Powered by Deep Web Technologies
Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

2

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

3

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

4

Specification and Runtime Verification of Java Card Programs  

Science Conference Proceedings (OSTI)

Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to ... Keywords: Compiler, JCML, JML, Java Card, Runtime Verification

Umberto Souza da Costa; Anamaria Martins Moreira; Martin A. Musicante; Plácido A. Souza Neto

2009-07-01T23:59:59.000Z

5

JCML: A specification language for the runtime verification of Java Card programs  

Science Conference Proceedings (OSTI)

Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to ... Keywords: JCML, JML, Java Card, Runtime verification

Umberto Souza da Costa; Anamaria Martins Moreira; Martin A. Musicante; Plácido A. Souza Neto

2012-04-01T23:59:59.000Z

6

Scalable fault tolerant protocol for parallel runtime environments  

Science Conference Proceedings (OSTI)

The number of processors embedded on high performance computing platforms is growing daily to satisfy users desire for solving larger and more complex problems. Parallel runtime environments have to support and adapt to the underlying libraries and hardware ...

Thara Angskun; Graham E. Fagg; George Bosilca; Jelena Pješivac–Grbovi?; Jack J. Dongarra

2006-09-01T23:59:59.000Z

7

Identifying Reference Objects by Hierarchical Clustering in Java Environment  

E-Print Network (OSTI)

Recently Java programming environment has become so popular. Java programming language is a language that is designed to be portable enough to be executed in wide range of computers ranging from cell phones to supercomputers. Computer programs written in Java are compiled into Java Byte code instructions that are suitable for execution by a Java Virtual Machine implementation. Java virtual Machine is commonly implemented in software by means of an interpreter for the Java Virtual Machine instruction set. As an object oriented language, Java utilizes the concept of objects. Our idea is to identify the candidate objects' references in a Java environment through hierarchical cluster analysis using reference stack and execution stack.

Saha, Rahul

2011-01-01T23:59:59.000Z

8

Reflexes: Abstractions for integrating highly responsive tasks into Java applications  

Science Conference Proceedings (OSTI)

Achieving submillisecond response times in a managed language environment such as Java or C# requires overcoming significant challenges. In this article, we propose Reflexes, a programming model and runtime system infrastructure that lets developers ... Keywords: Java virtual machine, Real-time systems, memory management

Jesper Honig Spring; Filip Pizlo; Jean Privat; Rachid Guerraoui; Jan Vitek

2010-08-01T23:59:59.000Z

9

Pervasive parallelism for managed runtimes  

Science Conference Proceedings (OSTI)

Modern programming languages like C# or Java are executed in a managed runtime and offer support for concurrency at a high level of abstraction. However, high-level parallel abstractions (e.g., thread pools) can merely be provided as a library since ...

Albert Noll; Thomas R. Gross

2011-05-01T23:59:59.000Z

10

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

11

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

12

Gain Time Reclaiming in High Performance Real-Time Java Systems  

E-Print Network (OSTI)

The run-time characteristics of Java, such as high frequency of method invocation, dynamic dispatching and dynamic loading, make Java more difficult than other object-oriented programming languages, such as C++, for conducting Worst-Case Execution Time (WCET) analysis. To offer a more flexible way to develop object-oriented real-time applications in the realtime Java environment without loss of predicability and performance, we propose a novel gain time reclaiming framework integrated with WCET analysis. This paper demonstrates how to improve the utilisation and performance of the whole system by reclaiming gain time at run-time. Our approach shows that integrating WCET with gain time reclaiming can not only provide a more flexible environment, but it also does not necessarily result in unsafe or unpredictable timing behaviour.

Erik Yu-Shing Hu; Andy Wellings; Guillem Bernat

2003-01-01T23:59:59.000Z

13

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

14

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

15

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

16

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of 686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August 8, 2011 - 3:00pm Addthis PROBLEM: A vulnerability in the Java Runtime Environment allows unauthenticated network attacks ( i.e. it may be exploited over a network without the need for a username and password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061 Secunia Advisory: SA45556 CVE-2010-4476 IMPACT ASSESSMENT: Medium Discussion: IBM has acknowledged a vulnerability in IBM Tivoli Integrated Portal, which can be exploited by malicious people to cause a DoS (Denial of Service).

17

MetaVM: A Transparent Distributed Object System Supported by Runtime Compiler  

E-Print Network (OSTI)

MetaVM is a distributed object system for Java virtual machine. It allows programmers to deal with remote objects in the same way they do local objects. Therefore, it can provide a single machine image to programmers. We implemented a runtime compiler of Java bytecode to provide the facilities. The runtime compiler generates a native code which can handle remote objects beyond the network besides the local objects. The compiler uses semantic expansion, which is a technique that changes the original semantics of a Java bytecode. Keywords: distributed object system, network transparency, Java Just-In-Time compiler 1

Kazuyuki Shudo Yoichi; Yoichi Muraoka

2000-01-01T23:59:59.000Z

18

Formalising Java RMI with explicit code mobility  

Science Conference Proceedings (OSTI)

This paper presents an object-oriented, Java-like core language with primitives for distributed programming and explicit code mobility. We apply our formulation to prove the correctness of several optimisations for distributed programs. Our language ... Keywords: Code mobility, Distribution, Java, Optimisation, RMI, Runtime, Types

Alexander Ahern; Nobuko Yoshida

2007-12-01T23:59:59.000Z

19

Go with the flow: profiling copies to find runtime bloat  

Science Conference Proceedings (OSTI)

Many large-scale Java applications suffer from runtime bloat. They execute large volumes of methods, and create many temporary objects, all to execute relatively simple operations. There are large opportunities for performance optimizations in these ... Keywords: copy graph, heap analysis, memory bloat, profiling

Guoqing Xu; Matthew Arnold; Nick Mitchell; Atanas Rountev; Gary Sevitsky

2009-06-01T23:59:59.000Z

20

An evaluation of Java's I/O capabilities for high-performance computing.  

SciTech Connect

Java is quickly becoming the preferred language for writing distributed applications because of its inherent support for programming on distributed platforms. In particular, Java provides compile-time and run-time security, automatic garbage collection, inherent support for multithreading, support for persistent objects and object migration, and portability. Given these significant advantages of Java, there is a growing interest in using Java for high-performance computing applications. To be successful in the high-performance computing domain, however, Java must have the capability to efficiently handle the significant I/O requirements commonly found in high-performance computing applications. While there has been significant research in high-performance I/O using languages such as C, C++, and Fortran, there has been relatively little research into the I/O capabilities of Java. In this paper, we evaluate the I/O capabilities of Java for high-performance computing. We examine several approaches that attempt to provide high-performance I/O--many of which are not obvious at first glance--and investigate their performance in both parallel and multithreaded environments. We also provide suggestions for expanding the I/O capabilities of Java to better support the needs of high-performance computing applications.

Dickens, P. M.; Thakur, R.

2000-11-10T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Java Metadata Facility  

SciTech Connect

The Java Metadata Facility is introduced by Java Specification Request (JSR) 175 [1], and incorporated into the Java language specification [2] in version 1.5 of the language. The specification allows annotations on Java program elements: classes, interfaces, methods, and fields. Annotations give programmers a uniform way to add metadata to program elements that can be used by code checkers, code generators, or other compile-time or runtime components. Annotations are defined by annotation types. These are defined the same way as interfaces, but with the symbol {at} preceding the interface keyword. There are additional restrictions on defining annotation types: (1) They cannot be generic; (2) They cannot extend other annotation types or interfaces; (3) Methods cannot have any parameters; (4) Methods cannot have type parameters; (5) Methods cannot throw exceptions; and (6) The return type of methods of an annotation type must be a primitive, a String, a Class, an annotation type, or an array, where the type of the array is restricted to one of the four allowed types. See [2] for additional restrictions and syntax. The methods of an annotation type define the elements that may be used to parameterize the annotation in code. Annotation types may have default values for any of its elements. For example, an annotation that specifies a defect report could initialize an element defining the defect outcome submitted. Annotations may also have zero elements. This could be used to indicate serializability for a class (as opposed to the current Serializability interface).

Buttler, D J

2008-03-06T23:59:59.000Z

22

The JCilk-1 runtime system  

E-Print Network (OSTI)

JCilk extends the Java language to provide call-return semantics for multithreading, much as Cilk does for C. Java's built-in thread model does not support the passing of exceptions or return values from one thread back ...

Danaher, John (John Stephen)

2005-01-01T23:59:59.000Z

23

How the design of JML accommodates both runtime assertion checking and formal verification  

Science Conference Proceedings (OSTI)

Specifications that are used in detailed design and in the documentation of existing code are primarily written and read by programmers. However, most formal specification languages either make heavy use of symbolic mathematical operators, which discourages ... Keywords: JML language, formal methods, java language, program verification, programming by contract, runtime assertion checking, specification languages

Gary T. Leavens; Yoonsik Cheon; Curtis Clifton; Clyde Ruby; David R. Cok

2005-03-01T23:59:59.000Z

24

Runtime verification: the application perspective  

Science Conference Proceedings (OSTI)

In the past decade, Runtime Verification (RV) has gained much focus, from both the research community and practitioners. Roughly speaking, RV combines a set of theories, techniques and tools aiming towards efficient analysis of systems' executions and ...

Yliès Falcone; Lenore D. Zuck

2012-10-01T23:59:59.000Z

25

Java XMGR  

SciTech Connect

The XMGR5 graphing package [1] for drawing RELAP5 [2] plots is being re-written in Java [3]. Java is a robust programming language that is available at no cost for most computer platforms from Sun Microsystems, Inc. XMGR5 is an extension of an XY plotting tool called ACE/gr extended to plot data from several US Nuclear Regulatory Commission (NRC) applications. It is also the most popular graphing package worldwide for making RELAP5 plots. In Section 1, a short review of XMGR5 is given, followed by a brief overview of Java. In Section 2, shortcomings of both tkXMGR [4] and XMGR5 are discussed and the value of converting to Java is given. Details of the conversion to Java are given in Section 3. The progress to date, some conclusions and future work are given in Section 4. Some screen shots of the Java version are shown.

Dr. George L. Mesina; Steven P. Miller

2004-08-01T23:59:59.000Z

26

Modular Workflow Engine for Distributed Services using Lightweight Java Clients  

E-Print Network (OSTI)

In this article we introduce the concept and the first implementation of a lightweight client-server-framework as middleware for distributed computing. On the client side an installation without administrative rights or privileged ports can turn any computer into a worker node. Only a Java runtime environment and the JAR files comprising the workflow client are needed. To connect all clients to the engine one open server port is sufficient. The engine submits data to the clients and orchestrates their work by workflow descriptions from a central database. Clients request new task descriptions periodically, thus the system is robust against network failures. In the basic set-up, data up- and downloads are handled via HTTP communication with the server. The performance of the modular system could additionally be improved using dedicated file servers or distributed network file systems. We demonstrate the design features of the proposed engine in real-world applications from mechanical engineering. We have used ...

Vetter, R -M; Peetz, J -V

2009-01-01T23:59:59.000Z

27

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

28

Runtime analysis tools for parallel scientific applications  

Science Conference Proceedings (OSTI)

This paper describes the Alpaca runtime tools. These tools leverage the component infrastructure of the Cactus Framework in a novel way to enable runtime steering, monitoring, and interactive control of a simulation. Simulation data can be observed graphically, ... Keywords: frameworks, runtime visualization, software/program verification

Oleg Korobkin; Gabrielle Allen; Steven R. Brandt; Eloisa Bentivegna; Peter Diener; Jinghua Ge; Frank Löffler; Erik Schnetter; Jian Tao

2011-07-01T23:59:59.000Z

29

Unifying design and runtime software adaptation using aspect models  

Science Conference Proceedings (OSTI)

Software systems are seen more and more as evolutive systems. At the design phase, software is constantly in adaptation by the building process itself, and at runtime, it can be adapted in response to changing conditions in the executing environment ... Keywords: Aspect oriented modeling, Software product lines

Carlos Parra; Xavier Blanc; Anthony Cleve; Laurence Duchien

2011-12-01T23:59:59.000Z

30

A provenly correct translation of Fickle into Java  

Science Conference Proceedings (OSTI)

We present a translation from Fickle, a small object-oriented language allowing objects to change their class at runtime, into Java. The translation is provenly correct in the sense that it preserves the static and dynamic semantics. Moreover, ... Keywords: Type and effect systems, semantics preserving translation

D. Ancona; C. Anderson; F. Damiani; S. Drossopoulou; P. Giannini; E. Zucca

2007-04-01T23:59:59.000Z

31

Run-time optimization of adaptive irregular applications  

E-Print Network (OSTI)

Compared to traditional compile-time optimization, run-time optimization could o?er signi?cant performance improvements when parallelizing and optimizing adaptive irregular applications, because it performs program analysis and adaptive optimizations during program execution. Run-time techniques can succeed where static techniques fail because they exploit the characteristics of input data, programs' dynamic behaviors, and the underneath execution environment. When optimizing adaptive irregular applications for parallel execution, a common observation is that the effectiveness of the optimizing transformations depends on programs' input data and their dynamic phases. This dissertation presents a set of run-time optimization techniques that match the characteristics of programs' dynamic memory access patterns and the appropriate optimization (parallelization) transformations. First, we present a general adaptive algorithm selection framework to automatically and adaptively select at run-time the best performing, functionally equivalent algorithm for each of its execution instances. The selection process is based on off-line automatically generated prediction models and characteristics (collected and analyzed dynamically) of the algorithm's input data, In this dissertation, we specialize this framework for automatic selection of reduction algorithms. In this research, we have identi?ed a small set of machine independent high-level characterization parameters and then we deployed an off-line, systematic experiment process to generate prediction models. These models, in turn, match the parameters to the best optimization transformations for a given machine. The technique has been evaluated thoroughly in terms of applications, platforms, and programs' dynamic behaviors. Speci?cally, for the reduction algorithm selection, the selected performance is within 2% of optimal performance and on average is 60% better than "Replicated Buffer," the default parallel reduction algorithm speci?ed by OpenMP standard. To reduce the overhead of speculative run-time parallelization, we have developed an adaptive run-time parallelization technique that dynamically chooses effcient shadow structures to record a program's dynamic memory access patterns for parallelization. This technique complements the original speculative run-time parallelization technique, the LRPD test, in parallelizing loops with sparse memory accesses. The techniques presented in this dissertation have been implemented in an optimizing research compiler and can be viewed as effective building blocks for comprehensive run-time optimization systems, e.g., feedback-directed optimization systems and dynamic compilation systems.

Yu, Hao

2004-08-01T23:59:59.000Z

32

JavaCloak - Considering the Limitations of Proxies for Facilitating Java Runtime Specialisation.  

E-Print Network (OSTI)

Renaud,K.V. Annual Conference of the South African Institute of Computer Scientists and Information Technologists. SAICSIT'2001. Pretoria, South Africa. 25-28 September 2001. University of South Africa

Renaud, K.V.

33

MetaVM: A transparent distributed object system supported by runtime compiler  

E-Print Network (OSTI)

Abstract MetaVM is a distributed object system for Java virtual machine. It allows programmers to deal with remote objects in the same way they do local objects. Therefore, it can provide a single machine image to programmers. We implemented a runtime compiler of Java bytecode to provide the facilities. The runtime compiler generates a native code which can handle remote objects beyond the network besides the local objects. The compiler uses semantic expansion, which is a technique that changes the original semantics of a Java bytecode. This paper presents the simple programming interface, the code generation method of MetaVM, and our experimental performance results. The results demonstrate efficiency of remote operations. Keywords: distributed object system, network transparency, Java Just-In-Time compiler 1 Introduction A distributed object system is an instrument to develop a network distributed system in object-oriented programming languages. One of important benefits of such systems is to release programmers from the burden of exchanging information via a network. Programmers can write a distributed system in an object-oriented manner without concern for communication protocols.

Kazuyuki Shudo; Yoichi Muraoka

2000-01-01T23:59:59.000Z

34

Java 1.5.0 API Sun’s Java Tutorial Ed Faulkner’s Java Reference  

E-Print Network (OSTI)

Put these lines in your.environment: add 6.186 add-f java_v1.5.0 setenv JAVA_HOME /mit/java_v1.5.0 setenv CLASSPATH /mit/6.186/2005/maslab.jar:. If you’re Serverphobic, just ask for help. You’ll learn fast, and you’ll be glad you did. Using the Documentation

Yuran Lu Agenda; Threading Java; On Server; Maslab Api

2005-01-01T23:59:59.000Z

35

Runtime verification of object lifetime specifications  

E-Print Network (OSTI)

This thesis reports on the implementation of a runtime verification system for object lifetime specifications. This system is used to explore and evaluate the expressiveness object lifetime specifications. Object lifetime ...

Benjamin, Zev (Zev A.)

2009-01-01T23:59:59.000Z

36

A distributed hard real-time Java system for high mobility components  

E-Print Network (OSTI)

In this work we propose a methodology for providing real-time capabilities to component-based, on-the-fly recon?gurable, distributed systems. In such systems, software components migrate across computational resources at run-time to allow applications to adapt to changes in user requirements or to external events. We describe how we achieve run-time recon?guration in distributed Java applications by appropriately migrating servers. Guaranteed-rate schedulers at the servers provide the necessary temporal protection and so simplify remote method invocation management. We describe how we manage overhead and resource utilization by controlling the parameters of the server schedulers. According to our measurements, this methodology provides real-time capability to component-based recon?gurable distributed systems in an effcient and effective way. In addition, we propose a new resource discovery protocol, REALTOR, which is based on a combination of pull-based and push-based resource information dissemination. REALTOR has been designed for real-time component-based distributed applications in very dynamic or adverse environments. REALTOR supports survivability and information assurance by allowing the migration of components to safe locations under emergencies suchas externalattack, malfunction, or lackofresources. Simulation studies show that under normal and heavy load conditions REALTOR remains very effective in finding available resources, and does so with a reasonably low communication overhead.REALTOR 1)effectively locates resources under highly dynamic conditions, 2) has an overhead that is system-size independent, and 3) works well in highlyadverse environments.We evaluate the effectiveness of a REALTOR implementation as part of Agile Objects, an infrastructure for real-time capable, highly mobile Java components.

Rho, Sangig

2004-12-01T23:59:59.000Z

37

IDebug: An Advanced Debugging Framework for Java  

E-Print Network (OSTI)

IDebug, the Infospheres debugging framework, is an advanced debugging framework for Java. This framework provides the standard core debugging and specification constructs such as assertions, debug levels and categories, stack traces, and specialized exceptions. Debugging functionality can be fine-tuned to a per-thread and/or a per-class basis, debugging contexts can be stored to and recovered from persistent storage, and several aspects of the debugging run-time are configurable at the meta-level. Additionally, the framework is designed for extensibility. Planned improvements include support for debugging distributed object systems via currying call stacks across virtual machine contexts and debug information logging with a variety of networking media including unicast, multicast, RMI, distributed events, and JavaSpaces. Finally, we are adding support for debugging mobile agent systems by providing mobile debug logs. 1 Introduction Programming technologies have evolved greatly over th...

Joseph R. Kiniry

1998-01-01T23:59:59.000Z

38

The Java memory model  

Science Conference Proceedings (OSTI)

This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations ... Keywords: Java, concurrency, memory model, multithreading

Jeremy Manson; William Pugh; Sarita V. Adve

2005-01-01T23:59:59.000Z

39

Java and Numerical Computing  

Science Conference Proceedings (OSTI)

Java represents both a challenge and an opportunity to practitioners of numerical computing. This article analyzes the current state of Java in numerical computing and identifies some directions for the realization of its full potential.

Ronald F. Boisvert; José Moreira; Michael Philippsen; Roldan Pozo

2001-01-01T23:59:59.000Z

40

Runtime Identification of Microprocessor Energy Saving Opportunities  

E-Print Network (OSTI)

scaling (DVS). Also, future work in improving energy efficiency is motivated by a detailed analysis analysis of processor energy efficiency for the SPEC CPU 2000 benchmark suite. We motivate the developmentRuntime Identification of Microprocessor Energy Saving Opportunities W. L. Bircher, M. Valluri, J

John, Lizy Kurian

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Java Numerics: Main  

Science Conference Proceedings (OSTI)

... Workshop onJava in High Performance Computing at HPCN Eurpe 2001 Conference, Amsterdam, The Netherlands (June 25 - 27, 2001); ...

2012-11-20T23:59:59.000Z

42

Runtime Assignment of Reconfigurable Hardware Components for Image Processing Pipelines  

E-Print Network (OSTI)

The combination of hardware acceleration and flexibility make FPGAs important to image processing applications. There is also a need for efficient, flexible hardware/software codesign environments that can balance the benefits and costs of using FPGAs. Image processing applications often consist of a pipeline of components where each component applies a different processing algorithm. Components can be implemented for FPGAs or software. Such systems enable an image analyst to work with either FPGA or software implementations of image processing algorithms for a given problem. The pipeline assignment problem chooses from alternative implementations of pipeline components to yield the fastest pipeline. Our codesign system solves the pipeline assignment problem to provide the most effective implementation automatically, so the image analyst can focus solely on choosing components which make up the pipeline. However, the pipeline assignment problem is NP complete. An efficient, dynamic solution to the pipeline assignment problem is a desirable enabler of codesign systems which use both FPGA and software implementations. This paper is concerned with solving pipeline assignment in this context. Consequently, we focus on optimal and heuristic methods for fast (fixed time limit) runtime pipeline assignment. Exhaustive search, integer linear programming and local search methods for pipeline assignment are investigated. We present experimental findings for pipelines of 20 or fewer components which show that in our environment, optimal runtime solutions are possible for smaller pipelines and nearly optimal heuristic solutions are possible for larger pipelines.

Heather Quinn; L. A. Smith King; Miriam Leeser; W. Meleis; Waleed Meleis

2003-01-01T23:59:59.000Z

43

Accurate Electrical Battery Model Capable of Predicting Runtime and I-V Performance  

E-Print Network (OSTI)

Abstract—Low power dissipation and maximum battery runtime are crucial in portable electronics. With accurate and efficient circuit and battery models in hand, circuit designers can predict and optimize battery runtime and circuit performance. In this paper, an accurate, intuitive, and comprehensive electrical battery model is proposed and implemented in a Cadence environment. This model accounts for all dynamic characteristics of the battery, from nonlinear open-circuit voltage, current-, temperature-, cycle number-, and storage time-dependent capacity to transient response. A simplified model neglecting the effects of self-discharge, cycle number, and temperature, which are nonconsequential in low-power Li-ion-supplied applications, is validated with experimental data on NiMH and polymer Li-ion batteries. Less than 0.4 % runtime error and 30-mV maximum error voltage show that the proposed model predicts both the battery runtime and I–V performance accurately. The model can also be easily extended to other battery and power sourcing technologies. Index Terms—Batteries, cadence simulation, electrical model, I–V performance, nickel-metal hydride battery, polymer lithiumion battery, runtime prediction, test system. I.

Min Chen; Student Member; Gabriel A. Rincón-mora; Senior Member

2006-01-01T23:59:59.000Z

44

Characterizing Application Runtime Behavior from System Logs and Metrics  

Science Conference Proceedings (OSTI)

Large-scale systems are heavily shared resource environments where a mix of applications are launched concurrently competing for network and storage resources. It is essential to characterize the runtime behavior of these applications for provisioning system resources and understanding the impact of application s performance when competing for resources. In this paper, we study the use of zero- and low-overhead system logs and other system metric data for characterizing the runtime behavior of several applications. We present our preliminary work on estimating individual application s I/O demands by observing file system usage pattern over multiple runs, and interpreting application s network utilization characteristics by observing link-layer error logs. We also present preliminary findings on using such information in making context-sensitive scheduling decisions that minimize potentially negative interactions between applications competing for shared resources. Our analysis is based on four months of system log data collected on one of the world s largest supercomputing facilities, the Jaguar XT5 petaflop system at Oak Ridge National Laboratory.

Gunasekaran, Raghul [ORNL; Dillow, David A [ORNL; Shipman, Galen M [ORNL; Vuduc, Richard [Georgia Institute of Technology; Chow, Edmond [Georgia Institute of Technology

2011-01-01T23:59:59.000Z

45

Diffusion Java Applets - TMS  

Science Conference Proceedings (OSTI)

Mar 8, 2007 ... Citation: Glicksman, M.E. and Lupulescu, A. "Java Applets and Additional Presentations." Department of Materials Science and Engineering.

46

An interactive parallel programming environment applied in atmospheric science  

SciTech Connect

This article introduces an interactive parallel programming environment (IPPE) that simplifies the generation and execution of parallel programs. One of the tasks of the environment is to generate message-passing parallel programs for homogeneous and heterogeneous computing platforms. The parallel programs are represented by using visual objects. This is accomplished with the help of a graphical programming editor that is implemented in Java and enables portability to a wide variety of computer platforms. In contrast to other graphical programming systems, reusable parts of the programs can be stored in a program library to support rapid prototyping. In addition, runtime performance data on different computing platforms is collected in a database. A selection process determines dynamically the software and the hardware platform to be used to solve the problem in minimal wall-clock time. The environment is currently being tested on a Grand Challenge problem, the NASA four-dimensional data assimilation system.

Laszewski, G. von

1996-12-31T23:59:59.000Z

47

PARLO: PArallel Run-Time Layout Optimization for Scientific Data Explorations with Heterogeneous Access Pattern  

SciTech Connect

Download Citation Email Print Request Permissions Save to Project The size and scope of cutting-edge scientific simulations are growing much faster than the I/O and storage capabilities of their run-time environments. The growing gap is exacerbated by exploratory, data-intensive analytics, such as querying simulation data with multivariate, spatio-temporal constraints, which induces heterogeneous access patterns that stress the performance of the underlying storage system. Previous work addresses data layout and indexing techniques to improve query performance for a single access pattern, which is not sufficient for complex analytics jobs. We present PARLO a parallel run-time layout optimization framework, to achieve multi-level data layout optimization for scientific applications at run-time before data is written to storage. The layout schemes optimize for heterogeneous access patterns with user-specified priorities. PARLO is integrated with ADIOS, a high-performance parallel I/O middleware for large-scale HPC applications, to achieve user-transparent, light-weight layout optimization for scientific datasets. It offers simple XML-based configuration for users to achieve flexible layout optimization without the need to modify or recompile application codes. Experiments show that PARLO improves performance by 2 to 26 times for queries with heterogeneous access patterns compared to state-of-the-art scientific database management systems. Compared to traditional post-processing approaches, its underlying run-time layout optimization achieves a 56% savings in processing time and a reduction in storage overhead of up to 50%. PARLO also exhibits a low run-time resource requirement, while also limiting the performance impact on running applications to a reasonable level.

Gong, Zhenhuan [North Carolina State University, Raleigh; Boyuka, David [North Carolina State University, Raleigh; Zou, X [North Carolina State University, Raleigh; Liu, Gary [ORNL; Podhorszki, Norbert [ORNL; Klasky, Scott A [ORNL; Ma, Xiaosong [North Carolina State University, Raleigh; Samatova, Nagiza F [ORNL

2013-01-01T23:59:59.000Z

48

The ENSDF Java Package  

Science Conference Proceedings (OSTI)

A package of computer codes has been developed to process and display nuclear structure and decay data stored in the ENSDF (Evaluated Nuclear Structure Data File) library. The codes were written in an object-oriented fashion using the java language. This allows for an easy implementation across multiple platforms as well as deployment on web pages. The structure of the different java classes that make up the package is discussed as well as several different implementations.

Sonzogni, A.A. [National Nuclear Data Center, Brookhaven National Laboratory, Upton, NY 11973-5000 (United States)

2005-05-24T23:59:59.000Z

49

C++ Encapsulated Dynamic Runtime Power Control for Embedded Systems Orlando J. Hernandez, Godfrey Dande, and John Ofri  

E-Print Network (OSTI)

. A combination of software profiling, voltage-scaling and frequency throttling, along with run-time speed tables. As more electronic appliances are developed, the demand for electric energy has increased. This tends smart. In the approach described in this paper, software is profiled in a real-time environment

Hernandez, Orlando

50

Specifying java iterators with JML and Esc/Java2  

Science Conference Proceedings (OSTI)

The 2006 SAVCBS Workshop has posed a Challenge Problem on the topic of specifying iterators. This note provides a specification in the Java Modeling Language (JML) [1, 2] for the Java interfaces Iterator and Iterable that captures the interactions ... Keywords: ESC/Java2, JML, specification, static analysis, verification

David R. Cok

2006-11-01T23:59:59.000Z

51

JAVA SCRIPT IS DISABLED  

Office of Scientific and Technical Information (OSTI)

This application needs JavaScript to work correctly but your browser does not have it enabled. How do I enable JavaScript??? - follow the instructions below... If your browser is not listed, please contact your system administrator. Internet Explorer (6.0) Select 'Tools' from the top menu Choose 'Internet Options' Click on the 'Security' tab Click on 'Custom Level' Scroll down until you see section labled 'Scripting' Under 'Active Scripting', select 'Enable' and click OK Internet Explorer (7.0) Select Tools > Internet Options. Click on the Security tab. Click the Custom Level button. Scroll down to the Scripting section. Select Enable for Active Scripting and Scripting of Java Applets. Click OK. Select YES if a box appears to confirm. Click OK. Close window.

52

A Model-Driven Runtime Environment for Web Applications  

E-Print Network (OSTI)

A large part of software development these days deals with building so-called Web applications. Many of these applications are database-powered and exhibit a page layout and navigational structure that is close to the class structure of the entities being managed by the system. Also, there is often only limited...

Jörg Pleumann; Stefan Haustein

2003-01-01T23:59:59.000Z

53

VMSTAR: synthesizing scalable runtime environments for sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are being deployed at massive scales, containing a range of platforms. Programming paradigms for sensor networks should meet the attendant challenges of scale and heterogeneity. Researchers have considered virtual machines as a means ... Keywords: network reprogramming, operating systems, programming languages, software synthesis, virtual machines, wireless sensor networks

Joel Koshy; Raju Pandey

2005-11-01T23:59:59.000Z

54

A Java commodity grid kit.  

