National Library of Energy BETA

Sample records for java multiple vulnerabilities

  1. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  2. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities...

    Broader source: Energy.gov (indexed) [DOE]

    in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by...

  3. U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9: IBM Java

  4. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1: Oracle Solaris Java

  5. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

  6. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

  7. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

  8. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  9. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials...

  10. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

  11. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  12. Java ########### Java ############### Java ##############

    E-Print Network [OSTI]

    Hagiya, Masami

    Java ########### ############### #### #### # ######### ###### Java ############### Java ############## ## ################################## ## Java ##################### #### Java ##### ########################### ######### ############ Stata # Abadi #### #### Qian

  13. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  14. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  15. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  16. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  17. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose...

  18. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  19. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  20. V-180: IBM Application Manager For Smart Business Multiple Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (GSKit). 8) Multiple vulnerabilities are caused due to a bundled vulnerable version of Java. IMPACT: IBM Application Manager For Smart Business can be exploited by malicious...

  1. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  2. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting

  3. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site

  4. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9:1: Oracle

  5. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Broader source: Energy.gov (indexed) [DOE]

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  6. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  7. Supporting data for: "The Lifetime of Android API vulnerabilities:case study on the JavaScript-to-Java interface"

    E-Print Network [OSTI]

    Thomas, Daniel R.; Coudray, Thomas; Sutcliffe, Tom

    2015-05-26

    _norm(vulnerable, total_file, condition, prefix, installed, prob, vulnerability_discovered, data_collected): norm_file = '{prefix}_{condition}_{installed}_{prob}-norm.csv'.format( prefix=prefix, condition=condition, prob=prob, installed=installed) with open... (total_file) as f: total = count_total(f) norm = OrderedDict() averagable_values = [] for day, count in vulnerable.items(): normed_value = count / total[day] if day >= vulnerability_discovered and day = data_collected: averagable_values.append(normed_value) norm...

  8. T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26.

  9. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have been

  10. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergyMultiple

  11. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  12. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  13. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK...

  14. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  15. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  16. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities

  17. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  18. Explore Java What Is Java?

    E-Print Network [OSTI]

    Myers, Brad A.

    Explore Java Must Reads What Is Java? Download the Java Development Kit Install the Java SE Development Kit Create Your First Java Program Reserved Words in Java Most Popular Free Java Newsletter! By Category Enter email address Getting Started Programming Concepts Tutorials Java Syntax Building

  19. U-245: Critical Java 0-day flaw exploited

    Broader source: Energy.gov [DOE]

    Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines

  20. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilitiesApple has

  1. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department ofMultiple

  2. Prolog Java Prolog Java Prolog Cafe Prolog

    E-Print Network [OSTI]

    Banbara, Mutsunori

    0 Prolog Java Prolog Java Prolog Cafe Prolog WAM Java Java Prolog Cafe Prolog Java Prolog Cafe Java Prolog Prolog Cafe Java Java Prolog Prolog Prolog Cafe SAT Multisat We present the Prolog Cafe system that translates Prolog into Java via the WAM. Prolog Cafe has the advantages of portability, extensibility

  3. T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...

    Broader source: Energy.gov (indexed) [DOE]

    password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061...

  4. Modeling the Java Bytecode Verifier Mark C. Reynolds 1 ,2

    E-Print Network [OSTI]

    Modeling the Java Bytecode Verifier Mark C. Reynolds 1 ,2 Computer Science Department Boston University Boston, US Abstract The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly

  5. Modeling the Java Bytecode Verifier Mark C. Reynolds1 ,2

    E-Print Network [OSTI]

    Modeling the Java Bytecode Verifier Mark C. Reynolds1 ,2 Computer Science Department Boston University Boston, US Abstract The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly

  6. Java XMGR

    SciTech Connect (OSTI)

    Dr. George L. Mesina; Steven P. Miller

    2004-08-01

    The XMGR5 graphing package [1] for drawing RELAP5 [2] plots is being re-written in Java [3]. Java is a robust programming language that is available at no cost for most computer platforms from Sun Microsystems, Inc. XMGR5 is an extension of an XY plotting tool called ACE/gr extended to plot data from several US Nuclear Regulatory Commission (NRC) applications. It is also the most popular graphing package worldwide for making RELAP5 plots. In Section 1, a short review of XMGR5 is given, followed by a brief overview of Java. In Section 2, shortcomings of both tkXMGR [4] and XMGR5 are discussed and the value of converting to Java is given. Details of the conversion to Java are given in Section 3. The progress to date, some conclusions and future work are given in Section 4. Some screen shots of the Java version are shown.

  7. Experto Universitario Java Enterprise Lenguaje Java Avanzado

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Lenguaje Java Avanzado Sesión 2: Colecciones de datos © 2012-2013 Depto. Ciencia de la Computación e IA #12;Experto Universitario Java Enterprise Lenguaje Java Avanzado Java Enterprise Lenguaje Java Avanzado © 2012-2013 Depto. Ciencia de la Computación e IA Colecciones

  8. T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory- February 2011

    Broader source: Energy.gov [DOE]

    This Critical Patch Update contains 21 new security fixes for Oracle Java SE and Java for Business. 19 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.

  9. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURLDepartment

  10. The New Institutional Design of the Procuracy in Brazil: Multiplicity of Veto Players and Institutional Vulnerability

    E-Print Network [OSTI]

    Nóbrega, Flavianne Fernanda Bitencourt

    2007-01-01

    be used by certain political actors as a powerful instrumentto other relevant political actors in the executive andinteracting with other political actors in multiple arena

  11. Eclipse Java highgrep Eclipse

    E-Print Network [OSTI]

    Chiba, Shigeru

    14 99-0553-0 15 2 6 #12;1 Unix grep Eclipse Java Java ( ) · · Java highgrep highgrep Eclipse #12.2 . . . . . . . . . . . . . . . . . . . . . . . . . . 48 A 52 #12;6 2.1 Eclipse . . . . . . . . . . . . . . . . . . . . 16 2.2 Eclipse Java #12;8 1 Unix grep [4] A A A A Eclipse Java #12;1 9 Java ( ) · · int Eclipse Java Java highgrep

  12. Lenguaje Java Avanzado 1 Introduccin al lenguaje Java.......................................................................................4

    E-Print Network [OSTI]

    Escolano, Francisco

    Lenguaje Java Avanzado Índice 1 Introducción al lenguaje Java.......................................................................................4 1.1 Java......................................................................................5 1.3 Componentes de un programa Java

  13. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were...

  14. JavaKollektionen Java Collection Framework

    E-Print Network [OSTI]

    Schürmann, Michael

    459 JavaKollektionen Java Collection Framework Bereitstellung wichtiger Kollektionen (Listen Implementierung häufig benutzter Algorithmen (Suchen, Sortieren, kleines/grö�tes Element, ...) Basis: java.util.Collection #12;460 Schnittstelle für alle Kollektionsklassen (1) Schnittstelle java.util.Collection Grö�e der

  15. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    optimization with the new Java 8 feature: type annotation.12] is an extension of Java type system and can be used withon State Of the Art in Java Program Analysis, SOAP ’13,

  16. Java Programming Certificate Program

    E-Print Network [OSTI]

    Loudon, Catherine

    Java Programming Certificate Program COMPUTER PROGRAMMING The Java programming language lies that fuel the Internet economy. In addition, the portability inherent in Java is useful for programming languages are likely to encounter projects in the near future that require knowledge of Java. Who Should

  17. Java Programming Certificate Program

    E-Print Network [OSTI]

    Loudon, Catherine

    Java Programming Certificate Program COMPUTER PROGRAMMING The Java programming language lies that fuel the Internet economy. In addition, the portability inherent in Java is useful for programming are likely to encounter projects in the near future that require knowledge of Java. Who Should Enroll

  18. Gnralits Java Threads

    E-Print Network [OSTI]

    Grigoras, .Romulus

    Généralités Java Threads POSIX Threads Autres approches Sixième partie Programmation multi-activités Java & Posix Threads Systèmes concurrents 2 / 55 #12;Généralités Java Threads POSIX Threads Autres approches Plan 1 Généralités 2 Java Threads Manipulation des activités Synchronisation (java d

  19. Java Programming MSc. Internet Security

    E-Print Network [OSTI]

    Hill, Gary

    Java Programming MSc. Internet Security - 1 - Table of content Introduction Appendices............................................................................. 70 #12;Java and accompanying application using Java 3D coding. The developed application, in a Java 3D environment, will form

  20. Java for High Performance Computing Java HPC Codes

    E-Print Network [OSTI]

    Fraguela, Basilio B.

    Motivation Java for High Performance Computing Java HPC Codes Performance Evaluation Conclusions Java for High Performance Computing: Myth or Reality? Guillermo López Taboada Grupo de Arquitectura de López Taboada Java for HPC: Myth or Reality? #12;Motivation Java for High Performance Computing Java HPC

  1. Analysing Java System Properties Implementation

    E-Print Network [OSTI]

    Nierstrasz, Oscar

    Analysing Java System Properties Implementation Supplementary documentation to the Bachelor. It introduces the Java Platform Debugger Architecture (JPDA), looks at the Java Debug Interface (JDI;Analysing Java System Properties Contents David Wettstein, 8. Dezember 2013 3 Contents 1 Standard System

  2. Optimizing Java Theory and Practice

    E-Print Network [OSTI]

    Budimliæ, Zoran

    Optimizing Java Theory and Practice Zoran Budimlic Ken Kennedy Rice University Computer Science popularity of the Internet has made an instant star of the Java programming language. Java's portability Java implementation, even with just­in­time compilation technology, is far behind the most popular

  3. SQL and Java Database Systems Lecture 19

    E-Print Network [OSTI]

    Alechina, Natasha

    1 SQL and Java Database Systems Lecture 19 Natasha Alechina SQL and Java In this Lecture · SQL in Java · SQL from within other Languages · SQL, Java, and JDBC · For More Information · Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc · Connolly and Begg 29.7 SQL and Java SQL and Other

  4. SQL and Java Database Systems Lecture 19

    E-Print Network [OSTI]

    Alechina, Natasha

    SQL and Java Database Systems Lecture 19 Natasha Alechina #12;SQL and Java In this Lecture · SQL in Java · SQL from within other Languages · SQL, Java, and JDBC · For More Information · Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc · Connolly and Begg 29.7 #12;SQL and Java SQL and Other

  5. U-087: HP-UX update for Java

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information.

  6. Lenguaje Java Avanzado 1 Presentacin..................................................................................................................2

    E-Print Network [OSTI]

    Escolano, Francisco

    Lenguaje Java Avanzado Índice 1 Presentación herramientas útiles para probar y depurar aplicaciones Java y Java EE. Por último, se estudiará el acceso de sesión Materiales 1. Introducción al lenguaje Java apuntes traspas ejercicios 2. Marco de

  7. Java Security Final Project for ECE578

    E-Print Network [OSTI]

    Java Security Final Project for ECE578: Computer and Network Security by Douglas R. Dechow A Brief History of Java and Java Security The Java language and environment began as an outgrowth of a failed eventually become Java. Given that from the very beginning, the intended application domain for Oak (Java

  8. GRAPHICS PROGRAMMING Section A Java

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING Section A ­ Java 1 - Introduction 2 - Installation & First Programs 3 - GUI: Layout Managers 9 - GUI: JMenu Gary Hill December 2003 Java 1 of 1 #12;GRAPHICS PROGRAMMING 1, sample applications, and support for Java standards. Get started quickly using the included tutorials

  9. Java support on genepool: java6 (jdk1.6) will be removed on 08...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox security updates Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox...

  10. T-641: Oracle Java SE Critical Patch Update Advisory- June 2011

    Broader source: Energy.gov [DOE]

    This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). Where the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Partial" instead of "Complete", and the corresponding CVSS Base score is 7.5 instead of 10 respectively. For issues in Deployment, fixes are only made available for JDK and JRE 6. Users should use the Java Web Start in JRE 6 and the new Java Plug-in introduced in 6 Update 10. CVE-2011-0862, CVE-2011-0873, CVE-2011-0815, CVE-2011-0817, CVE-2011-0863, CVE-2011-0864, CVE-2011-0802, CVE-2011-0814, CVE-2011-0871, CVE-2011-0786, CVE-2011-0788, CVE-2011-0866, CVE-2011-0868, CVE-2011-0872, CVE-2011-0867, CVE-2011-0869, and CVE-2011-0865

  11. Java and the Java Virtual Machine Robert Stark, Joachim Schmid, Egon Borger

    E-Print Network [OSTI]

    Börger, Egon

    Java and the Java Virtual Machine Robert St¨ark, Joachim Schmid, Egon B¨orger April 4, 2003.3 Decomposing Java and the JVM . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Sources and literature Part I. Java 3. The imperative core JavaI of Java . . . . . . . . . . . . . . . . . . . . . . . . 33 3

  12. Java Vertexing Tools

    SciTech Connect (OSTI)

    Strube, Jan; /Oregon U.; Graf, Norman; /SLAC

    2006-03-03

    This document describes the implementation of the topological vertex finding algorithm ZVTOP within the org.lcsim reconstruction and analysis framework. At the present date, Java vertexing tools allow users to perform topological vertexing on tracks that have been obtained from a Fast MC simulation. An implementation that will be able to handle fully reconstructed events is being designed from the ground up for longevity and maintainability.

  13. SOK's Java Notebook1 Steven O. Kimbrough

    E-Print Network [OSTI]

    Kimbrough, Steven Orla

    SOK's Java Notebook1 Steven O. Kimbrough University of Pennsylvania 3620 Locust Walk, Suite 1300 . . . . . . . . . . . . . . . . . . . . . 1 1.1.2 Sun's JDK . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 First Java Applet: \\Hello, world!" . . . . . . . . . . . . . . . . 5 1.3 \\Hello, world" Java application

  14. Pizza into Java: Translating theory into practice

    E-Print Network [OSTI]

    Wadler, Philip

    Pizza into Java: Translating theory, Pizza is a strict superset of Java that incorporatesothreehigher-order function* *s, and ideas from.algebraic data types. Pizza is defined by translation into Java andPcompilesiintozza attempts to make

  15. The Java API Java Bootcamp -Villanova University Dr. Papalaskari 1

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    ,1,2,3] float b = gen.nextFloat(); //float in range [0,1),eg: 0.4589 int c = gen.nextInt(4) + 1; //int in range document processing Java Bootcamp Dr. Papalaskari Villanova University imported automatically, includes a Random object named gen: · Use Random method nextInt()to generate a random number: Java Bootcamp Dr

  16. 20 Kombination von C++ und Java 20-1(368) 20 Kombination von C++ und Java

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20-1(368) 20 Kombination von C++ und Java Inhalt 20.1 Java Native Interface (JNI) 20.1.1 C++-Funktionen aus Java aufrufen 20.1.2 Java-Funktionen aus C++ aufrufen 20.2 gcj und das Compiled Native Interface (CNI) 20.2.1 C++-Funktionen aus Java aufrufen 20.2.2 Java-Funktionen aus

  17. 20 Kombination von C++ und Java 20-1 20 Kombination von C++ und Java

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20-1 20 Kombination von C++ und Java Inhalt 20.1 Java Native Interface (JNI) 20.1.1 C++-Funktionen aus Java aufrufen 20.1.2 Java-Funktionen aus C++ aufrufen 20.2 gcj und das Cygnus Native Interface (CNI) 20.2.1 C++-Funktionen aus Java aufrufen 20.2.2 Java-Funktionen aus C

  18. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-SiteDepartmentAttacks

  19. Producer Individual License Application Java Desktop App Entered demographic data

    E-Print Network [OSTI]

    Demurjian, Steven A.

