National Library of Energy BETA

Sample records for java se critical

  1. T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory- February 2011

    Broader source: Energy.gov [DOE]

    This Critical Patch Update contains 21 new security fixes for Oracle Java SE and Java for Business. 19 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.

  2. T-641: Oracle Java SE Critical Patch Update Advisory- June 2011

    Broader source: Energy.gov [DOE]

    This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). Where the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Partial" instead of "Complete", and the corresponding CVSS Base score is 7.5 instead of 10 respectively. For issues in Deployment, fixes are only made available for JDK and JRE 6. Users should use the Java Web Start in JRE 6 and the new Java Plug-in introduced in 6 Update 10. CVE-2011-0862, CVE-2011-0873, CVE-2011-0815, CVE-2011-0817, CVE-2011-0863, CVE-2011-0864, CVE-2011-0802, CVE-2011-0814, CVE-2011-0871, CVE-2011-0786, CVE-2011-0788, CVE-2011-0866, CVE-2011-0868, CVE-2011-0872, CVE-2011-0867, CVE-2011-0869, and CVE-2011-0865

  3. U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code5:Oracle Java

  4. Java ########### Java ############### Java ##############

    E-Print Network [OSTI]

    Hagiya, Masami

    Java ########### ############### #### #### # ######### ###### Java ############### Java ############## ## ################################## ## Java ##################### #### Java ##### ########################### ######### ############ Stata # Abadi #### #### Qian

  5. A Desktop 3D Printer in Safety-Critical Java

    E-Print Network [OSTI]

    A Desktop 3D Printer in Safety-Critical Java Tórur Biskopstø Strøm Kongens Lyngby 2012 IMM-MSc-2012-critical use cases implemented according to the specification. This thesis presents a RepRap 3D desktop printer

  6. Explore Java What Is Java?

    E-Print Network [OSTI]

    Myers, Brad A.

    Explore Java Must Reads What Is Java? Download the Java Development Kit Install the Java SE Development Kit Create Your First Java Program Reserved Words in Java Most Popular Free Java Newsletter! By Category Enter email address Getting Started Programming Concepts Tutorials Java Syntax Building

  7. A Desktop 3D Printer in Safety-Critical Java Trur Biskopst Strm

    E-Print Network [OSTI]

    Schoeberl, Martin

    A Desktop 3D Printer in Safety-Critical Java Tórur Biskopstø Strøm Department of Informatics according to the specification. In this paper we present a 3D printer and its safety-critical Java level 1 evaluate the specification by implementing a RepRap 3D desktop printer as a use case. A RepRap is a desktop

  8. U-245: Critical Java 0-day flaw exploited

    Broader source: Energy.gov [DOE]

    Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines

  9. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  10. Lenguaje Java Avanzado 1 Presentacin..................................................................................................................2

    E-Print Network [OSTI]

    Escolano, Francisco

    Lenguaje Java Avanzado Índice 1 Presentación herramientas útiles para probar y depurar aplicaciones Java y Java EE. Por último, se estudiará el acceso de sesión Materiales 1. Introducción al lenguaje Java apuntes traspas ejercicios 2. Marco de

  11. V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-SiteDepartment of

  12. Prolog Java Prolog Java Prolog Cafe Prolog

    E-Print Network [OSTI]

    Banbara, Mutsunori

    0 Prolog Java Prolog Java Prolog Cafe Prolog WAM Java Java Prolog Cafe Prolog Java Prolog Cafe Java Prolog Prolog Cafe Java Java Prolog Prolog Prolog Cafe SAT Multisat We present the Prolog Cafe system that translates Prolog into Java via the WAM. Prolog Cafe has the advantages of portability, extensibility

  13. Giant increase in critical current density of KxFe2-ySe? single crystals

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lei, Hechang; Petrovic, C.

    2011-12-28

    The critical current density Jabc of KxFe2-ySe? single crystals can be enhanced by more than one order of magnitude, up to ~2.1×10? A/cm² by the post annealing and quenching technique. A scaling analysis reveals the universal behavior of the normalized pinning force as a function of the reduced field for all temperatures, indicating the presence of a single vortex pinning mechanism. The main pinning sources are three-dimensional (3D) point-like normal cores. The dominant vortex interaction with pinning centers is via spatial variations in critical temperature Tc (“?Tc pinning”).

  14. Java XMGR

    SciTech Connect (OSTI)

    Dr. George L. Mesina; Steven P. Miller

    2004-08-01

    The XMGR5 graphing package [1] for drawing RELAP5 [2] plots is being re-written in Java [3]. Java is a robust programming language that is available at no cost for most computer platforms from Sun Microsystems, Inc. XMGR5 is an extension of an XY plotting tool called ACE/gr extended to plot data from several US Nuclear Regulatory Commission (NRC) applications. It is also the most popular graphing package worldwide for making RELAP5 plots. In Section 1, a short review of XMGR5 is given, followed by a brief overview of Java. In Section 2, shortcomings of both tkXMGR [4] and XMGR5 are discussed and the value of converting to Java is given. Details of the conversion to Java are given in Section 3. The progress to date, some conclusions and future work are given in Section 4. Some screen shots of the Java version are shown.

  15. Experto Universitario Java Enterprise Lenguaje Java Avanzado

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Lenguaje Java Avanzado Sesión 2: Colecciones de datos © 2012-2013 Depto. Ciencia de la Computación e IA #12;Experto Universitario Java Enterprise Lenguaje Java Avanzado Java Enterprise Lenguaje Java Avanzado © 2012-2013 Depto. Ciencia de la Computación e IA Colecciones

  16. Eclipse Java highgrep Eclipse

    E-Print Network [OSTI]

    Chiba, Shigeru

    14 99-0553-0 15 2 6 #12;1 Unix grep Eclipse Java Java ( ) · · Java highgrep highgrep Eclipse #12.2 . . . . . . . . . . . . . . . . . . . . . . . . . . 48 A 52 #12;6 2.1 Eclipse . . . . . . . . . . . . . . . . . . . . 16 2.2 Eclipse Java #12;8 1 Unix grep [4] A A A A Eclipse Java #12;1 9 Java ( ) · · int Eclipse Java Java highgrep

  17. Lenguaje Java Avanzado 1 Introduccin al lenguaje Java.......................................................................................4

    E-Print Network [OSTI]

    Escolano, Francisco

    Lenguaje Java Avanzado Índice 1 Introducción al lenguaje Java.......................................................................................4 1.1 Java......................................................................................5 1.3 Componentes de un programa Java

  18. JavaKollektionen Java Collection Framework

    E-Print Network [OSTI]

    Schürmann, Michael

    459 JavaKollektionen Java Collection Framework Bereitstellung wichtiger Kollektionen (Listen Implementierung häufig benutzter Algorithmen (Suchen, Sortieren, kleines/grö�tes Element, ...) Basis: java.util.Collection #12;460 Schnittstelle für alle Kollektionsklassen (1) Schnittstelle java.util.Collection Grö�e der

  19. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    optimization with the new Java 8 feature: type annotation.12] is an extension of Java type system and can be used withon State Of the Art in Java Program Analysis, SOAP ’13,

  20. An Operational Semantics for JavaScript Sergio Maffeis1

    E-Print Network [OSTI]

    Mitchell, John C.

    that we considered include SpiderMonkey [17] (used by Firefox), the Rhino [4] implementation for JavaAn Operational Semantics for JavaScript Sergio Maffeis1 , John C. Mitchell2 , Ankur Taly2 , 1 to JavaScript, as a basis for analyzing security properties of web applications and mashups. The se

  1. JAVA CARD Tools for Together Control Center Wojciech Mostowski

    E-Print Network [OSTI]

    Mostowski, Wojciech

    JAVA CARD Tools for Together Control Center Wojciech Mostowski Chalmers University of Technology, G¨oteborg, Sweden Computing Science Department e-mail: woj@cs.chalmers.se Abstract This is a description of the JAVA CARD Tools package for Together Control Center. The package supports the development of JAVA CARD

  2. Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    applications, J2SE (Java 2 Standard Edition) for the implementation of Java programs that can be executed.K. {page,tillich}@cs.bris.ac.uk Abstract. The Micro Edition of the Java 2 platform (J2ME) provides than the widely-used Bouncy Castle Lightweight Crypto API for J2ME. 1 Introduction The Java programming

  3. Critical current density and mechanism of vortex pinning in KxFe2-ySe? doped with S

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lei, Hechang; Petrovic, C.

    2011-08-01

    We report the critical current density Jc in KxFe2-ySe2-zSz crystals. The Jc can be enhanced significantly with optimal S doping (z=0.99). For K0.70(7)Fe1.55(7)Se1.01(2)S0.99(2), the weak fishtail effect is found for H II c. The normalized vortex pinning forces follow the scaling law with a maximum position at 0.41 of the reduced magnetic field. These results demonstrate that the small size normal point defects dominate the vortex pinning mechanism.

  4. Java Programming Certificate Program

    E-Print Network [OSTI]

    Loudon, Catherine

    Java Programming Certificate Program COMPUTER PROGRAMMING The Java programming language lies that fuel the Internet economy. In addition, the portability inherent in Java is useful for programming languages are likely to encounter projects in the near future that require knowledge of Java. Who Should

  5. Java Programming Certificate Program

    E-Print Network [OSTI]

    Loudon, Catherine

    Java Programming Certificate Program COMPUTER PROGRAMMING The Java programming language lies that fuel the Internet economy. In addition, the portability inherent in Java is useful for programming are likely to encounter projects in the near future that require knowledge of Java. Who Should Enroll

  6. Gnralits Java Threads

    E-Print Network [OSTI]

    Grigoras, .Romulus

    Généralités Java Threads POSIX Threads Autres approches Sixième partie Programmation multi-activités Java & Posix Threads Systèmes concurrents 2 / 55 #12;Généralités Java Threads POSIX Threads Autres approches Plan 1 Généralités 2 Java Threads Manipulation des activités Synchronisation (java d

  7. Java Programming MSc. Internet Security

    E-Print Network [OSTI]

    Hill, Gary

    Java Programming MSc. Internet Security - 1 - Table of content Introduction Appendices............................................................................. 70 #12;Java and accompanying application using Java 3D coding. The developed application, in a Java 3D environment, will form

  8. Java for High Performance Computing Java HPC Codes

    E-Print Network [OSTI]

    Fraguela, Basilio B.

    Motivation Java for High Performance Computing Java HPC Codes Performance Evaluation Conclusions Java for High Performance Computing: Myth or Reality? Guillermo López Taboada Grupo de Arquitectura de López Taboada Java for HPC: Myth or Reality? #12;Motivation Java for High Performance Computing Java HPC

  9. Magneto-optical characterizations of FeTe???Se??? thin films with critical current density over 1 MA/cm²

    SciTech Connect (OSTI)

    Sun, Yue; Li, Qiang; Tsuchiya, Yuji; Pyon, Sunseng; Tamegai, Tsuyoshi; Zhang, Cheng; Ozaki, Toshinori

    2015-01-01

    We performed magneto-optical (MO) measurements on FeTe???Se??? thin films grown on LaAlO? (LAO) and Yttria-stabilized zirconia (YSZ) single-crystalline substrates. These thin films show superconducting transition temperature Tc ~19 K, 4 K higher than the bulk sample. Typical roof-top patterns can be observed in the MO images of thin films grown on LAO and YSZ, from which a large and homogeneous critical current density Jc ~ 3 - 4 x 10? A/cm² at 5 K was obtained. Magnetic flux penetration measurement reveals that the current is almost isotropically distributed in the two thin films. Compared with bulk crystals, FeTe???Se??? thin film demonstrates not only higher Tc, but also much larger Jc, which is attractive for applications.

  10. Magneto-optical characterizations of FeTe???Se??? thin films with critical current density over 1 MA/cm²

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Sun, Yue; Li, Qiang; Tsuchiya, Yuji; Pyon, Sunseng; Tamegai, Tsuyoshi; Zhang, Cheng; Ozaki, Toshinori

    2014-12-03

    We performed magneto-optical (MO) measurements on FeTe???Se??? thin films grown on LaAlO? (LAO) and Yttria-stabilized zirconia (YSZ) single-crystalline substrates. These thin films show superconducting transition temperature Tc ~19 K, 4 K higher than the bulk sample. Typical roof-top patterns can be observed in the MO images of thin films grown on LAO and YSZ, from which a large and homogeneous critical current density Jc ~ 3 - 4 x 10? A/cm² at 5 K was obtained. In this study, magnetic flux penetration measurement reveals that the current is almost isotropically distributed in the two thin films. Compared with bulk crystals,more »FeTe???Se??? thin film demonstrates not only higher Tc, but also much larger Jc, which is attractive for applications.« less

  11. Analysing Java System Properties Implementation

    E-Print Network [OSTI]

    Nierstrasz, Oscar

    Analysing Java System Properties Implementation Supplementary documentation to the Bachelor. It introduces the Java Platform Debugger Architecture (JPDA), looks at the Java Debug Interface (JDI;Analysing Java System Properties Contents David Wettstein, 8. Dezember 2013 3 Contents 1 Standard System

  12. Optimizing Java Theory and Practice

    E-Print Network [OSTI]

    Budimliæ, Zoran

    Optimizing Java Theory and Practice Zoran Budimlic Ken Kennedy Rice University Computer Science popularity of the Internet has made an instant star of the Java programming language. Java's portability Java implementation, even with just­in­time compilation technology, is far behind the most popular

  13. SQL and Java Database Systems Lecture 19

    E-Print Network [OSTI]

    Alechina, Natasha

    1 SQL and Java Database Systems Lecture 19 Natasha Alechina SQL and Java In this Lecture · SQL in Java · SQL from within other Languages · SQL, Java, and JDBC · For More Information · Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc · Connolly and Begg 29.7 SQL and Java SQL and Other

  14. SQL and Java Database Systems Lecture 19

    E-Print Network [OSTI]

    Alechina, Natasha

    SQL and Java Database Systems Lecture 19 Natasha Alechina #12;SQL and Java In this Lecture · SQL in Java · SQL from within other Languages · SQL, Java, and JDBC · For More Information · Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc · Connolly and Begg 29.7 #12;SQL and Java SQL and Other

  15. Java Security Final Project for ECE578

    E-Print Network [OSTI]

    Java Security Final Project for ECE578: Computer and Network Security by Douglas R. Dechow A Brief History of Java and Java Security The Java language and environment began as an outgrowth of a failed eventually become Java. Given that from the very beginning, the intended application domain for Oak (Java

  16. GRAPHICS PROGRAMMING Section A Java

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING Section A ­ Java 1 - Introduction 2 - Installation & First Programs 3 - GUI: Layout Managers 9 - GUI: JMenu Gary Hill December 2003 Java 1 of 1 #12;GRAPHICS PROGRAMMING 1, sample applications, and support for Java standards. Get started quickly using the included tutorials

  17. Java support on genepool: java6 (jdk1.6) will be removed on 08...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox security updates Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox...

  18. Java and the Java Virtual Machine Robert Stark, Joachim Schmid, Egon Borger

    E-Print Network [OSTI]

    Börger, Egon

    Java and the Java Virtual Machine Robert St¨ark, Joachim Schmid, Egon B¨orger April 4, 2003.3 Decomposing Java and the JVM . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Sources and literature Part I. Java 3. The imperative core JavaI of Java . . . . . . . . . . . . . . . . . . . . . . . . 33 3

  19. Java Vertexing Tools

    SciTech Connect (OSTI)

    Strube, Jan; /Oregon U.; Graf, Norman; /SLAC

    2006-03-03

    This document describes the implementation of the topological vertex finding algorithm ZVTOP within the org.lcsim reconstruction and analysis framework. At the present date, Java vertexing tools allow users to perform topological vertexing on tracks that have been obtained from a Fast MC simulation. An implementation that will be able to handle fully reconstructed events is being designed from the ground up for longevity and maintainability.

  20. SOK's Java Notebook1 Steven O. Kimbrough

    E-Print Network [OSTI]

    Kimbrough, Steven Orla

    SOK's Java Notebook1 Steven O. Kimbrough University of Pennsylvania 3620 Locust Walk, Suite 1300 . . . . . . . . . . . . . . . . . . . . . 1 1.1.2 Sun's JDK . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 First Java Applet: \\Hello, world!" . . . . . . . . . . . . . . . . 5 1.3 \\Hello, world" Java application

  1. Pizza into Java: Translating theory into practice

    E-Print Network [OSTI]

    Wadler, Philip

    Pizza into Java: Translating theory, Pizza is a strict superset of Java that incorporatesothreehigher-order function* *s, and ideas from.algebraic data types. Pizza is defined by translation into Java andPcompilesiintozza attempts to make

  2. The Java API Java Bootcamp -Villanova University Dr. Papalaskari 1

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    ,1,2,3] float b = gen.nextFloat(); //float in range [0,1),eg: 0.4589 int c = gen.nextInt(4) + 1; //int in range document processing Java Bootcamp Dr. Papalaskari Villanova University imported automatically, includes a Random object named gen: · Use Random method nextInt()to generate a random number: Java Bootcamp Dr

  3. 20 Kombination von C++ und Java 20-1(368) 20 Kombination von C++ und Java

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20-1(368) 20 Kombination von C++ und Java Inhalt 20.1 Java Native Interface (JNI) 20.1.1 C++-Funktionen aus Java aufrufen 20.1.2 Java-Funktionen aus C++ aufrufen 20.2 gcj und das Compiled Native Interface (CNI) 20.2.1 C++-Funktionen aus Java aufrufen 20.2.2 Java-Funktionen aus

  4. 20 Kombination von C++ und Java 20-1 20 Kombination von C++ und Java

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20-1 20 Kombination von C++ und Java Inhalt 20.1 Java Native Interface (JNI) 20.1.1 C++-Funktionen aus Java aufrufen 20.1.2 Java-Funktionen aus C++ aufrufen 20.2 gcj und das Cygnus Native Interface (CNI) 20.2.1 C++-Funktionen aus Java aufrufen 20.2.2 Java-Funktionen aus C

  5. Presenting JECA: A Java Error Correcting Algorithm for the Java Intelligent Tutoring System

    E-Print Network [OSTI]

    Franek, Frantisek

    Presenting JECA: A Java Error Correcting Algorithm for the Java Intelligent Tutoring System Edward context involving small Java programs. Furthermore, this paper presents JECA (Java Error Correction is to provide a foundation for the Java Intelligent Tutoring System (JITS) currently being field-tested. Key

  6. Frelsning 1-2 Sprkkonstruktioner i Java

    E-Print Network [OSTI]

    Interface i Java Betyder "gränssnitt" Innehåller ingen implementering Alla metoder är implicit publika och

  7. Simple Java Scripting version 1.3

    E-Print Network [OSTI]

    Carlsson, Gunnar

    BeanShell Simple Java Scripting version 1.3 1 #12;Table of Contents Table of Contents· Introduction and Run BeanShell The BeanShell GUI Java Statements and Expressions Useful BeanShell Commands Scripted Syntax· Standard Java Syntax Loosely Typed Java Syntax Exception Handling Basic Scoping of Variables

  8. The ACM Java Libraries Andrew Mertz

    E-Print Network [OSTI]

    Van Cleave, Nancy K.

    The ACM Java Libraries Andrew Mertz William Slough Nancy Van Cleave Mathematics and Computer;Introduction NetBeans and Java The ACM Java Task Force (JTF) Libraries Placing applets on web pages How to learn about the ACM libraries: This workshop Textbooks ACM Java Task Force Tutorial Javadoc

  9. Pizza into Java: Translating theory into practice

    E-Print Network [OSTI]

    Wadler, Philip

    Pizza into Java: Translating theory into practice Martin Odersky University of Karlsruhe Philip Wadler University of Glasgow Abstract Pizza is a strict superset of Java that incorporates three ideas types. Pizza is defined by translation into Java and compiles into the Java Virtual Machine

  10. 3. Java basics David Keil Computer Science I 8/13 David Keil Computer Science I Using Java 3. Intro to Java 8/13 1

    E-Print Network [OSTI]

    Keil, David M.

    3. Java basics David Keil Computer Science I 8/13 David Keil Computer Science I Using Java 3. Intro to Java 8/13 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 3. Java basics 1. Higher-level languages and compilation 2. Java programs and statements 3. Program documentation

  11. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (364) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (364) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  12. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3(378) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3(378) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  13. 3. Java basics David Keil Computer Science I 8/14 David Keil Computer Science I Using Java 3. Intro to Java 6/14 1

    E-Print Network [OSTI]

    Keil, David M.

    3. Java basics David Keil Computer Science I 8/14 David Keil Computer Science I Using Java 3. Intro to Java 6/14 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 3. Java basics 1. Higher-level languages and compilation 2. Java programs and statements 3. Program documentation

  14. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (360) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (360) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  15. Practical pluggable types for Java

    E-Print Network [OSTI]

    Papi, Matthew M

    2008-01-01

    This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines type qualifiers and their semantics, and a compiler ...

  16. java.sun.com/javaone/sf An Introduction To Software

    E-Print Network [OSTI]

    Xie, Tao

    java.sun.com/javaone/sf An Introduction To Software Agitation Alberto Savoia Chief Technology generations of colleagues · Do it for yourself Foo.java FooTest.java #12;java.sun.com/javaone/sf My View

  17. An Introduction to JavaScript Godmar Back

    E-Print Network [OSTI]

    Back, Godmar

    An Introduction to JavaScript Godmar Back #12;JavaScript ­ The Basics · Standardized as ECMAScript

  18. Java Destilado Francisco Morero PeyronaFrancisco Morero Peyrona

    E-Print Network [OSTI]

    Escolano, Francisco

    Java Destilado Francisco Morero PeyronaFrancisco Morero Peyrona Sun AmbassadorSun Ambassador Sun Awarded EngineerSun Awarded Engineer III Jornadas de Tecnología JavaIII Jornadas de Tecnología Java www.jtech.ua.es/jornadaswww.jtech.ua.es/jornadas #12;Qué es JavaQué es Java Java Destilado #12;ComunidadComunidad Lenguaje

  19. JSetL: A Java Library for Supporting Declarative Programming in Java

    E-Print Network [OSTI]

    Rossi, Gianfranco

    JSetL: A Java Library for Supporting Declarative Programming in Java #3; G. Rossi y , E. Panegai, E present a Java library|called JSetL|that o#11;ers a number of facilities to support declarative, how these features can be exploited to support a real declarative programming style in Java. Keywords

  20. Getting Started 1) Visit the Java VChill website at http://chill.colostate.edu/java/

    E-Print Network [OSTI]

    Rutledge, Steven

    VCHILL Getting Started 1) Visit the Java VChill website at http://chill.colostate.edu/java/ 2) Click on "Launch VChill" (you will see Java start up * ) 3) Enter signon name (password dialog pops up bookmark case * If it does not, you may need to install Java first. Click on the Download Center link (in

  1. Musa hybrid cv. Blue Java (Cultivated) 3 

    E-Print Network [OSTI]

    James R. Manhart

    2011-08-10

    Java Remote Method Invocation (Java RMI) is a icrographics. distributed object technology that is going to play a pivotal role in the distributed object world of tomorrow. With the introduction of the Remote Object Activation API in the beta version...

  2. Adaptive Java Optimisation using machine learning techniques 

    E-Print Network [OSTI]

    Long, Shun

    approach are implemented in a prototype Adaptive Optimisation Framework for Java (AOF-Java). The experimental results show that the heuristic random search algorithm can find, within a relatively small number of atttempts, good points in the large...

  3. Java on Networks of Workstations (JavaNOW): A Parallel Computing Framework Inspired by Linda and the Message

    E-Print Network [OSTI]

    Dickens, Phillip M.

    1 Java on Networks of Workstations (JavaNOW): A Parallel Computing Framework Inspired by Linda on these systems. In this article, we present JavaNOW (Java on Networks of Workstations), a Java based framework memory model but with a flexible set of primitive operations. JavaNOW provides a simple yet powerful

  4. PO Box 6050, Irvine, CA 92616-6050 www.extension.uci.edu Java Enterprise Edition (Java EE)

    E-Print Network [OSTI]

    Loudon, Catherine

    PO Box 6050, Irvine, CA 92616-6050 www.extension.uci.edu Java Enterprise Edition (Java EE) Technologies Certificate Program #12;UC Irvine Extension Certificate Program in Java Enterprise Edition (Java EE) Technologies 2 Revised: 11/09/09 OVERVIEW The Java Enterprise Edition (Java EE) Technologies

  5. JOP: A Java Optimized Processor Martin Schoeberl

    E-Print Network [OSTI]

    JOP: A Java Optimized Processor Martin Schoeberl JOP.design, Strausseng. 2-10/2/55, A-1050 Vienna, AUSTRIA martin@jopdesign.com Abstract. Java is still not a common language for embedded systems. It posses of the Java Virtual Ma- chine with focus on real-time applications. This paper describes the architecture

  6. Introduction to Java March 1, 2001

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Introduction to Java March 1, 2001 CBRSS and the John M. Olin Institute for Strategic Studies Lars-Erik Cederman #12;Outline · Java ­ overview ­ simple structures ­ object-orientation ­ roulette example · How to compile etc. · Readings and documentation #12;Java · Conceived by Sun in the early 1990s · Became the new

  7. Decompiling Java Using Staged Encapsulation Jerome Miecznikowski

    E-Print Network [OSTI]

    Decompiling Java Using Staged Encapsulation Jerome Miecznikowski Laurie Hendren Sable Research,hendren]@sable.mcgill.ca Abstract This paper presents an approach to program structur­ ing for use in decompiling Java bytecode to Java source. The structuring approach uses three intermediate represen­ tations: (1) a list of typed

  8. JAVA PROGRAMMING University of Adelaide, Australia

    E-Print Network [OSTI]

    Hawick, Ken

    JAVA PROGRAMMING Ken Hawick University of Adelaide, Australia Present Address: Massey University, New Zealand Email k.a.hawick@massey.ac.nz Revised: September 2003 #12;COURSE OVERVIEW #12;Java in the Java programming language and environment, focusing on the core language features. A number of worked

  9. MAKING JAVA HARD REALTIME Peter Puschner

    E-Print Network [OSTI]

    MAKING JAVA HARD REAL­TIME Peter Puschner Institut fË?ur Technische Informatik Technische Universit,andyg@cs.york.ac.uk ABSTRACT Due to its portability and security the Java program­ ming language has become very popular. Standard Java is however not suited for programming hard real­time sys­ tems. To overcome this limitation

  10. GRAPHICS PROGRAMMING SECTION D -JAVA 3D

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING SECTION D - JAVA 3D 1SECTION D - GRAPHICS 3-D........................................................................................... 2 30 Graphics 3D: Introduction to Java 3D........................................................................................ 78 ©Gary Hill September 2004 Java 3-D 1 of 13 #12;GRAPHICS PROGRAMMING SECTION D - GRAPHICS 3-D 30

  11. the Control on the Java Ic

    E-Print Network [OSTI]

    Rock, Chris

    1. Go to 2. Click o the Control on the Java Ic How To R Panel (from t con in Contro Reset You the Start Butt ol Panel ur Java Ca ton) che (Windows) 1 #12; 3. Unde 4. The T r Java Ca orary Internet ow will open ­ che (Win t Files" ­ Click ­ find "Delete dows) k on "Settings e

  12. GRAPHICS PROGRAMMING Section B Java 2D

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING Section B ­ Java 2D 20 - Graphics2D: Introduction 21 - Graphics2D: Shapes 22 2D: General Path Curves 29 - Graphics 2D: Constructive Area Geometry Gary Hill December 2003 Java 2 Java initially through the Abstract Window Toolkit, which was extended to include swing, shortly

  13. Extending Java for Android Programming Yoonsik Cheon

    E-Print Network [OSTI]

    Cheon, Yoonsik

    Extending Java for Android Programming Yoonsik Cheon TR #12-13 April 2012 Keywords: application framework, domain specific language, Android, Java. 1998 CR Categories: D.2.3 [Software Engineering] Coding Java for Android Programming (An Extended Abstract) Yoonsik Cheon Department of Computer Science

  14. 2009 IBM Corporation 2009 IBM Corporation IMS and Java

    E-Print Network [OSTI]

    1 © 2009 IBM Corporation© 2009 IBM Corporation IMS and Java for Application Modernization Barbara November 4-5, 2009 This presentation discusses use of IMS and Java to modernize your applications. #12;2 2 IMS © 2009 IBM Corporation Agenda Java basics IMS Java basics IMS Java Applications IMS Database

  15. Introduction Java Bootcamp -Villanova University Dr. Papalaskari 1

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    Introduction Java Bootcamp - Villanova University Dr. Papalaskari 1 CSC 2014 ­ Java Bootcamp Dr in this presentation are adapted from the slides accompanying Java Software Solutions by Lewis & Loftus Java Bootcamp Dr. Papalaskari Villanova University Introduction to Java Course website www

  16. A Type System for Object Initialization In the Java TM

    E-Print Network [OSTI]

    Mitchell, John C.

    A Type System for Object Initialization In the Java TM Bytecode Language Stephen N. Freund \\Lambda In the standard Java implementation, a Java language program is compiled to Java bytecode. This bytecode may be sent across the network to another site, where it is then executed by the Java Virtual Machine. Since

  17. ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications

    E-Print Network [OSTI]

    Chrzaszcz, Jacek

    ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications Aleksy Schubert1 static checking tools like ESC/Java2 can be used to ensure source code security properties of Java is further accompanied by a presentation on how these threats can be controlled by JML specifications and ESC/Java

  18. Supplement I.E: Create Shortcut for Java Applications on For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    Supplement I.E: Create Shortcut for Java Applications on Windows For Introduction to Java Programming By Y. Daniel Liang NOTE: You may use this supplement after Chapter 18, "Applets and Multimedia

  19. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK...

