Powered by Deep Web Technologies
Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am...

2

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

3

Optical keyboard  

DOE Patents (OSTI)

An optical keyboard includes an optical panel having optical waveguides stacked together. First ends of the waveguides define an inlet face, and opposite ends thereof define a screen. A projector transmits a light beam outbound through the waveguides for display on the screen as a keyboard image. A light sensor is optically aligned with the inlet face for sensing an inbound light beam channeled through the waveguides from the screen upon covering one key of the keyboard image.

Veligdan, James T. (Manorville, NY); Feichtner, John D. (Fiddletown, CA); Phillips, Thomas E. (San Diego, CA)

2001-01-01T23:59:59.000Z

4

Keyboard acoustic emanations revisited  

Science Conference Proceedings (OSTI)

We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and then recovering up to 96% of typed characters. There is no need for a labeled ... Keywords: HMM, acoustic emanations, cepstrum, computer security, electronic eavesdropping, hidden Markov models, human factors, keyboards, learning theory, privacy, signal analysis

Li Zhuang; Feng Zhou; J. D. Tygar

2005-11-01T23:59:59.000Z

5

Keyboard acoustic emanations revisited  

Science Conference Proceedings (OSTI)

We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard and recovering up to 96% of typed characters. There is no need for training ... Keywords: Computer security, HMM, acoustic manations, cepstrum, electronic eavesdropping, hidden markov models, human factors, keyboards, learning theory, privacy, signal analysis

Li Zhuang; Feng Zhou; J. D. Tygar

2009-10-01T23:59:59.000Z

6

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

7

A practical pressure sensitive computer keyboard  

Science Conference Proceedings (OSTI)

A pressure sensitive computer keyboard is presented that independently senses the force level on every depressed key. The design leverages existing membrane technologies and is suitable for low-cost, high-volume manufacturing. A number of representative ... Keywords: force pressure sensitive keyboard

Paul H. Dietz; Benjamin Eidelson; Jonathan Westhues; Steven Bathiche

2009-10-01T23:59:59.000Z

8

Compromising electromagnetic emanations of wired and wireless keyboards  

Science Conference Proceedings (OSTI)

Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The ...

Martin Vuagnoux; Sylvain Pasini

2009-08-01T23:59:59.000Z

9

Bug Wars: a competitive exercise to find bugs in code  

Science Conference Proceedings (OSTI)

Software bugs are a common problem that students encounter in any Computer Science program. "Bug Wars" is a fun and competitive class exercise for student teams to identify bugs in code. To prepare for the competition, the instructor provides several ...

Renee Bryce

2011-12-01T23:59:59.000Z

10

Underground Layout Configuration  

SciTech Connect

The purpose of this analysis was to develop an underground layout to support the license application (LA) design effort. In addition, the analysis will be used as the technical basis for the underground layout general arrangement drawings.

A. Linden

2003-09-25T23:59:59.000Z

11

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

12

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

13

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

14

Trendy Bugs Topic Trends in the Android Bug Reports  

E-Print Network (OSTI)

Trendy Bugs Topic Trends in the Android Bug Reports Lee Martie, Vijay Krishna Palepu, Hitesh {lmartie, vpalepu, hsajnani, lopes}@ics.uci.edu Abstract--Studying vast volumes of bug and issue public issue tracker. This informs us of the features or parts of the project that are more problematic

Jones, James A.

15

Mining succinct predicated bug signatures  

Science Conference Proceedings (OSTI)

A bug signature is a set of program elements highlighting the cause or effect of a bug, and provides contextual information for debugging. In order to mine a signature for a buggy program, two sets of execution profiles of the program, one capturing ... Keywords: bug signature, feature selection, statistical debugging

Chengnian Sun; Siau-Cheng Khoo

2013-08-01T23:59:59.000Z

16

An adaptive keyboard with personalized language-based features  

Science Conference Proceedings (OSTI)

Our research is about an adaptive keyboard, which autonomously adjusts its predictive features and key displays to current user input. We used personalized word prediction to improve the performance of such a system. Prediction using common English dictionary ...

