman, S.; Nisi, S.; Nones, C.; Norman, E. B.; Nucciotti, A.; Orio, F.; Orlandi, D.; Ouellet, J. L.; Pallavicini, M.; Palmieri, V.; Pattavina, L.; Pavan, M.; Pedretti, M.; Pessina, G.; Pirro, S.; Previtali, E.; Rampazzo, V.; Rimondi, F.; Rosenfeld, C.; Rusconi, C.; Salvioni, C.; Sangiorgio, S.; Schaeffer, D.; Scielzo, N. D.; Sisti, M.; Smith, A. R.; Stivanello, F.; Taffarello, L.; Terenziani, G.; Tian, W. D.; Tomei, C.; Trentalange, S.; Ventura, G.; Vignati, M.; Wang, B. S.; Wang, H. W.; Whitten Jr., C. A.; Wise, T.; Woodcraft, A.; Xu, N.; Zanotti, L.; Zarra, C.; Zhu, B. X.; Zucchelli, S.

2011-11-23T23:59:59.000Z

425

Double Hot Springs Geothermal Area | Open Energy Information  

Open Energy Info (EERE)

Double Hot Springs Geothermal Area Double Hot Springs Geothermal Area Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Geothermal Resource Area: Double Hot Springs Geothermal Area Contents 1 Area Overview 2 History and Infrastructure 3 Regulatory and Environmental Issues 4 Exploration History 5 Well Field Description 6 Geology of the Area 7 Geofluid Geochemistry 8 NEPA-Related Analyses (0) 9 Exploration Activities (0) 10 References Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"TERRAIN","zoom":6,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"500px","height":"300px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.048,"lon":-119.0283,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

426

A blue sky catastrophe in double-diffusive convection  

E-Print Network (OSTI)

A global bifurcation of the blue sky catastrophe type has been found in a small Prandtl number binary mixture contained in a laterally heated cavity. The system has been studied numerically applying the tools of bifurcation theory. The catastrophe corresponds to the destruction of an orbit which, for a large range of Rayleigh numbers, is the only stable solution. This orbit is born in a global saddle-loop bifurcation and becomes chaotic in a period doubling cascade just before its disappearance at the blue sky catastrophe.

Esteban Meca; Isabel Mercader; Oriol Batiste; Laureano Ramirez-Piscina

2004-05-27T23:59:59.000Z

427

Container lid gasket protective strip for double door transfer system  

DOE Patents (OSTI)

An apparatus and a process for forming a protective barrier seal along a "ring of concern" of a transfer container used with double door systems is provided. A protective substrate is supplied between a "ring of concern" and a safety cover in which an adhesive layer of the substrate engages the "ring of concern". A compressive foam strip along an opposite side of the substrate engages a safety cover such that a compressive force is maintained between the "ring of concern" and the adhesive layer of the substrate.

Allen, Jr., Burgess M

2013-02-19T23:59:59.000Z

428

Full Counting Statistics of Photons Emitted by Double Quantum Dot  

E-Print Network (OSTI)

We analyze the full counting statistics of photons emitted by a double quantum dot (DQD) to a high-quality microwave transmission line due to the dipole coupling. We show that at the resonant condition between the energy splitting of the DQD and the photon energy in the transmission line, photon statistics exhibits both a sub-Poissonian distribution and antibunching. In the ideal case, when the system decoherence stems only from photodetection, the photon noise is reduced below one-half of the noise for the Poisson distribution. The photon distribution remains sub-Poissonian even at moderate decoherence in the DQD.

Canran Xu; Maxim G. Vavilov

2013-03-27T23:59:59.000Z

429

Double Diffusive Natural Convection in a Nuclear Waste Repository  

Science Conference Proceedings (OSTI)

In this study, we conduct a two-dimensional numerical analysis of double diffusive natural convection in an emplacement drift for a nuclear waste repository. In-drift heat and moisture transport is driven by combined thermal- and compositional-induced buoyancy forces. Numerical results demonstrate buoyancy-driven convective flow patterns and configurations during both repository heat-up and cool-down phases. It is also shown that boundary conditions, particularly on the drip-shield surface, have strong impacts on the in-drift convective flow and transport.

Y. Hao; J. Nitao; T.A. Buscheck; Y. Sun

2006-03-28T23:59:59.000Z

430

Goos-Hanchen like Shifts in Graphene Double Barriers  

E-Print Network (OSTI)

We study the Goos-Hanchen like shifts for Dirac fermions in graphene scattered by double barrier structures. After obtaining the solution for the energy spectrum, we use the boundary conditions to explicitly determine the Goos-Hanchen like shifts and the associated transmission probability. We analyze these two quantities at resonances by studying their {main} characteristics as a function of the energy and electrostatic potential parameters. To check the validity of our computations we recover previous results obtained for a single barrier under appropriate limits.

Ahmed Jellal; Ilham Redouani; Youness Zahidi; Hocine Bahlouli

2013-06-24T23:59:59.000Z

431

Efficient double beta decay nuclear matrix elements computations  

SciTech Connect

We have developed a shell model code for the accurate computation of the two-body matrix elements of the transition operators involved in the neutrinoless double beta decay. This code features coupled cluster method short-range correlations with Jastrow-like functions, finite nucleon size effect and higher order nucleon current corrections. We present the results obtained for {sup 48}Ca and {sup 82}Se, then we compare them with other results in the literature. In the case of {sup 48}Ca, we also study the contributions of the included effects and find good agreement with other published results.

Neacsu, Andrei [Horia Hulubei Foundation (FHH) 407 Atomistilor, Horia Hulubei National Institute for Physics and Nuclear Engineering (IFIN-HH) 30 Reactorului, Magurele-Bucharest 077125 (Romania)

2012-11-20T23:59:59.000Z

432

Parity Doubling and the S Parameter Below the Conformal Window  

E-Print Network (OSTI)

We describe a lattice simulation of the masses and decay constants of the lowest-lying vector and axial resonances, and the electroweak S parameter, in an SU(3) gauge theory with $N_f = 2$ and 6 fermions in the fundamental representation. The spectrum becomes more parity doubled and the S parameter per electroweak doublet decreases when $N_f$ is increased from 2 to 6, motivating study of these trends as $N_f$ is increased further, toward the critical value for transition from confinement to infrared conformality.

Thomas Appelquist; Ron Babich; Richard C. Brower; Michael Cheng; Michael A. Clark; Saul D. Cohen; George T. Fleming; Joe Kiskis; Meifeng Lin; Ethan T. Neil; James C. Osborn; Claudio Rebbi; David Schaich; Pavlos Vranas

2010-09-29T23:59:59.000Z

433

Resonance enhancement of nonsequential double ionization by a magnetic field  

Science Conference Proceedings (OSTI)

We investigate nonsequential double ionization (NSDI) of helium by using an additional magnetic field parallel to the polarization of the laser pulse. By exploring the ability of a magnetic field for focusing the selected trajectories that contribute to the NSDI, we have found that the yield of NSDI, as a function of the magnetic-field strength, shows different behavior for different laser intensities. As a result, an additional magnetic field provides a way to identify that the NSDI mechanism of laser-assisted collision ionization begins to play an important role as the laser intensity increases.

Li Hongyun [Department of Physics, State Key Laboratory for Artificial Microstructures and Mesoscopic Physics, Peking University, Beijing 100871 (China); Laboratory of Optical Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China); Chen Jing; Liu Jie [Center for Nonlinear Studies, Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); Jiang Hongbing; Gong Qihuang [Department of Physics, State Key Laboratory for Artificial Microstructures and Mesoscopic Physics, Peking University, Beijing 100871 (China); Fu Panming; Wang Bingbing [Laboratory of Optical Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China); Yan Zongchao [Department of Physics, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada)

2011-01-15T23:59:59.000Z

434

DOUBLE-LINED SPECTROSCOPIC BINARY STARS IN THE RAVE SURVEY  

Science Conference Proceedings (OSTI)

We devise a new method for the detection of double-lined binary stars in a sample of the Radial Velocity Experiment (RAVE) survey spectra. The method is both tested against extensive simulations based on synthetic spectra and compared to direct visual inspection of all RAVE spectra. It is based on the properties and shape of the cross-correlation function, and is able to recover {approx}80% of all binaries with an orbital period of order 1 day. Systems with periods up to 1 yr are still within the detection reach. We have applied the method to 25,850 spectra of the RAVE second data release and found 123 double-lined binary candidates, only eight of which are already marked as binaries in the SIMBAD database. Among the candidates, there are seven that show spectral features consistent with the RS CVn type (solar type with active chromosphere) and seven that might be of W UMa type (over-contact binaries). One star, HD 101167, seems to be a triple system composed of three nearly identical G-type dwarfs. The tested classification method could also be applicable to the data of the upcoming Gaia mission.