  20. JavaScript-to-Java Tips Learning new languages is inevitable over the course of

    E-Print Network [OSTI]

    Dahlquist, Kam D.

    play a very similar role, but they are more strictly required in Java Equality and inequality--Comparators

  1. A Java Agent-based MacroEconomic Laboratory

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Agent-based MacroEconomic Laboratory Pascal Seppecher May 2, 2012 Abstract This paper as a Java application (Jamel: Java Agent-based MacroEconomic Laboratory). This application, together

  2. Supplement: The & and | Operators For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    8 Supplement: The & and | Operators For Introduction to Java Programming By Y. Daniel Liang Java operations. See Supplement III.D, "Bit Manipulations," for details. #12;

  3. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

  4. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

  5. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

  6. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

  7. A Formal Framework for Java Separate Compilation

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    A Formal Framework for Java Separate Compilation Davide Ancona, Giovanni Lagorio, and Elena Zucca,lagorio,zuccag@disi.unige.it Abstract. We de#12;ne a formal notion, called compilation schema, allow- ing to specify di#11;erent possibilities for performing the overall process of Java compilation, which includes type-checking of source

  8. Java Instrumentation for Dynamic Analysis Jeff Perkins and Michael Ernst

    E-Print Network [OSTI]

    Ernst, Michael

    Java Instrumentation for Dynamic Analysis Jeff Perkins and Michael Ernst MIT CSAIL 14 Nov 2005 09:45Page 1 Jeff PerkinsJava Instrumentation for Dynamic Analysis #12;Java Instrumentation Approaches Instrument source files Java Debug Interface (JDI) Instrument class files 14 Nov 2005 09:45Page 2 Jeff

  9. Guide d'utilisation de SSJ Langage Java

    E-Print Network [OSTI]

    Vázquez-Abad, Felisa J.

    Guide d'utilisation de SSJ Langage Java 15 Janvier 2001 ­ Dans votre .cshrc, rajouter la ligne'un de xdvi guide.dvi & acroread guide.pdf & 1 Version Java Nous utilisons la version 1.2 de Java. Elle votre programme (par exemple Tulipe.java) utilisant les objets de SSJ, compiler simplement avec la

  10. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Jiang, Huiqiang

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.java.com/en/download/manual.jsp 2. Click the link for your

  11. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Sibille, Etienne

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.java.com/en/download/manual.jsp 2. Click the Windows 7, XP Online

  12. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Sibille, Etienne

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.oracle.com/technetwork/java/javase/downloads/index.html 2. Next

  13. La programmation orientee objets et le langage Java

    E-Print Network [OSTI]

    Tichit, Laurent

    La programmation orient´ee objets et le langage Java Master Pro BBSG 2 Henri Garreta, Laurent Tichit D´epartement d'Informatique, Facult´e des Sciences de Luminy Cours 1: Java "sans les objets" c H. Garreta et L. Tichit, 2011-2012 POO et Java 1 / 32 #12;Java "sans les objets" Ressources Documentation www.dil.univ-mrs.fr/~tichit/java

  14. A comparison of C++, Java and Python 

    E-Print Network [OSTI]

    Chou, Ling

    1997-01-01

    of new OOP languages have emerged. These languages provide powerful application tools on some specific areas. Java and Python are two excellent next-generation languages. They inherit most praising features from C++, provide simpler user interfaces...

  15. Javarifier : inference of reference immutability in Java

    E-Print Network [OSTI]

    Quinonez, Jamie

    2008-01-01

    Javari is an extension of Java that supports reference immutability constraints. Programmers write Javari type qualifiers, such as the readonly type qualifier, in their programs, and the Javari typechecker detects mutation ...

  16. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-4(368) Die C++-Funktion muss in Java als native deklariert werden. Geladen werden soll sie aus einer

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-4(368) · Die C++-Funktion muss in Java als native deklariert werden. Geladen werden soll sie aus einer dynamischen Bibliothek libcppfunctions.so. SprachMix/JNI/C++fromJava/Main.java 7 public class Main 8 { 9 public native static double

  17. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Broader source: Energy.gov (indexed) [DOE]

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  18. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  19. Lab 6: Java API CSC1051 1/4

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    Lab 6: Java API CSC1051 1/4 Java derives much of its power from the many classes already defined in the Java API. But how are we ever to learn and use these classes if we don't know about them? Any text on Java can only begin to cover these classes and the methods defined in them. For a complete listing

  20. 4. Standard Java data types David Keil Computer Science I 6/13 David Keil Computer Science I Using Java 4. Standard types 6/13 1

    E-Print Network [OSTI]

    Keil, David M.

    4. Standard Java data types David Keil Computer Science I 6/13 David Keil Computer Science I Using Java 4. Standard types 6/13 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 4. Standard Java data types 1. Java classes, objects, and methods 2. Numeric data types 3

  1. Implementing Continuation Marks in JavaScript John Clements

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    to adapt them to the Rhino implementation of JavaScript, a language that supports closuresImplementing Continuation Marks in JavaScript John Clements California Polytechnic State University the simplicity and utility of continuation marks by adapting them for JavaScript as frame-based stack marks using

  2. Designing Intelligent Agents Tutorial 1: Java Agent Package

    E-Print Network [OSTI]

    Alechina, Natasha

    G54DIA: Designing Intelligent Agents Tutorial 1: Java Agent Package Natasha Alechina School agent package(s) · agent toolkits · uk.ac.nott.cs.g54dia Java agent packages ­library package ­demo package © Brian Logan 2013 G54DIA Tutorial 1: Java Agent Package 2 #12;Implementing your agent · many

  3. JavaTM On Steroids: Sun's High-Performance

    E-Print Network [OSTI]

    Hölzle, Urs

    of research (Sun, Stanford, UCSB) #12;13HotChips IX Garbage Collector · accurate garbage collector · fastJavaTM On Steroids: Sun's High-Performance Java Implementation Urs Hölzle Lars Bak Steffen Grarup Robert Griesemer Srdjan Mitrovic Sun Microsystems 2HotChips IX History · First Java implementations

  4. Another Step Towards a Smart Compilation Manager for Java

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Another Step Towards a Smart Compilation Manager for Java G. Lagorio DISI - Universit`a di Genova Compilers General Terms Languages Keywords Java, separate compilation ABSTRACT In a recent work we have) for a substantial subset of Java which has been shown to be sound and minimal. That is, an unchanged source

  5. Modeling the Java Bytecode Verifier Mark C. Reynolds 1 ,2

    E-Print Network [OSTI]

    Modeling the Java Bytecode Verifier Mark C. Reynolds 1 ,2 Computer Science Department Boston University Boston, US Abstract The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly

  6. A Java Reinforcement Learning Module for the Recursive Porous

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Reinforcement Learning Module for the Recursive Porous Agent Simulation Toolkit Facilitating Evaluation of free java-libraries for social- scientific agent based simulation, Tobias and Hoffman, 2004 in Repast Genetic Algorithm demo model OpenForecast demo model Java Object Oriented Neural Engine (JOONE

  7. Modularity for Java and How OSGi Can Help

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Modularity for Java and How OSGi Can Help DECOR October 28th , 2004 Richard S. Hall #12;Software environment #12;Focus of my research Popularized by Java because of its simple dynamic code loading mechanisms of modularity mechanism The Java world has many frameworks and systems reinventing this wheel e.g., component

  8. JAVA GIS, Exploratory Spatial Data Analysis and Precision Farming

    E-Print Network [OSTI]

    Cook, Di

    JAVA GIS, Exploratory Spatial Data Analysis and Precision Farming Nicholas Lewin Dept of Statistics XGobi to JAVA, as a new implementation JGobi, as a companion to this package we would like to develop our own map applica­ tion, also in JAVA that would over come platform dependencies, as well

  9. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  10. An efficient Java implementation of the immediate successors calculation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An efficient Java implementation of the immediate successors calculation Cl´ement Gu´erin, Karell an effective Java imple- mentation of the concept immediate successors calculation. It is based on the lattice Java library, developed by K. Bertet and the Limited Objects Access algorithm, proposed by C. Demko [5

  11. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Verification of Cryptographic Protocols Implemented in Java Card ¢¡¤£ Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  12. Using a Java Optimized Processor in a Real World Application

    E-Print Network [OSTI]

    Using a Java Optimized Processor in a Real World Application Martin Schoeberl JOP.design, Strausseng. 2-10/2/55, A-1050 Vienna, Austria martin@jopdesign.com Abstract -- Java, a popular programming language on desktop systems, is rarely used in embedded systems. Some features of Java, like thread support

  13. JMatch: Java plus Pattern Matching Jed Liu Andrew C. Myers

    E-Print Network [OSTI]

    Keinan, Alon

    JMatch: Java plus Pattern Matching Jed Liu Andrew C. Myers Computer Science Department Cornell University Abstract The JMatch language extends Java with iterable abstract pattern matching, pattern matching that is compatible with the data abstraction features of Java and makes iteration ab­ stractions

  14. A Java Processor Architecture for Embedded Real-Time Systems

    E-Print Network [OSTI]

    A Java Processor Architecture for Embedded Real-Time Systems Martin Schoeberl Institute of Computer conservative estimates. JOP (Java Optimized Processor) tackles this problem from the architectural perspective average case performance. This paper presents a Java processor designed for time-predictable execution

  15. Java Separate Type Checking is not Safe (Extended Abstract)

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Java Separate Type Checking is not Safe (Extended Abstract) Davide Ancona, Giovanni Lagorio,lagorio,zuccag@disi.unige.it Abstract. Java supports separate type-checking in the sense that com- pilation can be invoked on a single in the environment. However, the Java speci#12;cation does not de#12;ne precise rules on how this process should

  16. Java: Semantics and Type Soundness Gaurav S. Kc

    E-Print Network [OSTI]

    Yang, Junfeng

    Java: Semantics and Type Soundness Gaurav S. Kc B. Eng., Department of Computing Imperial College of Science, Technology and Medicine e-mail: gsk1@doc.ic.ac.uk Abstract Java is a programming language of programming applications. The main problem with Java is that it has borrowed so many features from so many

  17. A Java Middleware Platform for Resource-Aware Distributed Applications

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Java Middleware Platform for Resource-Aware Distributed Applications Frédéric Guidec, Yves Mahéo.Guidec|Yves.Maheo|Luc.Courtrai}@univ-ubs.fr Abstract This paper reports the development of D-RAJE (Dis- tributed Resource-Aware Java Environment), a Java-based middleware platform that makes it possible to model and to monitor resources

  18. Modeling the Java Bytecode Verifier Mark C. Reynolds1 ,2

    E-Print Network [OSTI]

    Modeling the Java Bytecode Verifier Mark C. Reynolds1 ,2 Computer Science Department Boston University Boston, US Abstract The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly

  19. Status Report: Specifying JavaScript with ML David Herman

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    - igator 2.0 web browser. Despite its name, the language has little to do with the Java programmingScript, the popular programming language for browser-based web applications. This "definitional interpreter" serves of the interesting new features of JavaScript 2.0. Section 4 describes the history of approaches to specifying Java

  20. The Java Market: Transforming the Internet into a Metacomputer

    E-Print Network [OSTI]

    Amir, Yair

    The Java Market: Transforming the Internet into a Metacomputer Yair Amir 1 , Baruch Awerbuch running on a producer's machine. The Java Market modifies the submitted application. It transforms of the time. This paper presents the Java Market, a system that allows organizations and Internet users

  1. AirJava: Networking for Smart Spaces Kevin L. Mills

    E-Print Network [OSTI]

    of building AirJava adapters today so researchers can begin experimenting with Smart Spaces. 1. Introduction propose a means of building AirJava adapters so researchers can begin experimenting with Smart SpacesAirJava: Networking for Smart Spaces Kevin L. Mills Information Technology Laboratory National

  2. Compare C++ Syntax and Features with Java Here is a brief summary that compares C++ syntax and features with Java

    E-Print Network [OSTI]

    Liang, Y. Daniel

    and features with Java C++ Java cout int x; cin >> x dynamically p->getArea(); or (*p).getArea() c.getArea(); delete p; c = null; Automatically removed PassCompare C++ Syntax and Features with Java Here is a brief summary that compares C++ syntax

  3. Java programming for high-performance

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    language to solv- ing large computational problems in science and en- gineering. Unless these issuesJava programming for high-performance numerical computing by J. E. Moreira S. P. Midkiff M. Gupta PTM language has taken off as a serious general-purpose programming language. Industry and academia alike have

  4. Java Therapy: Web-Based Robotic Rehabilitation

    E-Print Network [OSTI]

    Reinkensmeyer, David J.

    Java Therapy: Web-Based Robotic Rehabilitation David J. Reinkensmeyer, Clifton T. Pang, Jeff A performance, allowing users and their caregivers to assess rehabilitation progress via the Web. 1 are developing robotic devices, termed "rehabilitators", that physically interact with people to stimulate

  5. MSc CSYM021 Java Programming GJH: 2008 MSc Computing (Internet Technology)

    E-Print Network [OSTI]

    Hill, Gary

    MSc CSYM021 ­ Java Programming © GJH: 2008 MSc Computing (Internet Technology) CSYM 021 Java Office (Open 10:00 - 15:00)). Aim: Produce a technical report and accompanying application using Java 2D/3D. Brief A: 2D Right (East) Panel: The Java Swing application is to include a Java 2D graphics maze

  6. The state of the Java universe

    ScienceCinema (OSTI)

    None

    2011-10-06

    Speaker Bio: James Gosling received a B.Sc. in computer science from the University of Calgary, Canada in 1977. He received a Ph.D. in computer science from Carnegie-Mellon University in 1983. The title of his thesis was The Algebraic Manipulation of Constraints. He has built satellite data acquisition systems, a multiprocessor version of UNIX®, several compilers, mail systems, and window managers. He has also built a WYSIWYG text editor, a constraint-based drawing editor, and a text editor called Emacs, for UNIX systems. At Sun his early activity was as lead engineer of the NeWS window system. He did the original design of the Java programming language and implemented its original compiler and virtual machine. He has recently been a contributor to the Real-Time Specification for Java.

  7. The state of the Java universe

    SciTech Connect (OSTI)

    None

    2011-02-08

    Speaker Bio: James Gosling received a B.Sc. in computer science from the University of Calgary, Canada in 1977. He received a Ph.D. in computer science from Carnegie-Mellon University in 1983. The title of his thesis was The Algebraic Manipulation of Constraints. He has built satellite data acquisition systems, a multiprocessor version of UNIX®, several compilers, mail systems, and window managers. He has also built a WYSIWYG text editor, a constraint-based drawing editor, and a text editor called Emacs, for UNIX systems. At Sun his early activity was as lead engineer of the NeWS window system. He did the original design of the Java programming language and implemented its original compiler and virtual machine. He has recently been a contributor to the Real-Time Specification for Java.

  8. An OpenMPlike Interface for Parallel Programming in Java M. E. Kambites

    E-Print Network [OSTI]

    Bull, Mark

    in­ clude JavaParty [15], HPJava [3], Titanium [19] and SPAR Java [18]. However, these are designed. The current implementations of Tita­ nium and SPAR are via compilation to C, and not Java. The remainder

  9. Review of Correspondence Analysis and Data Coding with Java and R

    E-Print Network [OSTI]

    Jan de Leeuw

    2011-01-01

    and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

  10. A Lightweight Java Taskspaces Framework for Scientific Computing on Computational Grids

    E-Print Network [OSTI]

    De Sterck, Hans

    A Lightweight Java Taskspaces Framework for Scientific Computing on Computational Grids Appeared orientation and platform independence realized by implementation in Java. Grid administration tasks, Intertask Communication, Scalability, Java 1. INTRODUCTION Distributed computing on heterogeneous

  11. Exploring the Suitability of Existing Tools for Constructing Executable Java Slices

    E-Print Network [OSTI]

    Iyer, Divya

    2012-05-31

    Java is a managed programming language, and Java programs are executed in a virtual machine (VM) environment. Java VMs not only execute the primary application program, but also perform several other auxiliary tasks at runtime. Some...

  12. C:\\idrive\\web\\intro6e\\supplement\\Supplement6(d)JavaXML.doc Last printed Supplement VI.D: Java and XML

    E-Print Network [OSTI]

    Liang, Y. Daniel

    C:\\idrive\\web\\intro6e\\supplement\\Supplement6(d)JavaXML.doc Last printed Supplement VI.D: Java and XML For Introduction to Java Programming By Y. Daniel Liang This supplement introduces how to use Java is required for this supplement. To learn XML, please read Supplement VI.C, "XML." 0 Introduction

  13. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities...

    Broader source: Energy.gov (indexed) [DOE]

    in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by...

  14. T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...

    Broader source: Energy.gov (indexed) [DOE]

    password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061...

  15. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials...

  16. Main-Memory Management to Support Orthogonal Persistence for Java

    E-Print Network [OSTI]

    Daynes, L.

    Daynes,L. Atkinson,M.P. Proceedings of the Second International Workshop on Persistence and Java pp 37-60

  17. JWBS001C-142.tex WL041/Bidgoli WL041-Bidgoli.cls September 16, 2005 9:8 Char Count= 0 Hostile Java AppletsHostile Java Applets

    E-Print Network [OSTI]

    Evans, David

    Hostile Java AppletsHostile Java Applets David Evans, University of Virginia Introduction 126 Java 135 INTRODUCTION Java was introduced in 1995 as both a high-level pro- gramming language and an intermediate language, Java Virtual Machine language (JVML, sometimes called Java byte codes), and execution

  18. Application of the Java Message Service in mobile monitoring environments Martin Kuehnhausen , Victor S. Frost

    E-Print Network [OSTI]

    Kansas, University of

    Application of the Java Message Service in mobile monitoring environments Martin Kuehnhausen à on trains. The Java Message Service (JMS) presents a flexible transport layer for asynchronous communication

  19. T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26.

  20. Constructing Verifiably Correct Java Programs Using OCL and CleanJava

    E-Print Network [OSTI]

    Cheon, Yoonsik

    for Java and supports Cleanroom- style functional program verification. The combination of OCL and Clean the correctness of code using a Cleanroom-style functional program verification technique. We use OCL language to support Cleanroom-style functional program verification [5] (see Sec- tion II-B for an overview

  1. JAVA Project IMIS 2009-2010 Page 1 sur 3 JAVA Project IMIS

    E-Print Network [OSTI]

    Marfisi-Schottman, Iza

    the flow of luggage and carts in the airport. Big luggage Batterie recharge Airplane 3Airplane 2Airplane 1-in desk. #12;JAVA Project ­ IMIS ­ 2009-2010 Page 2 sur 3 The carts run on a battery that needs to be recharged every few kilometers. When the chart detects that its battery is low, it goes to one

  2. Search strategies for Java bottleneck location by dynamic instrumentation

    E-Print Network [OSTI]

    Kelly, Paul H. J.

    instrumentation within a Java Virtual Ma- chine. Several options are available; our implementation used our VeneerSearch strategies for Java bottleneck location by dynamic instrumentation Douglas J Brear, Thibaut investigation of this interesting approach. 1 Introduction The idea of dynamically patching instrumentation code

  3. Granting Java Native Interface Developers Their Wishes Martin Hirzel

    E-Print Network [OSTI]

    Grimm, Robert

    , Sun's original FFI for Java, the Native Method In- terface [52, 53] (NMI), directly exposed Java. Furthermore, it constrains garbage collectors and just- in-time compilers, since changes to the data representation may break native code. In fact, NMI required a conserva- tive garbage collector because direct

  4. Garbage Collection for Memory-Constrained Java Virtual Machines

    E-Print Network [OSTI]

    Abdelrahman, Tarek S.

    the mod- ified collector in the Sun Microsystems JDK 1.2.2 using ap- plications from the SPECjvm98 collector for Java Virtual Machines (JVMs) that al- lows applications to run using less memory. The modified of Java programs, compared to existing GC al- gorithms. The majority of garbage collectors fall

  5. True Separate Compilation of Java Classes # DISI Universit

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    True Separate Compilation of Java Classes # D. Ancona DISI ­ Universit â?? a di Genova Via Dodecaneso compilation for a small but significant Java subset, in the sense that a single class declaration can be intra­checked (following the Cardelli's terminology) and compiled providing a minimal set of type requirements on missing

  6. Compositional Compilation for Java-like Languages through Polymorphic Bytecode

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Compositional Compilation for Java-like Languages through Polymorphic Bytecode extended version Dodecaneso, 35 16146 Genova, Italy zucca@disi.unige.it ABSTRACT We define compositional compilation compositional compilation is a highly desirable feature, in Java-like languages it can hardly be achieved

  7. Supplement: Using Packages For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    Supplement: Using Packages For Introduction to Java Programming By Y. Daniel Liang NOTE: If you wish to use packages to organize the classes in the text, read this supplement after Chapter 1:\\book. cd .. -- Changes to the parent directory. See Supplement I.C, "Creating, Compiling and Running Java

  8. Pace Web Server: A Pure Java Web Server

    E-Print Network [OSTI]

    Tao, Lixin

    Pace Web Server: A Pure Java Web Server with a Servlet Container by Priya Srinivasaraghavan University 2003 #12;Abstract Pace Web Server: A Pure Java Web Server with a Servlet Container by Priya their products and services to their customers. An essential ingredient to the Internet has been the web server

  9. Retargeting Android Applications to Java Bytecode Damien Octeau

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    Retargeting Android Applications to Java Bytecode Damien Octeau Department of Computer Science Pennsylvania State University mcdaniel@cse.psu.edu ABSTRACT The Android OS has emerged as the leading platform for Smart- Phone applications. However, because Android applications are compiled from Java source

  10. Experiences in Implementing a Java Collaborative IDE over the Internet

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    1 Experiences in Implementing a Java Collaborative IDE over the Internet CHIEN-MIN WANG, SHUN of issues related to event broadcasting in a Java collaborative computing environment over the Internet. We technologies, communication over the Internet has become commonplace and collaboration via the Internet has

  11. Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation

    E-Print Network [OSTI]

    direct access to the Princeton Wordnet data, so as to help Java developers find the library 1 See Table 6- cess the information in the original Prince- ton Wordnet databases. From this compari- son emerges-coverage, easiest-to-use library available. A Java developer seeking to access the Prince- ton Wordnet is faced

  12. Amos II Java Interfaces Daniel Elin and Tore Risch

    E-Print Network [OSTI]

    Risch, Tore

    1 Amos II Java Interfaces Daniel Elin and Tore Risch Uppsala Database Laboratory Department-02-06 This report describes the external interfaces between Amos II and the programming lan- guage Java. There are also interfaces between Amos II and the programming languages C and Lisp, documented separately

  13. Java - Darajat Geothermal Area | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8,OpenKentucky: EnergyFacilityIllinois:SouthLLC JumpNewJava

  14. Developing numerical libraries in Java RONALD F. BOISVERT1, JACK J. DONGARRA2, ROLDAN POZO1,

    E-Print Network [OSTI]

    Dongarra, Jack

    A. REMINGTON1 AND G.W. STEWART1;3 1Mathematical and Computational Sciences Division, Information. Finally, we outline the Java Numerical Toolkit1 JNT, which is meant to provide a base of computational;Developing numerical libraries in Java 2 2. NUMERICAL COMPUTING IN JAVA Java is both a computer language

  15. A Parallel Java Grande Benchmark Suite L. A. Smith and J. M. Bull

    E-Print Network [OSTI]

    Bull, Mark

    A Parallel Java Grande Benchmark Suite L. A. Smith and J. M. Bull EPCC, The King's Buildings Republic. email: xobdrzal@fi.muni.cz Abstract Increasing interest is being shown in the use of Java for large scale or Grande applications. This new use of Java places specific demands on the Java execution

  16. CSCI 161: Introduction to Programming I Lab 1b: Hello, World (Eclipse, Java)

    E-Print Network [OSTI]

    Hardy, Christopher R.

    CSCI 161: Introduction to Programming I Lab 1b: Hello, World (Eclipse, Java) Goals - to learn how to compile and execute a Java program Overview This activity will introduce you to the Java programming language. You will type in the Java program shown, compile it, and execute it. You will submit your project

  17. MSc CSYM021 Java Programming GJH: 2009 MSc Computing (Internet Technology)

    E-Print Network [OSTI]

    Hill, Gary

    MSc CSYM021 ­ Java Programming © GJH: 2009 MSc Computing (Internet Technology) CSYM 021 Java Office (Open 10:00 - 15:00)). Aim: Produce a technical report and accompanying application using Java 2D/3D. Brief Produce a technical report and accompanying application using Java 3D. The application

  18. Environmental Monitoring of Lake Michigan Using CoastWatch Data and JAVA GIS

    E-Print Network [OSTI]

    Environmental Monitoring of Lake Michigan Using CoastWatch Data and JAVA GIS George A. Leshkevich Observation Data) Statistics (Great Lakes Average Surface Water Temperature) JAVA GIS (JAVA Applet) CDAT activities. New utilities such as JAVA based interactive retrieval of physical parameters such as surface

  19. Student's Project for Compiler Construction: Compiling a Fragment of SetlX to Java

    E-Print Network [OSTI]

    Stroetmann, Karl

    Student's Project for Compiler Construction: Compiling a Fragment of SetlX to Java -- Task. This compiler takes as input a program written in the source language SetlX and produces as output Java source code, so the target language is Java. In order to execute the resulting Java programs, these programs

  20. C H A P T E R 1 What is Java 3D and

    E-Print Network [OSTI]

    Hill, Gary

    1 C H A P T E R 1 What is Java 3D and is it for me? 1.1 Strengths 2 1.2 Weaknesses 3 1.3 System Java 3D is an application programming interface (API) developed at Sun Microsystems for rendering interactive 3D graphics using the Java programming language. Java 3D is a client-side Java API. Other examples

  1. Object Co-location and Memory Reuse for Java Programs

    E-Print Network [OSTI]

    Lau, Francis C.M.

    : Memory allocator, garbage collector, mutator, Java, object co- location, memory reuse ACM Reference of a runtime system becomes increasingly signif- icant [Sun Microsystems 2003]. Our second goal is to find

  2. Spar: a set of extensions to Java for scientific computation

    E-Print Network [OSTI]

    Spar: a set of extensions to Java for scientific computation C. van Reeuwijk, F. Kuijlman, and H Executiontime(s) Number of processors HPF Spar Spar (no checks) Fortran/MPI 9. SPAR AND JVM 10. RELATED WORK #12

  3. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were...

  4. HEDGEHOG: Automatic Verification of Design Patterns in Java 

    E-Print Network [OSTI]

    Blewitt, Alex

    Design patterns are widely used by designers and developers for building complex systems in object-oriented programming languages such as Java. However, systems evolve over time, increasing the chance that the pattern ...

  5. Analysing, Profiling and Optimising Orthogonal Persistence for Java

    E-Print Network [OSTI]

    Cutts, Q.I.

    Cutts,Q.I. Hosking,A. Proceedings of the Second International Workshop on Persistence and Java (PJW2), Half Moon Bay, CA, USA (Atkinson, M., Jordan, M. Eds) pp 107-115 Sun Microsystems Inc.

  6. Swizzle barrier optimizations for orthogonal persistence in Java

    E-Print Network [OSTI]

    Brahnmath, K.; Nystrom, N.; Hosking, A.L.; Cutts, Q.I.

    Brahnmath,K. Nystrom,N. Hosking,A.L. Cutts,Q.I. Proceedings of the Third International Workshop on Persistence and Java (Tiburon, California, September 1998), Advances in Persistent Object Systems pp 268-278 Morgan Kaufmann

  7. Termination Analysis of Java Bytecode Elvira Albert1

    E-Print Network [OSTI]

    Arenas, Puri

    program properties is often split into separately proving partial correctness and termination. ObjectTermination Analysis of Java Bytecode Elvira Albert1 , Puri Arenas1 , Michael Codish2 , Samir Abstract. Termination analysis has received considerable attention, traditionally in the context

  8. Java Expert GUI framework for CERN beam instrumentation systems

    E-Print Network [OSTI]

    Bart Pedersen, S; Jackson, S

    2011-01-01

    The CERN Beam Instrumentation Group’s software section has recently performed a study of the tools used to produce Java expert GUI applications. This paper will present the analysis that was made to understand the requirements for generic components and the resulting tools including a collection of Java components that have been made available for a wider audience. The paper will also discuss the prospect of using Maven as the deployment tool with its implications for developers and users.

  9. Disabling JAVA Updates If you open Kronos, and are unable to open any timecards you may have a version of Java that

    E-Print Network [OSTI]

    Huang, Jianyu

    Disabling JAVA Updates If you open Kronos, and are unable to open any timecards you may have a version of Java that isn't compatible with Kronos. You (or the Administrator of the pc) will need to turn-off the Automatic Updates feature in Java. Follow the prompts below: 1. Close all Internet Explorer windows (to stop

  10. Experto Universitario Java Enterprise Validacin e internacionalizacin 2012-2013 Depto. Ciencia de la Computacin e IA Spring

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia #12;Experto Universitario Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia de la Computación e IA

  11. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java propio de postgrado Experto Universitario en Desarrollo de Aplicaciones Web con Java EE y JavaScript conseguirás una formación en desarrollo de aplicaciones web con Java EE 7 (perfil web) y clientes Java

  12. Motives for Practicing Criticism as a ‘Rational Science’ in Lord Kames’s Elements of Criticism

    E-Print Network [OSTI]

    Innocenti, Beth

    2001-01-01

    The way Lord Kames practices criticism in Elements of Criticism (1762) is not motivated by the new philosophy per se. His use of the new philosophy in the practice of criticism addresses social, political, and nationalistic circumstances. After...

  13. 6.092 Introduction to Software Engineering in Java, January (IAP) 2009

    E-Print Network [OSTI]

    Jones, Evan

    This course is an introduction to Java programming and software engineering. It is designed for those who have little or no programming experience in Java and covers concepts useful to 6.005. The focus is on developing ...

  14. Enhancing the Expressiveness of the CleanJava Language Melisa Vela and Yoonsik Cheon

    E-Print Network [OSTI]

    Cheon, Yoonsik

    for Java to support Cleanroom-style functional program verification that views a program as a mathematical function, CleanJava. I. INTRODUCTION In Cleanroom-style functional program verification, a pro- gram

  15. A distributed and hierarchical naming scheme for Java RMI with support for persistence and caching 

    E-Print Network [OSTI]

    Agni, Rohan Madhuker

    1998-01-01

    Java Remote Method Invocation (Java RMI) is a icrographics. distributed object technology that is going to play a pivotal role in the distributed object world of tomorrow. With the introduction of the Remote Object Activation API in the beta version...

  16. Java for Scientific Computation: Prospects and Henk J. Sips and Kees van Reeuwijk

    E-Print Network [OSTI]

    core language. Two such solutions are proposed in the Spar/Java project [14] and the Titanium project [16]. For example, a two-dimensional array in Spar/Java is declared and used as follows: int a

  17. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  18. De de se

    E-Print Network [OSTI]

    Anand, Pranav

    2006-01-01

    In this dissertation, I argue against a unitary treatment of individual de se ascription. Based on consideration of Yoruba logophors and English dream-report pronouns, I show that one mechanism is best analyzed as binding ...

  19. Critical Materials:

    Office of Environmental Management (EM)

    Extraction Separation Processes for Critical Materials in 30- 21 Stage Test Facility (Bruce Moyer) ......