Siska Fitrianie; Leon J. M. Rothkrantz

2007-09-01T23:59:59.000Z

17

Efficient concurrency-bug detection across inputs  

Science Conference Proceedings (OSTI)

In the multi-core era, it is critical to efficiently test multi-threaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, ... Keywords: bug detection, concurrency bugs, multi-threaded software, software testing

Dongdong Deng, Wei Zhang, Shan Lu

2013-10-01T23:59:59.000Z

18

Alpine Pixel Detector Layout  

E-Print Network (OSTI)

A description of an optimized layout of pixel sensors based on a stave that combines both barrel and endcap module orientations. The mechanical stiffness of the structure is provided by carbon fiber shells spaced by carbon foam. The cooling of the modules is provided by two-phase $CO_{2}$ flowing in a thin titanium pipe glued inside the carbon fiber foam. The electrical services of all modules are provided by a single stave flex. This layout eliminates the need for separate barrel and endcap detector structures, and therefore the barrel services material in front of the endcap. The transition from barrel to endcap module orientation is optimized separately for each layer in order to minimize the active pixel area and the traversed material. The sparse module spacing in the endcap part of the stave allows for multiple fixation points, and for a stiff overall structure composed only of staves interconnected by stiff disks.

Delebecque, P; The ATLAS collaboration; Geffroy, N; Massol, N; Rambure, T; Todorov, T

2013-01-01T23:59:59.000Z

19

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

20

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

APS sector layout: Utilities, etc  

SciTech Connect

This bulletin describes the general physical layout of the APS Experiment Hall and the utilities that will be available for the beamlines.

Davey, S.

1993-02-01T23:59:59.000Z

22

APS sector layout: Utilities, etc.  

SciTech Connect

This bulletin describes the general physical layout of the APS Experiment Hall and the utilities that will be available for the beamlines.

Davey, S.

1993-02-01T23:59:59.000Z

23

The metro map layout problem  

Science Conference Proceedings (OSTI)

We initiate a new problem of automatic metro map layout. In general, a metro map consists of a set of lines which have intersections or overlaps. We define a set of aesthetic criteria for good metro map layouts and present a method to produce ...

Seok-Hee Hong; Damian Merrick; Hugo A. D. do Nascimento

2004-09-01T23:59:59.000Z

24

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

25

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

26

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

27

Finding and understanding bugs in C compilers  

Science Conference Proceedings (OSTI)

Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs ... Keywords: automated testing, compiler defect, compiler testing, random program generation, random testing

Xuejun Yang; Yang Chen; Eric Eide; John Regehr

2011-06-01T23:59:59.000Z

28

Research on Applying Unidirectional Loop Layout to Optimize Facility Layout in Workshop Based on Improved Genetic Algorithm  

Science Conference Proceedings (OSTI)

As a type of layout which can bring the material transport high flexibility, unidirectional loop layout is widely used in modern workshop layout. This paper deploys research around how to apply a unidirectional loop layout to optimize the facility layout ... Keywords: Unidirectional loop layout, improved genetic algorithm, facility layout, blade manufacturing workshop

Yi Zhang; Hu Zhang; Min-min Xia; Tong-tong Lu; Li-ling Jiang

2009-07-01T23:59:59.000Z

29

Algorithms for string and graph layout  

E-Print Network (OSTI)

Many graph optimization problems can be viewed as graph layout problems. A layout of a graph is a geometric arrangement of the vertices subject to given constraints. For example, the vertices of a graph can be arranged on ...

Newman, Alantha.

2004-01-01T23:59:59.000Z

30

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

31

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

32

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis...

33

Mining Bug Databases for Unidentified Software Vulnerabilities  

SciTech Connect

Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

2012-06-01T23:59:59.000Z

34

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 19790 of 28,905 results. 81 - 19790 of 28,905 results. Article U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny http://energy.gov/cio/articles/u-045-windows-win32ksys-keyboard-layout-bug-lets-local-users-deny-service Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article T-639: Debian update for libxml2 Libxml2 XPath Nodeset Processing Vulnerability http://energy.gov/cio/articles/t-639-debian-update-libxml2 Article T-613: Microsoft Excel Axis Properties Remote Code Execution

35

Automatic Layout Design for Power Module  

SciTech Connect

The layout of power modules is one of the key points in power module design, especially for high power densities, where couplings are increased. In this paper, along with the design example, an automatic design processes by using a genetic algorithm are presented. Some practical considerations and implementations are introduced in the optimization of module layout design.