Matijevic, G.; Zwitter, T. [Faculty of Mathematics and Physics, University of Ljubljana, Ljubljana (Slovenia); Munari, U.; Siviero, A. [INAF Osservatorio Astronomico di Padova, Asiago (Italy); Bienayme, O.; Siebert, A. [Observatorie de Strasbourg, Strasbourg (France); Binney, J. [Rudolf Pierls Center for Theoretical Physics, University of Oxford, Oxford (United Kingdom); Bland-Hawthorn, J. [Sydney Institute for Astronomy, School of Physics, University of Sydney, Sydney (Australia); Boeche, C.; Steinmetz, M. [Astrophysikalisches Institut Potsdam, Potsdam (Germany); Campbell, R. [Western Kentucky University, Bowling Green, KY (United States); Freeman, K. C. [RSAA, Australian National University, Camberra (Australia); Gibson, B. [University of Central Lancashire, Preston (United Kingdom); Gilmore, G. [Institute of Astronomy, Cambridge (United Kingdom); Grebel, E. K. [Astronomisches Rechen-Institut, Zentrum fuer Astronomie der Universitaet Heidelberg, Heidelberg (Germany); Helmi, A. [Kapteyn Astronomical Institute, University of Groningen, Groningen (Netherlands); Navarro, J. F. [University of Victoria, Victoria (Canada); Parker, Q. A. [Macquarie University, Sydney (Australia); Seabroke, G. M. [e2v Centre for Electronic Imaging, Planetary and Space Sciences Research Institute, Open University, Walton Hall, Milton Keynes (United Kingdom); Watson, F. G., E-mail: gal.matijevic@fmf.uni-lj.s [Anglo-Australian Observatory, Sydney (Australia)

2010-07-15T23:59:59.000Z

435

SUPPRESSION OF ENERGETIC ELECTRON TRANSPORT IN FLARES BY DOUBLE LAYERS  

SciTech Connect

During flares and coronal mass ejections, energetic electrons from coronal sources typically have very long lifetimes compared to the transit times across the systems, suggesting confinement in the source region. Particle-in-cell simulations are carried out to explore the mechanisms of energetic electron transport from the corona to the chromosphere and possible confinement. We set up an initial system of pre-accelerated hot electrons in contact with ambient cold electrons along the local magnetic field and let it evolve over time. Suppression of transport by a nonlinear, highly localized electrostatic electric field (in the form of a double layer) is observed after a short phase of free-streaming by hot electrons. The double layer (DL) emerges at the contact of the two electron populations. It is driven by an ion-electron streaming instability due to the drift of the back-streaming return current electrons interacting with the ions. The DL grows over time and supports a significant drop in temperature and hence reduces heat flux between the two regions that is sustained for the duration of the simulation. This study shows that transport suppression begins when the energetic electrons start to propagate away from a coronal acceleration site. It also implies confinement of energetic electrons with kinetic energies less than the electrostatic energy of the DL for the DL lifetime, which is much longer than the electron transit time through the source region.

Li, T. C.; Drake, J. F.; Swisdak, M. [Institute for Research in Electronics and Applied Physics, University of Maryland, College Park, MD 20742 (United States)

2012-09-20T23:59:59.000Z

436

Solid phase sequencing of double-stranded nucleic acids  

DOE Patents (OSTI)

This invention relates to methods for detecting and sequencing of target double-stranded nucleic acid sequences, to nucleic acid probes and arrays of probes useful in these methods, and to kits and systems which contain these probes. Useful methods involve hybridizing the nucleic acids or nucleic acids which represent complementary or homologous sequences of the target to an array of nucleic acid probes. These probe comprise a single-stranded portion, an optional double-stranded portion and a variable sequence within the single-stranded portion. The molecular weights of the hybridized nucleic acids of the set can be determined by mass spectroscopy, and the sequence of the target determined from the molecular weights of the fragments. Nucleic acids whose sequences can be determined include nucleic acids in biological samples such as patient biopsies and environmental samples. Probes may be fixed to a solid support such as a hybridization chip to facilitate automated determination of molecular weights and identification of the target sequence.

Fu, Dong-Jing (Waltham, MA); Cantor, Charles R. (Boston, MA); Koster, Hubert (Concord, MA); Smith, Cassandra L. (Boston, MA)

2002-01-01T23:59:59.000Z

437

Double Shell Tank (DST) Monitor and Control Subsystem Specification  

Science Conference Proceedings (OSTI)

This specification establishes the performance requirements and provides references to the requisite codes and standards to be applied during design of the Double-Shell Tank (DST) Monitor and Control Subsystem that supports the first phase of Waste Feed Delivery. This subsystem specification establishes the interface and performance requirements and provides references to the requisite codes and standards to be applied during the design of the Double-Shell Tank (DST) Monitor and Control Subsystem. The DST Monitor and Control Subsystem consists of the new and existing equipment that will be used to provide tank farm operators with integrated local monitoring and control of the DST systems to support Waste Feed Delivery (WFD). New equipment will provide automatic control and safety interlocks where required and provide operators with visibility into the status of DST subsystem operations (e.g., DST mixer pump operation and DST waste transfers) and the ability to manually control specified DST functions as necessary. This specification is intended to be the basis for new project/installations (W-521, etc.). This specification is not intended to retroactively affect previously established project design criteria without specific direction by the program.

BAFUS, R.R.

2000-04-27T23:59:59.000Z

438

Double Shell Tank (DST) Transfer Valving Subsystem Specification  

Science Conference Proceedings (OSTI)

This specification establishes the performance requirements and provides references to the requisite codes and standards to be applied during design of the Double-Shell Tank (DST) Transfer Valving Subsystem that supports the first phase of Waste Feed Delivery. This specification establishes the performance requirements and provides references to the requisite codes and standards to be applied during design of the Double-Shell Tank (DST) Transfer Valving Subsystem that supports the first phase of Waste Feed Delivery (WFD). The DST Transfer Valving Subsystem routes waste and other media (e.g., diluent, flush water, filtered raw water) among DSTs and from the low-activity waste (LAW) and high-level waste (HLW) feed staging tanks to the River Protection Project (RPP) Privatization Contractor facility, where it will be processed into an immobilized waste form. This specification is intended to be the basis for new projects/installations (W-521, etc.). This specification is not intended to retroactively affect previously established project design criteria without specific direction by the program.

GRAVES, C.E.

2000-03-22T23:59:59.000Z

439

Biodiesel synthesis using calcined layered double hydroxide catalysts  

SciTech Connect

The catalytic properties of calcined Li-Al, Mg-Al and Mg-Fe layered double hydroxides (LDHs) were examined in two transesterification reactions, namely, the reaction of glyceryl tributyrate with methanol, and the reaction of soybean oil with methanol. While the Li-Al catalysts showed high activity in these reactions at the reflux temperature of methanol, the Mg-Fe and Mg-Al catalysts exhibited much lower methyl ester yields. CO2 TPD measurements revealed the presence of sites of weak, medium and strong basicity on both Mg-Al and Li-Al catalysts, the latter showing higher concentrations of medium and strong base sites; by implication, these are the main sites active in transesterification catalyzed by calcined Li-Al LDHs. Maximum activity was observed for the Li-Al catalysts when a calcination temperature of 450-500 aC was applied, corresponding to decomposition of the layered double hydroxide to the mixed oxide without formation of crystalline lithium aluminate phases.

Schumaker, J. Link [University of Kentucky; Crofcheck, Czarena [University of Kentucky; TAckett, S. Adam [University of Kentucky; Santillan-Jimenez, Eduardo [University of Kentucky; Morgan, Tonya [University of Kentucky; Ji, Yaying [University of Kentucky; Crocker, Mark [University of Kentucky; Toops, Todd J [ORNL

2008-01-01T23:59:59.000Z

440

Hazard assessments of double-shell flammable gas tanks  

DOE Green Energy (OSTI)

This report is the fourth in a series of hazard assessments performed on the double-shell flammable gas watch list tanks. This report focuses on hazards associated with the double-shell watch list tanks (101-AW, 103-AN, 104-AN, and 105-AN). While a similar assessment has already been performed for tank 103-SY, it is also included here to incorporate a more representative slurry gas mixture and provide a consistent basis for comparing results for all the flammable gas tanks. This report is intended to provide an in-depth assessment by considering the details of the gas release event and slurry gas mixing as the gas is released from the waste. The consequences of postulated gas ignition are evaluated using a plume burn model and updated ignition frequency predictions. Tank pressurization which results from a gas burn, along with the structural response, is also considered. The report is intended to support the safety basis for work activities in flammable gas tanks by showing margins to safety limits that are available in the design and procedures.