  20. Java in the High Performance Computing Arena: Research, Practice and Experience

    E-Print Network [OSTI]

    Fraguela, Basilio B.

    Java in the High Performance Computing Arena: Research, Practice and Experience Guillermo L interest in Java for High Performance Computing (HPC) is based on the appealing features of this language in HPC. Keywords: Java, High Performance Computing, Performance Evaluation, Multi-core Architectures

  1. Introduction Copyright 1994, 1995 Sun Microsystems The JavaTM Language: An Overview 1 of 8

    E-Print Network [OSTI]

    Introduction Copyright © 1994, 1995 Sun Microsystems The JavaTM Language: An Overview 1 of 8, The HotJavaTM Browser: An Overview, describes a powerful application that demonstrates the power: An Overview Copyright © 1994, 1995 Sun Microsystems unsuitable, we designed Java as closely to C++ as possible

  2. The Use of Java in High Performance Computing: A Data Mining Example

    E-Print Network [OSTI]

    Walker, David W.

    The Use of Java in High Performance Computing: A Data Mining Example David Walker and Omer Rana in high performance computing is discussed with particular reference to the efforts of the Java Grande Java, Parallel Computing, Neu­ ral Networks, Distributed Objects 1 Introduction High performance

  3. Inside the Java Intelligent Tutoring System Prototype: Parsing Student Code Submissions with Intent Recognition

    E-Print Network [OSTI]

    Franek, Frantisek

    Inside the Java Intelligent Tutoring System Prototype: Parsing Student Code Submissions with Intent., Hamilton, Ont., Canada, L8S 4L8 +1 (905) 525-9140 Ext. 23233 franek@mcmaster.ca ABSTRACT The "Java for students in their first programming course in JavaTM at the College and University level. This paper

  4. A Java Library Implementation of the Gold-Food Economic Model in Repast and MASON

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    1 A Java Library Implementation of the Gold-Food Economic Model in Repast and MASON Christopher K, 2008 Abstract We present a robust, extensible Java library for agent-based economic simulations et al. [8]. We implement the library on top of both the Repast and MASON agent-based Java toolkits

  5. The Java Machine Learning Library Thomas Abeel, Yvan Saeys and Yves Van de Peer

    E-Print Network [OSTI]

    Gent, Universiteit

    The Java Machine Learning Library Thomas Abeel, Yvan Saeys and Yves Van de Peer Department of Plant.abeel@psb.ugent.be What is Java-ML? Motivation Code & Documentation Applications 1. Machine learning techniques: · 18: java doc and explanation of the algorithm · Generated API: from the source code · Changelog

  6. Sunda-Java trench kinematics, slab window formation and overriding plate deformation since the Cretaceous

    E-Print Network [OSTI]

    Müller, Dietmar

    Sunda-Java trench kinematics, slab window formation and overriding plate deformation since along the 3200 km long Sunda-Java trench, one of the largest subduction systems on Earth. Combining window underlying the Java­South Sumatra region, and we propose that decreased mantle wedge viscosities

  7. A generator of efficient strongly typed abstract syntax trees in Java

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A generator of efficient strongly typed abstract syntax trees in Java Mark van den Brand1 to extract, transform, store and pro- duce information that is key to their functionality. We present a Java a strongly typed data-structure with maximal sub-term sharing in Java. Practical experience shows

  8. Attacks on Java Card 3.0 Combining Fault and Logical Attacks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attacks on Java Card 3.0 Combining Fault and Logical Attacks Guillaume Barbu1,2 , Hugues Thiebeauld://www.telecom-paristech.fr/ guillaume.barbu@telecom-paristech.fr Abstract. Java Cards have been threatened so far by attacks using ill it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification

  9. Vol. 4, No. 10, 2005 Reflection-based implementation of Java

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Vol. 4, No. 10, 2005 Reflection-based implementation of Java extensions: the double-dispatch use of Java without modifying the language nor the virtual machine. In this paper, we present the advan- tages these principles have been applied to develop an efficient and general double-dispatch solution for Java, and we

  10. Jam -Designing a Java Extension with Mixins DAVIDE ANCONA, GIOVANNI LAGORIO and ELENA ZUCCA

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Jam - Designing a Java Extension with Mixins DAVIDE ANCONA, GIOVANNI LAGORIO and ELENA ZUCCA University of Genova In this paper we present Jam, an extension of the Java language supporting mixins, that is, parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration

  11. A Prototype for an Intelligent Tutoring System for Students Learning to Program in Java TM

    E-Print Network [OSTI]

    Franek, Frantisek

    A Prototype for an Intelligent Tutoring System for Students Learning to Program in Java TM Edward R, L8S 4L8 +1 (905) 525­9140 Ext. 23233 franek@mcmaster.ca Abstract The ``Java TM Intelligent Tutoring in their first programming course in Java TM at the College and University level. This paper presents an overview

  12. JAMUS: Java Accommodation of Mobile Untrusted Software Nicolas Le Sommer and Frdric Guidec

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    JAMUS: Java Accommodation of Mobile Untrusted Software Nicolas Le Sommer and Frédéric Guidec (Java Accommodation of Mobile Un- trusted Software) platform we tackle these problems based on a contractual approach of resource manage- ment and access control. JAMUS can accommodate mo- bile Java

  13. (c) 2001, Laszlo Gulyas, Harvard University Installing a development environment for Java

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    (c) 2001, Laszlo Gulyas, Harvard University 1/19 Installing a development environment for Java This document will guide you through the process of installing a comfortable development environment for Java hard disk space (additional 120Mb for Java documentation)2 ·CD-ROM drive or good internet connection

  14. Using the ACM Java Libraries in CS 1 Andrew Mertz, William Slough, and Nancy Van Cleave

    E-Print Network [OSTI]

    Van Cleave, Nancy K.

    Using the ACM Java Libraries in CS 1 Andrew Mertz, William Slough, and Nancy Van Cleave aemertz University Charleston, IL 61920 Abstract The Java language is commonly used in CS 1 courses, though its of these challenges, the ACM established the Java Task Force to study the problem. The work of this committee resulted

  15. Java Access to Numerical Libraries Henri Casanova \\Lambda Jack Dongarra \\Lambda y David M. Doolin \\Lambda

    E-Print Network [OSTI]

    Dongarra, Jack

    Java Access to Numerical Libraries Henri Casanova \\Lambda Jack Dongarra \\Lambda y David M. Doolin \\Lambda May 31, 1997 Abstract It is a common and somewhat erroneous belief that Java will always be ``too the question of scientific computing via Java: NetSolve and f2j. The approaches taken by these two projects

  16. A Java-based system support for distributed applications on the Internet

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Java-based system support for distributed applications on the Internet D. Hagimont1 , D. It provides the same abstraction and interface as the RMI service of Java, but it extends the functionality on top of Java. It has been evaluated by comparison with RMI using a benchmark and validated by porting

  17. Java Objects Communication on a High Performance Network Luc Courtrai, Yves Maheo, Frederic Raimbault

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Objects Communication on a High Performance Network Luc Courtrai, Yves Mah´eo, Fr. Recent works show the interest in Java for cluster programming. One of the main issues is to handle an alternative to the standard serialization process through the proposal of a Java object communication library

  18. IBM COBOL for AIX Integrating IBM COBOL for AIX with Java

    E-Print Network [OSTI]

    IBM COBOL for AIX Integrating IBM COBOL for AIX with Java By: Gaby Baghdadi Level: Introductory April 2010 #12;Integrating IBM COBOL for AIX with Java, Page 2 of 32 Copyright © 2010, IBM® Corporation........................................................................ 8 COBOL class used with a Java client

  19. A Freeware Java Tool for Spatial Point Analysis of Neuronal Barry G. Condron

    E-Print Network [OSTI]

    Condron, Barry

    NEWS ITEM A Freeware Java Tool for Spatial Point Analysis of Neuronal Structures Barry G. Condron, a freeware tool, called PAJ, has been developed. This Java-based tool takes 3D Cartesian coordinates as input in Java that is based on previously described statistical analysis (Diggle 2003). In PAJ, data is copied

  20. JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications

    E-Print Network [OSTI]

    Livshits, Ben

    widely used to enable Web 2.0, the performance of JavaScript is now a concern of ven- dors of every majorJSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications Paruj {livshits,zorn}@microsoft.com Abstract JavaScript is widely used in web-based applications

  1. An Infrastructure for Hardware-Software Co-design of Embedded Real-Time Java Applications

    E-Print Network [OSTI]

    Wagner, Flávio Rech

    An Infrastructure for Hardware-Software Co-design of Embedded Real-Time Java Applications Elias of Kansas, USA dandrews@ittc.ku.edu Abstract The partitioning of applications into hardware and software in hardware in the context of the Real Time Specification for Java (RTSJ) standard. There is a Java class

  2. An Automated System for Converting App Inventor Apps to Java Interface For Creating and Managing Projects

    E-Print Network [OSTI]

    Gray, Jeffrey G.

    An Automated System for Converting App Inventor Apps to Java Interface For Creating and Managing of Computer Science Graphical Environment For Creating Layouts MIT App Inventor An Automated System for Converting App Inventor Apps to JavaAn Automated System for Converting App Inventor Apps to JavaAn Automated

  3. r-Java 2.0: the nuclear physics

    E-Print Network [OSTI]

    M. Kostka; N. Koning; Z. Shand; R. Ouyed; P. Jaikumar

    2014-02-16

    [Aims:] We present r-Java 2.0, a nucleosynthesis code for open use that performs r-process calculations as well as a suite of other analysis tools. [Methods:] Equipped with a straightforward graphical user interface, r-Java 2.0 is capable of; simulating nuclear statistical equilibrium (NSE), calculating r-process abundances for a wide range of input parameters and astrophysical environments, computing the mass fragmentation from neutron-induced fission as well as the study of individual nucleosynthesis processes. [Results:] In this paper we discuss enhancements made to this version of r-Java, paramount of which is the ability to solve the full reaction network. The sophisticated fission methodology incorporated into r-Java 2.0 which includes three fission channels (beta-delayed, neutron-induced and spontaneous fission) as well as computation of the mass fragmentation is compared to the upper limit on mass fission approximation. The effects of including beta-delayed neutron emission on r-process yield is studied. The role of coulomb interactions in NSE abundances is shown to be significant, supporting previous findings. A comparative analysis was undertaken during the development of r-Java 2.0 whereby we reproduced the results found in literature from three other r-process codes. This code is capable of simulating the physical environment of; the high-entropy wind around a proto-neutron star, the ejecta from a neutron star merger or the relativistic ejecta from a quark nova. As well the users of r-Java 2.0 are given the freedom to define a custom environment. This software provides an even platform for comparison of different proposed r-process sites and is available for download from the website of the Quark-Nova Project: http://quarknova.ucalgary.ca/

  4. Java Plug-in Configuration for Version 7, Update 51 or Later Java Plug-in Version7, Update 51 for PC and Macrequires additional configuration before it will allow InfoView to

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Java Plug-in Configuration for Version 7, Update 51 or Later Java Plug-in Version7, Update 51. Open the Java Control Panel. · PC: o Click on Start Menu o Click on "Control Panel" o Click on the "Java" icon · Mac: o Click on Apple icon on upper left screen o Go to System Preferences o Click

  5. Java interface programming: Everything off the best website I've ever found: http://www-lia.deis.unibo.it/Misc/SW/Java/tutorial/html/native1.1/implementing/index.html

    E-Print Network [OSTI]

    Nourbakhsh, Illah

    Java interface programming: Everything off the best website I've ever found: http://www-lia.deis.unibo.it/Misc/SW/Java/tutorial/html/native1.1/implementing/index.html Table of Contents Java Native Interface Programming The JDK1.1 supports the Java Native Interface (JNI). On one hand, the JNI defines a standard naming and calling convention so

  6. Java Virtual-Machine Support for Portable Worst-Case Execution-Time Analysis I. Bate, G. Bernat

    E-Print Network [OSTI]

    Java Virtual-Machine Support for Portable Worst-Case Execution-Time Analysis I. Bate, G. Bernat@vmars.tuwien.ac.at Abstract The current trend towards the usage of Java in real-time, supported by two specifications (Real-Time Java and Real- Time Core extensions for the Java platform) requires ade- quate schedulability analysis

  7. PERFORMANCE MONITORING OF JAVA COMPONENT-ORIENTED DISTRIBUTED APPLICATIONS

    E-Print Network [OSTI]

    Murphy, John

    relevant projects. OrWell [3] is a monitoring environment for CORBA distributed applications, which uses attached to the existing objects. In addition, it is not clear whether the monitoring environmentPERFORMANCE MONITORING OF JAVA COMPONENT-ORIENTED DISTRIBUTED APPLICATIONS Adrian Mos, John Murphy

  8. Towards a Smart Compilation Manager for Java (Extended Abstract)

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Towards a Smart Compilation Manager for Java (Extended Abstract) Giovanni Lagorio DISI - Universit differently from the program obtained recompiling all the sources from scratch? We say that a compilation the sources for which the recompilation would be unde- fined: indeed, when the entire compilation fails, so

  9. Recent Advances in Java Technology Theory, Application, Implementation

    E-Print Network [OSTI]

    Power, James

    Recent Advances in Java Technology Theory, Application, Implementation James F. Power John T: Theory, Application, Implementation James F. Power and John T. Waldron (Eds.) First Edition, 2002 trademarks of Sun Microsystems, Inc. in the U.S. and other countries. This work is independent of Sun

  10. Static Information Flow Analysis for Java Department of Computer Science

    E-Print Network [OSTI]

    Bystroff, Chris

    Static Information Flow Analysis for Java Yin Liu Department of Computer Science Rensselaer their usage in software practice. This paper proposes run-time information flow models, and new static in software practice. We propose a new static information flow analysis towards this goal. This analysis

  11. Coalgebras and Monads in the Semantics of Java

    E-Print Network [OSTI]

    Poll, Erik

    of sequential Java from a combined coal- gebraic/monadic perspective. It turns out that these separate Jacobs and Erik Poll). Preprint submitted to Elsevier Science 5th February 2002 #12;type, describing with parameters. It has become standard in semantics to describe the result type on the right hand side

  12. HEP data analysis using jHepWork and Java

    E-Print Network [OSTI]

    S. Chekanov

    2009-02-09

    A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

  13. Producer Individual License Application Java Desktop App Entered demographic data

    E-Print Network [OSTI]

    Demurjian, Steven A.

    TESTING Producer ­ Individual License Application ­ Java Desktop App 7/21/2004 Entered demographic... On `Next', license attachment screen, added a cert letter: Still need to accommodate multiple authorities;On "Submit/Next" ­ Pulled up license with Inquiry tool. Some fields need widening. Didn't pick up

  14. A Java-based Science Portal for Neutron Scattering Experiments

    E-Print Network [OSTI]

    Vazhkudai, Sudharshan

    A Java-based Science Portal for Neutron Scattering Experiments Sudharshan S. Vazhkudai James A scattering facility recently commissioned by the US Department of Energy (DOE). The neutron beam produced (SNS) [14] is a large-scale leading- edge neutron scattering facility that hopes to fundamen- tally

  15. CSC 2014 Java Bootcamp Dr. Mary-Angela Papalaskari

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    in range [0,1,2,3] float b = gen.nextFloat(); //float in range [0,1),eg: 0.4589 int c = gen.nextInt(4) + 1 University imported automatically, includes String and Math classes #12;The Math Class · The Math class: · Use Random method nextInt()to generate a random number: Java Bootcamp Dr. Papalaskari Villanova

  16. Functional Java Bytecode Christopher LEAGUE Valery TRIFONOV Zhong SHAO

    E-Print Network [OSTI]

    flow explicit, verification simple, and that is well-suited for translation into lower as one component in a sophisticated type-preserving compiler for Java class files. Though our that the just-in-time compiler, a considerably large and complex piece of software, does not introduce security

  17. ADistributed Computer Algebra System Based on Maple and Java 1

    E-Print Network [OSTI]

    ADistributed Computer Algebra System Based on Maple and Java 1 Wolfgang Schreiner Research Distributed Maple is a system for writing parallel programs in the computer algebra system Maple. It allows scheduler from Maple and implements a parallel programming model on top. The system is portable to most

  18. Building Web Applications with Servlets and JavaServer Pages

    E-Print Network [OSTI]

    Janzen, David

    ://www.rational.com/corpinfo/college_relations/seed/ #12;Web Development Overview · static html ­ text file containing html tags created manually ­ may a web browser ­ Java applets #12;Static HTML web browser web server _____.htmlrequest URL response HTML #12;Dynamic HTML web browser web server _____.html request URL response HTML _____.jsp _____.class

  19. Thinking in Java, 2nd Edition, Release 11

    E-Print Network [OSTI]

    Sherrill, David

    ever written on Java. Ravindra Pai, Oracle Corporation, SUNOS product line This is the best book, software, white papers, interviews, product reviews, Web links, code samples, a forum, and regular articles-too-distant future. Randall R. Hawley, Automation Technician, Eli Lilly & Co. The best computer book writing I have

  20. r-Java 2.0: the astrophysics

    E-Print Network [OSTI]

    M. Kostka; N. Koning; Z. Shand; R. Ouyed; P. Jaikumar

    2014-02-16

    [Context:] This article is the second in a two part series introducing r-Java 2.0, a nucleosynthesis code for open use that performs r-process calculations and provides a suite of other analysis tools. [Aims:] The first paper discussed the nuclear physics inherent to r-Java 2.0 and in this article the astrophysics incorporated into the software will be detailed. [Methods:] R-Java 2.0 allows the user to specify the density and temperature evolution for an r-process simulation. Defining how the physical parameters (temperature and density) evolve can effectively simulate the astrophysical conditions for the r-process. Within r-Java 2.0 the user has the option to select astrophysical environments which have unique sets of input parameters available for the user to adjust. In this work we study three proposed r-process sites; neutrino-driven winds around a proto-neutron star, ejecta from a neutron star merger and ejecta from a quark nova. The underlying physics that define the temperature and density evolution for each site is described in this work. [Results:] In this paper a survey of the available parameters for each astrophysical site is undertaken and the effect on final r-process abundance is compared. The resulting abundances for each site are also compared to solar observations both independently and in concert. R-Java 2.0 is available for download from the website of the Quark-Nova Project: http://quarknova.ucalgary.ca/

  1. PHaSe-EFRC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of rare Kaonforsupernovae model (JournalHearingsHuman CapitalOmega LaserPHaSe

  2. Criticality Model

    SciTech Connect (OSTI)

    A. Alsaed

    2004-09-14

    The ''Disposal Criticality Analysis Methodology Topical Report'' (YMP 2003) presents the methodology for evaluating potential criticality situations in the monitored geologic repository. As stated in the referenced Topical Report, the detailed methodology for performing the disposal criticality analyses will be documented in model reports. Many of the models developed in support of the Topical Report differ from the definition of models as given in the Office of Civilian Radioactive Waste Management procedure AP-SIII.10Q, ''Models'', in that they are procedural, rather than mathematical. These model reports document the detailed methodology necessary to implement the approach presented in the Disposal Criticality Analysis Methodology Topical Report and provide calculations utilizing the methodology. Thus, the governing procedure for this type of report is AP-3.12Q, ''Design Calculations and Analyses''. The ''Criticality Model'' is of this latter type, providing a process evaluating the criticality potential of in-package and external configurations. The purpose of this analysis is to layout the process for calculating the criticality potential for various in-package and external configurations and to calculate lower-bound tolerance limit (LBTL) values and determine range of applicability (ROA) parameters. The LBTL calculations and the ROA determinations are performed using selected benchmark experiments that are applicable to various waste forms and various in-package and external configurations. The waste forms considered in this calculation are pressurized water reactor (PWR), boiling water reactor (BWR), Fast Flux Test Facility (FFTF), Training Research Isotope General Atomic (TRIGA), Enrico Fermi, Shippingport pressurized water reactor, Shippingport light water breeder reactor (LWBR), N-Reactor, Melt and Dilute, and Fort Saint Vrain Reactor spent nuclear fuel (SNF). The scope of this analysis is to document the criticality computational method. The criticality computational method will be used for evaluating the criticality potential of configurations of fissionable materials (in-package and external to the waste package) within the repository at Yucca Mountain, Nevada for all waste packages/waste forms. The criticality computational method is also applicable to preclosure configurations. The criticality computational method is a component of the methodology presented in ''Disposal Criticality Analysis Methodology Topical Report'' (YMP 2003). How the criticality computational method fits in the overall disposal criticality analysis methodology is illustrated in Figure 1 (YMP 2003, Figure 3). This calculation will not provide direct input to the total system performance assessment for license application. It is to be used as necessary to determine the criticality potential of configuration classes as determined by the configuration probability analysis of the configuration generator model (BSC 2003a).

  3. EOUG2000: Web publishing using PL/SQL and JAVA

    E-Print Network [OSTI]

    Grancher, Eric

    2000-01-01

    At CERN, as increasingly elsewhere, server based applications using the PL/SQL cartridge and Java are preferred as they make minimum demands on the client and ease maintenance. The PL/SQL cartridge, the original method offered by Oracle, has proved reliable and effective. We have used it to build web applications for more than four years. Newer applications are using Servlets together with the application server. This paper presents the different techniques that we designed and the pitfalls that we encountered in diverse projects such as a technology transfer database, a product management tool and a system to keep track of physics events. Important considerations are security, ease of maintenance, transaction handling and modularity. Most of the experience has been gained using the PL/SQL cartridge and this will be contrasted and compared with the newer Java techniques…

  4. Von MiniJava zur MiniJVM

    E-Print Network [OSTI]

    Seidl, Helmut

    Maschinen­Instruktionen können MiniJava­Programme beliebig komplex sein :­( Idee: #15; Gib formale Regeln an #12; Architektur der JVM: Code 1 2 3 0 54 SP 54 Store PC 17 0 1 2 3 17 12 #12; Code = enthält JVM entsprechenden Operationen auf Store aus. Konvention: 14 #12; 54 3 2 1 0 54 1 2 3 0 Store Store = Stack SP 54 15

  5. U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9: IBM Java

  6. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1: Oracle Solaris Java

  7. Introduction JAVA Georges Linares IUP GMI Universit d'Avignon et des Pays de Vaucluse

    E-Print Network [OSTI]

    Linarès, Georges

    Introduction à JAVA Georges Linares ­ IUP GMI ­ Université d'Avignon et des Pays de Vaucluse Modélisation Objet #12;Introduction à JAVA Historique ­ Les langages objets Simula 67 (trop tôt) Smalltalk utilisé ... et JAVA Georges Linares ­ IUP GMI ­ Université d'Avignon et des Pays de Vaucluse #12

  8. Java and JVM in a Nutshell Robert Stark, Joachim Schmid, Egon Borger

    E-Print Network [OSTI]

    Börger, Egon

    in a Nutshell execJavaT = execJavaStmT context(pos) = if pos = firstPos restbody/pos Bstm Exp then restbody/pos else restbody/up(pos) yieldUp(result) = restbody := restbody[result/up(pos)] pos := up(pos) yield(result) = restbody := restbody[result/pos] execJavaExpI = case context(pos) of lit yield(JLS(lit)) loc yield

  9. CJC: An Extensible Checker for the CleanJava Annotation Language

    E-Print Network [OSTI]

    Cheon, Yoonsik

    language for the Java programming language to support a Cleanroom-style functional program verification from the Cleanroom Software Engineering [1] that emphasizes defect prevention rather than defect

  10. Java on the MScIT Course at the University of Glasgow

    E-Print Network [OSTI]

    Poet, R.R.; Belhadj-Mostefa, K.; Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University) [More Details

    Poet,R.R. Belhadj-Mostefa,K. Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University)

  11. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java University of Alicante Experto Java Expert Web application with JavaEE and JavaScript development NEWS CONTENTS FACULTY CALENDAR REGISTRATION applications with Java EE and JavaScript. If you are interested in staying informed about this title you can

  12. Introduction to Java Programming for Networking (Lab 2b) Dr. Nazli MollahReferences: "An Intro to Network Programming with Java", Jan Graba; "Network Programming & Distr. Computing", Reilly & Reilly

    E-Print Network [OSTI]

    Hardy, Christopher R.

    1 Introduction to Java Programming for Networking (Lab 2b) Dr. Nazli MollahReferences: "An Intro to Network Programming with Java", Jan Graba; "Network Programming & Distr. Computing", Reilly & Reilly Lab 2b Objectives: Familiarizing yourself with the: java.net package · which contains the Inet

  13. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  14. An on-the-y Reference Counting Garbage Collector for Java Yossi Levanoni Erez Petrank y

    E-Print Network [OSTI]

    Petrank, Erez

    An on-the- y Reference Counting Garbage Collector for Java Yossi Levanoni #3; Erez Petrank y compete with any tracing algorithm. We have implemented our algorithm on SUN's Java Virtual Machine 1 for realistic benchmarks. Thus, a clever design of eÆcient memory management and garbage collector

  15. A Language Identification Application Built on the Java Client/Server Platform

    E-Print Network [OSTI]

    Daume III, Hal

    a system to dynamically add language labels for whole documents and text fragments. We have experi­ mented with several client/server configu­ rations, and present the results of tradeoffs made between labelling to the base Java package 1 making the package usable for multilingual 1 A few pointers to online Java

  16. C Compiler Targeting the Java Virtual Machine Senior Honors Thesis (Advisor: Javed A. Aslam)

    E-Print Network [OSTI]

    C Compiler Targeting the Java Virtual Machine Jack Pien Senior Honors Thesis (Advisor: Javed A to compile once and execute across many different platforms. With the emergence of the Internet by Sun Microsystems to address this "Write Once, Run Anywhere" problem. What sets a compiled Java program

  17. True Separate Compilation of Java Classes Davide Ancona, Giovanni Lagorio, and Elena Zucca ?

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    True Separate Compilation of Java Classes Davide Ancona, Giovanni Lagorio, and Elena Zucca ? DISI,lagorio,zuccag@disi.unige.it Abstract. We de#12;ne a type system modeling true separate compilation for a small but signi#12;cant Java's terminology) and compiled providing a minimal set of type requirements on missing classes. These requirements

  18. Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1

    E-Print Network [OSTI]

    Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1 Rob Wilson,2 reconstruct the boreal autumn (October­November) Palmer Drought Severity Index (PDSI) for Java, Indonesia between the climate of Indonesia and the large scale tropical Indo-Pacific climate system. Citation: D

  19. Improved Static Resolution of Dynamic Class Loading in Java Jason Sawin Atanas Rountev

    E-Print Network [OSTI]

    Sawin, Jason

    Improved Static Resolution of Dynamic Class Loading in Java Jason Sawin Atanas Rountev Ohio State. Unfor- tunately, the vast majority of static analyses for Java handle this feature either unsoundly or overly conser- vatively. We present a set of techniques for static reso- lution of dynamic

  20. GUI Migration across Heterogeneous Java Profiles Candy Wong, Hao-hua Chu, Masaji Katagiri

    E-Print Network [OSTI]

    Chu, Hao-hua

    GUI Migration across Heterogeneous Java Profiles Candy Wong, Hao-hua Chu, Masaji Katagiri Do-platform graphical user interface (GUI) development tools do not support migrate-able GUIs as they do not consider that can be migrated across heterogeneous Java profiles. In this paper, we will focus on two major problems

  1. Preliminary Assessment of the Java Intelligent Tutoring System Edward R. Sykes

    E-Print Network [OSTI]

    Franek, Frantisek

    Computing and Engineering Sciences, Sheridan College, 1430 Trafalgar Road, Oakville, Ont., Canada, L6H 2L1 of Computing and Software, Faculty of Science, McMaster University, 1280 Main Street W., Hamilton, Ont., Canada the growing trend of the Java programming language and to promote web-based personalized education, the Java

  2. Termination Graphs for Java Bytecode M. Brockschmidt, C. Otto, C. von Essen, and J. Giesl

    E-Print Network [OSTI]

    Ábrahám, Erika

    Termination Graphs for Java Bytecode M. Brockschmidt, C. Otto, C. von Essen, and J. Giesl LuFG Informatik 2, RWTH Aachen University, Germany Abstract. To prove termination of Java Bytecode (JBC) automatically, we transform JBC to finite termination graphs which represent all pos- sible runs of the program

  3. Kronos: A Java-Based Software System for the Processing and Retrieval of Large Scale

    E-Print Network [OSTI]

    Bader, David A.

    Kronos: A Java-Based Software System for the Processing and Retrieval of Large Scale AVHRR Data and preprocessing, indexing and storage, search and processing engine, and a Java interface. We illustrate the power of Maryland, College Park, MD 20742 March 4, 1999 1UMIACS and Department of Electrical Engineering 2Department

  4. Grain - A Java Analysis Framework for Total Data Readout

    E-Print Network [OSTI]

    P. Rahkila

    2007-11-21

    Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

  5. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 4: Threads

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 4: Threads #12;4.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with JavaOperating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Single and Multithreaded Processes #12

  6. Experto Universitario Java Enterprise Componentes de presentacin 2012-2013 Depto. Ciencia de la Computacin e IA Sesin 1

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Componentes de presentación © 2012-2013 Depto. Ciencia de la Universitario Java Enterprise Componentes de presentación © 2012-2013 Depto. Ciencia de la Computación e IA Sesión 1 Experto Universitario Java Enterprise · Framewoks RIA basados en el servidor · Características

  7. Programao Grfica 3D com OpenGL, Open Inventor e Java 3D ALESSANDRO L. BICHO

    E-Print Network [OSTI]

    Barbosa, Alberto

    Programação Gráfica 3D com OpenGL, Open Inventor e Java 3D ALESSANDRO L. BICHO ½ LUIZ GONZAGA DA estudado a Open Inventor, uma ØÓÓÐ Ø orientada a objetos construída sobre a OpenGL, contemplando funções a Java 3D, que é fortemente inspirada na Open Inventor. Ela é a biblioteca padrão da linguagem Java para

  8. INTRODUCTION The continental promontory of the Eurasian plate in SE

    E-Print Network [OSTI]

    Royal Holloway, University of London

    ­Java Trench, to the southeast Australian continental crust is colliding in eastern Indonesia University of London, Egham, Surrey, U.K. Christopher K. Morley Department of Petroleum Geoscience

  9. The Java-Sumatra Aerial Mega-Tramway

    E-Print Network [OSTI]

    Alexander Bolonkin; Richard Cathcart

    2007-01-09

    A mega-tramway based on the Indonesian islands of Sumatra and Java is proposed to span Sunda Strait. The Java-Sumatra Aerial Mega-Tramway (JSAMT) will be self-elevating and will regularly and cheaply launch passengers and cargoes via two conveyor belt-like facilities using standard winged shipping containers like those currently used by international trucking and ocean shipping industries that are volplaned across the Sunda Strait. The JSAMT will be a self-sustaining toll facility free of any requirement for international loans or funding guarantees for its construction. Its existence will remove any immediate need for an expensive to dig/maintain Nusantara Tunnel. We offer the formative basic technical specifications for the JSAMT and indicate some of the physical and cultural geographical facts underpinning our macro-engineering proposal; offshoots of a perfected and tested JSAMT may be installed at Palk Strait between India and Sri Lanka, the Gibraltar Strait and the Bering Strait by mid-21st Century.