Ning, Puqi [ORNL; Wang, Fei [ORNL; Ngo, Khai [Virginia Polytechnic Institute and State University (Virginia Tech)

2013-01-01T23:59:59.000Z

36

Hierarchical layout verification for submicron designs  

Science Conference Proceedings (OSTI)

In this paper we present the program HEXDRC for hierarchical circuit extraction and design rule check. The main problem for hierarchical layout verification is to handle interactions between different cells effectively. The kind of interactions however ...

W. Meier

1990-03-01T23:59:59.000Z

37

Power Optimization in VLSI Layout: A Survey  

Science Conference Proceedings (OSTI)

This paper presents a survey of layout techniques for designing low power digital CMOS circuits. It describes the many issues facing designers at the physical level of design abstraction and reviews some of the techniques and tools that have been ...

Massoud Pedram; Hirendu Vaishnav

1997-03-01T23:59:59.000Z

38

Automating Layouts of Sewers in Subdivisions  

Science Conference Proceedings (OSTI)

An important part of the creation of a housing subdivision is the design and layout of sewers underneath the road. This is a challenging cost optimization problem in a continuous threedimensional space. In this paper, heuristic-search-based techniques ...

Neil Burch; Robert Holte; Martin Müller; David O'Connell; Jonathan Schaeffer

2010-08-01T23:59:59.000Z

39

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

initially, the facility man- ager may have been able to a) reduce the capacity of the chiller and possibly the depth of the air distribution ducts, b) design the layout of the...

40

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

42

An approach to detecting duplicate bug reports using natural language and execution information  

Science Conference Proceedings (OSTI)

An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an ... Keywords: duplicate bug report, execution information, information retrieval

Xiaoyin Wang; Lu Zhang; Tao Xie; John Anvik; Jiasu Sun

2008-05-01T23:59:59.000Z

43

Using constraints to achieve stability in automatic graph layout algorithms  

Science Conference Proceedings (OSTI)

Automatic layout algorithms are commonly used when displaying graphs on the screen because they provide a “nice” drawing of the graph without user intervention. There are, however, a couple of disadvantages to automatic layout. Without user ...

Karl-Friedrich Böhringer; Frances Newbery Paulisch

1990-03-01T23:59:59.000Z

44

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

45

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

46

Repository surface design site layout analysis  

SciTech Connect

The purpose of this analysis is to establish the arrangement of the Yucca Mountain Repository surface facilities and features near the North Portal. The analysis updates and expands the North Portal area site layout concept presented in the ACD, including changes to reflect the resizing of the Waste Handling Building (WHB), Waste Treatment Building (WTB), Carrier Preparation Building (CPB), and site parking areas; the addition of the Carrier Washdown Buildings (CWBs); the elimination of the Cask Maintenance Facility (CMF); and the development of a concept for site grading and flood control. The analysis also establishes the layout of the surface features (e.g., roads and utilities) that connect all the repository surface areas (North Portal Operations Area, South Portal Development Operations Area, Emplacement Shaft Surface Operations Area, and Development Shaft Surface Operations Area) and locates an area for a potential lag storage facility. Details of South Portal and shaft layouts will be covered in separate design analyses. The objective of this analysis is to provide a suitable level of design for the Viability Assessment (VA). The analysis was revised to incorporate additional material developed since the issuance of Revision 01. This material includes safeguards and security input, utility system input (size and location of fire water tanks and pump houses, potable water and sanitary sewage rates, size of wastewater evaporation pond, size and location of the utility building, size of the bulk fuel storage tank, and size and location of other exterior process equipment), main electrical substation information, redundancy of water supply and storage for the fire support system, and additional information on the storm water retention pond.

Montalvo, H.R.

1998-02-27T23:59:59.000Z

47

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

48

V-016: HP Performance Insight Bugs with Sybase Database Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let...

49

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

50

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

51

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis...

52

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final...  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 DOENETL-20101406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This...

53

Facility Siting and Layout Optimization Based on Process Safety.  

E-Print Network (OSTI)

??In this work, a new approach to optimize facility layout for toxic release, fire and explosion scenarios is presented. By integrating a risk analysis in… (more)

Jung, Seungho

2012-01-01T23:59:59.000Z

54

Optimization Online - Mixed-Integer Linear Methods for Layout ...  