SciTech Connect

In this paper we report on the features of the Java Commodity Grid Kit. The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework. Java CoG Kit middleware is general enough to design a variety of advanced Grid applications with quite different user requirements. Access to the Grid is established via Globus protocols, allowing the Java CoG Kit to communicate also with the C Globus reference implementation. Thus, the Java CoG Kit provides Grid developers with the ability to utilize the Grid, as well as numerous additional libraries and frameworks developed by the Java community to enable network, Internet, enterprise, and peer-to peer computing. A variety of projects have successfully used the client libraries of the Java CoG Kit to access Grids driven by the C Globus software. In this paper we also report on the efforts to develop server side Java CoG Kit components. As part of this research we have implemented a prototype pure Java resource management system that enables one to run Globus jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

von Laszewski, G.; Foster, I.; Gawor, J.; Lane, P.; Mathematics and Computer Science

2001-07-01T23:59:59.000Z

55

RTJBench: A RealTime Java Benchmarking Framework  

E-Print Network (OSTI)

Abstract. The paper gives an overview of RTJBench, a framework designed to assist in the task of benchmarking programs written in the Real-Time Specification for Java, but with potentially more general applicability. RTJBench extends the JUnit framework for unit testing of Java applications with tools for real-time environment configuration, simple data processing and configurable graphical presentation services. We present design principles of RTJBench and give an example of a benchmarking suite we have been using for daily regression benchmarking of the Open Virtual Machine. Keywords: Benchmarking, regression benchmarking, Real-Time Specification for Java

Marek Prochazka; Andrey Madan; Jan Vitek; Wenchang Liu

2004-01-01T23:59:59.000Z

56

JAVA & Parallelism/Real-time systems  

E-Print Network (OSTI)

Windowing Toolkit (AWT) in a memory-efficient way. JAVA Application Environment (JAE) Support enables the same applets and applications to run on other servers or platforms running the JAVA Virtual Machine. CHAPTER 2 Embedded and Real-Time JAVA According to the designers at Sun Microsystems, is JAVA also suitable for Embedded or Real-Time systems. Before proceeding further it is worth trying to define the phrase `real-time system' more precisely. 2.1 Definition of a real-time system There are many interpretations of the exact nature of a real-time system; however, they all have in common the notion of response time, the time taken for the system to generate output from some associated input. The Oxford Dictionary of Computing [48] gives the following definition of a real-time system. A real-time system is... Any system in which the time at which output is produced is significant. This is usually because the input corresponds to some movement in the physical world, and the output ha...

D. F. Nooren

1998-01-01T23:59:59.000Z

57

New initiative on runtime compatibility for MPI implementations | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

initiative on runtime compatibility for MPI implementations initiative on runtime compatibility for MPI implementations December 3, 2013 Tweet EmailPrint Researchers at Argonne National Laboratory have established an initiative to tackle the problem of maintaining runtime compatibility between message passing interface (MPI) implementations on high-performance computer architectures. The project, called the MPICH ABI Compatibility Initiative, involves the producers of several notable MPICH-derived message-passing implementations. MPICH is a high-performance, portable implementation of the MPI-1, MPI-2, and MPI-3 community standards for the message-passing model of parallel computation. Developed by an Argonne team of computer scientists, MPICH has become the de facto standard for scientific research on parallel computers

58

Java Vertexing Tools  

SciTech Connect

This document describes the implementation of the topological vertex finding algorithm ZVTOP within the org.lcsim reconstruction and analysis framework. At the present date, Java vertexing tools allow users to perform topological vertexing on tracks that have been obtained from a Fast MC simulation. An implementation that will be able to handle fully reconstructed events is being designed from the ground up for longevity and maintainability.

Strube, Jan; /Oregon U.; Graf, Norman; /SLAC

2006-03-03T23:59:59.000Z

59

A Dynamic Platform for Runtime Adaptation  

E-Print Network (OSTI)

We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive middleware approaches, in which sophisticated ...

Pham, Hubert

60

T-558: Oracle Java SE and Java for Business Critical Patch Update...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011...

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Java support on genepool: java6 (jdk1.6) will be removed on 08...  

NLE Websites -- All DOE Office Websites (Extended Search)

Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox security updates Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox...

62

Converting java programs to use generic libraries  

Science Conference Proceedings (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ... Keywords: JSR-14, Java 1.5, Java 5, generic types, instantiation types, parameterized types, parametric polymorphism, raw types, type inference

Alan Donovan; Adam Kiežun; Matthew S. Tschantz; Michael D. Ernst

2004-10-01T23:59:59.000Z

63

Practical pluggable types for Java.  

E-Print Network (OSTI)

??This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines… (more)

Papi, Matthew M

2008-01-01T23:59:59.000Z

64

Converting Java Programs to Use Generic Libraries  

E-Print Network (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ...

Donovan, Alan

2004-03-30T23:59:59.000Z

65

Converting Java programs to use generic libraries  

E-Print Network (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practise makes heavy use of ...

Donovan, Alan A. A., 1976-

2004-01-01T23:59:59.000Z

66

A comparative critical analysis of modern task-parallel runtimes.  

Science Conference Proceedings (OSTI)

The rise in node-level parallelism has increased interest in task-based parallel runtimes for a wide array of application areas. Applications have a wide variety of task spawning patterns which frequently change during the course of application execution, based on the algorithm or solver kernel in use. Task scheduling and load balance regimes, however, are often highly optimized for specific patterns. This paper uses four basic task spawning patterns to quantify the impact of specific scheduling policy decisions on execution time. We compare the behavior of six publicly available tasking runtimes: Intel Cilk, Intel Threading Building Blocks (TBB), Intel OpenMP, GCC OpenMP, Qthreads, and High Performance ParalleX (HPX). With the exception of Qthreads, the runtimes prove to have schedulers that are highly sensitive to application structure. No runtime is able to provide the best performance in all cases, and those that do provide the best performance in some cases, unfortunately, provide extremely poor performance when application structure does not match the scheduler's assumptions.

Wheeler, Kyle Bruce; Stark, Dylan; Murphy, Richard C. [Micron Technology, Inc., Boise, ID

2012-12-01T23:59:59.000Z

67

Run-time validation of knowledge-based systems  

Science Conference Proceedings (OSTI)

As knowledge bases become more complex it is increasingly unlikely that they will have been validated against all possible data and therefore an increasing risk of making errors. Run-time validation is checking whether the output of a knowledge base ... Keywords: anomalies, outliers, prudence, ripple-down rules, validation

Angela Finlayson, Paul Compton

2013-06-01T23:59:59.000Z

68

Towards Reliable Smart Microgrid Behavior Using Runtime Model Synthesis  

Science Conference Proceedings (OSTI)

The dominant paradigm of centralized power generation, characterized by heavy transmission losses, is being slowly replaced by the smart micro grid, which promises the proliferation of renewable and distributed energy sources. Micro grid reliability ... Keywords: High Assurance, Model-Driven Development, Model Management, Microgrid, SmartGrid, Runtime Models

Mark Allison; Karl A. Morris; Zhenyu Yang; Peter J. Clarke; Fabio M. Costa

2012-10-01T23:59:59.000Z

69

An improved slicer for Java  

Science Conference Proceedings (OSTI)

We present an improved slicing algorithm for Java. The best algorithm known so far, first presented in [11], is not always precise if nested objects are used as actual parameters. The new algorithm presented in this paper always generates correct and ... Keywords: Java, object trees, static program slicing

Christian Hammer; Gregor Snelting

2004-06-01T23:59:59.000Z

70

Formalizing the safety of Java, the Java virtual machine, and Java card  

Science Conference Proceedings (OSTI)

We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smartcards. The conclusion is that although a lot of good work has been done, a more concerted effort is ... Keywords: Common criteria, programming

Pieter H. Hartel; Luc Moreau

2001-12-01T23:59:59.000Z

71

Using Java for distributed computing in the Gaia satellite data processing  

E-Print Network (OSTI)

In recent years Java has matured to a stable easy-to-use language with the flexibility of an interpreter (for reflection etc.) but the performance and type checking of a compiled language. When we started using Java for astronomical applications around 1999 they were the first of their kind in astronomy. Now a great deal of astronomy software is written in Java as are many business applications. We discuss the current environment and trends concerning the language and present an actual example of scientific use of Java for high-performance distributed computing: ESA's mission Gaia. The Gaia scanning satellite will perform a galactic census of about 1000 million objects in our galaxy. The Gaia community has chosen to write its processing software in Java. We explore the manifold reasons for choosing Java for this large science collaboration. Gaia processing is numerically complex but highly distributable, some parts being embarrassingly parallel. We describe the Gaia processing architecture and its realisation...

O'Mullane, William; Parsons, Paul; Lammers, Uwe; Hoar, John; Hernandez, Jose

2011-01-01T23:59:59.000Z

72

Jove: java as it happens  

Science Conference Proceedings (OSTI)

Dynamic software visualization is designed to provide programmers with insights as to what the program is doing. Most current dynamic visualizations either use program traces to show information about prior runs, slow the program down substantially, ... Keywords: dynamic software visualization, instrumentation, run-time monitoring

Steven P. Reiss; Manos Renieris

2005-05-01T23:59:59.000Z

73

Runtime Monitoring of Timing Constraints in Distributed Real-Time Systems  

E-Print Network (OSTI)

. Embedded real-time systems often operate under strict timing and dependability constraints. To ensure responsiveness, these systems must be able to provide the expected services in a timely manner even in the presence of faults. In this paper, we describe a run-time environment for monitoring of timing constraints in distributed real-time systems. In particular, we focus on the problem of detecting violations of timing assertions in an environment in which the real-time tasks run on multiple processors, and timing constraints can be either inter-processor or intra-processor constraints. Constraint violations are detected at the earliest possible time by deriving and checking intermediate constraints from the user-specified constraints. If the violations must be detected as early as possible, then the problem of minimizing the number of messages to be exchanged between the processors becomes intractable. We characterize a sub-class of timing constraints that occur commonly in distribu...

Farnam Jahanian; Ragunathan Rajkumar; Sitaram C. V. Raju

1994-01-01T23:59:59.000Z

74

Translating Nondeterministic Functional Language based on Attribute Grammars into Java  

E-Print Network (OSTI)

Knowledge-based systems are suitable for realizing advanced functions that require domain-specific expert knowledge, while knowledge representation languages and their supporting environments are essential for realizing such systems. Although Prolog is useful and effective in realizing such a supporting environment, the language interoperability with other implementation languages, such as Java, is often an important issue in practical application development. This paper describes the techniques for translating a knowledge representation language that is a nondeterministic functional language based on attribute grammars into Java. The translation is based on binarization and the techniques proposed for Prolog to Java translation although the semantics are different from those of Prolog. A continuation unit is introduced to handle continuation efficiently, while the variable and register management on backtracking is simplified by using the single and unidirectional assignment features of variables. An experim...

Umeda, Masanobu; Sone, Hiroaki; Katamine, Keiichi

2011-01-01T23:59:59.000Z

75

Template_JavaOne03  

Science Conference Proceedings (OSTI)

... | JavaOne 2003 | Session #1024. 9. S-CSCF. MGCF. MGW. HSS. Application Server. SIP for J2ME. JAIN SIP. SIP for J2ME. JAIN SIP. SIP for J2ME. ...

2009-02-03T23:59:59.000Z

76

Practical pluggable types for Java  

E-Print Network (OSTI)

This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines type qualifiers and their semantics, and a compiler ...

Papi, Matthew M

2008-01-01T23:59:59.000Z

77

Refactoring for parameterizing Java classes  

E-Print Network (OSTI)

Type safety and expressiveness of many existing Java libraries and theirclient applications would improve, if the libraries were upgraded to definegeneric classes. Efficient and accurate tools exist to assist clientapplications ...

Kiezun, Adam

2006-09-05T23:59:59.000Z

78

Mechanisms of Java Rainfall Anomalies  

Science Conference Proceedings (OSTI)

The large-scale circulation departure patterns associated with the interannual variability of (July–June) rainfall in Java are studied on the basis of ship observations (1911–73) in the Indian Ocean and surface station records. Circulation ...

Eric C. Hackert; Stefan Hastenrath

1986-04-01T23:59:59.000Z

79

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java....

80

Redefining Agrarian Power: Resurgent Agrarian Movements in West Java, Indonesia  

E-Print Network (OSTI)

Agrarian Movements in West Java, Indonesia Suraya Afiff Noeron agrarian change in Java in the 1970s and has, moreand agrarian change in Java, West Kalimantan, and other

Afiff, Suraya; Fauzi, Noer; Hart, Gillian; Ntsebeza, Lungisile; Peluso, Nancy

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

82

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing 5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java. IMPACT: Apache can be exploited by malicious people to conduct spoofing attacks. SOLUTION: The vendor has issued a fix. Addthis Related Articles

83

V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers  

Energy.gov (U.S. Department of Energy (DOE))

A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

84

Hybrid Run-time Power Management Technique for Realtime  

E-Print Network (OSTI)

This paper presents a new run-time power management technique for real-time embedded systems which consist of a voltage scalable processor and power controllable peripheral devices. We have observed that there exist significant trade-offs in terms of energy consumption between the Dynamic Power Management (DPM) scheme and the Dynamic Voltage Scaling (DVS) scheme over a wide range of system operating conditions. The proposed technique fully exploits workload-variation slack time by partitioning the task into several timeslots and shut down the unneeded peripheral device on timeslot-by-timeslot basis.

Minyoung Kim; Embedded System With

2001-01-01T23:59:59.000Z

85

Animation projects in CS1 from scheme to Java  

Science Conference Proceedings (OSTI)

Scheme animation projects are transformed into Java projects. Keywords: computer science for liberal arts, introductory programming course, java programming

Mirela Djordjevi?

2011-06-01T23:59:59.000Z

86

Platform Independence Java Virtual Machine (JVM)  

E-Print Network (OSTI)

of User Appliances and Communications Links But completely compatible Because the Market demandsIFace area = new Area(); java.rmi.Naming.bind(url, area) Client: AreaIFace area = (AreaIFace) java.rmi.Naming.lookup

Martin, Jonathan E.

87

Transparent Consistent Replication of Java RMI Objects  

Science Conference Proceedings (OSTI)

The Java Remote Method Invocation (JRMI) specification simplifies the development of distributed Java applications, but provides little support to guarantee reliable, highly available operation. The Aroma System is middleware that transparently enhances ...

N. Narasimhan; L. E. Moser; P. M. Melliar-Smith

2000-09-01T23:59:59.000Z

88

Advanced Transactions in Enterprise JavaBeans  

Science Conference Proceedings (OSTI)

Enterprise JavaBeans (EJB) is a new technology that aims at supporting distributed transactional component-based applications written in Java. In recent years, a lot of new advanced software applications have arisen, which have new requirements for transaction ...

Marek Prochazka

2000-11-01T23:59:59.000Z

89

Remote Invocation in Java G52CON Concepts of Concurrency Remote Invocation in Java  

E-Print Network (OSTI)

.out.println(account.balance()); } catch (Exception e) { // Error handling } } } Remote Invocation in Java G52CON ­ Concepts of Concurrency1 Remote Invocation in Java G52CON ­ Concepts of Concurrency Remote Invocation in Java · Provided by the java.rmi package · Based on a model of remote method invocation (RMI), equivalent to remote procedure

Mills, Steven

90

Symbolic Script Programming for Java  

E-Print Network (OSTI)

Computer algebra in Java is a promising field of development. It has not yet reached an industrial strength, in part because of a lack of good user interfaces. Using a general purpose scripting language can bring a natural mathematical notation, akin to the one of specialized interfaces included in most computer algebra systems. We present such an interface for Java computer algebra libraries, using scripts available in the JSR 223 framework. We introduce the concept of `symbolic programming' and show its usefulness by prototypes of symbolic polynomials and polynomial rings.

Jolly, Raphael

2009-01-01T23:59:59.000Z

91

JAVA based LCD Reconstruction and Analysis Tools  

Science Conference Proceedings (OSTI)

We summarize the current status and future developments of the North American Group's Java-based system for studying physics and detector design issues at a linear collider. The system is built around Java Analysis Studio (JAS) an experiment-independent Java-based utility for data analysis. Although the system is an integrated package running in JAS, many parts of it are also standalone Java utilities.

Bower, G.

2004-10-11T23:59:59.000Z

92

Features of the Java commodity grid kit.  

SciTech Connect

In this paper we report on the features of the Java Commodity Grid Kit (Java CoG Kit). The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework. Java CoG Kit middleware is general enough to design a variety of advanced Grid applications with quite different user requirements. Access to the Grid is established via Globus Toolkit protocols, allowing the Java CoG Kit to also communicate with the services distributed as part of the C Globus Toolkit reference implementation. Thus, the Java CoG Kit provides Grid developers with the ability to utilize the Grid, as well as numerous additional libraries and frameworks developed by the Java community to enable network, Internet, enterprise and peer-to-peer computing. A variety of projects have successfully used the client libraries of the Java CoG Kit to access Grids driven by the C Globus Toolkit software. In this paper we also report on the efforts to develop serverside Java CoG Kit components. As part of this research we have implemented a prototype pure Java resource management system that enables one to run Grid jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

von Laszewski, G.; Gawor, J.; Lane, P.; Rehn, N.; Russell, M.; Mathematics and Computer Science

2002-11-01T23:59:59.000Z

93

Observation strategies for event detection with incidence on runtime verification: theory, algorithms, experimentation  

Science Conference Proceedings (OSTI)

Many applications (such as system and user monitoring, runtime verification, diagnosis, observation-based decision making, intention recognition) all require to detect the occurrence of an event in a system, which entails the ability to observe the system. ... Keywords: 68Q17, 68U99, 68W25, Complexity, Event detection, Logic programming, Runtime verification, Temporal logic

Marco Alberti; Pierangelo Dell'Acqua; Luís Moniz Pereira

2011-07-01T23:59:59.000Z

94

Initial steps towards run-time support for norm-governed systems  

Science Conference Proceedings (OSTI)

We present a knowledge representation framework with an associated run-time support infrastructure that is able to compute, for the benefit of the members of a norm-governed multi-agent system, the physically possible and permitted actions at each time, ... Keywords: GOLEM, event calculus, run-time service, social interaction

Visara Urovi; Stefano Bromuri; Kostas Stathis; Alexander Artikis

2010-05-01T23:59:59.000Z

95

ESC/Java2 Implementation Notes  

E-Print Network (OSTI)

Abstract: ESC/Java2 is a tool for statically checking program specifications. It expands significantly upon ESC/Java, on which it is built. It is consistent with the definition of JML and of Java 1.4. It adds additional static checking to that in ESC/Java; most significantly, it adds support for checking frame conditions and annotations containing method calls. This document describes the status of the final release of ESC/Java2, along with some notes regarding the details of that implementation.

David R. Cok; Joseph R. Kiniry; Dermot Cochran

2008-01-01T23:59:59.000Z

96

Integrating multiple clinical information systems using the Java Message Service framework  

E-Print Network (OSTI)

Information Systems using the Java Message Service FrameworkInformation Systems using the Java Message Service Frameworkusing Sun Microsystems’ Java programming language. The Java

Tellis, W M; Andriole, K P

2004-01-01T23:59:59.000Z

97

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

98

MESURE Tool to benchmark Java Card platforms  

E-Print Network (OSTI)

The advent of the Java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behavior of these platforms is becoming crucial. To meet this need, we present in this paper a novel benchmarking framework to test and evaluate the performance of Java Card platforms. MESURE tool is the first framework which accuracy and effectiveness are independent from the particular Java Card platform tested and CAD used.

Bouzefrane, Samia; Paradinas, Pierre

2009-01-01T23:59:59.000Z

99

Object and Reference Immutability using Java Generics  

E-Print Network (OSTI)

A compiler-checked immutability guarantee provides useful documentation, facilitates reasoning, and enables optimizations. This paper presents Immutability Generic Java (IGJ), a novel language extension that expresses ...

Zibin, Yoav

2007-03-16T23:59:59.000Z

100

OpenMath JavaBeans - CECM  

E-Print Network (OSTI)

Sep 24, 1998 ... The technology studied in this project uses Java to construct components, ... It is also a general communications standard which supports the ...

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

SystemRequirements java Repository CRAN  

E-Print Network (OSTI)

Description Low-level interface to Java VM very much like.C/.Call and friends. Allows creation of objects, calling methods and accessing fields.

Simon Urbanek; Maintainer Simon Urbanek; Depends R; R Topics Documented

2010-01-01T23:59:59.000Z

102

Emerging Java Technologies for Math Education  

E-Print Network (OSTI)

PIMS-CECM Workshop on Emerging Java Technologies for Math Education. Centre For Experimental and Constructive Mathematics logo. A Workshop at the  ...

103

Design and implementation of a scalable membership service for supercomputer resiliency-aware runtime  

Science Conference Proceedings (OSTI)

As HPC systems and applications get bigger and more complex, we are approaching an era in which resiliency and run-time elasticity concerns become paramount. We offer a building block for an alternative resiliency approach in which computations will ...

Yoav Tock, Benjamin Mandler, José Moreira, Terry Jones

2013-08-01T23:59:59.000Z

104

Using memory mapping to support cactus stacks in work-stealing runtime systems  

E-Print Network (OSTI)

Many multithreaded concurrency platforms that use a work-stealing runtime system incorporate a "cactus stack," wherein a function's accesses to stack variables properly respect the function's calling ancestry, even when ...

Lee, I-Ting Angelina

105

An integrated verification environment for JML: architecture and early results  

Science Conference Proceedings (OSTI)

Tool support for the Java Modeling Language (JML) is a very pressing problem. A main issue with current tools is their architecture: the cost of keeping up with the evolution of Java is prohibitively high: e.g., almost three years following its release, ... Keywords: Eclipse, JML4, integrated verification environment, java modeling language

Patrice Chalin; Perry R. James; George Karabotsos

2007-09-01T23:59:59.000Z

106

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

107

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

108

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

109

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

110

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

111

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August...

112

Recoverable Class Loaders for a Fast Restart of Java Applications  

Science Conference Proceedings (OSTI)

Nov 8, 2008 ... able a fast start-up and recovery of Java applications. This is achieved by snapshooting the static state of Java applications namely the class ...

113

Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Environment Our good neighbor pledge: to contribute to quality of life in Northern New Mexico through economic development, excellence in education, and active employee...

114

First International Workshop on Persistence and Java  

Science Conference Proceedings (OSTI)

These proceedings record the First International Workshop on Persistence and Java, which was held in Drymen, Scotland in September 1996. The focus of this workshop was the relationship between the Java languages and long-term data storage, such as databases ...

Malcolm Atkinson; Mick Jordan

1996-11-01T23:59:59.000Z

115

Stability of Java interfaces: a preliminary investigation  

Science Conference Proceedings (OSTI)

The attribute of stability is regarded by some as an important attribute of software. Some claims regarding software design quality imply that what are called interfaces in Java are stable. This paper introduces some new metrics for investigating ... Keywords: java interface, software metrics, stability

Jonathan Chow; Ewan Tempero

2011-05-01T23:59:59.000Z

116

Testing of java web services for robustness  

Science Conference Proceedings (OSTI)

This paper presents a new compile-time analysis that enables a testing methodology for white-box coverage testing of error recovery code (i.e., exception handlers) in Java web services using compiler-directed fault injection. The analysis allows compiler-generated ... Keywords: def-use testing, exceptions, java, test coverage metrics

Chen Fu; Barbara G. Ryder; Ana Milanova; David Wonnacott

2004-07-01T23:59:59.000Z

117

Sandia secure processor : a native Java processor.  

SciTech Connect

The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. The complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.

Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

2003-08-01T23:59:59.000Z

118

T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update 8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 February 16, 2011 - 7:00am Addthis PROBLEM: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011. PLATFORM: JDK and JRE 6 Update 23 and earlier for Windows, Solaris, and Linux JDK 5.0 Update 27 and earlier for Solaris 9 SDK 1.4.2_29 and earlier for Solaris 8 JDK and JRE 6 Update 23 and earlier for Windows, Solaris and Linux JDK and JRE 5.0 Update 27 and earlier for Windows, Solaris and Linux SDK and JRE 1.4.2_29 and earlier for Windows, Solaris and Linux ABSTRACT: This Critical Patch Update contains 21 new security fixes for Oracle Java SE and Java for Business. 19 of these vulnerabilities may be remotely

119

Java fundamentals i and ii (video training), First edition  

Science Conference Proceedings (OSTI)

Java Fundamentals I and II will show you everything you need to know to start building robust, powerful software with Java SE. This collection provides $2,000 (USD) worth of expert Java training! Your instructor, Paul Deitel, has personally taught Java ...

Paul J. Deitel

2008-02-01T23:59:59.000Z

120

Sawja: Static Analysis Workshop for Java  

E-Print Network (OSTI)

Static analysis is a powerful technique for automatic verification of programs but raises major engineering challenges when developing a full-fledged analyzer for a realistic language such as Java. This paper describes the Sawja library: a static analysis framework fully compliant with Java 6 which provides OCaml modules for efficiently manipulating Java bytecode programs. We present the main features of the library, including (i) efficient functional data-structures for representing program with implicit sharing and lazy parsing, (ii) an intermediate stack-less representation, and (iii) fast computation and manipulation of complete programs.

Hubert, Laurent; Besson, Frédéric; Demange, Delphine; Jensen, Thomas; Monfort, Vincent; Pichardie, David; Turpin, Tiphaine

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Org.Lcsim: Event Reconstruction in Java  

SciTech Connect

Maximizing the physics performance of detectors being designed for the International Linear Collider, while remaining sensitive to cost constraints, requires a powerful, efficient, and flexible simulation, reconstruction and analysis environment to study the capabilities of a large number of different detector designs. The preparation of Letters Of Intent for the International Linear Collider involved the detailed study of dozens of detector options, layouts and readout technologies; the final physics benchmarking studies required the reconstruction and analysis of hundreds of millions of events. We describe the Java-based software toolkit (org.lcsim) which was used for full event reconstruction and analysis. The components are fully modular and are available for tasks from digitization of tracking detector signals through to cluster finding, pattern recognition, track-fitting, calorimeter clustering, individual particle reconstruction, jet-finding, and analysis. The detector is defined by the same xml input files used for the detector response simulation, ensuring the simulation and reconstruction geometries are always commensurate by construction. We discuss the architecture as well as the performance.

Graf, Norman A.; /SLAC

2012-04-19T23:59:59.000Z

122

Java persistence with hibernate, Second edition  

Science Conference Proceedings (OSTI)

Persistence -- the ability of data to outlive an instance of a program -- is central to modern applications. Hibernate, the most popular Java persistence tool, provides automatic and transparent object/relational mapping so it's a snap to work with SQL ...

Christian Bauer; Gavin King

2006-11-01T23:59:59.000Z

123

Javarifier : inference of reference immutability in Java  

E-Print Network (OSTI)

Javari is an extension of Java that supports reference immutability constraints. Programmers write Javari type qualifiers, such as the readonly type qualifier, in their programs, and the Javari typechecker detects mutation ...

Quinonez, Jamie

2008-01-01T23:59:59.000Z

124

Computer algebra in Java: libraries and scripting  

E-Print Network (OSTI)

We have developed two computer algebra systems (CAS) written in Java [Jolly:2007,Kredel:2006]. The Java libraries can be used as any of the numerous other Java library packages. For the use-case of interactively entering and manipulating mathematical expressions there is a need of a scripting front-end for our libraries. Most other CAS invent and implement their own scripting interface for this purpose. We, however, do not want to reinvent the wheel and propose to use a contemporary scripting language with access to Java code. In this paper we discuss the requirements for a scripting language in computer algebra and check whether the languages Python, Ruby, Groovy and Scala meet these requirements. We conclude, that with minor problems any of these languages is suitable for our purpose.

Jolly, Raphael

2008-01-01T23:59:59.000Z

125

Verification for Java's Reentrant Multithreading Concept  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. the concurrency model offers coordination via lock-synchronization, and communication by ...

Erika Ábrahám-Mumm; Frank S. de Boer; Willem P. de Roever; Martin Steffen

2002-04-01T23:59:59.000Z

126

Runtime Tracing of The Community Earth System Model: Feasibility and Benefits  

Science Conference Proceedings (OSTI)

Community Earth System Models (CESM) is one of US's leading earth system modeling systems, which has over decades of development history and embraced by large, active user communities. In this paper, we first review the history of CESM software development and layout the general objectives of performance analysis. Then we present an offline global community land model simulation within the CESM framework to demonstrate the procedure of runtime tracing of CESM using the Vampir toolset. Finally, we explain the benefits of runtime tracing to the general earth system modeling community. We hope those considerations can also be beneficial to many other modeling research programs involving legacy high-performance computing applications.

Wang, Dali [ORNL; Domke, Jens [ORNL

2011-01-01T23:59:59.000Z

127

Environment  

Science Conference Proceedings (OSTI)

...O. Jonas, Corrosion of Steam Turbines, Corrosion: Environments and Industries, Vol 13C, ASM Handbook, ASM International, 2006, p 469â??476...

128

Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Environment Environment LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 LANL has a strategy to clean up the past, control current operations, and move toward a sustainable future in which waste is minimized and other effects on the environment are reduced or eliminated. We work safely, securely, ethically, and in a manner that protects the environment We understand that the health and viability of the Laboratory depend in part on a record of environmental performance, building confidence of the public and our regulators. To gain the right to do what we do, we must work

129

JavaScript Error, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Services Web Services Enabling JavaScript or Active Scripting We're Sorry, you don't seem to have JavaScript enabled in your browser. Some functions in this site may not work properly without it enabled or your web browser is running an older version of JavaScript. Please enabled your JavaScript, then go back and try again or upgrade your browser version to view this web page correctly. Press the button below to see if you have JavaScript enabled. If nothing happened, then it is possible that JavaScript is disabled on your browser. The following instructions shown below describes how to enable JavaScript or Active Scripting in your browser. If your browser isn't listed, please consult its online help pages. JavaScript Test ITD Homepage Need Help? How to Enable JavaScript

130

Hyper-Threaded Java: Use the Java Concurrency API to Speed Up Time-Consuming Tasks  

SciTech Connect

This is for a Java World article that was already published on Nov 21, 2006. When I originally submitted the draft, Java World wasn't in the available lists of publications. Now that it is, Hanford Library staff recommended that I resubmit so it would be counted. Original submission ID: PNNL-SA-52490

Scarberry, Randy

2006-11-21T23:59:59.000Z

131

Java Jr.: Fully abstract trace semantics for a core Java language.  