  10. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java Nueva - 1 5 Experto Java Universidad de Alicante El Centro de Formación Continua de la Universidad de Alicante ha aprobado el proyecto de título propio de Experto en Desarrollo de Aplicaciones Web con Java EE

  11. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java tutorización. Todos ellos tienen una gran experiencia docente y profesional en el campo de Java Enterprise Aplicaciones para Dispositivos Móviles. Profesor del Experto Java desde 2010. http://www.frangarcia.net Aitor

  12. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java Experto Desarrollo Aplicaciones Web con JavaEE y JavaScript NOTICIAS CONTENIDOS PROFESORADO CALENDARIO MATRÍCULA BECAS NOTICIAS Y EVENTOS 1 8 / 0 6 / 2 0 1 4 Matriculación en el Experto Java Ya está disponible

  13. Interactive visualization for geoscience education: Java-based instructional tools for introductory geology 

    E-Print Network [OSTI]

    Nevorotina, Anna

    2001-01-01

    Two web-based interactive visualization tools were developed to support problem-based learning in tertiary introductory geoscience classes. The presented tools were designed using the Java[TM] programming language, following guidelines for good...

  14. A distributed hard real-time Java system for high mobility components 

    E-Print Network [OSTI]

    Rho, Sangig

    2005-02-17

    applications to adapt to changes in user requirements or to external events. We describe how we achieve run-time recon?guration in distributed Java applications by appropriately migrating servers. Guaranteed-rate schedulers at the servers provide...

  15. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  16. 6.092 Introduction to Software Engineering in Java, January (IAP) 2008

    E-Print Network [OSTI]

    Akeju, Usman O.

    This course is an introduction to software engineering, using the Java™ programming language; it covers concepts useful to 6.005. The focus is on developing high quality, working software that solves real problems. Students ...

  17. Towards OpenMP for Java J. M. Bull and M. D. Westhead

    E-Print Network [OSTI]

    Bull, Mark

    ] and SPAR Java [14]. However, these are designed prin­ cipally for distributed systems, and unlike our proposal, involve genuine language extensions. The current im­ plementations of Titanium and SPAR are via

  18. 11 Das Package java.io 11.1 Streams 11-3(188) Durch Vererbung werden diverse Streams fr konkrete Anwendungen erzeugt und im Package java.io

    E-Print Network [OSTI]

    Arndt, Holger

    Stream wie System.in liefert einen Strom aus Bytes. · Ein InputStreamReader wandelt einen Bytestrom in einen.out.println(datei.length()); 28 System.out.println(new Date(datei.lastModified())); JavaIO/Files/FileBsp2.java 12 String file

  19. Solon SE | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing Capacity forSiliciumEnergy Inc Jump to:Solergy PowerSolisSolmicSolomonSE

  20. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 1: Introduction

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 1: Introduction #12;1.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 1: Introduction What Operating Systems Do Computer-System

  1. The Java programming language is acheiving greater accep-tance in high-end embedded systems such as cellphones and

    E-Print Network [OSTI]

    Bhattacharyya, Shuvra S.

    been explored recently. TurboJ [4] speeds up execution by compiling bytecode to native code aheadAbstract The Java programming language is acheiving greater accep- tance in high-end embedded and bytecode. Bytecode is object code that is processed by a program, referred to as the Java Virtual Machine

  2. Measuring Sulphur Dioxide (SO2) Emissions in October, 2010 Catastrophic Eruption from Merapi Volcano in Java, Indonesia

    E-Print Network [OSTI]

    Gilbes, Fernando

    Volcano in Java, Indonesia with Ozone Monitoring Instrument (OMI) José A. Morales-Collazo Geology This paper discusses sulfur dioxide (SO2) cloud emissions from Merapi Volcano in Java, Indonesia during, Indonesia. In October 26th , 2010, a catastrophic eruption was reported from Merapi causing nearly 386

  3. Using Entrez Utilities Web Service with Apache Axis2 for Java Creating a Web Service Client Application

    E-Print Network [OSTI]

    Levin, Judith G.

    Using Entrez Utilities Web Service with Apache Axis2 for Java Creating a Web Service Client Entrez Utilities Web Service using Axis2 for Java. Preinstalled Software You should have Apache Axis2.sh shell script file on Linux) in the bin directory of Axis2 installation. You will use it to generate Web

  4. Critical Materials Institute

    ScienceCinema (OSTI)

    Alex King

    2013-06-05

    Ames Laboratory Director Alex King talks about the goals of the Critical Materials Institute in diversifying the supply of critical materials, developing substitute materials, developing tools and techniques for recycling critical materials, and forecasting materials needs to avoid future shortages.

  5. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 19: Real-Time Systems

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 19: Real-Time Systems #12;19.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006Operating System Concepts with Java ­ 7th Edition, Nov 15

  6. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universitat d'Alacant Experto Java Becas Java Universitat d'Alacant Carretera de Sant Vicent del Raspeig s/n 03690 Sant Vicent del Raspeig

  7. Java Programming for High Performance Numerical Computing J. E. Moreira S. P. Midkiff M. Gupta P. V. Artigas M. Snir R. D. Lawrence

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    Java Programming for High Performance Numerical Computing J. E. Moreira S. P. Midkiff M. Gupta P. V for enhancing Web content, Java has taken off as a serious general­ purpose programming language. Industry and academia alike have expressed great interest in using Java as a programming language for scientific

  8. SpoonEMF, une brique logicielle pour l'utilisation de l'IDM dans le cadre de la ringnierie de programmes Java5

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    programmes Java5 Olivier Barais Projet Triskell/IRISA campus de Beaulieu. F - 35 042 Rennes Cedex barais'IDM dans le cadre de la réingénierie d'applications écrites en Java. L'accent dans cette courte réutilisation d'outils comme l'analyseur syntaxique de code Java5 (parser) ou le générateur de code (pretty

  9. Jens Muller Wilhelm G. Spruth Anwendungs-und Transaktionsisolation unter Java

    E-Print Network [OSTI]

    Spruth, Wilhelm G.

    an overview of the solutions that are presently available or under discus- sion. J. M¨uller (k) · W.G. Spruth¨ubingen, Sand 13, 72076 T¨ubingen, Deutschland E-Mail: mail@jensmueller.com W.G. Spruth Institut f¨ur InformatikJens M¨uller · Wilhelm G. Spruth Anwendungs- und Transaktionsisolation unter Java Zusammenfassung

  10. JITProf: Pinpointing JIT-unfriendly JavaScript Code Michael Pradel

    E-Print Network [OSTI]

    Sen, Koushik

    that cause perfor- mance problems in the Firefox and Chrome browsers, and we apply the approach to popular a modern web browser. Another key reason behind the popularity of JavaScript among programmers is that it is a flexible, dynamically typed language. For example, programmers can add and delete object properties

  11. Optimization Coaching for JavaScript Vincent St-Amour1

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    Optimization Coaching for JavaScript Vincent St-Amour1 and Shu-yu Guo2 1 PLT @ NortheasternScript depends heavily on highly optimizing just-in-time compilers. Such compilers, like all compilers, can silently fall back to generating conservative, low-performance code during optimization. As a result, pro

  12. A Tested Semantics for Getters, Setters, and Eval in JavaScript

    E-Print Network [OSTI]

    Krishnamurthi, Shriram

    present S5, a semantics for the strict mode of the ECMAScript 5.1 (JavaScript) programming language. S5 shrinks the large source language into a manageable core through an implemented trans- formation programming languages, so their study is likely to have broad applicability. Categories and Subject

  13. Application layer thread migration in Java Project report for Advanced Topics in PLT

    E-Print Network [OSTI]

    migration that have been already explored. The primary reason that we want to explore application levelApplication layer thread migration in Java Project report for Advanced Topics in PLT Nikhil Sarda from various sources. One of the primary challenges of computer science today is the development

  14. Run-time Modification of the Class Hierarchy in a Live Java Development Environment

    E-Print Network [OSTI]

    Goldman, Kenneth J.

    1 Run-time Modification of the Class Hierarchy in a Live Java Development Environment Joel R. Louis {jbrandt, kjg}@wustl.edu Abstract Class hierarchy design is central to object-oriented software work on live development environments to allow run-time modification of the class hierarchy. The result

  15. Automatic Feedback-Directed Object Inlining in the Java HotSpotTM Virtual Machine

    E-Print Network [OSTI]

    Mössenböck, Hanspeter

    to be replaced by address arithmetic. We implemented this optimization for Sun Microsystems' Java HotSpotTM VM analysis. The garbage collector ensures that groups of colocated objects are not split: it copies groups This work was supported by Sun Microsystems, Inc. c ACM, 2007. This is the author's version of the work

  16. Semi-Automatic Region-Based Memory Management for Real-Time Java Embedded Systems

    E-Print Network [OSTI]

    Salagnac, Guillaume

    , our system behaves as efficiently as a garbage collector in terms of memory consumption. Our analysis garbage collectors (GC) is further- more hindered by hardware limitations, and embedded sys- tems analysis tool, we provide an environ- ment where all memory operations run in predictable time, 1http://java.sun

  17. Realtime Garbage Collection for a Multithreaded Java Microcontroller S. Fuhrmann, M. Pfeffer, J. Kreuzinger, Th. Ungerer

    E-Print Network [OSTI]

    Ungerer, Theo

    collection. Java lacks explicit memory release methods and therefore a garbage collector is needed to reclaim of garbage collectors in multithreaded hardware with real­time require­ ments. Current approaches investigate­threaded Alpha processor of DEC/Compaq [9] and Sun's MAJC­5200 processor, which feature two 4­threaded

  18. A Runtime System for XML Transformations in Java Aske Simon Christensen, Christian Kirkegaard, and Anders Mller

    E-Print Network [OSTI]

    Møller, Anders

    by the Danish National Research Foundation. #12;description of the XACT runtime system. We present a suitableA Runtime System for XML Transformations in Java Aske Simon Christensen, Christian Kirkegaard system where the operations can be performed efficiently. The system, named XACT, is based on a notion

  19. A Language Identification Application Built on the Java Client/Server Platform

    E-Print Network [OSTI]

    constructed a system to dynamically add language labels for whole documents and text fragments. We have experi labelling accuracy and the size/completeness of the language models. 1 Introduction In the 1.1 release been added to the base Java package 1 making the package usable for multilingual 1A few pointers

  20. A Kickball Game for Ankle Rehabilitation by JAVA, JNI and VRML

    E-Print Network [OSTI]

    Lee, Chan-Su

    A Kickball Game for Ankle Rehabilitation by JAVA, JNI and VRML Hyungjeen Choi , Jeha Ryu environment that can be applied to the ankle rehabilitation procedure. We developed a virtual football stadium of the ankle rehabilitation procedures. Keywords: ankle rehabilitation, virtual environment, VRML, JNI, K

  1. Effects of Static Type Specialization on Java Generic Collections (Technical Report)

    E-Print Network [OSTI]

    Machkasova, Elena

    specialization and suggest criteria for selecting groups of classes for performance improvements. As an example, we compare different ways of specializing subsets of the Java collections library and present-needed software development tool that allow programmers to combine the convenience of generic programming

  2. Modeling study of growth and potential geohazard for LUSI mud volcano: East Java, Indonesia

    E-Print Network [OSTI]

    Manga, Michael

    Modeling study of growth and potential geohazard for LUSI mud volcano: East Java, Indonesia Bambang., Wisma Mulia 22nd Floor, JI. Jend. Gatot Subroto 42, 12710 Jakarta, Indonesia b Bakosurtanal, Jl. Jakarta-Bogor Km. 46, 16911 Cibinong, Indonesia c Applied Geology Research Division, Institute of Technology

  3. Ground deformation associated with the eruption of Lumpur Sidoarjo mud volcano, east Java, Indonesia

    E-Print Network [OSTI]

    Aoki, Yosuke

    , Indonesia Yosuke Aoki , Teguh Purnama Sidiq 1 Earthquake Research Institute, University of Tokyo, 1-1 Yayoi. With this background, the eruption of Lumpur Sidoarjo (LUSI), eastern Java Island, Indonesia, pro- vides us), which yields good coherence even in vegetated regions like Indonesia. While Rudolph et al. (2013) used

  4. Modeling and Implementing Software Architecture with Acme and ArchJava

    E-Print Network [OSTI]

    Garlan, David

    Modeling and Implementing Software Architecture with Acme and ArchJava Marwan Abi-Antoun Jonathan+@cs.cmu.edu schmerl+@cs.cmu.edu nnahas@acm.org ttt@alumni.carnegiemellon.edu ABSTRACT We demonstrate a tool to incrementally synchronize an Acme architectural model described in the Acme Architectural Description Language

  5. Design Space Exploration for Java Processors with Cross-Profiling Martin Schoeberl

    E-Print Network [OSTI]

    Schoeberl, Martin

    systems (e.g., in the automotive and airborne domain), almost all mobile phones already contain a JVM-profiling is a technique that executes a program on a host platform, but collects profiling information for the target platform. Cross-profiling not only eases the detection of performance bottlenecks in embedded Java software

  6. Automatic Test Factoring for Java David Saff Shay Artzi Jeff H. Perkins Michael D. Ernst

    E-Print Network [OSTI]

    Ernst, Michael

    Automatic Test Factoring for Java David Saff Shay Artzi Jeff H. Perkins Michael D. Ernst MIT {saff,artzi,jhp,mernst}@csail.mit.edu Abstract Test factoring creates fast, focused unit tests from slow system-wide tests; each new unit test exercises only a subset of the functionality exercised

  7. Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators

    E-Print Network [OSTI]

    Robert R. Tucci

    2008-02-17

    This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

  8. License Usage and Changes: A Large-Scale Study of Java Projects on GitHub

    E-Print Network [OSTI]

    Poshyvanyk, Denys

    License Usage and Changes: A Large-Scale Study of Java Projects on GitHub Christopher Vendome1 -- 4 University of Victoria, BC, Canada Abstract--Software licenses determine, from a legal point of view, under which conditions software can be integrated, used, and above all, redistributed. Licenses

  9. SAT-based Termination Analysis for Java Bytecode with AProVE

    E-Print Network [OSTI]

    Ábrahám, Erika

    SAT-based Termination Analysis for Java Bytecode with AProVE Carsten Fuhs LuFG Informatik 2, RWTH solving engines for the search problems in automated termination analysis. Consequently, the performance of current termination tools heavily relies on the speed of modern SAT solvers on the corresponding SAT

  10. Building Interactive Animations using VRML and Java FABIANA SALDANHA TAMIOSSO 1 , ALBERTO BARBOSA RAPOSO 1 ,

    E-Print Network [OSTI]

    de Figueiredo, Luiz Henrique

    are pre­ sented in Section 5. 2 VRML The main goal of the current version of VRML -- 2.0 -- is to provide the definition of a Java program to process and generate events that determine the behavior of scene elements as built­in tools for Web browsers and as autonomous tools. In this paper we present strategies we have

  11. Self-accounting as Principle for Portable CPU Control in Java

    E-Print Network [OSTI]

    Binder, Walter

    Self-accounting as Principle for Portable CPU Control in Java Walter Binder1 and Jarle Hulaas2 1 the threads of an application com- ponent aggregate the information of their respective CPU consumption within 1 Introduction Accounting and controlling the resource consumption of applications and of individual

  12. COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode

    E-Print Network [OSTI]

    Zanardini, Damiano

    COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode E. Albert1 and termination together is interesting, as both analyses share most of the machinery to, respectively, infer cost analysis share most of the system machinery, as they need to consider and infer roughly the same

  13. Detecting Concurrency Errors in Client-side JavaScript Web Applications

    E-Print Network [OSTI]

    issues are becoming more serious for web applications because a new web standard, HTML5, allows webDetecting Concurrency Errors in Client-side JavaScript Web Applications Shin Hong, Yongbae Park.park@kaist.ac.kr, moonzoo@cs.kaist.ac.kr Abstract--As web technologies have evolved, the complexity of dynamic web

  14. Critical Materials Workshop

    Broader source: Energy.gov [DOE]

    AMO hosted a public workshop on Tuesday, April 3, 2012 in Arlington, VA to provide background information on critical materials assessment, the current research within DOE related to critical...

  15. Seismic facies and growth history of Miocene carbonate platforms, Wonocolo Formation, North Madura area, East Java Basin, Indonesia 

    E-Print Network [OSTI]

    Adhyaksawan, Rahadian

    2002-01-01

    The Miocene Wonocolo Formation in the North Madura area, East Java Basin, contains numerous isolated carbonate platforms that are broadly distributed across a ~3000 sq km area of the Indonesian back-arc region. The Wonocolo platforms provide...

  16. Designing and developing portable large-scale JavaScript web applications within the Experiment Dashboard framework

    E-Print Network [OSTI]

    Andreeva, J; Karavakis, E; Kokoszkiewicz, L; Nowotka, M; Saiz, P; Tuckett, D

    2012-01-01

    Improvements in web browser performance and web standards compliance, as well as the availability of comprehensive JavaScript libraries, provides an opportunity to develop functionally rich yet intuitive web applications that allow users to access, render and analyse data in novel ways. However, the development of such large-scale JavaScript web applications presents new challenges, in particular with regard to code sustainability and team-based work. We present an approach that meets the challenges of large-scale JavaScript web application design and development, including client-side model-view-controller architecture, design patterns, and JavaScript libraries. Furthermore, we show how the approach leads naturally to the encapsulation of the data source as a web API, allowing applications to be easily ported to new data sources. The Experiment Dashboard framework is used for the development of applications for monitoring the distributed computing activities of virtual organisations on the Worldwide LHC Comp...

  17. Criticality Model Report

    SciTech Connect (OSTI)

    J.M. Scaglione

    2003-03-12

    The purpose of the ''Criticality Model Report'' is to validate the MCNP (CRWMS M&O 1998h) code's ability to accurately predict the effective neutron multiplication factor (k{sub eff}) for a range of conditions spanned by various critical configurations representative of the potential configurations commercial reactor assemblies stored in a waste package may take. Results of this work are an indication of the accuracy of MCNP for calculating eigenvalues, which will be used as input for criticality analyses for spent nuclear fuel (SNF) storage at the proposed Monitored Geologic Repository. The scope of this report is to document the development and validation of the criticality model. The scope of the criticality model is only applicable to commercial pressurized water reactor fuel. Valid ranges are established as part of the validation of the criticality model. This model activity follows the description in BSC (2002a).

  18. Transport at criticality

    E-Print Network [OSTI]

    A. Buchel; C. Pagnutti

    2009-12-16

    We study second order phase transitions in non-conformal holographic models of gauge theory/string theory correspondence at finite temperature and zero chemical potential. We compute critical exponents of the bulk viscosity near the transition and interpret our results in the framework of available models of dynamical critical phenomena. Intriguingly, although some of the models we discuss belong to different static universality classes, they appear to share the same dynamical critical exponent.

  19. Critical Materials Workshop

    Broader source: Energy.gov (indexed) [DOE]

    Critical Materials Workshop U.S. Department of Energy April 3, 2012 eere.energy.gov Dr. Leo Christodoulou Program Manager Advanced Manufacturing Office Energy Efficiency and...

  20. Reference handbook: Nuclear criticality

    SciTech Connect (OSTI)

    Not Available

    1991-12-06

    The purpose for this handbook is to provide Rocky Flats personnel with the information necessary to understand the basic principles underlying a nuclear criticality.

  1. CAP: Criticality AnCAP: Criticality An Efficient Speculatip

    E-Print Network [OSTI]

    Torrellas, Josep

    - Tracks running tasks andg their context Novel components of CAPNovel components of CAP - Critical path builder Builds path and analyzes graph - Critical path predictor #12;CAP OvCAP Ov T ll t th hTo collect the critical path calculation is easyp y o find critical path #12;Critical PatCritical Pat T i i l l t d

  2. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  3. Galp associa se melhor escola de petrleo

    E-Print Network [OSTI]

    Instituto de Sistemas e Robotica

    juntaram-se à Galp para criar o ISPG, que se associou à Heriot Watt University para criar um mestrado em de uma parceria entre o ISPG e a Heriot Watt University, considera- da a melhor instituição de qualificado e de I&D deste sector para as operações que desenvolve em muitos países lusófo- nos, como Brasil

  4. University Ave SE University Ave W

    E-Print Network [OSTI]

    Thomas, David D.

    University Ave SE University Ave W Service Layer Credits: Sources: Esri, DeLorme, NAVTEQ, USGS, Intermap, i UV55 ")280 University Ave. Ramp Major Access Routes University Ave. Ramp §¨¦35W §¨¦94 ")280 Date: 5/30/2014 #12;, , , , , , , ""A TCF Bank Stadium Access Routes University Ave. Ramp University Ave SE Service

  5. Must Criticism Be Constructive?

    E-Print Network [OSTI]

    Geuss, Raymond

    2012-10-01

    ’ criti - cism is somehow defective, objectionable, or inappropriate. It is part of the responsibility of a critic, it is assumed, not simply to denigrate some institution, social arrangement, or form of action, but to do so while pro- viding at least... to the third of my three dimensions. In cases of ‘full-blown’ criticism the first and second of these aspects are explicitly connected. I would not usually think I had in front of me a case of ‘criti - cism’ — or at any rate of ‘criticism’ in the full...

  6. Critical Materials Hub

    Broader source: Energy.gov [DOE]

    Critical materials, including some rare earth elements that possess unique magnetic, catalytic, and luminescent properties, are key resources needed to manufacture products for the clean energy economy. These materials are so critical to the technologies that enable wind turbines, solar panels, electric vehicles, and energy-efficient lighting that DOE's 2010 and 2011 Critical Materials Strategy reported that supply challenges for five rare earth metals—dysprosium, neodymium, terbium, europium, and yttrium—could affect clean energy technology deployment in the coming years.1, 2

  7. REPRESENTATIVE COURSE SEQUENCE SOFTWARE ENGINEERING (SE)

    E-Print Network [OSTI]

    Huang, Haiying

    REPRESENTATIVE COURSE SEQUENCE SOFTWARE ENGINEERING (SE) Freshman Year First Semester Second Semester Second Semester CSE 3310 ­ Fundamentals of Software CSE 3302 ­ Programming Languages Engineering CSE 3320 ­ Operating Systems CSE 3315 ­ Theoretical Concepts in CSE CSE 4310 ­ Software Engineering

  8. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 11: File System Implementation

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 11: File System Implementation #12;11.2 Silberschatz, Galvin and Gagne ©2007Operating;11.3 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Objectives

  9. Silberschatz, Galvin and Gagne 2007Operating System Concepts with Java 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures #12;2.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures Operating System

  10. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 13: I/O Systems

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 13: I/O Systems #12;13.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts;13.3 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Objectives

  11. 11 Datenstrme und Dateien 11.1 Streams 11-3(190) Durch Vererbung werden diverse Streams fr konkrete Anwendungen erzeugt und im Package java.io als

    E-Print Network [OSTI]

    Arndt, Holger

    verschachtelt werden. · Ein einfacher InputStream wie System.in liefert einen Strom aus Bytes. · Ein Input.out.println(datei.length()); 28 System.out.println(new Date(datei.lastModified())); Dateien/JavaIO/File/FileBsp2.java 12 String

  12. Enriched $^{82}$Se for the LUCIFER experiment

    E-Print Network [OSTI]

    J. W. Beeman; F. Bellini; P. Benetti; L. Cardani; N. Casali; D. Chiesa; M. Clemenza; I. Dafinei; S. Di Domizio; F. Ferroni; L. Gironi; A. Giuliani; C. Gotti; M. Laubenstein; M. Maino; S. Nagorny; S. Nisi; C. Nones; F. Orio; L. Pagnanini; L. Pattavina; G. Pessina; G. Piperno; S. Pirro; E. Previtali; C. Rusconi; K. Schäffner; C. Tomei; M. Vignati

    2015-08-07

    The LUCIFER project aims at deploying the first array of enriched scintillating bolometers for the investigation of neutrinoless double-beta decay of $^{82}$Se. The matrix which embeds the source is an array of ZnSe crystals, where enriched $^{82}$Se is used as decay isotope. The radiopurity of the initial components employed for manufacturing crystals, that can be operated as bolometers, is crucial for achieving a null background level in the region of interest for double-beta decay investigations. In this work, we evaluated the radioactive content in 2.5 kg of 96.3% enriched $^{82}$Se metal, measured with a high-purity germanium detector at the Gran Sasso deep underground laboratory. The limits on internal contaminations of primordial decay chain elements of $^{232}$Th, $^{238}$U and $^{235}$U are respectively: $<$61 $\\mu$Bq/kg, $<$110 $\\mu$Bq/kg and $<$74 $\\mu$Bq/kg at 90% C.L.. The extremely low-background conditions in which the measurement was carried out and the high radiopurity of the $^{82}$Se allowed us to establish the most stringent lower limits on the half-lives of the double-beta decay of $^{82}$Se to 0$^+_1$, 2$^+_2$ and 2$^+_1$ excited states of $^{82}$Kr of 3.4$\\cdot$10$^{22}$ y, 1.3$\\cdot$10$^{22}$ y and 1.0$\\cdot$10$^{22}$ y, respectively, with a 90% C.L..

  13. The Critical Materials Institute | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment TopMetathesisSediments and Related J. BennettThe Critical

  14. Critical Materials Workshop Agenda

    Broader source: Energy.gov (indexed) [DOE]

    Critical Materials Workshop Sheraton Crystal City 1800 Jefferson Davis Highway, Arlington, VA April 3, 2012, 8 am - 5 pm Time (EDT) Activity Speaker 8:00 am - 9:00 am Registration...

  15. CRITICAL MATERIALS INSTITUTE PROJECTS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INL National Technology Roadmap for Critical Materials 4 4-3 4.3.3 McCall, Scott LLNL Additive Manufacturing of Permanent Magnets 2 2-1 2.1.2 Turchi, Patrice LLNL Materials...

  16. Critical thickness in silicone thermosets

    E-Print Network [OSTI]

    Deopura, Manish, 1975-

    2005-01-01

    Critical thickness effects are utilized to achieve high fracture toughness in brittle polymers. The postulate of critical thickness, which is: "Macroscopically brittle polymers deform in a ductile fashion below a critical ...

  17. Criticality Safety | Department of Energy

    Office of Environmental Management (EM)

    Nuclear Safety Management American Nuclear Society, Nuclear Criticality Safety Division ANSIANS-8 Standards U.S. Department of Energy Nuclear Criticality Safety Program Orders,...

  18. ARCHITECTURE OVERVIEW TIPSTER SE/CM

    E-Print Network [OSTI]

    ARCHITECTURE OVERVIEW TIPSTER SE/CM tipster@fipster.org THE TIPSTER ARCHITECTURE The TIPSTER Architecture is a software architecture for providing Document Detection (i.e. Document Retrieval and Message Routing) and Information Extraction functions to text handling applications. The high level architecture

  19. Enriched $^{82}$Se for the LUCIFER experiment

    E-Print Network [OSTI]

    Beeman, J W; Benetti, P; Cardani, L; Casali, N; Chiesa, D; Clemenza, M; Dafinei, I; Di Domizio, S; Ferroni, F; Gironi, L; Giuliani, A; Gotti, C; Laubenstein, M; Maino, M; Nagorny, S; Nisi, S; Nones, C; Orio, F; Pagnanini, L; Pattavina, L; Pessina, G; Piperno, G; Pirro, S; Previtali, E; Rusconi, C; Schäffner, K; Tomei, C; Vignati, M

    2015-01-01

    The LUCIFER project aims at deploying the first array of enriched scintillating bolometers for the investigation of neutrinoless double-beta decay of $^{82}$Se. The matrix which embeds the source is an array of ZnSe crystals, where enriched $^{82}$Se is used as decay isotope. The radiopurity of the initial components employed for manufacturing crystals, that can be operated as bolometers, is crucial for achieving a null background level in the region of interest for double-beta decay investigations. In this work, we evaluated the radioactive content in 2.5 kg of 96.3% enriched $^{82}$Se metal, measured with a high-purity germanium detector at the Gran Sasso deep underground laboratory. The limits on internal contaminations of primordial decay chain elements of $^{232}$Th, $^{238}$U and $^{235}$U are respectively: $<$61 $\\mu$Bq/kg, $<$110 $\\mu$Bq/kg and $<$74 $\\mu$Bq/kg at 90% C.L.. The extremely low-background conditions in which the measurement was carried out and the high radiopurity of the $^{82}$...