E-Print Network (OSTI)

Nov 27, 2012 ... Mixed-Integer Linear Methods for Layout-Optimization of Screening ... Abstract: The industrial treatment of waste paper in order to regain ...

55

Globally Optimal Solutions for Large Single-Row Facility Layout ...  

E-Print Network (OSTI)

May 22, 2006 ... This paper is concerned with the single-row facility layout problem ..... A standard way to tighten linear or semidefinite relaxations of binary ...

56

Unit load and material handling considerations in facility layout design  

E-Print Network (OSTI)

Dec 1, 2002 ... In this paper, the integration of unit load and material handling considerations in facility layout design is presented. This integration is based on ...

57

A New Mathematical-Programming Framework for Facility-Layout ...  

E-Print Network (OSTI)

Mar 11, 2002 ... The second model is an exact formulation of the facility-layout ... effort, which is advantageous for a user who wishes to consider several ...

58

A Spring-Embedding Approach for the Facility Layout Problem  

E-Print Network (OSTI)

a requirement; for example, planning of an airplane's dashboard, a city or a neighbourhood, a layout of office ...... U.S. Atomic Energy Commission Research and.

59

Bed bugs are blood-sucking insects in the family Cimicidae. Both nymphs  

E-Print Network (OSTI)

- trol this pest. IDENTIFICATION AND LIFE CYCLE Adult bed bugs (Figure 1) are oval, wing- less, about 1/5 inch long, and rusty red or mahogany. Their bodies are flattened, they have well-developed antennae, conenose bugs (also known as kissing bugs), by their smaller size, more rounded shape, and lack of wings

Hammock, Bruce D.

60

ConAir: featherweight concurrency bug recovery via single-threaded idempotent execution  

Science Conference Proceedings (OSTI)

Many concurrency bugs are hidden in deployed software and cause severe failures for end-users. When they finally manifest and become known by developers, they are difficult to fix correctly. To support end-users, we need techniques that ... Keywords: bug fixing, concurrency bugs, failure recovery, idempotency, static analysis

Wei Zhang; Marc de Kruijf; Ang Li; Shan Lu; Karthikeyan Sankaralingam

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

62

Prototypes for automated architectural 3D-layout  

Science Conference Proceedings (OSTI)

Prototypes for automated spatial layout in architecture focus on approaches, which define occupiable space as an orthogonal 2D-grid and use algorithms to allocate each rectangle of the grid to a particular function. However, these approaches are limiting ... Keywords: 3D-modeling and automated spatial layout, euclidean and non-euclidean geometries, satisfiability

Henriette Bier; Adriaan De Jong; Niels Brouwers; Marijn Heule; Hans Van Maaren / Gijs Van Der Hoorn

2007-09-01T23:59:59.000Z

63

Designing plant layouts with toxic releases based on wind statistics  

Science Conference Proceedings (OSTI)

A model to optimize the process plant layout problem is formulated in this paper. The model includes statistical information related to the wind in the site where the plant will be installed. This information is typically collected and stored in databases ... Keywords: Monte Carlo method, dispersion models, layout, uncertainty, wind effect

Richart Vázquez-Román; Jin-Han Lee; Seungho Jung; M. Sam Mannan

2008-08-01T23:59:59.000Z

64

Hydraulophone design considerations: absement, displacement, and velocity-sensitive music keyboard in which each key is a water jet  

Science Conference Proceedings (OSTI)

We present a musical keyboard that is not only velocity-sensitive, but in fact responds to absement (presement), displacement (placement), velocity, acceleration, jerk, jounce, etc. (i.e. to all the derivatives, as well as the integral, of displacement).Moreover, ... Keywords: FUNtain, direct user interface, duringtouch, fluid-user-interface, haptic surface, harmelodica, harmelotron (harmellotron), hydraulic-action, hydraulophone, pneumatophone, tangible user interface, tracker-action, underwater musical instrument, water-based immersive multimedia

Steve Mann; Ryan Janzen; Mark Post

2006-10-01T23:59:59.000Z

65

Research report: improving browsing in information by the automatic display layout  

Science Conference Proceedings (OSTI)

It is well known that graphical representations could be very helpful to browse in graph structured information. But this promising approach requires the capability of an automatic layout system because the tedious and time consuming task of a manual ... Keywords: automatic display layout, automatic layout system, computer animation, display layouts, graph structured information, graphical representations, graphical user interfaces, human factors, information browsing, information network, information retrieval, layout algorithms, manual layout, time consuming, user model, user modelling, user requests