E-Print Network (OSTI)

actions which represent interaction across package boundaries. A detailed example based on the Observer, subset of the Java language which allows for the declaration of classes and interfaces in packages. It includes two extensions of Java: it allows for packages to contain object declarations (rather than

Jeffrey, Alan

132

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

133

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

134

Designing Energy Efficient Communication Runtime Systems for Data Centric Programming Models  

Science Conference Proceedings (OSTI)

The insatiable demand of high performance computing is being driven by the most computationally intensive applications such as computational chemistry, climate modeling, nuclear physics, etc. The last couple of decades have observed a tremendous rise ... Keywords: PGAS, Communication Runtime Systems, Energy Efficiency

Abhinav Vishnu; Shuaiwen Song; Andres Marquez; Kevin Barker; Darren Kerbyson; Kirk Cameron; Pavan Balaji

2010-12-01T23:59:59.000Z

135

Enhancing the performance of assisted execution runtime systems through hardware/software techniques  

Science Conference Proceedings (OSTI)

To meet the expected performance, future exascale systems will require programmers to increase the level of parallelism of their applications. Novel programming models simplify parallel programming at the cost of increasing runtime overheard. Assisted ... Keywords: assisted execution, exascale, performance, transactional memory

Gokcen Kestor; Roberto Gioiosa; Osman Sabri Unsal; Adrian Cristal; Mateo Valero

2012-06-01T23:59:59.000Z

136

Runtime verification for multicore SoC with high-quality trace data  

Science Conference Proceedings (OSTI)

Multicore System-on-Chip (SoC) implementations of embedded systems are becoming very popular. In these systems it is possible to spread out computations over many cores. On one hand this leads to better energy efficiency if clock frequencies and core ... Keywords: Multicore SoC, embedded system, runtime verification, synchronisation, test driven development, trace data

Rico Backasch; Christian Hochberger; Alexander Weiss; Martin Leucker; Richard Lasslop

2013-03-01T23:59:59.000Z

137

Prototyping a fault-tolerant multiprocessor SoC with run-time fault recovery  

Science Conference Proceedings (OSTI)

Modern integrated circuits (ICs) are becoming increasingly complex. The complexity makes it difficult to design, manufacture and integrate these high performance ICs. The advent of multiprocessor Systems-on-chips (SoCs) makes it even more challenging ... Keywords: fault-tolerance, multiprocessor system, network-on-chip, retargetable simulation, run-time verification, system-on-chip

Xinping Zhu; Wei Qin

2006-07-01T23:59:59.000Z

138

FORODT: Fortran debug routine for the PDP-11 (RT-11). [For run-time debugging  

SciTech Connect

FORODT provides run-time debug features to PDP-11 Fortran programs running with the RT-11 operating system. Digital Equipment Corporation's ODT program has been extended to include Fortran breakpoints, decimal integer and floating point data input, and output options. 3 figures.

Tanner, D.N.

1977-01-01T23:59:59.000Z

139

Designing energy efficient communication runtime systems: a view from PGAS models  

Science Conference Proceedings (OSTI)

As the march to the exascale computing gains momentum, energy consumption of supercomputers has emerged to be the critical roadblock. While architectural innovations are imperative in achieving computing of this scale, it is largely dependent on the ... Keywords: Communication runtime system, DVFS, Energy efficiency, InfiniBand

Abhinav Vishnu; Shuaiwen Song; Andres Marquez; Kevin Barker; Darren Kerbyson; Kirk Cameron; Pavan Balaji

2013-03-01T23:59:59.000Z

140

Investigating Autonomic Runtime Management Strategies for SAMR Applications  

E-Print Network (OSTI)

allocation, data-distribution, load balancing, communica- tion, and coordination. Furthermore, the underlying the performance of SAMR applications in distributed and dynamic Grid execution environments. Key Grid Jingmei Yang,2 Yeliang Zhang,2 Manish Parashar,1 and Salim Hariri2 1 Department of Electrical and Computer

Parashar, Manish

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Environment Environment Photo Gallery A repository for images showing environmental cleanup and protection efforts around the Lab. Click thumbnails to enlarge. Photos arranged by most recent first, horizontal formats before vertical. See Flickr for more sizes and details. Workers sample contents of LANL's Material Disposal Area B (MDA-B) before excavation Workers sample contents of LANL's Material Disposal Area B (MDA-B) before excavation Shipment #159 of TRU waste from LANL to WIPP, 2011 Shipment #159 of TRU waste from LANL to WIPP, 2011 Kathy Johns-Hughes oversees Los Alamos National Laboratory's TRU Waste Program Kathy Johns-Hughes oversees Los Alamos National Laboratory's TRU Waste Program Worker moves drums of transuranic (TRU) waste at a staging area

142

JR: Flexible Distributed Programming in an Extended Java  

Science Conference Proceedings (OSTI)

Abstract: Java provides a clean object-oriented programming model and allows for inherently system-independent programs. Unfortunately, Java has a limited concurrency model, providing only threads and remote method invocation (RMI). The JR programming ...

2001-04-01T23:59:59.000Z

143

Inductive Proof Outlines for Exceptions in Multithreaded Java  

Science Conference Proceedings (OSTI)

In this paper we give an operational semantics and introduce an assertional proof system for exceptions in a multithreaded Java sublanguage. Keywords: Java, exceptions, multi-threading, proof systems

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2006-05-01T23:59:59.000Z

144

Executable specifications for Java programs  

E-Print Network (OSTI)

In this thesis, we present a unified environment for running declarative specifications in the context of an imperative object-oriented programming language. Specifications are Alloy-like, written in first-order relational ...

Milicevic, Aleksandar, S.M. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

145

Environment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73 Federal Register 73 Federal Register / Vol. 77, No. 48 / Monday, March 12, 2012 / Rules and Regulations adopted by voluntary consensus standards bodies. This rule does not use technical standards. Therefore, we did not consider the use of voluntary consensus standards. Environment We have analyzed this rule under Department of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide the Coast Guard in complying with the National Environmental Policy Act of 1969 (NEPA) (42 U.S.C. 4321-4370f), and have concluded this action is one of a category of actions that do not individually or cumulatively have a significant effect on the human environment. This rule is categorically excluded, under figure 2-1, paragraph (34)(g), of the Instruction. This rule

146

JR: Flexible distributed programming in an extended Java  

Science Conference Proceedings (OSTI)

Java provides a clean object-oriented programming model and allows for inherently system-independent programs. Unfortunately, Java has a limited concurrency model, providing only threads and remote method invocation (RMI).The JR programming language ... Keywords: Concurrency, Java, SR, concurrent object-oriented programming

Aaron W. Keen; Tingjian Ge; Justin T. Maris; Ronald A. Olsson

2004-05-01T23:59:59.000Z

147

Discrete-event simulation in Java: a practitioner's experience  

Science Conference Proceedings (OSTI)

The experience of a simulation practitioner with development of a new Java simulation engine and its application to a large simulation model is described. Our simulation engine is implemented as a simple extension of the Java programming language and ... Keywords: Java, discrete-event simulation, parallel processing, practitioner, supply chain

D. H. King; Harvey S. Harrison

2010-07-01T23:59:59.000Z

148

Enterprise JavaBeans 3.1  

Science Conference Proceedings (OSTI)

Learn how to code, package, deploy, and test functional Enterprise JavaBeans with the latest edition of this bestselling guide. Written by the developers of JBoss EJB 3.1, this book not only brings you up to speed on each component type and container ...

Andrew Lee Rubinger; Bill Burke

2010-09-01T23:59:59.000Z

149

Enforcing Secure Object Initialization in Java  

E-Print Network (OSTI)

Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high. The solution currently used to enforce object initialization is to implement a coding pattern proposed by Sun, which is not formally checked. We propose a modular type system to formally specify the initialization policy of libraries or programs and a type checker to statically check at load time that all loaded classes respect the policy. This allows to prove the absence of bugs which have allowed some famous privilege escalations in Java. Our experimental results show that our safe default policy allows to prove 91% of classes of java.lang, java.security and javax.security safe without any annotation and by adding 57 simple annotations we proved all classes but four safe. The type system and its soundness theorem have been formalized and machine checked using Coq.

Hubert, Laurent; Monfort, Vincent; Pichardie, David

2010-01-01T23:59:59.000Z

150

Automatic translation from Circus to Java  

Science Conference Proceedings (OSTI)

Circus is a combination of Z and CSP that supports the development of state-rich reactive systems based on refinement. In this paper we present JCircus, a tool that automatically translates Circus programs into Java, for the purpose of animation and ...

Angela Freitas; Ana Cavalcanti

2006-08-01T23:59:59.000Z

151

Enabling run-time memory data transfer optimizations at the system level with automated extraction of embedded software metadata information  

Science Conference Proceedings (OSTI)

The information about the run-time behavior of software applications is crucial for enabling system level optimizations for embedded systems. This embedded Software Metadata information is especially important today, because several complex multi-threaded ...

Alexandros Bartzas; Miguel Peon-Quiros; Stylianos Mamagkakis; Francky Catthoor; Dimitrios Soudris; Jose M. Mendias

2008-01-01T23:59:59.000Z

152

Formal Development of Safe and Secure Java Card Applets  

E-Print Network (OSTI)

This thesis is concerned with different aspects of JAVA CARD application development and use of formal methods in the JAVA CARD world. JAVA CARD is a technology that provides means to program smart (chip) cards with (a subset of) the JAVA language. The use of formal methods in the JAVA CARD context is highly justified due to the criticality of JAVA CARD applications. First of all, JAVA CARD applications are usually security critical (e.g., authentication, electronic cash), second, they are cost critical (i.e. they are distributed in large amounts making updates quite difficult) and finally, they can also be legally critical (e.g., when the digital signature law is considered). Thus the robustness and correctness of JAVA CARD applications should be enforced by the best means possible, i.e. by the use of formal verification techniques. At the same time JAVA CARD seems to be a good target for formal verification—due to the relative simplicity of JAVA CARD applications (as compared to full JAVA), formal verification becomes a feasible and manageable task. In this thesis, we touch upon different

Wojciech Mostowski; Wojciech Mostowski; C Wojciech Mostowski

2005-01-01T23:59:59.000Z

153

Virtualized Environments for the Harness Workbench  

E-Print Network (OSTI)

Of The Requirements For The Degree Of Master of Science In Network Centered Computing, High Performance Computing of computational sciences today leads to a signicant need of high performance computing systems. High performance to develop an appropriate development and runtime environment for high performance computing platforms

Engelmann, Christian

154

MintEra : a testing environment for Java programs  

E-Print Network (OSTI)

We introduce MintEra, an automatic testcase generator and verifier. Using an simple, easy-to-read yet expressive language called AAL, users can specify representation- invariants and assertions within programs. MintEra ...

Al-Naffouri, Basel Y

2004-01-01T23:59:59.000Z

155

The New Sundanese Peasants' Union: Peasant Movements, Changes in Land Control, and Agrarian Questions in Garut, West Java  

E-Print Network (OSTI)

of the Association of West Java Plantations; and Ir. H.Questions in Garut, West Java *) Noer Fauzi Berkeleyorganization in West Java, Indonesia, was extraordinarily

Fauzi, Noer

2005-01-01T23:59:59.000Z

156

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

157

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

158

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

159

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

160

ParaGraph-RTS: A parallel reduction-based run-time system  

Science Conference Proceedings (OSTI)

We are investigating the use of the functional programming paradigm on multiprocessor computers. We have developed a parallel graph reduction run-time system called ParaGraph-RTS (Parallel Graph Reduction) that provides both significant amounts of exploitable parallelism and the robustness to support development of large scientific codes. This system allows us to empirically investigate the functional programming paradigm within computationally intensive application domains. In this paper, we describe an implementation of ParaGraph-RTS on a shared-memory multiprocessor. The implementation strategy reflects insights gained through performance characterizations of the reduction process. Preliminary performance results and analyses are presented. 8 refs., 4 figs.

Yantis, B.; Rich, D.; Michelsen, R.

1989-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

OpenMath and Java for Math Education - CECM  

E-Print Network (OSTI)

The intent of this web page is to organize resources and information related to the development of OpenMath compliant Java based web applications for math ...

162

Main-Memory Management to Support Orthogonal Persistence for Java  

E-Print Network (OSTI)

Daynes,L. Atkinson,M.P. Proceedings of the Second International Workshop on Persistence and Java pp 37-60

Daynes, L.

163

Instructional JAVA modules based on molecular simulation - TMS  

Science Conference Proceedings (OSTI)

Nov 9, 2007 ... This website contains a selection of instructional JAVA modules designed to increase understanding of molecular simulations and molecular ...

164

Redefining Agrarian Power: Resurgent Agrarian Movements in West Java, Indonesia  

E-Print Network (OSTI)

Movements in West Java, Indonesia Suraya Afiff Noer Fauzienvironmental change in Indonesia since 1985. She receivedenvironmental change in Indonesia since the 1990s. In Fall

Afiff, Suraya; Fauzi, Noer; Hart, Gillian; Ntsebeza, Lungisile; Peluso, Nancy

2005-01-01T23:59:59.000Z

165

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Oracle Java SE Critical Patch Update Advisory - June 2011 41: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

166

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2011 1: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

167

RTZen: Highly Predictable, Real-time Java Middleware for Distributed and Embedded Systems  

E-Print Network (OSTI)

Real-Time Speci?cation for Java. Addison-Wesley (2000) 8.Vitek, J. : Real-time java scoped memory: Design patternsof the jRate Real-Time Java Implementation. In Meersman,

Raman, Krishna; Zhang, Yue; Panahi, Mark; Colmenares, Juan A; Klefstad, Raymond; Harmon, Trevor

2005-01-01T23:59:59.000Z

168

Review of Correspondence Analysis and Data Coding with Java and R  

E-Print Network (OSTI)

and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

de Leeuw, Jan

2005-01-01T23:59:59.000Z

169

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

170

Review of Correspondence Analysis and Data Coding with Java and R  

E-Print Network (OSTI)

and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

Jan de Leeuw

2011-01-01T23:59:59.000Z

171

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which...

172

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary...

173

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

174

Object Oriented Verification Kernels for Secure Java Applications  

Science Conference Proceedings (OSTI)

This paper presents an approach to the verification of large Java programs. The focus lies on programs that implement a distributed communicating system e.g. in a Mor E-Commerce scenario. When trying to verify such programs, thousands of Java classes ...

Holger Grandy; Kurt Stenzel; Wolfgang Reif

2005-09-01T23:59:59.000Z

175

Proceedings of the Second International Workshop on Persistence and Java  

Science Conference Proceedings (OSTI)

These proceedings record the Second International Workshop on Persistence and Java, that was held in Half Moon Bay in the San Francisco Bay Area, in August 1997. The focus of the workshop series is the relationship between the Java platform and longterm ...

Malcolm Atkinson; Mick Jordan

1997-12-01T23:59:59.000Z

176

Another step towards a smart compilation manager for Java  

Science Conference Proceedings (OSTI)

In a recent work we have proposed a compilation strategy (that is, a way to decide which unchanged sources have to be recompiled) for a substantial subset of Java which has been shown to be sound and minimal. That is, an unchanged source ... Keywords: Java, separate compilation

G. Lagorio

2004-03-01T23:59:59.000Z

177

CS1, arcade games and the free Java book  

Science Conference Proceedings (OSTI)

Computer game programming has been adopted by some instructors and schools in an effort to motivate students and make the learning more relevant to the student's world than the console programs many of their instructors learned with. This paper describes ... Keywords: acm java, cs1, free java book, games

Daniel L. Schuster

2010-03-01T23:59:59.000Z

178

JAVA SWING-BASED PLOTTING PACKAGE RESIDING WITHIN XAL  

Science Conference Proceedings (OSTI)

A data plotting package residing in the XAL tools set is presented. This package is based on Java SWING, and therefore it has the same portability as Java itself. The data types for charts, bar-charts, and color-surface plots are described. The algorithms, performance, interactive capabilities, limitations, and the best usage practices of this plotting package are discussed.

Shishlo, Andrei P [ORNL; Chu, Paul [Stanford University; Pelaia II, Tom [ORNL

2007-01-01T23:59:59.000Z

179

Groebner bases in Java with applications in computer graphics  

E-Print Network (OSTI)

In this paper we present a Java implementation of the algorithm that computes Buchbereger's and reduced Groebner's basis step by step. The Java application enables graphical representation of the intersection of two surfaces in 3-dimensional space and determines conditions of existence and planarity of the intersection.

Malesevic, Branko; Campara, Milan

2010-01-01T23:59:59.000Z

180

Towards a program logic for JavaScript  

Science Conference Proceedings (OSTI)

JavaScript has become the most widely used language for client-side web programming. The dynamic nature of JavaScript makes understanding its code notoriously difficult, leading to buggy programs and a lack of adequate static-analysis tools. We believe ... Keywords: javascript, separation logic, web

Philippa Anne Gardner; Sergio Maffeis; Gareth David Smith

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Software application implement in java for electrical lines dimensioning  

Science Conference Proceedings (OSTI)

In this paper it was present a software package implemented in java useful for dimensioning of low voltage lines mono phase and three phases (AC and DC). The modeled networks are tree type. This software with graphical user interface allows the estimation ... Keywords: computer software, electrical lines, java, optimal dimensioning

Cristian Abrudean; Manuela Panoiu

2008-11-01T23:59:59.000Z

182

RTVR: a flexible java library for interactive volume rendering  

Science Conference Proceedings (OSTI)

This paper presents several distinguishing design features of RTVR - a Java-based library for real-time volume rendering. We describe, how the careful design of data structures, which in our case are based on voxel enumeration, and an intelligent use ... Keywords: interactive volume visualization, internet-based visualization, java

Lukas Mroz; Helwig Hauser

2001-10-01T23:59:59.000Z

183

Java-Applet For Radio Spectra Analysis  

E-Print Network (OSTI)

New services for Clusters of Galaxies Database created in the Astronomical Institute of SPbU have been constructed. The detailed description of database and its content is available at http://www.astro.spbu.ru/CLUSTERS/. The information contained in the database can be used for solution of the specific astronomical problems. One of these problems is the researches of radio emission spectra of clusters' objects. The researches can give help in solution of the problems of origin and evolution of extragalactic radio sources. Spectra of radio galaxies contain important information about radio power in the processes responsible for their activity. This report presents the software for the database that provides work with radio spectra of extragalactic sources. This client-application has been released as the Java-applet and thus provides a Web based interface that is supported on many operating systems. The facilities of the applet such as approximations of spectra measurement points and calculation of spectral parameters are illustrated in the report. Also we demonstrate new version of the application that realized on Java2 and gave access to additional functions such as printing.

A. S. Trushkina; A. G. Gubanov

2000-12-29T23:59:59.000Z

184

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

185

Geyser-1: a MIPS R3000 CPU core with fine-grained run-time power gating  

Science Conference Proceedings (OSTI)

Geyser-1 is a MIPS CPU which provides a fine-grained run-time power gating (PG) controlled by instructions. Unlike traditional PGs, it uses special standard cells in which the virtual ground (VGND) is separated from the real ground, and a certain number ...

D. Ikebuchi; N. Seki; Y. Kojima; M. Kamata; L. Zhao; H. Amano; T. Shirai; S. Koyama; T. Hashida; Y. Umahashi; H. Masuda; K. Usami; S. Takeda; H. Nakamura; M. Namiki; M. Kondo

2010-01-01T23:59:59.000Z

186

MUST: A Scalable Approach to Runtime Error Detection in MPI Programs  

Science Conference Proceedings (OSTI)

The Message-Passing Interface (MPI) is large and complex. Therefore, programming MPI is error prone. Several MPI runtime correctness tools address classes of usage errors, such as deadlocks or nonportable constructs. To our knowledge none of these tools scales to more than about 100 processes. However, some of the current HPC systems use more than 100,000 cores and future systems are expected to use far more. Since errors often depend on the task count used, we need correctness tools that scale to the full system size. We present a novel framework for scalable MPI correctness tools to address this need. Our fine-grained, module-based approach supports rapid prototyping and allows correctness tools built upon it to adapt to different architectures and use cases. The design uses PnMPI to instantiate a tool from a set of individual modules. We present an overview of our design, along with first performance results for a proof of concept implementation.

Hilbrich, T; Schulz, M; de Supinski, B R; Muller, M

2010-03-24T23:59:59.000Z

187

T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 June 30, 2011 - 3:22pm Addthis PROBLEM: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 PLATFORM: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.6 and later, Mac OS X Server v10.6.6 and later ABSTRACT: Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26. Further information is available via the Java

188

SoapRMI C++/Java 1.1: Design and Implementation  

E-Print Network (OSTI)

Java RMI provides a simple and elegant paradigm for communication with objects in remote address spaces. RMI is a de facto standard for communication in distributed systems that are written in different languages and optimized to run in disparate environments. XML [10] has emerged as a promising standard for language-independent data representation, and HTTP as a widely-used firewall-friendly network protocol. It is now possible to design and develop a communication system that combines the elegance and strength of Java RMI with the ubiquity of HTTP and platform and language independence of XML. SOAP [12] defines XML based communication and SOAP RPC precisely states the protocol for using XML as the data format and HTTP as the network protocol. This paper presents the design issues in layering a C++ and Java based RMI system on top of SOAP RPC along with an efficient XML Pull Parser that we designed to parse SOAP calls. We explain the various features of the resulting SoapRMI system: dynamic proxies, stub-skeleton generation from XML specification, interoperability, exception handling and different "Naming" services. Key Words: RMI, Distributed Systems, XML, SOAP, Naming 1

Aleksander Slominski; Madhusudhan Govindaraju; Dennis Gannon; Randall Bramley

2001-01-01T23:59:59.000Z

189

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

190

Object-Oriented Programming 2CSE 1325: Object-Oriented Programming in Java  

E-Print Network (OSTI)

1 Object-Oriented Programming in Java 2CSE 1325: Object-Oriented Programming in Java Take control, practice! #12;2 3CSE 1325: Object-Oriented Programming in Java Course Contents · Introduction to object-oriented large, high-quality software systems. 4CSE 1325: Object-Oriented Programming in Java Buzzwords

Lei, Jeff Yu

191

FAMIX Java language plugin 1.0 Author Sander Tichelaar (tichel@iam.unibe.ch)  

E-Print Network (OSTI)

packages in Java map directly to the directory structure of source code, i.e. the source code for a certain parameters and local variables 1.1.x ­> 1.2.x: ­ Addition of a new keyword (strictfp) #12; 3.2 Package (interpreted) Package Figure 2: Package A Package maps in Java to the Java package construct. Packages in Java

Nierstrasz, Oscar

192

Prototyping Faithful Execution in a Java virtual machine.  

SciTech Connect

This report presents the implementation of a stateless scheme for Faithful Execution, the design for which is presented in a companion report, ''Principles of Faithful Execution in the Implementation of Trusted Objects'' (SAND 2003-2328). We added a simple cryptographic capability to an already simplified class loader and its associated Java Virtual Machine (JVM) to provide a byte-level implementation of Faithful Execution. The extended class loader and JVM we refer to collectively as the Sandia Faithfully Executing Java architecture (or JavaFE for short). This prototype is intended to enable exploration of more sophisticated techniques which we intend to implement in hardware.

Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

2003-09-01T23:59:59.000Z

193

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

194

Java Automation Controller and Real-Time Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Java Automation Controller and Real-Time Systems Java Automation Controller and Real-Time Systems Speaker(s): Greg Bollella Date: June 29, 2009 - 12:00pm Location: 90-3122 Java has always been a disruptive technology and now it is breaking the mold in industrial, process, building, and transportation automation systems. For many years, programmable logic controllers (PLCs), the digital versions of old relay-based control systems (such as that used in the NYC Subway system in the late 1800s) have primarily controlled these systems. PLCs are the workhorses of the controls industry but the market is characterized by proprietary, closed, expensive, special-purpose solutions. A Java-based automation controller breaks the mold by allowing control algorithms, which require strict real-time capabilities, to run on

195

A Deductive Proof System for Multithreaded Java with Exceptions  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides that, the language offers a flexible exception mechanism for handling errors or ...

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2008-07-01T23:59:59.000Z

196

Visualising Memory Graphs: Interactive Debugging using Java3D  

E-Print Network (OSTI)

that three dimensional visualisation cau be a useful tool for debugging, program analysis, and a viable - 3D Modelling in Java 6 3 Requirements 9 4 Design 10 4.1 Preliminaries 10 4.1.1 Creating

Oxford, University of

197

A Deductive Proof System for Multithreaded Java with Exceptions  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides that, the language offers a flexible exception mechanism for handling errors or ...

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2008-12-01T23:59:59.000Z

198

Automatic certification of Java source code in rewriting logic  

Science Conference Proceedings (OSTI)

In this paper we propose an abstract certification techniquefor Java which is based on rewriting logic, a very general logical and semanticframework efficiently implemented in the functional programminglanguage Maude. Starting from a specification of ...

Mauricio Alba-Castro; María Alpuente; Santiago Escobar

2007-07-01T23:59:59.000Z

199

Pointer analysis for Java programs : novel techniques and applications  

E-Print Network (OSTI)

This dissertation presents a pointer analysis for Java programs, together with several practical analysis applications. For each program point, the analysis is able to construct a points-to graph that describes how local ...

S?lcianu, Alexandru D. (Alexandru Doru), 1975-

2006-01-01T23:59:59.000Z

200

Implementing fast javaTM monitors with relaxed-locks  

Science Conference Proceedings (OSTI)

The JavaTM Programming Language permits synchronization operations (lock, unlock, wait, notify) on any object. Synchronization is very common in applications and is endemic in the library code upon which applications depend. It is therefore ...

David Dice

2001-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Predictability of Java Monsoon Rainfall Anomalies: A Case Study  

Science Conference Proceedings (OSTI)

A substantial portion of the interannual variability of rainfall at Jakarta, Java, can be predicted from antecedent pressure anomalies at Darwin, northern Australia; the pressure persistence, the concurrent correlation of pressure and rainfall, ...

Stefan Hastenrath

1987-01-01T23:59:59.000Z

202

Swizzle barrier optimizations for orthogonal persistence in Java  

E-Print Network (OSTI)

Brahnmath,K. Nystrom,N. Hosking,A.L. Cutts,Q.I. Proceedings of the Third International Workshop on Persistence and Java (Tiburon, California, September 1998), Advances in Persistent Object Systems pp 268-278 Morgan Kaufmann

Brahnmath, K.; Nystrom, N.; Hosking, A.L.; Cutts, Q.I.

203

Refactoring Sequential Java Code for Concurrency via Concurrent Libraries  

E-Print Network (OSTI)

Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 packagejava.util.concurrent (j.u.c.) supports writing concurrent programs: much of the complexity of writing threads-safe and ...

Ernst, Michael D.

2008-09-30T23:59:59.000Z

204

Analysing, Profiling and Optimising Orthogonal Persistence for Java  

E-Print Network (OSTI)

Cutts,Q.I. Hosking,A. Proceedings of the Second International Workshop on Persistence and Java (PJW2), Half Moon Bay, CA, USA (Atkinson, M., Jordan, M. Eds) pp 107-115 Sun Microsystems Inc.

Cutts, Q.I.

205

Java Performance for Scientific Applications on LLNL Computer Systems  

Science Conference Proceedings (OSTI)

Languages in use for high performance computing at the laboratory--Fortran (f77 and f90), C, and C++--have many years of development behind them and are generally considered the fastest available. However, Fortran and C do not readily extend to object-oriented programming models, limiting their capability for very complex simulation software. C++ facilitates object-oriented programming but is a very complex and error-prone language. Java offers a number of capabilities that these other languages do not. For instance it implements cleaner (i.e., easier to use and less prone to errors) object-oriented models than C++. It also offers networking and security as part of the language standard, and cross-platform executables that make it architecture neutral, to name a few. These features have made Java very popular for industrial computing applications. The aim of this paper is to explain the trade-offs in using Java for large-scale scientific applications at LLNL. Despite its advantages, the computational science community has been reluctant to write large-scale computationally intensive applications in Java due to concerns over its poor performance. However, considerable progress has been made over the last several years. The Java Grande Forum [1] has been promoting the use of Java for large-scale computing. Members have introduced efficient array libraries, developed fast just-in-time (JIT) compilers, and built links to existing packages used in high performance parallel computing.

Kapfer, C; Wissink, A

2002-05-10T23:59:59.000Z

206

Scoped Types for Real-time Java University of Wisconsin Milwaukee  

E-Print Network (OSTI)

packages that contain scoped types scoped packages. Scoped packages are the unit of protection. The program's static structure consists of two packages a and a.b. At runtime two instance of the gate class B enter scopes induces a runtime structure on scopes that determines permissible reference patterns. When

Vitek, Jan

207

Machine Learning Based Online Performance Prediction for Runtime Parallelization and Task Scheduling  

Science Conference Proceedings (OSTI)

With the emerging many-core paradigm, parallel programming must extend beyond its traditional realm of scientific applications. Converting existing sequential applications as well as developing next-generation software requires assistance from hardware, compilers and runtime systems to exploit parallelism transparently within applications. These systems must decompose applications into tasks that can be executed in parallel and then schedule those tasks to minimize load imbalance. However, many systems lack a priori knowledge about the execution time of all tasks to perform effective load balancing with low scheduling overhead. In this paper, we approach this fundamental problem using machine learning techniques first to generate performance models for all tasks and then applying those models to perform automatic performance prediction across program executions. We also extend an existing scheduling algorithm to use generated task cost estimates for online task partitioning and scheduling. We implement the above techniques in the pR framework, which transparently parallelizes scripts in the popular R language, and evaluate their performance and overhead with both a real-world application and a large number of synthetic representative test scripts. Our experimental results show that our proposed approach significantly improves task partitioning and scheduling, with maximum improvements of 21.8%, 40.3% and 22.1% and average improvements of 15.9%, 16.9% and 4.2% for LMM (a real R application) and synthetic test cases with independent and dependent tasks, respectively.