Fox, G.L.; Stepnewski, D.D.

1994-09-28T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Effects of a static electric field on nonsequential double ionization  

SciTech Connect

Using a three-dimensional semiclassical method, we perform a systematic analysis of the effects of an additional static electric field on nonsequential double ionization (NSDI) of a helium atom in an intense, linearly polarized laser field. It is found that the static electric field influences not only the ionization rate, but also the kinetic energy of the ionized electron returning to the parent ion, in such a way that, if the rate is increased, then the kinetic energy of the first returning electron is decreased, and vice versa. These two effects compete in NSDI. Since the effect of the static electric field on the ionization of the first electron plays a more crucial role in the competition, the symmetric double-peak structure of the He{sup 2+} momentum distribution parallel to the polarization of the laser field is destroyed. Furthermore, the contribution of the trajectories with multiple recollisions to the NSDI is also changed dramatically by the static electric field. As the static electric field increases, the trajectories with two recollisions, which start at the time when the laser and the static electric field are in the same direction, become increasingly important for the NSDI.

Li Hongyun [Laboratory of Optical Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100080 (China); Department of Physics, State Key Laboratory for Artificial Microstructures and Mesoscopic Physics, Peking University, Beijing 100871 (China); Wang Bingbing; Li Xiaofeng; Fu Panming [Laboratory of Optical Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100080 (China); Chen Jing; Liu Jie [Center for Nonlinear Studies, Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); Jiang Hongbing; Gong Qihuang [Department of Physics, State Key Laboratory for Artificial Microstructures and Mesoscopic Physics, Peking University, Beijing 100871 (China); Yan Zongchao [Department of Physics, University of New Brunswick, P.O. Box 4400, Fredericton, New Brunswick, E3B 5A3 (Canada); Research Academy of Science and Technology, Harbin Institute of Technology, Harbin 150001 (China)

2007-09-15T23:59:59.000Z

442

Double-core excitations in formamide can be probed by X-ray double-quantum-coherence spectroscopy  

Science Conference Proceedings (OSTI)

The attosecond, time-resolved X-ray double-quantum-coherence four-wave mixing signals of formamide at the nitrogen and oxygen K-edges are simulated using restricted excitation window time-dependent density functional theory and the excited core hole approximation. These signals, induced by core exciton coupling, are particularly sensitive to the level of treatment of electron correlation, thus providing direct experimental signatures of electron and core-hole many-body effects and a test of electronic structure theories.

Zhang Yu; Healion, Daniel; Biggs, Jason D.; Mukamel, Shaul [Department of Chemistry, University of California, 450 Rowland Hall, Irvine, California 92697 (United States)

2013-04-14T23:59:59.000Z

443

Classical two-split interference effects in double photoionization of molecular hydrogen at high energies  

DOE Green Energy (OSTI)

The authors report a thorough theoretical study of one photon double ionization of H{sub 2}. They suggest that interference effects reported in one photon ionization will be reproducible in the case of double ionization when one of the photons carriers most of the available energy and the other electron is not observed. These calculations reproduce recent double photoionization experiments of H{sub 2}.

Horner, Daniel A [Los Alamos National Laboratory; Miyabe, S [LBNL; Rescigno, T N [LBNL; Mccurdy, C W [LBNL; Morales, F [MADRID, SPAIN; Martin, F [MADRID, SPAIN

2009-01-01T23:59:59.000Z

444

A New Design for Double Edge Triggered Flip-flops  

E-Print Network (OSTI)

The logic construction of a double-edge-triggered (DET) flip-flop, which can receive input signal at two levels of the clock, is analyzed and a new circuit design of CMOS DET flip-flop is proposed. Simulation using SPICE and a 1 micron technology shows that this DET flip-flop has ideal logic functionality, a simpler structure, lower delay time and higher maximum data rate compared to other existing CMOS DET flipflops. By simulating and comparing the proposed DET flip-flop with the traditional single-edge-triggered (SET) flip-flop, it is shown that the proposed DET flip-flop reduces power dissipation by half while keeping the same date rate.

Massoud Pedram; Qing Wu; Xunwei Wu

1998-01-01T23:59:59.000Z

445

Double-ended ceramic helical-rotor expander  

DOE Patents (OSTI)

A ceramic helical rotor expander using a double-ended or tandem herringbone type rotor arrangement with bearing and seal assemblies remote from the hot gas inlets and especially capable of operating at an inlet temperature of above 1100.degree. C. The rotors are solid or hollow and bonded to hollow metal shafts, and mounted in a composite or simple prismatic casing. The rotors, casing and shafts are constructed from low expansivity materials. In the preferred embodiment the rotors are constructed of silicon nitride and the shafts constructed of an molybdenum alloy, with the metal shafts being supported in bearings and secured to synchronizing gears. The rotors and casing may be provided with coolant channels therein, and are constructed to eliminate the problem of end leakages at inlet temperature and pressure, and the need for high temperature bearings and seals.

Mohr, Peter B. (Livermore, CA); Myers, Wendell B. (Livermore, CA)

1995-01-01T23:59:59.000Z

446

Minimally doubled fermions at one-loop level  

E-Print Network (OSTI)

Single fermionic degrees of freedom together with standard chiral symmetry at finite lattice spacing, correct continuum limit and local interactions only are precluded by the Nielsen-Ninomiya no-go theorem. The class of minimally doubled fermion actions exhibits exactly two chiral modes. Recent interest in these actions has been sparked by the investigation of fermionic actions defined on "hyperdiamond" lattices. Due to the necessity of breaking hypercubic symmetry explicitly, radiative corrections generate operator mixings with relevant and marginal operators that should vanish in continuum QCD. These cannot be avoided and must be taken into account in particular by a peculiar wave-function renormalisation and additive momentum renormalisation. Renormalisation properties at one-loop level of the self-energy, local bilinears and conserved vector and axial-vector currents are presented for Borici-Creutz and Karsten-Wilczek actions. Distinct differences and similarities between both actions are elucidated.

Capitani, Stefano; Wittig, Hartmut

2009-01-01T23:59:59.000Z

447

Full Counting Statistics of Photons Emitted by Double Quantum Dot  

E-Print Network (OSTI)

We analyze the full counting statistics of photons emitted by a double quantum dot (DQD) coupled to a high-quality microwave resonator by electric dipole interaction. We show that at the resonant condition between the energy splitting of the DQD and the photon energy in the resonator, photon statistics exhibits both a sub-Poissonian distribution and antibunching. In the ideal case, when the system decoherence stems only from photodetection, the photon noise is reduced below one-half of the noise for the Poisson distribution and is consistent with current noise. The photon distribution remains sub-Poissonian even at moderate decoherence in the DQD. We demonstrate that Josephson junction based photomultipliers can be used to experimentally assess statistics of emitted photons.

Canran Xu; Maxim G. Vavilov

2013-03-27T23:59:59.000Z

448

Reactor electron antineutrino disappearance in the Double Chooz experiment  

E-Print Network (OSTI)

The Double Chooz experiment has observed 8,249 candidate electron antineutrino events in 227.93 live days with 33.71 GW-ton-years (reactor power x detector mass x livetime) exposure using a 10.3 cubic meter fiducial volume detector located at 1050 m from the reactor cores of the Chooz nuclear power plant in France. The expectation in case of theta13 = 0 is 8,937 events. The deficit is interpreted as evidence of electron antineutrino disappearance. From a rate plus spectral shape analysis we find sin^2 2{\\theta}13 = 0.109 \\pm 0.030(stat) \\pm 0.025(syst). The data exclude the no-oscillation hypothesis at 99.9% CL (3.1{\\sigma}).