P. Luders; R. Ernst

1995-10-01T23:59:59.000Z

66

Brown Marmorated The brown marmorated stink bug (BMSB), Halyomorpha  

E-Print Network (OSTI)

abdominal edge extending beyond wings MATURE NYMPH Banded antennae Spines in front of eyes and on shoulder edges Banded legs Dark bands on wing tips Blue-green metallic depressions on head and shoulder,UC JACKKELLYCLARK,UC RED SHOULDERED STINK BUG Edgeofabdomenconcealed;antennal bands, if present, are not white; less

Ishida, Yuko

67

Is this a bug or an obsolete test?  

Science Conference Proceedings (OSTI)

In software evolution, developers typically need to identify whether the failure of a test is due to a bug in the source code under test or the obsoleteness of the test code when they execute a test suite. Only after finding the cause of a failure can ...

Dan Hao, Tian Lan, Hongyu Zhang, Chao Guo, Lu Zhang

2013-07-01T23:59:59.000Z

68

NSLS-II Source Properties and Floor Layout  

NLE Websites -- All DOE Office Websites (Extended Search)

NSLS-II Source Properties and Floor Layout NSLS-II Source Properties and Floor Layout April 12, 2010 Contents Basic Storage Ring Parameters Basic and Advanced Source Parameters Brightness Flux Photon Source Size and Divergence Power Infrared Sources Distribution of Sources Available for User Beamlines Floor Layout This document provides a summary of the current NSLS-II source and floor layout parameters. For a more complete description of the NSLS-II accelerator properties planned for NSLS-II, see the NSLS-II Preliminary Design Report Basic NSLS-II Storage Ring Parameters at NSLS-II website. We note that this document summarizes the present status of the design, but that the design continues to be refined and that these parameters may change as part of this process. NSLS-II is designed to deliver photons with high average spectral brightness in the 2 keV to 10 keV

69

Running fermi with one-stage compressor: advantages, layout, performance  

E-Print Network (OSTI)

Running FERMI with one-stage compressor: advantages, layout,a lattice with one-stage compressor, it was thought at thetime that the two bunch compressors configuration was still

Cornacchia, M.; Craievich, P.; Di Mitri, S.; Penco, G.; Venturini, M.; Zholents, A.

2008-01-01T23:59:59.000Z

70

Photonic Device Layout Within the Foundry CMOS Design Environment  

E-Print Network (OSTI)

A design methodology to layout photonic devices within standard electronic complementary metal-oxide-semiconductor (CMOS) foundry data preparation flows is described. This platform has enabled the fabrication of designs ...

Orcutt, Jason Scott

71

A competitive genetic algorithm for single row facility layout  

E-Print Network (OSTI)

Feb 22, 2012 ... The single row facility layout is the NP-Hard problem of arranging facilities ..... with a user-specified probability p, the second fittest solution with ...

72

Multi-Floor Layout Problem with Elevators 22-Feb-2007  

E-Print Network (OSTI)

Feb 22, 2007 ... hot climates. The focus of this ...... Montreuil, B., 1987, Integrating design of cell layout, input/output I/O point configuration, and flow network of ...

73

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

74

Comparing the usability of grid-bag and constraint-based layouts  

Science Conference Proceedings (OSTI)

While the usability of GUI design methods has been studied in general, the usability of layout specification methods is largely unexplored. In this paper we provide an empirical comparison of two popular GUI layout models, grid-bag layout and constraint-based ... Keywords: API, empiric evaluation, layout, usability

Clemens Zeidler; Johannes Müller; Christof Lutteroth; Gerald Weber

2012-11-01T23:59:59.000Z

75

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

76

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

DK, Weiss R: Synthetic biology: new engineering rules for anfrom bugs to synthetic biology to fuels Sung Kuk Lee, Howardengineering and synthetic biology will provide new tools for

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

77

DON'T LET THE BED BUGS BITE We've all heard the saying, "sleep tight, don't let the bed bugs bite." Most of us have never  

E-Print Network (OSTI)

and appear bright red after feeding. The wings of bed bugs are vestigial, so they cannot fly. Bed bugs can. Small, flat, or raised bumps on the skin are the most common sign; redness, swelling, and itching

Bertini, Robert L.