    TESTING Producer ­ Individual License Application ­ Java Desktop App 7/21/2004 Entered demographic... On `Next', license attachment screen, added a cert letter: Still need to accommodate multiple authorities;On "Submit/Next" ­ Pulled up license with Inquiry tool. Some fields need widening. Didn't pick up

  20. Presenting JECA: A Java Error Correcting Algorithm for the Java Intelligent Tutoring System

    E-Print Network [OSTI]

    Franek, Frantisek

    Presenting JECA: A Java Error Correcting Algorithm for the Java Intelligent Tutoring System Edward context involving small Java programs. Furthermore, this paper presents JECA (Java Error Correction is to provide a foundation for the Java Intelligent Tutoring System (JITS) currently being field-tested. Key

  1. Frelsning 1-2 Sprkkonstruktioner i Java

    E-Print Network [OSTI]

    Interface i Java Betyder "gränssnitt" Innehåller ingen implementering Alla metoder är implicit publika och

  2. Simple Java Scripting version 1.3

    E-Print Network [OSTI]

    Carlsson, Gunnar

    BeanShell Simple Java Scripting version 1.3 1 #12;Table of Contents Table of Contents· Introduction and Run BeanShell The BeanShell GUI Java Statements and Expressions Useful BeanShell Commands Scripted Syntax· Standard Java Syntax Loosely Typed Java Syntax Exception Handling Basic Scoping of Variables

  3. The ACM Java Libraries Andrew Mertz

    E-Print Network [OSTI]

    Van Cleave, Nancy K.

    The ACM Java Libraries Andrew Mertz William Slough Nancy Van Cleave Mathematics and Computer;Introduction NetBeans and Java The ACM Java Task Force (JTF) Libraries Placing applets on web pages How to learn about the ACM libraries: This workshop Textbooks ACM Java Task Force Tutorial Javadoc

  4. Pizza into Java: Translating theory into practice

    E-Print Network [OSTI]

    Wadler, Philip

    Pizza into Java: Translating theory into practice Martin Odersky University of Karlsruhe Philip Wadler University of Glasgow Abstract Pizza is a strict superset of Java that incorporates three ideas types. Pizza is defined by translation into Java and compiles into the Java Virtual Machine

  5. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29,...

  6. V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported...

  7. 3. Java basics David Keil Computer Science I 8/13 David Keil Computer Science I Using Java 3. Intro to Java 8/13 1

    E-Print Network [OSTI]

    Keil, David M.

    3. Java basics David Keil Computer Science I 8/13 David Keil Computer Science I Using Java 3. Intro to Java 8/13 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 3. Java basics 1. Higher-level languages and compilation 2. Java programs and statements 3. Program documentation

  8. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (364) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (364) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  9. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3(378) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3(378) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  10. 3. Java basics David Keil Computer Science I 8/14 David Keil Computer Science I Using Java 3. Intro to Java 6/14 1

    E-Print Network [OSTI]

    Keil, David M.

    3. Java basics David Keil Computer Science I 8/14 David Keil Computer Science I Using Java 3. Intro to Java 6/14 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 3. Java basics 1. Higher-level languages and compilation 2. Java programs and statements 3. Program documentation

  11. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (360) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (360) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  12. Practical pluggable types for Java

    E-Print Network [OSTI]

    Papi, Matthew M

    2008-01-01

    This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines type qualifiers and their semantics, and a compiler ...

  13. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT:...

  14. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  15. java.sun.com/javaone/sf An Introduction To Software

    E-Print Network [OSTI]

    Xie, Tao

    java.sun.com/javaone/sf An Introduction To Software Agitation Alberto Savoia Chief Technology generations of colleagues · Do it for yourself Foo.java FooTest.java #12;java.sun.com/javaone/sf My View

  16. An Introduction to JavaScript Godmar Back

    E-Print Network [OSTI]

    Back, Godmar

    An Introduction to JavaScript Godmar Back #12;JavaScript ­ The Basics · Standardized as ECMAScript

  17. Java Destilado Francisco Morero PeyronaFrancisco Morero Peyrona

    E-Print Network [OSTI]

    Escolano, Francisco

    Java Destilado Francisco Morero PeyronaFrancisco Morero Peyrona Sun AmbassadorSun Ambassador Sun Awarded EngineerSun Awarded Engineer III Jornadas de Tecnología JavaIII Jornadas de Tecnología Java www.jtech.ua.es/jornadaswww.jtech.ua.es/jornadas #12;Qué es JavaQué es Java Java Destilado #12;ComunidadComunidad Lenguaje

  18. JSetL: A Java Library for Supporting Declarative Programming in Java

    E-Print Network [OSTI]

    Rossi, Gianfranco

    JSetL: A Java Library for Supporting Declarative Programming in Java #3; G. Rossi y , E. Panegai, E present a Java library|called JSetL|that o#11;ers a number of facilities to support declarative, how these features can be exploited to support a real declarative programming style in Java. Keywords

  19. Getting Started 1) Visit the Java VChill website at http://chill.colostate.edu/java/

    E-Print Network [OSTI]

    Rutledge, Steven

    VCHILL Getting Started 1) Visit the Java VChill website at http://chill.colostate.edu/java/ 2) Click on "Launch VChill" (you will see Java start up * ) 3) Enter signon name (password dialog pops up bookmark case * If it does not, you may need to install Java first. Click on the Download Center link (in

  20. Musa hybrid cv. Blue Java (Cultivated) 3 

    E-Print Network [OSTI]

    James R. Manhart

    2011-08-10

    Java Remote Method Invocation (Java RMI) is a icrographics. distributed object technology that is going to play a pivotal role in the distributed object world of tomorrow. With the introduction of the Remote Object Activation API in the beta version...

  1. Adaptive Java Optimisation using machine learning techniques 

    E-Print Network [OSTI]

    Long, Shun

    approach are implemented in a prototype Adaptive Optimisation Framework for Java (AOF-Java). The experimental results show that the heuristic random search algorithm can find, within a relatively small number of atttempts, good points in the large...

  2. Java on Networks of Workstations (JavaNOW): A Parallel Computing Framework Inspired by Linda and the Message

    E-Print Network [OSTI]

    Dickens, Phillip M.

    1 Java on Networks of Workstations (JavaNOW): A Parallel Computing Framework Inspired by Linda on these systems. In this article, we present JavaNOW (Java on Networks of Workstations), a Java based framework memory model but with a flexible set of primitive operations. JavaNOW provides a simple yet powerful

  3. PO Box 6050, Irvine, CA 92616-6050 www.extension.uci.edu Java Enterprise Edition (Java EE)

    E-Print Network [OSTI]

    Loudon, Catherine

    PO Box 6050, Irvine, CA 92616-6050 www.extension.uci.edu Java Enterprise Edition (Java EE) Technologies Certificate Program #12;UC Irvine Extension Certificate Program in Java Enterprise Edition (Java EE) Technologies 2 Revised: 11/09/09 OVERVIEW The Java Enterprise Edition (Java EE) Technologies

  4. JOP: A Java Optimized Processor Martin Schoeberl

    E-Print Network [OSTI]

    JOP: A Java Optimized Processor Martin Schoeberl JOP.design, Strausseng. 2-10/2/55, A-1050 Vienna, AUSTRIA martin@jopdesign.com Abstract. Java is still not a common language for embedded systems. It posses of the Java Virtual Ma- chine with focus on real-time applications. This paper describes the architecture

  5. Introduction to Java March 1, 2001

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Introduction to Java March 1, 2001 CBRSS and the John M. Olin Institute for Strategic Studies Lars-Erik Cederman #12;Outline · Java ­ overview ­ simple structures ­ object-orientation ­ roulette example · How to compile etc. · Readings and documentation #12;Java · Conceived by Sun in the early 1990s · Became the new

  6. Decompiling Java Using Staged Encapsulation Jerome Miecznikowski

    E-Print Network [OSTI]

    Decompiling Java Using Staged Encapsulation Jerome Miecznikowski Laurie Hendren Sable Research,hendren]@sable.mcgill.ca Abstract This paper presents an approach to program structur­ ing for use in decompiling Java bytecode to Java source. The structuring approach uses three intermediate represen­ tations: (1) a list of typed

  7. JAVA PROGRAMMING University of Adelaide, Australia

    E-Print Network [OSTI]

    Hawick, Ken

    JAVA PROGRAMMING Ken Hawick University of Adelaide, Australia Present Address: Massey University, New Zealand Email k.a.hawick@massey.ac.nz Revised: September 2003 #12;COURSE OVERVIEW #12;Java in the Java programming language and environment, focusing on the core language features. A number of worked

  8. MAKING JAVA HARD REALTIME Peter Puschner

    E-Print Network [OSTI]

    MAKING JAVA HARD REAL­TIME Peter Puschner Institut fË?ur Technische Informatik Technische Universit,andyg@cs.york.ac.uk ABSTRACT Due to its portability and security the Java program­ ming language has become very popular. Standard Java is however not suited for programming hard real­time sys­ tems. To overcome this limitation

  9. GRAPHICS PROGRAMMING SECTION D -JAVA 3D

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING SECTION D - JAVA 3D 1SECTION D - GRAPHICS 3-D........................................................................................... 2 30 Graphics 3D: Introduction to Java 3D........................................................................................ 78 ©Gary Hill September 2004 Java 3-D 1 of 13 #12;GRAPHICS PROGRAMMING SECTION D - GRAPHICS 3-D 30

  10. the Control on the Java Ic

    E-Print Network [OSTI]

    Rock, Chris

    1. Go to 2. Click o the Control on the Java Ic How To R Panel (from t con in Contro Reset You the Start Butt ol Panel ur Java Ca ton) che (Windows) 1 #12; 3. Unde 4. The T r Java Ca orary Internet ow will open ­ che (Win t Files" ­ Click ­ find "Delete dows) k on "Settings e

  11. GRAPHICS PROGRAMMING Section B Java 2D

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING Section B ­ Java 2D 20 - Graphics2D: Introduction 21 - Graphics2D: Shapes 22 2D: General Path Curves 29 - Graphics 2D: Constructive Area Geometry Gary Hill December 2003 Java 2 Java initially through the Abstract Window Toolkit, which was extended to include swing, shortly

  12. Extending Java for Android Programming Yoonsik Cheon

    E-Print Network [OSTI]

    Cheon, Yoonsik

    Extending Java for Android Programming Yoonsik Cheon TR #12-13 April 2012 Keywords: application framework, domain specific language, Android, Java. 1998 CR Categories: D.2.3 [Software Engineering] Coding Java for Android Programming (An Extended Abstract) Yoonsik Cheon Department of Computer Science

  13. 2009 IBM Corporation 2009 IBM Corporation IMS and Java

    E-Print Network [OSTI]

    1 © 2009 IBM Corporation© 2009 IBM Corporation IMS and Java for Application Modernization Barbara November 4-5, 2009 This presentation discusses use of IMS and Java to modernize your applications. #12;2 2 IMS © 2009 IBM Corporation Agenda Java basics IMS Java basics IMS Java Applications IMS Database

  14. Introduction Java Bootcamp -Villanova University Dr. Papalaskari 1

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    Introduction Java Bootcamp - Villanova University Dr. Papalaskari 1 CSC 2014 ­ Java Bootcamp Dr in this presentation are adapted from the slides accompanying Java Software Solutions by Lewis & Loftus Java Bootcamp Dr. Papalaskari Villanova University Introduction to Java Course website www

  15. A Type System for Object Initialization In the Java TM

    E-Print Network [OSTI]

    Mitchell, John C.

    A Type System for Object Initialization In the Java TM Bytecode Language Stephen N. Freund \\Lambda In the standard Java implementation, a Java language program is compiled to Java bytecode. This bytecode may be sent across the network to another site, where it is then executed by the Java Virtual Machine. Since

  16. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  17. ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications

    E-Print Network [OSTI]

    Chrzaszcz, Jacek

    ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications Aleksy Schubert1 static checking tools like ESC/Java2 can be used to ensure source code security properties of Java is further accompanied by a presentation on how these threats can be controlled by JML specifications and ESC/Java

  18. Supplement I.E: Create Shortcut for Java Applications on For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    Supplement I.E: Create Shortcut for Java Applications on Windows For Introduction to Java Programming By Y. Daniel Liang NOTE: You may use this supplement after Chapter 18, "Applets and Multimedia

  19. JavaScript-to-Java Tips Learning new languages is inevitable over the course of

    E-Print Network [OSTI]

    Dahlquist, Kam D.

    play a very similar role, but they are more strictly required in Java Equality and inequality--Comparators

  20. A Java Agent-based MacroEconomic Laboratory

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Agent-based MacroEconomic Laboratory Pascal Seppecher May 2, 2012 Abstract This paper as a Java application (Jamel: Java Agent-based MacroEconomic Laboratory). This application, together

  1. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  2. Supplement: The & and | Operators For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    8 Supplement: The & and | Operators For Introduction to Java Programming By Y. Daniel Liang Java operations. See Supplement III.D, "Bit Manipulations," for details. #12;

  3. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  4. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  5. A Formal Framework for Java Separate Compilation

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    A Formal Framework for Java Separate Compilation Davide Ancona, Giovanni Lagorio, and Elena Zucca,lagorio,zuccag@disi.unige.it Abstract. We de#12;ne a formal notion, called compilation schema, allow- ing to specify di#11;erent possibilities for performing the overall process of Java compilation, which includes type-checking of source

  6. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  7. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartment ofEnergy 094:

  8. Java Instrumentation for Dynamic Analysis Jeff Perkins and Michael Ernst

    E-Print Network [OSTI]

    Ernst, Michael

    Java Instrumentation for Dynamic Analysis Jeff Perkins and Michael Ernst MIT CSAIL 14 Nov 2005 09:45Page 1 Jeff PerkinsJava Instrumentation for Dynamic Analysis #12;Java Instrumentation Approaches Instrument source files Java Debug Interface (JDI) Instrument class files 14 Nov 2005 09:45Page 2 Jeff

  9. Guide d'utilisation de SSJ Langage Java

    E-Print Network [OSTI]

    Vázquez-Abad, Felisa J.