Abe, Y; Anjos, J C dos; Barriere, J C; Bergevin, M; Bernstein, A; Bezerra, T J C; Bezrukhov, L; Blucher, E; Bowden, N S; Buck, C; Busenitz, J; Cabrera, A; Caden, E; Camilleri, L; Carr, R; Cerrada, M; Chang, P -J; Chimenti, P; Classen, T; Collin, A P; Conover, E; Conrad, J M; Crespo-Anadón, J I; Crum, K; Cucoanes, A; D'Agostino, M V; Damon, E; Dawson, J V; Dazeley, S; Dietrich, D; Djurcic, Z; Dracos, M; Durand, V; Ebert, J; Efremenko, Y; Elnimr, M; Etenko, A; Fallot, M; Fechner, M; von Feilitzsch, F; Felde, J; Franco, D; Franke, A J; Franke, M; Furuta, H; Gama, R; Gil-Botella, I; Giot, L; Goger-Neff, M; Gonzalez, L F G; Goodman, M C; Goon, J TM; Greiner, D; Haag, N; Hagner, C; Hara, T; Hartmann, F X; Haser, J; Hatzikoutelis, A; Hayakawa, T; Hofmann, M; Horton-Smith, G A; Hourlier, A; Ishitsuka, M; Jochum, J; Jollet, C; Jones, C L; Kaether, F; Kalousis, L N; Kamyshkov, Y; Kaplan, D M; Kawasaki, T; Keefer, G; Kemp, E; de Kerret, H; Kibe, Y; Konno, T; Kryn, D; Kuze, M; Lachenmaier, T; Lane, C E; Langbrandtner, C; Lasserre, T; Letourneau, A; Lhuillier, D; Lima, H P; Lindner, M; López-Castanõ, J M; LoSecco, J M; Lubsandorzhiev, B K; Lucht, S; McKee, D; Maeda, J; Maesano, C N; Mariani, C; Maricic, J; Martino, J; Matsubara, T; Mention, G; Meregaglia, A; Miletic, T; Milincic, R; Miyata, H; Mueller, Th A; Nagasaka, Y; Nakajima, K; Novella, P; Obolensky, M; Oberauer, L; Onillon, A; Osborn, A; Ostrovskiy, I; Palomares, C; Pepe, I M; Perasso, S; Perrin, P; Pfahler, P; Porta, A; Potzel, W; Reichenbacher, J; Reinhold, B; Remoto, A; Rohling, M; Roncin, R; Roth, S; Sakamoto, Y; Santorelli, R; Sato, F; Schonert, S; Schoppmann, S; Schwetz, T; Shaevitz, M H; Shimojima, S; Shrestha, D; Sida, J-L; Sinev, V; Skorokhvatov, M; Smith, E; Spitz, J; Stahl, A; Stancu, I; Stokes, L F F; Strait, M; Stuken, A; Suekane, F; Sukhotin, S; Sumiyoshi, T; Sun, Y; Svoboda, R; Terao, K; Tonazzo, A; Toups, M; Thi, H H Trinh; Valdiviesso, G; Veyssiere, C; Wagner, S; Watanabe, H; White, B; Wiebusch, C; Winslow, L; Worcester, M; Wurm, M; Yermia, F; Zimmer, V

2012-01-01T23:59:59.000Z

449

Reactor electron antineutrino disappearance in the Double Chooz experiment  

E-Print Network (OSTI)

The Double Chooz experiment has observed 8,249 candidate electron antineutrino events in 227.93 live days with 33.71 GW-ton-years (reactor power x detector mass x livetime) exposure using a 10.3 cubic meter fiducial volume detector located at 1050 m from the reactor cores of the Chooz nuclear power plant in France. The expectation in case of theta13 = 0 is 8,937 events. The deficit is interpreted as evidence of electron antineutrino disappearance. From a rate plus spectral shape analysis we find sin^2 2{\\theta}13 = 0.109 \\pm 0.030(stat) \\pm 0.025(syst). The data exclude the no-oscillation hypothesis at 99.8% CL (2.9{\\sigma}).

Y. Abe; C. Aberle; J. C. dos Anjos; J. C. Barriere; M. Bergevin; A. Bernstein; T. J. C. Bezerra; L. Bezrukhov; E. Blucher; N. S. Bowden; C. Buck; J. Busenitz; A. Cabrera; E. Caden; L. Camilleri; R. Carr; M. Cerrada; P. -J. Chang; P. Chimenti; T. Classen; A. P. Collin; E. Conover; J. M. Conrad; J. I. Crespo-Anadón; K. Crum; A. Cucoanes; M. V. D'Agostino; E. Damon; J. V. Dawson; S. Dazeley; D. Dietrich; Z. Djurcic; M. Dracos; V. Durand; J. Ebert; Y. Efremenko; M. Elnimr; A. Etenko; M. Fallot; M. Fechner; F. von Feilitzsch; J. Felde; D. Franco; A. J. Franke; M. Franke; H. Furuta; R. Gama; I. Gil-Botella; L. Giot; M. Goger-Neff; L. F. G. Gonzalez; M. C. Goodman; J. TM. Goon; D. Greiner; N. Haag; C. Hagner; T. Hara; F. X. Hartmann; J. Haser; A. Hatzikoutelis; T. Hayakawa; M. Hofmann; G. A. Horton-Smith; A. Hourlier; M. Ishitsuka; J. Jochum; C. Jollet; C. L. Jones; F. Kaether; L. N. Kalousis; Y. Kamyshkov; D. M. Kaplan; T. Kawasaki; G. Keefer; E. Kemp; H. de Kerret; Y. Kibe; T. Konno; D. Kryn; M. Kuze; T. Lachenmaier; C. E. Lane; C. Langbrandtner; T. Lasserre; A. Letourneau; D. Lhuillier; H. P. Lima Jr; M. Lindner; J. M. López-Castanõ; J. M. LoSecco; B. K. Lubsandorzhiev; S. Lucht; D. McKee; J. Maeda; C. N. Maesano; C. Mariani; J. Maricic; J. Martino; T. Matsubara; G. Mention; A. Meregaglia; T. Miletic; R. Milincic; H. Miyata; Th. A. Mueller; Y. Nagasaka; K. Nakajima; P. Novella; M. Obolensky; L. Oberauer; A. Onillon; A. Osborn; I. Ostrovskiy; C. Palomares; I. M. Pepe; S. Perasso; P. Perrin; P. Pfahler; A. Porta; W. Potzel; J. Reichenbacher; B. Reinhold; A. Remoto; M. Rohling; R. Roncin; S. Roth; Y. Sakamoto; R. Santorelli; F. Sato; S. Schonert; S. Schoppmann; T. Schwetz; M. H. Shaevitz; S. Shimojima; D. Shrestha; J. -L. Sida; V. Sinev; M. Skorokhvatov; E. Smith; J. Spitz; A. Stahl; I. Stancu; L. F. F. Stokes; M. Strait; A. Stuken; F. Suekane; S. Sukhotin; T. Sumiyoshi; Y. Sun; R. Svoboda; K. Terao; A. Tonazzo; M. Toups; H. H. Trinh Thi; G. Valdiviesso; C. Veyssiere; S. Wagner; H. Watanabe; B. White; C. Wiebusch; L. Winslow; M. Worcester; M. Wurm; F. Yermia; V. Zimmer

2012-07-27T23:59:59.000Z

450

Double-ended ceramic helical-rotor expander  

DOE Patents (OSTI)

A ceramic helical rotor expander is disclosed using a double-ended or tandem herringbone type rotor arrangement with bearing and seal assemblies remote from the hot gas inlets and especially capable of operating at an inlet temperature of above 1,100 C. The rotors are solid or hollow and bonded to hollow metal shafts, and mounted in a composite or simple prismatic casing. The rotors, casing and shafts are constructed from low expansivity materials. In the preferred embodiment the rotors are constructed of silicon nitride and the shafts constructed of an molybdenum alloy, with the metal shafts being supported in bearings and secured to synchronizing gears. The rotors and casing may be provided with coolant channels therein, and are constructed to eliminate the problem of end leakages at inlet temperature and pressure, and the need for high temperature bearings and seals. 3 figs.

Mohr, P.B.; Myers, W.B.

1995-02-28T23:59:59.000Z

451

Study of a double bubbler for material balance in liquids  

Science Conference Proceedings (OSTI)

The objective of this project was to determine the potential of a double bubbler to measure density and fluid level of the molten salt contained in an electrorefiner. Such in-situ real-time measurements can provide key information for material balances in the pyroprocessing of the nuclear spent fuel. This theoretical study showed this technique has a lot of promise. Four different experiments were designed and performed. The first three experiments studied the influence of a variety of factors such as depth difference between the two tubes, gas flow rate, the radius of the tubes and determining the best operating conditions. The last experiment purpose was to determine the precision and accuracy of the apparatus during specific conditions. The elected operating conditions for the characterization of the system were a difference of depth of 25 cm and a flow rate of 55 ml/min in each tube. The measured densities were between 1,000 g/l and 1,400g/l and the level between 34cm and 40 cm. The depth difference between the tubes is critical, the larger, the better. The experiments showed that the flow rate should be the same in each tube. The concordances with theoretical predictions were very good. The density precision was very satisfying (spread<0.1%) and the accuracy was about 1%. For the level determination, the precision was also very satisfying (spread<0.1%), but the accuracy was about 3%. However, those two biases could be corrected with calibration curves. In addition to the aqueous systems studied in the present work, future work will focus on examining the behavior of the double bubbler instrumentation in molten salt systems. The two main challenges which were identified in this work are the effect of the temperature and the variation of the superficial tension.