78

WuKong: automatically detecting and localizing bugs that manifest at large system scales  

Science Conference Proceedings (OSTI)

A key challenge in developing large scale applications is finding bugs that are latent at the small scales of testing, but manifest themselves when the application is deployed at a large scale. Here, we ascribe a dual meaning to "large scale"---it could ... Keywords: feature reconstruction, program behavior prediction, scale-dependent bug

Bowen Zhou; Jonathan Too; Milind Kulkarni; Saurabh Bagchi

2013-06-01T23:59:59.000Z

79

Catch me if you can: performance bug detection in the wild  

Science Conference Proceedings (OSTI)

Profilers help developers to find and fix performance problems. But do they find performance bugs -- performance problems that real users actually notice? In this paper we argue that -- especially in the case of interactive applications -- traditional ... Keywords: latency bug, perceptible performance, profiling

Milan Jovic; Andrea Adamoli; Matthias Hauswirth

2011-10-01T23:59:59.000Z

80

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

82

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

83

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

84

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

85

Preconceptual ABC design definition and system configuration layout  

SciTech Connect

This document is the conceptual design document for the follow-on to the Molten Salt Breeder Reactor, known as the ABC type reactor. It addresses blanket design options, containment options, off-gas systems, drainage systems, and components/layouts of the primary, secondary, and tertiary systems, and it contains a number of diagrams for the configuration of the major systems.

Barthold, W. [Barthold & Associates, Inc., Knoxville, TN (United States)

1995-03-01T23:59:59.000Z

86

Biometric verification/identification based on hands natural layout  

Science Conference Proceedings (OSTI)

In this paper, a hand biometric system for verification and recognition purposes is presented. The method is based on three keys. Firstly, the system is based on using a Natural Reference System (NRS) defined on the hand's natural layout. Consequently, ... Keywords: Biometric systems, Hand geometry, Invariant features, Security, Similarity

Miguel Adán; Antonio Adán; Andrés S. Vázquez; Roberto Torres

2008-04-01T23:59:59.000Z

87

Conflict-free container routing in mesh yard layouts  

Science Conference Proceedings (OSTI)

Container terminals play an important role in global cargo transportation and they have become an essential intermodal interface between the sea and the land. In the container terminal, the service area is often arranged into rectangular blocks, which ... Keywords: Conflict-free, Container, Mesh yard layout, Number theory, Routing algorithm, Time requirement

Jianyang Zeng; Wen-Jing Hsu

2008-05-01T23:59:59.000Z

88

OFFSHORE WIND FARM LAYOUT OPTIMIZATION (OWFLO) PROJECT: AN INTRODUCTION  

E-Print Network (OSTI)

No complete mathematical model of offshore wind farm O&M costs has been found in the literature. Many studies expensive components of an offshore wind farm. Support structure, O&M, and wake models have been discussedOFFSHORE WIND FARM LAYOUT OPTIMIZATION (OWFLO) PROJECT: AN INTRODUCTION C. N. Elkinton* , J. F

Massachusetts at Amherst, University of

89

Linear Wind Farm Layout Optimization through Computational Intelligence  

Science Conference Proceedings (OSTI)

The optimal positioning of wind turbines, even in one dimension, is a problem with no analytical solution. This article describes the application of computational intelligence techniques to solve this problem. A systematic analysis of the optimal positioning ... Keywords: Far Wake Effects, Genetic Algorithms, Optimization, Simulated Annealing, Sitting, Turbulence and Roughness Length, Wind Farm Layout, Wind Turbines

José-Francisco Herbert-Acero; Jorge-Rodolfo Franco-Acevedo; Manuel Valenzuela-Rendón; Oliver Probst-Oleszewski

2009-11-01T23:59:59.000Z

90

Data Management and Layout for Shingled Magnetic Recording  

E-Print Network (OSTI)

on the data layouts em- ployed, the workloads experienced, and the architecture of the overall system, including the level of interfaces provided by the devices to higher levels of system software. While we the way in which the system must interact with the SWD. In addition to revised management of the SWD

Miller, Ethan L.