  20. NPS-SE-10-003 POSTGRADUATE

    E-Print Network [OSTI]

    NPS-SE-10-003 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA INTEGRATED PROJECT An Integrated Command and Control Architecture Concept for Unmanned Systems in the Year of 2030 By Omari D Buckley reporting burden for this collection of information is estimated to average 1 hour per response, including

  1. LaTTe: A Java VM JustinTime Compiler with Fast and Efficient Register Allocation \\Lambda

    E-Print Network [OSTI]

    Kim, Taejeong

    LaTTe: A Java VM Just­in­Time Compiler with Fast and Efficient Register Allocation \\Lambda Byung­Sun model, a lightweight mon­ itor, a fast mark­and­sweep garbage collector, and an on­demand exception that the current LaTTe JVMs achieve performance better than or comparable to the latest SUN JIT compilers (JDK 1

  2. A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James M. Russell a

    E-Print Network [OSTI]

    Vuille, Mathias

    of Mining and Petroleum Engineering, Institut Teknologi Bandung, Bandung 40132, Indonesia d DepartmentA severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James Available online Keywords: Drought Indonesia Indo-Pacific Warm Pool El Niño-Southern Oscillation Little Ice

  3. Implementation of Resource Adapter for SAP R/3 and generation of java-proxy class of BAPIs

    E-Print Network [OSTI]

    Moeller, Ralf

    SAP as their Enterprise Information System. Integrating the EIS with the existing Application Server-Oriented approach in accessing the data from the EIS. For the SAP system, java-proxy class of BAPIs can be generated to access the data from SAP R/3. My project work is concerned with developing a Resource Adapter for SAP

  4. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 15: Security

    E-Print Network [OSTI]

    Bezrukov, Sergei

    with Java ­ 7th Edition, Nov 15, 2006 Chapter 15: Security The Security Problem Program Threats System Edition, Nov 15, 2006 Program Threats Trojan Horse Code segment that misuses its environment Exploits Edition, Nov 15, 2006 C Program with Buffer-overflow Condition #12;15.10 Silberschatz, Galvin and Gagne

  5. AVLIS Criticality risk assessment

    SciTech Connect (OSTI)

    Brereton, S.J., LLNL

    1998-04-29

    Evaluation of criticality safety has become an important task in preparing for the Atomic Vapor Laser Isotope Separation (AVLIS) uranium enrichment runs that will take place during the Integrated Process Demonstration (IPD) at Lawrence Livermore National Laboratory (LLNL). This integrated operation of AVLIS systems under plant-like conditions will be used to verify the performance of process equipment and to demonstrate the sustained integrated enrichment performance of these systems using operating parameters that are similar to production plant specifications. Because of the potential criticality concerns associated with enriched uranium, substantial effort has been aimed towards understanding the potential system failures of interest from a criticality standpoint, and evaluating them in detail. The AVLIS process is based on selective photoionization of uranium atoms of atomic weight 235 (U-235) in a vapor stream, followed by electrostatic extraction. The process is illustrated in Figure 1. Two major subsystems are involved: the uranium separator and the laser system. In the separator, metallic uranium is fed into a crucible where it is heated and vaporized by an electron beam. The atomic U-235/U-238 vapor stream moves away from the molten uranium and is illuminated by precisely tuned beams of dye laser light. Upon absorption of the tuned dye laser light, the U-235 atoms become excited and eject electrons (become photoionized), giving them a net positive charge. The ions of U-235 are moved preferentially by an electrostatic field to condense on the product collector, forming the enriched uranium product. The remaining vapor, which is depleted in U-235 (tails), passes unaffected through the photoionization/extractor zone and accumulates on collectors in the top of the separator. Tails and product collector surfaces operate at elevated temperatures so that deposited materials flow as segregated liquid streams. The separated uranium condensates (uranium enriched in U-235 and uranium depleted in U-235) are cooled and accumulated in solid metallic form in canisters. The collected product and tails material is weighed and transferred into certified, critically safe, shipping containers (DOT specification 6M with 2R containment vessel). These will be temporarily stored, and then shipped offsite either for use by a fuel fabricator, or for disposal. Tails material will be packaged for disposal. A criticality risk assessment was performed for AVLIS IPD runs. In this analysis, the likelihood of occurrence of a criticality was examined. For the AVLIS process, there are a number of areas that have been specifically examined to assess whether or not the frequency of occurrence of a criticality is credible (frequency of occurrence > 10-6/yr). In this paper, we discuss only two of the areas: the separator and canister operations.

  6. Java Printing

    E-Print Network [OSTI]

    User

    2009-09-09

    O. O. (14). O. (9). O. O. O. (8). O. (13). (4). (5). O. (10). (7). (12). O. (1). O. (11). (6). O. O. O. (3). (2). O. Problem 3: From ILT: A25 d .08165. A25 := 0.08165. A32 d .

  7. Java Printing

    E-Print Network [OSTI]

    User

    2010-11-30

    O. O. (5). O. O. (9). (3). (1). O. (6). (8). O. (7). O. O. O. (2). (4). 1) Huntington Bank offers an account that pays 4%, compounded daily. They decide to change to.

  8. Java Printing

    E-Print Network [OSTI]

    richard

    2014-10-09

    (1). > > > (4). (3). (2). 1) Lafayette Savings Bank offers an account that pays a nominal rate of i% per year, compounded daily. A deposit of $1,000 made on ...

  9. Java Printing

    E-Print Network [OSTI]

    User

    2008-10-22

    O. (8). (12). (9). (7). O. O. O. O. (10). O. O. (2). (4). (16). (11). (13). (5). (1). (14). O. O. O. O. (3). O. (15). O. (6). O. O. O. FV:=(i,PV,n,Y)->(1+i)^n*PV-((1+i)^n-1)*Y/i;.

  10. Java Printing

    E-Print Network [OSTI]

    Math

    2012-12-12

    (3). > > > > > (7). > (6). > > (2). (4). > (5). > (1). 1)At the end of year 1 I deposit $1,000 into an account that is earning 4% interest compounded annually. At the ...

  11. Identification of earthquakes that generate tsunamis in Java and Nusa Tenggara using rupture duration analysis

    SciTech Connect (OSTI)

    Pribadi, S., E-mail: sugengpribadimsc@gmail.com [Tsunami Warning Information Division, Indonesian Meteorological Climatological and Geophysical Agency (BMKG), Jalan Angkasa I No. 2, Jakarta13920 and Graduate Student of Earth Sciences, Faculty of Earth Sciences and Technology, Bandung Institute of T (Indonesia); Puspito, N. T.; Yudistira, T.; Afnimar,; Ibrahim, G. [Global Geophysics Research Group, Faculty of Mining and Petroleum Engineering, Bandung Institute of Technology (ITB), Jalan Ganesha 10, Bandung 40132 (Indonesia); Laksono, B. I. [Database Maintenance Division, Indonesian Meteorological Climatological and Geophysical Agency (BMKG), Jalan Angkasa I No.2, Jakarta 13920 (Indonesia); Adnan, Z. [Database Maintenance Division, Indonesian Meteorological Climatological and Geophysical Agency (BMKG), Jalan Angkasa I No. 2, Jakarta 13920 and Graduate Student of Earth Sciences, Faculty of Earth Sciences and Technology, Bandung Institute of Technol (Indonesia)

    2014-09-25

    Java and Nusa Tenggara are the tectonically active of Sunda arc. This study discuss the rupture duration as a manifestation of the power of earthquake-generated tsunami. We use the teleseismic (30° - 90°) body waves with high-frequency energy Seismometer is from IRIS network as amount 206 broadband units. We applied the Butterworth high bandpass (1 - 2 Hz) filtered. The arrival and travel times started from wave phase of P - PP which based on Jeffrey Bullens table with TauP program. The results are that the June 2, 1994 Banyuwangi and the July 17, 2006 Pangandaran earthquakes identified as tsunami earthquakes with long rupture duration (To > 100 second), medium magnitude (7.6 < Mw < 7.9) and located near the trench. The others are 4 tsunamigenic earthquakes and 3 inland earthquakes with short rupture duration start from To > 50 second which depend on its magnitude. Those events are located far from the trench.

  12. Understanding resonance graphs using Easy Java Simulations (EJS) and why we use EJS

    E-Print Network [OSTI]

    Wee, Loo Kang; Chew, Charles; Wong, Darren; Tan, Samuel

    2015-01-01

    This paper reports a computer model- simulation created using Easy Java Simulation (EJS) for learners to visualize how the steady-state amplitude of a driven oscillating system varies with the frequency of the periodic driving force. The simulation shows (N=100) identical spring-mass systems being subjected to (1) periodic driving force of equal amplitude but different driving frequencies and (2) different amount of damping. The simulation aims to create a visually intuitive way of understanding how the series of amplitude versus driving frequency graphs are obtained by showing how the displacement of the system changes over time as it transits from the transient to the steady state. A suggested how to use the model is added to help educators and students in their teaching and learning, where we explained the theoretical steady state equation, time conditions when the model starts allowing data recording of maximum amplitudes to closely match the theoretical equation and steps to collect different runs of deg...

  13. Q Cells SE | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc Jump to:Newberg,Energy LLCALLETE Inc dEAPrysmianPvT Capital GmbhQ Cells SE

  14. Electronic structure, irreversibility line and magnetoresistance of Cu0.3Bi2Se3 superconductor

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hemian, Yi; Gu, Genda; Chen, Chao -Yu; Sun, Xuan; Xie, Zhuo -Jin; Feng, Ya; Liang, Ai -Ji; Peng, Ying -Ying; He, Shao -Long; Zhao, Lin; et al

    2015-06-01

    CuxBi2Se3 is a superconductor that is a potential candidate for topological superconductors. We report our laser-based angle-resolved photoemission measurement on the electronic structure of the CuxBi2Se3 superconductor, and a detailed magneto-resistance measurement in both normal and superconducting states. We find that the topological surface state of the pristine Bi2Se3 topological insulator remains robust after the Cu-intercalation, while the Dirac cone location moves downward due to electron doping. Detailed measurements on the magnetic field-dependence of the resistance in the superconducting state establishes an irreversibility line and gives a value of the upper critical field at zero temperature of ~4000 Oe formore »the Cu0.3Bi2Se3 superconductor with a middle point Tc of 1.9K. The relation between the upper critical field Hc2 and temperature T is different from the usual scaling relation found in cuprates and in other kinds of superconductors. Small positive magneto-resistance is observed in Cu0.3Bi2Se3 superconductors up to room temperature. As a result, these observations provide useful information for further study of this possible candidate for topological superconductors.« less

  15. Scientific Achievement Networks of highly photoresponsive crystalline GaSe

    E-Print Network [OSTI]

    Geohegan, David B.

    Scientific Achievement Networks of highly photoresponsive crystalline GaSe nanosheets a crystalline GaSe target was adjusted to directly grow networks of interconnected triangular GaSe crystalline nanosheets of ~ 200 nm size (inset shows atomic

  16. Photo-Activated Luminescence of CdSe Quantum Dot Monolayers S. R. Cordero, P. J. Carson, R. A. Estabrook, G. F. Strouse, and S. K. Buratto*

    E-Print Network [OSTI]

    Photo-Activated Luminescence of CdSe Quantum Dot Monolayers S. R. Cordero, P. J. Carson, R. A passivation is even more critical in quantum dot solids where inter-dot coupling reduces the QY of the film

  17. COVARIANCE PLASTICITY AND REGULATED CRITICALITY

    E-Print Network [OSTI]

    Lehmann, Daniel

    COVARIANCE PLASTICITY AND REGULATED CRITICALITY Elie Bienenstock Division of Applied Mathematics plasticity may cause the brain to operate near criticality. We analyze the effect of such a regulation of Hebbian covariance plasticity. Such a regulation may bring the system near criticality. We suggest

  18. Safety-Critical Universit at

    E-Print Network [OSTI]

    Peleska, Jan - Fachbereich 3

    . Hazard Analysis and Risk Assessment 5. Design Criteria for Safety-Critical Systems 6. Validation, Veri#12. Hazard Analysis and Risk Assessment 5. Design Criteria for Safety-Critical Systems 6. Validation, Veri#12Safety-Critical Systems Prof. Dr. Jan Peleska Universit at Bremen | TZI Dr. Ing. Cornelia Zahlten

  19. Electrostatic interactions in critical solvents

    E-Print Network [OSTI]

    Markus Bier; Andrea Gambassi; Martin Oettel; S. Dietrich

    2011-04-29

    The subtle interplay between critical phenomena and electrostatics is investigated by considering the effective force acting on two parallel walls confining a near-critical binary liquid mixture with added salt. The ion-solvent coupling can turn a non-critical repulsive electrostatic force into an attractive one upon approaching the critical point. However, the effective force is eventually dominated by the critical Casimir effect, the universal properties of which are not altered by the presence of salt. This observation allows a consistent interpretation of recent experimental data.

  20. Teaching Critical Thinking

    E-Print Network [OSTI]

    Holmes, N G; Bonn, D A

    2015-01-01

    The ability to make decisions based on data, with its inherent uncertainties and variability, is a complex and vital skill in the modern world. The need for such quantitative critical thinking occurs in many different contexts, and while it is an important goal of education, that goal is seldom being achieved. We argue that the key element for developing this ability is repeated practice in making decisions based on data, with feedback on those decisions. We demonstrate a structure for providing suitable practice that can be applied in any instructional setting that involves the acquisition of data and relating that data to scientific models. This study reports the results of applying that structure in an introductory physics lab course. Students in an experimental condition were repeatedly instructed to make and act on quantitative comparisons between datasets, and between data and models, an approach that is common to all science disciplines. These instructions were slowly faded across the course. After the...

  1. Reaction kinetics of a-CuInSe2 formation from an In2Se3/CuSe bilayer precursor film

    E-Print Network [OSTI]

    Anderson, Timothy J.

    with Ga or S are proven absorber materials for high efficiency thin film solar cells. Interestingly CIGS system using the stacked elemental film precursors (e.g. glass/Cu/In/Se, glass/Cu/Se, glass

  2. Unique Challenges Accompany Thick-Shell CdSe/nCdS (n > 10) Nanocrystal Synthesis

    SciTech Connect (OSTI)

    Guo, Y; Marchuk, K; Abraham, R; Sampat, S; Abraham, R.; Fang, N; Malko, AV; Vela, J

    2011-12-23

    Thick-shell CdSe/nCdS (n {ge} 10) nanocrystals were recently reported that show remarkably suppressed fluorescence intermittency or 'blinking' at the single-particle level as well as slow rates of Auger decay. Unfortunately, whereas CdSe/nCdS nanocrystal synthesis is well-developed up to n {le} 6 CdS monolayers (MLs), reproducible syntheses for n {ge} 10 MLs are less understood. Known procedures sometimes result in homogeneous CdS nucleation instead of heterogeneous, epitaxial CdS nucleation on CdSe, leading to broad and multimodal particle size distributions. Critically, obtained core/shell sizes are often below those desired. This article describes synthetic conditions specific to thick-shell growth (n {ge} 10 and n {ge} 20 MLs) on both small (sub2 nm) and large (>4.5 nm) CdSe cores. We find added secondary amine and low concentration of CdSe cores and molecular precursors give desired core/shell sizes. Amine-induced, partial etching of CdSe cores results in apparent shell-thicknesses slightly beyond those desired, especially for very-thick shells (n {ge} 20 MLs). Thermal ripening and fast precursor injection lead to undesired homogeneous CdS nucleation and incomplete shell growth. Core/shells derived from small CdSe (1.9 nm) have longer PL lifetimes and more pronounced blinking at single-particle level compared with those derived from large CdSe (4.7 nm). We expect our new synthetic approach will lead to a larger throughput of these materials, increasing their availability for fundamental studies and applications.

  3. SE-72/AS-72 generator system based on Se extraction/ As reextraction

    DOE Patents [OSTI]

    Fassbender, Michael Ernst; Ballard, Beau D

    2013-09-10

    The preparation of a .sup.72Se/.sup.72As radioisotope generator involves forming an acidic aqueous solution of an irradiated alkali bromide target such as a NaBr target, oxidizing soluble bromide in the solution to elemental bromine, removing the elemental bromine, evaporating the resulting solution to a residue, removing hydrogen chloride from the residue, forming an acidic aqueous solution of the residue, adding a chelator that selectively forms a chelation complex with selenium, and extracting the chelation complex from the acidic aqueous solution into an organic phase. As the .sup.72Se generates .sup.72As in the organic phase, the .sup.72As may be extracted repeatedly from the organic phase with an aqueous acid solution.

  4. MgSe/ZnSe/CdSe coupled quantum wells grown on InP substrate with intersubband absorption covering 1.55??m

    SciTech Connect (OSTI)

    Chen, Guopeng; Shen, Aidong; De Jesus, Joel; Tamargo, Maria C.

    2014-12-08

    The authors report the observation of intersubband (ISB) transitions in the optical communication wavelength region in MgSe/ZnSe/CdSe coupled quantum wells (QWs). The coupled QWs were grown on InP substrates by molecular beam epitaxy. By inserting ZnSe layers to compensate the strain, samples with high structural quality were obtained, as indicated by well resolved satellite peaks in high-resolution x-ray diffraction. The observed ISB transition energies agree well with the calculated values.

  5. Using Java for Real-Time Critical Industrial Robot Programming Andreas Schierl, Andreas Angerer, Alwin Hoffmann, Michael Vistein and Wolfgang Reif

    E-Print Network [OSTI]

    Reif, Wolfgang

    -prone due to its automatic memory management. II. GOALS Based on this vision, SoftRobot aimed to develop: schierl@informatik.uni-augsburg.de This work presents results of the research project SoftRobot which-Specific Languages Service-Oriented Architectures Actuator InterfaceMeta Data Fig. 1. The SoftRobot architecture

  6. 31P Solid State NMR Studies of Metal Selenophosphates Containing [P2Se6]4-, [P4Se10]4-, [PSe4]3-, [P2Se7]4-, and [P2Se9]4-Ligands

    E-Print Network [OSTI]

    Weliky, David

    31P Solid State NMR Studies of Metal Selenophosphates Containing [P2Se6]4-, [P4Se10]4-, [PSe4]3-, [P2Se7]4-, and [P2Se9]4- Ligands Christian G. Canlas, Mercouri G. Kanatzidis, and David P. Weliky P solid-state nuclear magnetic resonance (NMR) spectra of 12 metal-containing selenophosphates have

  7. Twinning effect on photoluminescence spectra of ZnSe nanowires

    SciTech Connect (OSTI)

    Xu, Jing; Wang, Chunrui Wu, Binhe; Xu, Xiaofeng; Chen, Xiaoshuang; Oh, Hongseok; Baek, Hyeonjun; Yi, Gyu-Chul

    2014-11-07

    Bandgap engineering in a single material along the axial length of nanowires may be realized by arranging periodic twinning, whose twin plane is vertical to the axial length of nanowires. In this paper, we report the effect of twin on photoluminescence of ZnSe nanowires, which refers to the bandgap of it. The exciton-related emission peaks of transverse twinning ZnSe nanowires manifest a 10-meV-blue-shift in comparison with those of longitudinal twinning ZnSe nanowires. The blue-shift is attributed to quantum confinement effect, which is influenced severely by the proportion of wurtzite ZnSe layers in ZnSe nanowires.

  8. Spectral photoresponse of ZnSe/GaAs(001) heterostructures with CdSe ultra-thin quantum well insertions

    SciTech Connect (OSTI)

    Valverde-Chávez, D. A.; Sutara, F.; Hernández-Calderón, I.

    2014-05-15

    We present a study of the spectral photoresponse (SPR) of ZnSe/GaAs(001) heterostructures for different ZnSe film thickness with and without CdSe ultra-thin quantum well (UTQW) insertions. We observe a significant increase of the SPR of heterostructures containing 3 monolayer thick CdSe UTQW insertions; these results encourage their use in photodetectors and solar cells.

  9. CuInSe/sub 2/-based photoelectrochemical cells: their use in characterization of thin CuInSe/sub 2/ films, and as photovoltaic cells per se

    SciTech Connect (OSTI)

    Cahen, D.; Chen, Y.W.; Ireland, P.J.; Noufi, R.; Turner, J.A.; Rincon, C.; Bachmann, K.J.

    1984-05-01

    Photoelectrochemistry has been employed to characterize the p-CuInSe/sub 2/ component of the CdS/CuInSe/sub 2/ on-metal and a nonaqueous electrolyte containing a redox couple not specifically adsorbed onto the semiconductor, we can test the films for photovoltaic activity and obtain effective electronic properties of them, before CdS deposition, in a nondestructive manner. Electrochemical decomposition of CuInSe/sub 2/ was investigated in acetonitrile solutions to determine the mechanism of decomposition (n and p) in the dark and under illumination. Electrochemical, solution chemical and surface analyses confirmed at the light-assisted decomposition of CuInSe/sub 2/ resulted in metal ions and elemental chalcogen. On the basis of the results from the electrochemical decomposition, and studies on the solid state chemistry of the (Cu/sub 2/Se)/sub x/(In/sub 2/Se/sub 3/)/sub 1-x/ system and surface analyses, the CuInSe/sub 2//polyiodide interface was stabilized and up to 11.7% conversion efficiencies were obtained.

  10. Autoclave nuclear criticality safety analysis

    SciTech Connect (OSTI)

    D`Aquila, D.M. [Martin Marietta Energy Systems, Inc., Piketon, OH (United States); Tayloe, R.W. Jr. [Battelle, Columbus, OH (United States)

    1991-12-31

    Steam-heated autoclaves are used in gaseous diffusion uranium enrichment plants to heat large cylinders of UF{sub 6}. Nuclear criticality safety for these autoclaves is evaluated. To enhance criticality safety, systems are incorporated into the design of autoclaves to limit the amount of water present. These safety systems also increase the likelihood that any UF{sub 6} inadvertently released from a cylinder into an autoclave is not released to the environment. Up to 140 pounds of water can be held up in large autoclaves. This mass of water is sufficient to support a nuclear criticality when optimally combined with 125 pounds of UF{sub 6} enriched to 5 percent U{sup 235}. However, water in autoclaves is widely dispersed as condensed droplets and vapor, and is extremely unlikely to form a critical configuration with released UF{sub 6}.

  11. Lecture notes for criticality safety

    SciTech Connect (OSTI)

    Fullwood, R.

    1992-03-01

    These lecture notes for criticality safety are prepared for the training of Department of Energy supervisory, project management, and administrative staff. Technical training and basic mathematics are assumed. The notes are designed for a two-day course, taught by two lecturers. Video tapes may be used at the options of the instructors. The notes provide all the materials that are necessary but outside reading will assist in the fullest understanding. The course begins with a nuclear physics overview. The reader is led from the macroscopic world into the microscopic world of atoms and the elementary particles that constitute atoms. The particles, their masses and sizes and properties associated with radioactive decay and fission are introduced along with Einstein's mass-energy equivalence. Radioactive decay, nuclear reactions, radiation penetration, shielding and health-effects are discussed to understand protection in case of a criticality accident. Fission, the fission products, particles and energy released are presented to appreciate the dangers of criticality. Nuclear cross sections are introduced to understand the effectiveness of slow neutrons to produce fission. Chain reactors are presented as an economy; effective use of the neutrons from fission leads to more fission resulting in a power reactor or a criticality excursion. The six-factor formula is presented for managing the neutron budget. This leads to concepts of material and geometric buckling which are used in simple calculations to assure safety from criticality. Experimental measurements and computer code calculations of criticality are discussed. To emphasize the reality, historical criticality accidents are presented in a table with major ones discussed to provide lessons-learned. Finally, standards, NRC guides and regulations, and DOE orders relating to criticality protection are presented.

  12. Thermoelectric transport of Se-rich Ag{sub 2}Se in normal phases and phase transitions

    SciTech Connect (OSTI)

    Mi, Wenlong; Lv, Yanhong; Qiu, Pengfei; Shi, Xun E-mail: cld@mail.sic.ac.cn; Chen, Lidong E-mail: cld@mail.sic.ac.cn; Zhang, Tiansong

    2014-03-31

    Small amount of Se atoms are used to tune the carrier concentrations (n{sub H}) and electrical transport in Ag{sub 2}Se. Significant enhancements in power factor and thermoelectric figure of merit (zT) are observed in the compositions of Ag{sub 2}Se{sub 1.06} and Ag{sub 2}Se{sub 1.08}. The excessive Se atoms do not change the intrinsically electron-conducting character in Ag{sub 2}Se. The detailed analysis reveals the experiment optimum carrier concentration in Ag{sub 2}Se is around 5?×?10{sup 18}?cm{sup ?3}. We also investigate the temperature of maximum zT and the thermoelectric transport during the first order phase transitions using the recently developed measurement system.

  13. Glass formation and the third harmonic generation of Cu{sub 2}Se–GeSe{sub 2}–As{sub 2}Se{sub 3} glasses

    SciTech Connect (OSTI)

    Reshak, A. H.; Klymovych, O. S.; Zmiy, O. F.; Myronchuk, G. L.; Zamuruyeva, O. V.; Alahmed, Z. A.; Chyský, J.; Bila, Jiri; Kamarudin, H.

    2014-10-14

    We have performed the investigation of the nonlinear optical properties namely the third harmonic generation (THG) of the glass-formation region in the Cu{sub 2}Se–GeSe{sub 2}–As{sub 2}Se{sub 3} system. The samples were synthesized by direct single-temperature method from high-purity elementary substances. We have found that the value of disorder parameter ? depends on the composition of the glassy alloys. The measurements show that increasing the Cu{sub 2}Se concentration leads to increased slope of the absorption edge, which may be explained by the decrease of the height of random potential relief for the electrons in the tails of the state density which border the band edges. A very sharp increase in the THG at low temperature was observed. Significant enhancement in THG was obtained with decreasing the energy gap, which agreed well with the nonlinear optical susceptibilities obtained from other glasses.

  14. www.medicine.gu.se Minnesanteckningar forskarutbildningsutskottet, inst. fr medicin

    E-Print Network [OSTI]

    www.medicine.gu.se Minnesanteckningar forskarutbildningsutskottet, inst. för medicin 2015 inflammationsforskning hälsas välkommen som ny ledamot i FUU. Per Ladenvall vid avd. för molekylär och klinisk medicin

  15. Silberschatz, Galvin and Gagne 2007Operating System Concepts with Java 7th Edition, Nov 15, 2006 Chapter 16: Distributed System Structures

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 16: Distributed System Structures #12;16.2 Silberschatz, Galvin and Gagne ©2007Operating System of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

  16. Proc. of the ACM Conf. on OO Programming, Systems, Languages, and Applications (OOPSLA'01), ACM Copyright. Regression Test Selection for Java Software

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    Copyright. Regression Test Selection for Java Software Mary Jean Harrold harrold@cc.gatech.edu James A of the software--this process is called regression test selection. A safe regression- test-selection algorithm selects every test case in the test suite that may reveal a fault in the modified software. Safe

  17. MAC 5765 -Sistemas de Middleware Avancados -Segundo Semestre de 2002 Segundo Exercicio-Programa: Invocador Java/IIOP para o JBoss

    E-Print Network [OSTI]

    Reverbel, Francisco

    standard, isto ´e, FooInvoker especifica sua interface de gerenciamento implemen- tando uma interface Java cujo nome ´e FooInvokerMBean. · Cada invocador ´e espec´ifico para um certo protocolo (JRMPInvoker, HTTPInvoker, . . . ) e permite que clientes remotos utilizem esse protocolo para acessar uma interface de

  18. Critical behavior in topological ensembles

    E-Print Network [OSTI]

    K. Bulycheva; A. Gorsky; S. Nechaev

    2015-02-11

    We consider the relation between three physical problems: 2D directed lattice random walks, ensembles of $T_{n,n+1}$ torus knots, and instanton ensembles in 5D SQED with one compact dimension in $\\Omega$ background and with 5D Chern-Simons term at the level one. All these ensembles exhibit the critical behavior typical for the "area+length+corners" statistics of grand ensembles of 2D directed paths. Using the combinatorial description, we obtain an explicit expression of the generating function for $q$-Narayana numbers which amounts to the new critical behavior in the ensemble of $T_{n,n+1}$ torus knots and in the ensemble of instantons in 5D SQED. Depending on the number of the nontrivial fugacities, we get either the critical point, or cascade of critical lines and critical surfaces. In the 5D gauge theory the phase transition is of the 3rd order, while in the ensemble of paths and ensemble of knots it is typically of the 1st order. We also discuss the relation with the integrable models.

  19. CdSe self-assembled quantum dots with ZnCdMgSe barriers emitting throughout the visible spectrum

    SciTech Connect (OSTI)

    Perez-Paz, M. Noemi; Zhou Xuecong; Munoz, Martin; Lu Hong; Sohel, Mohammad; Tamargo, Maria C.; Jean-Mary, Fleumingue; Akins, Daniel L.

    2004-12-27

    Self-assembled quantum dots of CdSe with ZnCdMgSe barriers have been grown by molecular beam epitaxy on InP substrates. The optical and microstructural properties were investigated using photoluminescence (PL) and atomic force microscopy (AFM) measurements. Control and reproducibility of the quantum dot (QD) size leading to light emission throughout the entire visible spectrum range has been obtained by varying the CdSe deposition time. Longer CdSe deposition times result in a redshift of the PL peaks as a consequence of an increase of QD size. AFM studies demonstrate the presence of QDs in uncapped structures. A comparison of this QD system with CdSe/ZnSe shows that not only the strain but also the chemical properties of the system play an important role in QD formation.

  20. Microsoft Word - Critical Infrastructure Security and Resilience...

    Broader source: Energy.gov (indexed) [DOE]

    White House Office of the Press Secretary For Immediate Release October 31, 2013 Presidential Proclamation -- Critical Infrastructure Security and Resilience Month, 2013 CRITICAL...

  1. DOE and Critical Materials Video (Text Version)

    Broader source: Energy.gov [DOE]

    This is a text version of the "DOE and Critical Materials" video presented at the Critical Materials Workshop, held on April 3, 2012 in Arlington, Virginia.

  2. Nuclear criticality safety: 2-day training course

    SciTech Connect (OSTI)

    Schlesser, J.A.

    1997-02-01

    This compilation of notes is presented as a source reference for the criticality safety course. At the completion of this training course, the attendee will: be able to define terms commonly used in nuclear criticality safety; be able to appreciate the fundamentals of nuclear criticality safety; be able to identify factors which affect nuclear criticality safety; be able to identify examples of criticality controls as used as Los Alamos; be able to identify examples of circumstances present during criticality accidents; have participated in conducting two critical experiments; be asked to complete a critique of the nuclear criticality safety training course.

  3. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Office of Environmental Management (EM)

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  4. PRECLOSURE CRITICALITY ANALYSIS PROCESS REPORT

    SciTech Connect (OSTI)

    A.E. Danise

    2004-10-25

    This report describes a process for performing preclosure criticality analyses for a repository at Yucca Mountain, Nevada. These analyses will be performed from the time of receipt of fissile material until permanent closure of the repository (preclosure period). The process describes how criticality safety analyses will be performed for various configurations of waste in or out of waste packages that could occur during preclosure as a result of normal operations or event sequences. The criticality safety analysis considers those event sequences resulting in unanticipated moderation, loss of neutron absorber, geometric changes, or administrative errors in waste form placement (loading) of the waste package. The report proposes a criticality analyses process for preclosure to allow a consistent transition from preclosure to postclosure, thereby possibly reducing potential cost increases and delays in licensing of Yucca Mountain. The proposed approach provides the advantage of using a parallel regulatory framework for evaluation of preclosure and postclosure performance and is consistent with the U.S. Nuclear Regulatory Commission's approach of supporting risk-informed, performance-based regulation for fuel cycle facilities, ''Yucca Mountain Review Plan, Final Report'', and 10 CFR Part 63. The criticality-related criteria for ensuring subcriticality are also described as well as which guidance documents will be utilized. Preclosure operations and facilities have significant similarities to existing facilities and operations currently regulated by the U.S. Nuclear Regulatory Commission; therefore, the design approach for preclosure criticality safety will be dictated by existing regulatory requirements while using a risk-informed approach with burnup credit for in-package operations.