Hugues Lambert

2013-09-01T23:59:59.000Z

452

Physica E 40 (2008) 15601562 Shubnikov de Haas oscillations in double wells with opposite signs  

E-Print Network (OSTI)

Physica E 40 (2008) 1560­1562 Shubnikov de Haas oscillations in double wells with opposite signs on the measurements of the Shubnikov de Haas oscillations (SdH) in symmetrically doped AlxGa1�xAs double wells with different Al compositions in wells, which lead to the opposite signs of the electronic g-factor in each

Gusev, Guennady

453

Overlapping double etch technique for evaluation of metallic alloys to stress corrosion cracking  

DOE Patents (OSTI)

A double overlapping etch zone technique for evaluation of the resistance of metallic alloys to stress corrosion cracking. The technique involves evaluating the metallic alloy along the line of demarcation between an overlapping double etch zone and single etch zone formed on the metallic alloy surface.

Steeves, Arthur F. (Schenectady, NY); Stewart, James C. (Loudonville, NY)

1981-01-01T23:59:59.000Z

454

Overlapping double etch technique for evaluation of metallic alloys to stress corrosion cracking  

DOE Patents (OSTI)

A double overlapping etch zone technique for evaluation of the resistance of metallic alloys to stress corrosion cracking is described. The technique involves evaluating the metallic alloy along the line of demarcation between an overlapping double etch zone and single etch zone formed on the metallic alloy surface.

Not Available

1980-05-28T23:59:59.000Z

455

Influence of Doubled CO2 on Ozone via Changes in the Brewer–Dobson Circulation  

Science Conference Proceedings (OSTI)

In this short note, the effect of enhanced circulation due to doubling CO2 on ozone is investigated. The difference of Brewer–Dobson circulation (BDC) between the doubled CO2 and control run from an idealized atmospheric general circulation model ...

Xun Jiang; Scott J. Eichelberger; Dennis L. Hartmann; Runlie Shia; Yuk L. Yung

2007-07-01T23:59:59.000Z

456

HANFORD DOUBLE SHELL TANK (DST) THERMAL & SEISMIC PROJECT SUMMARY OF COMBINED THERMAL & OPERATING LOADS  

Science Conference Proceedings (OSTI)

This report summarizes the results of the Double-Shell Tank Thermal and Operating Loads Analysis (TOLA) combined with the Seismic Analysis. This combined analysis provides a thorough, defensible, and documented analysis that will become a part of the overall analysis of record for the Hanford double-shell tanks (DSTs).

MACKEY, T.C.

2006-03-17T23:59:59.000Z

457

Final Report for Organic Partitioning Resulting from Operation of an INTEC Double-needle Sampler  

SciTech Connect

The double needle sampler testing is a continuation of previous test series that investigated the fate of organic species in the Process Equipment Waste Evaporator (PEWE) system at the Idaho Nuclear Technology and Engineering Center (INTEC). This test series was designed to investigate the effects of operation of the double needle sampling systems on volatile organic constituents in an acidic feed matrix.

Michael B. Heiser

2003-09-01T23:59:59.000Z

458

Uniform convergence of Cesàro means of negative order of double Walsh--Fourier series  

Science Conference Proceedings (OSTI)

In this paper we prove that if f ? Cw([0, 1]2) and the function f is bounded partial p- variation for some p ? [1, + ?) then the double Walsh-Fourier series of the function f ... Keywords: Cesàro means, double Walsh-Fourier series, uniform summability

Ushangi Goginava

2003-09-01T23:59:59.000Z

459

Chaotic Behaviors in the Response of a Quasigeostrophic Oceanic Double Gyre to Seasonal External Forcing  

Science Conference Proceedings (OSTI)

In an oceanic double-gyre system, nonlinear oscillations of the ocean under seasonally changing external forcing are investigated using a 1.5-layer quasigeostrophic model and a simple model related to energy balance of the oceanic double gyre. In ...

Shinya Shimokawa; Tomonori Matsuura

2010-07-01T23:59:59.000Z

460

Liquid Polymorphism and Double Criticality in a Lattice Gas Vera B. Henriques,1,  

E-Print Network (OSTI)

Liquid Polymorphism and Double Criticality in a Lattice Gas Model Vera B. Henriques,1, Nara diagrams of a simple model for an associating liquid proposed previously. Our two-dimensional lattice model decreases, a smooth disappearance of the double criticality occurs. Possible connections to liquid-liquid

Barbosa, Marcia C. B.

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

DoubleDip: leveraging thermoelectric harvesting for low power monitoring of sporadic water use  

Science Conference Proceedings (OSTI)

We present DoubleDip, a low power monitoring system for enabling non-intrusive water flow detection. DoubleDip taps into minute thermal gradients in pipes for both replenishing energy reserves and performing low power wakeup. One of the remaining issues ... Keywords: energy harvesting, low power, sustainability, thermoelectric, water monitoring

Paul Martin; Zainul Charbiwala; Mani Srivastava

2012-11-01T23:59:59.000Z

462

Transient States of the Multiscalar Controlled Double Fed Induction Generator in the Wind Farm  

Science Conference Proceedings (OSTI)

This article presents a detailed model and analysis of wind turbine based on double fed induction generator (DFIG) including cable line to the point of common coupling (PCC). The vector control system is based on the multiscalar model of the machine. ... Keywords: Double Fed Induction Generator, Multiscalar Control, Reactive Power Compensation, Wind Farm Modelling

Piotr Kolodziejek

2011-12-01T23:59:59.000Z

463

Collector efficiency of the double-pass solar air collectors with fins  

Science Conference Proceedings (OSTI)

The experimental study on a forced-convective double-pass solar air collector with fins in the second channel has been conducted. The experiments were conducted by changing the parameters that influence the thermal efficiency of the collector. The efficiency ... Keywords: collector efficiency, double-pass solar air collector, fins absorbers

A. Fudholi; M. H. Ruslan; M. Y. Othman; M. Yahya; Supranto Supranto; A. Zaharim; K. Sopian

2010-10-01T23:59:59.000Z

464

Angular momentum transfer between a circularly polarized photon and an electron spin in double quantum dots  

SciTech Connect

We propose an experimental scheme of photon-spin quantum interface using a semiconductor double quantum dot. A polarized electron spin is excited by a circularly polarized photon. We detect the spin state applying Pauli spin blockade which is often employed to detect orientation of a single electron spin in double quantum dots.

Asayama, T. [Department of Applied Physics and QPEC, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo (Japan); Solid State Memories Development Dept, Sony Corporation, Atsugi, Kanagawa (Japan); Fujita, T.; Kiyama, H.; Oiwa, A. [Department of Applied Physics and QPEC, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo (Japan); Tarucha, S. [Department of Applied Physics and QPEC, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo (Japan); Institute for Nano Quantum Electronics, University of Tokyo, 4-6-1, Komaba, Meguro-ku, Tokyo (Japan)

2011-12-23T23:59:59.000Z

465

The synchronous force control of a double-axial pneumatic actuating system  

Science Conference Proceedings (OSTI)

This paper presents the design of the synchronous force controller of a double-axial pneumatic actuating system. This system is ideally decomposed into two independent subsystems, and the coupling effect is considered as the noise effect. So, each ... Keywords: STC, double-axial pneumatic system, synchronous force control

Ying-Tsai Wang; Ming-Kun Chang

1999-07-01T23:59:59.000Z

466

Study of Shifting without Driving Force Interrupt for Double Electric Motor HEV  

Science Conference Proceedings (OSTI)

For traditional gearbox, the engine power is cut off while shifting, which will interrupt the power of power-train, make velocity down, affect the acceleration of up gear and lower the vehicle dynamic. A double electric motor hybrid electric vehicle ... Keywords: Double Electric Motor HEV, Shifting Without Driving Force Interrupt (SWDFI), Integrated Power-train

Wang Jiaxue; Wang Qingnian; Wang Weihua; Zeng Xiaohua; Li Chuan

2009-10-01T23:59:59.000Z

467

Experimental and theoretical thermal performance of double pass solar air heater with porous media  

Science Conference Proceedings (OSTI)