    Guide d'utilisation de SSJ Langage Java 15 Janvier 2001 ­ Dans votre .cshrc, rajouter la ligne'un de xdvi guide.dvi & acroread guide.pdf & 1 Version Java Nous utilisons la version 1.2 de Java. Elle votre programme (par exemple Tulipe.java) utilisant les objets de SSJ, compiler simplement avec la

  10. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  11. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Jiang, Huiqiang

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.java.com/en/download/manual.jsp 2. Click the link for your

  12. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Sibille, Etienne

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.java.com/en/download/manual.jsp 2. Click the Windows 7, XP Online

  13. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Sibille, Etienne

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.oracle.com/technetwork/java/javase/downloads/index.html 2. Next

  14. La programmation orientee objets et le langage Java

    E-Print Network [OSTI]

    Tichit, Laurent

    La programmation orient´ee objets et le langage Java Master Pro BBSG 2 Henri Garreta, Laurent Tichit D´epartement d'Informatique, Facult´e des Sciences de Luminy Cours 1: Java "sans les objets" c H. Garreta et L. Tichit, 2011-2012 POO et Java 1 / 32 #12;Java "sans les objets" Ressources Documentation www.dil.univ-mrs.fr/~tichit/java

  15. Winter, snow : an inquiry into vulnerability

    E-Print Network [OSTI]

    Orme, Wanda

    2012-01-01

    snow} ..SAN DIEGO Winter, Snow. An Inquiry into Vulnerability. AOF THE THESIS Winter, Snow. An Inquiry into Vulnerability by

  16. A comparison of C++, Java and Python 

    E-Print Network [OSTI]

    Chou, Ling

    1997-01-01

    of new OOP languages have emerged. These languages provide powerful application tools on some specific areas. Java and Python are two excellent next-generation languages. They inherit most praising features from C++, provide simpler user interfaces...

  17. Javarifier : inference of reference immutability in Java

    E-Print Network [OSTI]

    Quinonez, Jamie

    2008-01-01

    Javari is an extension of Java that supports reference immutability constraints. Programmers write Javari type qualifiers, such as the readonly type qualifier, in their programs, and the Javari typechecker detects mutation ...

  18. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-4(368) Die C++-Funktion muss in Java als native deklariert werden. Geladen werden soll sie aus einer

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-4(368) · Die C++-Funktion muss in Java als native deklariert werden. Geladen werden soll sie aus einer dynamischen Bibliothek libcppfunctions.so. SprachMix/JNI/C++fromJava/Main.java 7 public class Main 8 { 9 public native static double

  19. MALI CLIMATE VULNERABILITY JANUARY 2014

    E-Print Network [OSTI]

    Columbia University

    MALI CLIMATE VULNERABILITY MAPPING JANUARY 2014 This report is made possible by the support at Columbia University Cover Photo: Overall vulnerability map of Mali (quintile map legend), CIESIN, 2013 Project Manager Burlington, Vermont Tel.: 802-658-3890 Anna.Farmer@tetratech.com #12;MALI CLIMATE

  20. Lab 6: Java API CSC1051 1/4

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    Lab 6: Java API CSC1051 1/4 Java derives much of its power from the many classes already defined in the Java API. But how are we ever to learn and use these classes if we don't know about them? Any text on Java can only begin to cover these classes and the methods defined in them. For a complete listing

  1. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  2. 4. Standard Java data types David Keil Computer Science I 6/13 David Keil Computer Science I Using Java 4. Standard types 6/13 1

    E-Print Network [OSTI]

    Keil, David M.

    4. Standard Java data types David Keil Computer Science I 6/13 David Keil Computer Science I Using Java 4. Standard types 6/13 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 4. Standard Java data types 1. Java classes, objects, and methods 2. Numeric data types 3

  3. Implementing Continuation Marks in JavaScript John Clements

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    to adapt them to the Rhino implementation of JavaScript, a language that supports closuresImplementing Continuation Marks in JavaScript John Clements California Polytechnic State University the simplicity and utility of continuation marks by adapting them for JavaScript as frame-based stack marks using

  4. An Operational Semantics for JavaScript Sergio Maffeis1

    E-Print Network [OSTI]

    Mitchell, John C.

    that we considered include SpiderMonkey [17] (used by Firefox), the Rhino [4] implementation for JavaAn Operational Semantics for JavaScript Sergio Maffeis1 , John C. Mitchell2 , Ankur Taly2 , 1 to JavaScript, as a basis for analyzing security properties of web applications and mashups. The se

  5. Designing Intelligent Agents Tutorial 1: Java Agent Package

    E-Print Network [OSTI]

    Alechina, Natasha

    G54DIA: Designing Intelligent Agents Tutorial 1: Java Agent Package Natasha Alechina School agent package(s) · agent toolkits · uk.ac.nott.cs.g54dia Java agent packages ­library package ­demo package © Brian Logan 2013 G54DIA Tutorial 1: Java Agent Package 2 #12;Implementing your agent · many

  6. JavaTM On Steroids: Sun's High-Performance

    E-Print Network [OSTI]

    Hölzle, Urs

    of research (Sun, Stanford, UCSB) #12;13HotChips IX Garbage Collector · accurate garbage collector · fastJavaTM On Steroids: Sun's High-Performance Java Implementation Urs Hölzle Lars Bak Steffen Grarup Robert Griesemer Srdjan Mitrovic Sun Microsystems 2HotChips IX History · First Java implementations

  7. Another Step Towards a Smart Compilation Manager for Java

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Another Step Towards a Smart Compilation Manager for Java G. Lagorio DISI - Universit`a di Genova Compilers General Terms Languages Keywords Java, separate compilation ABSTRACT In a recent work we have) for a substantial subset of Java which has been shown to be sound and minimal. That is, an unchanged source

  8. A Java Reinforcement Learning Module for the Recursive Porous

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Reinforcement Learning Module for the Recursive Porous Agent Simulation Toolkit Facilitating Evaluation of free java-libraries for social- scientific agent based simulation, Tobias and Hoffman, 2004 in Repast Genetic Algorithm demo model OpenForecast demo model Java Object Oriented Neural Engine (JOONE

  9. Modularity for Java and How OSGi Can Help

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Modularity for Java and How OSGi Can Help DECOR October 28th , 2004 Richard S. Hall #12;Software environment #12;Focus of my research Popularized by Java because of its simple dynamic code loading mechanisms of modularity mechanism The Java world has many frameworks and systems reinventing this wheel e.g., component

  10. JAVA GIS, Exploratory Spatial Data Analysis and Precision Farming

    E-Print Network [OSTI]

    Cook, Di

    JAVA GIS, Exploratory Spatial Data Analysis and Precision Farming Nicholas Lewin Dept of Statistics XGobi to JAVA, as a new implementation JGobi, as a companion to this package we would like to develop our own map applica­ tion, also in JAVA that would over come platform dependencies, as well

  11. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  12. JAVA CARD Tools for Together Control Center Wojciech Mostowski

    E-Print Network [OSTI]

    Mostowski, Wojciech

    JAVA CARD Tools for Together Control Center Wojciech Mostowski Chalmers University of Technology, G¨oteborg, Sweden Computing Science Department e-mail: woj@cs.chalmers.se Abstract This is a description of the JAVA CARD Tools package for Together Control Center. The package supports the development of JAVA CARD

  13. An efficient Java implementation of the immediate successors calculation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An efficient Java implementation of the immediate successors calculation Cl´ement Gu´erin, Karell an effective Java imple- mentation of the concept immediate successors calculation. It is based on the lattice Java library, developed by K. Bertet and the Limited Objects Access algorithm, proposed by C. Demko [5

  14. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Verification of Cryptographic Protocols Implemented in Java Card ¢¡¤£ Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  15. Using a Java Optimized Processor in a Real World Application

    E-Print Network [OSTI]

    Using a Java Optimized Processor in a Real World Application Martin Schoeberl JOP.design, Strausseng. 2-10/2/55, A-1050 Vienna, Austria martin@jopdesign.com Abstract -- Java, a popular programming language on desktop systems, is rarely used in embedded systems. Some features of Java, like thread support

  16. JMatch: Java plus Pattern Matching Jed Liu Andrew C. Myers

    E-Print Network [OSTI]

    Keinan, Alon

    JMatch: Java plus Pattern Matching Jed Liu Andrew C. Myers Computer Science Department Cornell University Abstract The JMatch language extends Java with iterable abstract pattern matching, pattern matching that is compatible with the data abstraction features of Java and makes iteration ab­ stractions

  17. A Java Processor Architecture for Embedded Real-Time Systems

    E-Print Network [OSTI]

    A Java Processor Architecture for Embedded Real-Time Systems Martin Schoeberl Institute of Computer conservative estimates. JOP (Java Optimized Processor) tackles this problem from the architectural perspective average case performance. This paper presents a Java processor designed for time-predictable execution

  18. Java Separate Type Checking is not Safe (Extended Abstract)

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Java Separate Type Checking is not Safe (Extended Abstract) Davide Ancona, Giovanni Lagorio,lagorio,zuccag@disi.unige.it Abstract. Java supports separate type-checking in the sense that com- pilation can be invoked on a single in the environment. However, the Java speci#12;cation does not de#12;ne precise rules on how this process should

  19. Java: Semantics and Type Soundness Gaurav S. Kc

    E-Print Network [OSTI]

    Yang, Junfeng

    Java: Semantics and Type Soundness Gaurav S. Kc B. Eng., Department of Computing Imperial College of Science, Technology and Medicine e-mail: gsk1@doc.ic.ac.uk Abstract Java is a programming language of programming applications. The main problem with Java is that it has borrowed so many features from so many

  20. A Java Middleware Platform for Resource-Aware Distributed Applications

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Java Middleware Platform for Resource-Aware Distributed Applications Frédéric Guidec, Yves Mahéo.Guidec|Yves.Maheo|Luc.Courtrai}@univ-ubs.fr Abstract This paper reports the development of D-RAJE (Dis- tributed Resource-Aware Java Environment), a Java-based middleware platform that makes it possible to model and to monitor resources

  1. Status Report: Specifying JavaScript with ML David Herman

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    - igator 2.0 web browser. Despite its name, the language has little to do with the Java programmingScript, the popular programming language for browser-based web applications. This "definitional interpreter" serves of the interesting new features of JavaScript 2.0. Section 4 describes the history of approaches to specifying Java

  2. The Java Market: Transforming the Internet into a Metacomputer

    E-Print Network [OSTI]

    Amir, Yair

    The Java Market: Transforming the Internet into a Metacomputer Yair Amir 1 , Baruch Awerbuch running on a producer's machine. The Java Market modifies the submitted application. It transforms of the time. This paper presents the Java Market, a system that allows organizations and Internet users

  3. AirJava: Networking for Smart Spaces Kevin L. Mills

    E-Print Network [OSTI]

    of building AirJava adapters today so researchers can begin experimenting with Smart Spaces. 1. Introduction propose a means of building AirJava adapters so researchers can begin experimenting with Smart SpacesAirJava: Networking for Smart Spaces Kevin L. Mills Information Technology Laboratory National

  4. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics

  5. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOSFlaw

  6. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment ofUsers

  7. Compare C++ Syntax and Features with Java Here is a brief summary that compares C++ syntax and features with Java

    E-Print Network [OSTI]

    Liang, Y. Daniel

    and features with Java C++ Java cout int x; cin >> x dynamically p->getArea(); or (*p).getArea() c.getArea(); delete p; c = null; Automatically removed PassCompare C++ Syntax and Features with Java Here is a brief summary that compares C++ syntax

  8. T-566: Citrix Secure Gateway Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system.

  9. Java programming for high-performance

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    language to solv- ing large computational problems in science and en- gineering. Unless these issuesJava programming for high-performance numerical computing by J. E. Moreira S. P. Midkiff M. Gupta PTM language has taken off as a serious general-purpose programming language. Industry and academia alike have

  10. Java Therapy: Web-Based Robotic Rehabilitation

    E-Print Network [OSTI]

    Reinkensmeyer, David J.

    Java Therapy: Web-Based Robotic Rehabilitation David J. Reinkensmeyer, Clifton T. Pang, Jeff A performance, allowing users and their caregivers to assess rehabilitation progress via the Web. 1 are developing robotic devices, termed "rehabilitators", that physically interact with people to stimulate

  11. Static Vulnerability Detection in Java Service-Oriented Francois Goichon Guillaume Salagnac Pierre Parrend

    E-Print Network [OSTI]

    Salagnac, Guillaume

    -mail: francois.goichon@insa-lyon.fr · P. Parrend Universit de Strasbourg ECAM Strasbourg-Europe Keywords OSGi

  12. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  13. MSc CSYM021 Java Programming GJH: 2008 MSc Computing (Internet Technology)

    E-Print Network [OSTI]

    Hill, Gary

    MSc CSYM021 ­ Java Programming © GJH: 2008 MSc Computing (Internet Technology) CSYM 021 Java Office (Open 10:00 - 15:00)). Aim: Produce a technical report and accompanying application using Java 2D/3D. Brief A: 2D Right (East) Panel: The Java Swing application is to include a Java 2D graphics maze

  14. The state of the Java universe

    ScienceCinema (OSTI)

    None

    2011-10-06

    Speaker Bio: James Gosling received a B.Sc. in computer science from the University of Calgary, Canada in 1977. He received a Ph.D. in computer science from Carnegie-Mellon University in 1983. The title of his thesis was The Algebraic Manipulation of Constraints. He has built satellite data acquisition systems, a multiprocessor version of UNIX®, several compilers, mail systems, and window managers. He has also built a WYSIWYG text editor, a constraint-based drawing editor, and a text editor called Emacs, for UNIX systems. At Sun his early activity was as lead engineer of the NeWS window system. He did the original design of the Java programming language and implemented its original compiler and virtual machine. He has recently been a contributor to the Real-Time Specification for Java.

  15. The state of the Java universe

    SciTech Connect (OSTI)

    None

    2011-02-08

    Speaker Bio: James Gosling received a B.Sc. in computer science from the University of Calgary, Canada in 1977. He received a Ph.D. in computer science from Carnegie-Mellon University in 1983. The title of his thesis was The Algebraic Manipulation of Constraints. He has built satellite data acquisition systems, a multiprocessor version of UNIX®, several compilers, mail systems, and window managers. He has also built a WYSIWYG text editor, a constraint-based drawing editor, and a text editor called Emacs, for UNIX systems. At Sun his early activity was as lead engineer of the NeWS window system. He did the original design of the Java programming language and implemented its original compiler and virtual machine. He has recently been a contributor to the Real-Time Specification for Java.

  16. An OpenMPlike Interface for Parallel Programming in Java M. E. Kambites

    E-Print Network [OSTI]

    Bull, Mark

    in­ clude JavaParty [15], HPJava [3], Titanium [19] and SPAR Java [18]. However, these are designed. The current implementations of Tita­ nium and SPAR are via compilation to C, and not Java. The remainder

  17. Review of Correspondence Analysis and Data Coding with Java and R

    E-Print Network [OSTI]

    Jan de Leeuw

    2011-01-01

    and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

  18. A Lightweight Java Taskspaces Framework for Scientific Computing on Computational Grids

    E-Print Network [OSTI]

    De Sterck, Hans

    A Lightweight Java Taskspaces Framework for Scientific Computing on Computational Grids Appeared orientation and platform independence realized by implementation in Java. Grid administration tasks, Intertask Communication, Scalability, Java 1. INTRODUCTION Distributed computing on heterogeneous

  19. Exploring the Suitability of Existing Tools for Constructing Executable Java Slices

    E-Print Network [OSTI]

    Iyer, Divya

    2012-05-31

    Java is a managed programming language, and Java programs are executed in a virtual machine (VM) environment. Java VMs not only execute the primary application program, but also perform several other auxiliary tasks at runtime. Some...