  5. ME/SE 740 Vision, Robotics & Planning Spring 2009

    E-Print Network [OSTI]

    Lin, Xi

    ME/SE 740 ­ Vision, Robotics & Planning Spring 2009 Professor Pierre Dupont, Room 408, 110 Cummington Street 353-9596 pierre@bu.edu Required Text: A Mathematical Introduction to ROBOTIC MANIPULATION://www.engin.umich.edu/group/ctm/basic/basic.html #12;ME/SE 740 ­ Vision, Robotics & Planning 1/22/20092 Course Topics: 1. Introduction: · Historical

  6. APS/DPP 111207-se 1 University Fusion Association Meeting

    E-Print Network [OSTI]

    Eckstrand for Office of Fusion Energy Sciences Fusion Energy Sciences Program Update www.ofes.fusion.doe.gov U.S. Department of Energy's Office of Science #12;APS/DPP 111207-se 2 Topics · Budget status/DPP 111207-se 3 FY 2008 Fusion Energy Sciences Congressional Budget Request 144.6 146.3 20.8 311.7 FY 2007

  7. Liouville Brownian motion at criticality

    E-Print Network [OSTI]

    Rémi Rhodes; Vincent Vargas

    2015-02-15

    In this paper, we construct the Brownian motion of Liouville Quantum Gravity with central charge $c=1$ (more precisely we restrict to the corresponding free field theory). Liouville quantum gravity with $c=1$ corresponds to two-dimensional string theory and is the conjectural scaling limit of large planar maps weighted with a $O(n=2)$ loop model or a $Q=4$-state Potts model embedded in a two dimensional surface in a conformal manner. Following \\cite{GRV1}, we start by constructing the critical LBM from one fixed point $x\\in\\mathbb{R}^2$ (or $x\\in\\S^2$), which amounts to changing the speed of a standard planar Brownian motion depending on the local behaviour of the critical Liouville measure $M'(dx)=-X(x)e^{2X(x)}\\,dx$ (where $X$ is a Gaussian Free Field, say on $\\mathbb{S}^2$). Extending this construction simultaneously to all points in $\\mathbb{R}^2$ requires a fine analysis of the potential properties of the measure $M'$. This allows us to construct a strong Markov process with continuous sample paths living on the support of $M'$, namely a dense set of Hausdorff dimension $0$. We finally construct the associated Liouville semigroup, resolvent, Green function, heat kernel and Dirichlet form. In passing, we extend to quite a general setting the construction of the critical Gaussian multiplicative chaos that was initiated in \\cite{Rnew7,Rnew12} and also establish new capacity estimates for the critical Gaussian multiplicative chaos.

  8. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  9. High critical current superconducting tapes

    DOE Patents [OSTI]

    Holesinger, Terry G. (Los Alamos, NM); Jia, Quanxi (Los Alamos, NM); Foltyn, Stephen R. (Los Alamos, NM)

    2003-09-23

    Improvements in critical current capacity for superconducting film structures are disclosed and include the use of a superconducting RE-BCO layer including a mixture of rare earth metals, e.g., yttrium and europium, where the ratio of yttrium to europium in the RE-BCO layer ranges from about 3 to 1 to from about 1.5 to 1.

  10. First Responders and Criticality Accidents

    SciTech Connect (OSTI)

    Valerie L. Putman; Douglas M. Minnema

    2005-11-01

    Nuclear criticality accident descriptions typically include, but do not focus on, information useful to first responders. We studied these accidents, noting characteristics to help (1) first responders prepare for such an event and (2) emergency drill planners develop appropriate simulations for training. We also provide recommendations to help people prepare for such events in the future.

  11. Criticality assessment of LLRWDF closure

    SciTech Connect (OSTI)

    Sarrack, A.G.; Weber, J.H.; Woody, N.D.

    1992-10-06

    During the operation of the Low Level Radioactive Waste Disposal Facility (LLRWDF), large amounts (greater than 100 kg) of enriched uranium (EU) were buried. This EU came primarily from the closing and decontamination of the Naval Fuels Facility in the time period from 1987--1989. Waste Management Operations (WMO) procedures were used to keep the EU boxes separated to prevent possible criticality during normal operation. Closure of the LLRWDF is currently being planned, and waste stabilization by Dynamic Compaction (DC) is proposed. Dynamic compaction will crush the containers in the LLRWDF and result in changes in their geometry. Research of the LLRWDF operations and record keeping practices have shown that the EU contents of trenches are known, but details of the arrangement of the contents cannot be proven. Reviews of the trench contents, combined with analysis of potential critical configurations, revealed that some portions of the LLRWDF can be expected to be free of criticality concerns while other sections have credible probabilities for the assembly of a critical mass, even in the uncompacted configuration. This will have an impact on the closure options and which trenches can be compacted.

  12. Critical phenomena in atmospheric precipitation

    E-Print Network [OSTI]

    Loss, Daniel

    LETTERS Critical phenomena in atmospheric precipitation OLE PETERS1,2,3 * AND J. DAVID NEELIN3 1 convection and precipitation (the order parameter)--with correlated regions on scales of tens to hundreds the climatological mean by an order of magnitude or more. Moist convection and the accompanying precipitation have

  13. Exploring JavaScript and ROOT technologies to create Web-based ATLAS analysis and monitoring tools

    E-Print Network [OSTI]

    Sanchez, Arturo; The ATLAS collaboration

    2015-01-01

    We explore the potentialities of current web applications to create online interfaces that allow the visualization, interaction and real physics cut-based analysis and monitoring of processes trough a web browser. The project consists in the initial development of web-based and cloud computing services to allow students and researches to perform fast and very useful cut-based analysis on a browser, reading and using real data and official Monte-Carlo simulations stored in ATLAS computing facilities. Several tools are considered: ROOT, JavaScript and HTML. Our study case is the current cut-based H->ZZ->llqq analysis of the ATLAS experiment. Preliminary but satisfactory results have been obtained online; this presentation describes the tests and plans and future upgrades.

  14. Exploring JavaScript and ROOT technologies to create Web-based ATLAS analysis and monitoring tools

    E-Print Network [OSTI]

    Sanchez, Arturo; The ATLAS collaboration

    2015-01-01

    We explore the potentialities of current web applications to create online interfaces that allow the visualization, interaction and real physics cut-based analysis and monitoring of processes trough a web browser. The project consists in the initial development of web-based and cloud computing services to allow students and researches to perform fast and very useful cut-based analysis on a browser, reading and using real data and official Monte-Carlo simulations stored in ATLAS computing facilities. Several tools are considered: ROOT, JavaScript and HTML. Our study case is the current cut-based $H \\rightarrow ZZ \\rightarrow llqq$ analysis of the ATLAS experiment. Preliminary but satisfactory results have been obtained online.

  15. Approved Module Information for SE4031, 2014/5 Module Title/Name: Extended Integrative Option Module Code: SE4031

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for SE4031, 2014/5 Module Title/Name: Extended Integrative Option Module Code: SE4031 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 30 Module Management Information Module Leader Name Trevor Oliver Email Address t

  16. Optical Probing of metamagnetic phases in epitaxial EuSe

    SciTech Connect (OSTI)

    Galgano, G. D.; Henriques, A. B.; Bauer, G.; Springholz, G.

    2011-12-23

    EuSe is a wide gap magnetic semiconductors with a potential for applications in proof-of-concept spintronic devices. When the temperature is lowered, EuSe goes through sharp transitions between a variety of magnetic phases and is thus described as metamagnetic. The purpose of the present investigation is to correlate the magnetic order to the sharp dichroic doublet, discovered recently in high quality thin epitaxial layers of EuSe, grown by molecular beam epitaxy. We report detailed measurements of the doublet positions and intensities as a function of magnetic field in low temperatures, covering several magnetic phases.

  17. Enhanced thermoelectric power and electronic correlations in RuSe?

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Wang, Kefeng; Wang, Aifeng; Tomic, A.; Wang, Limin; Abeykoon, A. M. Milinda; Dooryhee, E.; Billinge, S. J.L.; Petrovic, C.

    2015-03-03

    We report the electronic structure, electric and thermal transport properties of Ru??xIrxSe? (x ? 0.2). RuSe? is a semiconductor that crystallizes in a cubic pyrite unit cell. The Seebeck coefficient of RuSe? exceeds -200 µV/K around 730 K. Ir substitution results in the suppression of the resistivity and the Seebeck coefficient, suggesting the removal of the peaks in density of states near the Fermi level. Ru?.?Ir?.?Se? shows a semiconductor-metal crossover at about 30 K. The magnetic field restores the semiconducting behavior. Our results indicate the importance of the electronic correlations in enhanced thermoelectricity of RuSb?.

  18. Hot exciton transport in ZnSe quantum wells

    E-Print Network [OSTI]

    Zhao, Hui; Moehl, Sebastian; Wachter, Sven; Kalt, Heinz

    2002-02-01

    The in-plane transport of excitons in ZnSe quantum wells is investigated directly by microphotoluminescence in combination with a solid immersion lens. Due to the strong Froehlich coupling, the initial kinetic energy of the excitons is well...

  19. Optical Properties of CdSe Nanoparticle Assemblies

    SciTech Connect (OSTI)

    Huser, T; Gerion, D; Zaitseva, N; Krol, D M; Leon, F R

    2003-11-24

    We report on three-dimensional fluorescence imaging of micron-size faceted crystals precipitated from solutions of CdSe nanocrystals. Such crystals have previously been suggested to be superlattices of CdSe quantum dots [1,2]. Possible applications for these materials include their use in optical and optoelectronic devices. The micron-size crystals were grown by slow evaporation from toluene solutions of CdSe nanocrystals in the range of 3-6 nm, produced by traditional wet-chemistry techniques. By using a confocal microscope with laser illumination, three-dimensional raster-scanning and synchronized hyper-spectral detection, we have generated spatial profiles of the fluorescence emission intensity and spectrum. The fluorescence data of the micro-crystals were compared with spectra of individual nanocrystals obtained from the same solution. The results do not support the assertion that these microcrystals consist of CdSe superlattices.

  20. Magneto-optical characterizations of FeTe???Se??? thin...

    Office of Scientific and Technical Information (OSTI)

    in the two thin films. Compared with bulk crystals, FeTeSe thin film demonstrates not only higher Tc, but also much larger Jc, which is attractive for...

  1. Computando lo aspero Por que se cuelgan las computadoras?

    E-Print Network [OSTI]

    Figueira, Santiago

    ejemplo 0 + 1 = 1. Tambi´en puedo al 1 sumarle 1 y obtener el 2: (0 + 1) + 1 = 2 recursi´on: una funci´on que se llama a s´i misma. Por ejemplo, a la funci´on suma se puede definir como: suma(m, n) = n si m´olo un peque~no n´umero de s´imbolos reciben atenci´on (en el ejemplo, 2). Hay una cantidad finita de s

  2. Synthesis and properties of new CdSe-AgI-As{sub 2}Se{sub 3} chalcogenide glasses

    SciTech Connect (OSTI)

    Kassem, M.; ULCO, LPCA, EAC CNRS 4493 F-59140 Dunkerque ; Le Coq, D.; Fourmentin, M.; Hindle, F.; Bokova, M.; Cuisset, A.; Masselin, P.; Bychkov, E.; ULCO, LPCA, EAC CNRS 4493 F-59140 Dunkerque

    2011-02-15

    Research highlights: {yields} Determination of the glass-forming region in the pseudo-ternary CdSe-AgI-As{sub 2}Se{sub 3} system. {yields} Characterization of macroscopic properties of the new CdSe-AgI-As{sub 2}Se{sub 3} glasses. {yields} Far infrared transmission of chalcogenide glasses. {yields} Characterization of the total conductivity of CdSe-AgI-As{sub 2}Se{sub 3} glasses. -- Abstract: The glass-forming region in the pseudo-ternary CdSe-AgI-As{sub 2}Se{sub 3} system was determined. Measurements including differential scanning calorimetry (DSC), density, and X-ray diffraction were performed. The effect resulting from the addition of CdSe or AgI has been highlighted by examining three series of different base glasses. The characteristic temperatures of the glass samples, including glass transition (T{sub g}), crystallisation (T{sub x}), and melting (T{sub m}) temperatures are reported and used to calculate their {Delta}T = T{sub x} - T{sub g} and their Hruby, H{sub r} = (T{sub x} - T{sub g})/(T{sub m} - T{sub x}), criteria. Evolution of the total electrical conductivity {sigma} and the room temperature conductivity {sigma}{sub 298} was also studied. The terahertz transparency domain in the 50-600 cm{sup -1} region was pointed for different chalcogenide glasses (ChGs) and the potential of the THz spectroscopy was suggested to obtain structural information on ChGs.

  3. Los Alamos Critical Assemblies Facility

    SciTech Connect (OSTI)

    Malenfant, R.E.

    1981-06-01

    The Critical Assemblies Facility of the Los Alamos National Laboratory has been in existence for thirty-five years. In that period, many thousands of measurements have been made on assemblies of /sup 235/U, /sup 233/U, and /sup 239/Pu in various configurations, including the nitrate, sulfate, fluoride, carbide, and oxide chemical compositions and the solid, liquid, and gaseous states. The present complex of eleven operating machines is described, and typical applications are presented.

  4. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  5. Giant Piezoelectricity in Monolayer Group IV Monochalcogenides: SnSe, SnS, GeSe and GeS

    E-Print Network [OSTI]

    Fei, Ruixiang; Li, Ju; Yang, Li

    2015-01-01

    We predict enormous piezoelectric effects in intrinsic monolayer group IV monochalcogenides (MX, M=Sn or Ge, X=Se or S), including SnSe, SnS, GeSe and GeS. Using first-principle simulations based on the modern theory of polarization, we find that their characteristic piezoelectric coefficients are about two orders of magnitude larger than those of other 2D materials, such as MoS2 and GaSe, and bulk quartz and AlN which are widely used in industry. This enhancement is a result of the unique "puckered" D2h symmetry and weaker chemical bonds of monolayer group IV monochalcogenides. Given the achieved experimental advances in fabrication of monolayers, their flexible character and ability to withstand enormous strain, these 2D structures with giant piezoelectric effects may be promising for a broad range of applications, such as nano-sized sensors, piezotronics, and energy harvesting in portable electronic devices.

  6. Photo-instability of CdSe/ZnS quantum dots in poly(methylmethacrylate) film

    SciTech Connect (OSTI)

    Zhang, Hongyi; Liu, Yu; Ye, Xiaoling; Chen, Yonghai

    2013-12-28

    The photo-instability of CdSe/ZnS quantum dots (QDs) has been studied under varied conditions. We discussed the main features of the evolution of photoluminescence (PL) intensity and energy at different laser powers, which showed critical dependences on the environment. The PL red shift in a vacuum showed strong temperature dependence, from which we concluded that the thermal activation energy for trapping states of the charge carriers was about 14.7 meV. Furthermore, the PL spectra showed asymmetric evolution during the laser irradiation, for which two possible explanations were discussed. Those results provided a comprehensive picture for the photo-instability of the colloidal QDs under different conditions.

  7. Only critical information was scanned

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the Weldon Spring,7=cr5rnP 7694 i+lJNewS e Only critical

  8. Excited-State Relaxation in PbSe Quantum Dots

    SciTech Connect (OSTI)

    An, J. M.; Califano, M.; Franceschetti, A.; Zunger, A.

    2008-01-01

    In solids the phonon-assisted, nonradiative decay from high-energy electronic excited states to low-energy electronic excited states is picosecond fast. It was hoped that electron and hole relaxation could be slowed down in quantum dots, due to the unavailability of phonons energy matched to the large energy-level spacings ('phonon-bottleneck'). However, excited-state relaxation was observed to be rather fast ({le}1 ps) in InP, CdSe, and ZnO dots, and explained by an efficient Auger mechanism, whereby the excess energy of electrons is nonradiatively transferred to holes, which can then rapidly decay by phonon emission, by virtue of the densely spaced valence-band levels. The recent emergence of PbSe as a novel quantum-dot material has rekindled the hope for a slow down of excited-state relaxation because hole relaxation was deemed to be ineffective on account of the widely spaced hole levels. The assumption of sparse hole energy levels in PbSe was based on an effective-mass argument based on the light effective mass of the hole. Surprisingly, fast intraband relaxation times of 1-7 ps were observed in PbSe quantum dots and have been considered contradictory with the Auger cooling mechanism because of the assumed sparsity of the hole energy levels. Our pseudopotential calculations, however, do not support the scenario of sparse hole levels in PbSe: Because of the existence of three valence-band maxima in the bulk PbSe band structure, hole energy levels are densely spaced, in contradiction with simple effective-mass models. The remaining question is whether the Auger decay channel is sufficiently fast to account for the fast intraband relaxation. Using the atomistic pseudopotential wave functions of Pb{sub 2046}Se{sub 2117} and Pb{sub 260}Se{sub 249} quantum dots, we explicitly calculated the electron-hole Coulomb integrals and the P {yields} S electron Auger relaxation rate. We find that the Auger mechanism can explain the experimentally observed P {yields} S intraband decay time scale without the need to invoke any exotic relaxation mechanisms.

  9. Critical Materials Workshop Plenary Session Videos

    Broader source: Energy.gov [DOE]

    Above are the plenary session videos of the Critical Materials Workshop held on April 3, 2012 in Arlington, Virginia.

  10. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  11. Critical Materials Workshop Final Participant List

    Office of Energy Efficiency and Renewable Energy (EERE)

    List of participants who attended the Critical Materials Workshop held on April 3, 2012 in Arlington, VA

  12. Fusion algebra of critical percolation

    E-Print Network [OSTI]

    Jorgen Rasmussen; Paul A. Pearce

    2007-08-08

    We present an explicit conjecture for the chiral fusion algebra of critical percolation considering Virasoro representations with no enlarged or extended symmetry algebra. The representations we take to generate fusion are countably infinite in number. The ensuing fusion rules are quasi-rational in the sense that the fusion of a finite number of these representations decomposes into a finite direct sum of these representations. The fusion rules are commutative, associative and exhibit an sl(2) structure. They involve representations which we call Kac representations of which some are reducible yet indecomposable representations of rank 1. In particular, the identity of the fusion algebra is a reducible yet indecomposable Kac representation of rank 1. We make detailed comparisons of our fusion rules with the recent results of Eberle-Flohr and Read-Saleur. Notably, in agreement with Eberle-Flohr, we find the appearance of indecomposable representations of rank 3. Our fusion rules are supported by extensive numerical studies of an integrable lattice model of critical percolation. Details of our lattice findings and numerical results will be presented elsewhere.

  13. se de doctorat en informatique Comprendre le Web cach

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    niveau à l'aide de telles descriptions. Abstract e hidden Web (also known as deep or invisible Web'informations, complexité Keywords: hidden Web, deep Web, databases, information extraction, complexity tel-00198150,versionèse de doctorat en informatique Comprendre le Web caché Understanding the Hidden Web Pierre

  14. MINIREVIEW / MINISYNTHE` SE The role of chromatin structure in regulating

    E-Print Network [OSTI]

    Krebs, Jocelyn E.

    within many stress-induced promoters, such as stress re- sponse elements and heat shock elements, allow. Key words: chromatin, transcription, stress response, heat shock. Re´sume´ : Toutes les cellules, quMINIREVIEW / MINISYNTHE` SE The role of chromatin structure in regulating stress

  15. ctualmente se afronta una im-portante prdida de biodiversi-

    E-Print Network [OSTI]

    Figuerola, Jordi

    a los medios de comunicación y sean cada vez más tratadas en la prensa científica, no son un fenómeno enfermedades con nuestras actividades por encima del nivel que se daba en siglos ante- riores. Por último y percepción pública sobre la necesidad de conservar el medio natural (¿no sería mejor ma- tar a todos los

  16. www.medicine.gu.se Minnesanteckningar Forskarutbildningsutskottet, inst. fr medicin

    E-Print Network [OSTI]

    www.medicine.gu.se Minnesanteckningar ­ Forskarutbildningsutskottet, inst. för medicin 2015, forskare vid avd. för molekylär och klinisk medicin hälsas välkommen som ny ledamot i FUU. Pauline ersätter informerade om hur antagningarna granskas vid avd. för molekylär och klinisk medicin. De vanligaste bristerna

  17. Transformation toughening in an antiferroelectric ceramic *, S.E. Younga

    E-Print Network [OSTI]

    Hong, Wei

    1 Transformation toughening in an antiferroelectric ceramic X. Tana, *, S.E. Younga , Y.H. Seob , J of the crystal symmetry, dielectric constant, field-induced polarization, and Raman spectrum on ceramic Pb0.99Nb0 is demonstrated in the antiferroelectric ceramic with both indentation fracture and R-curve experiments

  18. 2030 SE Marine Science Drive Newport, Oregon 973665-5296

    E-Print Network [OSTI]

    Wright, Dawn Jeannine

    2030 SE Marine Science Drive Newport, Oregon 973665-5296 Telephone 541-867-0100 Fax 541-867-0138 Web Page http://hmsc.oregonstate.edu Oregon State University Hatfield Marine Science Center 2006.....................................2 Coastal Oregon Marine Experiment Station...........................2 OSU-COMES Seafood Research

  19. Tensile Strain Switched Ferromagnetism in Layered NbS2 and NbSe2

    SciTech Connect (OSTI)

    Zhou, Yungang; Wang, Zhiguo; Yang, Ping; Zu, Xiaotao; Yang, Li; Sun, Xin; Gao, Fei

    2012-11-01

    Developing approaches to effectively induce and control the magnetic states is critical to the use of magnetic nanostructures in quantum information devices but is still challenging. Here we have demonstrated, by employing the density functional theory calculations, an existence of infinite magnetic sheets with structural integrity and magnetic homogeneity. Examination from a series of transition metal dichalcogenides shows that the biaxial tensile strained NbS2 and NbSe2 structures can be magnetized with a ferromagnetic character due to the competitive effects of through-bond interaction and through-space interaction. The estimated Curie temperatures (387 and 542 K under the 10% strain for NbS2 and NbSe2 structures, respectively) suggest that the unique ferromagnetic character can be achieved above room temperature. The self-exchange of population between 4d orbitals of Nb atom that leads to the exchange splitting is the mechanism behind the transition of the spin moment. The induced magnetic moments can be significantly enhanced by the tensile strain, even giving rise to half-metallic character with the strong spin polarization around the Fermi level. Given the recent progress that the desired strain can be achieved on two-dimensional nanostructures, such as graphene and BN layer in a controlled way, we believe that our calculated results are suitable for experimental verification and implementation opening a new path to explore the spintronics in pristine two-dimensional nanostructures.

  20. Criticality safety basics, a study guide

    SciTech Connect (OSTI)

    V. L. Putman

    1999-09-01

    This document is a self-study and classroom guide, for criticality safety of activities with fissile materials outside nuclear reactors. This guide provides a basic overview of criticality safety and criticality accident prevention methods divided into three parts: theory, application, and history. Except for topic emphasis, theory and history information is general, while application information is specific to the Idaho National Engineering and Environmental Laboratory (INEEL). Information presented here should be useful to personnel who must know criticality safety basics to perform their assignments safely or to design critically safe equipment or operations. However, the guide's primary target audience is fissile material handler candidates.

  1. Critical heat flux test apparatus

    DOE Patents [OSTI]

    Welsh, Robert E. (West Mifflin, PA); Doman, Marvin J. (McKeesport, PA); Wilson, Edward C. (West Mifflin, PA)

    1992-01-01

    An apparatus for testing, in situ, highly irradiated specimens at high temperature transients is provided. A specimen, which has a thermocouple device attached thereto, is manipulated into test position in a sealed quartz heating tube by a robot. An induction coil around a heating portion of the tube is powered by a radio frequency generator to heat the specimen. Sensors are connected to monitor the temperatures of the specimen and the induction coil. A quench chamber is located below the heating portion to permit rapid cooling of the specimen which is moved into this quench chamber once it is heated to a critical temperature. A vacuum pump is connected to the apparatus to collect any released fission gases which are analyzed at a remote location.

  2. 2011 Annual Criticality Safety Program Performance Summary

    SciTech Connect (OSTI)

    Andrea Hoffman

    2011-12-01

    The 2011 review of the INL Criticality Safety Program has determined that the program is robust and effective. The review was prepared for, and fulfills Contract Data Requirements List (CDRL) item H.20, 'Annual Criticality Safety Program performance summary that includes the status of assessments, issues, corrective actions, infractions, requirements management, training, and programmatic support.' This performance summary addresses the status of these important elements of the INL Criticality Safety Program. Assessments - Assessments in 2011 were planned and scheduled. The scheduled assessments included a Criticality Safety Program Effectiveness Review, Criticality Control Area Inspections, a Protection of Controlled Unclassified Information Inspection, an Assessment of Criticality Safety SQA, and this management assessment of the Criticality Safety Program. All of the assessments were completed with the exception of the 'Effectiveness Review' for SSPSF, which was delayed due to emerging work. Although minor issues were identified in the assessments, no issues or combination of issues indicated that the INL Criticality Safety Program was ineffective. The identification of issues demonstrates the importance of an assessment program to the overall health and effectiveness of the INL Criticality Safety Program. Issues and Corrective Actions - There are relatively few criticality safety related issues in the Laboratory ICAMS system. Most were identified by Criticality Safety Program assessments. No issues indicate ineffectiveness in the INL Criticality Safety Program. All of the issues are being worked and there are no imminent criticality concerns. Infractions - There was one criticality safety related violation in 2011. On January 18, 2011, it was discovered that a fuel plate bundle in the Nuclear Materials Inspection and Storage (NMIS) facility exceeded the fissionable mass limit, resulting in a technical safety requirement (TSR) violation. The TSR limits fuel plate bundles to 1085 grams U-235, which is the maximum loading of an ATR fuel element. The overloaded fuel plate bundle contained 1097 grams U-235 and was assembled under an 1100 gram U-235 limit in 1982. In 2003, the limit was reduced to 1085 grams citing a new criticality safety evaluation for ATR fuel elements. The fuel plate bundle inventories were not checked for compliance prior to implementing the reduced limit. A subsequent review of the NMIS inventory did not identify further violations. Requirements Management - The INL Criticality Safety program is organized and well documented. The source requirements for the INL Criticality Safety Program are from 10 CFR 830.204, DOE Order 420.1B, Chapter III, 'Nuclear Criticality Safety,' ANSI/ANS 8-series Industry Standards, and DOE Standards. These source requirements are documented in LRD-18001, 'INL Criticality Safety Program Requirements Manual.' The majority of the criticality safety source requirements are contained in DOE Order 420.1B because it invokes all of the ANSI/ANS 8-Series Standards. DOE Order 420.1B also invokes several DOE Standards, including DOE-STD-3007, 'Guidelines for Preparing Criticality Safety Evaluations at Department of Energy Non-Reactor Nuclear Facilities.' DOE Order 420.1B contains requirements for DOE 'Heads of Field Elements' to approve the criticality safety program and specific elements of the program, namely, the qualification of criticality staff and the method for preparing criticality safety evaluations. This was accomplished by the approval of SAR-400, 'INL Standardized Nuclear Safety Basis Manual,' Chapter 6, 'Prevention of Inadvertent Criticality.' Chapter 6 of SAR-400 contains sufficient detail and/or reference to the specific DOE and contractor documents that adequately describe the INL Criticality Safety Program per the elements specified in DOE Order 420.1B. The Safety Evaluation Report for SAR-400 specifically recognizes that the approval of SAR-400 approves the INL Criticality Safety Program. No new source requirements were released in 2011. A revision to LRD-18001 is

  3. Quantum confined acceptors and donors in InSe nanosheets

    SciTech Connect (OSTI)

    Mudd, G. W.; Patanè, A. Makarovsky, O.; Eaves, L.; Kudrynskyi, Z. R.; Kovalyuk, Z. D.; Fay, M. W.; Zólyomi, V.; Falko, V.

    2014-12-01

    We report on the radiative recombination of photo-excited carriers bound at native donors and acceptors in exfoliated nanoflakes of nominally undoped rhombohedral ?-polytype InSe. The binding energies of these states are found to increase with the decrease in flake thickness, L. We model their dependence on L using a two-dimensional hydrogenic model for impurities and show that they are strongly sensitive to the position of the impurities within the nanolayer.

  4. Does MoSE cope with inland tsunamis hazard?

    E-Print Network [OSTI]

    Panza, Giuliano Francesco; Romanelli, Fabio

    2014-01-01

    In this work we use morphostructural zonation and pattern recognition techniques to identify a potential seismic source located inland very near Venice, and then we evaluate how a tsunami wave generated from this source can affect the MoSE gates if they are standing up (closed) during the tsunami event. From our simulation we get both peaks and troughs as first arrivals: the behavior of the barriers in these two situations could be a very important design matter.

  5. Perlick: Order (2013-SE-14001) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuilding energy codes havePUBLICofPatriciaOrder (2013-SE-14001)

  6. Perlick: Proposed Penalty (2013-SE-14001) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuilding energy codes havePUBLICofPatriciaOrder (2013-SE-14001)Proposed

  7. Metal contacts on ZnSe and GaN

    SciTech Connect (OSTI)

    Duxstad, K J [Univ. of California, Berkeley, CA (United States). Materials Science and Mineral Engineering

    1997-05-01

    Recently, considerable interest has been focused on the development of blue light emitting materials and devices. The focus has been on GaN and ZnSe, direct band gap semiconductors with bands gaps of 3.4 and 2.6 eV, respectively. To have efficient, reliable devices it is necessary to have thermally and electrically stable Ohmic contacts. This requires knowledge of the metal-semiconductor reaction behavior. To date few studies have investigated this behavior. Much information has accumulated over the years on the behavior of metals on Si and GaAs. This thesis provides new knowledge for the more ionic wide band gap semiconductors. The initial reaction temperatures, first phases formed, and phase stability of Pt, Pd, and Ni on both semiconductors were investigated. The reactions of these metals on ZnSe and GaN are discussed in detail and correlated with predicted behavior. In addition, comparisons are made between these highly ionic semiconductors and Si and GaAs. The trends observed here should also be applicable to other II-VI and III-Nitride semiconductor systems, while the information on phase formation and stability should be useful in the development of contacts for ZnSe and GaN devices.