A theoretical model has been developed to predict the thermal performance of double pass solar air heater with porous media. It is composed of five-coupled unsteady nonlinear partial differential equations which are solved by using numerical scheme. ... Keywords: double pass solar collector, iteration, numerical, porous media, solar radiation

M. Yahya; K. Sopian; M. Y. Theeran; M. Y. Othman; M. A. Alghoul; M. Hafidz; A. Zaharim

2008-11-01T23:59:59.000Z

468

T-682:Double free vulnerability in MapServer | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2:Double free vulnerability in MapServer 2:Double free vulnerability in MapServer T-682:Double free vulnerability in MapServer August 2, 2011 - 4:08pm Addthis PROBLEM: Double free vulnerability in MapServer PLATFORM: All versions may be susceptible to SQL injection under certain circumstances ABSTRACT: MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases. reference LINKS: Double-free in msAddImageSymbol() when filename is a http resource

469

Middle School Academic Competition - Double Elimination | U.S. DOE Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Academic Competition - Double Academic Competition - Double Elimination National Science Bowl® (NSB) NSB Home About High School Middle School Attending National Event Volunteers 2013 Competition Results Middle School Round Robin Middle School Double Elimination Middle School Electric Car High School Round Robin High School Double Elimination News Media WDTS Home Contact Information National Science Bowl® U.S. Department of Energy SC-27/ Forrestal Building 1000 Independence Ave., SW Washington, DC 20585 P: 202-586-6702 E: National.Science.Bowl@science.doe.gov 2013 Competition Results Middle School Academic Competition - Double Elimination Print Text Size: A A A RSS Feeds FeedbackShare Page No-Loss Bracket .pdf file (42KB) (Final Results) Challengers' Bracket .pdf file (42KB) (Final Results) Last modified: 4/29/2013 11:22:57 AM

470

High School Academic Competition - Double Elimination | U.S. DOE Office of  

NLE Websites -- All DOE Office Websites (Extended Search)

Double Double Elimination National Science Bowl® (NSB) NSB Home About High School Middle School Attending National Event Volunteers 2013 Competition Results Middle School Round Robin Middle School Double Elimination Middle School Electric Car High School Round Robin High School Double Elimination News Media WDTS Home Contact Information National Science Bowl® U.S. Department of Energy SC-27/ Forrestal Building 1000 Independence Ave., SW Washington, DC 20585 P: 202-586-6702 E: National.Science.Bowl@science.doe.gov 2013 Competition Results High School Academic Competition - Double Elimination Print Text Size: A A A RSS Feeds FeedbackShare Page No-Loss Bracket .pdf file (45KB)(Final Results) Challengers' Bracket .pdf file (42KB) (Final Results) Last modified: 4/29/2013 11:56:04 AM

471

THE LONG-TERM EVOLUTION OF DOUBLE WHITE DWARF MERGERS  

SciTech Connect

In this paper, we present a model for the long-term evolution of the merger of two unequal mass C/O white dwarfs (WDs). After the dynamical phase of the merger, magnetic stresses rapidly redistribute angular momentum, leading to nearly solid-body rotation on a viscous timescale of 10{sup -4}-1 yr, long before significant cooling can occur. Due to heating during the dynamical and viscous phases, the less massive WD is transformed into a hot, slowly rotating, and radially extended envelope supported by thermal pressure. Following the viscous phase of evolution, the maximum temperature near the envelope base may already be high enough to begin off-center convective carbon burning. If not, Kelvin-Helmholtz contraction of the inner region of the envelope on a thermal timescale of 10{sup 3}-10{sup 4} yr compresses the base of the envelope, again yielding off-center burning. As a result, the long-term evolution of the merger remnant is similar to that seen in previous calculations: the burning shell diffuses inward over {approx}10{sup 4} yr, eventually yielding a high-mass O/Ne WD or a collapse to a neutron star, rather than a Type Ia supernova. During the cooling and shell-burning phases, the merger remnant radiates near the Eddington limit. Given the double WD merger rate of a few per 1000 yr, a few dozen of these {approx}10{sup 38} erg s{sup -1} sources should exist in a Milky Way type galaxy. While the end result is similar to that of previous studies, the physical picture and the dynamical state of the matter in our model differ from previous work. Furthermore, substantial remaining uncertainties related to the convective structure near the photosphere and mass loss during the thermal evolution may significantly affect our conclusions. Thus, future work within the context of the physical model presented here is required to better address the eventual fate of double WD mergers, including those for which one or both of the components is a He WD.

Shen, Ken J.; Kasen, Daniel [Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Bildsten, Lars [Kavli Institute for Theoretical Physics, Kohn Hall, University of California, Santa Barbara, CA 93106 (United States); Quataert, Eliot, E-mail: kenshen@astro.berkeley.edu [Department of Astronomy and Theoretical Astrophysics Center, University of California, Berkeley, CA 94720 (United States)

2012-03-20T23:59:59.000Z

472

Mechanistic analysis of double-shell tank gas release  

DOE Green Energy (OSTI)

Pacific Northwest Laboratory (PNL) is studying possible mechanisms and fluid dynamics contributing to the periodic release of gases from the double-shell waste storage tanks at Hanford. This study is being conducted for Westinghouse Hanford Company (WHC), a contractor for the US Department of Energy (DOE). This interim report discusses the work done through November 1990. Safe management of the wastes at Hanford depends on an understanding of the chemical and physical mechanisms that take place in the waste tanks. An example of the need to understand these mechanisms is tank 101-SY. The waste in this tank is generating and periodically releasing potentially flammable gases into the tank vent system according to observations of the tank. How these gases are generated and become trapped, the causes of periodic release, and the mechanism of the release are not known in detail. In order to develop a safe mitigation strategy, possible physical mechanisms for the periodic release of flammable gases need to be understood.

Allemann, R.T.; Antoniak, Z.I.; Friley, J.R.; Haines, C.E.; Liljegren, L.M.; Somasundaram, S.

1991-12-01T23:59:59.000Z

473

Double-shell tank ultrasonic inspection plan. Revision 1  

DOE Green Energy (OSTI)

The waste tank systems managed by the Tank Waste Remediation System Division of Westinghouse Hanford Company includes 28 large underground double-shell tanks (DST) used for storing hazardous radioactive waste. The ultrasonic (UT) inspection of these tanks is part of their required integrity assessment (WAC 1993) as described in the tank systems integrity assessment program plan (IAPP) (Pfluger 1994a) submitted to the Ecology Department of the State of Washington. Because these tanks hold radioactive waste and are located underground examinations and inspections must be done remotely from the tank annuli with specially designed equipment. This document describes the UT inspection system (DSTI system), the qualification of the equipment and procedures, field inspection readiness, DST inspections, and post-inspection activities. Although some of the equipment required development, the UT inspection technology itself is the commercially proven and available projection image scanning technique (P-scan). The final design verification of the DSTI system will be a performance test in the Hanford DST annulus mockup that includes the demonstration of detecting and sizing corrosion-induced flaws.

Pfluger, D.C.

1994-09-30T23:59:59.000Z

474

Analysis of Residential Demand Response and Double-Auction Markets  

Science Conference Proceedings (OSTI)

Demand response and dynamic pricing programs are expected to play increasing roles in the modern Smart Grid environment. While direct load control of end-use loads has existed for decades, price driven response programs are only beginning to be explored at the distribution level. These programs utilize a price signal as a means to control demand. Active markets allow customers to respond to fluctuations in wholesale electrical costs, but may not allow the utility to control demand. Transactive markets, utilizing distributed controllers and a centralized auction can be used to create an interactive system which can limit demand at key times on a distribution system, decreasing congestion. With the current proliferation of computing and communication resources, the ability now exists to create transactive demand response programs at the residential level. With the combination of automated bidding and response strategies coupled with education programs and customer response, emerging demand response programs have the ability to reduce utility demand and congestion in a more controlled manner. This paper will explore the effects of a residential double-auction market, utilizing transactive controllers, on the operation of an electric power distribution system.

Fuller, Jason C.; Schneider, Kevin P.; Chassin, David P.

2011-10-10T23:59:59.000Z

475

Water-lithium bromide double-effect absorption cooling analysis  

SciTech Connect

A numerical model was developed for the transient simulation of the double-effect, water-lithium bromide absorption cooling machine, and the use of the model to determine the effect of the various design and input variables on the absorption unit performance. The performance parameters considered were coefficient of performance and cooling capacity. The sensitivity analysis was performed by selecting a nominal condition and determining performance sensitivity for each variable with others held constant. The variables considered in the study include source hot water, cooling water, and chilled water temperatures; source hot water, cooling water, and chilled water flow rates; solution circulation rate; heat exchanger areas; pressure drop between evaporator and absorber; solution pump characteristics; and refrigerant flow control methods. The performance sensitivity study indicated in particular that the distribution of heat exchanger area among the various (seven) heat exchange components is a very-important design consideration. Moreover, it indicated that the method of flow control of the first effect refrigerant vapor through the second effect is a critical design feature when absorption units operate over a significant range of cooling capacity. The model was used to predict the performance of the Trane absorption unit with fairly good accuracy.