Li, J; Ma, X; Singh, K; Schulz, M; de Supinski, B R; McKee, S A

2008-10-09T23:59:59.000Z

208

Data Parallel Execution Challenges and Runtime Performance of Agent Simulations on GPUs  

Science Conference Proceedings (OSTI)

Programmable graphics processing units (GPUs) have emerged as excellent computational platforms for certain general-purpose applications. The data parallel execution capabilities of GPUs specifically point to the potential for effective use in simulations of agent-based models (ABM). In this paper, the computational efficiency of ABM simulation on GPUs is evaluated on representative ABM benchmarks. The runtime speed of GPU-based models is compared to that of traditional CPU-based implementation, and also to that of equivalent models in traditional ABM toolkits (Repast and NetLogo). As expected, it is observed that, GPU-based ABM execution affords excellent speedup on simple models, with better speedup on models exhibiting good locality and fair amount of computation per memory element. Execution is two to three orders of magnitude faster with a GPU than with leading ABM toolkits, but at the cost of decrease in modularity, ease of programmability and reusability. At a more fundamental level, however, the data parallel paradigm is found to be somewhat at odds with traditional model-specification approaches for ABM. Effective use of data parallel execution, in general, seems to require resolution of modeling and execution challenges. Some of the challenges are identified and related solution approaches are described.

Perumalla, Kalyan S [ORNL; Aaby, Brandon G [ORNL

2008-01-01T23:59:59.000Z

209

A Political Ecology of the Citarum River Basin: Exploring "Integrated Water Resources Management" in West Java, Indonesia  

E-Print Network (OSTI)

Management” in West Java, Indonesia By Jenna CavelleBandung in the province of West Java 1 . From here the rivermakes its exodus at the Java Sea slightly east of Indonesia’

Cavelle, Jenna

2013-01-01T23:59:59.000Z

210

Power, Labor, and Livelihood: Processes of Change in Rural Java: Notes and Reflections on a Village Revisited  

E-Print Network (OSTI)

two upland villages in Central Java. We returned to one ofDevelopment in Rural Java: A Study of the OrganizationalKecamatan Cibadak, West Java, and Kecamatan Kendal, Central

Hart, Gillian

2004-01-01T23:59:59.000Z

211

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

212

Jeannie: Granting Java native interface developers their wishes  

E-Print Network (OSTI)

Higher-level languages interface with lower-level languages such as C to access platform functionality, reuse legacy libraries, or improve performance. This raises the issue of how to best integrate different languages while also reconciling productivity, safety, portability, and efficiency. This paper presents Jeannie, a new language design for integrating Java with C. In Jeannie, both Java and C code are nested within each other in the same file and compile down to JNI, the Java platform’s standard foreign function interface. By combining the two languages ’ syntax and semantics, Jeannie eliminates verbose boiler-plate code, enables static error detection across the language boundary, and simplifies dynamic resource management. We describe the Jeannie language and its compiler, while also highlighting lessons from composing two mature programming languages.

Martin Hirzel; Robert Grimm

2007-01-01T23:59:59.000Z

213

Add Java extensions to your wiki: Java applets can bring dynamic functionality to your wiki pages  

SciTech Connect

Virtually everyone familiar with today’s world wide web has encountered the free online encyclopedia Wikipedia many times. What you may not know is that Wikipedia is driven by an excellent open-source product called MediaWiki which is available to anyone for free. This has led to a proliferation of wiki sites devoted to just about any topic one can imagine. Users of a wiki can add content -- all that is required of them is that they type in their additions into their web browsers using the simple markup language called wikitext. Even better, the developers of wikitext made it extensible. With a little server-side development of your own, you can add your own custom syntax. Users aware of your extensions can then utilize them on their wiki pages with a few simple keystrokes. These extensions can be custom decorations, formatting, web applications, and even instances of the venerable old Java applet. One example of a Java applet extension is the Jmol extension (REF), used to embed a 3-D molecular viewer. This article will walk you through the deployment of a fairly elaborate applet via a MediaWiki extension. By no means exhaustive -- an entire book would be required for that -- it will demonstrate how to give the applet resize handles using using a little Javascript and CSS coding and some popular Javascript libraries. It even describes how a user may customize the extension somewhat using a wiki template. Finally, it explains a rudimentary persistence mechanism which allows applets to save data directly to the wiki pages on which they reside.

Scarberry, Randall E.

2008-08-12T23:59:59.000Z

214

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

215

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

216

V-143: Fresh Java issues being exploited in the wild | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Fresh Java issues being exploited in the wild 3: Fresh Java issues being exploited in the wild V-143: Fresh Java issues being exploited in the wild April 26, 2013 - 6:00am Addthis PROBLEM: A new Metasploit module for the Java 7u17 sandbox bypass emerged PLATFORM: All versions of Java SE-7 (including the recently released 1.7.0_21-b11) ABSTRACT: Java issues are being exploited in the wild by exploit kits, with Cool and Redkit specifically being known to use these bugs, and others likely to follow shortly. REFERENCE LINKS: SecList SE-2012-01 Security Explorations IMPACT ASSESSMENT: Medium DISCUSSION: It can be used to achieve a complete Java security sandbox bypass on a target system. IMPACT: Manipulation of data System access SOLUTION: Vendor recommends patch systems immediately Addthis Related Articles V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

217

JACK: a tool for validation of security and behaviour of Java applications  

Science Conference Proceedings (OSTI)

We describe the main features of JACK (Java Applet Correctness Kit), a tool for the validation of Java applications, annotated with JML specifications. JACK has been especially designed to improve the quality of trusted personal device applications. ...

Gilles Barthe; Lilian Burdy; Julien Charles; Benjamin Grégoire; Marieke Huisman; Jean-Louis Lanet; Mariela Pavlova; Antoine Requet

2006-11-01T23:59:59.000Z

218

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

219

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service...

220

V-072: Red Hat update for java-1.7.0-openjdk | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for...

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Concurrencer: a tool for retrofitting concurrency into sequential Java applications via concurrent libraries  

E-Print Network (OSTI)

Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 package java.util.concurrent (j.u.c.) supports writing concurrent programs. To use this package, programmers still need to ...

Dig, Danny

222

6.092 Introduction to Software Engineering in Java, January (IAP) 2009  

E-Print Network (OSTI)

This course is an introduction to Java programming and software engineering. It is designed for those who have little or no programming experience in Java and covers concepts useful to 6.005. The focus is on developing ...

Jones, Evan

223

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

224

Implementing the Gaia Astrometric Global Iterative Solution (AGIS) in Java  

E-Print Network (OSTI)

This paper provides a description of the Java software framework which has been constructed to run the Astrometric Global Iterative Solution for the Gaia mission. This is the mathematical framework to provide the rigid reference frame for Gaia observations from the Gaia data itself. This process makes Gaia a self calibrated, and input catalogue independent, mission. The framework is highly distributed typically running on a cluster of machines with a database back end. All code is written in the Java language. We describe the overall architecture and some of the details of the implementation.

O'Mullane, William; Lindegren, Lennart; Hernandez, Jose; Hobbs, David

2011-01-01T23:59:59.000Z

225

Object-oriented Programming Laws for Annotated Java Programs  

E-Print Network (OSTI)

Object-oriented programming laws have been proposed in the context of languages that are not combined with a behavioral interface specification language (BISL). The strong dependence between source-code and interface specifications may cause a number of difficulties when transforming programs. In this paper we introduce a set of programming laws for object-oriented languages like Java combined with the Java Modeling Language (JML). The set of laws deals with object-oriented features taking into account their specifications. Some laws deal only with features of the specification language. These laws constitute a set of small transformations for the development of more elaborate ones like refactorings.

Freitas, Gabriel Falconieri; Massoni, Tiago; Gheyi, Rohit; 10.4204/EPTCS.21.6

2010-01-01T23:59:59.000Z

226

A Non-Null Annotation Inferencer for Java Bytecode  

E-Print Network (OSTI)

We present a non-null annotations inferencer for the Java bytecode language. We previously proposed an analysis to infer non-null annotations and proved it soundness and completeness with respect to a state of the art type system. This paper proposes extensions to our former analysis in order to deal with the Java bytecode language. We have implemented both analyses and compared their behaviour on several benchmarks. The results show a substantial improvement in the precision and, despite being a whole-program analysis, production applications can be analyzed within minutes.

Hubert, Laurent

2010-01-01T23:59:59.000Z

227

Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics  

Science Conference Proceedings (OSTI)

Java+ITP is an experimental tool for the verification of properties of a sequential imperative subset of the Java language. It is based on an algebraic continuation passing style (CPS) semantics of this fragment as an equational theory in Maude. It supports ... Keywords: Hoare logic, Java, algebraic semantics, program verification

Ralf Sasse; José Meseguer

2007-07-01T23:59:59.000Z

228

Development of Java multi-threaded simulation for chemical reacting flow of ethanol  

Science Conference Proceedings (OSTI)

Multi-threading in Java enhances computational performance and facilitates the development of parallel software. To obtain high performance on multi-core systems, this study develops a multi-threaded simulation code using Java for the chemical reacting ... Keywords: Benchmark, Chemical reaction, Computational fluid dynamics, Ethanol detonation, Java, Multi-thread

E. Yamada; T. Shimada; A. K. Hayashi

2012-12-01T23:59:59.000Z

229

The Use of Java in High Performance Computing: A Data Mining Example  

E-Print Network (OSTI)

The Use of Java in High Performance Computing: A Data Mining Example David Walker and Omer Rana in high performance computing is discussed with particular reference to the efforts of the Java Grande Java, Parallel Computing, Neu­ ral Networks, Distributed Objects 1 Introduction High performance

Walker, David W.

230

V-137: Apple Mac OS X update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apple Mac OS X update for Java V-137: Apple Mac OS X update for Java April 18, 2013 - 6:00am Addthis PROBLEM: Apple Mac OS X update for Java PLATFORM: Mac OS X 10.6, OS X Lion...

231

Poplar: Java composition with labels and AI planning  

Science Conference Proceedings (OSTI)

Class evolution in object-oriented programming often causes so-called breaking changes, largely because of the rigidity of component interconnections in the form of explicit method calls and field accesses. We present a Java extension, Poplar, which ... Keywords: adaptation, ai planning, code synthesis, components, composition, evolution, object-oriented programming, protocols

Johan T. Nyström Persson; Shinichi Honiden

2011-10-01T23:59:59.000Z

232

Expanding and extending the security features of java  

Science Conference Proceedings (OSTI)

The popularity of the web has had several significant impacts, two of note here: (1) increasing sophistication of web pages, including more regular use of Java and other mobile code, and (2) decreasing average level of sophistication as the user population ...

Nimisha V. Mehta; Karen R. Sollins

1998-01-01T23:59:59.000Z

233

Nested parallelism for multi-core HPC systems using Java  

Science Conference Proceedings (OSTI)

Since its introduction in 1993, the Message Passing Interface (MPI) has become a de facto standard for writing High Performance Computing (HPC) applications on clusters and Massively Parallel Processors (MPPs). The recent emergence of multi-core processor ... Keywords: Java MPI, MPJ, MPJ express, Multi-core messaging

Aamir Shafi; Bryan Carpenter; Mark Baker

2009-06-01T23:59:59.000Z

234

HEP data analysis using jHepWork and Java  

E-Print Network (OSTI)

A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

Chekanov, S

2008-01-01T23:59:59.000Z

235

A Combined Pointer and Purity Analysis for Java Programs  

E-Print Network (OSTI)

We present a new method purity analysis for Java programs.A method is pure if it does not mutate any location that exists in the program state right before method invocation.Our analysis is built on top of a combined pointer ...

Salcianu, Alexandru

2004-05-17T23:59:59.000Z

236

HEP data analysis using jHepWork and Java  

E-Print Network (OSTI)

A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

S. Chekanov

2008-09-04T23:59:59.000Z

237

jYang : A YANG parser in java  

E-Print Network (OSTI)

The NETCONF con?guration protocol of the IETF Network Work- ing Group provides mechanisms to manipulate the con?guration of network devices. YANG is the language currently under consideration within the IETF to specify the data models to be used in NETCONF . This report describes the design and development of a syntax and semantics parser for YANG in java.

Nataf, Emmanuel

2009-01-01T23:59:59.000Z

238

Refactoring Composite to Visitor and Inverse Transformation in Java  

E-Print Network (OSTI)

We describe how to use refactoring tools to transform a Java program conforming to the Composite design pattern into a program conforming to the Visitor design pattern with the same external behavior. We also describe the inverse transformation. We use the refactoring tools provided by IntelliJ IDEA and Eclipse.

Ajouli, Akram

2011-01-01T23:59:59.000Z

239

HEP data analysis using jHepWork and Java.  

SciTech Connect

A role of Java in high-energy physics (HEP) and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

Chekanov, S.; High Energy Physics

2009-03-23T23:59:59.000Z

240

Supplement V.F: Packages For Introduction to Java Programming  

E-Print Network (OSTI)

. · To protect classes. Packages provide protection so that the protected members of the classes are accessible of the package name and the file system directory structure. For the package named com.prenhall.mypackage, youSupplement V.F: Packages For Introduction to Java Programming By Y. Daniel Liang 1 Introduction

Liang, Y. Daniel

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Java^TM RemoteMethod Invocation Specification  

E-Print Network (OSTI)

2.7 Exception Handling in Remote Method Invocation. . . . . 11 2.8 Object Methods Overridden Handling in Remote Method Invocation . Object Methods Overridden by the RemoteObject Class . The Semantics.7 Exception Handling in Remote Method Invocation Since remote methods include java.rmi.Remote

Demurjian, Steven A.

242

A uGNI-Based Asynchronous Message-driven Runtime System for Cray Supercomputers with Gemini Interconnect  

SciTech Connect

Gemini as the network for new Cray XE/XT systems features low latency, high bandwidth and strong scalability. Its hardware support for remote direct memory access enables efficient implementation of the global address space programming languages. Although the Generic Network Interface (GNI) is designed to support message-passing applications, it is still challenging to attain good performance for applications written in alternative programming models, such as the message-driven programming model. In our earlier work we showed that CHARM++, an object-oriented message-driven programming model, scales up to the full Jaguar Cray machine. In this paper, we describe a general and light-weight asynchronous Low-level RunTime System (LRTS) for CHARM+, and its implementation on the uGNI software stack for Cray XE systems. Several techniques are presented to exploit the uGNI capability by reducing memory copy and registration overhead, taking advantage of persistent communication, and improving intra-node communication. Our micro-benchmark results demonstrate that the uGNI-based runtime system outperforms the MPI-based implementation by up to 50% in terms of message latency. For communication intensive applications such as N-Queens, this implementation scales up to 15,360 cores of a Cray XE6 machine and is 70% faster than an MPI-based implementation. In molecular dynamics application NAMD, the performance is also considerably improved by as high as 18%.

Sun, Yanhua [University of Illinois, Urbana-Champaign; Zheng, Gengbin [University of Illinois, Urbana-Champaign; Olson, Ryan M [Cray, Inc.; Jones, Terry R [ORNL; Kale, Laxmikant V [University of Illinois, Urbana-Champaign

2012-01-01T23:59:59.000Z

243

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

05:Oracle Java SE Critical Patch Update Advisory 05:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

244

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5:Oracle Java SE Critical Patch Update Advisory 5:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

245

FAMIX Java language plug-in 1.0 Author Sander Tichelaar (tichel@iam.unibe.ch)  

E-Print Network (OSTI)

packages in Java map directly to the directory structure of source code, i.e. the source code for a certain parameters and local variables 1.1.x -> 1.2.x: - Addition of a new keyword (strictfp) #12;3.2 Package (interpreted) Package Figure 2: Package A Package maps in Java to the Java package construct. Packages in Java

Nierstrasz, Oscar

246

Poplar: A Java Extension for Evolvable Component Integration  

E-Print Network (OSTI)

The Java programming language contains many features that aid component-based software development (CBSD), such as interfaces, visibility levels, and strong support for encapsulation. However, component evolution often causes so-called breaking changes, largely because of the rigidity of component interconnections in the form of explicit method calls and field accesses. We present a Java extension, Poplar, which we are currently developing. In Poplar, inter-component dependencies are expressed using declarative queries; concrete linking code, generated using a planning algorithm, replaces these at compile time. Poplar includes a minimal specification language based on typestate-like protocols and labels, and a lightweight effect system, which ensures the absence of unwanted interference between hand-written code and generated code. We give several examples of fully automatic component integration using Poplar, and demonstrate its potential to simplify object-oriented software development greatly through evolv...

Nyström-Persson, Johan

2011-01-01T23:59:59.000Z

247

Java Technology : a Strategic Solution for Interactive Distributed Applications  

E-Print Network (OSTI)

In a world demanding the best performance from financial investments, distributed applications occupy the first place among the proposed solutions. This particularity is due to their distributed architecture which is able to acheives high performance. Currently, many research works aim to develop tools that facilitate the implementation of such applications. The urgent need for such applications in all areas pushes researchers to accelerate this process. However, the lack of standardization results in the absence of strategic decisions taken by computer science community. In this article, we argue that Java technology represents an elegant compromise ahead of the list of the currently available solutions. In fact, by promoting the independence of hardware and software, Java technology makes it possible to overcome pitfalls that are inherent to the creation of distributed applications.

Alustwani, Husam; Mostefaoui, Ahmed; Salomon, Michel

2009-01-01T23:59:59.000Z

248

Creating A Model HTTP Server Program Using java  

E-Print Network (OSTI)

HTTP Server is a computer programs that serves webpage content to clients. A webpage is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a computer screen. This information is usually in HTML format, and may provide navigation to other webpage's via hypertext links. WebPages may be retrieved from a local computer or from a remote HTTP Server. WebPages are requested and served from HTTP Servers using Hypertext Transfer Protocol (HTTP). WebPages may consist of files of static or dynamic text stored within the HTTP Server's file system. Client-side scripting can make WebPages more responsive to user input once in the client browser. This paper encompasses the creation of HTTP server program using java language, which is basically supporting for HTML and JavaScript.

Veerasamy, Bala Dhandayuthapani

2010-01-01T23:59:59.000Z

249

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

250

GIS on the fly » to realize wireless GIS network by Java mobile phone  

E-Print Network (OSTI)

Java cellular phone has arrived in the marketplace as the latest device of a mobile gear. The gear is very compact, allowing 10KB for Java program size and 5KB for data size. Although small in size, it features innovative computer system architecture. Java program can be sent dynamically to the gear in a streaming manner over wireless network. In addition, compared to conventional mobile computers, Java cell phone is very cheap both in hardware price and in communication cost. Java cell phone has an enormous potential as a mobile gear. In this paper, we discuss our trial of constructing a extensive wireless GIS network by utilizing Java cell phone as a GIS terminal. 1.

Shuichi Takino

2001-01-01T23:59:59.000Z

251

Radiation modeling using the Uintah heterogeneous CPU/GPU runtime system  

Science Conference Proceedings (OSTI)

The Uintah Computational Framework was developed to provide an environment for solving fluid-structure interaction problems on structured adaptive grids on large-scale, long-running, data-intensive problems. Uintah uses a combination of fluid-flow solvers ... Keywords: GPU, Keeneland, TitanDev, Uintah, adaptive, heterogeneous systems, hybrid parallelism, parallel, scalability

Alan Humphrey; Qingyu Meng; Martin Berzins; Todd Harman

2012-07-01T23:59:59.000Z

252

Java on the MScIT Course at the University of Glasgow  

E-Print Network (OSTI)

Poet,R.R. Belhadj-Mostefa,K. Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University)

Poet, R.R.; Belhadj-Mostefa, K.; Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University) [More Details

253

Integrating multiple clinical information systems using the Java message service framework to enable the delivery of urgent exam results at the point of care  

E-Print Network (OSTI)

Systems using the Java Message Service Framework. J DigitInformation Systems using the Java Message Service FrameworkED) physician. A web and Java Message Service (JMS) based

Tellis, W M; Andriole, K P

2005-01-01T23:59:59.000Z

254

Grain - A Java Analysis Framework for Total Data Readout  

E-Print Network (OSTI)

Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

P. Rahkila

2007-11-21T23:59:59.000Z

255

Using You Tube to enhance student class preparation in an introductory Java course  

Science Conference Proceedings (OSTI)

We provided 21 short YouTube videos for an Introduction to Programming in Java course. Students were surveyed on how often they watched the videos and did the readings, and how much these activites contributed to their learning. When professors ... Keywords: java, videos, youtube

Martin C. Carlisle

2010-03-01T23:59:59.000Z

256

SableVM: a research framework for the efficient execution of java bytecode  

Science Conference Proceedings (OSTI)

SableVM is an open-source virtual machine for Java intended as a research framework for efficient execution of Java bytecode. The framework is essentially composed of an extensible bytecode interpreter using state-of-the-art and innovative techniques. ...

Etienne M. Gagnon; Laurie J. Hendren

2001-04-01T23:59:59.000Z

257

Use of XML and Java for collaborative petroleum reservoir modeling on the Internet  

Science Conference Proceedings (OSTI)

The GEMINI (Geo-Engineering Modeling through INternet Informatics) is a public-domain, web-based freeware that is made up of an integrated suite of 14 Java-based software tools to accomplish on-line, real-time geologic and engineering reservoir modeling. ... Keywords: GEMINI, Java, Petroleum web-based software, Reservoir modeling, Web start, XML

John Victorine; W. Lynn Watney; Saibal Bhattacharya

2005-11-01T23:59:59.000Z

258

Sound-colour synaesthesia, chromatic representation of sounds waves in Java applets  

Science Conference Proceedings (OSTI)

The paper herein presents a way in which sound waves are chromatically represented in Java language. It intends to be, as its' title reveals, an instructional material providing help in developing interactive tools for efficient education in sciences, ... Keywords: RGB light, education, java applets, music, sounds waves

Stela Dragulin; Livia Sangeorzan; Mircea Parpalea

2010-09-01T23:59:59.000Z

259

9 Modelling the CoCoME with the JAVA/A Component Model  

E-Print Network (OSTI)

-founded and coherent modelling and programming concepts for components: based on sound theoretical foundations it en and a Java-based architectural programming language. 9.1.1 Goals and Scope of the Component Model The JAVA is the representation of software architecture entities in a programming language. For this purpose we introduced

Gilmore, Stephen

260

Exploiting static application knowledge in a Java compiler for embedded systems: a case study  

Science Conference Proceedings (OSTI)

Offering many benefits in terms of productivity and reliability, Java is becoming an attractive choice for the field of embedded computing. However, its programming model that relies on the capabilities of just-in-time compilation limits the opportunities ... Keywords: Java, KESO, embedded systems

Christoph Erhardt; Michael Stilkerich; Daniel Lohmann; Wolfgang Schröder-Preikschat

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Managing programmed instruction and collaborative peer tutoring in the classroom: Applications in teaching JavaTM  

Science Conference Proceedings (OSTI)

To fulfill part of the course requirements, 34 undergraduate students in two courses completed an online programmed instruction tutor as the first technical training exercise in a Java(TM) programming course designed for information systems majors. The ... Keywords: Collaborative peer tutoring, Interteaching, Java training, Programmed instruction

Henry H. Emurian; Heather K. Holden; Rachel A. Abarbanel

2008-03-01T23:59:59.000Z

262

Mechanisms for Secure Modular Programming in Java Lujo Bauer Andrew W. Appel Edward W. Felten  

E-Print Network (OSTI)

structure the interaction between different parts of a program. They must do this not only to protect Java packages, however, is the ability to structure modules so as to provide different views, protected, package-scope, or public) aren't expressive enough, so Java resorts to using a security manager

Appel, Andrew W.

263

Reconstructed streamflow for Citarum River, Java, Indonesia: linkages to tropical climate dynamics  

E-Print Network (OSTI)

Reconstructed streamflow for Citarum River, Java, Indonesia: linkages to tropical climate dynamics Abstract The Citarum river basin of western Java, Indonesia, which supplies water to 10 million residents in drought and flood prone regions of the globe (e.g. Boer 2007). In Indonesia, integrated action is needed

Ummenhofer, Caroline C.

264

Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1  

E-Print Network (OSTI)

Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1 Rob Wilson,2 reconstruct the boreal autumn (October­November) Palmer Drought Severity Index (PDSI) for Java, Indonesia between the climate of Indonesia and the large scale tropical Indo-Pacific climate system. Citation: D

265

The Java-Sumatra Aerial Mega-Tramway  

E-Print Network (OSTI)

A mega-tramway based on the Indonesian islands of Sumatra and Java is proposed to span Sunda Strait. The Java-Sumatra Aerial Mega-Tramway (JSAMT) will be self-elevating and will regularly and cheaply launch passengers and cargoes via two conveyor belt-like facilities using standard winged shipping containers like those currently used by international trucking and ocean shipping industries that are volplaned across the Sunda Strait. The JSAMT will be a self-sustaining toll facility free of any requirement for international loans or funding guarantees for its construction. Its existence will remove any immediate need for an expensive to dig/maintain Nusantara Tunnel. We offer the formative basic technical specifications for the JSAMT and indicate some of the physical and cultural geographical facts underpinning our macro-engineering proposal; offshoots of a perfected and tested JSAMT may be installed at Palk Strait between India and Sri Lanka, the Gibraltar Strait and the Bering Strait by mid-21st Century.

Alexander Bolonkin; Richard Cathcart

2007-01-09T23:59:59.000Z

266

Event Reconstruction for Many-core Architectures using Java  

SciTech Connect

Although Moore's Law remains technically valid, the performance enhancements in computing which traditionally resulted from increased CPU speeds ended years ago. Chip manufacturers have chosen to increase the number of core CPUs per chip instead of increasing clock speed. Unfortunately, these extra CPUs do not automatically result in improvements in simulation or reconstruction times. To take advantage of this extra computing power requires changing how software is written. Event reconstruction is globally serial, in the sense that raw data has to be unpacked first, channels have to be clustered to produce hits before those hits are identified as belonging to a track or shower, tracks have to be found and fit before they are vertexed, etc. However, many of the individual procedures along the reconstruction chain are intrinsically independent and are perfect candidates for optimization using multi-core architecture. Threading is perhaps the simplest approach to parallelizing a program and Java includes a powerful threading facility built into the language. We have developed a fast and flexible reconstruction package (org.lcsim) written in Java that has been used for numerous physics and detector optimization studies. In this paper we present the results of our studies on optimizing the performance of this toolkit using multiple threads on many-core architectures.

Graf, Norman A.; /SLAC

2012-04-19T23:59:59.000Z

267

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

268

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

269

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

270

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

271

T-581: Novell Access Manager Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

272

Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME  

Science Conference Proceedings (OSTI)

In their analysis of the use of Java as a first teaching language, the ACM Java Task Force (JTF) identified a number of issues with the Java language and APIs which caused significant pedagogic problems. The focus of their work, and hence of their characterisation ... Keywords: introductory programming, programming languages

Ian Utting

2006-06-01T23:59:59.000Z

273

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion 61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability February 21, 2011 - 7:00am Addthis PROBLEM: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability. PLATFORM: The following Java products are affected: Java SE: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK 5.0 Update 27 and prior for Solaris 9 Oracle SDK 1.4.2_29 and prior for Solaris 8 IBM JDK 6 Update SR9 and prior IBM JDK 5 Update SR12-FP3 and prior IBM JDK 1.4.2 Update SR13-FP8 and prior Java for Business: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK and JRE 5.0 Update 27 and prior for Windows, Solaris, and Linux

274

V-072: Red Hat update for java-1.7.0-openjdk | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Red Hat update for java-1.7.0-openjdk 2: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for java-1.7.0-openjdk. PLATFORM: The vulnerabilities are reported in Red Hat Enterprise Linux 5 and 6 ABSTRACT: Red Hat has issued an update for java-1.7.0-openjdk. REFERENCE LINKS: Secunia Advisory SA51858 RHSA-2013:0165-1 CVE-2012-3174 CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. IMPACT: Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. SOLUTION: Vendor advises to upgrade to these updated packages, which resolve these

275

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

276

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

277

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

278

U-087: HP-UX update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP-UX update for Java 7: HP-UX update for Java U-087: HP-UX update for Java January 24, 2012 - 7:00am Addthis PROBLEM: HP issued an update for Java in HP-UX to address multiple vulnerabilities. PLATFORM: HP-UX 11.x ABSTRACT: Multiple vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information. reference LINKS: Secunia Advisory 47709 Secunia Advisory 46512 HP Support Document IMPACT ASSESSMENT: High Discussion: The vulnerabilities are reported in versions B.11.11, B.11.23, and B.11.31 running HP JDK and JRE 6.0.12 and prior. Vulnerabilities inlcude the ability to hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a

279

Dynamic Information Flow Analysis for JavaScript in a Web Browser  

E-Print Network (OSTI)

Flow Analysis for JavaScript in a Web Browser by Thomas H.a central technology of the web, but it is also the sourceinformation flows in javascript web applications. In ACM

Austin, Thomas Howard

2013-01-01T23:59:59.000Z

280

Kopitiam: modular incremental interactive full functional static verification of java code  

Science Conference Proceedings (OSTI)

We are developing Kopitiam, a tool to interactively prove full functional correctness of Java programs using separation logic by interacting with the interactive theorem prover Coq. Kopitiam is an Eclipse plugin, enabling seamless integration into the ...