91

An efficient profile-analysis framework for data-layout optimizations  

Science Conference Proceedings (OSTI)

Data-layout optimizations rearrange fields within objects, objects within objects, and objects within the heap, with the goal of increasing spatial locality. While the importance of data-layout optimizations has been growing, their deployment has been ...

Shai Rubin; Rastislav Bodík; Trishul Chilimbi

2002-01-01T23:59:59.000Z

92

Constraint solving for beautiful user interfaces: how solving strategies support layout aesthetics  

Science Conference Proceedings (OSTI)

Layout managers provide an automatic way to place controls in a graphical user interface (GUI). With the wide distribution of fully GUI-enabled smartphones, as well as very large or even multiple personal desktop monitors, the logical size of commonly ... Keywords: GUIs, aesthetics, constraint based layout, layout manager

Clemens Zeidler; Christof Lutteroth; Gerald Weber

2012-07-01T23:59:59.000Z

93

Evolutionary computation approaches for real offshore wind farm layout: A case study in northern Europe  

Science Conference Proceedings (OSTI)

This paper presents the layout optimization of a real offshore wind farm in northern Europe, using evolutionary computation techniques. Different strategies for the wind farm design are tested, such as regular turbines layout or free turbines disposition ... Keywords: Evolutionary computation, Offshore wind farm design, Optimal layouts, Real case study

S. Salcedo-Sanz, D. Gallo-Marazuela, A. Pastor-SáNchez, L. Carro-Calvo, A. Portilla-Figueras, L. Prieto

2013-11-01T23:59:59.000Z

94

A revised electromagnetism-like mechanism for layout design of reconfigurable manufacturing system  

Science Conference Proceedings (OSTI)

The layout design problem is one of the most important issues for manufacturing system design and control. A revised electromagnetism-like mechanism (REM) is proposed in this paper for the layout design of reconfigurable manufacturing systems utilizing ... Keywords: Automated guided vehicle, Electromagnetism-like mechanism, Layout design, Variable neighbourhood search

Xianping Guan; Xianzhong Dai; Baijing Qiu; Jun Li

2012-08-01T23:59:59.000Z

95

Lower-Temperature Subsurface Layout and Ventilation Concepts  

Science Conference Proceedings (OSTI)

This analysis combines work scope identified as subsurface facility (SSF) low temperature (LT) Facilities System and SSF LT Ventilation System in the Technical Work Plan for Subsurface Design Section FY 01 Work Activities (CRWMS M&O 2001b, pp. 6 and 7, and pp. 13 and 14). In accordance with this technical work plan (TWP), this analysis is performed using AP-3.10Q, Analyses and Models. It also incorporates the procedure AP-SI.1Q, Software Management. The purpose of this analysis is to develop an overall subsurface layout system and the overall ventilation system concepts that address a lower-temperature operating mode for the Monitored Geologic Repository (MGR). The objective of this analysis is to provide a technical design product that supports the lower-temperature operating mode concept for the revision of the system description documents and to provide a basis for the system description document design descriptions. The overall subsurface layout analysis develops and describes the overall subsurface layout, including performance confirmation facilities (also referred to as Test and Evaluation Facilities) for the Site Recommendation design. This analysis also incorporates current program directives for thermal management.

Christine L. Linden; Edward G. Thomas

2001-06-20T23:59:59.000Z

96

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

97

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

98

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

99

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

100

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

102

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

103

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

104

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

105

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

106

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

107

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

108

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

109

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

110

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

111

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

112

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

113

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

114

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

115

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

116

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

117

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

118

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

119

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

120

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

122

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

123

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

124

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

125

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

126

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

127

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

128

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

129

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

130

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

131

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

132

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

133

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

134

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

135

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

136

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

137

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

138

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

139

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

140

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

142

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

143

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

144

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

145

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

146

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

147

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

148

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

149

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

150

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

151

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

152

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

153

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

154

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

155

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

156

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

157

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

158

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

159

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

160

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

162

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

163

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

164

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

165

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

166

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

167

ConMem: detecting severe concurrency bugs through an effect-oriented approach  

Science Conference Proceedings (OSTI)

Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly ... Keywords: concurrency bugs, software testing

Wei Zhang; Chong Sun; Shan Lu

2010-03-01T23:59:59.000Z

168

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-051: Oracle Solaris Java Multiple Vulnerabilities...