  20. C:\\idrive\\web\\intro6e\\supplement\\Supplement6(d)JavaXML.doc Last printed Supplement VI.D: Java and XML

    E-Print Network [OSTI]

    Liang, Y. Daniel

    C:\\idrive\\web\\intro6e\\supplement\\Supplement6(d)JavaXML.doc Last printed Supplement VI.D: Java and XML For Introduction to Java Programming By Y. Daniel Liang This supplement introduces how to use Java is required for this supplement. To learn XML, please read Supplement VI.C, "XML." 0 Introduction

  1. Main-Memory Management to Support Orthogonal Persistence for Java

    E-Print Network [OSTI]

    Daynes, L.

    Daynes,L. Atkinson,M.P. Proceedings of the Second International Workshop on Persistence and Java pp 37-60

  2. JWBS001C-142.tex WL041/Bidgoli WL041-Bidgoli.cls September 16, 2005 9:8 Char Count= 0 Hostile Java AppletsHostile Java Applets

    E-Print Network [OSTI]

    Evans, David

    Hostile Java AppletsHostile Java Applets David Evans, University of Virginia Introduction 126 Java 135 INTRODUCTION Java was introduced in 1995 as both a high-level pro- gramming language and an intermediate language, Java Virtual Machine language (JVML, sometimes called Java byte codes), and execution

  3. Application of the Java Message Service in mobile monitoring environments Martin Kuehnhausen , Victor S. Frost

    E-Print Network [OSTI]

    Kansas, University of

    Application of the Java Message Service in mobile monitoring environments Martin Kuehnhausen à on trains. The Java Message Service (JMS) presents a flexible transport layer for asynchronous communication

  4. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  5. Constructing Verifiably Correct Java Programs Using OCL and CleanJava

    E-Print Network [OSTI]

    Cheon, Yoonsik

    for Java and supports Cleanroom- style functional program verification. The combination of OCL and Clean the correctness of code using a Cleanroom-style functional program verification technique. We use OCL language to support Cleanroom-style functional program verification [5] (see Sec- tion II-B for an overview

  6. JAVA Project IMIS 2009-2010 Page 1 sur 3 JAVA Project IMIS

    E-Print Network [OSTI]

    Marfisi-Schottman, Iza

    the flow of luggage and carts in the airport. Big luggage Batterie recharge Airplane 3Airplane 2Airplane 1-in desk. #12;JAVA Project ­ IMIS ­ 2009-2010 Page 2 sur 3 The carts run on a battery that needs to be recharged every few kilometers. When the chart detects that its battery is low, it goes to one

  7. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of cyber security architectures and frameworks, including some for microgrids. Detailed vulnerability assessment of systems, devices, components, and procedures....

  8. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  9. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  10. Search strategies for Java bottleneck location by dynamic instrumentation

    E-Print Network [OSTI]

    Kelly, Paul H. J.

    instrumentation within a Java Virtual Ma- chine. Several options are available; our implementation used our VeneerSearch strategies for Java bottleneck location by dynamic instrumentation Douglas J Brear, Thibaut investigation of this interesting approach. 1 Introduction The idea of dynamically patching instrumentation code

  11. Granting Java Native Interface Developers Their Wishes Martin Hirzel

    E-Print Network [OSTI]

    Grimm, Robert

    , Sun's original FFI for Java, the Native Method In- terface [52, 53] (NMI), directly exposed Java. Furthermore, it constrains garbage collectors and just- in-time compilers, since changes to the data representation may break native code. In fact, NMI required a conserva- tive garbage collector because direct

  12. Garbage Collection for Memory-Constrained Java Virtual Machines

    E-Print Network [OSTI]

    Abdelrahman, Tarek S.

    the mod- ified collector in the Sun Microsystems JDK 1.2.2 using ap- plications from the SPECjvm98 collector for Java Virtual Machines (JVMs) that al- lows applications to run using less memory. The modified of Java programs, compared to existing GC al- gorithms. The majority of garbage collectors fall

  13. True Separate Compilation of Java Classes # DISI Universit

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    True Separate Compilation of Java Classes # D. Ancona DISI ­ Universit â?? a di Genova Via Dodecaneso compilation for a small but significant Java subset, in the sense that a single class declaration can be intra­checked (following the Cardelli's terminology) and compiled providing a minimal set of type requirements on missing

  14. Compositional Compilation for Java-like Languages through Polymorphic Bytecode

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Compositional Compilation for Java-like Languages through Polymorphic Bytecode extended version Dodecaneso, 35 16146 Genova, Italy zucca@disi.unige.it ABSTRACT We define compositional compilation compositional compilation is a highly desirable feature, in Java-like languages it can hardly be achieved

  15. Supplement: Using Packages For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    Supplement: Using Packages For Introduction to Java Programming By Y. Daniel Liang NOTE: If you wish to use packages to organize the classes in the text, read this supplement after Chapter 1:\\book. cd .. -- Changes to the parent directory. See Supplement I.C, "Creating, Compiling and Running Java

  16. Pace Web Server: A Pure Java Web Server

    E-Print Network [OSTI]

    Tao, Lixin

    Pace Web Server: A Pure Java Web Server with a Servlet Container by Priya Srinivasaraghavan University 2003 #12;Abstract Pace Web Server: A Pure Java Web Server with a Servlet Container by Priya their products and services to their customers. An essential ingredient to the Internet has been the web server

  17. Retargeting Android Applications to Java Bytecode Damien Octeau

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    Retargeting Android Applications to Java Bytecode Damien Octeau Department of Computer Science Pennsylvania State University mcdaniel@cse.psu.edu ABSTRACT The Android OS has emerged as the leading platform for Smart- Phone applications. However, because Android applications are compiled from Java source

  18. Experiences in Implementing a Java Collaborative IDE over the Internet

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    1 Experiences in Implementing a Java Collaborative IDE over the Internet CHIEN-MIN WANG, SHUN of issues related to event broadcasting in a Java collaborative computing environment over the Internet. We technologies, communication over the Internet has become commonplace and collaboration via the Internet has

  19. Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation

    E-Print Network [OSTI]

    direct access to the Princeton Wordnet data, so as to help Java developers find the library 1 See Table 6- cess the information in the original Prince- ton Wordnet databases. From this compari- son emerges-coverage, easiest-to-use library available. A Java developer seeking to access the Prince- ton Wordnet is faced

  20. Amos II Java Interfaces Daniel Elin and Tore Risch

    E-Print Network [OSTI]

    Risch, Tore

    1 Amos II Java Interfaces Daniel Elin and Tore Risch Uppsala Database Laboratory Department-02-06 This report describes the external interfaces between Amos II and the programming lan- guage Java. There are also interfaces between Amos II and the programming languages C and Lisp, documented separately

  1. VULCAN: Vulnerability Assessment Framework for Cloud Computing

    E-Print Network [OSTI]

    Kavi, Krishna

    services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform services on Cloud is complex because the security depends on the vulnerability of infrastruc- ture?". Or "I want to host this software application in this cloud environment, what security vulnerabilities I

  2. APPROACHES TO VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Bateman, Ian J.

    APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger CSERGE Working Paper GEC 96-05 #12;APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger Centre for Social and Economic Research and Physical Approaches to Vulnerability to Climate Change in Vietnam' is also gratefully acknowledged. ISSN

  3. SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW

    E-Print Network [OSTI]

    Columbia University

    SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA, METHODS, AND ISSUES AUGUST 2014: A Review of Data, Methods, and Issues i SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA Climate Change Vulnerability Assessments: A Review of Data, Methods, and Issues ii TABLE OF CONTENTS

  4. Java - Darajat Geothermal Area | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8,OpenKentucky: EnergyFacilityIllinois:SouthLLC JumpNewJava

  5. SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA Seismic hazard and vulnerability

    E-Print Network [OSTI]

    SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA I Seismic hazard and vulnerability assessment in Turrialba, Costa Rica Rafael German Urban Lamadrid March 2002 #12;SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA II Seismic hazard and vulnerability assessment in Turrialba

  6. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Connected Grid Network Management System Multiple Vulnerabilities V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code U-255: Apache Wicket Input Validation...

  7. Developing numerical libraries in Java RONALD F. BOISVERT1, JACK J. DONGARRA2, ROLDAN POZO1,

    E-Print Network [OSTI]

    Dongarra, Jack

    A. REMINGTON1 AND G.W. STEWART1;3 1Mathematical and Computational Sciences Division, Information. Finally, we outline the Java Numerical Toolkit1 JNT, which is meant to provide a base of computational;Developing numerical libraries in Java 2 2. NUMERICAL COMPUTING IN JAVA Java is both a computer language

  8. Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    applications, J2SE (Java 2 Standard Edition) for the implementation of Java programs that can be executed.K. {page,tillich}@cs.bris.ac.uk Abstract. The Micro Edition of the Java 2 platform (J2ME) provides than the widely-used Bouncy Castle Lightweight Crypto API for J2ME. 1 Introduction The Java programming

  9. A Parallel Java Grande Benchmark Suite L. A. Smith and J. M. Bull

    E-Print Network [OSTI]

    Bull, Mark

    A Parallel Java Grande Benchmark Suite L. A. Smith and J. M. Bull EPCC, The King's Buildings Republic. email: xobdrzal@fi.muni.cz Abstract Increasing interest is being shown in the use of Java for large scale or Grande applications. This new use of Java places specific demands on the Java execution

  10. CSCI 161: Introduction to Programming I Lab 1b: Hello, World (Eclipse, Java)

    E-Print Network [OSTI]

    Hardy, Christopher R.

    CSCI 161: Introduction to Programming I Lab 1b: Hello, World (Eclipse, Java) Goals - to learn how to compile and execute a Java program Overview This activity will introduce you to the Java programming language. You will type in the Java program shown, compile it, and execute it. You will submit your project

  11. MSc CSYM021 Java Programming GJH: 2009 MSc Computing (Internet Technology)

    E-Print Network [OSTI]

    Hill, Gary

    MSc CSYM021 ­ Java Programming © GJH: 2009 MSc Computing (Internet Technology) CSYM 021 Java Office (Open 10:00 - 15:00)). Aim: Produce a technical report and accompanying application using Java 2D/3D. Brief Produce a technical report and accompanying application using Java 3D. The application

  12. Environmental Monitoring of Lake Michigan Using CoastWatch Data and JAVA GIS

    E-Print Network [OSTI]

    Environmental Monitoring of Lake Michigan Using CoastWatch Data and JAVA GIS George A. Leshkevich Observation Data) Statistics (Great Lakes Average Surface Water Temperature) JAVA GIS (JAVA Applet) CDAT activities. New utilities such as JAVA based interactive retrieval of physical parameters such as surface

  13. Student's Project for Compiler Construction: Compiling a Fragment of SetlX to Java

    E-Print Network [OSTI]

    Stroetmann, Karl

    Student's Project for Compiler Construction: Compiling a Fragment of SetlX to Java -- Task. This compiler takes as input a program written in the source language SetlX and produces as output Java source code, so the target language is Java. In order to execute the resulting Java programs, these programs

  14. C H A P T E R 1 What is Java 3D and

    E-Print Network [OSTI]

    Hill, Gary

    1 C H A P T E R 1 What is Java 3D and is it for me? 1.1 Strengths 2 1.2 Weaknesses 3 1.3 System Java 3D is an application programming interface (API) developed at Sun Microsystems for rendering interactive 3D graphics using the Java programming language. Java 3D is a client-side Java API. Other examples

  15. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  16. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  17. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695...

  18. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  19. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  20. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUraniumDepartment

  1. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric

  2. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting Attacks

  3. T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland 2012SystemSecurity Controls

  4. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting Attacks

  5. U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |

  6. U-273: Multiple vulnerabilities have been reported in Wireshark |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks |

  7. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department of Energy

  8. V-097: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department ofDepartment of7:

  9. V-105: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5: Google Chrome

  10. V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5: Google

  11. V-111: Multiple vulnerabilities have been reported in Puppet | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5:Arbitrary Codeof

  12. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOS BugsPath8:

  13. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOS

  14. V-121: Google Chrome Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple iOSFlaw Lets1:

  15. V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: AppleAttacks6: Mozilla

  16. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy

  17. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C H AReactionDepartment35:

  18. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6:2: Drupal

  19. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment ofUsers|

  20. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  1. A Desktop 3D Printer in Safety-Critical Java

    E-Print Network [OSTI]

    A Desktop 3D Printer in Safety-Critical Java Tórur Biskopstø Strøm Kongens Lyngby 2012 IMM-MSc-2012-critical use cases implemented according to the specification. This thesis presents a RepRap 3D desktop printer

  2. Object Co-location and Memory Reuse for Java Programs

    E-Print Network [OSTI]

    Lau, Francis C.M.

    : Memory allocator, garbage collector, mutator, Java, object co- location, memory reuse ACM Reference of a runtime system becomes increasingly signif- icant [Sun Microsystems 2003]. Our second goal is to find

  3. Spar: a set of extensions to Java for scientific computation

    E-Print Network [OSTI]

    Spar: a set of extensions to Java for scientific computation C. van Reeuwijk, F. Kuijlman, and H Executiontime(s) Number of processors HPF Spar Spar (no checks) Fortran/MPI 9. SPAR AND JVM 10. RELATED WORK #12

  4. HEDGEHOG: Automatic Verification of Design Patterns in Java 

    E-Print Network [OSTI]

    Blewitt, Alex

    Design patterns are widely used by designers and developers for building complex systems in object-oriented programming languages such as Java. However, systems evolve over time, increasing the chance that the pattern ...

  5. Analysing, Profiling and Optimising Orthogonal Persistence for Java

    E-Print Network [OSTI]

    Cutts, Q.I.

    Cutts,Q.I. Hosking,A. Proceedings of the Second International Workshop on Persistence and Java (PJW2), Half Moon Bay, CA, USA (Atkinson, M., Jordan, M. Eds) pp 107-115 Sun Microsystems Inc.

  6. Swizzle barrier optimizations for orthogonal persistence in Java

    E-Print Network [OSTI]

    Brahnmath, K.; Nystrom, N.; Hosking, A.L.; Cutts, Q.I.

    Brahnmath,K. Nystrom,N. Hosking,A.L. Cutts,Q.I. Proceedings of the Third International Workshop on Persistence and Java (Tiburon, California, September 1998), Advances in Persistent Object Systems pp 268-278 Morgan Kaufmann

  7. Termination Analysis of Java Bytecode Elvira Albert1

    E-Print Network [OSTI]

    Arenas, Puri

    program properties is often split into separately proving partial correctness and termination. ObjectTermination Analysis of Java Bytecode Elvira Albert1 , Puri Arenas1 , Michael Codish2 , Samir Abstract. Termination analysis has received considerable attention, traditionally in the context

  8. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  9. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on...

  10. Java Expert GUI framework for CERN beam instrumentation systems

    E-Print Network [OSTI]

    Bart Pedersen, S; Jackson, S

    2011-01-01

    The CERN Beam Instrumentation Group’s software section has recently performed a study of the tools used to produce Java expert GUI applications. This paper will present the analysis that was made to understand the requirements for generic components and the resulting tools including a collection of Java components that have been made available for a wider audience. The paper will also discuss the prospect of using Maven as the deployment tool with its implications for developers and users.