  8. APdCu(Se2)(Se3) (A ) K and Rb): New Quaternary Copper Palladium Polyselenides with Unusual Metal-Selenium Coordination

    E-Print Network [OSTI]

    Li, Jing

    APdCu(Se2)(Se3) (A ) K and Rb): New Quaternary Copper Palladium Polyselenides with Unusual Metal structurally characterized quaternary copper palladium polychalcogenides with a (Se2)2- and a (Se3)2- fragment ) K and Rb), which are the first quaternary copper palladium polychalcogenides obtained

  9. NQA-1 Commercial Grade Dedication Critical Characteristics |...

    Office of Environmental Management (EM)

    Dedication Critical Characteristics May 5, 2015 Presenter: Randy P. Lanham, PE, CSP, Fire Protection Chief Engineer Consolidated Nuclear Solutions - Pantex, LLC Topics Covered:...

  10. Critical function and success path summary display

    DOE Patents [OSTI]

    Scarola, Kenneth (Windsor, CT); Jamison, David S. (Windsor, CT); Manazir, Richard M. (North Canton, CT); Rescorl, Robert L. (Vernon, CT); Harmon, Daryl L. (Enfield, CT)

    1995-01-01

    The content of and hierarchical access to three levels of display pages containing information on critical function monitoring and success path monitoring.

  11. Computing Criticality of Lines in Power Systems

    SciTech Connect (OSTI)

    Pinar, Ali; Reichert, Adam; Lesieutre, Bernard

    2006-10-13

    We propose a computationally efficient method based onnonlinear optimization to identify critical lines, failure of which cancause severe blackouts. Our method computes criticality measure for alllines at a time, as opposed to detecting a single vulnerability,providing a global view of the system. This information on criticality oflines can be used to identify multiple contingencies by selectivelyexploring multiple combinations of broken lines. The effectiveness of ourmethod is demonstrated on the IEEE 30 and 118 bus systems, where we canvery quickly detect the most critical lines in the system and identifysevere multiple contingencies.

  12. Bi-Se doped with Cu, p-type semiconductor

    DOE Patents [OSTI]

    Bhattacharya, Raghu Nath; Phok, Sovannary; Parilla, Philip Anthony

    2013-08-20

    A Bi--Se doped with Cu, p-type semiconductor, preferably used as an absorber material in a photovoltaic device. Preferably the semiconductor has at least 20 molar percent Cu. In a preferred embodiment, the semiconductor comprises at least 28 molar percent of Cu. In one embodiment, the semiconductor comprises a molar percentage of Cu and Bi whereby the molar percentage of Cu divided by the molar percentage of Bi is greater than 1.2. In a preferred embodiment, the semiconductor is manufactured as a thin film having a thickness less than 600 nm.

  13. Sunshine Lighting: Order (2014-SE-54008) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority forPerk | DepartmentOrder (2014-SE-54008)

  14. Victory: Order (2015-SE-42033) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryinEnable LowNewsEnergyOrder (2015-SE-42033) Victory:

  15. Victory: Proposed Penalty (2015-SE-42033) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryinEnable LowNewsEnergyOrder (2015-SE-42033)

  16. SILENE Benchmark Critical Experiments for Criticality Accident Alarm Systems

    SciTech Connect (OSTI)

    Miller, Thomas Martin; Reynolds, Kevin H.

    2011-01-01

    In October 2010 a series of benchmark experiments was conducted at the Commissariat a Energie Atomique et aux Energies Alternatives (CEA) Valduc SILENE [1] facility. These experiments were a joint effort between the US Department of Energy (DOE) and the French CEA. The purpose of these experiments was to create three benchmarks for the verification and validation of radiation transport codes and evaluated nuclear data used in the analysis of criticality accident alarm systems (CAASs). This presentation will discuss the geometric configuration of these experiments and the quantities that were measured and will present some preliminary comparisons between the measured data and calculations. This series consisted of three single-pulsed experiments with the SILENE reactor. During the first experiment the reactor was bare (unshielded), but during the second and third experiments it was shielded by lead and polyethylene, respectively. During each experiment several neutron activation foils and thermoluminescent dosimeters (TLDs) were placed around the reactor, and some of these detectors were themselves shielded from the reactor by high-density magnetite and barite concrete, standard concrete, and/or BoroBond. All the concrete was provided by CEA Saclay, and the BoroBond was provided by Y-12 National Security Complex. Figure 1 is a picture of the SILENE reactor cell configured for pulse 1. Also included in these experiments were measurements of the neutron and photon spectra with two BICRON BC-501A liquid scintillators. These two detectors were provided and operated by CEA Valduc. They were set up just outside the SILENE reactor cell with additional lead shielding to prevent the detectors from being saturated. The final detectors involved in the experiments were two different types of CAAS detectors. The Babcock International Group provided three CIDAS CAAS detectors, which measured photon dose and dose rate with a Geiger-Mueller tube. CIDAS detectors are currently in use at Y-12 in the newly constructed Highly Enriched Uranium Materials Facility. The second CAAS detector used a {sup 6}LiF TLD to absorb neutrons and a silicon detector to count the charge particles released by these absorption events. Lawrence Livermore National Laboratory provided four of these detectors, which had formerly been used at the Rocky Flats facility in the United States.

  17. 1.0 Espa,cos de Banach de se,c"oes de um fibrado vetorial. Definiremos nesta se,c"ao v'arios espa,cos vetoriais de se,c"oes de um fibr*

    E-Print Network [OSTI]

    Tausk, Daniel Victor

    1.0 Espa,cos de Banach de se,c"oes de um fibrado vetorial. Definiremos nesta se,c"ao v'arios espa,cos vetoriais de se,c"oes de um fibr* *ado vetorial sobre uma variedade compacta (possivelmente com bordo). Definiremos normas nestes esp* *a,cos mediante as quais eles se tornar"ao espa,cos de

  18. Italy in the Mediterranean Today: A New Critical Topography

    E-Print Network [OSTI]

    Fogu, Claudio; Re, Lucia

    2010-01-01

    Today: A New Critical Topography Claudio Fogu and Lucia Reto function as an ideal topography of the critical territory

  19. Critical technologies research: Opportunities for DOE

    SciTech Connect (OSTI)

    Not Available

    1992-12-01

    Recent studies have identified a number of critical technologies that are essential to the nation's defense, economic competitiveness, energy independence, and betterment of public health. The National Critical Technologies Panel (NCTP) has identified the following critical technology areas: Aeronautics and Surface Transportation; Biotechnology and Life Sciences; Energy and Environment; Information and Communications; Manufacturing; and Materials. Sponsored by the Department of Energy's Office of Energy Research (OER), the Critical Technologies Research Workshop was held in May 1992. Approximately 100 scientists, engineers, and managers from the national laboratories, industry, academia, and govemment participated. The objective of the Berkeley Workshop was to advance the role of the DOE multiprogram energy laboratories in critical technologies research by describing, defining, and illustrating research areas, opportunities, resources, and key decisions necessary to achieve national research goals. An agenda was developed that looked at DOE's capabilities and options for research in critical technologies and provided a forum for industry, academia, govemment, and the national laboratories to address: Critical technology research needs; existing research activities and resources; capabilities of the national laboratories; and opportunities for national laboratories, industries, and universities. The Workshop included plenary sessions in which presentations by technology and policy leaders set the context for further inquiry into critical technology issues and research opportunities. Separate sessions then focused on each of the following major areas of technology: Advanced materials; biotechnology and life sciences; energy and environment; information and communication; and manufacturing and transportation.

  20. Critical technologies research: Opportunities for DOE

    SciTech Connect (OSTI)

    Not Available

    1992-12-01

    Recent studies have identified a number of critical technologies that are essential to the nation`s defense, economic competitiveness, energy independence, and betterment of public health. The National Critical Technologies Panel (NCTP) has identified the following critical technology areas: Aeronautics and Surface Transportation; Biotechnology and Life Sciences; Energy and Environment; Information and Communications; Manufacturing; and Materials. Sponsored by the Department of Energy`s Office of Energy Research (OER), the Critical Technologies Research Workshop was held in May 1992. Approximately 100 scientists, engineers, and managers from the national laboratories, industry, academia, and govemment participated. The objective of the Berkeley Workshop was to advance the role of the DOE multiprogram energy laboratories in critical technologies research by describing, defining, and illustrating research areas, opportunities, resources, and key decisions necessary to achieve national research goals. An agenda was developed that looked at DOE`s capabilities and options for research in critical technologies and provided a forum for industry, academia, govemment, and the national laboratories to address: Critical technology research needs; existing research activities and resources; capabilities of the national laboratories; and opportunities for national laboratories, industries, and universities. The Workshop included plenary sessions in which presentations by technology and policy leaders set the context for further inquiry into critical technology issues and research opportunities. Separate sessions then focused on each of the following major areas of technology: Advanced materials; biotechnology and life sciences; energy and environment; information and communication; and manufacturing and transportation.

  1. Critical National Infrastructure Reliability Modeling and Analysis

    E-Print Network [OSTI]

    . · Telecommunications: Congestion or disruption of key communications nodes by fire, wind, water, or sabotage · Power of Homeland Security is protection of our critical national infrastructures including power, communications, transportation, and water. This paper presents models to quantify the interdependencies of critical

  2. Steady water waves with multiple critical layers

    E-Print Network [OSTI]

    Mats Ehrnström; Joachim Escher; Erik Wahlén

    2011-04-01

    We construct small-amplitude periodic water waves with multiple critical layers. In addition to waves with arbitrarily many critical layers and a single crest in each period, two-dimensional sets of waves with several crests and troughs in each period are found. The setting is that of steady two-dimensional finite-depth gravity water waves with vorticity.

  3. Self-organizing criticality among Chinese cities 

    E-Print Network [OSTI]

    Li, Shujuan

    2010-07-14

    This dissertation employs the theory of self-organizing criticality (SOC) into the study of Chinese cities. SOC was proposed at the end of the 1980s to explain system complexity by combining both self-organizing and critical behaviors. SOC has been...

  4. Critical aspects of hierarchical protein folding

    E-Print Network [OSTI]

    Alex Hansen; Mogens H. Jensen; Kim Sneppen; Giovanni Zocchi

    1998-01-13

    We argue that the first order folding transitions of proteins observed at physiological chemical conditions end in a critical point for a given temperature and chemical potential of the surrounding water. We investigate this critical point using a hierarchical Hamiltonian and determine its universality class. This class differs qualitatively from those of other known models.

  5. Enhancing critical current density of cuprate superconductors

    DOE Patents [OSTI]

    Chaudhari, Praveen

    2015-06-16

    The present invention concerns the enhancement of critical current densities in cuprate superconductors. Such enhancement of critical current densities include using wave function symmetry and restricting movement of Abrikosov (A) vortices, Josephson (J) vortices, or Abrikosov-Josephson (A-J) vortices by using the half integer vortices associated with d-wave symmetry present in the grain boundary.

  6. COMPUTER-BASED CRITICS Gerhard Fischer

    E-Print Network [OSTI]

    Fischer, Gerhard

    than I , we are bUilding systems that augment human intelligence -- in other words, we are building], active and passive help systems [12], design environments [11], and critics [7, 13], which we focus- building experience. We propose a general framework for critics, present specific requirements

  7. Incoherent transport in clean quantum critical metals

    E-Print Network [OSTI]

    Richard A. Davison; Blaise Goutéraux; Sean A. Hartnoll

    2015-07-25

    In a clean quantum critical metal, and in the absence of umklapp, most d.c. conductivities are formally infinite due to momentum conservation. However, there is a particular combination of the charge and heat currents which has a finite, universal conductivity. In this paper, we describe the physics of this conductivity $\\sigma_Q$ in quantum critical metals obtained by charge doping a strongly interacting conformal field theory. We show that it satisfies an Einstein relation and controls the diffusivity of a conserved charge in the metal. We compute $\\sigma_Q$ in a class of theories with holographic gravitational duals. Finally, we show how the temperature scaling of $\\sigma_Q$ depends on certain critical exponents characterizing the quantum critical metal. The holographic results are found to be reproduced by the scaling analysis, with the charge density operator becoming marginal in the emergent low energy quantum critical theory.

  8. Incoherent transport in clean quantum critical metals

    E-Print Network [OSTI]

    Davison, Richard A; Hartnoll, Sean A

    2015-01-01

    In a clean quantum critical metal, and in the absence of umklapp, most d.c. conductivities are formally infinite due to momentum conservation. However, there is a particular combination of the charge and heat currents which has a finite, universal conductivity. In this paper, we describe the physics of this conductivity $\\sigma_Q$ in quantum critical metals obtained by charge doping a strongly interacting conformal field theory. We show that it satisfies an Einstein relation and controls the diffusivity of a conserved charge in the metal. We compute $\\sigma_Q$ in a class of theories with holographic gravitational duals. Finally, we show how the temperature scaling of $\\sigma_Q$ depends on certain critical exponents characterizing the quantum critical metal. The holographic results are found to be reproduced by the scaling analysis, with the charge density operator becoming marginal in the emergent low energy quantum critical theory.

  9. Criticality Code Validation Exercises with TSUNAMI

    SciTech Connect (OSTI)

    Rearden, Bradley T [ORNL

    2007-01-01

    In the criticality code validation of common systems, many paths may exist to a correct bias, bias uncertainty, and upper subcritical limit. The challenge for the criticality analyst is to select an efficient, defensible, and safe methodology to consistently obtain the correct values. One method of testing criticality code validation techniques is to use a sample system with a known bias as a test application and determine whether the methods employed can reproduce the known bias. In this paper, a low-enriched uranium (LEU) lattice critical experiment with a known bias is used as the test application, and numerous other LEU experiments are used as the benchmarks for the criticality code validation exercises using traditional and advanced parametric techniques. The parameters explored are enrichment, energy of average lethargy causing fission (EALF), and the TSUNAMI integral index ck with experiments with varying degrees of similarity. This paper is an extension of a previously published summary.

  10. Geometric Tracking Control of a Quadrotor UAV on SE(3)

    E-Print Network [OSTI]

    Lee, Taeyoung; McClamroch, N Harris

    2010-01-01

    This paper provides new results for the tracking control of a quadrotor unmanned aerial vehicle (UAV). The UAV has four input degrees of freedom, namely the magnitudes of the four rotor thrusts, that are used to control the six translational and rotational degrees of freedom, and to achieve asymptotic tracking of four outputs, namely, three position variables for the vehicle center of mass and the direction of one vehicle body-fixed axis. A globally defined model of the quadrotor UAV rigid body dynamics is introduced as a basis for the analysis. A nonlinear tracking controller is developed on the special Euclidean group SE(3) and it is shown to have desirable closed loop properties that are almost global. Several numerical examples, including an example in which the quadrotor recovers from being initially upside down, illustrate the versatility of the controller.

  11. Fluorescence quenching of CdSe quantum dots on graphene

    SciTech Connect (OSTI)

    Guo, Xi Tao; Hua Ni, Zhen, E-mail: zhni@seu.edu.cn; Yan Nan, Hai; Hui Wang, Wen [Department of Physics and Key Laboratory of MEMS of the Ministry of Education, Southeast University, Nanjing 211189 (China)] [Department of Physics and Key Laboratory of MEMS of the Ministry of Education, Southeast University, Nanjing 211189 (China); Yan Liao, Chun [Physics Department, National Photoelectric Technology and Functional Materials and Application of Science and Technology International Cooperation Base, Northwest University, Xi'an 710069 (China)] [Physics Department, National Photoelectric Technology and Functional Materials and Application of Science and Technology International Cooperation Base, Northwest University, Xi'an 710069 (China); Zhang, Yan; Wei Zhao, Wei [Jiangsu Key Laboratory for Design and Fabrication of Micro-Nano Biomedical Instruments, School of Mechanical Engineering, Southeast University, Nanjing 211189 (China)] [Jiangsu Key Laboratory for Design and Fabrication of Micro-Nano Biomedical Instruments, School of Mechanical Engineering, Southeast University, Nanjing 211189 (China)

    2013-11-11

    We studied systematically the fluorescence quenching of CdSe quantum dots (QDs) on graphene and its multilayers, as well as graphene oxide (GO) and reduced graphene oxide (rGO). Raman intensity of QDs was used as a quantitatively measurement of its concentration in order to achieve a reliable quenching factor (QF). It was found that the QF of graphene (?13.1) and its multilayers is much larger than rGO (?4.4), while GO (?1.5) has the lowest quenching efficiency, which suggests that the graphitic structure is an important factor for quenching the fluorescence of QDs. It was also revealed that the QF of graphene is not strongly dependent on its thicknesses.

  12. Photoluminescence study of the substitution of Cd by Zn during the growth by atomic layer epitaxy of alternate CdSe and ZnSe monolayers

    SciTech Connect (OSTI)

    Hernández-Calderón, I.; Salcedo-Reyes, J. C.

    2014-05-15

    We present a study of the substitution of Cd atoms by Zn atoms during the growth of alternate ZnSe and CdSe compound monolayers (ML) by atomic layer epitaxy (ALE) as a function of substrate temperature. Samples contained two quantum wells (QWs), each one made of alternate CdSe and ZnSe monolayers with total thickness of 12 ML but different growth parameters. The QWs were studied by low temperature photoluminescence (PL) spectroscopy. We show that the Cd content of underlying CdSe layers is affected by the exposure of the quantum well film to the Zn flux during the growth of ZnSe monolayers. The amount of Cd of the quantum well film decreases with higher exposures to the Zn flux. A brief discussion about the difficulties to grow the Zn{sub 0.5}Cd{sub 0.5}Se ordered alloy (CuAu-I type) by ALE is presented.

  13. Nuclear Criticality Safety Guide for Fire Protection

    Office of Energy Efficiency and Renewable Energy (EERE)

    This guide is intended to provide information for use by fire protection professionals in the application of reasonable methods of fire protection in those facilities where there is a potential for nuclear criticality.

  14. Critical-Point Structure in Finite Nuclei

    E-Print Network [OSTI]

    A. Leviatan

    2006-12-04

    Properties of quantum shape-phase transitions in finite nuclei are considered in the framework of the interacting boson model. Special emphasis is paid to the dynamics at the critical-point of a general first-order phase transition.

  15. Neutron absorbing coating for nuclear criticality control

    DOE Patents [OSTI]

    Mizia, Ronald E. (Idaho Falls, ID); Wright, Richard N. (Idaho Falls, ID); Swank, William D. (Idaho Falls, ID); Lister, Tedd E. (Idaho Falls, ID); Pinhero, Patrick J. (Idaho Falls, ID)

    2007-10-23

    A neutron absorbing coating for use on a substrate, and which provides nuclear criticality control is described and which includes a nickel, chromium, molybdenum, and gadolinium alloy having less than about 5% boron, by weight.

  16. Intervention: Critical physical geography Rebecca Lave

    E-Print Network [OSTI]

    Lave, Rebecca

    Intervention: Critical physical geography Rebecca Lave Department of Geography, Indiana University Matthew W. Wilson Department of Geography, University of Kentucky Elizabeth S. Barron Department Christine Biermann Department of Geography, The Ohio State University Mark A. Carey Department of History

  17. Iterative Methods for Criticality Computations in Neutron

    E-Print Network [OSTI]

    Scheichl, Robert

    reactor (i.e. the criticality of the reactor), and thus plays an important role in the design and safety provides rather precise criteria on how accurate the inner solves need to be in order for the whole

  18. 16 Das Package java.sql 16.2 Relationale Datenbanken 16-4(312) Wir werden in den folgenden Beispielen mit einer MySQL-Datenbank arbeiten. Dabei greifen wir nur auf

    E-Print Network [OSTI]

    Arndt, Holger

    16 Das Package java.sql 16.2 Relationale Datenbanken 16-4(312) Wir werden in den folgenden Beispielen mit einer MySQL-Datenbank arbeiten. Dabei greifen wir nur auf eine einzelne Tabelle personal zu am Beispiel von MySQL Alles Wichtige finden Sie in: · Hofschuster / Zimmer, Kurzanleitung zur

  19. RELAP5 subcooled critical flow model verification

    SciTech Connect (OSTI)

    Petelin, S.; Gortnar, O.; Mavko, B. (Institut Jozef Stefan, Ljubljana (Solomon Islands))

    1993-01-01

    We discuss some results of the RELAP5 break modeling during the analysis of International Standard Problem 27 (ISP-27) performed on the BETHSY facility. This study deals with the discontinuity of the RELAP5 critical flow prediction in a strongly subcooled region. Such unrealistic behavior was observed during the pretest simulations of ISP-27. Based on the investigation, a RELAP5 code correction is suggested that ensures a more appropriate simulation of the critical discharge of strongly subcooled liquid.

  20. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    Sympo- sium on Software Testing and Analysis, ISSTA ’07,International Symposium on Software Testing and Analysis,

  1. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    Optimization . . . . . . . . . . . . . . . . .annotation optimization . . . . . . . . . . . . . . . . .Opt. is the time after optimization. Anno- phos is the time

  2. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    Proceedings of the 14th ACM SIGPLAN International ConferenceICFP ’09, pages 161–172, New York, NY, USA, 2009. ACM.In Proceedings of the 2Nd ACM SIGPLAN International Workshop

  3. Keyword programming in Java

    E-Print Network [OSTI]

    Little, Danny Greg

    Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of unordered keywords provided by the user into a valid expression. ...

  4. Running with Java

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy MaterialsRooftopRunningRunning on

  5. The Critical Mass Laboratory at Rocky Flats

    SciTech Connect (OSTI)

    Rothe, Robert E

    2003-10-15

    The Critical Mass Laboratory (CML) at Rocky Flats northwest of Denver, Colorado, was built in 1964 and commissioned to conduct nuclear experiments on January 28, 1965. It was built to attain more accurate and precise experimental data to ensure nuclear criticality safety at the plant than were previously possible. Prior to its construction, safety data were obtained from long extrapolations of subcritical data (called in situ experiments), calculated parameters from reactor engineering 'models', and a few other imprecise methods. About 1700 critical and critical-approach experiments involving several chemical forms of enriched uranium and plutonium were performed between then and 1988. These experiments included single units and arrays of fissile materials, reflected and 'bare' systems, and configurations with various degrees of moderation, as well as some containing strong neutron absorbers. In 1989, a raid by the Federal Bureau of Investigation (FBI) caused the plant as a whole to focus on 'resumption' instead of further criticality safety experiments. Though either not recognized or not admitted for a few years, that FBI raid did sound the death knell for the CML. The plant's optimistic goal of resumption evolved to one of deactivation, decommissioning, and plantwide demolition during the 1990s. The once-proud CML facility was finally demolished in April of 2002.

  6. Intersubband absorption in CdSe/Zn{sub x}Cd{sub y}Mg{sub 1-x-y}Se self-assembled quantum dot multilayers

    SciTech Connect (OSTI)

    Shen, A.; Lu, H.; Charles, W.; Yokomizo, I.; Tamargo, M. C.; Franz, K. J.; Gmachl, C.; Zhang, S. K.; Zhou, X.; Alfano, R. R.; Liu, H. C.

    2007-02-12

    The authors report the observation of intersubband absorption in multilayers of CdSe/Zn{sub x}Cd{sub y}Mg{sub 1-x-y}Se self-assembled quantum dots. The samples were grown by molecular beam epitaxy on InP substrates. For samples with the CdSe dot layers doped with Cl and with the deposited CdSe equivalent layer thickness between 5.2 and 6.9 ML, peak absorption between 2.5 and 3.5 {mu}m was observed. These materials are promising for intersubband devices operating in the mid- and near-infrared ranges.

  7. Leveraging on Easy Java Simulation tool and open source computer simulation library to create interactive digital media for mass customization of high school physics curriculum

    E-Print Network [OSTI]

    Wee, Loo Kang

    2012-01-01

    This paper highlights the diverse possibilities in the rich community of educators from the Conceptual Learning of Science (CoLoS) and Open Source Physics (OSP) movement to engage, enable and empower educators and students, to create interactive digital media through computer modeling. This concept revolves around a paradigmatic shift towards participatory learning through immersive computer modeling, as opposed to using technology for information transmission. We aim to engage high school educators to professionally develop themselves by creating and customizing simulations possible through Easy Java Simulation (Ejs) and its learning community. Ejs allows educators to be designers of learning environments through modifying source codes of the simulation. Educators can conduct lessons with students' using these interactive digital simulations and rapidly enhance the simulation through changing the source codes personally. Ejs toolkit, its library of simulations and growing community contributed simulation cod...

  8. Fuel Cells for Critical Communications Backup Power | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cells for Critical Communications Backup Power Fuel Cells for Critical Communications Backup Power This presentation provides information about using fuel cells for emergency...

  9. Critical Materials Research in DOE Video (Text Version)

    Broader source: Energy.gov [DOE]

    This is a text version of the "Critical Materials Research in DOE" video presented at the Critical Materials Workshop, held on April 3, 2012 in Arlington, Virginia.

  10. Department of Energy Critical Materials Strategy Video (Text Version)

    Broader source: Energy.gov [DOE]

    This is a text version of the "Department of Energy Critical Materials Strategy" video presented at the Critical Materials Workshop, held on April 3, 2012 in Arlington, Virginia.

  11. CNG, Hydrogen, CNG-Hydrogen Blends - Critical Fuel Properties...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CNG, Hydrogen, CNG-Hydrogen Blends - Critical Fuel Properties and Behavior CNG, Hydrogen, CNG-Hydrogen Blends - Critical Fuel Properties and Behavior Presentation given by Jay...

  12. The Critical Materials Institute announces two new industry members...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Critical Materials Institute announces two new industry members Contacts: For release: Aug. 18, 2015 Alex King, Director, Critical Materials Institute, (515) 296-4505 Laura...

  13. Critical Materials Institute's rare-earth recycling tech goes...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Critical Materials Institute's rare-earth recycling tech goes commercial OAK RIDGE, Tenn., Aug. 10, 2015-The Critical Materials Institute is celebrating its first commercial...

  14. Effects of Ignition Quality and Fuel Composition on Critical...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ignition Quality and Fuel Composition on Critical Equivalence Ratio Effects of Ignition Quality and Fuel Composition on Critical Equivalence Ratio Our research shows that fuel can...

  15. DOE NSF Partnership to Address Critical Challenges in Hydrogen...

    Office of Environmental Management (EM)

    NSF Partnership to Address Critical Challenges in Hydrogen Production from Solar Water Splitting DOE NSF Partnership to Address Critical Challenges in Hydrogen Production from...

  16. National Academies Criticality Methodology and Assessment Video (Text Version)

    Broader source: Energy.gov [DOE]

    This is a text version of the "National Academies Criticality Methodology and Assessment" video presented at the Critical Materials Workshop, held on April 3, 2012 in Arlington, Virginia.

  17. NIST Roadmap for Improving Critical Infrastructure Cybersecurity February 12, 2014

    E-Print Network [OSTI]

    NIST Roadmap for Improving Critical Infrastructure Cybersecurity February 12, 2014 1. Introduction This companion Roadmap to the Framework for Improving Critical Infrastructure Cybersecurity ("the

  18. The Department of Energy Releases Strategy on Critical Materials...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Department of Energy Releases Strategy on Critical Materials The Department of Energy Releases Strategy on Critical Materials December 15, 2010 - 12:00am Addthis The Department...

  19. President's 2014 Budget Proposes Critical Investments in Clean...

    Energy Savers [EERE]

    President's 2014 Budget Proposes Critical Investments in Clean Energy President's 2014 Budget Proposes Critical Investments in Clean Energy April 17, 2013 - 2:01pm Addthis...

  20. Multiple Critical Points in Effective Quark Models

    E-Print Network [OSTI]

    Ferroni, Lorenzo; Pinto, Marcus B

    2010-01-01

    We consider the two flavor version of the Linear Sigma Model as well as of the Nambu Jona-Lasinio model, at finite temperature and quark chemical potential, beyond the Mean Field Approximation. Using parameter values for the pion and quark current masses which weakly break chiral symmetry we show that both models can present more than one critical end point. In particular, we explicitly show that the appearance of a new critical point associated with a first order line at high temperature and low densities could help to conciliate some lattice results with model predictions. Using different techniques, we perform an extensive thermodynamical analysis to understand the physical nature of the different critical points. For both models, our results suggest that the new first order line which starts at vanishing chemical potential has a more chiral character than the usual line which displays a character more reminiscent of a liquid-gas phase transition.

  1. Dynamic trapping near a quantum critical point

    E-Print Network [OSTI]

    Michael Kolodrubetz; Emanuel Katz; Anatoli Polkovnikov

    2015-03-02

    The study of dynamics in closed quantum systems has recently been revitalized by the emergence of experimental systems that are well-isolated from their environment. In this paper, we consider the closed-system dynamics of an archetypal model: spins near a second order quantum critical point, which are traditionally described by the Kibble-Zurek mechanism. Imbuing the driving field with Newtonian dynamics, we find that the full closed system exhibits a robust new phenomenon -- dynamic critical trapping -- in which the system is self-trapped near the critical point due to efficient absorption of field kinetic energy by heating the quantum spins. We quantify limits in which this phenomenon can be observed and generalize these results by developing a Kibble-Zurek scaling theory that incorporates the dynamic field. Our findings can potentially be interesting in the context of early universe physics, where the role of the driving field is played by the inflaton or a modulus.

  2. Variable-Temperature Critical-Current Measurements

    SciTech Connect (OSTI)

    L. F. Goodrich; T. C. Stauffer

    2009-05-19

    This is the final report of a three year contract that covered 09/19/2005 to 07/14/2008. We requested and received a no cost time extension for the third year, 07/15/2007 to 07/14/2008, to allow DoE to send us funds if they became available during that year. It turned out that we did not receive any funding for the third year. The following paper covers our variable-temperature critical-current measurements. We made transport critical-current (Ic) measurements on commercial multifilamentary Nb3Sn strands at temperatures (T) from 4 to 17 K and magnetic fields (H) from 0 to 14 T. One of the unique features of our measurements is that we can cover a wide range of critical currents from less than 0.1 A to over 700 A.

  3. Determination of Grain Boundary Charging in Cu(In,Ga)Se2 Thin Films: Preprint

    SciTech Connect (OSTI)

    Jiang, C. S.; Contreras, M. A.; Repins, I.; Moutinho, H. R.; Noufi, R.; Al-Jassim, M. M.