Hannes Mehnert

2011-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Interannual Variability of Sea Surface Temperature off Java and Sumatra in a Global GCM  

Science Conference Proceedings (OSTI)

Using results from the Simple Ocean Data Assimilation (SODA), this study assesses the mixed layer heat budget to identify the mechanisms that control the interannual variation of sea surface temperature (SST) off Java and Sumatra. The analysis ...

Yan Du; Tangdong Qu; Gary Meyers

2008-06-01T23:59:59.000Z

282

Code for Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation  

E-Print Network (OSTI)

This archive contains the code and data for running the evaluations described in: Finlayson, Mark Alan (2014) "Java Libraries for Accessing the Princeton Wordnet: comparison and Evaluation" in Proceedings of the 7th Global ...

Finlayson, Mark Alan

2013-11-01T23:59:59.000Z

283

Comparison between CPBPV, ESC/Java, CBMC, Blast, EUREKA and Why for Bounded Program Verification  

E-Print Network (OSTI)

This report describes experimental results for a set of benchmarks on program verification. It compares the capabilities of CPBVP "Constraint Programming framework for Bounded Program Verification" [4] with the following frameworks: ESC/Java, CBMC, Blast, EUREKA and Why.

Collavizza, Hélène; Van Hentenryck, Pascal

2008-01-01T23:59:59.000Z

284

JConstHide: A Framework for Java Source Code Constant Hiding  

E-Print Network (OSTI)

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called byte codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks . But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. We in this paper are proposing a framework named JConstHide for hiding constants, especially integers in the java source codes, to defeat reverse en...

Sivadasan, Praveen

2009-01-01T23:59:59.000Z

285

InterProlog: Towards a declarative embedding of logic programming in Java  

E-Print Network (OSTI)

Abstract. InterProlog is the first Prolog-Java interface to support multiple Prolog systems through the same API; currently XSB and SWI Prolog, with GNU Prolog and YAP under development – on Windows, Linux and Mac OS X. It promotes coarse-grained integration between logic and object-oriented layers, by providing the ability to bidirectionally map any class data structure to a Prolog term; integration is done either through the Java Native Interface or TCP/IP sockets. It is proposed as a first step towards a common standard Java + Prolog API, gifting the Java developer with the best inference engines, and the logic programmer with simple access to the mainstream object-oriented platform. 1

Miguel Calejo

2004-01-01T23:59:59.000Z

286

Predictors Of Java Programming Self Efficacy Among Engineering Students In A Nigerian University  

E-Print Network (OSTI)

The study examined the relationship between Java programming self-efficacy and programming background of engineering students in a Nigerian University. One hundred and ninety two final year engineering students randomly selected from six engineering departments of the university participated in the study. Two research instruments: Programming Background Questionnaire and Java Programming Self-Efficacy Scale were used in collecting relevant information from the subjects. The resulting data were analyzed using Pearson product correlation and Multiple regression analysis. Findings revealed that Java Programming self-efficacy has no significant relationship with each of the computing and programming background factors. It was additionally obtained that the number of programming courses offered and programming courses weighed scores were the only predictors of Java self-efficacy.

Jegede, Philip Olu

2009-01-01T23:59:59.000Z

287

Nues ardentes of 22 November 1994 at Merapi volcano, Java, Indonesia E.K Abdurachmanab  

E-Print Network (OSTI)

Nuées ardentes of 22 November 1994 at Merapi volcano, Java, Indonesia E.K Abdurachmanab J Volcanological Survey of Indonesia, Jl. Diponegoro 57, Bandung 40122, Indonesia c Centre de Recherches

Paris-Sud XI, Université de

288

6.092 Introduction to Software Engineering in Java, January (IAP) 2008  

E-Print Network (OSTI)

This course is an introduction to software engineering, using the Java™ programming language; it covers concepts useful to 6.005. The focus is on developing high quality, working software that solves real problems. Students ...

Akeju, Usman O.

289

V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2013 1: Oracle Java SE Critical Patch Update Advisory - June 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 June 19, 2013 - 1:06am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2013 PLATFORM: Version(s): 5.0 Update 45, 6 Update 45, 7 Update 21; and prior versions ABSTRACT: Multiple vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Oracle Java SE Critical Patch Update June 2013 SecurityTracker Alert ID: 1028679 CVE-2013-1500, CVE-2013-1571 CVE-2013-2400, CVE-2013-2407 CVE-2013-2412, CVE-2013-2437 CVE-2013-2442, CVE-2013-2443 CVE-2013-2444, CVE-2013-2445 CVE-2013-2446, CVE-2013-2447 CVE-2013-2448, CVE-2013-2449 CVE-2013-2450, CVE-2013-2451 CVE-2013-2452, CVE-2013-2453 CVE-2013-2454, CVE-2013-2455 CVE-2013-2456, CVE-2013-2457

290

Searching for the biofuel energy crisis in rural Java  

SciTech Connect

Biofuel shortage in peasant economies is often reported to reach crisis proportions in conditions of high population density. As a group, peasants are portrayed as engaging in irrational biofuel resource abuse. At times this abuse is treated as the inevitable outcome of excess biofuel demand. Otherwise, an explanation is often given in terms of resource-use problems inherent in common property. An alternative explanation is proposed in this dissertation. Rather than the effect of common property (a structure), such crises are more likely the result of capitalist expansion (a process). Systems of common foraging are prone to ownership conflict during transitions to private property. This conflict provides a more cogent explanation for biofuel shortage than any structural flaw in common-use systems. Contemporary rural Java contradicts mechanistic applications of supply/demand models of biofuel shortage. Despite high population pressure, biofuel is not inordinately scarce. There is little basis for the crisis predictions. While assessments of biofuel demand and supply can provide scarcity indicators, they ought not be used to predict overuse. The traditional crisis predictions of supply/demand balancing and common property analysis must be replaced by a more skeptical multi-disciplinary approach.

McGranahan, G.

1986-01-01T23:59:59.000Z

291

Building and Connecting to Cloud Services by Using Windows Azure  

E-Print Network (OSTI)

Building and Connecting to Cloud Services by Using Windows Azure ...for Java developers Information Amazon Elastic Compute Cloud (Amazon EC2). Windows® AzureTM is the Microsoft cloud platform that provides, and provide a standardized runtime environment for your applications. The Windows Azure hosted service model

Hunt, Galen

292

Stochastic path tracing on consumer graphics cards  

Science Conference Proceedings (OSTI)

We present a path tracer using the GPU of a consumers graphics card to render images. It is implemented in Java and GLSL using GroIMP as modelling platform and runtime environment. The path tracer is capable of rendering primitives like sphere, cone, ... Keywords: GPU, HDR, global illumination, path tracing, procedural texturing, raytracing, texture mapping

Thomas Huwe; Reinhard Hemmerling

2008-04-01T23:59:59.000Z

293

High-performance file I/O in Java : existing approaches and bulk I/O extensions.  

Science Conference Proceedings (OSTI)

There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

2001-07-01T23:59:59.000Z

294

ACE: A Resource-Aware Adaptive Compression Environment Sezgin Sucu Chandra Krintz  

E-Print Network (OSTI)

Runtime Platform (ORP) [4]. ORP is a dynamic optimization system from Intel Corporation that is available

Krintz, Chandra

295

JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes  

E-Print Network (OSTI)

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called 'byte' codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks. But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. Hence programmers resort to adhoc manual ways of obscuring their program which makes it difficult for its maintenance and usability. To address thi...

Sivadasan, Praveen; Sivadasan, Naveen

2008-01-01T23:59:59.000Z

296

Object-Oriented Intensional Programming: Intensional Classes Using Java and Lucid  

E-Print Network (OSTI)

This article introduces Object-Oriented Intensional Programming (OO-IP), a new hybrid language between Object-Oriented and Intensional Programming Languages in the sense of the latest evolutions of Lucid. This new hybrid language combines the essential characteristics of Lucid and Java, and introduces the notion of object streams which makes it is possible that each element in a Lucid stream to be an object with embedded intensional properties. Interestingly, this hybrid language also brings to Java objects the power to explicitly express and manipulate the notion of context, creating the novel concept of intensional object, i.e. objects whose evaluation is context-dependent, which are here demonstrated to be translatable into standard objects. By this new approach, we extend the use and meaning of the notion of intensional objects and enrich the meaning of object streams in Lucid and semantics of intensional objects in Java.

Wu, Aihua; Mokhov, Serguei A

2009-01-01T23:59:59.000Z

297

Measuring Sulphur Dioxide (SO2) Emissions in October, 2010 Catastrophic Eruption from Merapi Volcano in Java, Indonesia  

E-Print Network (OSTI)

Volcano in Java, Indonesia with Ozone Monitoring Instrument (OMI) José A. Morales-Collazo Geology This paper discusses sulfur dioxide (SO2) cloud emissions from Merapi Volcano in Java, Indonesia during, Indonesia. In October 26th , 2010, a catastrophic eruption was reported from Merapi causing nearly 386

Gilbes, Fernando

298

Tracing Static Fields of Embedded Parallel Java Applications  

Science Conference Proceedings (OSTI)

Debugging sequential application code is supported by almost any development environment. But newly upcoming parallel systems rise even harder challenges to application debugging. This is because interrupting or stepping through one of the parallel threads ...

Sascha Uhrig

2011-07-01T23:59:59.000Z

299

Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays  

E-Print Network (OSTI)

Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays. The class method definition codes are obscured through index transformation and constant hiding. The instantiated objects of these classes are used for source code writing. A tool named JDATATRANS is developed for generating classes and to the best of our knowledge this is the first tool available for array restructuring, on java source codes.

Sivadasan, Praveen

2008-01-01T23:59:59.000Z

300

Towards a Mobile Code Management Environment for Complex,Real-Time, Distributed Systems  

Science Conference Proceedings (OSTI)

We present a novel mobile code management environment, currently under design and development. Our design employs an open architecture, suitable for ``plug-and-play'' with COTS and other groups' tools. While we have studied new algorithms, cost and ... Keywords: Java, compilation and interpretation, distributed systems, efficiency and safety tradeoffs, mobile agents, mobile code, real-time systems

Alexander D. Stoyen; Plamen V. Petrov

2001-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

jContractor: Introducing Design-by-Contract to Java Using Reflective Bytecode Instrumentation  

Science Conference Proceedings (OSTI)

Design by Contract is a software engineering practice that allows semantic information to be added to a class or interface to precisely specify the conditions that are required for its correct operation. The basic constructs of Design by Contract are ... Keywords: Design by Contract, Java, bytecode instrumentation, jContractor

Murat Karaorman; Parker Abercrombie

2005-11-01T23:59:59.000Z

302

CSY3019 -Graphics Programming Assignment 2: Development of 3D graphics software: Java 2D (50%)  

E-Print Network (OSTI)

CSY3019 - Graphics Programming Assignment 2: Development of 3D graphics software: Java 2D (50 and/or strip lights). · User defined or loaded geometry (i.e. not primitive shapes). · The room & Title Page · Table of contents · Introduction · Analysis · Design · Implementation · Testing

Hill, Gary

303

Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators  

E-Print Network (OSTI)

This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

Tucci, Robert R

2008-01-01T23:59:59.000Z

304

Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators  

E-Print Network (OSTI)

This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

Robert R. Tucci

2008-02-17T23:59:59.000Z

305

A High Integrity Profile for Memory Safe Programming in Real-time Java  

E-Print Network (OSTI)

the structure of Real-time Java programs. By giving an additional mean- ing to the package construct, we, de be allocated within any package ­ but will be prevented from abstract class ScopeGate { protected Scope, we moved classes amongst packages so that Scoped Zen's package structure matched the scope structure

Zhao, Tian

306

Real-time remote control of a robot manipulator using Java and client-server architecture  

Science Conference Proceedings (OSTI)

The control of complex systems through PC networks is becoming increasingly important nowadays, both in the industries and in R&D centers. In this paper, a novel architecture is described which provides 24-h-a-day access to a remote system for remote ... Keywords: RS232, client, communication protocol, internet, java, planar manipulator, real-time, remote control, server

F. M. Raimondi; L. S. Ciancimino; M. Melluso

2005-03-01T23:59:59.000Z

307

Proceedings of the 3rd international symposium on Principles and practice of programming in Java  

Science Conference Proceedings (OSTI)

It gives me great pleasure to welcome you to Las Vegas, Nevada for the 3rd International Conference on Principles and Practice of Programming in Java.Forty one papers were submitted and a total of twenty four (58%) have been selected for presentation ...

John Waldron

2004-06-01T23:59:59.000Z

308

DESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH  

E-Print Network (OSTI)

for incoming calls to the exported remote object. The others are worker threads for handling each accepted-time worker threads for handling incoming calls to exported remote objects. We have modified the run() methodDESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH Sangig Rho Samsung

Choi, Byung K.

309

Hard Real-Time Garbage Collection for a Java Chip Multi-Processor  

E-Print Network (OSTI)

or hard copies of all or part of this work for personal or classroom use is granted without fee provided, these approaches implement substantial parts or all of the garbage collector in hard- ware. In contrast, ourHard Real-Time Garbage Collection for a Java Chip Multi-Processor Wolfgang Puffitsch Institute

310

Portable execution of legacy binaries on the Java virtual machine  

Science Conference Proceedings (OSTI)

The move toward pure managed-code environments is held back by the vast amount of legacy software available only as statically compiled binaries for some legacy instruction set architecture (ISA). Catering to this legacy software requires all sorts of ... Keywords: legacy software, system emulation

Alexander Yermolovich; Andreas Gal; Michael Franz

2008-09-01T23:59:59.000Z

311

Migrating legacy data structures based on variable overlay to Java  

Science Conference Proceedings (OSTI)

Legacy information systems, such as banking systems, are usually organized around their data model. Hence, when these systems are migrated to modern environments, translation of the data model involves the most critical decisions, having strong implications ... Keywords: legacy systems migration, object-oriented data model, reverse engineering

Mariano Ceccato; Thomas Roy Dean; Paolo Tonella; Davide Marchignoli

2010-04-01T23:59:59.000Z

312

Virtual Human Problem Solving Environments  

SciTech Connect

Abstract. Interest in complex integrated digital or virtual human modeling has seen a significant increase over the last decade. Coincident with that increased interest, Oak Ridge National Laboratory (ORNL) initiated the development of a human simulation tool, the Virtual Human. The Virtual Human includes a problem-solving environment (PSE) for implementing the integration of physiological models in different programming languages and connecting physiological function to anatomy. The Virtual Human PSE (VHPSE) provides the computational framework with which to develop the concept of a "Virtual Human." Supporting the framework is a data definition for modeling parameters, PhysioML, a Virtual Human Database (VHDB), and a Web-based graphical user interface (GUI) developed using Java. Following description of the VHPSE, we discuss four example implementations of models within the framework. Further expansion of a human modeling environment was carried out in the Defense Advanced Research Projects Agency Virtual Soldier Project. SCIRun served as the Virtual Soldier problem solving environment (VSPSE). We review and compare specific developments in these projects that have significant potential for the future of Virtual Human modeling and simulation. We conclude with an evaluation of areas of future work that will provide important extensions to the VHPSE and VSPSE and make possible a fully-integrated environment for human anatomical and physiological modeling: the Virtual Human.

Ward, Richard C [ORNL; Pouchard, Line Catherine [ORNL; Munro, Nancy B [ORNL; Fischer, Sarah Kathleen [ORNL

2008-01-01T23:59:59.000Z

313

Community, Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment community-environmentassetsimagesicon-community.jpg Community, Environment Our good neighbor pledge: to contribute to quality of life in Northern New Mexico...

314

A Time-Lagged Ensemble Simulation on the Modulation of Precipitation over West Java in January–February 2007  

Science Conference Proceedings (OSTI)

A numerical experiment using a regional nonhydrostatic model is performed to investigate the synoptic condition related to the heavy precipitation event that occurred at Jakarta in West Java, Indonesia, in January–February 2007. A time-lagged ...

Nurjanna J. Trilaksono; Shigenori Otsuka; Shigeo Yoden

2012-02-01T23:59:59.000Z

315

A Java Library for the Generation and Scheduling of PTX Assembly  

SciTech Connect

This paper discusses an ongoing progress regarding the development of a Java-based library for rapid kernel prototyping in NVIDIA PTX and PTX instruction scheduling. It is aimed at developers seeking total control of emitted PTX, highly parametric emission of, and tunable instruction reordering. It is primarily used for code development at ICHEC but is also hoped that NVIDIA GPU community will also find it beneficial.

Kartsaklis, Christos [ORNL; Civario, G [Irish Centre for High-End Computing

2010-01-01T23:59:59.000Z

316

Context: Environment  

Science Conference Proceedings (OSTI)

... Decision Tree for Global Environmental Impact Screening.. ... United Nations Environment Programme's Role in Eliminating Halon Dependency in ...

2011-11-16T23:59:59.000Z

317

Helmut Dersch  

E-Print Network (OSTI)

We have ported PTViewer, a Java-based spherical panorama viewer, to J2ME, Sun’s microedition runtime for the Java language. A prepackaged version for PalmOS 5 is distributed together with a generic jar-version suitable for any CLDC-1.1/MIDP-2.0 compliant Java runtime. 1

Smartphone; Fh Furtwangen

2004-01-01T23:59:59.000Z

318

User Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You may NOT modify the .bashrc or .cshrc files. These are set to read-only on NERSC systems and specify system specific customizations. Instead you should modify a file called .bashrc.ext or .cshrc.ext. Learn more about the global homes user environment. Important Environment Variables

319

Environment ref  

E-Print Network (OSTI)

Support to the identification of potential risks for the environment and human health arising from hydrocarbons operations involving hydraulic fracturing in Europe Report for

Issue Number C; Andrew Lelland

2012-01-01T23:59:59.000Z

320

A Java Math.BigDecimal Implementation of Core Mathematical Functions  

E-Print Network (OSTI)

The mathematical functions log(x), exp(x), root[n]x, sin(x), cos(x), tan(x), arcsin(x), arctan(x), x^y, sinh(x), cosh(x), tanh(x) and Gamma(x) have been implemented for arguments x in the real domain in a native Java library on top of the multi-precision BigDecimal representation of floating point numbers. This supports scientific applications where more than the double precision accuracy of the library of the Standard Edition is desired. The full source code is made available.

Mathar, Richard J

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Runtime Detection of Heapbased Overflows  

E-Print Network (OSTI)

protection Figure 5: HTTP client throughput. Package glibc glibc + heap prot. OSDB 6,015 6,070 (+ 0 of deploying our heap protection system uses packages that install a protected glibc image alongside with the privileges of the victim process. This paper presents a technique that protects the heap management

Kruegel, Christopher

322

In Proceedings of the Internet Society Symp. on Network and Distributed System Security, San Diego, CA, March 1988 Implementing Protection Domains in the Java TM Development Kit 1.2  

E-Print Network (OSTI)

­ pals. The new class java.security.ProtectionDomain is package­private, and is transparent to most Java.security package. #12; From within Java code, the protection domain of a given class is obtained by invoking the static method getProtectionDomain(CodeSource), again a private method within the package. For each class

Krintz, Chandra

323

A Structural View of the Cedar Programming Environment  

E-Print Network (OSTI)

activities include experimental pro- gramming and the development of prototype software systems for a high the novel system features of Cedar, including automatic storage management of dynamically allocated typed values, a run-time type system that provides run-time access to Cedar data type definitions and allows

van der Hoek, André

324

CSY3019 -Graphics Programming Assignment 2: Development of 2D/3D graphics software: Java 3D (50%)  

E-Print Network (OSTI)

CSY3019 - Graphics Programming Assignment 2: Development of 2D/3D graphics software: Java 3D (50, directional, point and spot lighting (to model windows and/or strip lights). · User defined or loaded geometry. Front Sheet & Title Page · Table of contents · Introduction · Analysis · Design · Implementation

Hill, Gary

325

Jiazzi: New-Age Components for Old-Fashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

, the structure of classes in a unit's imported and exported packages can be described using package signatures structure of classes in a Java package. In Figure 2, the package signature ui s describes a UI library Program. In the package signature the structure of a class is described using a class signature. The class

Hsieh, Wilson

326

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated, and Buffered Indices  

E-Print Network (OSTI)

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated structures. This could happen if you want the students in your database class to implement some basic index structures such as the B+-tree and the linear hashing. Alternatively, you may want your Ph.D. students

Zhang, Donghui

327

Jiazzi: New-Age Components for Old-Fashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

this language, the structure of classes in a unit's imported and exported packages can be described using that are used to describe the visi- ble structure of classes in a Java package. In Figure 2, the package applet s describes an application with class Program. In the package signature the structure of a class

Flatt, Matthew

328

Jiazzi: NewAge Components for OldFashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

this language, the structure of classes in a unit's imported and exported packages can be described using that are used to describe the visi­ ble structure of classes in a Java package. In Figure 2, the package applet s describes an application with class Program. In the package signature the structure of a class

Utah, University of

329

A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James M. Russell a  

E-Print Network (OSTI)

A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James of Mining and Petroleum Engineering, Institut Teknologi Bandung, Bandung 40132, Indonesia d Department Available online Keywords: Drought Indonesia Indo-Pacific Warm Pool El Niño-Southern Oscillation Little Ice

Vuille, Mathias

330

Fluid transport properties and estimation of overpressure at the Lusi mud volcano, East Java Basin (Tanikawa et al., 2010)  

E-Print Network (OSTI)

Java Basin (Tanikawa et al., 2010) Richard Daviesa, , Michael Mangab , Mark Tingayc , Richard was caused by drilling of the Banjar Panji 1 gas exploration well (Davies et al., 2007; Manga, 2007; Davies et al., 2008; Tingay et al., 2008) or due to the Yogyakarta earthquake that occurred at 05:54 am

Manga, Michael

331

Design of an XML based Interoperable RMI System: SoapRMI C++/Java 1.1  

E-Print Network (OSTI)

and remote exception handling between the C++ and Java implementations of SoapRMI. The paper explores JVM as the remote object and handles communication with the stub. The registry is used to manage for communication with objects in remote address spaces. RMI is a de facto standard for communication in distributed

332

LinguisticBelief: a java application for linguistic evaluation using belief, fuzzy sets, and approximate reasoning.  

Science Conference Proceedings (OSTI)

LinguisticBelief is a Java computer code that evaluates combinations of linguistic variables using an approximate reasoning rule base. Each variable is comprised of fuzzy sets, and a rule base describes the reasoning on combinations of variables fuzzy sets. Uncertainty is considered and propagated through the rule base using the belief/plausibility measure. The mathematics of fuzzy sets, approximate reasoning, and belief/ plausibility are complex. Without an automated tool, this complexity precludes their application to all but the simplest of problems. LinguisticBelief automates the use of these techniques, allowing complex problems to be evaluated easily. LinguisticBelief can be used free of charge on any Windows XP machine. This report documents the use and structure of the LinguisticBelief code, and the deployment package for installation client machines.

Darby, John L.

2007-03-01T23:59:59.000Z

333

Java Tool Framework for Automation of Hardware Commissioning and Maintenance Procedures  

Science Conference Proceedings (OSTI)

The National Ignition Facility (NIF) is a 192-beam laser system designed to study high energy density physics. Each beam line contains a variety of line replaceable units (LRUs) that contain optics, stepping motors, sensors and other devices to control and diagnose the laser. During commissioning and subsequent maintenance of the laser, LRUs undergo a qualification process using the Integrated Computer Control System (ICCS) to verify and calibrate the equipment. The commissioning processes are both repetitive and tedious when we use remote manual computer controls, making them ideal candidates for software automation. Maintenance and Commissioning Tool (MCT) software was developed to improve the efficiency of the qualification process. The tools are implemented in Java, leveraging ICCS services and CORBA to communicate with the control devices. The framework provides easy-to-use mechanisms for handling configuration data, task execution, task progress reporting, and generation of commissioning test reports. The tool framework design and application examples will be discussed.

Ho, J C; Fisher, J M; Gordon, J B; Lagin, L J; West, S L

2007-10-02T23:59:59.000Z

334

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS June 28, 2013 V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability The vulnerability addresses the possibility of a heap overflow condition June 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 19, 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 Multiple vulnerabilities were reported in Oracle Java. June 14, 2013 V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and

335

One dimensional P wave velocity structure of the crust beneath west Java and accurate hypocentre locations from local earthquake inversion  

SciTech Connect

A one-dimensional (1-D) velocity model and station corrections for the West Java zone were computed by inverting P-wave arrival times recorded on a local seismic network of 14 stations. A total of 61 local events with a minimum of 6 P-phases, rms 0.56 s and a maximum gap of 299 Degree-Sign were selected. Comparison with previous earthquake locations shows an improvement for the relocated earthquakes. Tests were carried out to verify the robustness of inversion results in order to corroborate the conclusions drawn out from our reasearch. The obtained minimum 1-D velocity model can be used to improve routine earthquake locations and represents a further step toward more detailed seismotectonic studies in this area of West Java.

Supardiyono; Santosa, Bagus Jaya [Physics Department, Faculty of Mathematics and Natural Sciences, State University of Surabaya, Surabaya (Indonesia) and Physics Department, Faculty of Mathematics and Natural Sciences, Sepuluh Nopember Institute of Technology, Surabaya (Indonesia); Physics Department, Faculty of Mathematics and Natural Sciences, Sepuluh Nopember Institute of Technology, Surabaya (Indonesia)

2012-06-20T23:59:59.000Z

336

StrBioLib: a Java library for development of custom computationalstructural biology applications  

SciTech Connect

Summary: StrBioLib is a library of Java classes useful fordeveloping software for computational structural biology research.StrBioLib contains classes to represent and manipulate proteinstructures, biopolymer sequences, sets of biopolymer sequences, andalignments between biopolymers based on either sequence or structure.Interfaces are provided to interact with commonly used bioinformaticsapplications, including (PSI)-BLAST, MODELLER, MUSCLE, and Primer3, andtools are provided to read and write many file formats used to representbioinformatic data. The library includes a general-purpose neural networkobject with multiple training algorithms, the Hooke and Jeeves nonlinearoptimization algorithm, and tools for efficient C-style string parsingand formatting. StrBioLib is the basis for the Pred2ary secondarystructure prediction program, is used to build the ASTRAL compendium forsequence and structure analysis, and has been extensively tested throughuse in many smaller projects. Examples and documentation are available atthe site below.Availability: StrBioLib may be obtained under the terms ofthe GNU LGPL license from http://strbio.sourceforge.net/Contact:JMChandonia@lbl.gov

Chandonia, John-Marc

2007-05-14T23:59:59.000Z

337

Chemical Weathering of New Pyroclastic Deposits from Mt. Merapi (Java), Indonesia  

SciTech Connect

Java Island, Indonesia with abundant amount of pyroclastic deposits is located in the very active and dynamic Pacific Ring of Fires. Studying the geochemical weathering indices of these pyroclastic deposits is important to get a clear picture about weathering profiles on deposits resulting from the eruption of Mt. Merapi. Immediately after the first phase of the eruption (March to June 2006), moist and leached pyroclastic deposits were collected. These pyroclastic deposits were found to be composed of volcanic glass, plagioclase feldspar in various proportions, orthopyroxene, clinopyroxene, olivine, amphibole, and titanomagnetite. Total elemental composition of the bulk samples (including trace elements and heavy metals) were determined by wet chemical methods and X-ray fluorescence (XRF) analyses. Weathering of the pyroclastic deposits was studied using various weathering indices. The Ruxton ratio, weathering index of Parker, Vought resudual index and chemical index of weathering of moist pyroclastic are lower than the leached sample but the alteration indices (chemical and plagioclase) are slightly higher in the moist compared to the leached pyroclastic deposits.

Fiantis, Dian; Nelson, Malik; Van Ranst, Eric; Shamshudin, Josup; Qafoku, Nikolla

2009-09-01T23:59:59.000Z

338

A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode  

E-Print Network (OSTI)

We propose a light-weight approach for certification of monitor inlining for sequential Java bytecode using proof-carrying code. The goal is to enable the use of monitoring for quality assurance at development time, while minimizing the need for post-shipping code rewrites as well as changes to the end-host TCB. Standard automaton-based security policies express constraints on allowed API call/return sequences. Proofs are represented as JML-style program annotations. This is adequate in our case as all proofs generated in our framework are recognized in time polynomial in the size of the program. Policy adherence is proved by comparing the transitions of an inlined monitor with those of a trusted "ghost" monitor represented using JML-style annotations. At time of receiving a program with proof annotations, it is sufficient for the receiver to plug in its own trusted ghost monitor and check the resulting verification conditions, to verify that inlining has been performed correctly, of the correct policy. We ha...

Dam, Mads

2010-01-01T23:59:59.000Z

339

An integrated debugging environment for reprogrammble hardware systems  

Science Conference Proceedings (OSTI)

Reprogrammable hardware systems are traditionally very difficult to debug due to their high level of parallelism. In our solution to this problem, features are inserted into the user's design which allow the system to be monitored and updated at runtime. ...

Kevin Camera; Hayden Kwok-Hay So; Robert W. Brodersen

2005-09-01T23:59:59.000Z

340

Celestijnenlaan 200A – B-3001 Heverlee (Belgium) Verification of data-race-freedom of a Java chat server with VeriFast  

E-Print Network (OSTI)

Even now, when computers have become a vital part of our society, software errors are still common, and their effects can be devastating. From the recent rise of multicores emerged the need for multi-threading software and a way to cope with its typical software errors such as data-races and deadlocks. This paper shows how Veri-Fast can be used to verify the data-race-freedom of a multi-threaded Java application, by means of a simple Java chat server example. We will cover the verification of jar files in general, how to deal with Java core classes and interfaces such as ArrayList and the specifics of verifying a multi-threaded Java application, using Thread, Runnable and Semaphore as building blocks. To achieve this, we need to take a closer look at VeriFast elements such as predicate families, predicate constructors and fractional permissions. This paper is intended as an experience report. We will conclude with some suggested improvements and possible future work. Verification of data-race-freedom of a Java chat server with

Cedric Cuypers; Bart Jacobs; Frank Piessens; Cedric Cuypers; Bart Jacobs; Frank Piessens; Cedric Cuypers; Bart Jacobs; Frank Piessens

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

PRIDE (Prediction In Dynamic Environments)  

Science Conference Proceedings (OSTI)

... coordination. USARSim is an open source simulation environment which provides realistic environments. The environments ...