Vliet, G.C.; Lawson, M.B.; Lithgow, R.A.

1980-12-01T23:59:59.000Z

476

High Level Waste Feed Certification in Hanford Double Shell Tanks  

SciTech Connect

The ability to effectively mix, sample, certify, and deliver consistent batches of High Level Waste (HLW) feed from the Hanford Double Shell Tanks (DST) to the Waste Treatment and Immobilization Plant (WTP) presents a significant mission risk with potential to impact mission length and the quantity of HLW glass produced. DOE’s River Protection Project (RPP) mission modeling and WTP facility modeling assume that individual 3785 cubic meter (1 million gallon) HLW feed tanks are homogenously mixed, representatively sampled, and consistently delivered to the WTP. It has been demonstrated that homogenous mixing of HLW sludge in Hanford DSTs is not likely achievable with the baseline design thereby causing representative sampling and consistent feed delivery to be more difficult. Inconsistent feed to the WTP could cause additional batch to batch operational adjustments that reduces operating efficiency and has the potential to increase the overall mission length. The Hanford mixing and sampling demonstration program will identify DST mixing performance capability, will evaluate representative sampling techniques, and will estimate feed batch consistency. An evaluation of demonstration program results will identify potential mission improvement considerations that will help ensure successful mission completion. This paper will discuss the history, progress, and future activities that will define and mitigate the mission risk.

Thien, Micheal G.; Wells, Beric E.; Adamson, Duane J.

2010-03-01T23:59:59.000Z

477

Cosmology, Time's Arrow, and That Old Double Standard  

E-Print Network (OSTI)

It is widely accepted that temporal asymmetry is largely a cosmological problem; the task of explaining temporal asymmetry reduces in the main to that of explaining an aspect of the condition of the early universe. However, cosmologists who discuss these issues often make mistakes similar to those that plagued nineteenth century discussions of the statistical foundations of thermodynamics. In particular, they are often guilty of applying temporal "double standards" of various kinds---e.g., in failing to recognise that certain statistical arguments apply with equal force in either temporal direction. This paper aims to clarify the issue as to what would count as adequate explanation of cosmological time asymmetry. A particular concern is the question whether it is possible to explain why entropy is low near the Big Bang without showing that it must also be low near a Big Crunch, in the event that the universe recollapses. I criticise some of the objections raised to this possibility, showing that these too oft...

Price, Huw

2009-01-01T23:59:59.000Z

478

Single Helix to Double Gyroid in Chiral Block Copolymers  

SciTech Connect

An order-order phase transition of chiral block copolymers (BCPs*) from single helix to double gyroid (H* {yields} G) through a nucleation and growth process was demonstrated. The H* and G phases can be obtained by solution casting from fast and slow solvent evaporation, respectively, suggesting that the H* phase is a metastable phase. Consequently, the coexistence of H* and G phases can be found in the solution-cast samples from intermediate solvent evaporation. To truly examine the transition mechanism of the H* {yields} G, electron tomography was carried out to directly visualize the morphological evolution in real space, in particular, the transition zone at interface. Unlike the mechanisms for the transitions of block copolymers (BCPs) by considering the interdomain spacing matching, a significant mismatch in the lattices for the H* {yields} G was found. Consequently, the transition may require an adjustment on the geometric dimensions to justify corresponding lattice mismatch. As a result, the morphological observations from electron tomography offer new insights into BCP phase transitions.

C Chen; H Hsueh; Y Chiang; R Ho; S Akasaka; H Hasegawa

2011-12-31T23:59:59.000Z

479

Double Shell Tank (DST) Diluent and Flush Subsystem Specification  

SciTech Connect

The Double-Shell Tank (DST) Diluent and Flush Subsystem is intended to support Waste Feed Delivery. The DST Diluent and Flush Subsystem specification describes the relationship of this system with the DST System, describes the functions that must be performed by the system, and establishes the performance requirements to be applied to the design of the system. It also provides references for the requisite codes and standards. The DST Diluent and Flush Subsystem will treat the waste for a more favorable waste transfer. This will be accomplished by diluting the waste, dissolving the soluble portion of the waste, and flushing waste residuals from the transfer line. The Diluent and Flush Subsystem will consist of the following: The Diluent and Flush Station(s) where chemicals will be off-loaded, temporarily stored, mixed as necessary, heated, and metered to the delivery system; and A piping delivery system to deliver the chemicals to the appropriate valve or pump pit Associated support structures. This specification is intended to be the basis for new projects/installations. This specification is not intended to retroactively affect previously established project design criteria without specific direction by the program.

GRAVES, C.E.

2000-04-27T23:59:59.000Z

480

Double Shell Tank (DST) Transfer Pump Subsystem Specification  

SciTech Connect

This specification establishes the performance requirements and provides references to the requisite codes and standards to be applied to the Double-Shell Tank (DST) Transfer Pump Subsystem which supports the first phase of Waste Feed Delivery (WFD). This specification establishes the performance requirements and provides the references to the requisite codes and standards to be applied during the design of the DST Transfer Pump Subsystem that supports the first phase of (WFD). The DST Transfer Pump Subsystem consists of a pump for supernatant and or slurry transfer for the DSTs that will be retrieved during the Phase 1 WFD operations. This system is used to transfer low-activity waste (LAW) and high-level waste (HLW) to designated DST staging tanks. It also will deliver blended LAW and HLW feed from these staging tanks to the River Protection Project (RPP) Privatization Contractor facility where it will be processed into an immobilized waste form. This specification is intended to be the basis for new projects/installations (W-521, etc.). This specification is not intended to retroactively affect previously established project design criteria without specific direction by the program.

LESHIKAR, G.A.

2000-03-27T23:59:59.000Z

Note: This page contains sample records for the topic "java double literal" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Hanford double shell tank corrosion monitoring instrument trees  

Science Conference Proceedings (OSTI)

High-level nuclear wastes at the Hanford site are stored underground in carbon steel double-shell and single-shell tanks - (DSTs and SSTS). Westinghouse Hanford Company is considering installation of a prototype corrosion monitoring instrument tree in at least one DST in the summer of 1995. The instrument tree will have the ability to detect and discriminate between uniform corrosion, stress corrosion cracking (SCC), and pitting. Additional instrument trees will follow in later years. Proof-of-technology testing is currently underway for the use of commercially available electric field pattern (EFP) analysis and electrochemical noise (EN) corrosion monitoring equipment. Creative use and combinations of other existing technologies is also being considered. Successful demonstration of these technologies will be followed by the development of a Hanford specific instrument tree. The first instrument tree will incorporate one of these technologies. Subsequent trees may include both technologies, as well as a more standard assembly of corrosion coupons. Successful development of these trees will allow their application to single shell tanks and the transfer of technology to other U.S. Department of Energy (DOE) sites.

Nelson, J.L.

1995-03-01T23:59:59.000Z

482

Acoustic double layer structures in dense magnetized electron-positron-ion plasmas  

SciTech Connect

The acoustic double layer structures are studied using quantum hydrodynamic model in dense magnetized electron-positron-ion plasmas. The extended Korteweg-de Vries is derived using reductive perturbation method. It is found that increase in the ion concentration in dense magnetized electron-positron plasmas increases the amplitude as well as the steepness of the double layer structure. However, increase in the magnetic field strength and decrease in the obliqueness of the nonlinear acoustic wave enhances only the steepness of the double layer structures. The numerical results have also been shown by using the data of the outer layer regions of white dwarfs given in the literature.

Akhtar, N.; Mahmood, S. [Theoretical Plasma Physics Division, PINSTECH, P. O. Nilore, Islamabad 44000 (Pakistan); Department of Physics and Applied Mathematics, PIEAS, P. O. Nilore, Islamabad 44000 (Pakistan)

2011-11-15T23:59:59.000Z

483

HANFORD DOUBLE SHELL TANK (DST) THERMAL & SEISMIC PROJECT BUCKLING EVALUATION METHODS & RESULTS FOR THE PRIMARY TANKS  

SciTech Connect

This report documents a detailed buckling evaluation of the primary tanks in the Hanford double shell waste tanks. The analysis is part of a comprehensive structural review for the Double-Shell Tank Integrity Project. This work also provides information on tank integrity that specifically responds to concerns raise by the Office of Environment, Safety, and Health (ES&H) Oversight (EH-22) during a review (in April and May 2001) of work being performed on the double-shell tank farms, and the operation of the aging waste facility (AWF) primary tank ventilation system.