  11. Disabling JAVA Updates If you open Kronos, and are unable to open any timecards you may have a version of Java that

    E-Print Network [OSTI]

    Huang, Jianyu

    Disabling JAVA Updates If you open Kronos, and are unable to open any timecards you may have a version of Java that isn't compatible with Kronos. You (or the Administrator of the pc) will need to turn-off the Automatic Updates feature in Java. Follow the prompts below: 1. Close all Internet Explorer windows (to stop

  12. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  13. Experto Universitario Java Enterprise Validacin e internacionalizacin 2012-2013 Depto. Ciencia de la Computacin e IA Spring

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia #12;Experto Universitario Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia de la Computación e IA

  14. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  15. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java propio de postgrado Experto Universitario en Desarrollo de Aplicaciones Web con Java EE y JavaScript conseguirás una formación en desarrollo de aplicaciones web con Java EE 7 (perfil web) y clientes Java

  16. Progressive Multiple Biosequence Alignments on the ALiCE Grid

    E-Print Network [OSTI]

    Teo, Yong-Meng

    to high-end computational capabilities [10]. The pioneer grid efforts spun off as experimental attemptsProgressive Multiple Biosequence Alignments on the ALiCE Grid Yong-Meng TEO1,2 , Yew-Kwong NG1 problem that has semi-regular computational pattern. Grid-enabled PMSA is implemented using our Java

  17. UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of

    E-Print Network [OSTI]

    Sorin, Eric J.

    UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of Hawaiian jacks captured tournaments can provide synoptic data on diet and gear vulnerability that would otherwise be very dif

  18. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  19. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  20. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of...

  1. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  2. 6.092 Introduction to Software Engineering in Java, January (IAP) 2009

    E-Print Network [OSTI]

    Jones, Evan

    This course is an introduction to Java programming and software engineering. It is designed for those who have little or no programming experience in Java and covers concepts useful to 6.005. The focus is on developing ...

  3. Enhancing the Expressiveness of the CleanJava Language Melisa Vela and Yoonsik Cheon

    E-Print Network [OSTI]

    Cheon, Yoonsik

    for Java to support Cleanroom-style functional program verification that views a program as a mathematical function, CleanJava. I. INTRODUCTION In Cleanroom-style functional program verification, a pro- gram

  4. A distributed and hierarchical naming scheme for Java RMI with support for persistence and caching 

    E-Print Network [OSTI]

    Agni, Rohan Madhuker

    1998-01-01

    Java Remote Method Invocation (Java RMI) is a icrographics. distributed object technology that is going to play a pivotal role in the distributed object world of tomorrow. With the introduction of the Remote Object Activation API in the beta version...

  5. Java for Scientific Computation: Prospects and Henk J. Sips and Kees van Reeuwijk

    E-Print Network [OSTI]

    core language. Two such solutions are proposed in the Spar/Java project [14] and the Titanium project [16]. For example, a two-dimensional array in Spar/Java is declared and used as follows: int a

  6. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  7. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  8. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  9. Java in the High Performance Computing Arena: Research, Practice and Experience

    E-Print Network [OSTI]

    Fraguela, Basilio B.

    Java in the High Performance Computing Arena: Research, Practice and Experience Guillermo L interest in Java for High Performance Computing (HPC) is based on the appealing features of this language in HPC. Keywords: Java, High Performance Computing, Performance Evaluation, Multi-core Architectures

  10. Introduction Copyright 1994, 1995 Sun Microsystems The JavaTM Language: An Overview 1 of 8

    E-Print Network [OSTI]

    Introduction Copyright © 1994, 1995 Sun Microsystems The JavaTM Language: An Overview 1 of 8, The HotJavaTM Browser: An Overview, describes a powerful application that demonstrates the power: An Overview Copyright © 1994, 1995 Sun Microsystems unsuitable, we designed Java as closely to C++ as possible

  11. The Use of Java in High Performance Computing: A Data Mining Example

    E-Print Network [OSTI]

    Walker, David W.

    The Use of Java in High Performance Computing: A Data Mining Example David Walker and Omer Rana in high performance computing is discussed with particular reference to the efforts of the Java Grande Java, Parallel Computing, Neu­ ral Networks, Distributed Objects 1 Introduction High performance

  12. Inside the Java Intelligent Tutoring System Prototype: Parsing Student Code Submissions with Intent Recognition

    E-Print Network [OSTI]

    Franek, Frantisek

    Inside the Java Intelligent Tutoring System Prototype: Parsing Student Code Submissions with Intent., Hamilton, Ont., Canada, L8S 4L8 +1 (905) 525-9140 Ext. 23233 franek@mcmaster.ca ABSTRACT The "Java for students in their first programming course in JavaTM at the College and University level. This paper

  13. A Java Library Implementation of the Gold-Food Economic Model in Repast and MASON

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    1 A Java Library Implementation of the Gold-Food Economic Model in Repast and MASON Christopher K, 2008 Abstract We present a robust, extensible Java library for agent-based economic simulations et al. [8]. We implement the library on top of both the Repast and MASON agent-based Java toolkits

  14. The Java Machine Learning Library Thomas Abeel, Yvan Saeys and Yves Van de Peer

    E-Print Network [OSTI]

    Gent, Universiteit

    The Java Machine Learning Library Thomas Abeel, Yvan Saeys and Yves Van de Peer Department of Plant.abeel@psb.ugent.be What is Java-ML? Motivation Code & Documentation Applications 1. Machine learning techniques: · 18: java doc and explanation of the algorithm · Generated API: from the source code · Changelog

  15. Sunda-Java trench kinematics, slab window formation and overriding plate deformation since the Cretaceous

    E-Print Network [OSTI]

    Müller, Dietmar

    Sunda-Java trench kinematics, slab window formation and overriding plate deformation since along the 3200 km long Sunda-Java trench, one of the largest subduction systems on Earth. Combining window underlying the Java­South Sumatra region, and we propose that decreased mantle wedge viscosities

  16. A generator of efficient strongly typed abstract syntax trees in Java

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A generator of efficient strongly typed abstract syntax trees in Java Mark van den Brand1 to extract, transform, store and pro- duce information that is key to their functionality. We present a Java a strongly typed data-structure with maximal sub-term sharing in Java. Practical experience shows

  17. Attacks on Java Card 3.0 Combining Fault and Logical Attacks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attacks on Java Card 3.0 Combining Fault and Logical Attacks Guillaume Barbu1,2 , Hugues Thiebeauld://www.telecom-paristech.fr/ guillaume.barbu@telecom-paristech.fr Abstract. Java Cards have been threatened so far by attacks using ill it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification

  18. Vol. 4, No. 10, 2005 Reflection-based implementation of Java

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Vol. 4, No. 10, 2005 Reflection-based implementation of Java extensions: the double-dispatch use of Java without modifying the language nor the virtual machine. In this paper, we present the advan- tages these principles have been applied to develop an efficient and general double-dispatch solution for Java, and we

  19. Jam -Designing a Java Extension with Mixins DAVIDE ANCONA, GIOVANNI LAGORIO and ELENA ZUCCA

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Jam - Designing a Java Extension with Mixins DAVIDE ANCONA, GIOVANNI LAGORIO and ELENA ZUCCA University of Genova In this paper we present Jam, an extension of the Java language supporting mixins, that is, parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration

  20. A Prototype for an Intelligent Tutoring System for Students Learning to Program in Java TM

    E-Print Network [OSTI]

    Franek, Frantisek

    A Prototype for an Intelligent Tutoring System for Students Learning to Program in Java TM Edward R, L8S 4L8 +1 (905) 525­9140 Ext. 23233 franek@mcmaster.ca Abstract The ``Java TM Intelligent Tutoring in their first programming course in Java TM at the College and University level. This paper presents an overview

  1. JAMUS: Java Accommodation of Mobile Untrusted Software Nicolas Le Sommer and Frdric Guidec

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    JAMUS: Java Accommodation of Mobile Untrusted Software Nicolas Le Sommer and Frédéric Guidec (Java Accommodation of Mobile Un- trusted Software) platform we tackle these problems based on a contractual approach of resource manage- ment and access control. JAMUS can accommodate mo- bile Java

  2. (c) 2001, Laszlo Gulyas, Harvard University Installing a development environment for Java

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    (c) 2001, Laszlo Gulyas, Harvard University 1/19 Installing a development environment for Java This document will guide you through the process of installing a comfortable development environment for Java hard disk space (additional 120Mb for Java documentation)2 ·CD-ROM drive or good internet connection

  3. Using the ACM Java Libraries in CS 1 Andrew Mertz, William Slough, and Nancy Van Cleave

    E-Print Network [OSTI]

    Van Cleave, Nancy K.

    Using the ACM Java Libraries in CS 1 Andrew Mertz, William Slough, and Nancy Van Cleave aemertz University Charleston, IL 61920 Abstract The Java language is commonly used in CS 1 courses, though its of these challenges, the ACM established the Java Task Force to study the problem. The work of this committee resulted

  4. Java Access to Numerical Libraries Henri Casanova \\Lambda Jack Dongarra \\Lambda y David M. Doolin \\Lambda

    E-Print Network [OSTI]

    Dongarra, Jack

    Java Access to Numerical Libraries Henri Casanova \\Lambda Jack Dongarra \\Lambda y David M. Doolin \\Lambda May 31, 1997 Abstract It is a common and somewhat erroneous belief that Java will always be ``too the question of scientific computing via Java: NetSolve and f2j. The approaches taken by these two projects

  5. A Java-based system support for distributed applications on the Internet

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Java-based system support for distributed applications on the Internet D. Hagimont1 , D. It provides the same abstraction and interface as the RMI service of Java, but it extends the functionality on top of Java. It has been evaluated by comparison with RMI using a benchmark and validated by porting

  6. Java Objects Communication on a High Performance Network Luc Courtrai, Yves Maheo, Frederic Raimbault

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Objects Communication on a High Performance Network Luc Courtrai, Yves Mah´eo, Fr. Recent works show the interest in Java for cluster programming. One of the main issues is to handle an alternative to the standard serialization process through the proposal of a Java object communication library

  7. IBM COBOL for AIX Integrating IBM COBOL for AIX with Java

    E-Print Network [OSTI]

    IBM COBOL for AIX Integrating IBM COBOL for AIX with Java By: Gaby Baghdadi Level: Introductory April 2010 #12;Integrating IBM COBOL for AIX with Java, Page 2 of 32 Copyright © 2010, IBM® Corporation........................................................................ 8 COBOL class used with a Java client

  8. A Freeware Java Tool for Spatial Point Analysis of Neuronal Barry G. Condron

    E-Print Network [OSTI]

    Condron, Barry

    NEWS ITEM A Freeware Java Tool for Spatial Point Analysis of Neuronal Structures Barry G. Condron, a freeware tool, called PAJ, has been developed. This Java-based tool takes 3D Cartesian coordinates as input in Java that is based on previously described statistical analysis (Diggle 2003). In PAJ, data is copied

  9. JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications

    E-Print Network [OSTI]

    Livshits, Ben

    widely used to enable Web 2.0, the performance of JavaScript is now a concern of ven- dors of every majorJSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications Paruj {livshits,zorn}@microsoft.com Abstract JavaScript is widely used in web-based applications

  10. An Infrastructure for Hardware-Software Co-design of Embedded Real-Time Java Applications

    E-Print Network [OSTI]

    Wagner, Flávio Rech

    An Infrastructure for Hardware-Software Co-design of Embedded Real-Time Java Applications Elias of Kansas, USA dandrews@ittc.ku.edu Abstract The partitioning of applications into hardware and software in hardware in the context of the Real Time Specification for Java (RTSJ) standard. There is a Java class

  11. An Automated System for Converting App Inventor Apps to Java Interface For Creating and Managing Projects

    E-Print Network [OSTI]

    Gray, Jeffrey G.

    An Automated System for Converting App Inventor Apps to Java Interface For Creating and Managing of Computer Science Graphical Environment For Creating Layouts MIT App Inventor An Automated System for Converting App Inventor Apps to JavaAn Automated System for Converting App Inventor Apps to JavaAn Automated

  12. r-Java 2.0: the nuclear physics

    E-Print Network [OSTI]

    M. Kostka; N. Koning; Z. Shand; R. Ouyed; P. Jaikumar

    2014-02-16

    [Aims:] We present r-Java 2.0, a nucleosynthesis code for open use that performs r-process calculations as well as a suite of other analysis tools. [Methods:] Equipped with a straightforward graphical user interface, r-Java 2.0 is capable of; simulating nuclear statistical equilibrium (NSE), calculating r-process abundances for a wide range of input parameters and astrophysical environments, computing the mass fragmentation from neutron-induced fission as well as the study of individual nucleosynthesis processes. [Results:] In this paper we discuss enhancements made to this version of r-Java, paramount of which is the ability to solve the full reaction network. The sophisticated fission methodology incorporated into r-Java 2.0 which includes three fission channels (beta-delayed, neutron-induced and spontaneous fission) as well as computation of the mass fragmentation is compared to the upper limit on mass fission approximation. The effects of including beta-delayed neutron emission on r-process yield is studied. The role of coulomb interactions in NSE abundances is shown to be significant, supporting previous findings. A comparative analysis was undertaken during the development of r-Java 2.0 whereby we reproduced the results found in literature from three other r-process codes. This code is capable of simulating the physical environment of; the high-entropy wind around a proto-neutron star, the ejecta from a neutron star merger or the relativistic ejecta from a quark nova. As well the users of r-Java 2.0 are given the freedom to define a custom environment. This software provides an even platform for comparison of different proposed r-process sites and is available for download from the website of the Quark-Nova Project: http://quarknova.ucalgary.ca/

  13. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  14. Java Plug-in Configuration for Version 7, Update 51 or Later Java Plug-in Version7, Update 51 for PC and Macrequires additional configuration before it will allow InfoView to

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Java Plug-in Configuration for Version 7, Update 51 or Later Java Plug-in Version7, Update 51. Open the Java Control Panel. · PC: o Click on Start Menu o Click on "Control Panel" o Click on the "Java" icon · Mac: o Click on Apple icon on upper left screen o Go to System Preferences o Click

  15. Java interface programming: Everything off the best website I've ever found: http://www-lia.deis.unibo.it/Misc/SW/Java/tutorial/html/native1.1/implementing/index.html

    E-Print Network [OSTI]

    Nourbakhsh, Illah

    Java interface programming: Everything off the best website I've ever found: http://www-lia.deis.unibo.it/Misc/SW/Java/tutorial/html/native1.1/implementing/index.html Table of Contents Java Native Interface Programming The JDK1.1 supports the Java Native Interface (JNI). On one hand, the JNI defines a standard naming and calling convention so

  16. Java Virtual-Machine Support for Portable Worst-Case Execution-Time Analysis I. Bate, G. Bernat

    E-Print Network [OSTI]

    Java Virtual-Machine Support for Portable Worst-Case Execution-Time Analysis I. Bate, G. Bernat@vmars.tuwien.ac.at Abstract The current trend towards the usage of Java in real-time, supported by two specifications (Real-Time Java and Real- Time Core extensions for the Java platform) requires ade- quate schedulability analysis