2011-12-08T23:59:59.000Z

342

Plasil: Heuristic Reduction of Parallelism in Component Environment  

E-Print Network (OSTI)

Abstract. Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single component typically comprises a smaller state space than the whole system. We present a technique that addresses the problem of state explosion in code checking of primitive components with the Java PathFinder in case the checked property is absence of concurrency errors. The key idea is reduction of parallelism in the environment so that only those parts of the component’s code that can likely cause concurrency errors are exercised in parallel; such parts are identified via a heuristic static code analysis (searching for “suspicious ” patterns in the component code). Benefits of the technique, i.e. support for discovery of concurrency errors in limited time and space and provision of easy-to-read counterexamples, are illustrated on the results of several experiments.

Pavel Parizek; Frantisek Plasil

2007-01-01T23:59:59.000Z

343

ProfessorJ: a gradual introduction to Java through language levels  

Science Conference Proceedings (OSTI)

In the second-semester programming course at the University of Utah, we have observed that our students suffer unnecessarily from a mismatch between the course content and the programming environment. The course is typical, in that it exposes students ...

Kathryn E. Gray; Matthew Flatt

2003-10-01T23:59:59.000Z

344

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21, 2011 21, 2011 U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition October 20, 2011 U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. October 19, 2011 U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute

345

Energy and Environment Division  

Science Conference Proceedings (OSTI)

Energy and Environment Division. ... Selected Publications. Measurement Science Roadmap for Net-Zero Energy Buildings. ...

2013-03-13T23:59:59.000Z

346

A Political Ecology of the Citarum River Basin: Exploring "Integrated Water Resources Management" in West Java, Indonesia  

E-Print Network (OSTI)

ultimately produced higher water prices because rates wereon Environment and Water ( which produced Dublin Principles

Cavelle, Jenna

2013-01-01T23:59:59.000Z

347

Java Mobile Agents Implementing On-line Algorithms to Improve the QoS of a 3D Distributed Virtual Environment  

Science Conference Proceedings (OSTI)

With the explosion in Global Networks such as the Web, communities take advantage sharing and working with the big amount of information and services available. Within this context a promising area for the communities when dealing with the information ...

Marc Bui; Victor Larios-Rosillo

2000-06-01T23:59:59.000Z

348

Population and Environment  

E-Print Network (OSTI)

. . . . . . . . . . . . . . . . . . . . . 356 Coastal and Marine Environments . . . . . . . . . . . . . . . . . 358 Energy, Air Pollution or growth. Indeed, an overlay of graphs depicting global trends in population, energy consumption, carbon; coastal and marine environments; and energy, air pollu- tion, and climate change. In the concluding

349

Prius: a runtime for hybrid computing  

Science Conference Proceedings (OSTI)

Prius is a framework for seamless execution of OpenCL programs across integrated, heterogeneous systems. Applications interfacing with Prius need not be aware of the characteristics of the hardware; instead the framework will automatically map kernel ...

Dominik Grewe

2013-02-01T23:59:59.000Z

350

Runtime Reprioritization for Online Aggregation Queries.  

E-Print Network (OSTI)

??The need for interactive ad-hoc analytics has been steadily rising. The traditional batch processing of large data takes order of seconds to several minutes for… (more)

Tunga Gopinath, Karthik

2013-01-01T23:59:59.000Z

351

Runtime deadlock analysis for system level design  

E-Print Network (OSTI)

trigger() or wait() event will trigger or resume after theprovided by events and wait() or next_trigger() methodsTHREAD). Events are primitive behavior triggers. A process

Cheung, Eric; Chen, Xi; Hsieh, Harry; Davare, Abhijit; Sangiovanni-Vincentelli, Alberto; Watanabe, Yosinori

2009-01-01T23:59:59.000Z

352

Computing environment logbook  

DOE Patents (OSTI)

A computing environment logbook logs events occurring within a computing environment. The events are displayed as a history of past events within the logbook of the computing environment. The logbook provides search functionality to search through the history of past events to find one or more selected past events, and further, enables an undo of the one or more selected past events.

Osbourn, Gordon C; Bouchard, Ann M

2012-09-18T23:59:59.000Z

353

NERSC Modules Software Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment » Modules Environment Environment » Modules Environment Modules Software Environment NERSC uses the module utility to manage nearly all software. There are two huge advantages of the module approach: NERSC can provide many different versions and/or installations of a single software package on a given machine, including a default version as well as several older and newer versions; and Users can easily switch to different versions or installations without having to explicitly specify different paths. With modules, the MANPATH and related environment variables are automatically managed. Users simply ``load'' and ``unload'' modules to control their environment. The module utility consists of two parts: the module command itself and the modulefiles on which it operates. Module Command

354

Computer Models Design for Teaching and Learning using Easy Java Simulation  

E-Print Network (OSTI)

We are teachers who have benefited from the Open Source Physics (Brown, 2012; Christian, 2010; Esquembre, 2012) community's work and we would like to share some of the computer models and lesson packages that we have designed and implemented in five schools grade 11 to 12 classes. In a ground-up teacher-leadership (MOE, 2010) approach, we came together to learn, advancing the professionalism (MOE, 2009) of physics educators and improve students' learning experiences through suitable blend (Jaakkola, 2012) of real equipment and computer models where appropriate . We will share computer models that we have remixed from existing library of computer models into suitable learning environments for inquiry of physics customized (Wee & Mak, 2009) for the Advanced Level Physics syllabus (SEAB, 2010, 2012). We hope other teachers would find these computer models useful and remix them to suit their own context, design better learning activities and share them to benefit all humankind, becoming citizens for the world...

Wee, Loo Kang Lawrence; Goh, Khoon Song Aloysius; LyeYE, Sze Yee; Lee, Tat Leong; Xu, Weiming; Goh, Giam Hwee Jimmy; Ong, Chee Wah; Ng, Soo Kok; Lim, Ee-Peow; Lim, Chew Ling; Yeo, Wee Leng Joshua; Ong, Matthew; LimI, Kenneth Y T

2012-01-01T23:59:59.000Z

355

Parking Infrastructure and the Environment  

E-Print Network (OSTI)

affects energy demand, the environment, and the social costEngineering and the Built Environment, and A ffiliatespread throughout the built environment. However, LCA is a

Chester, Mikhail; Horvath, Aprad; Madanat, Samer

2011-01-01T23:59:59.000Z

356

STAR Test Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

STAR Test Environment STAR Test Environment STAR Test Environment These instructions describe how to set up the STAR environment independent of the production environment in order to test different installations in $OPTSTAR and $GROUP_DIR. If you want to modify those installations you will need access to the starofl account. Bypass STAR envionment login Edit your ~/.pdsf_setup file changing the STAR_LINUX_SETUP to "use_none" and start a new session. You should not see all the STAR environmental variables defined when you do this (and it will probably be much quicker than usual, too). Do a manual STAR login If you want to modify what test environment you use copy the test login scripts to your own working area: cp -r /common/star/startest /path/to/myworkdir/. If you don't want to modify these files you can source them directly from

357

Fermi UNIX trademark environment  

SciTech Connect

The introduction of UNIX at Fermilab involves multiple platforms and multiple vendors. Additionally, a single user may have to use more than one platform. This heterogeneity and multiplicity makes it necessary to define a Fermilab environment for UNIX so that as much as possible the systems look and feel'' the same. We describe our environment, including both the commercial products and the local tools used to support it. Other products designed for the UNIX environment are also described. 19 refs.

Nicholls, J.

1991-03-01T23:59:59.000Z

358

Indoor Environment Group  

NLE Websites -- All DOE Office Websites (Extended Search)

Indoor Environment Group Indoor Environment Group The Indoor Environment Group performs research that aims to maintain healthy and productive indoor environments while buildings are made more energy efficient. We study the links between indoor environmental quality, building ventilation, building energy efficiency and occupants' health, performance and comfort. We undertake experiments in laboratory and field settings and employ modeling to characterize indoor environmental conditions and evaluate the fate, transport and chemical transformations of indoor pollutants. We elucidate pathways of pollutant exposure, evaluate and develop energy efficient means of controlling indoor environmental quality, and provide input for related guidelines and standards. Contacts William Fisk WJFisk@lbl.gov (510) 486-5910

359

Environment/Climate Portal  

Science Conference Proceedings (OSTI)

... exercises for environmental contaminants in marine specimens were administered in 2007/2008 by the … more. >> see all Environment/Climate ...

2013-10-23T23:59:59.000Z

360

The Ideal Environment - CECM  

E-Print Network (OSTI)

... would surely thrive within the conditions outlined above. That said, there are formidable difficulties to providing and maintaining such an ideal environment.

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Environment | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Atmospheric and Climate Science Ecological Resources and Systems Environmental Security and Restoration Land and Renewable Resources Radiation and Chemical Risk...

362

Transportation and handling environment  

SciTech Connect

The elements of the environment relating to transportation and handling include temperature, solar radiation, precipitation, humidity, pressure, shock, and vibration. While each of these deserves consideration, the latter two, shock and vibration, are perhaps the least understood. The report discusses all of these elements, but concentrates largely on shock and vibration. Emphasis is upon the necessity of understanding both the product and the environment. To that end, descriptions of the environment which have been derived statistically are discussed. Land, sea, and air transport are considered. Current knowledge of the handling environment is indicated.

Gens, M.B.

1972-09-01T23:59:59.000Z

363

Design, implementation, and evaluation of a compilation server  

Science Conference Proceedings (OSTI)

Modern JVM implementations interleave execution with compilation of “hot” methods to achieve reasonable performance. Since compilation overhead impacts the execution time of the application and induces run-time pauses, we explore offloading ... Keywords: Compilation server, Java virtual machine

Han B. Lee; Amer Diwan; J. Eliot B. Moss

2007-08-01T23:59:59.000Z

364

Design and simulation of a mobile ad-hoc network in HLA environment  

Science Conference Proceedings (OSTI)

This paper presents a generalized design for MANET simulations to support any kind of widespread adoption, and standardized to allow universal interoperability, along with flexibility to permit runtime extension of its ontology. Traditional network simulation ... Keywords: HLA, MANET, OMT, RTI

Abdul Basit; Shoib A. Khan

2007-05-01T23:59:59.000Z

365

Environment and Climate in MML  

Science Conference Proceedings (OSTI)

... Laboratory's work in the areas of environment and climate ... soil, atmosphere, marine and aquatic environments, and environmental threats, and ...

2012-06-12T23:59:59.000Z

366

E3: Economy, Energy Environment  

Science Conference Proceedings (OSTI)

E3: Economy, Energy, and Environment. "Our goal is to ... in 2012. Download E3: Economy, Energy, Environment. For more ...

2012-10-17T23:59:59.000Z

367

White Paper Sun Java Workstation W1100z and W2100z Architecture On the Web sun.com Sun Java TM Workstation W1100z and W2100z Architecture  

E-Print Network (OSTI)

All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. Sun, Sun Microsystems, the Sun logo, Java, Solaris, Solaris JumpStart, Sun N1, Sun Ray, and Net Beans are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun ™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.

unknown authors

2004-01-01T23:59:59.000Z

368

Stockholm Environment Institute (SEI) | Open Energy Information  

Open Energy Info (EERE)

Stockholm Environment Institute (SEI) (Redirected from Stockholm Environment Institute) Jump to: navigation, search Logo: Stockholm Environment Institute Name Stockholm Environment...

369

Termination in language-based systems  

Science Conference Proceedings (OSTI)

Language run-time systems are increasingly being embedded in systems to support run-time extensibility via mobile code. Such systems raise a number of concerns when the code running in such systems is potentially buggy or untrusted. Although sophisticated access ... Keywords: Applets, Internet, Java, resource control, soft termination, termination

Algis Rudys; Dan S. Wallach

2002-05-01T23:59:59.000Z

370

Seismic facies and growth history of Miocene carbonate platforms, Wonocolo Formation, North Madura area, East Java Basin, Indonesia  

E-Print Network (OSTI)

The Miocene Wonocolo Formation in the North Madura area, East Java Basin, contains numerous isolated carbonate platforms that are broadly distributed across a ~3000 sq km area of the Indonesian back-arc region. The Wonocolo platforms provide an interesting test for comparing the different growth histories of closely spaced individual platforms, where eustatic history was the same for all the platforms, but where subtle differences in other extrinsic factors influenced their growth. A grid of 2D seismic data and information from several wells across the region were used to map all Wonocolo platforms across the study area. Five growth phases are recognizable in the platforms, based on seismic facies analysis and internal seismic-stratigraphic relationships. Platforms from the western part of the study area are larger in plan view than age-equivalent platforms to the east and record a complex history of platform initiation, backstepping, progradation, coalescence into larger composite platforms, and termination. Although all five growth phases are also recognizable in some Wonocolo platforms from the eastern part of the study area, the eastern platforms are different in that they: 1) are much smaller in plan view, 2) are spaced farther apart, 3) tend to have steeper platform margins, 4) have largely aggradational stratal geometries, 5) are slightly thicker overall than the western platforms, and 6) the tops of the platforms are at greater burial depths than the tops of the western platforms. Most of these differences in platform morphology and growth history can be attributed to slightly faster subsidence rates in the eastern part of the study area. Faster subsidence rates in the eastern part of the study area from 12 - 6 Ma (the age range for the Wonocolo platforms) are probably related to differential surface loading by the Indonesian volcanic arc.

Adhyaksawan, Rahadian

2002-01-01T23:59:59.000Z

371

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

372

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

373

Environment Feature Stories  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Feature Stories Environment Feature Stories /community-environment/_assets/images/icon_earthday.jpg Environment Feature Stories Our environmental stewardship commitment: we will clean up the past, minimize impacts for current environmental operations, and create a sustainable future. Piñon trees show increased susceptibility to drought when also subjected to rising temperatures. Rising global temperatures accelerate drought-induced forest mortality Many southwestern forests in the United States will disappear or be heavily altered by 2050, according to a series of joint LANL-UNM studies. - 7/10/13 Haze of smoke emanating from the 2011 Las Conchas, NM fire. Wildfires may contribute more to global warming than previously predicted They suggest that fire emissions could contribute a lot more to the

374

Edison Programming Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

unless your code in some way relies on the PGI compilers. The default programming environment on Edison uses the Intel compiler suite. Cray and GNU compilers are also available....

375

Severe Convective Wind Environments  

Science Conference Proceedings (OSTI)

Nontornadic thunderstorm winds from long-lived, widespread convective windstorms can have a tremendous impact on human lives and property. To examine environments that support damaging wind producing convection, sounding parameters from Rapid ...

Evan L. Kuchera; Matthew D. Parker

2006-08-01T23:59:59.000Z

376

Development Languages and Environment  

E-Print Network (OSTI)

It combines many of the best features of the standard UNiX working environment like C, sed, awk, csh and sh. Similar to sh and csh, it is used as a scripting ...

377

Visualization Design Environment  

SciTech Connect

Improvements in the performance and capabilities of computer software and hardware system, combined with advances in Internet technologies, have spurred innovative developments in the area of modeling, simulation and visualization. These developments combine to make it possible to create an environment where engineers can design, prototype, analyze, and visualize components in virtual space, saving the time and expenses incurred during numerous design and prototyping iterations. The Visualization Design Centers located at Sandia National Laboratories are facilities built specifically to promote the ''design by team'' concept. This report focuses on designing, developing and deploying this environment by detailing the design of the facility, software infrastructure and hardware systems that comprise this new visualization design environment and describes case studies that document successful application of this environment.

Pomplun, A.R.; Templet, G.J.; Jortner, J.N.; Friesen, J.A.; Schwegel, J.; Hughes, K.R.

1999-02-01T23:59:59.000Z

378

Interactive collaborative media environments  

Science Conference Proceedings (OSTI)

Virtual reality (VR) provides a revolutionary interface between man and machine. However, present display and interface peripherals limit the potential of virtual environments within many activities or scenarios. Mainstream immersive VR is centred on ...

D. M. Traill; J. D. Bowshill; P. J. Lawrence

1997-10-01T23:59:59.000Z

379

Environment induced incoherent controllability  

E-Print Network (OSTI)

We prove that the environment induced entanglement between two non interacting, two-dimensional quantum systems S and P can be used to control the dynamics of S by means of the initial state of P. Using a simple, exactly solvable model, we show that both accessibility and controllability of S can be achieved under suitable conditions on the interaction of S and P with the environment.

Raffaele Romano; Domenico D'Alessandro

2005-11-08T23:59:59.000Z

380

GEMS in the environment  

NLE Websites -- All DOE Office Websites (Extended Search)

GEMS in the environment GEMS in the environment Name: de tar Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: How many years will it be before Genetically Engineered Microorganisms are released into the environment? Replies: Some already have been in controlled and government-approved tests. So have some non-micro organisms, mainly some food crop plants and cattle strains. moodywj In addition to the previous response, I might add that although there are several examples of GEMS which have been released for beneficial purposes, caution must be exercised in order that a potentially harmful organism does not escape into the environment without extremely careful supervision and complete control over its spread. An example of this is the engineered bacteria which make use of crude oil as a carbon source, patented for use on oil spills. Although spraying a solution with these organisms in it can help clean up spills and decrease the OIL'S impact on the environment, you have to be careful about knowing in advance what the organisms will turn to for food once the oil is gone -- will it attack the hydrocarbons of other living organisms?

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

United Nations Environment Programme: Global Environment Outlook | Open  

Open Energy Info (EERE)

Nations Environment Programme: Global Environment Outlook Nations Environment Programme: Global Environment Outlook Jump to: navigation, search Tool Summary Name: United Nations Environment Programme: Global Environment Outlook Agency/Company /Organization: United Nations Environment Programme Topics: Co-benefits assessment, Policies/deployment programs, Resource assessment, Pathways analysis Resource Type: Dataset, Maps Website: geodata.grid.unep.ch/ United Nations Environment Programme: Global Environment Outlook Screenshot References: UNEP Data[1] Overview "The GEO Data Portal is the authoritative source for data sets used by UNEP and its partners in the Global Environment Outlook (GEO) report and other integrated environment assessments. Its online database holds more than 500 different variables, as national, subregional, regional and global

382

NERSC User Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Environment NERSC User Environment Home Directories, Shells and Startup Files All NERSC systems (except PDSF) use global home directories, which are are pre-populated with startup files (also known as dot files) for all available shells. NERSC fully supports bash, csh, and tcsh as login shells. Other shells (ksh, sh, and zsh) are also available. The default shell at NERSC is csh. Changing Your Default Login Shell Use the NERSC Information management (NIM) portal if you want to to change your default login shell. To do this, select Change Shell from the NIM Actions pull-down menu. Managing Your Startup Files The "standard" dot-files are symbolic links to read-only files that NERSC controls. For each standard dot-file, there is a user-writable ".ext" file.

383

Environment/Health/Safety (EHS)  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment, Safety and Health Standards Set for LBNL Environment, Safety and Health Standards Set for LBNL Due to a recent Contract 31 action, the Necessary and Sufficient process...

384

Environment scattering in GADRAS.  

SciTech Connect

Radiation transport calculations were performed to compute the angular tallies for scattered gamma-rays as a function of distance, height, and environment. Green's Functions were then used to encapsulate the results a reusable transformation function. The calculations represent the transport of photons throughout scattering surfaces that surround sources and detectors, such as the ground and walls. Utilization of these calculations in GADRAS (Gamma Detector Response and Analysis Software) enables accurate computation of environmental scattering for a variety of environments and source configurations. This capability, which agrees well with numerous experimental benchmark measurements, is now deployed with GADRAS Version 18.2 as the basis for the computation of scattered radiation.

Thoreson, Gregory G.; Mitchell, Dean James; Theisen, Lisa Anne; Harding, Lee T.

2013-09-01T23:59:59.000Z

385

Running with Java  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC Powering Scientific Discovery Since 1974 Login Site Map | My NERSC search... Go Home About Overview NERSC Mission Contact us Staff Org Chart NERSC History NERSC Stakeholders...

386

Keyword programming in Java  

E-Print Network (OSTI)

Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of unordered keywords provided by the user into a valid expression. ...

Little, Danny Greg

387

Environment analysis via ?CFA  

Science Conference Proceedings (OSTI)

We describe a new program-analysis framework, based on CPS and procedure-string abstractions, that can handle critical analyses which the k-CFA framework cannot. We present the main theorems concerning correctness, show an application analysis, ... Keywords: CPS, continuations, delta-CFA, environment analysis, flow analysis, functional languages, inlining, lambda calculus, program analysis, super-beta

Matthew Might; Olin Shivers

2006-01-01T23:59:59.000Z

388

Geoscience/Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Geoscience/Environment Geoscience/Environment Geoscience/Environment Print From the high pressures at the Earth's core to the vacuum of outer space, the ALS has tools for investigating samples from either environmental extreme. "Geoscience" at the ALS covers a wide range of topics, from carbon sequestration and air quality to cometary composition and the formation of the solar system. To narrow the focus a bit, the ALS has an important role to play in addressing a number of environmental issues, including environmental remediation, hazardous-waste management, global climate change, agricultural sustainability, and trace-element cycling in ecosystems. These problems present major scientific challenges, in part because natural systems are extremely complex at a range of scales. Moreover, the behavior of these systems is determined by a complex interplay of chemical, physical, and biological processes in spatially heterogeneous environments. The ALS can contribute to the knowledge base needed to address a variety of environmental issues by enabling a variety of investigations, including analytical chemistry, microscopy of heterogeneous media, and reaction kinetics in natural systems.

389

The seamless computing environment  

SciTech Connect

Oak Ridge National Laboratory (ORNL), Sandia National Laboratories (SNL), and Pittsburgh Supercomputing Center (PSC) are in the midst of a project through which their supercomputers are linked via high speed networks. The goal of this project is to solve national security and scientific problems too large to run on a single machine. This project, as well as the desire to maximize the use of high performance computing systems, has provided the impetus to develop and implement software tools and infrastructure to automate the tasks associated with running codes on one or more heterogeneous machines from a geographically distributed pool. The ultimate goal of this effort is the Seamless Computing Environment (SCE). SCE is a production environment to which a user submits a job and receives results without having to worry about scheduling resources or even which resources the system uses. The compilation, data migration, scheduling, and execution will take place with minimal user intervention.

Sheehan, T.J.; Papadopoulos, P.M.; Alexander, R. [and others

1997-06-01T23:59:59.000Z

390

Environment control system  

SciTech Connect

A system for controlling the environment of an enclosed area in nuclear reactor installations. The system permits the changing of the environment from nitrogen to air, or from air to nitrogen, without the release of any radioactivity or process gas to the outside atmosphere. In changing from a nitrogen to an air environment, oxygen is inserted into the enclosed area at the same rate which the nitrogen-oxygen gas mixture is removed from the enclosed area. The nitrogen-oxygen gas mixture removed from the enclosed area is mixed with hydrogen, the hydrogen recombining with the oxygen present in the gas to form water. The water is then removed from the system and, if it contains any radioactive products, can be utilized to form concrete, which can then be transferred to a licensed burial site. The process gas is purified further by stripping it of carbon dioxide and then distilling it to remove any xenon, krypton, and other fission or non-condensable gases. The pure nitrogen is stored as either a cryogenic liquid or a gas. In changing from an air to nitrogen environment, the gas is removed from the enclosed area, mixed with hydrogen to remove the oxygen present, dried, passed through adsorption beds to remove any fission gases, and reinserted into the enclosed area. Additionally, the nitrogen stored during the nitrogen to air change, is inserted into the enclosed area, the nitrogen from both sources being inserted into the enclosed area at the same rate as the removal of the gas from the containment area. As designed, the amount of nitrogen stored during the nitrogen to air change substantially equals that required to replace oxygen removed during an air to nitrogen change.

Sammarone, Dino G. (Edgewood Borough, PA)

1978-01-01T23:59:59.000Z

391

Geoscience/Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Geoscience/Environment Print Geoscience/Environment Print From the high pressures at the Earth's core to the vacuum of outer space, the ALS has tools for investigating samples from either environmental extreme. "Geoscience" at the ALS covers a wide range of topics, from carbon sequestration and air quality to cometary composition and the formation of the solar system. To narrow the focus a bit, the ALS has an important role to play in addressing a number of environmental issues, including environmental remediation, hazardous-waste management, global climate change, agricultural sustainability, and trace-element cycling in ecosystems. These problems present major scientific challenges, in part because natural systems are extremely complex at a range of scales. Moreover, the behavior of these systems is determined by a complex interplay of chemical, physical, and biological processes in spatially heterogeneous environments. The ALS can contribute to the knowledge base needed to address a variety of environmental issues by enabling a variety of investigations, including analytical chemistry, microscopy of heterogeneous media, and reaction kinetics in natural systems.

392

Galaxy Evolution and Environment  

E-Print Network (OSTI)

The properties of galaxies are strongly correlated with their environment, with red galaxies dominating galaxy clusters and blue galaxies dominating the general field. However, not all field galaxies are young: studies of the colors, line strengths, and M/L ratios of massive early-type galaxies at 0environment. There is good evidence that the growth of these galaxies does continue longer in the field than in clusters, via (nearly) dissipationless mergers of already old galaxies. These results are consistent with predictions of recent galaxy formation models, which incorporate AGN feedback to suppress star formation in the most massive halos. Systematic studies of the relation of galaxies with their environment beyond z=1 are difficult, and still somewhat contradictory. Intriguingly both the DEEP2 and VVDS surveys find that the color-density relation disappears at z~1.3, unfortunately just at the point where both surveys become highly incomplete. On the other hand, clustering studies at z~2.5 have shown that red galaxies cluster more strongly than blue galaxies, implying that the color-density relation was already in place at that redshift.

Pieter van Dokkum; Ryan Quadri

2007-04-13T23:59:59.000Z

393

Environment Induced Time Arrow  

E-Print Network (OSTI)

The spread of the time arrows from the environment to an observed subsystem is followed within a harmonic model. A similarity is pointed out between irreversibility and a phase with spontaneously broken symmetry. The causal structure of interaction might be lost in the irreversible case, as well. The Closed Time Path formalism is developed for classical systems and shown to handle the time arrow problem in a clear and flexible manner. The quantum case is considered, as well, and the common origin of irreversibility and decoherence is pointed out.

Janos Polonyi

2012-06-25T23:59:59.000Z

394

Nanotech/Environment, Health & Safety Portal  

Science Conference Proceedings (OSTI)

NIST Home > Nanotech/Environment, Health & Safety Portal. Nanotech/Environment, Health & Safety Portal. Programs and ...

2013-05-16T23:59:59.000Z

395

Guest Editors' Introduction: Hostile Environments  

E-Print Network (OSTI)

Pervasive computing technology can save lives by both eliminating the need for humans to work in hostile environments and supporting them when they do. In general, environments that are hazardous to humans are hard on ...

Lukowicz, Paul

396

ENVIRONMENT AL REVI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ENVIRONMENT ENVIRONMENT AL REVI EW for CATEG ORI CAL EXCLUS ION DETE RMINATION Rocky Mo unta in Region, Weste rn A rea Power Administra tion Stru cture Replace ment Fla min g Go rge-Vern a l No.3 138-kV tra nsmiss ion lin e (Struct ure No. 25/6) Spr ing 201 2 A. Ilricf J)cscription of Proposal: Western Area Power Adm inistration (Western) proposes to replace Structure No. 25/6 on the Flaming Gorge-Vernal No.3 138-kV transmission line. The structure is located on Bureau of Land Management lands in Uintah County. Utah (Township 3S, Range 22E, Section 7; Donkey Flat 7.5' USGS quadrangle). Work consists of removal and in-kind replacement of the wood H-frame structure and anchors utilizing rubber tired vehicles. crane, bucket truck, pole trucks/trailers, auger rig. and pick-up trucks. All work will be conducted on Western's existing

397

Communication in hazardous environments  

SciTech Connect

Radios were investigated for use in hazardous environments where protective breathing equipment such as plastic suits and respirators interfere with communication. A radio system, manufactured by Communications-Applied technology (C-AT), was identified that was designed specifically for hazardous environment communications. This equipment had been used successfully by the US Army and NASA for several years. C-AT equipment was evaluated in plantwide applications at the Savannah River Plant (SRP) using temporary frequencies obtained by the Department of Energy-Savannah River (DOE-SR). Radios performed well in all applications, which included a tritium facility, high-level caves, a nuclear reactor building, tank farm, and a canyon building interior. Permanent frequencies were obtained by DOE-SR for two complete six-man C-AT systems at SRP. Because of the relatively short range of these systems, replicates will cover all applications of this type of equipment plantwide. Twelve radio systems are currently being used successfully in plantwide applications.

Rankin, W N; Herold, T R

1986-01-01T23:59:59.000Z

398

Building Environment Division Staff Directory  

Science Conference Proceedings (OSTI)

... Energy and Environment Division. Fire Research Division. Systems Integration Division. Intelligent Systems Division. Smart Grid Program Office. ...

2013-04-03T23:59:59.000Z

399

Environment, Safety & Health  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links ESSH Policy Site Environmental Reports Environmental Regulators Upton Ecological and Research Reserve Pollution Prevention Organizations ES&H Directorate Environmental Protection Division Environmental Restoration Division Safety & Health Services Other BNL Site Index Can't View PDFs? Environment, Safety & Health Brookhaven National Lab is committed to continual improvement in environmental, safety, security, and health (ESSH) performance. Full policy description. Restoration Projects Brookhaven Graphite Research Reactor decommissioning, High Flux Beam Reactor decommissioning Groundwater Projects Peconic River Cleanup Peconic River Working Group Environmental Restoration Projects green tech ISB-inspired Greening Strategies for Your Home or Office Being green isn't rocket science. Several strategies that earned the ISB its LEED Gold certification can help reduce energy usage and make any building more environmentally friendly.