MACKEY, T.C.

2006-03-17T23:59:59.000Z

484

Electric coheating experiment to determine the heat-loss coefficient of a double-envelope house  

DOE Green Energy (OSTI)

An electric coheating experiment was conducted on a double-envelope house in Arvada, Colorado, to determine the total heat loss coefficient (UA) of the double-shelled structure, as well as the heat loss coefficients of the inner and outer shells. Electric coheating is fairly well established as an experimental method for determining the total heat loss coefficient in conventional residential buildings. However, special problems are introduced with passive and double-envelope buildings. A new methodology was developed to meet these problems. That methodology and the results of the experimental investigation are presented and discussed.

Ortega, J. K.E.; Anderson, J. V.; Connolly, J. M.; Bingham, C. E.

1981-07-01T23:59:59.000Z

485

Fluid dynamics of double diffusive systems. Final report  

SciTech Connect

Over the past seven years the authors have conducted an experimental, numerical, and theoretical study of the stability of doubly diffusive systems, and of mixing processes in stratified turbulence. For the study of the stability of doubly diffusive systems continuous gradients of two diffusing components (heat and salinity in this case) were used as the initial condition, and forcing was introduced by lateral heating and surface shear. The goals of this work included (1) quantification of the effects of finite amplitude disturbances on stable, double diffusive systems, particularly with respect to lateral heating, (2) development of an improved understanding of the physical phenomena present in sheardriven flows in doubly diffusive stratified environments, (3) increasing their knowledge-base on turbulent flow in stratified environments and how to represent it, and (4) formulation of a numerical code for such flows. In particular, the overall goals of this aspect of the research were as follows: (1) develop more general stability and scaling criteria for the destabilization of doubly-stratified systems, (2) study the variation of flow structure and scales with Rayleigh ratio and lateral heating ratio, (3) delineate the mechanisms governing convective layer formation and merging, (4) study the mixing processes within the convective layers and across interfaces, and estimate the heat and mass fluxes in such a system, (5) quantify the effects of turbulence and coherent structures (due to a wind-driven surface shear) on a doubly stratified system, and (6) study the interaction between surface shear and side-wall heating destabilization mechanisms. Goals 1 through 4 have been successfully completed and the results are described in this report.

Koseff, J.R.

1995-07-01T23:59:59.000Z

486

OpenMath JavaBeans - CECM  

E-Print Network (OSTI)

OpenMath attempts to create a standard for the electronic communication of ... to be encoded as OpenMath Objects and ultimately, by way of the phrasebook, into ... The connectors on the left and right hand sides of the bean correspond to ...

487

Java How to Program, 9th edition  

Science Conference Proceedings (OSTI)

The Deitels groundbreaking How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. Their Live Code Approach features thousands of lines of code in hundreds of ...

Paul Deitel; Harvey Deitel

2011-03-01T23:59:59.000Z

488

Programming with partially specified aggregates in Java  

Science Conference Proceedings (OSTI)

Various forms of data aggregates, e.g., arrays, lists, sets, etc., are usually provided by programming languages, either as primitive entities or as additional features made available by standard libraries. In conventional programming languages these ... Keywords: Constraints, Declarative programming, Finite sets, Logical variables

F. Bergenti; L. Chiarabini; G. Rossi

2011-10-01T23:59:59.000Z

489

JavaTMRemoteMethodInvocation Specification  

E-Print Network (OSTI)

.7 Exception Handling in Remote Method Invocation. . . . . 11 2.8 Object Methods Overridden by the Remote Handling in Remote Method Invocation · Object Methods Overridden by the RemoteObject Class · The Semantics passed as a parameter can only implement remote interfaces. 2.7 Exception Handling in Remote Method

Demurjian, Steven A.

490

A Programming Logic for Java Bytecode Programs  

E-Print Network (OSTI)

Quigley,C.L. To appear in Proceedings of the 16th International Conference on Theorem Proving in Higher Order Logics, Lecture Notes in Computer Science Springer Verlag

Quigley, C.L.

491

Javari : adding reference immutability to Java  

E-Print Network (OSTI)

This paper describes a programming language, Javari, that is capable of expressing and enforcing immutability constraints. The specific constraint expressed is that the abstract state of the object to which an immutable ...

Tschantz, Matthew S

2006-01-01T23:59:59.000Z

492

Hanoi: A Typestate DSL for Java  

E-Print Network (OSTI)

McGinniss,I. Gay,S.J. DCS Technical Report Series pp 20 Dept of Computing Science, University of Glasgow

McGinniss, I.

493

Persistence and Java - A Balancing Act  

E-Print Network (OSTI)

Atkinson,M.P. Proceedings of Objects and Databases, International Symposium at ECOOP 2000. Sophia Antipolis, France, June 2000. Published as Lecture Notes in Computer Science, (Dittrich, KR et al Eds). Volume No. 1944. pp 1-31 Springer

Atkinson, M.P.

494

Formalizing the dynamic semantics of Java  

E-Print Network (OSTI)

Watt,D.A. Proceedings of 3rd International Workshop on Action Semanrics pp 1-18 University of Aarhus

Watt, D.A.

495

Region Type Checking for Core-Java  

E-Print Network (OSTI)

Region-based memory management offers several important advantages over garbage-collected heap, including real-time performance, better data locality and efficient use of limited memory. The concept of regions was first ...

Chin, Wei Ngan

496

Horizontal wells in the Java Sea  

SciTech Connect

The utilization of the Navigation Drilling System in recent drilling activity has established that: Continuous build rates as high as 6.75 degrees/100 ft are achievable (with a .74 degree DTU), making possible the tapping of near platform reserves. The system provides the flexibility necessary to drill a continuous curve or an irregular path without bottomhole assembly changes. The system provides the flexibility for sidetracks to the ''low side'' of the well bore without coming out of the hole for bottomhole assembly changes or a cement plug. Geological objectives can be reached with a high degree of accuracy. The system greatly reduces the costly learning curve associated with rotary bottomhole assemblies and substantially increases the confidence of the operator. Significant drilling cost reductions resulted from the use of the system. The cost per foot was further reduced as additional familiarity with the equipment was gained.

Barrett, S.L.; Lyon, R.

1988-05-01T23:59:59.000Z

497

A Toolsupported Proof System for Multithreaded Java #  

E-Print Network (OSTI)

/9­2). #12; 2 within a single object, only, but not across object boundaries. To mirror this modularity is covered by the interference freedom test [OG76,LG81], formulated also in the local language. It has#ecting more than one instance, communication and object creation is treated in the cooperation test, using

Steffen, Martin

498

Javari: Adding Reference Immutability to Java  

E-Print Network (OSTI)

This paper describes a programming language, Javari, that is capable of expressing and enforcing immutability constraints. The specific constraint expressed is that the abstract state of the object to which an immutable ...

Tschantz, Matthew S.

2006-09-05T23:59:59.000Z

499

GSA Doubles the Federal Hybrid Fleet, DOE Takes the Lead in Updating to  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GSA Doubles the Federal Hybrid Fleet, DOE Takes the Lead in GSA Doubles the Federal Hybrid Fleet, DOE Takes the Lead in Updating to Hybrids GSA Doubles the Federal Hybrid Fleet, DOE Takes the Lead in Updating to Hybrids March 31, 2010 - 12:00am Addthis WASHINGTON - President Obama announced today that the Federal Government will lead by example in replacing older cars in the federal fleet with fuel efficient hybrids and plug-in hybrid electric vehicles, reducing our dependence on foreign oil as well as cutting carbon dioxide and other pollution. The U.S. General Services Administration will double the federal hybrid fleet this year and has committed to purchasing approximately 100 plug-in hybrid vehicles in 2011. These steps are part of a broad effort to implement the Executive Order signed by President Obama in October which

500

Double Hopf Bifurcation and Quasi-Periodic Flow in a Model for Baroclinic Instability  

Science Conference Proceedings (OSTI)

The interaction between pairs of dispersive waves is studied with different zonal wavenumbers in the ?-plane model for baroclinic instability. We find that degenerate (codimension 2) double Hopf bifurcations occur at isolated points in the (F2/r2,...

Irene M. Moroz; Philip Holmes

1984-11-01T23:59:59.000Z