  17. PERFORMANCE MONITORING OF JAVA COMPONENT-ORIENTED DISTRIBUTED APPLICATIONS

    E-Print Network [OSTI]

    Murphy, John

    relevant projects. OrWell [3] is a monitoring environment for CORBA distributed applications, which uses attached to the existing objects. In addition, it is not clear whether the monitoring environmentPERFORMANCE MONITORING OF JAVA COMPONENT-ORIENTED DISTRIBUTED APPLICATIONS Adrian Mos, John Murphy

  18. Towards a Smart Compilation Manager for Java (Extended Abstract)

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Towards a Smart Compilation Manager for Java (Extended Abstract) Giovanni Lagorio DISI - Universit differently from the program obtained recompiling all the sources from scratch? We say that a compilation the sources for which the recompilation would be unde- fined: indeed, when the entire compilation fails, so

  19. Recent Advances in Java Technology Theory, Application, Implementation

    E-Print Network [OSTI]

    Power, James

    Recent Advances in Java Technology Theory, Application, Implementation James F. Power John T: Theory, Application, Implementation James F. Power and John T. Waldron (Eds.) First Edition, 2002 trademarks of Sun Microsystems, Inc. in the U.S. and other countries. This work is independent of Sun

  20. Static Information Flow Analysis for Java Department of Computer Science

    E-Print Network [OSTI]

    Bystroff, Chris

    Static Information Flow Analysis for Java Yin Liu Department of Computer Science Rensselaer their usage in software practice. This paper proposes run-time information flow models, and new static in software practice. We propose a new static information flow analysis towards this goal. This analysis

  1. Coalgebras and Monads in the Semantics of Java

    E-Print Network [OSTI]

    Poll, Erik

    of sequential Java from a combined coal- gebraic/monadic perspective. It turns out that these separate Jacobs and Erik Poll). Preprint submitted to Elsevier Science 5th February 2002 #12;type, describing with parameters. It has become standard in semantics to describe the result type on the right hand side

  2. HEP data analysis using jHepWork and Java

    E-Print Network [OSTI]

    S. Chekanov

    2009-02-09

    A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

  3. A Java-based Science Portal for Neutron Scattering Experiments

    E-Print Network [OSTI]

    Vazhkudai, Sudharshan

    A Java-based Science Portal for Neutron Scattering Experiments Sudharshan S. Vazhkudai James A scattering facility recently commissioned by the US Department of Energy (DOE). The neutron beam produced (SNS) [14] is a large-scale leading- edge neutron scattering facility that hopes to fundamen- tally

  4. CSC 2014 Java Bootcamp Dr. Mary-Angela Papalaskari

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    in range [0,1,2,3] float b = gen.nextFloat(); //float in range [0,1),eg: 0.4589 int c = gen.nextInt(4) + 1 University imported automatically, includes String and Math classes #12;The Math Class · The Math class: · Use Random method nextInt()to generate a random number: Java Bootcamp Dr. Papalaskari Villanova

  5. Functional Java Bytecode Christopher LEAGUE Valery TRIFONOV Zhong SHAO

    E-Print Network [OSTI]

    flow explicit, verification simple, and that is well-suited for translation into lower as one component in a sophisticated type-preserving compiler for Java class files. Though our that the just-in-time compiler, a considerably large and complex piece of software, does not introduce security

  6. ADistributed Computer Algebra System Based on Maple and Java 1

    E-Print Network [OSTI]

    ADistributed Computer Algebra System Based on Maple and Java 1 Wolfgang Schreiner Research Distributed Maple is a system for writing parallel programs in the computer algebra system Maple. It allows scheduler from Maple and implements a parallel programming model on top. The system is portable to most

  7. Building Web Applications with Servlets and JavaServer Pages

    E-Print Network [OSTI]

    Janzen, David

    ://www.rational.com/corpinfo/college_relations/seed/ #12;Web Development Overview · static html ­ text file containing html tags created manually ­ may a web browser ­ Java applets #12;Static HTML web browser web server _____.htmlrequest URL response HTML #12;Dynamic HTML web browser web server _____.html request URL response HTML _____.jsp _____.class

  8. Thinking in Java, 2nd Edition, Release 11

    E-Print Network [OSTI]

    Sherrill, David

    ever written on Java. Ravindra Pai, Oracle Corporation, SUNOS product line This is the best book, software, white papers, interviews, product reviews, Web links, code samples, a forum, and regular articles-too-distant future. Randall R. Hawley, Automation Technician, Eli Lilly & Co. The best computer book writing I have

  9. Cizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially flooded

    E-Print Network [OSTI]

    Cizelj, Leon

    flooded PWR reactor cavity to a steam explosion Leon Cizelj, Bostjan Koncar, Matjaz Leskovar "Jozef StefanCizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially 5885 215; fax + 386 1 5885 377; e-mail: Leon.Cizelj@ijs.si Keywords Steam explosion, reactor cavity

  10. r-Java 2.0: the astrophysics

    E-Print Network [OSTI]

    M. Kostka; N. Koning; Z. Shand; R. Ouyed; P. Jaikumar

    2014-02-16

    [Context:] This article is the second in a two part series introducing r-Java 2.0, a nucleosynthesis code for open use that performs r-process calculations and provides a suite of other analysis tools. [Aims:] The first paper discussed the nuclear physics inherent to r-Java 2.0 and in this article the astrophysics incorporated into the software will be detailed. [Methods:] R-Java 2.0 allows the user to specify the density and temperature evolution for an r-process simulation. Defining how the physical parameters (temperature and density) evolve can effectively simulate the astrophysical conditions for the r-process. Within r-Java 2.0 the user has the option to select astrophysical environments which have unique sets of input parameters available for the user to adjust. In this work we study three proposed r-process sites; neutrino-driven winds around a proto-neutron star, ejecta from a neutron star merger and ejecta from a quark nova. The underlying physics that define the temperature and density evolution for each site is described in this work. [Results:] In this paper a survey of the available parameters for each astrophysical site is undertaken and the effect on final r-process abundance is compared. The resulting abundances for each site are also compared to solar observations both independently and in concert. R-Java 2.0 is available for download from the website of the Quark-Nova Project: http://quarknova.ucalgary.ca/

  11. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  12. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  13. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  14. U-117: Potential security vulnerability has been identified with certain HP

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple Vulnerabilities

  15. EOUG2000: Web publishing using PL/SQL and JAVA

    E-Print Network [OSTI]

    Grancher, Eric

    2000-01-01

    At CERN, as increasingly elsewhere, server based applications using the PL/SQL cartridge and Java are preferred as they make minimum demands on the client and ease maintenance. The PL/SQL cartridge, the original method offered by Oracle, has proved reliable and effective. We have used it to build web applications for more than four years. Newer applications are using Servlets together with the application server. This paper presents the different techniques that we designed and the pitfalls that we encountered in diverse projects such as a technology transfer database, a product management tool and a system to keep track of physics events. Important considerations are security, ease of maintenance, transaction handling and modularity. Most of the experience has been gained using the PL/SQL cartridge and this will be contrasted and compared with the newer Java techniques…

  16. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  17. Von MiniJava zur MiniJVM

    E-Print Network [OSTI]

    Seidl, Helmut

    Maschinen­Instruktionen können MiniJava­Programme beliebig komplex sein :­( Idee: #15; Gib formale Regeln an #12; Architektur der JVM: Code 1 2 3 0 54 SP 54 Store PC 17 0 1 2 3 17 12 #12; Code = enthält JVM entsprechenden Operationen auf Store aus. Konvention: 14 #12; 54 3 2 1 0 54 1 2 3 0 Store Store = Stack SP 54 15

  18. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  19. Introduction JAVA Georges Linares IUP GMI Universit d'Avignon et des Pays de Vaucluse

    E-Print Network [OSTI]

    Linarès, Georges

    Introduction à JAVA Georges Linares ­ IUP GMI ­ Université d'Avignon et des Pays de Vaucluse Modélisation Objet #12;Introduction à JAVA Historique ­ Les langages objets Simula 67 (trop tôt) Smalltalk utilisé ... et JAVA Georges Linares ­ IUP GMI ­ Université d'Avignon et des Pays de Vaucluse #12

  20. Java and JVM in a Nutshell Robert Stark, Joachim Schmid, Egon Borger

    E-Print Network [OSTI]

    Börger, Egon

    in a Nutshell execJavaT = execJavaStmT context(pos) = if pos = firstPos restbody/pos Bstm Exp then restbody/pos else restbody/up(pos) yieldUp(result) = restbody := restbody[result/up(pos)] pos := up(pos) yield(result) = restbody := restbody[result/pos] execJavaExpI = case context(pos) of lit yield(JLS(lit)) loc yield

  1. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  2. CJC: An Extensible Checker for the CleanJava Annotation Language

    E-Print Network [OSTI]

    Cheon, Yoonsik

    language for the Java programming language to support a Cleanroom-style functional program verification from the Cleanroom Software Engineering [1] that emphasizes defect prevention rather than defect

  3. Java on the MScIT Course at the University of Glasgow

    E-Print Network [OSTI]

    Poet, R.R.; Belhadj-Mostefa, K.; Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University) [More Details

    Poet,R.R. Belhadj-Mostefa,K. Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University)

  4. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  5. FAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    models for the related processes. A few vulnerability discovery models (VDMs) have been proposed recently that attempt to model the vulnerability discovery process during the lifecycle of a given software productFAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution HyunChul Joh, Jinyoo Kim

  6. Modeling Learningless Vulnerability Discovery using a Folded Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    model is logistic, and thus the increase and decrease in the discovery process is assumedModeling Learningless Vulnerability Discovery using a Folded Distribution Awad A. Younis1 , Hyun, CO 80523, USA Abstract ­ A vulnerability discovery model describes the vulnerability discovery rate

  7. On automated prepared statement generation to remove SQL injection vulnerabilities

    E-Print Network [OSTI]

    Xie, Tao

    On automated prepared statement generation to remove SQL injection vulnerabilities Stephen Thomas in revised form 5 August 2008 Accepted 8 August 2008 Available online 27 September 2008 Keywords: SQL vulnerabilities were SQL injection vulnerabilities (SQLIVs). This paper presents an algorithm of prepared

  8. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java University of Alicante Experto Java Expert Web application with JavaEE and JavaScript development NEWS CONTENTS FACULTY CALENDAR REGISTRATION applications with Java EE and JavaScript. If you are interested in staying informed about this title you can

  9. Introduction to Java Programming for Networking (Lab 2b) Dr. Nazli MollahReferences: "An Intro to Network Programming with Java", Jan Graba; "Network Programming & Distr. Computing", Reilly & Reilly

    E-Print Network [OSTI]

    Hardy, Christopher R.

    1 Introduction to Java Programming for Networking (Lab 2b) Dr. Nazli MollahReferences: "An Intro to Network Programming with Java", Jan Graba; "Network Programming & Distr. Computing", Reilly & Reilly Lab 2b Objectives: Familiarizing yourself with the: java.net package · which contains the Inet

  10. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  11. A Desktop 3D Printer in Safety-Critical Java Trur Biskopst Strm

    E-Print Network [OSTI]

    Schoeberl, Martin

    A Desktop 3D Printer in Safety-Critical Java Tórur Biskopstø Strøm Department of Informatics according to the specification. In this paper we present a 3D printer and its safety-critical Java level 1 evaluate the specification by implementing a RepRap 3D desktop printer as a use case. A RepRap is a desktop

  12. An on-the-y Reference Counting Garbage Collector for Java Yossi Levanoni Erez Petrank y

    E-Print Network [OSTI]

    Petrank, Erez

    An on-the- y Reference Counting Garbage Collector for Java Yossi Levanoni #3; Erez Petrank y compete with any tracing algorithm. We have implemented our algorithm on SUN's Java Virtual Machine 1 for realistic benchmarks. Thus, a clever design of eÆcient memory management and garbage collector

  13. A Language Identification Application Built on the Java Client/Server Platform

    E-Print Network [OSTI]

    Daume III, Hal

    a system to dynamically add language labels for whole documents and text fragments. We have experi­ mented with several client/server configu­ rations, and present the results of tradeoffs made between labelling to the base Java package 1 making the package usable for multilingual 1 A few pointers to online Java

  14. C Compiler Targeting the Java Virtual Machine Senior Honors Thesis (Advisor: Javed A. Aslam)

    E-Print Network [OSTI]

    C Compiler Targeting the Java Virtual Machine Jack Pien Senior Honors Thesis (Advisor: Javed A to compile once and execute across many different platforms. With the emergence of the Internet by Sun Microsystems to address this "Write Once, Run Anywhere" problem. What sets a compiled Java program

  15. True Separate Compilation of Java Classes Davide Ancona, Giovanni Lagorio, and Elena Zucca ?

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    True Separate Compilation of Java Classes Davide Ancona, Giovanni Lagorio, and Elena Zucca ? DISI,lagorio,zuccag@disi.unige.it Abstract. We de#12;ne a type system modeling true separate compilation for a small but signi#12;cant Java's terminology) and compiled providing a minimal set of type requirements on missing classes. These requirements

  16. Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1

    E-Print Network [OSTI]

    Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1 Rob Wilson,2 reconstruct the boreal autumn (October­November) Palmer Drought Severity Index (PDSI) for Java, Indonesia between the climate of Indonesia and the large scale tropical Indo-Pacific climate system. Citation: D

  17. Improved Static Resolution of Dynamic Class Loading in Java Jason Sawin Atanas Rountev

    E-Print Network [OSTI]

    Sawin, Jason

    Improved Static Resolution of Dynamic Class Loading in Java Jason Sawin Atanas Rountev Ohio State. Unfor- tunately, the vast majority of static analyses for Java handle this feature either unsoundly or overly conser- vatively. We present a set of techniques for static reso- lution of dynamic

  18. GUI Migration across Heterogeneous Java Profiles Candy Wong, Hao-hua Chu, Masaji Katagiri

    E-Print Network [OSTI]

    Chu, Hao-hua

    GUI Migration across Heterogeneous Java Profiles Candy Wong, Hao-hua Chu, Masaji Katagiri Do-platform graphical user interface (GUI) development tools do not support migrate-able GUIs as they do not consider that can be migrated across heterogeneous Java profiles. In this paper, we will focus on two major problems

  19. Preliminary Assessment of the Java Intelligent Tutoring System Edward R. Sykes

    E-Print Network [OSTI]

    Franek, Frantisek

    Computing and Engineering Sciences, Sheridan College, 1430 Trafalgar Road, Oakville, Ont., Canada, L6H 2L1 of Computing and Software, Faculty of Science, McMaster University, 1280 Main Street W., Hamilton, Ont., Canada the growing trend of the Java programming language and to promote web-based personalized education, the Java

  20. Termination Graphs for Java Bytecode M. Brockschmidt, C. Otto, C. von Essen, and J. Giesl

    E-Print Network [OSTI]

    Ábrahám, Erika

    Termination Graphs for Java Bytecode M. Brockschmidt, C. Otto, C. von Essen, and J. Giesl LuFG Informatik 2, RWTH Aachen University, Germany Abstract. To prove termination of Java Bytecode (JBC) automatically, we transform JBC to finite termination graphs which represent all pos- sible runs of the program

  1. Kronos: A Java-Based Software System for the Processing and Retrieval of Large Scale

    E-Print Network [OSTI]

    Bader, David A.