400

Virtual Environment and  

E-Print Network (OSTI)

The levels of immersion and presence felt by users in a Virtual Environment (VE) are very important factors that dictate the quality of the Virtual Reality (VR) experience. Sensori-motor systems, both hardware and software, are the components of a VR system that contribute to generate the VEs and to create the feeling of being there. This paper reviews the different visualization hardware/software components that are at the heart of a VR system and provides means for assessing their performance in the context of various applications. Because of its historical and functional importance in the field of VR, visualization hardware is reviewed first (HMDs, VRDs, stereo glasses, CRT, LCD monitors and Plasma displays...). Then, a list of the most important insights, which should be addressed when designing and assembling a VR system, are discussed. Finally, visualization software is covered in the context of the available hardware components.

Sensori-Motor Activities Visualization; M. Mokhtari; F. Lemieux; F. Bernier; D. Ouellet; R. Drouin; D. Laurendeau; A. Branzan-albu

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

SC e-journals, Environment  

Office of Scientific and Technical Information (OSTI)

Environment Environment Acta hydrochimica et hydrobiologica Agricultural & Forest Meteorology Air, Soil and Water Research - OAJ American Journal of Environmental Sciences - OAJ Annual Review of Ecology, Evolution, and Systematics Annual Review of Environment and Resources Annual Review of Plant Biology Applied and Environmental Microbiology Applied and Environmental Soil Science - OAJ Applied Microbiology and Biotechnology Aquatic Ecology Archives of Environmental Contamination and Toxicology Atmospheric Chemistry and Physics - OAJ Atmospheric Environment BioControl Biogeochemistry Biogeosciences - OAJ Biomass & Bioenergy Bioprocess and Biosystems Engineering Bioresource Technology Biotechnology Advances BMC Ecology - OAJ Bulletin of Engineering Geology and the Environment

402

Sample Environment | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

Home › Instruments › SNS › Sample Environment Home › Instruments › SNS › Sample Environment Sample Environment The Sample Environment Group provides equipment and support for studying materials under controlled conditions (temperature, pressure, magnetic field, chemical environment, etc.). When you come to SNS to conduct an experiment, our front-line teams are there to support you. Although we currently offer a wide range of capabilities, we realize that these capabilities must continually grow. Therefore, we also have a busy research and development team, and we encourage you to partner with them to develop new equipment and techniques. The Sample Environment Equipment Database allows you to search for information about the sample environment equipment available for HFIR and SNS instruments. It will be available in the near future for SNS sample

403

Market Design Test Environments  

SciTech Connect

Power industry restructuring continues to evolve at multiple levels of system operations. At the bulk electricity level, several organizations charged with regional system operation are implementing versions of a Wholesale Power Market Platform (WPMP) in response to U.S. Federal Energy Regulatory Commission initiatives. Recently the Energy Policy Act of 2005 and several regional initiatives have been pressing the integration of demand response as a resource for system operations. These policy and regulatory pressures are driving the exploration of new market designs at the wholesale and retail levels. The complex interplay among structural conditions, market protocols, and learning behaviors in relation to short-term and longer-term market performance demand a flexible computational environment where designs can be tested and sensitivities to power system and market rule changes can be explored. This paper presents the use of agent-based computational methods in the study of electricity markets at the wholesale and retail levels, and distinctions in problem formulation between these levels.

Widergren, Steven E.; Sun, Junjie; Tesfatsion, Leigh

2006-06-18T23:59:59.000Z

404

Fast neutron environments.  

SciTech Connect

The goal of this LDRD project is to develop a rapid first-order experimental procedure for the testing of advanced cladding materials that may be considered for generation IV nuclear reactors. In order to investigate this, a technique was developed to expose the coupons of potential materials to high displacement damage at elevated temperatures to simulate the neutron environment expected in Generation IV reactors. This was completed through a high temperature high-energy heavy-ion implantation. The mechanical properties of the ion irradiated region were tested by either micropillar compression or nanoindentation to determine the local properties, as a function of the implantation dose and exposure temperature. In order to directly compare the microstructural evolution and property degradation from the accelerated testing and classical neutron testing, 316L, 409, and 420 stainless steels were tested. In addition, two sets of diffusion couples from 316L and HT9 stainless steels with various refractory metals. This study has shown that if the ion irradiation size scale is taken into consideration when developing and analyzing the mechanical property data, significant insight into the structural properties of the potential cladding materials can be gained in about a week.

Buchheit, Thomas Edward; Kotula, Paul Gabriel; Lu, Ping; Brewer, Luke N. (Naval Postgraduate School, Monterey, CA); Goods, Steven Howard (Sandia National Laboratories, Livermore, CA); Foiles, Stephen Martin; Puskar, Joseph David; Hattar, Khalid Mikhiel; Doyle, Barney Lee; Boyce, Brad Lee; Clark, Blythe G.

2011-10-01T23:59:59.000Z

405

ENERGY & ENVIRONMENT DIVISION. ANNUAL REPORT FY 1980  

E-Print Network (OSTI)

OF CALIFORNIA ENERGY & ENVIRONMENT DIVISION DIVISION HEAD E.Pollutants in Combustion Environments D. Lucas, N. Brown,Inc. , Energy/Environment Data Study, Cambridge, Mass. , May

Authors, Various

2010-01-01T23:59:59.000Z

406

Constructing Commons in the Cultural Environment  

E-Print Network (OSTI)

Commons in the Cultural Environment Michael J. MadisonCOMMONS IN THE CULTURAL ENVIRONMENT Draft of August 27, 2008Commons in the Cultural Environment ? Michael J. Madison, 1

Madison, Michael J.; Frischmann, Brett M.; Strandburg, Katherine J.

2008-01-01T23:59:59.000Z

407

Stockholm Environment Institute (SEI) | Open Energy Information  

Open Energy Info (EERE)

Stockholm Environment Institute (SEI) Jump to: navigation, search Logo: Stockholm Environment Institute Name Stockholm Environment Institute Address Kraftriket 2B, SE-106 91 Place...

408

Healing effects of the built environment  

E-Print Network (OSTI)

s Hospital garden environment: Utilization and consumerand testing of models. Environment and Behavior, 36, Bond,of language acquisition. Environment and Behavior, 29, 638-

Sherman, Sandra Anne

2008-01-01T23:59:59.000Z

409

Playing the Environment: Games as Virtual Ecologies  

E-Print Network (OSTI)

Playing the Environment: Games as Virtual Ecologies Alendasocial realism, games, environment, ecology 1. INTRODUCTIONversions of the environment? The answer is multifaceted.

Chang, Alenda Y.

2009-01-01T23:59:59.000Z

410

Environment/Health/Safety (EHS)  

NLE Websites -- All DOE Office Websites (Extended Search)

to assist Berkeley Lab supervisors and managers in conducting discussions on environment, safety and health topics with their staff. Each slide delivers focused talking...

411

ORISE: Contact Environment, Safety & Health  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety Integrated Safety Management Voluntary Protection Program VPP Star Status Environment Work Smart Standards Oak Ridge Institute for Science Education Contact Us Use the form...

412

Environment/Health/Safety (EHS)  

NLE Websites -- All DOE Office Websites (Extended Search)

recommendations to the Laboratory Director on the development and implementation of Environment, Safety & Health (ES&H) policy, guidelines, codes and regulatory interpretation. It...

413

Environment/Health/Safety (EHS)  

NLE Websites -- All DOE Office Websites (Extended Search)

Concerns Training SubcontractorsVendors (SJHA) Waste Management What We Do The EnvironmentHealthSafety division helps Berkeley Lab staff perform their work safely and in an...

414

Stretched Polymers in Random Environment  

E-Print Network (OSTI)

We survey recent results and open questions on the ballistic phase of stretched polymers in both annealed and quenched random environments.

Dmitry Ioffe; Yvan Velenik

2010-11-01T23:59:59.000Z

415

Recirculation of Materials and Environments  

Science Conference Proceedings (OSTI)

Mar 6, 2013... Chemical Manufacturing and Its Impact on Environment – A Review: Sergio Sanchez-Segado1; Animesh Jha1; 1University of Leeds

416

The Parallel Applications Development Environment  

Science Conference Proceedings (OSTI)

... configured his or her environment as described in Chapter 2 of this manual. ... output of these commands, scripts, or programs can be piped back to ...

417

OpenEI Community - Environment  

Open Energy Info (EERE)

s-partner-expand-natural-gas-highwaycomments clean energy Clean Energy Fuels energy Environment Fuel GE Innovation Partnerships Technology Innovation & Solutions Transportation...

418

Multiscale Modeling of Interfacial Environments around ...  

Science Conference Proceedings (OSTI)

Multiscale Modeling of Interfacial Environments around Carbon Nanotubes. ... can be significantly affected by the interfacial environment at the ...

2013-02-13T23:59:59.000Z

419

The human agent virtual environment  

Science Conference Proceedings (OSTI)

In this paper we describe a multi-agent simulation called the Human Agent Virtual Environment (or HAVE). HAVE is a test bed to explore agent-environment interaction in multi-agent simulation for defence applications. The primary research driver in the ... Keywords: agents and cognitive models, defence, multi-agent simulation and modeling

Michael Papasimeon; Adrian R. Pearce; Simon Goss

2007-05-01T23:59:59.000Z

420

Qualitative physics in virtual environments  

Science Conference Proceedings (OSTI)

In this paper, we describe a new approach to the creation of virtual environments, which uses qualitative physics to implement object behaviour. We adopted Qualitative Process Theory as a qualitative reasoning formalism, due to its representational properties ... Keywords: intelligent virtual environments, modelling and simulation, qualitative physics

Marc Cavazza; Simon Hartley; Jean-Luc Lugrin; Mikael Le Bras

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

GalaxyCount: a JAVA calculator of galaxy counts and variances in multiband wide-field surveys to 28 AB mag  

E-Print Network (OSTI)

We provide a consistent framework for estimating galaxy counts and variances in wide-field images for a range of photometric bands. The variances include both Poissonian noise and variations due to large scale structure. We demonstrate that our statistical theory is consistent with the counts in the deepest multiband surveys available. The statistical estimates depend on several observational parameters (e.g. seeing, signal to noise ratio), and include a sophisticated treatment of detection completeness. The JAVA calculator is freely available and offers the user the option to adopt our consistent framework or a different scheme. We also provide a summary table of statistical measures in the different bands for a range of different fields of view. Reliable estimation of the background counts has profound consequences in many areas of observational astronomy. We provide two such examples. One is from a recent study of the Sculptor galaxy NGC 300 where stellar photometry has been used to demonstrate that the outer disc extends to 10 effective radii, far beyond what was thought possible for a normal low-luminosity spiral. We confirm this finding by a reanalysis of the background counts. Secondly, we determine the luminosity function of the galaxy cluster Abell 2734, both through spectroscopically determined cluster membership, and through statistical subtraction of the background galaxies using the calculator and offset fields. We demonstrate very good agreement, suggesting that expensive spectroscopic follow-up, or off-source observations, may often be bypassed via determination of the galaxy background with GalaxyCount.

S. C. Ellis; J. Bland-Hawthorn

2006-02-27T23:59:59.000Z

422

Citation Environment of Angewandte Chemie  

E-Print Network (OSTI)

Recently, aggregated journal-journal citation networks were made accessible from the perspective of each journal included in the Science Citation Index see (http://www.leydesdorff.net/). The local matrices can be used to inspect the relevant citation environment of a journal using statistical analysis and visualization techniques from social network analysis. The inspection gives an answer to the question what the local impact of this and other journals in the environment is. In this study the citation environment of Angewandte Chemie was analysed. Angewandte Chemie is one of the prime chemistry journals in the world. Its environment was compared with that of the Journal of the American Chemical Society. The results of the environment analyses give a detailed insight into the field-embeddedness of Angewandte Chemie. The impacts of the German and international editions of this journal are compared.

Bornmann, Lutz; Marx, Werner

2009-01-01T23:59:59.000Z

423

Cyclogenesis in a Saturated Environment  

Science Conference Proceedings (OSTI)

The dynamics of baroclinic wave growth in a saturated environment is examined using linear and nonlinear models employing a parameterization of latent heat release that assumes all rising air is saturated, and saturation equivalent potential ...

Jeffrey S. Whitaker; Christopher A. Davis

1994-03-01T23:59:59.000Z

424

The Environment, Health and Safety  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment, Health and Safety Program at the MIT Plasma Science and Fusion Center Catherine Fiore PSFC Office of ES&H May 14, 2003 C Mod Alcator Design of the EHS system for...

425

Views of software development environments  

Science Conference Proceedings (OSTI)

This paper develops an abstract model of software development and then explores its implications for software development environments (SDEs). It explores the automation of engineering, i.e., what to automate, and the engineering of automation, ...

W. Stinson

1989-07-01T23:59:59.000Z

426

Environment | OpenEI Community  

Open Energy Info (EERE)

Environment Home Jessi3bl's picture Submitted by Jessi3bl(15) Member 16 December, 2012 - 19:18 GE, Clean Energy Fuels Partner to Expand Natural Gas Highway clean energy Clean...

427

A MATLAB® function for Network Environ Analysis  

Science Conference Proceedings (OSTI)

Network Environ Analysis is a formal, quantitative methodology to describe an object's within system ''environ''ment [Patten, B.C., 1978a. Systems approach to the concept of environment. Ohio Journal of Science 78, 206-222]. It provides a perspective ... Keywords: Ecological Modelling, Ecological Network Analysis, Network Environ Analysis

Brian D. Fath; Stuart R. Borrett

2006-03-01T23:59:59.000Z

428

Human Footprints on the Global Environment  

E-Print Network (OSTI)

Footprints on the Global Environment. By Rosa A. Eugene,Footprints on the Global Environment. MIT Press, 2010. xi +of its own impact on the environment that surrounds its

Ferrara, Enzo

2011-01-01T23:59:59.000Z

429

The Ravenscar-compliant hardware run-time (Ravenhart) kernel  

E-Print Network (OSTI)

Real-time embedded systems are increasingly becoming the foundation of control systems in both the aerospace and automotive worlds. This class of systems has to meet three requirements: strict timing constraints on operational ...

Silbovitz, Anna, 1979-

2004-01-01T23:59:59.000Z

430

Framework for Adaptable Operating and Runtime Systems: Final Project Report  

SciTech Connect

In this grant, we examined a wide range of techniques for constructing high-performance con#12;gurable system software for HPC systems and its application to DOE-relevant problems. Overall, research and development on this project focused in three specifc areas: (1) software frameworks for constructing and deploying con#12;gurable system software, (2) applcation of these frameworks to HPC-oriented adaptable networking software, (3) performance analysis of HPC system software to understand opportunities for performance optimization.

Patrick G. Bridges

2012-02-01T23:59:59.000Z

431

Efficient virtual machine support of runtime structural reflection  

Science Conference Proceedings (OSTI)

Increasing trends towards adaptive, distributed, generative and pervasive software have made object-oriented dynamically typed languages become increasingly popular. These languages offer dynamic software evolution by means of reflection, facilitating ... Keywords: Dynamically typed languages, JIT compilation, Prototype-based object-oriented model, SSCLI, Structural reflection, Virtual machine

Francisco Ortin; Jose Manuel Redondo; J. Baltasar García Perez-Schofield

2009-08-01T23:59:59.000Z

432

Unifying Design and Runtime Software Adaptation Using Aspect Models  

E-Print Network (OSTI)

guides de la CIBSE (CIBSE, 2005 et CIBSE, 2006). 1.2.1.2 Corrélation de Phaff et De Gids Phaff et De Gids

Paris-Sud XI, Université de

433

A timeshared, runtime reconfigurable hardware co-processing architecture  

E-Print Network (OSTI)

The constant desire for increased performance in microprocessor systems has led to the need for specialized hardware cores to accelerate specific computational tasks. In this thesis, we explore the potential of using FPGA ...

Gelb, Benjamin S

2009-01-01T23:59:59.000Z

434

Towards Runtime Reconfiguration of Application Control Policies in the Cloud  

Science Conference Proceedings (OSTI)

The main contribution of this paper is the description of an architecture for dynamically controlling the behavior of the applications deployed in the Cloud by using a set of high-level rules. This architecture is flexible enough to enable the re-definition ... Keywords: Application governance, Cloud, Dynamic reconfiguration, Rule based, Service behavior

Luis M. Vaquero; Daniel Morán; Fermín Galán; Jose M. Alcaraz-Calero

2012-12-01T23:59:59.000Z

435

NDSeq: runtime checking for nondeterministic sequential specifications of parallel correctness  

Science Conference Proceedings (OSTI)

We propose to specify the correctness of a program's parallelism using a sequential version of the program with controlled nondeterminism. Such a nondeterministic sequential specification allows (1) the correctness of parallel interference to ... Keywords: parallel correctness, serializability, specification

Jacob Burnim; Tayfun Elmas; George Necula; Koushik Sen

2011-06-01T23:59:59.000Z

436

Transparent run-time defense against stack smashing attacks  

Science Conference Proceedings (OSTI)

The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing ...

Arash Baratloo; Navjot Singh; Timothy Tsai

2000-06-01T23:59:59.000Z

437

Generalizing mapreduce as a unified cloud and HPC runtime  

Science Conference Proceedings (OSTI)

Computational simulation and analysis were one of the keys to the future in data-intensive science as a "fourth paradigm" of scientific discovery but facing a major challenge as handling the incredible increases in dataset sizes. This requires attractive ... Keywords: HPC, cloud, data analysis, fault tolerance, interoperability, iterative mapreduce, map collective, scaling performance

Judy Qiu

2011-11-01T23:59:59.000Z

438

Runtime detection and optimization of collective communication patterns  

Science Conference Proceedings (OSTI)

Parallelism is steadily growing, remote-data access will soon dominate the execution time of large-scale applications. Many large-scale communication patterns expose significant structure that can be used to schedule communications accordingly. In this ... Keywords: collective operations, dynamic optimization, mpi

Torsten Hoefler; Timo Schneider

2012-09-01T23:59:59.000Z

439

Radiation Environment Assimilation Model (DREAM).  

NLE Websites -- All DOE Office Websites (Extended Search)

DREAM tool increases space weather DREAM tool increases space weather predictions April 13, 2012 Predicting space weather improved by new DREAM modeling tool Earth's radiation belts can now be studied with a new modeling tool called Dynamic Radiation Environment Assimilation Model (DREAM). Researchers in LANL's Space Science and Applications (ISR-1) group are developing DREAM and described its current capabilities and applications in an article published in Space Weather, a journal of the American Geophysical Union. - 2 - Space environment and its hazards The space environment poses a number of radiation hazards to space systems and their occupants. Relativistic electrons, the dominant source of the radiation dose to spacecraft traveling in the outer radiation belts (3-7 Earth radii), have an electron flux

440

3.0 EXISTING ENVIRONMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 EXISTING ENVIRONMENT 0 EXISTING ENVIRONMENT This chapter describes various components of the existing environment that may be affected by the operation of the Mound glass melter. The proposed action pctentially impacts air quality. surface water quality. biological resources. and human health and safety. In order to evaluate impacts to these resources. information on existing conditions is required. Section 3.1 presents information on atmospheric resources (e.g., meteorology and existing air quality) . Section 3.2 presents data on water resources, and Section 3.3 provides a broad characterization of biological resources. 3.1 ATMOSPHERIC RESOURCES Emissions from the glass melter potentially affect local and regional air quality. To evaluate impacts to these receptors, data on meteorologic conditions (particularly wind

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Ariane Environment | Open Energy Information  

Open Energy Info (EERE)

Ariane Environment Ariane Environment Jump to: navigation, search Name Ariane Environment Place London, United Kingdom Zip W8 6JL Product String representation "Ariane Environm ... onmental value." is too long. Coordinates 51.506325°, -0.127144° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":51.506325,"lon":-0.127144,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

442

Westminster Energy Environment Transport Forum | Open Energy...  

Open Energy Info (EERE)

Westminster Energy Environment Transport Forum Jump to: navigation, search Name Westminster Energy, Environment & Transport Forum Place United Kingdom Product String representation...

443

Modeling thermal comfort in stratified environments  

E-Print Network (OSTI)

Arens E. , and Wang D. 2004. "Thermal sensation and comfortin transient non-uniform thermal environments", European7730, 1994, Moderate Thermal Environments – Determination of

Zhang, H.; Huizenga, C.; Arens, Edward A; Yu, T.

2005-01-01T23:59:59.000Z

444

Global Environment Facility (GEF) | Open Energy Information  

Open Energy Info (EERE)

Edit with form History Share this page on Facebook icon Twitter icon Global Environment Facility (GEF) Jump to: navigation, search Name Global Environment Facility Address...

445

BNL | Climate, Environment and Bisoscience  

NLE Websites -- All DOE Office Websites (Extended Search)

Climate, Environment, and Biosciences Climate, Environment, and Biosciences bioscience research Revealing Nature-from Microscopic to Atmospheric Scales With recognized expertise in plant sciences, imaging, and climate studies, Brookhaven Lab advances some of the most promising scientific methods of achieving a sustainable future. This cross-disciplinary research seeks to understand the relationships between climate change, sustainable energy initiatives, and the planet's natural ecosystems. As environmental and economic issues mount, this research will provide increasingly important guidance and opportunities for climate change management strategies, approaches to adaptation, and policy decisions. Building a Sustainable Future Major goals include: Significantly improving climate models based on high-quality data

446

Yucca Mountain and The Environment  

Science Conference Proceedings (OSTI)

The Yucca Mountain Project places a high priority on protecting the environment. To ensure compliance with all state and federal environmental laws and regulations, the Project established an Environmental Management System. Important elements of the Environmental Management System include the following: (1) monitoring air, water, and other natural resources; (2) protecting plant and animal species by minimizing land disturbance; (3) restoring vegetation and wildlife habitat in disturbed areas; (4) protecting cultural resources; (5) minimizing waste, preventing pollution, and promoting environmental awareness; and (6) managing of hazardous and non-hazardous waste. Reducing the impacts of Project activities on the environment will continue for the duration of the Project.

NA

2005-04-12T23:59:59.000Z

447

Modular, automated software testing environment  

SciTech Connect

A software development methodology has been developed with Softool's Change and Configuration Control (CCC) environment. Fundamental to this approach is the exclusion of all development activities from the CCC data base. The contents of the CCC data base are restricted to software which has passed appropriate reviews. Development activities are performed in the host operating system account of various programmers. A set of CCC macros and VUS command files support this methodology, thereby allowing the configuration manager to transfer files between the development and configuration management environments. 3 refs.

Cort, G.; Nelson, R.O.

1986-01-01T23:59:59.000Z

448

Trade and the environment: Discussion  

Science Conference Proceedings (OSTI)

The author presents a synopsis of several papers on the issue of international trade and the environment. The papers address the following topics: the complex interrelationships of international trade, environment, and poverty in developing countries; environmental aspects of economic relations between nations; and the debate between environmentalists and free trade advocates. The author also adds comments about the US embargo on Mexican yellow-fin tuna imports, concluding that this unilateral embargo action, while initially creating tentions, may have provided a useful impetus to working out a multinational environmental standard.

Lutz, E.

1992-12-01T23:59:59.000Z

449

Environment  

Science Conference Proceedings (OSTI)

Table 7   Pressure vessel steels for high-temperature service...composition Normal temperature range of usage Allowable stress at low end of usage temperature Allowable stress at high end of usage temperature °C °F MPa ksi MPa ksi SA 204, grade C 0.28% C max; 0.45â??0.60% Mo 430â??510 800â??950 130 18.8 57 8.2 SA 302, grade B 0.25% C max; 1.15â??1.50% Mn;...

450

Organising software in active environments  

Science Conference Proceedings (OSTI)

In this paper, we investigate the use of logic-based multi-agent systems for modelling active environments. Our case study is an intelligent support system for a so-called “active museum”. We show the approach of structuring the “agent ...

Benjamin Hirsch; Michael Fisher; Chiara Ghidini; Paolo Busetta

2004-09-01T23:59:59.000Z

451

Transportation environment data bank index  

SciTech Connect

In an effort to determine the environment intensities to which shipping containers will be exposed, a ''Data Bank'' of environmental information has been established by Sandia Laboratories, Division 1285 for the ERDA Division of Environmental Control Technology. This document is an index which can be used to request data of interest. (auth)

Davidson, C.A.; Foley, J.T.

1976-02-01T23:59:59.000Z

452

Empathy in virtual learning environments  

Science Conference Proceedings (OSTI)

How do we engage teachers and learners in the learning process and what are the benefits of this? How do we get students to learn? Many academic institutions of all levels are asking these questions. Throughout the years new teaching methodologies ... Keywords: Second Life, VLEs, e-learning, empathy, engagement, online learning, teaching methodologies, virtual learning environments

Judith Molka-Danielsen; Bryan W. Carter; Alastair Creelman

2009-02-01T23:59:59.000Z

453

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

454

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25, 2011 25, 2011 U-019: Oracle Critical Patch Update Advisory - October 2011 October 2011 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. October 25, 2011 U-018: Oracle AutoVue ActiveX Control Insecure Method Vulnerabilities Successful exploitation of the vulnerabilities allows execution of arbitrary code. October 20, 2011 U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. October 19, 2011 U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote

455

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

456

Java PathFinder A Translator from Java to Promela  

E-Print Network (OSTI)

nterrupts, and perhaps most importantly: thread operations. Among major concepts not translated are: packages, method overloading and overriding, method recursion, strings, and floating point numbers. Finally, the class library is not translated. References

Klaus Havelund

1999-01-01T23:59:59.000Z

457

Supplement: Java Packages For Introduction to Java Programming  

E-Print Network (OSTI)

conveniently. Packages group related classes so that they can be easily distributed. To protect classes. Packages provide protection so that the protected members of the classes are accessible to the classes of the package name and the file system directory structure. For the package named com.prenhall.mypackage, you

Liang, Y. Daniel

458

Environment/Climate Programs and Projects  

Science Conference Proceedings (OSTI)

... separate interlaboratory comparison exercises for environmental contaminants in ... Organic Contaminants in the Marine Environment Last Updated ...

2010-09-22T23:59:59.000Z

459

Scaffold Gradients: Finding the Right Environment for ...  

Science Conference Proceedings (OSTI)

Scaffold Gradients: Finding the Right Environment for Developing Cells. For Immediate Release: May 25, 2010. ...

2013-05-14T23:59:59.000Z

460

Environment and Nuclear Programs | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment and Nuclear Programs Environment and Nuclear Programs Environment and Nuclear Programs Cooling Tower Reflection | Credit: DOE Archives Cooling Tower Reflection | Credit: DOE Archives Offices of the Deputy General Counsel for Environment and Nuclear Programs Office of the Assistant General Counsel for Environment (GC-51) Office of the Assistant General Counsel for Civilian Nuclear Programs (GC-52 ) Office of the Assistant General Counsel for International and National Security Programs (GC-53) Office of NEPA Policy and Compliance (GC-54) Office of Standard Contract Management (GC-55) Litigation and Enforcement Environment and Nuclear Programs Environment Civilian Nuclear Programs International and National Security Programs NEPA Policy and Compliance Standard Contract Management Technology Transfer and Procurement

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

The Built Environment and Migration: A Case Study of Mexico  

E-Print Network (OSTI)

iv Introduction The built environment expresses the changingThe Built Environment & Migration: A Case Study in MexicoEnvironment.

Ramirez, Rosa

2009-01-01T23:59:59.000Z

462

Office of the Assistant General Counsel for Environment | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environment Office of the Assistant General Counsel for Environment Litigation and Enforcement Environment and Nuclear Programs Environment Civilian Nuclear Programs International...

463

Automatic Test Factoring for Java  

E-Print Network (OSTI)

Test factoring creates fast, focused unit tests from slow system-widetests; each new unit test exercises only a subset of the functionalityexercised by the system test. Augmenting a test suite with factoredunit tests ...

Saff, David

2005-06-08T23:59:59.000Z

464

JAS - a Java action semantics  

E-Print Network (OSTI)

Brown,D.F. Watt,D.A. Proceedings of 2nd International Workshop on Action Semantics pp 43-56 Dept of Computer Science, University of Aarhus

Brown, D.F.; Watt, D.A.

465

Providing Orthogonal Persistence for Java  

E-Print Network (OSTI)

Atkinson,M.P. Jordan,M.J. Proceedings of ECOOP'98, Object-Oriented Programming, Belgium, July 1998, Lecture Notes in Computer Science, (Jul,E., Ed), Volume No. 1445. pp 383-395 Springer

Atkinson, M.P.

466

An Orthogonally Persistent Java TM  

E-Print Network (OSTI)

Atkinson,M.P. Daynes,L. Jordan,M.J. Printezis,T. Spence,S. ACM SIGMOD Record, Vol. 25 No. 4 pp 68-75 ACM

Atkinson, M.P.

467

RNEDE: Resilient Network Design Environment  

SciTech Connect

Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge disruptions. Traditional design of this web of critical infrastructure systems was based on the principles of functionality and reliability. However, it is increasingly being realized that such design objectives are not sufficient. Threats, disruptions and faults often compromise the network, taking away the benefits of an efficient and reliable design. Thus, traditional network design parameters must be combined with self-healing mechanisms to obtain a resilient design of the network. In this paper, we present RNEDEa resilient network design environment that that not only optimizes the network for performance but tolerates fluctuations in its structure that result from external threats and disruptions. The environment evaluates a set of remedial actions to bring a compromised network to an optimal level of functionality. The environment includes a visualizer that enables the network administrator to be aware of the current state of the network and the suggested remedial actions at all times.