    2012-06-01

    Surface potential mapping of Cu(In,Ga)Se2 (CIGS) thin films using scanning Kelvin probe force microscopy (SKPFM) aims to understand the minority-carrier recombination at the grain boundaries (GBs) of this polycrystalline material by examining GB charging, which has resulted in a number of publications. However, the reported results are highly inconsistent. In this paper, we report on the potential mapping by measuring wide-bandgap or high-Ga-content films and by using a complementary atomic force microscopy-based electrical technique of scanning capacitance microscopy (SCM). The results demonstrate consistent, positively charged GBs on our high-quality films with minimal surface defects/charges. The potential image taken on a low-quality film with a 1.2-eV bandgap shows significantly degraded potential contrast on the GBs and degraded potential uniformity on grain surfaces, resulting from the surface defects/charges of the low-quality film. In contrast, the potential image on an improved high-quality film with the same wide bandgap shows significantly improved GB potential contrast and surface potential uniformity, indicating that the effect of surface defects is critical when examining GB charging using surface potential data. In addition, we discuss the effect of the SKPFM setup on the validity of potential measurement, to exclude possible artifacts due to improper SKPFM setups. The SKPFM results were corroborated by using SCM measurements on the films with a CdS buffer layer. The SCM image shows clear GB contrast, indicating different electrical impedance on the GB from the grain surface. Further, we found that the GB contrast disappeared when the CdS window layer was deposited after the CIGS film was exposed extensively to ambient, which was caused by the creation of CIGS surface defects by the ambient exposure.

  4. Criticality Safety Basics for INL Emergency Responders

    SciTech Connect (OSTI)

    Valerie L. Putman

    2012-08-01

    This document is a modular self-study guide about criticality safety principles for Idaho National Laboratory emergency responders. This guide provides basic criticality safety information for people who, in response to an emergency, might enter an area that contains much fissionable (or fissile) material. The information should help responders understand unique factors that might be important in responding to a criticality accident or in preventing a criticality accident while responding to a different emergency.

    This study guide specifically supplements web-based training for firefighters (0INL1226) and includes information for other Idaho National Laboratory first responders. However, the guide audience also includes other first responders such as radiological control personnel.

    For interested readers, this guide includes clearly marked additional information that will not be included on tests. The additional information includes historical examples (Been there. Done that.), as well as facts and more in-depth information (Did you know …).

    INL criticality safety personnel revise this guide as needed to reflect program changes, user requests, and better information. Revision 0, issued May 2007, established the basic text. Revision 1 incorporates operation, program, and training changes implemented since 2007. Revision 1 increases focus on first responders because later responders are more likely to have more assistance and guidance from facility personnel and subject matter experts. Revision 1 also completely reorganized the training to better emphasize physical concepts behind the criticality controls that help keep emergency responders safe. The changes are based on and consistent with changes made to course 0INL1226.

  5. A primer for criticality calculations with DANTSYS

    SciTech Connect (OSTI)

    Busch, R.D.

    1997-08-01

    With the closure of many experimental facilities, the nuclear safety analyst has to rely on computer calculations to identify safe limits for the handling and storage of fissile materials. Although deterministic methods often do not provide exact models of a system, a substantial amount of reliable information on nuclear systems can be obtained using these methods if the user understands their limitations. To guide criticality specialists in this area, the Nuclear Criticality Safety Group at the University of New Mexico (UNM) in cooperation with the Radiation Transport Group at Los Alamos National Laboratory (LANL) has designed a primer to help the analyst understand and use the DANTSYS deterministic transport code for nuclear criticality safety analyses. DANTSYS is the new name of the group of codes formerly known as: ONEDANT, TWODANT, TWOHEX, TWOGQ, and THREEDANT. The primer is designed to teach bu example, with each example illustrating two or three DANTSYS features useful in criticality analyses. Starting with a Quickstart chapter, the primer gives an overview of the basic requirements for DANTSYS input and allows the user to quickly run a simple criticality problem with DANTSYS. Each chapter has a list of basic objectives at the beginning identifying the goal of the chapter and the individual DANTSYS features covered in detail in the chapter example problems. On completion of the primer, it is expected that the user will be comfortable doing criticality calculations with DANTSYS and can handle 60--80% of the situations that normally arise in a facility. The primary provides a set of input files that can be selective modified by the user to fit each particular problem.

  6. QCD Critical Point: The Race is On

    E-Print Network [OSTI]

    Gavai, Rajiv V

    2014-01-01

    A critical point in the phase diagram of Quantum Chromodynamics (QCD), if established either theoretically or experimentally, would be as profound a discovery as the good-old gas-liquid critical point. Unlike the latter, however, first-principles based approaches are being employed to locate it theoretically. Due to the short lived nature of the concerned phases, novel experimental techniques are needed to search for it. The Relativistic Heavy Ion Collider (RHIC) in USA has an experimental program to do so. This short review is an attempt to provide a glimpse of the race between the theorists and the experimentalists as well as that of the synergy between them.

  7. Critical Masses for Unreflected Metal Spheres

    SciTech Connect (OSTI)

    Westfall, Robert Michael; Wright, Richard Q

    2009-01-01

    Calculated critical masses of bare metal spheres for 28 actinide isotopes, using the SCALE/XSDRNPM one-dimensional, discrete-ordinates system, are presented. ENDF/B-VI, ENDF/B-VII, and JENDL-3.3 cross sections were used in the calculations. Results are given for isotopes of uranium, neptunium, plutonium, americium, curium, californium, and for one isotope of einsteinium. Calculated k values for these same nuclides are also given. We show that, for non-threshold or low-threshold fission nuclides, a good approximation for the nuclide k is the value of nubar at 1 MeV. A plot of the critical mass versus k values is given for 19 nuclides with A-numbers between 232 and 250. The peaks in the critical mass curve (for seven nuclides) correspond to dips in the k curve. For the seven cases with the largest critical mass, six are even-even nuclides. Neptunium-237, with a critical mass of about 62.7 kg (ENDF/B-VI calculation), has an odd number of protons and an even number of neutrons. However, two cases with quite small critical masses, 232U and 236Pu, are also even-even. These two nuclides do not exhibit threshold fission behavior like most other even-even nuclides. The largest critical mass is 208.8 kg for 243Am and the smallest is 2.44 kg for 251Cf. The calculated k values vary from 1.5022 for 234U to 4.4767 for 251Cf. A correlation between the calculated critical mass (kg) and the fission spectrum averaged value of is given for the elements U, Np, Pu, Am, Cm, and Cf. For each of the five elements, a fit to the data for that element is provided. In each case the fit employs a negative exponential of the form mass = exp(A + B ~ ln( ) The values of A and B are element dependent and vary slightly for each of the five elements. The method described here is mainly applicable for non-threshold fission nuclides (15 of the 28 nuclides considered in this paper). There are three exceptions, 238Pu, 244Cm, and 250Cf, which all exhibit threshold fission behavior.

  8. HANFORD NUCLEAR CRITICALITY SAFETY PROGRAM DATABASE

    SciTech Connect (OSTI)

    TOFFER, H.

    2005-05-02

    The Hanford Database is a useful information retrieval tool for a criticality safety practitioner. The database contains nuclear criticality literature screened for parameter studies. The entries, characterized with a value index, are segregated into 16 major and six minor categories. A majority of the screened entries have abstracts and a limited number are connected to the Office of Scientific and Technology Information (OSTI) database of full-size documents. Simple and complex searches of the data can be accomplished very rapidly and the end-product of the searches could be a full-size document. The paper contains a description of the database, user instructions, and a number of examples.

  9. Analysis of Godiva-IV delayed-critical and static super-prompt-critical conditions

    SciTech Connect (OSTI)

    Mosteller, Russell D; Goda, Joetta M

    2009-01-01

    Super-prompt-critical burst experiments were conducted on the Godiva-IV assembly at Los Alamos National Laboratory from the 1960s through 2005. Detailed and simplified benchmark models have been constructed for four delayed-critical experiments and for the static phase of a super-prompt-critical burst experiment. In addition, a two-dimensional cylindrical model has been developed for the super-prompt-critical condition. Criticality calculations have been performed for all of those models with four modern nuclear data libraries: ENDFIB-VI, ENDF/8-VII.0, JEFF-3.1 , and JENDL-3.3. Overall, JENDL-3.3 produces the best agreement with the reference values for k{sub eff}.

  10. Critical Incident Stress Management (CISM): Group Crisis Intervention, 4th June 2006, International Critical Incident Stress Foundation, Inc.

    E-Print Network [OSTI]

    Oliver, Douglas L.

    Critical Incident Stress Management (CISM): Group Crisis Intervention, 4th Edition, June 2006 Management (CISM): Group Crisis Intervention, 4th Edition, June 2006, International Critical Incident Stress

  11. Secretary Chu to Lead Delegation to SE4All, CEM Conferences in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Lead Delegation to SE4All, CEM Conferences in London Secretary Chu to Lead Delegation to SE4All, CEM Conferences in London April 9, 2012 - 10:13am Addthis WASHINGTON, DC - Later...

  12. Introduction Critically ill patients requiring mechanical venti-

    E-Print Network [OSTI]

    Young, Todd

    Introduction Critically ill patients requiring mechanical venti- lation are at significant risk techniques are generally, invasive, labor inten- sive and slow [1, 9]. The culture delay often pro- motes unnecessary antibiotic exposure with an associated increased risk of both subsequent infectious complications

  13. Autonomous Following RObot Critical Design Review

    E-Print Network [OSTI]

    Liebling, Michael

    , tennis, football, soccer Repainting fading street lines Perimeter security Warehouse item retrieval/storage user input. Navigating to specific coordinates of a grid. #12;Critical Design Review: Project - schematic/PCB, digital compass Travis - mechanical - servo, reflective sensor, power Peter - mechanical

  14. Timely PTS Applications Critical to Staying Navy

    E-Print Network [OSTI]

    Timely PTS Applications Critical to Staying Navy Navy Personnel Command (NPC) is reminding commands and Sailors that submitting Perform to Serve (PTS) applications is the key to being able to stay Navy/10 explains how PTS is used to shape the Navy, and includes all business rules concerning. Commands must

  15. Critical point analysis of phase envelope diagram

    SciTech Connect (OSTI)

    Soetikno, Darmadi; Siagian, Ucok W. R.; Kusdiantara, Rudy Puspita, Dila Sidarto, Kuntjoro A. Soewono, Edy; Gunawan, Agus Y.

    2014-03-24

    Phase diagram or phase envelope is a relation between temperature and pressure that shows the condition of equilibria between the different phases of chemical compounds, mixture of compounds, and solutions. Phase diagram is an important issue in chemical thermodynamics and hydrocarbon reservoir. It is very useful for process simulation, hydrocarbon reactor design, and petroleum engineering studies. It is constructed from the bubble line, dew line, and critical point. Bubble line and dew line are composed of bubble points and dew points, respectively. Bubble point is the first point at which the gas is formed when a liquid is heated. Meanwhile, dew point is the first point where the liquid is formed when the gas is cooled. Critical point is the point where all of the properties of gases and liquids are equal, such as temperature, pressure, amount of substance, and others. Critical point is very useful in fuel processing and dissolution of certain chemicals. Here in this paper, we will show the critical point analytically. Then, it will be compared with numerical calculations of Peng-Robinson equation by using Newton-Raphson method. As case studies, several hydrocarbon mixtures are simulated using by Matlab.

  16. Geological carbon sequestration: critical legal issues

    E-Print Network [OSTI]

    Watson, Andrew

    Geological carbon sequestration: critical legal issues Ray Purdy and Richard Macrory January 2004 Tyndall Centre for Climate Change Research Working Paper 45 #12;1 Geological carbon sequestration an integrated assessment of geological carbon sequestration (Project ID code T2.21). #12;2 1 Introduction

  17. Criticality calculations for Step-2 GPHS modules.

    SciTech Connect (OSTI)

    Hensen, Danielle Lynn; Lipinski, Ronald J.

    2007-08-01

    The Multi-Mission Radioisotope Thermoelectric Generator (MMRTG) will use an improved version of the General Purpose Heat Source (GPHS) module as its source of thermal power. This new version, referred to as the Step-2 GPHS Module, has additional and thicker layers of carbon fiber material (Fine Weaved Pierced Fabric) for increased strength over the original GPHS module. The GPHS uses alpha decay of {sup 238}Pu in the oxide form as the primary source of heat, and small amounts of other actinides are also present in the oxide fuel. Criticality calculations have been performed by previous researchers on the original version of the GPHS module (Step 0). This paper presents criticality calculations for the present Step-2 version. The Monte Carlo N-Particle eXtended code (MCNPX) was used for these calculations. Numerous configurations of GPHS module arrays surrounded by wet sand and other materials (to reflect the neutrons back into the stack with minimal absorption) were modeled. For geometries with eight GPHS modules (from a single MMRTG) surrounded by wet sand, the configuration is extremely sub-critical; k{sub eff} is about 0.3. It requires about 1000 GPHS modules (from 125 MMRTGs) in a close-spaced stack to approach criticality (k{sub eff} = 1.0) when surrounded by wet sand. The effect of beryllium in the MMRTG was found to be relatively small.

  18. Criticality Calculations for Step-2 GPHS Modules

    SciTech Connect (OSTI)

    Lipinski, Ronald J. [Advanced Nuclear Concepts Department, Sandia National Laboratories, P.O Box 5800, Albuquerque, NM 87185 (United States); Hensen, Danielle L. [Risk and Reliability Department Sandia National Laboratories, P.O Box 5800, Albuquerque, NM 87185 (United States)

    2008-01-21

    The Multi-Mission Radioisotope Thermoelectric Generator (MMRTG) will use an improved version of the General Purpose Heat Source (GPHS) module as its source of thermal power. This new version, referred to as the Step-2 GPHS Module, has additional and thicker layers of carbon fiber material (Fine Weaved Pierced Fabric) for increased strength over the original GPHS module. The GPHS uses alpha decay of {sup 238}Pu in the oxide form as the primary source of heat, and small amounts of other actinides are also present in the oxide fuel. Criticality calculations have been performed by previous researchers on the original version of the GPHS module (Step 0). This paper presents criticality calculations for the present Step-2 version. The Monte Carlo N-Particle eXtended code (MCNPX) was used for these calculations. Numerous configurations of GPHS module arrays surrounded by wet sand and other materials (to reflect the neutrons back into the stack with minimal absorption) were modeled. For geometries with eight GPHS modules (from a single MMRTG) surrounded by wet sand, the configuration is extremely sub-critical; k{sub eff} is about 0.3. It requires about 1000 GPHS modules (from 125 MMRTGs) in a close-spaced stack to approach criticality (k{sub eff} = 1.0) when surrounded by wet sand. The effect of beryllium in the MMRTG was found to be relatively small.

  19. Institute for Critical Technology and Applied Science

    E-Print Network [OSTI]

    Crawford, T. Daniel

    and a Polymer Engineer with Michelin Americas Research and Development Corporation in Greenville, SC. He has hadInstitute for Critical Technology and Applied Science www.ictas.vt.edu NEW HORIZONS ICTAS SEMINAR) 3. CBET-Broadening Participation Research Initiation Grant in Engineering Program (BRIGE) 4. Science

  20. Determination of Critical Exponents in Nuclear Systems

    E-Print Network [OSTI]

    W. F. J. Mueller; ALADIN collaboration

    1996-07-08

    Signatures of critical behaviour in nuclear fragmentation are often based on arguments from percolation theory. We demonstrate with general thermodynamic considerations and studies of the Ising model that the reliance on percolation as a reference model bears the risk of missing parts of the essential physics.

  1. Derived critical loci I -Basics Gabriele Vezzosi

    E-Print Network [OSTI]

    Vezzosi, Gabriele

    Derived critical loci I - Basics Gabriele Vezzosi Dipartimento di Sistemi ed Informatica Universit`a di Firenze Italy Notes ­ September 2011 Contents 1 Introduction 1 2 Koszul complexes and derived zero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Affine derived zero loci . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2

  2. Sbado 10.11.2012 English | Deutsch | Franais | Italiano | Espaol | Portugus | | | Fazer login | Cadastre-se

    E-Print Network [OSTI]

    Barbosa, Marcia C. B.

    dispararam contra drone dos EUA 09 Novembro, 2012 - 16:57 O sobrinho de George W. Bush, meio hispânico, se

  3. SE2NN11 Neural Networks Part B Dr Richard Mitchell, 2014 1

    E-Print Network [OSTI]

    Mitchell, Richard

    SE2NN11 ­ Neural Networks ­ Part B © Dr Richard Mitchell, 2014 1 p1 RJM 16/09/14 SE2NN11 Neural Networks ­ Part B © Dr Richard Mitchell 2014 SE2NN11 Neural Networks : Part B In Part B of the course, I Networks Including Stochastic Diffusion Search p2 RJM 16/09/14 SE2NN11 Neural Networks ­ Part B © Dr

  4. Energy relaxation in CdSe nanocrystals: the effects of morphology and film preparation

    E-Print Network [OSTI]

    Ruan, Xiulin

    solar cells. harvesting light energy with CdSe nanocrystals molecularly linked to mesoscopic TiO2 filmsEnergy relaxation in CdSe nanocrystals: the effects of morphology and film preparation Bryan T time-resolved absorption spectroscopy is used to investigate exciton dynamics in CdSe nanocrystal films

  5. DISSERTATION ANTICIPATED PERFORMANCE OF Cu(In,Ga)Se2 SOLAR CELLS IN THE

    E-Print Network [OSTI]

    Sites, James R.

    i DISSERTATION ANTICIPATED PERFORMANCE OF Cu(In,Ga)Se2 SOLAR CELLS IN THE THIN-FILM LIMIT Submitted ENTITLED `ANTICIPATED PERFORMANCE OF Cu(In,Ga)Se2 SOLAR CELLS IN THE THIN-FILM LIMIT' BE ACCEPTED(In,Ga)Se2 SOLAR CELLS IN THE THIN-FILM LIMIT The demand for alternative sources of energy is rapidly

  6. Review of Yucca Mountain Disposal Criticality Studies

    SciTech Connect (OSTI)

    Scaglione, John M [ORNL] [ORNL; Wagner, John C [ORNL] [ORNL

    2011-01-01

    The U.S. Department of Energy (DOE), Office of Civilian Radioactive Waste Management, submitted a license application for construction authorization of a deep geologic repository at Yucca Mountain, Nevada, in June of 2008. The license application is currently under review by the U.S. Nuclear Regulatory Commission. However,on March 3, 2010 the DOE filed a motion requesting withdrawal of the license application. With the withdrawal request and the development of the Blue Ribbon Commission to seek alternative strategies for disposing of spent fuel, the status of the proposed repository at Yucca Mountain is uncertain. What is certain is that spent nuclear fuel (SNF) will continue to be generated and some long-lived components of the SNF will eventually need a disposition path(s). Strategies for the back end of the fuel cycle will continue to be developed and need to include the insights from the experience gained during the development of the Yucca Mountain license application. Detailed studies were performed and considerable progress was made in many key areas in terms of increased understanding of relevant phenomena and issues regarding geologic disposal of SNF. This paper reviews selected technical studies performed in support of the disposal criticality analysis licensing basis and the use of burnup credit. Topics include assembly misload analysis, isotopic and criticality validation, commercial reactor critical analyses, loading curves, alternative waste package and criticality control studies, radial burnup data and effects, and implementation of a conservative application model in the criticality probabilistic evaluation as well as other information that is applicable to operations regarding spent fuel outside the reactor. This paper summarizes the work and significant accomplishments in these areas and provides a resource for future, related activities.

  7. Early Warning Signals for Critical Transitions: A Generalized Modeling Approach

    E-Print Network [OSTI]

    rangelands [9], and desertification [10]. Warning signals for impending critical transitions are highly

  8. Method of synthesizing and growing copper-indium-diselenide (CuInSe/sub 2/) crystals

    DOE Patents [OSTI]

    Ciszek, T.F.

    1984-11-29

    A process for preparing CuInSe/sub 2/ crystals includes melting a sufficient quantity of B/sub 2/O/sub 2/ along with stochiometric quantities of Cu, In, and Se in a crucible in a high-pressure atmosphere of inert gas to encapsulate the CuInSe/sub 2/ melt and confine the Se to the crucible. Additional Se in the range of 1.8 to 2.2% over the stochiometric quantity is preferred to make up for small amounts of Se lost in the process. The melt can then be cooled slowly to form the crystal as direct solidification, or the crystal can be grown by inserting a seed crystal through the B/sub 2/O/sub 3/ encapsulate into contact with the CuInSe/sub 2/ melt and withdrawing the seed upwardly to grow the crystal thereon from the melt.

  9. Observation and Measurement of Se-79 in SRS High-Level Tank Fission Product Waste

    SciTech Connect (OSTI)

    Dewberry, R.A.

    2000-08-21

    The authors report the first observation of confirmed Se-79 activity in Savannah River Site high level fission product waste. Se-79 was measured after a seven step chemical treatment to remove interfering activity from Cs-137, Sr-90, and plutonium at levels 105 times higher than the observed Se-79 content and to remove Tc-99 at levels 300 times higher than observed Se-79. Se-79 was measured by liquid scintillation beta-decay counting after specific tests to eliminate uncertainties from possible contributions from Tc-99, Pm-147, Sm-151, Zr-93, or Pu-241, whose beta-decay spectra could appear similar to that of Se-79, and whose content would be expected at levels near or greater than Se-79.

  10. History of critical experiments at Pajarito Site

    SciTech Connect (OSTI)

    Paxton, H.C.

    1983-03-01

    This account describes critical and subcritical assemblies operated remotely at the Pajarito Canyon Site at the Los Alamos National Laboratory. Earliest assemblies, directed exclusively toward the nuclear weapons program, were for safety tests. Other weapon-related assemblies provided neutronic information to check detailed weapon calculations. Topsy, the first of these critical assemblies, was followed by Lady Godiva, Jezebel, Flattop, and ultimately Big Ten. As reactor programs came to Los Alamos, design studies and mockups were tested at Pajarito Site. For example, nearly all 16 Rover reactors intended for Nevada tests were preceded by zero-power mockups and proof tests at Pajarito Site. Expanded interest and capability led to fast-pulse assemblies, culminating in Godiva IV and Skua, and to the Kinglet and Sheba solution assemblies.

  11. Refined critical balance in strong Alfvenic turbulence

    E-Print Network [OSTI]

    A. Mallet; A. A. Schekochihin; B. D. G. Chandran

    2015-08-24

    We present numerical evidence that in strong Alfvenic turbulence, the critical balance principle---equality of the nonlinear decorrelation and linear propagation times---is scale invariant, in the sense that the probability distribution of the ratio of these times is independent of scale. This result only holds if the local alignment of the Elsasser fields is taken into account in calculating the nonlinear time. At any given scale, the degree of alignment is found to increase with fluctuation amplitude, supporting the idea that the cause of alignment is mutual dynamical shearing of Elsasser fields. The scale-invariance of critical balance (while all other quantities of interest are strongly intermittent, i.e., have scale-dependent distributions) suggests that it is the most robust of the scaling principles used to describe Alfvenic turbulence. The quality afforded by situ fluctuation measurements in the solar wind allows for direct verification of this fundamental principle.

  12. Analysis of SP-100 critical experiments

    SciTech Connect (OSTI)

    Sapir, J.L.; Brandon, D.I.; Collins, P.J.; Cowan, C.L.; Porter, C.A.; Andre, S.V.

    1988-01-01

    In support of the SP-100 space nuclear power source program, preliminary critical benchmark experiments were performed at the ZPPR facility at ANL-W. These configurations are representative of small, fast-spectrum, BeO-reflected, liquid metal-cooled space reactor designs at a 300-kWe power level. Analyses were performed using MCNP (Monte Carlo) and TWODANT (discrete ordinates) transport codes to calculate system criticality, control worth, and power distribution. Both methods calculated eigenvalues within 0.5% of the experimental results. Internal-poison-rod worth was underpredicted and radial reflector worth was overpredicted by both codes by up to 20%. MCNP-calculated control drum worths were underestimated by approximately 8%. Good agreement with experimental values was observed for /sup 235/U fission and for /sup 238/U fission and capture rates with the best agreement occurring in the fuel region and slightly poorer predictions apparent near BeO moderator. 7 refs., 12 figs.

  13. SLU, Box 58, SE-230 53Alnarp, Sverige tel: +46 (0)40-4150 00 Org.nr 202100-2817 info@slu.se

    E-Print Network [OSTI]

    .slu.se 1(7) FUSE- Future Urban Sustainable Environments Caroline Dahl, projektledare STRATEGISK PLAN Strategisk plan för FUSE verksamhetsperiod 2013-2016 Projektnamn: Future Urban Sustainable Environment, FUSE

  14. Architecture for high critical current superconducting tapes

    DOE Patents [OSTI]

    Jia, Quanxi (Los Alamos, NM); Foltyn, Stephen R. (Los Alamos, NM)

    2002-01-01

    Improvements in critical current capacity for superconducting film structures are disclosed and include the use of, e.g., multilayer YBCO structures where individual YBCO layers are separated by a layer of an insulating material such as CeO.sub.2 and the like, a layer of a conducting material such as strontium ruthenium oxide and the like or by a second superconducting material such as SmBCO and the like.

  15. EPR and Bell's theorem: A critical review

    SciTech Connect (OSTI)

    Stapp, H.P. (Lawrence Berkeley Lab., CA (United States))

    1991-01-01

    The argument of Einstein, Podolsky, and Rosen is reviewed with attention to logical structure and character of assumptions. Bohr's reply is discussed. Bell's contribution is formulated without use of hidden variables, and efforts to equate hidden variables to realism are critically examined. An alternative derivation of nonlocality that makes no use of hidden variables, microrealism, counterfactual definiteness, or any other assumption alien to orthodox quantum thinking is described in detail, with particular attention to the quartet or broken-square question.

  16. Critical regimes of internal gravity wave generation

    E-Print Network [OSTI]

    Vitaly V. Bulatov; Yuriy V. Vladimirov; Vasily A. Vakorin

    2005-11-27

    The problem of constructing an asymptotic representation of the solution of the internal gravity wave field exited by a source moving at a velocity close to the maximum group velocity of the individual wave mode is considered. For the critical regimes of individual mode generation the asymptotic representation of the solution obtained is expressed in terms of a zero-order Macdonald function. The results of numerical calculations based on the exact and asymptotic formulas are given.

  17. Apparatus and method for critical current measurements

    DOE Patents [OSTI]

    Martin, Joe A. (Espanola, NM); Dye, Robert C. (Los Alamos, NM)

    1992-01-01

    An apparatus for the measurement of the critical current of a superconductive sample, e.g., a clad superconductive sample, the apparatus including a conductive coil, a means for maintaining the coil in proximity to a superconductive sample, an electrical connection means for passing a low amplitude alternating current through the coil, a cooling means for maintaining the superconductive sample at a preselected temperature, a means for passing a current through the superconductive sample, and, a means for monitoring reactance of the coil, is disclosed, together with a process of measuring the critical current of a superconductive material, e.g., a clad superconductive material, by placing a superconductive material into the vicinity of the conductive coil of such an apparatus, cooling the superconductive material to a preselected temperature, passing a low amplitude alternating current through the coil, the alternating current capable of generating a magnetic field sufficient to penetrate, e.g., any cladding, and to induce eddy currents in the superconductive material, passing a steadily increasing current through the superconductive material, the current characterized as having a different frequency than the alternating current, and, monitoring the reactance of the coil with a phase sensitive detector as the current passed through the superconductive material is steadily increased whereby critical current of the superconductive material can be observed as the point whereat a component of impedance deviates.

  18. Critical Masses for Unreflected Metal Spheres

    SciTech Connect (OSTI)

    Westfall, Robert Michael; Goluoglu, Sedat; Wright, Richard Q

    2009-01-01

    Critical masses of bare metal spheres for 33 actinide isotopes, using the SCALE/XSDRNPM one-dimensional, discrete-ordinates system, are presented. ENDF/B-VI, ENDF/B-VII, and JENDL-3.3 cross sections were used in the calculations. Results are given for isotopes of U, Np, Pu, Am, Cm, and Cf and for one isotope of Es. Calculated k-infinity values for 41 actinides are also given. For the nonthreshold or low-threshold fission nuclides, a good approximation for the nuclide k-infinity is the value of nubar at 1 MeV. A correlation between the calculated critical mass (kg) and the fission spectrum averaged value of F is given for the elements U, Np, Pu, Cm, and Cf as CM (kg) = exp (A + B ln( F)).(1) The values of A and B are element dependent and vary slightly for each of the five elements. The method described here is mainly applicable for nonthreshold fission nuclides (15 of the 31 nuclides considered in this paper). We conclude that equation (1) is useful for predicting the critical mass for nonthreshold fission nuclides if we have accurate values of the fission spectrum averaged F.

  19. Quantum-dot light-emitting diodes utilizing CdSe/ZnS nanocrystals embedded in TiO{sub 2} thin film

    SciTech Connect (OSTI)

    Kang, Seung-Hee; Kumar, Ch. Kiran; Kim, Eui-Tae; Lee, Zonghoon; Kim, Kyung-Hyun; Huh, Chul

    2008-11-10

    Quantum-dot (QD) light-emitting diodes (LEDs) are demonstrated on Si wafers by embedding core-shell CdSe/ZnS nanocrystals in TiO{sub 2} thin films via plasma-enhanced metallorganic chemical vapor deposition. The n-TiO{sub 2}/QDs/p-Si LED devices show typical p-n diode current-voltage and efficient electroluminescence characteristics, which are critically affected by the removal of QD surface ligands. The TiO{sub 2}/QDs/Si system we presented can offer promising Si-based optoelectronic and electronic device applications utilizing numerous nanocrystals synthesized by colloidal solution chemistry.

  20. ADVANCES IN SE-79 ANALYSES ON SAVANNAH RIVER SITE RADIOACTIVE WASTE MATRICES

    SciTech Connect (OSTI)

    Diprete, D; C Diprete, C; Ned Bibler, N; Cj Bannochie, C; Michael Hay, M

    2009-03-16

    Waste cleanup efforts underway at the United States Department of Energy's (DOE) Savannah River Site (SRS) in South Carolina, as well as other DOE nuclear sites, have created a need to characterize {sup 79}Se in radioactive waste inventories. Successful analysis of {sup 79}Se in high activity waste matrices is challenging for a variety of reasons. As a result of these unique challenges, the successful quantification of {sup 79}Se in the types of matrices present at SRS requires an extremely efficient and selective separation of {sup 79}Se from high levels of interfering radionuclides. A robust {sup 79}Se radiochemical separation method has been developed at the Savannah River National Laboratory (SRNL) which is routinely capable of successfully purifying {sup 79}Se from a wide range of interfering radioactive species. In addition to a dramatic improvements in the Kd, ease, and reproducibility of the analysis, the laboratory time has been reduced from several days to only 6 hours.