    Kronos: A Java-Based Software System for the Processing and Retrieval of Large Scale AVHRR Data and preprocessing, indexing and storage, search and processing engine, and a Java interface. We illustrate the power of Maryland, College Park, MD 20742 March 4, 1999 1UMIACS and Department of Electrical Engineering 2Department

  2. Grain - A Java Analysis Framework for Total Data Readout

    E-Print Network [OSTI]

    P. Rahkila

    2007-11-21

    Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

  3. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 4: Threads

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 4: Threads #12;4.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with JavaOperating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Single and Multithreaded Processes #12

  4. Experto Universitario Java Enterprise Componentes de presentacin 2012-2013 Depto. Ciencia de la Computacin e IA Sesin 1

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Componentes de presentación © 2012-2013 Depto. Ciencia de la Universitario Java Enterprise Componentes de presentación © 2012-2013 Depto. Ciencia de la Computación e IA Sesión 1 Experto Universitario Java Enterprise · Framewoks RIA basados en el servidor · Características

  5. Programao Grfica 3D com OpenGL, Open Inventor e Java 3D ALESSANDRO L. BICHO

    E-Print Network [OSTI]

    Barbosa, Alberto

    Programação Gráfica 3D com OpenGL, Open Inventor e Java 3D ALESSANDRO L. BICHO ½ LUIZ GONZAGA DA estudado a Open Inventor, uma ØÓÓÐ Ø orientada a objetos construída sobre a OpenGL, contemplando funções a Java 3D, que é fortemente inspirada na Open Inventor. Ela é a biblioteca padrão da linguagem Java para

  6. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect (OSTI)

    LaChance, J.; Kolaczkowski, A.; Kahn, J. [and others

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  7. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy & Drilling Technology HomeGrid Cyber Vulnerability

  8. The Java-Sumatra Aerial Mega-Tramway

    E-Print Network [OSTI]

    Alexander Bolonkin; Richard Cathcart

    2007-01-09

    A mega-tramway based on the Indonesian islands of Sumatra and Java is proposed to span Sunda Strait. The Java-Sumatra Aerial Mega-Tramway (JSAMT) will be self-elevating and will regularly and cheaply launch passengers and cargoes via two conveyor belt-like facilities using standard winged shipping containers like those currently used by international trucking and ocean shipping industries that are volplaned across the Sunda Strait. The JSAMT will be a self-sustaining toll facility free of any requirement for international loans or funding guarantees for its construction. Its existence will remove any immediate need for an expensive to dig/maintain Nusantara Tunnel. We offer the formative basic technical specifications for the JSAMT and indicate some of the physical and cultural geographical facts underpinning our macro-engineering proposal; offshoots of a perfected and tested JSAMT may be installed at Palk Strait between India and Sri Lanka, the Gibraltar Strait and the Bering Strait by mid-21st Century.

  9. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu PresidentAccess

  10. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  11. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java Nueva - 1 5 Experto Java Universidad de Alicante El Centro de Formación Continua de la Universidad de Alicante ha aprobado el proyecto de título propio de Experto en Desarrollo de Aplicaciones Web con Java EE

  12. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java tutorización. Todos ellos tienen una gran experiencia docente y profesional en el campo de Java Enterprise Aplicaciones para Dispositivos Móviles. Profesor del Experto Java desde 2010. http://www.frangarcia.net Aitor

  13. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  14. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  15. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  16. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  17. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  18. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  19. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  6. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change...

  7. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  8. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java Experto Desarrollo Aplicaciones Web con JavaEE y JavaScript NOTICIAS CONTENIDOS PROFESORADO CALENDARIO MATRÍCULA BECAS NOTICIAS Y EVENTOS 1 8 / 0 6 / 2 0 1 4 Matriculación en el Experto Java Ya está disponible

  9. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  10. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  11. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  12. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  13. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  14. Interactive visualization for geoscience education: Java-based instructional tools for introductory geology 

    E-Print Network [OSTI]

    Nevorotina, Anna

    2001-01-01

    Two web-based interactive visualization tools were developed to support problem-based learning in tertiary introductory geoscience classes. The presented tools were designed using the Java[TM] programming language, following guidelines for good...

  15. A distributed hard real-time Java system for high mobility components 

    E-Print Network [OSTI]

    Rho, Sangig

    2005-02-17

    applications to adapt to changes in user requirements or to external events. We describe how we achieve run-time recon?guration in distributed Java applications by appropriately migrating servers. Guaranteed-rate schedulers at the servers provide...

  16. 6.092 Introduction to Software Engineering in Java, January (IAP) 2008

    E-Print Network [OSTI]

    Akeju, Usman O.

    This course is an introduction to software engineering, using the Java™ programming language; it covers concepts useful to 6.005. The focus is on developing high quality, working software that solves real problems. Students ...

  17. Towards OpenMP for Java J. M. Bull and M. D. Westhead

    E-Print Network [OSTI]

    Bull, Mark

    ] and SPAR Java [14]. However, these are designed prin­ cipally for distributed systems, and unlike our proposal, involve genuine language extensions. The current im­ plementations of Titanium and SPAR are via

  18. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  19. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  20. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience...

  1. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  2. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  3. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  4. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  5. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  6. VULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS

    E-Print Network [OSTI]

    Atkinson, Robert C

    be routed around electricity substation compounds wirelessly. Furthermore, wireless communication with the deployment of Bluetooth (and other similar wireless technologies) in electricity substations for controlVULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS S A Bhattil

  7. Vulnerability assessment of water supply systems for insufficient fire flows 

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15

    Water supply systems’ vulnerability towards physical, chemical, biological, and cyber threats was recognized and was under study long before September 11, 2001. But greater attention toward security measures for water ...

  8. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  9. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  10. Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

    E-Print Network [OSTI]

    Saxena, Prateek

    2012-01-01

    HTML content of the blog. HTML and other web languages lackmecha- nisms in HTML and other web languages to separateHTML pseudocode generated by a vulnerable social networking web

  11. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  12. 11 Das Package java.io 11.1 Streams 11-3(188) Durch Vererbung werden diverse Streams fr konkrete Anwendungen erzeugt und im Package java.io

    E-Print Network [OSTI]

    Arndt, Holger

    Stream wie System.in liefert einen Strom aus Bytes. · Ein InputStreamReader wandelt einen Bytestrom in einen.out.println(datei.length()); 28 System.out.println(new Date(datei.lastModified())); JavaIO/Files/FileBsp2.java 12 String file

  13. Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    1 Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya Computer Science models for the vulnerability discovery process have just been published recently. Such models will allow of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models

  14. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  15. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 1: Introduction

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 1: Introduction #12;1.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 1: Introduction What Operating Systems Do Computer-System

  16. The Java programming language is acheiving greater accep-tance in high-end embedded systems such as cellphones and

    E-Print Network [OSTI]

    Bhattacharyya, Shuvra S.

    been explored recently. TurboJ [4] speeds up execution by compiling bytecode to native code aheadAbstract The Java programming language is acheiving greater accep- tance in high-end embedded and bytecode. Bytecode is object code that is processed by a program, referred to as the Java Virtual Machine

  17. Measuring Sulphur Dioxide (SO2) Emissions in October, 2010 Catastrophic Eruption from Merapi Volcano in Java, Indonesia

    E-Print Network [OSTI]

    Gilbes, Fernando

    Volcano in Java, Indonesia with Ozone Monitoring Instrument (OMI) José A. Morales-Collazo Geology This paper discusses sulfur dioxide (SO2) cloud emissions from Merapi Volcano in Java, Indonesia during, Indonesia. In October 26th , 2010, a catastrophic eruption was reported from Merapi causing nearly 386

  18. Using Entrez Utilities Web Service with Apache Axis2 for Java Creating a Web Service Client Application

    E-Print Network [OSTI]

    Levin, Judith G.

    Using Entrez Utilities Web Service with Apache Axis2 for Java Creating a Web Service Client Entrez Utilities Web Service using Axis2 for Java. Preinstalled Software You should have Apache Axis2.sh shell script file on Linux) in the bin directory of Axis2 installation. You will use it to generate Web

  19. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 19: Real-Time Systems

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 19: Real-Time Systems #12;19.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006Operating System Concepts with Java ­ 7th Edition, Nov 15

  20. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universitat d'Alacant Experto Java Becas Java Universitat d'Alacant Carretera de Sant Vicent del Raspeig s/n 03690 Sant Vicent del Raspeig

  1. Java Programming for High Performance Numerical Computing J. E. Moreira S. P. Midkiff M. Gupta P. V. Artigas M. Snir R. D. Lawrence

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    Java Programming for High Performance Numerical Computing J. E. Moreira S. P. Midkiff M. Gupta P. V for enhancing Web content, Java has taken off as a serious general­ purpose programming language. Industry and academia alike have expressed great interest in using Java as a programming language for scientific

  2. SpoonEMF, une brique logicielle pour l'utilisation de l'IDM dans le cadre de la ringnierie de programmes Java5

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    programmes Java5 Olivier Barais Projet Triskell/IRISA campus de Beaulieu. F - 35 042 Rennes Cedex barais'IDM dans le cadre de la réingénierie d'applications écrites en Java. L'accent dans cette courte réutilisation d'outils comme l'analyseur syntaxique de code Java5 (parser) ou le générateur de code (pretty

  3. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  4. The New Institutional Design of the Procuracy in Brazil: Multiplicity of Veto Players and Institutional Vulnerability

    E-Print Network [OSTI]

    Nóbrega, Flavianne Fernanda Bitencourt

    2007-01-01

    política: entre o autoritarismo e a democracia. Record, 2005o autoritarismo e a democracia. Record, 2005, p. 31 raised

  5. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUranium

  6. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric System Municipalization LooksRed

  7. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting AttacksDepartment of

  8. T-597: WordPress Multiple Security Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of

  9. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of| Department

  10. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35: OracleEnergy|

  11. U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2: Apple QuickTime

  12. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C H

  13. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6: Adobe

  14. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  15. Multiple sclerosis genetics

    E-Print Network [OSTI]

    Cree, BAC

    2014-01-01

    recurrence rates in multiple sclerosis. Proc Natl Acad Sci Ualloantigen Ag 7a in multiple sclerosis. Lancet 2: 814. Yeosusceptibility locus for multiple sclerosis. Ann Neurol 61:

  16. Jens Muller Wilhelm G. Spruth Anwendungs-und Transaktionsisolation unter Java

    E-Print Network [OSTI]

    Spruth, Wilhelm G.

    an overview of the solutions that are presently available or under discus- sion. J. M¨uller (k) · W.G. Spruth¨ubingen, Sand 13, 72076 T¨ubingen, Deutschland E-Mail: mail@jensmueller.com W.G. Spruth Institut f¨ur InformatikJens M¨uller · Wilhelm G. Spruth Anwendungs- und Transaktionsisolation unter Java Zusammenfassung

  17. JITProf: Pinpointing JIT-unfriendly JavaScript Code Michael Pradel

    E-Print Network [OSTI]

    Sen, Koushik

    that cause perfor- mance problems in the Firefox and Chrome browsers, and we apply the approach to popular a modern web browser. Another key reason behind the popularity of JavaScript among programmers is that it is a flexible, dynamically typed language. For example, programmers can add and delete object properties

  18. Optimization Coaching for JavaScript Vincent St-Amour1

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    Optimization Coaching for JavaScript Vincent St-Amour1 and Shu-yu Guo2 1 PLT @ NortheasternScript depends heavily on highly optimizing just-in-time compilers. Such compilers, like all compilers, can silently fall back to generating conservative, low-performance code during optimization. As a result, pro

  19. A Tested Semantics for Getters, Setters, and Eval in JavaScript

    E-Print Network [OSTI]

    Krishnamurthi, Shriram

    present S5, a semantics for the strict mode of the ECMAScript 5.1 (JavaScript) programming language. S5 shrinks the large source language into a manageable core through an implemented trans- formation programming languages, so their study is likely to have broad applicability. Categories and Subject

  20. Application layer thread migration in Java Project report for Advanced Topics in PLT

    E-Print Network [OSTI]

    migration that have been already explored. The primary reason that we want to explore application levelApplication layer thread migration in Java Project report for Advanced Topics in PLT Nikhil Sarda from various sources. One of the primary challenges of computer science today is the development

  1. Run-time Modification of the Class Hierarchy in a Live Java Development Environment

    E-Print Network [OSTI]

    Goldman, Kenneth J.

    1 Run-time Modification of the Class Hierarchy in a Live Java Development Environment Joel R. Louis {jbrandt, kjg}@wustl.edu Abstract Class hierarchy design is central to object-oriented software work on live development environments to allow run-time modification of the class hierarchy. The result

  2. Automatic Feedback-Directed Object Inlining in the Java HotSpotTM Virtual Machine

    E-Print Network [OSTI]

    Mössenböck, Hanspeter

    to be replaced by address arithmetic. We implemented this optimization for Sun Microsystems' Java HotSpotTM VM analysis. The garbage collector ensures that groups of colocated objects are not split: it copies groups This work was supported by Sun Microsystems, Inc. c ACM, 2007. This is the author's version of the work

  3. Semi-Automatic Region-Based Memory Management for Real-Time Java Embedded Systems

    E-Print Network [OSTI]

    Salagnac, Guillaume

    , our system behaves as efficiently as a garbage collector in terms of memory consumption. Our analysis garbage collectors (GC) is further- more hindered by hardware limitations, and embedded sys- tems analysis tool, we provide an environ- ment where all memory operations run in predictable time, 1http://java.sun

  4. Realtime Garbage Collection for a Multithreaded Java Microcontroller S. Fuhrmann, M. Pfeffer, J. Kreuzinger, Th. Ungerer

    E-Print Network [OSTI]

    Ungerer, Theo

    collection. Java lacks explicit memory release methods and therefore a garbage collector is needed to reclaim of garbage collectors in multithreaded hardware with real­time require­ ments. Current approaches investigate­threaded Alpha processor of DEC/Compaq [9] and Sun's MAJC­5200 processor, which feature two 4­threaded

  5. A Runtime System for XML Transformations in Java Aske Simon Christensen, Christian Kirkegaard, and Anders Mller

    E-Print Network [OSTI]

    Møller, Anders

    by the Danish National Research Foundation. #12;description of the XACT runtime system. We present a suitableA Runtime System for XML Transformations in Java Aske Simon Christensen, Christian Kirkegaard system where the operations can be performed efficiently. The system, named XACT, is based on a notion

  6. A Language Identification Application Built on the Java Client/Server Platform

    E-Print Network [OSTI]

    constructed a system to dynamically add language labels for whole documents and text fragments. We have experi labelling accuracy and the size/completeness of the language models. 1 Introduction In the 1.1 release been added to the base Java package 1 making the package usable for multilingual 1A few pointers

  7. A Kickball Game for Ankle Rehabilitation by JAVA, JNI and VRML

    E-Print Network [OSTI]