Venkat Venkatasubramanian, Tanu Malik, Arun Giridh; Craig Rieger; Keith Daum; Miles McQueen

2010-08-01T23:59:59.000Z

468

Advanced Instrumentation for Extreme Environments  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Office of Nuclear Energy (NE) is pursuing embedded instrumentation and controls (I&C) technology for next generation nuclear power generation applications. Embedded systems encompass a wide range of configurations and technologies; we define embedding in this instance as the integration of the sensors and the control system design into the component design using a systems engineering process. Embedded I&C systems are often an essential part of developing new capabilities, improving reliability, enhancing performance, and reducing operational costs. The new intrinsically safe, more efficient, and cost effective reactor technologies (Next Generation Nuclear Plant and Small Modular Reactors) require the development and application of new I&C technologies. These new designs raise extreme environmental challenges such as high temperatures (over 700 C) and material compatibility (e.g., molten salts). The desired reliability and functionality requires measurements in these extreme conditions including high radiation environments which were not previously monitored in real time. The DOE/NE Nuclear Energy Enabling Technologies (NEET) program currently has several projects investigating I&C technologies necessary to make these reactor designs realizable. The project described in this paper has the specific goal of investigating embedded I&C with the following objectives: 1.Explore and quantify the potential gains from embedded I&C improved reliability, increased performance, and reduced cost 2.Identify practical control, sensing, and measurement techniques for the extreme environments found in high-temperature reactors 3.Design and fabricate a functional prototype high-temperature cooling pump for molten salts represents target demonstration of improved performance, reliability, and widespread usage There are many engineering challenges in the design of a high-temperature liquid salt cooling pump. The pump and motor are in direct contact with molten fluoride salt at 700 C (1,292 F) as part of a reactor cooling loop. The motor-pump combination during normal operation would be red-hot (Figure 1). This environment challenges every facet of the design including seals, wiring, magnetic materials, and sensors. In this paper, we discuss the challenges of sensor design in extreme environments and specifically the sensor design for a high-temperature fluoride salt coolant pump. This pump will be used as a test-bed for embedded I&C development and validation in extreme environments.

Melin, Alexander M [ORNL; Kisner, Roger [ORNL; Fugate, David L [ORNL

2013-01-01T23:59:59.000Z

469

Quantum Capacities of Channels with small Environment  

E-Print Network (OSTI)

We investigate the quantum capacity of noisy quantum channels which can be represented by coupling a system to an effectively small environment. A capacity formula is derived for all cases where both system and environment are two-dimensional--including all extremal qubit channels. Similarly, for channels acting on higher dimensional systems we show that the capacity can be determined if the channel arises from a sufficiently small coupling to a qubit environment. Extensions to instances of channels with larger environment are provided and it is shown that bounds on the capacity with unconstrained environment can be obtained from decompositions into channels with small environment.

Michael M. Wolf; David Perez-Garcia

2006-07-11T23:59:59.000Z

470

Study of changes in the Solar Environment  

E-Print Network (OSTI)

Recent studies have shown that the local environment of the Sun is a complex one with the presence of several supernova shock bubbles and interstellar clouds. Even within this environment, the Sun is moving with a velocity of about 15 km/s toward the interior of the galaxy. We examine the changes in the local ISM environment experienced by the Sun in the past and then discuss the interaction of the Sun with these different environments. Lastly, we inquire how this must have changed the cosmic ray environment of the earth since this remains one of the few methods to test the changes in the local ISM environment over astronomical time scales. %

M N Vahia

2004-04-05T23:59:59.000Z

471

Advanced engineering environment pilot project.  

SciTech Connect

The Advanced Engineering Environment (AEE) is a concurrent engineering concept that enables real-time process tooling design and analysis, collaborative process flow development, automated document creation, and full process traceability throughout a product's life cycle. The AEE will enable NNSA's Design and Production Agencies to collaborate through a singular integrated process. Sandia National Laboratories and Parametric Technology Corporation (PTC) are working together on a prototype AEE pilot project to evaluate PTC's product collaboration tools relative to the needs of the NWC. The primary deliverable for the project is a set of validated criteria for defining a complete commercial off-the-shelf (COTS) solution to deploy the AEE across the NWC.

Schwegel, Jill; Pomplun, Alan R.; Abernathy, Rusty (Parametric Technology Corporation, Needham, MA)

2006-10-01T23:59:59.000Z

472

Harsh environments electronics : downhole applications.  

Science Conference Proceedings (OSTI)

The development and operational sustainment of renewable (geothermal) and non-renewable (fossil fuel) energy resources will be accompanied by increasingly higher costs factors: exploration and site preparation, operational maintenance and repair. Increased government oversight in the wake of the Gulf oil spill will only add to the cost burden. It is important to understand that downhole conditions are not just about elevated temperatures. It is often construed that military electronics are exposed to the upper limit in terms of extreme service environments. Probably the harshest of all service conditions for electronics and electrical equipment are those in oil, gas, and geothermal wells. From the technology perspective, advanced materials, sensors, and microelectronics devices are benefificial to the exploration and sustainment of energy resources, especially in terms of lower costs. Besides the need for the science that creates these breakthroughs - there is also a need for sustained engineering development and testing. Downhole oil, gas, and geothermal well applications can have a wide range of environments and reliability requirements: Temperature, Pressure, Vibration, Corrosion, and Service duration. All too frequently, these conditions are not well-defifined because the application is labeled as 'high temperature'. This ambiguity is problematic when the investigation turns to new approaches for electronic packaging solutions. The objective is to develop harsh environment, electronic packaging that meets customer requirements of cost, performance, and reliability. There are a number of challenges: (1) Materials sets - solder alloys, substrate materials; (2) Manufacturing process - low to middle volumes, low defect counts, new equipment technologies; and (3) Reliability testing - requirements documents, test methods and modeling, relevant standards documents. The cost to develop and sustain renewable and non-renewable energy resources will continue to escalate within the industry. Downhole electronics can provide a very cost-effective approach for well exploration and sustainment (data logging). However, the harsh environments are a 'game-changer' in terms defining materials, assembly processes and the long-term reliability of downhole electronic systems. The system-level approach will enable the integration of each of these contributors - materials, processes, and reliability - in order to deliver cost-effective electronics that meet customer requirements.

Vianco, Paul Thomas

2011-03-01T23:59:59.000Z

473

and environments and natural hazards  

E-Print Network (OSTI)

The purpose of the curriculum is to provide basic knowledge and understanding of marine debris and its hazardous impact on the marine and coastal ecosystems as well as human health and safety. The primary goal of the curriculum is to provide activities which help students understand the impact of their actions on the marine environment and themselves. The curriculum will provide several hands-on activities and graphing opportunities using Microsoft Excel. The activities and graphing exercises may be modified for other grade levels.

Created Matthew Brim

2009-01-01T23:59:59.000Z

474

Balancing oil and environment... responsibly.  

Science Conference Proceedings (OSTI)

Balancing Oil and Environment…Responsibly As the price of oil continues to skyrocket and global oil production nears the brink, pursuing unconventional oil supplies, such as oil shale, oil sands, heavy oils, and oils from biomass and coal has become increasingly attractive. Of particular significance to the American way is that our continent has significant quantities of these resources. Tapping into these new resources, however, requires cutting-edge technologies for identification, production, processing and environmental management. This job needs a super hero or two for a job of this size and proportion…

Weimer, Walter C.; Teske, Lisa

2007-01-25T23:59:59.000Z

475

Evolving triggers for dynamic environments  

E-Print Network (OSTI)

Abstract. In this work we address the problem of managing the reactive behavior in distributed environments in which data continuously changes over time, where the users may need to explicitly express how the triggers should be (self) modified. To enable this we propose the (ECA) 2 – Evolving and Context-Aware Event-Condition-Action paradigm for specifying triggers that capture the desired reactive behavior in databases which manage distributed and continuously changing data. Since both the monitored event and the condition part of the trigger may be continuous in nature, we introduce the concept of metatriggers to coordinate the detection of events and the evaluation of conditions. 1

Goce Trajcevski; Peter Scheuermann; Oliviu Ghica; Annika Hinze Agnes

2006-01-01T23:59:59.000Z

476

Quantum Darwinism in a hazy environment  

E-Print Network (OSTI)

Quantum Darwinism recognizes that we - the observers - acquire our information about the "systems of interest" indirectly from their imprints on the environment. Here, we show that information about a system can be acquired from a mixed-state, or hazy, environment, but the storage capacity of an environment fragment is suppressed by its initial entropy. In the case of good decoherence, the mutual information between the system and the fragment is given solely by the fragment's entropy increase. For fairly mixed environments, this means a reduction by a factor 1-h, where h is the haziness of the environment, i.e., the initial entropy of an environment qubit. Thus, even such hazy environments eventually reveal the state of the system, although now the intercepted environment fragment must be larger by ~1/(1-h) to gain the same information about the system.

Michael Zwolak; H. T. Quan; Wojciech H. Zurek

2009-04-02T23:59:59.000Z

477

Semiclassical environment of collapsing shells  

E-Print Network (OSTI)

We explore in detail the semiclassical environment of collapsing shells of matter, and determine the semiclassical flux measured by a variety of observers. This study is a preliminary step in a broader investigation of thermodynamic properties of the geometry of collapsing objects. Specifically, in this paper we consider spherically symmetric null and timelike collapsing shells which form an event horizon, and calculate the flux measured by observers both inside and outside the shell, and both inside and outside the event horizon, and find nontrivial results in most of the cases. Additionally, we also investigate the environment of a shell which collapses but \\emph{does not} form a horizon, halting at some radius larger than the Schwarzschild radius, and find that such an object generically gives rise to a pulse of radiation which is sharply peaked as it travels inwards and is reflected at the origin, and eventually emerges from the shell in a "thermalized" form. Our results have potential consequences in addressing questions pertaining, e.g. to black hole entropy and backreaction.

Kinjal Banerjee; Aseem Paranjape

2009-09-25T23:59:59.000Z

478

Tritium in the aquatic environment  

SciTech Connect

Tritium is of environmental importance because it is released from nuclear facilities in relatively large quantities and because it has a half life of 12.26 y. Most of the tritium released into the atmosphere eventually reaches the aqueous environment, where it is rapidly taken up by aquatic organisms. This paper reviews the current literature on tritium in the aquatic environment. Conclusions from the review, which covered studies of algae, aquatic macrophytes, invertebrates, fish, and the food chain, were that aquatic organisms incorporate tritium into their tissue-free water very rapidly and reach concentrations near those of the external medium. The rate at which tritium from tritiated water is incorporated into the organic matter of cells is slower than the rate of its incorporation into the tissue-free water. If organisms consume tritiated food, incorporation of tritium into the organic matter is faster, and a higher tritium concentration is reached than when the organisms are exposed to only tritiated water alone. Incorporation of tritium bound to molecules into the organic matter depends on the chemical form of the ''carrier'' molecule. No evidence was found that biomagnification of tritium occurs at higher trophic levels. Radiation doses from tritium releases to large populations of humans will most likely come from the consumption of contaminated water rather than contaminated aquatic food products.

Blaylock, B.G.; Hoffman, F.O.; Frank, M.L.

1986-02-01T23:59:59.000Z

479

Advanced Materials and Processes for Extreme Environments  

Science Conference Proceedings (OSTI)

Symposium, Advanced Materials and Reservoir Engineering for Extreme Oil & Gas Environments. Presentation Title, Advanced Materials and Processes for ...

480

SMSD Microanalysis Research Group Environment Program  

Science Conference Proceedings (OSTI)

Environment. Summary: Behavior and effects of environmental nanoparticles are analyzed using model systems and focused ion beam scanning ...

2012-10-02T23:59:59.000Z

Note: This page contains sample records for the topic "java runtime environment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Primary Production, Recycling, and Environment - TMS  

Science Conference Proceedings (OSTI)

ARTICLES: Selected Readings on Magnesium Production, Recycling and Environment Links to key papers on magnesium primary production, recycling and ...

482

Nanocrystalline and Nanotwinned Metals under Extreme Environment  

Science Conference Proceedings (OSTI)

The applicability of nanostructured metals under extreme environment (high temperature, ... of Transport Phenomena for Enhanced Oil Recovery Applications .

483

Nanotechnology for Energy, Environment, Electronics & Industry  

Science Conference Proceedings (OSTI)

Symposium, Nanotechnology for Energy, Environment, Electronics & Industry ... Electrochemical Optimization of TiO2 Nanotubular Structure Formation and ...

484

ICT impact on competitiveness, innovation and environment  

Science Conference Proceedings (OSTI)

This paper examines the impact of ICT on competitiveness, innovation and environment in the glass, ceramics and cement concrete industry. The results show that use of ICT seems to favor innovation and competitiveness. As for the effect on the environment, ... Keywords: Competitiveness, Environment, ICT, Innovation

Andrea Ollo-López; M. Elena Aramendía-Muneta

2012-05-01T23:59:59.000Z

485

Assessing process-centered software engineering environments  

Science Conference Proceedings (OSTI)

Process-centered software engineering environments (PSEEs) are the most recent generation of environments supporting software development activities. They exploit an representation of the process (called the process model that specifies ... Keywords: CASE, enabling technology, process modeling languages, process-centered software engineering environments, software process

Vincenzo Ambriola; Reidar Conradi; Alfonso Fuggetta

1997-07-01T23:59:59.000Z

486

Environment/Health/Safety (EHS)  

NLE Websites -- All DOE Office Websites (Extended Search)

LBNL/PUB-3092 LBNL/PUB-3092 Guidelines for Generators to Meet HWHF Acceptance Requirements for Hazardous, Radioactive, and Mixed Wastes at Berkeley Lab Waste Management Group Environment, Health, and Safety Division Ernest Orlando Lawrence Berkeley National Laboratory University of California Berkeley, California 94720 Revision 7.1 October 2011 1. Hazardous Wastes. 1- 1 Summary of Hazardous Waste Requirements. 1- 2 1.1 How Do I Know If My Waste Is Hazardous?. 1- 3 1.1.1 Characteristic Waste. 1- 4 1.1.1.1 Ignitability. 1- 4 1.1.1.2 Corrosivity. 1- 4 1.1.1.3 Reactivity. 1- 5 1.1.1.4 Toxicity. 1- 5 1.1.2 Listed Waste. 1- 6 1.1.3 Chemical Compatibility. 1- 7 1.1.4 Excess Laboratory Chemicals and Laboratory Cleanouts. 1- 10 1.1.5 Unknowns. 1- 10

487

Library software in supercomputing environment  

Science Conference Proceedings (OSTI)

While the status and nature of supercomputer is quite well known in the physical science communities (Devreese and Van Camp, 1985), the statistical community is only slightly involved in the use of supercomputers. Most computing statisticians have settled into a comfortable world: S on workstations, SAS on mainframes. For statisticians, this is the well-lit parlor of computing;I propose here to shine a flashlight around the back alley. I will first define supercomputers and describe the supercomputing environment. This material will make necessary some information on why anyone would use supercomputers. I will then describe the principal sources of (scientific) library software on supercomputers and discuss their advantages and disadvantages. Next, some comparison timings will show what is brought by moving to a supercomputer, vectorizing, and further optimization. I will close with a harangue on future directions for statistical computing on supercomputers. 33 refs., 1 tab.

Durst, M.J.

1987-11-17T23:59:59.000Z

488

Radiation effects in the environment  

Science Conference Proceedings (OSTI)

Although the Navajo possess substantial resource wealth-coal, gas, uranium, water-this potential wealth has been translated into limited permanent economic or political power. In fact, wealth or potential for wealth has often made the Navajo the victims of more powerful interests greedy for the assets under limited Navajo control. The primary focus for this education workshop on the radiation effects in the environment is to provide a forum where scientists from the nuclear science and technology community can share their knowledge toward the advancement and diffusion of nuclear science and technology issues for the Navajo public. The scientists will make an attempt to consider the following basic questions; what is science; what is mathematics; what is nuclear radiation? Seven papers are included in this report: Navajo view of radiation; Nuclear energy, national security and international stability; ABC`s of nuclear science; Nuclear medicine: 100 years in the making; Radon in the environment; Bicarbonate leaching of uranium; and Computational methods for subsurface flow and transport. The proceedings of this workshop will be used as a valuable reference materials in future workshops and K-14 classrooms in Navajo communities that need to improve basic understanding of nuclear science and technology issues. Results of the Begay-Stevens research has revealed the existence of strange and mysterious concepts in the Navajo Language of nature. With these research results Begay and Stevens prepared a lecture entitled The Physics of Laser Fusion in the Navajo language. This lecture has been delivered in numerous Navajo schools, and in universities and colleges in the US, Canada, and Alaska.

Begay, F.; Rosen, L.; Petersen, D.F.; Mason, C.; Travis, B. [Los Alamos National Lab., NM (United States); Yazzie, A. [Navajo Nation, Window Rock, AZ (United States). Dept. of History; Isaac, M.C.P.; Seaborg, G.T. [Lawrence Berkeley National Lab., CA (United States); Leavitt, C.P. [Univ. of New Mexico, Albuquerque, NM (United States). Dept. of Physics and Astronomy

1999-04-01T23:59:59.000Z

489

SNS Sample Environment | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

Home › Instruments › SNS › Sample Environment Home › Instruments › SNS › Sample Environment SNS Sample Environment SNS Sample Environment Operations Group SNS Sample Environment Operations Group from left to right: (left to right): Bekki Mills, Mark Loguillo, Saad Elorfi, Randy Sexton, Leland Robbins, Matt Rucker, Cory Fletcher, Todd Sherline, Hans-Jochen Lauter, Ken Kroll The Sample Environment Group provides equipment and support for studying materials under controlled conditions (temperature, pressure, magnetic field, chemical environment, etc.). When you come to SNS to conduct an experiment, our front-line teams are there to support you. Although we currently offer a wide range of capabilities, we realize that these capabilities must continually grow. Therefore, we also have a busy research

490

HFIR Sample Environment | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

HFIR Sample Environment HFIR Sample Environment The Sample Environment Group provides equipment and support for studying materials under controlled conditions (temperature, pressure, magnetic field, chemical environment, etc.). When you come to HFIR to conduct an experiment, our front-line teams are there to support you. Although we currently offer a wide range of capabilities, we realize that these capabilities must continually grow. Therefore, we also have a busy research and development team, and we encourage you to partner with them to develop new equipment and techniques. The online Sample Environment Equipment Database allows you to search for information about the sample environment equipment available for HFIR instruments. Contact HFIR Team Leader Chris Redmon Resources Sample Environment Equipment Database

491

Global Environment Fund GEF | Open Energy Information  

Open Energy Info (EERE)

Environment Fund GEF Environment Fund GEF Jump to: navigation, search Name Global Environment Fund (GEF) Place Chevy Chase, Maryland Zip 20815 Product International investment management firm with around USD 800m under management. Invests in companies that make positive contributions to environmental quality, human health and sustainable management of resources. References Global Environment Fund (GEF)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Global Environment Fund (GEF) is a company located in Chevy Chase, Maryland . References ↑ "Global Environment Fund (GEF)" Retrieved from "http://en.openei.org/w/index.php?title=Global_Environment_Fund_GEF&oldid=345910"

492

Interactive Drama, Art and Artificial Intelligence Michael Mateas  

E-Print Network (OSTI)

level that combines aspects of character and story. 1 Zoesis, the company founded by former Oz Project; the generated Java code is supported by the ABL runtime system. ABL modifies Hap in a number of ways, changing representations of the social action performed by the surface text utterance. A custom rule language (implemented

California at Santa Cruz, University of

493

Fault-safe code motion for type-safe languages  

Science Conference Proceedings (OSTI)

Compilers for Java and other type-safe languages have historically worked to overcome overheads and constraints imposed by runtime safety checks and precise exception semantics. We instead exploit these safety properties to perform code motion optimizations ... Keywords: code motion, intermediate representations, partial redundancy elimination, safe code motion, safety dependences, scheduling, speculative code motion

Brian R. Murphy; Vijay Menon; Florian T. Schneider; Tatiana Shpeisman; Ali-Reza Adl-Tabatabai

2008-04-01T23:59:59.000Z

494

Overcoming JVM HotSwap constraints via binary rewriting  

Science Conference Proceedings (OSTI)

Java HotSpot VM provides a facility for replacing classes at runtime called HotSwap. One design property of HotSwap is that the signature of a replaced class must remain the same between different versions, which significantly constrains the programmer ... Keywords: HotSwap, JVM languages, binary refactoring, virtual superclass

Dong Kwan Kim; Eli Tilevich

2008-10-01T23:59:59.000Z

495

Monitoring and Evaluation of Smolt Migration in the Columbia Basin : Volume IX : Evaluation of the 2001 Predictions of the Run-Timing of Wild and Hatchery-Reared Migrant Salmon and Steelhead Trout Migrating to Lower Granite, Rock Island, McNary, and John Day Dams using Program RealTime.  

DOE Green Energy (OSTI)

Program RealTime provided tracking and forecasting of the 2001 inseason outmigration via the internet for eighteen PIT-tagged stocks of wild salmon and steelhead to Lower Granite and/or McNary dams and eleven passage-indexed stocks to Rock Island, McNary, or John Day dams. Nine of the PIT-tagged stocks tracked this year were new to the project. Thirteen ESUs of wild subyearling and yearling chinook salmon and steelhead, and one ESU of hatchery-reared sockeye salmon were tracked and forecasted to Lower Granite Dam. Eight wild ESUs of subyearling and yearling chinook salmon, sockeye salmon and steelhead were tracked to McNary Dam for the first time this year. Wild PIT-tagged ESUs tracked to Lower Granite Dam included yearling spring/summer chinook salmon release-recovery stocks (from Bear Valley Creek, Catherine Creek, Herd Creek, Imnaha River, Johnson Creek, Lostine River, Minam River, South Fork Salmon River, Secesh River, and Valley Creek), PIT-tagged wild runs-at-large of yearling chinook salmon and steelhead, and a PIT-tagged stock of subyearling fall chinook salmon. The stock of hatchery-reared PIT-tagged summer-run sockeye salmon smolts outmigrating to Lower Granite Dam, consisted this year of a new stock of fish from Alturas Lake Creek, Redfish Lake Creek Trap and Sawtooth Trap. The passage-indexed stocks, counted using FPC passage indices, included combined wild- and hatchery-reared runs-at-large of subyearling and yearling chinook, coho, and sockeye salmon, and steelhead migrating to Rock Island and McNary dams, and, new this year, combined wild and hatchery subyearling chinook salmon to John Day Dam. Unusual run-timing and fish passage characteristics were observed in this low-flow, negligible-spill migration year. The period for the middle 80% of fish passage (i.e., progress from the 10th to the 90th percentiles) was unusually short for nine out of ten PIT-tagged yearling spring/summer chinook salmon stocks tracked to Lower Granite Dam. It was the shortest on record for seven of these ten stocks. The nine stocks recording unusually short middle 80% periods also recorded higher-than-average recovery percentages. However the opposite trend was observed for the PIT-tagged wild subyearling chinook salmon and hatchery sockeye salmon stocks whose middle 80% period of passage to Lower Granite Dam was average to above average. Recovery percentages for these two stocks were average, compared to historical recoveries. The performance results of Program RealTime to make accurate predictions of percentiles of fish passage at an index site were mixed this year. The release-recovery stocks of wild PIT-tagged spring/summer chinook salmon tracked to Lower Granite Dam were predicted less accurately than usual, on average, with two exceptions. One of these exceptions was a stock that had its best prediction (first-half, last-half, and season-wide) ever to occur. On average, however, performance was down for predicting these stocks. The RealTime Select composite season-wide MAD was 4.3%, larger than the historical average of 2.1%. Passage percentiles for PIT-tagged runs-at-large of wild Snake River yearling and subyearling chinook salmon and of wild steelhead outmigrating to Lower Granite Dam were predicted very well this year, their second year of inclusion in the project, with season-wide MADs of 3.6%, 4.7%, and 1.8% respectively. These results, too, were mixed with respect to comparison with last year's performance. The yearling chinook stock was predicted somewhat better last year (up from 1.7% last year to 3.6% this year) but the subyearling chinook salmon and steelhead stocks were predicted better this year than last, season-wide. The steelhead stock, in particular, was predicted much better this year than last year, down to 1.8% this year from 4.8% last year. The PIT-tagged runs-at-large of wild salmon and steelhead tracked to McNary Dam in 2001 for the first time, were also well-predicted. In particular, the Snake River stocks were well-predicted, with season-wide MADs of 4.7% for subyearling chinook salmon, 3.3% for year

Burgess, Caitlin; Skalski, John R.

2001-12-01T23:59:59.000Z

496

Advanced engineering environment collaboration project.  

SciTech Connect

The Advanced Engineering Environment (AEE) is a model for an engineering design and communications system that will enhance project collaboration throughout the nuclear weapons complex (NWC). Sandia National Laboratories and Parametric Technology Corporation (PTC) worked together on a prototype project to evaluate the suitability of a portion of PTC's Windchill 9.0 suite of data management, design and collaboration tools as the basis for an AEE. The AEE project team implemented Windchill 9.0 development servers in both classified and unclassified domains and used them to test and evaluate the Windchill tool suite relative to the needs of the NWC using weapons project use cases. A primary deliverable was the development of a new real time collaborative desktop design and engineering process using PDMLink (data management tool), Pro/Engineer (mechanical computer aided design tool) and ProductView Lite (visualization tool). Additional project activities included evaluations of PTC's electrical computer aided design, visualization, and engineering calculations applications. This report documents the AEE project work to share information and lessons learned with other NWC sites. It also provides PTC with recommendations for improving their products for NWC applications.

Lamph, Jane Ann; Pomplun, Alan R.; Kiba, Grant W.; Dutra, Edward G.; Dankiewicz, Robert J.; Marburger, Scot J.

2008-12-01T23:59:59.000Z

497

Advanced engineering environment collaboration project.  

SciTech Connect

The Advanced Engineering Environment (AEE) is a model for an engineering design and communications system that will enhance project collaboration throughout the nuclear weapons complex (NWC). Sandia National Laboratories and Parametric Technology Corporation (PTC) worked together on a prototype project to evaluate the suitability of a portion of PTC's Windchill 9.0 suite of data management, design and collaboration tools as the basis for an AEE. The AEE project team implemented Windchill 9.0 development servers in both classified and unclassified domains and used them to test and evaluate the Windchill tool suite relative to the needs of the NWC using weapons project use cases. A primary deliverable was the development of a new real time collaborative desktop design and engineering process using PDMLink (data management tool), Pro/Engineer (mechanical computer aided design tool) and ProductView Lite (visualization tool). Additional project activities included evaluations of PTC's electrical computer aided design, visualization, and engineering calculations applications. This report documents the AEE project work to share information and lessons learned with other NWC sites. It also provides PTC with recommendations for improving their products for NWC applications.

Lamph, Jane Ann; Pomplun, Alan R.; Kiba, Grant W.; Dutra, Edward G.; Dankiewicz, Robert J.; Marburger, Scot J.

2008-12-01T23:59:59.000Z

498

Cellulolytic Microorganisms from Thermal Environments  

Science Conference Proceedings (OSTI)

Thermal, anaerobic environments rich in decaying plant material are a potential source of novel cellulolytic bacteria. Samples collected from geothermal aquifers in the Yellowstone National Park (YNP) were used to select for cellulolytic thermophiles. Laboratory enrichments on dilute-acid pretreated plant biomass (switchgrass, Populus), and crystalline cellulose (Avicel) resulted in the isolation of 247 environmental clones. The majority of individual clones were affiliated with the cellulolytic bacteria of phylum Firmicutes, followed by xylanolytic and saccharolytic members of the phylum Dictyoglomi. Among the Firmicutes, the clones were affiliated with the genera Caldicellulosiruptor (54.4%), Caloramator (11.5%), Thermoanaerobacter (8.8%), Thermovenabulum (4.1%), and Clostridium (2.0%). From established anaerobic thermophilic enrichments a total of 81 single strains of the genera Caldicellulosiruptor (57%) and Thermoanaerobacter (43%) were isolated. With continuous flow enrichment on Avicel, increases in the relative abundance of Caloramator sp. was observed over clones detected from the Caldicellulosiruptor. Complex communities of interacting microorganisms bring about cellulose decomposition in nature, therefore using up-to-date approaches may yield novel cellulolytic microorganisms with high activity and a rapid rate of biomass conversion to biofuels.

Vishnivetskaya, Tatiana A [ORNL; Raman, Babu [ORNL; Phelps, Tommy Joe [ORNL; Podar, Mircea [ORNL; Elkins, James G [ORNL

2012-01-01T23:59:59.000Z

499

Radionuclide behavior in the environment  

Science Conference Proceedings (OSTI)

The purpose of this report is to document the results of the following task: Review for quality and consistency the available data on measurements of initial ground contamination of Chernobyl radionuclides in various parts of Norway and subsequent concentrations of these radionuclides in various environmental media as functions of time. Utilize the data obtained to verify the existing models, or to improve them, for describing radionuclide behavior in the environment. Some of the processes standard were: migration into soil; weathering; resuspension; food-chain contamination; and loss or reconcentration by run-off. The task performed within this contract has been to use post-Chernobyl data from Norway to verify or find areas for possible improvement in the chronic exposure pathway models utilized in MACCS. Work has consisted mainly of collecting and evaluating post-Chernobyl information from Norway or other countries when relevant; but has also included experimental work performed specifically for the current task. In most connections the data available show the models and data in MACCS to be appropriate. A few areas where the data indicate that the MACCS approach is faulty or inadequate are, however, pointed out in the report. These should be examined carefully, and appropriate modifications should eventually be made. 14 refs., 12 figs., 22 tabs.

Tveten, U. (Institutt for Energiteknikk, Kjeller (Norway))

1991-09-01T23:59:59.000Z

500

The Economics of Trade, Biofuel, and the Environment  

E-Print Network (OSTI)

of Trade, Biofuel, and the Environment Gal Hochman, StevenBiofuel, and the Environment ? Gal Hochman UC Berkeleyincorporates energy environment and agricultural sector to

Hochman, Gal; Sexton, Steven; Zilberman, David D.

2010-01-01T23:59:59.000Z