    Lee, Chan-Su

    A Kickball Game for Ankle Rehabilitation by JAVA, JNI and VRML Hyungjeen Choi , Jeha Ryu environment that can be applied to the ankle rehabilitation procedure. We developed a virtual football stadium of the ankle rehabilitation procedures. Keywords: ankle rehabilitation, virtual environment, VRML, JNI, K

  8. Effects of Static Type Specialization on Java Generic Collections (Technical Report)

    E-Print Network [OSTI]

    Machkasova, Elena

    specialization and suggest criteria for selecting groups of classes for performance improvements. As an example, we compare different ways of specializing subsets of the Java collections library and present-needed software development tool that allow programmers to combine the convenience of generic programming

  9. Modeling study of growth and potential geohazard for LUSI mud volcano: East Java, Indonesia

    E-Print Network [OSTI]

    Manga, Michael

    Modeling study of growth and potential geohazard for LUSI mud volcano: East Java, Indonesia Bambang., Wisma Mulia 22nd Floor, JI. Jend. Gatot Subroto 42, 12710 Jakarta, Indonesia b Bakosurtanal, Jl. Jakarta-Bogor Km. 46, 16911 Cibinong, Indonesia c Applied Geology Research Division, Institute of Technology

  10. Ground deformation associated with the eruption of Lumpur Sidoarjo mud volcano, east Java, Indonesia

    E-Print Network [OSTI]

    Aoki, Yosuke

    , Indonesia Yosuke Aoki , Teguh Purnama Sidiq 1 Earthquake Research Institute, University of Tokyo, 1-1 Yayoi. With this background, the eruption of Lumpur Sidoarjo (LUSI), eastern Java Island, Indonesia, pro- vides us), which yields good coherence even in vegetated regions like Indonesia. While Rudolph et al. (2013) used

  11. Modeling and Implementing Software Architecture with Acme and ArchJava

    E-Print Network [OSTI]

    Garlan, David

    Modeling and Implementing Software Architecture with Acme and ArchJava Marwan Abi-Antoun Jonathan+@cs.cmu.edu schmerl+@cs.cmu.edu nnahas@acm.org ttt@alumni.carnegiemellon.edu ABSTRACT We demonstrate a tool to incrementally synchronize an Acme architectural model described in the Acme Architectural Description Language

  12. Design Space Exploration for Java Processors with Cross-Profiling Martin Schoeberl

    E-Print Network [OSTI]

    Schoeberl, Martin

    systems (e.g., in the automotive and airborne domain), almost all mobile phones already contain a JVM-profiling is a technique that executes a program on a host platform, but collects profiling information for the target platform. Cross-profiling not only eases the detection of performance bottlenecks in embedded Java software

  13. Automatic Test Factoring for Java David Saff Shay Artzi Jeff H. Perkins Michael D. Ernst

    E-Print Network [OSTI]

    Ernst, Michael

    Automatic Test Factoring for Java David Saff Shay Artzi Jeff H. Perkins Michael D. Ernst MIT {saff,artzi,jhp,mernst}@csail.mit.edu Abstract Test factoring creates fast, focused unit tests from slow system-wide tests; each new unit test exercises only a subset of the functionality exercised

  14. Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators

    E-Print Network [OSTI]

    Robert R. Tucci

    2008-02-17

    This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

  15. License Usage and Changes: A Large-Scale Study of Java Projects on GitHub

    E-Print Network [OSTI]

    Poshyvanyk, Denys

    License Usage and Changes: A Large-Scale Study of Java Projects on GitHub Christopher Vendome1 -- 4 University of Victoria, BC, Canada Abstract--Software licenses determine, from a legal point of view, under which conditions software can be integrated, used, and above all, redistributed. Licenses

  16. SAT-based Termination Analysis for Java Bytecode with AProVE

    E-Print Network [OSTI]

    Ábrahám, Erika

    SAT-based Termination Analysis for Java Bytecode with AProVE Carsten Fuhs LuFG Informatik 2, RWTH solving engines for the search problems in automated termination analysis. Consequently, the performance of current termination tools heavily relies on the speed of modern SAT solvers on the corresponding SAT

  17. Building Interactive Animations using VRML and Java FABIANA SALDANHA TAMIOSSO 1 , ALBERTO BARBOSA RAPOSO 1 ,

    E-Print Network [OSTI]

    de Figueiredo, Luiz Henrique

    are pre­ sented in Section 5. 2 VRML The main goal of the current version of VRML -- 2.0 -- is to provide the definition of a Java program to process and generate events that determine the behavior of scene elements as built­in tools for Web browsers and as autonomous tools. In this paper we present strategies we have

  18. Self-accounting as Principle for Portable CPU Control in Java

    E-Print Network [OSTI]

    Binder, Walter

    Self-accounting as Principle for Portable CPU Control in Java Walter Binder1 and Jarle Hulaas2 1 the threads of an application com- ponent aggregate the information of their respective CPU consumption within 1 Introduction Accounting and controlling the resource consumption of applications and of individual

  19. COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode

    E-Print Network [OSTI]

    Zanardini, Damiano

    COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode E. Albert1 and termination together is interesting, as both analyses share most of the machinery to, respectively, infer cost analysis share most of the system machinery, as they need to consider and infer roughly the same

  20. Detecting Concurrency Errors in Client-side JavaScript Web Applications

    E-Print Network [OSTI]

    issues are becoming more serious for web applications because a new web standard, HTML5, allows webDetecting Concurrency Errors in Client-side JavaScript Web Applications Shin Hong, Yongbae Park.park@kaist.ac.kr, moonzoo@cs.kaist.ac.kr Abstract--As web technologies have evolved, the complexity of dynamic web

  1. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  2. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding

    E-Print Network [OSTI]

    Breaux, Travis D.

    , as applied to criminal court records to identify mitigating requirements that improve privacy protectionsIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding Travis D,jdlewis,pnotto,anton}@ncsu.edu ABSTRACT Information systems governed by laws and regulations are subject to civil and criminal violations

  3. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings

    E-Print Network [OSTI]

    Young, R. Michael

    and goal models, as applied to criminal court records to identify mitigating requirements. In a sustainableIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings Travis D,jdlewis,pnotto,anton}@ncsu.edu Abstract Information systems governed by laws and regulations are subject to both civil and criminal

  4. Flood Vulnerability and Flood Protection North and Baltic Seas

    E-Print Network [OSTI]

    Vries, Hans de

    G G G G Flood Vulnerability and Flood Protection North and Baltic Seas Meteorological Forcings for the Dutch Continental Shelf Model Hans de Vries KNMI, Weather Service Research and Development G G G G control forecast 50 perturbed forecasts 240 hours 2 per day Not enough spread for tf

  5. Predicting Cancer-Specific Vulnerability via Data-Driven

    E-Print Network [OSTI]

    Ruppin, Eytan

    Resource Predicting Cancer-Specific Vulnerability via Data-Driven Detection of Synthetic LethalityCancer Research UK, The Beatson Institute for Cancer Research, Switchback Road, Glasgow G61 1BD, Scotland the inhibition of each single gene is not. It can be harnessed to selectively treat cancer by identifying

  6. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  7. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  8. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  9. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  10. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot­ tleneck in mobile devices (the battery power

  11. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot- tleneck in mobile devices (the battery power

  12. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the...

  13. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    E-Print Network [OSTI]

    Ryder, Barbara G.

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud large-scale cloud applications. Index Terms--cloud security, outsourced computation, side- channel, newly discovered vulnerabilities in cloud virtualization envi- ronment have threatened the security

  14. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  15. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  16. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  17. Seismic facies and growth history of Miocene carbonate platforms, Wonocolo Formation, North Madura area, East Java Basin, Indonesia 

    E-Print Network [OSTI]

    Adhyaksawan, Rahadian

    2002-01-01

    The Miocene Wonocolo Formation in the North Madura area, East Java Basin, contains numerous isolated carbonate platforms that are broadly distributed across a ~3000 sq km area of the Indonesian back-arc region. The Wonocolo platforms provide...

  18. Designing and developing portable large-scale JavaScript web applications within the Experiment Dashboard framework

    E-Print Network [OSTI]

    Andreeva, J; Karavakis, E; Kokoszkiewicz, L; Nowotka, M; Saiz, P; Tuckett, D

    2012-01-01

    Improvements in web browser performance and web standards compliance, as well as the availability of comprehensive JavaScript libraries, provides an opportunity to develop functionally rich yet intuitive web applications that allow users to access, render and analyse data in novel ways. However, the development of such large-scale JavaScript web applications presents new challenges, in particular with regard to code sustainability and team-based work. We present an approach that meets the challenges of large-scale JavaScript web application design and development, including client-side model-view-controller architecture, design patterns, and JavaScript libraries. Furthermore, we show how the approach leads naturally to the encapsulation of the data source as a web API, allowing applications to be easily ported to new data sources. The Experiment Dashboard framework is used for the development of applications for monitoring the distributed computing activities of virtual organisations on the Worldwide LHC Comp...

  19. Vulnerability Discovery in Multi-Version Software Systems Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

    E-Print Network [OSTI]

    Ray, Indrakshi

    a model of the discovery process that can predict the number of vulnerabilities that are likely to be discovered in a given time frame. Recent studies have produced vulnerability discovery process models a new approach for quantitatively modeling the vulnerability discovery process, based on shared source

  20. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies vulnerabilities such as failures of the communication and control systems that transmit and implement critical smart grids. In this paper the vulnerabilities in the control and communication system are coupled

  1. GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE DULY genetically modified organisms. Key words: Consumer. Vulnerability. Lacking of resources. GMO Résumé - Le : France (2010)" #12;GMO, consumption and consumer vulnerability in Brazilian Consumer Law: the right

  2. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  3. Structural Vulnerability Analysis of Electric Power Distribution Grids

    E-Print Network [OSTI]

    Koc, Yakup; Warnier, Martijn; Kumar, Tarun

    2015-01-01

    Power grid outages cause huge economical and societal costs. Disruptions in the power distribution grid are responsible for a significant fraction of electric power unavailability to customers. The impact of extreme weather conditions, continuously increasing demand, and the over-ageing of assets in the grid, deteriorates the safety of electric power delivery in the near future. It is this dependence on electric power that necessitates further research in the power distribution grid security assessment. Thus measures to analyze the robustness characteristics and to identify vulnerabilities as they exist in the grid are of utmost importance. This research investigates exactly those concepts- the vulnerability and robustness of power distribution grids from a topological point of view, and proposes a metric to quantify them with respect to assets in a distribution grid. Real-world data is used to demonstrate the applicability of the proposed metric as a tool to assess the criticality of assets in a distribution...

  4. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  5. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  6. Vol 442|6 July 2006 Multiple introductions of H5N1 in Nigeria

    E-Print Network [OSTI]

    Cai, Long

    Vol 442|6 July 2006 37 Multiple introductions of H5N1 in Nigeria Phylogenetic analysis reveals- try farming industry is second only to oil production in Nigeria and is particularly vulnerable the two flight paths that link Nigeria with the south- ern Russian region and Europe, and with western

  7. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security...

  8. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  9. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  10. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  11. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  12. Seismic Vulnerability and Performance Level of confined brick walls

    SciTech Connect (OSTI)

    Ghalehnovi, M.; Rahdar, H. A. [University of Sistan and Baluchestan, Zahedan (Iran, Islamic Republic of)

    2008-07-08

    There has been an increase on the interest of Engineers and designers to use designing methods based on displacement and behavior (designing based on performance) Regarding to the importance of resisting structure design against dynamic loads such as earthquake, and inability to design according to prediction of nonlinear behavior element caused by nonlinear properties of constructional material.Economically speaking, easy carrying out and accessibility of masonry material have caused an enormous increase in masonry structures in villages, towns and cities. On the other hand, there is a necessity to study behavior and Seismic Vulnerability in these kinds of structures since Iran is located on the earthquake belt of Alpide.Different reasons such as environmental, economic, social, cultural and accessible constructional material have caused different kinds of constructional structures.In this study, some tied walls have been modeled with software and with relevant accelerator suitable with geology conditions under dynamic analysis to research on the Seismic Vulnerability and performance level of confined brick walls. Results from this analysis seem to be satisfactory after comparison of them with the values in Code ATC40, FEMA and standard 2800 of Iran.

  13. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 11: File System Implementation

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 11: File System Implementation #12;11.2 Silberschatz, Galvin and Gagne ©2007Operating;11.3 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Objectives

  14. Silberschatz, Galvin and Gagne 2007Operating System Concepts with Java 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures #12;2.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures Operating System

  15. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 13: I/O Systems

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 13: I/O Systems #12;13.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts;13.3 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Objectives

  16. 11 Datenstrme und Dateien 11.1 Streams 11-3(190) Durch Vererbung werden diverse Streams fr konkrete Anwendungen erzeugt und im Package java.io als

    E-Print Network [OSTI]

    Arndt, Holger

    verschachtelt werden. · Ein einfacher InputStream wie System.in liefert einen Strom aus Bytes. · Ein Input.out.println(datei.length()); 28 System.out.println(new Date(datei.lastModified())); Dateien/JavaIO/File/FileBsp2.java 12 String

  17. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Thermoelectric power generation is vulnerable to increasing temperatures and reduced water availability in most regions, particularly in the Midwest, Great Plains, and southern...

  18. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  19. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  20. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  1. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  2. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  3. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  4. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    code analysis to detect software security vulnerabilities—A systematic review of software fault prediction studies.47] Noopur Davis. Secure Software Development Life Cycle

  5. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  6. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  7. U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code5:Oracle Java

  8. The extreme vulnerability of interdependent spatially embedded networks

    E-Print Network [OSTI]

    Bashan, Amir; Buldyrev, Sergey V; Havlin, Shlomo

    2015-01-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, while below this "critical dependency" (CD) a failure of few nodes leads only to small damage to the system. So far, the research has been focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically analyze the stability of systems consisting of interdependent spatially embedded networks modeled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no CD and \\textit{any} small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of t...

  9. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  10. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  11. Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State University

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State Discovery Models (VDMs) have been proposed to model vulnerability discovery and have has been fitted discovery process, presenting a static approach to estimating the initial values of one of the VDM

  12. VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA RICA

    E-Print Network [OSTI]

    VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA and Earth Observation (ITC) Enschede Netherlands Figure 5.4. Damage maps for #12;Vulnerability Analysis And Risk Assessment For Seismic And Flood Hazard In Turialba City, Costa Rica By Muh Aris Marfai and Jacob

  13. Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset-based approach

    E-Print Network [OSTI]

    Krivobokova, Tatyana

    Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset vulnerability to poverty and livelihood choices in small-scale fishing areas. The use of an asset on natural resources for their livelihoods, such as fishing, are often marginalized or ignored in national

  14. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  15. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  16. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Hu, Fei

    of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE on supervisory control and data acquisition (SCADA) systems. Compliance of the require- ment to meet the standard a vulnerability assessment framework to systemat- ically evaluate the vulnerabilities of SCADA systems at three

  17. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  18. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  19. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  20. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    ). · Identify most prominent vulnerabilities of the units to RF direct injection and irradiation, and examine and fabricated and the packaged chips were placed on the boards with matching elements for RF injection. The RF vulnerabilities are examined both by simulation and experimental injection of RF at the MOSFETGate, Drain, Source