169

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

170

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

171

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

172

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

173

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

174

LAYOUT AND SIZING OF ESF ALCOVES AND REFUGE CHAMBERS  

SciTech Connect

The purpose of this analysis is to establish size requirements and approximate locations of Exploratory Studies Facility (ESF) test and operations alcoves, including refuge chambers during construction of the Topopah Spring (TS) loop. Preliminary conceptual layouts for non-deferred test alcoves will be developed to examine construction feasibility based on current test plans and available equipment. The final location and configuration layout for alcoves will be developed when in-situ rock conditions can be visually determined. This will be after the TBM has excavated beyond the alcove location and the rock has been exposed. The analysis will examine the need for construction of walkways and electrical alcoves in the ramps and main drift. Niches that may be required to accommodate conveyor booster drives and alignments are not included in this analysis. The analysis will develop design criteria for refuge chambers to meet MSHA requirements and will examine the strategic location of refuge chambers based on their potential use in various ESF fire scenarios. This document supersedes DI:BABE00000-01717-0200-00003 Rev 01, ''TS North Ramp Alcove and Stubout Location Analysis'' in its entirety (Reference 5-6).

John Beesley and Romeo S. Jurani

1995-08-25T23:59:59.000Z

175

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

,000 of its Prius hybrid vehicles following reports of vehicle warning lights illuminating for no reason, the root of the Prius issue wasn't a hardware problem -- it was a programming error in the smart car's embedded code. The Prius had a software bug. With that recall, the Pruis joined the ranks of the buggy

Overstreet, C. Michael

176

Single-Row Equidistant Facility Layout as a Special Case of Single ...  

E-Print Network (OSTI)

Mathematics, Uni Klagenfurt, Austria, philipp.hungerlaender@uni-klu.ac.at ... issues that arise in real-world applications, such as designing dynamic layouts by  ...

177

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

178

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

179

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

180

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

182

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

183

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

184

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

185

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

186

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

187

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

188

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

189

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

190

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

191

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

192

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

193

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

194

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

195

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

196

Semi-RAID: A reliable energy-aware RAID data layout for sequential data access  

Science Conference Proceedings (OSTI)

In this paper, we propose an alternative RAID data layout, Semi-RAID (S-RAID), for the kind of application that exhibits a sequential data access pattern. The data layout of S-RAID uses a grouping strategy that makes only part of the whole array active ...

Li Xiao; Tan Yu-An; Sun Zhizhuo

2011-05-01T23:59:59.000Z

197

Design of a 16T Nb{sub3}Sn Twin Bore Accelerator Dipole with a Window-frame Conductor Layout  

E-Print Network (OSTI)

Accelerator Dipole with a Window-Frame Conductor Layout*Accelerator Dipole with a Window-frame Conductor Layout, J.Nb3Sn Twin Dipole with a Window-Frame Conductor Layout J.M.

van Oort, J.M.

2011-01-01T23:59:59.000Z

198

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

199

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

200

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

202

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

203

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

204

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

205

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

206

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

207

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

208

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

209

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

210

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

211

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

212

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

213

Sandia Agile MEMS Prototyping, Layout Tools, Education and Services Program  

SciTech Connect

Research and development in the design and manufacture of Microelectromechanical Systems (MEMS) is growing at an enormous rate. Advances in MEMS design tools and fabrication processes at Sandia National Laboratories` Microelectronics Development Laboratory (MDL) have broadened the scope of MEMS applications that can be designed and manufactured for both military and commercial use. As improvements in micromachining fabrication technologies continue to be made, MEMS designs can become more complex, thus opening the door to an even broader set of MEMS applications. In an effort to further research and development in MEMS design, fabrication, and application, Sandia National Laboratories has launched the Sandia Agile MEMS Prototyping, Layout Tools, Education and Services Program or SAMPLES program. The SAMPLES program offers potential partners interested in MEMS the opportunity to prototype an idea and produce hardware that can be used to sell a concept. The SAMPLES program provides education and training on Sandia`s design tools, analysis tools and fabrication process. New designers can participate in the SAMPLES program and design MEMS devices using Sandia`s design and analysis tools. As part of the SAMPLES program, participants` designs are fabricated using Sandia`s 4 level polycrystalline silicon surface micromachine technology fabrication process known as SUMMiT (Sandia Ultra-planar, Multi-level MEMS Technology). Furthermore, SAMPLES participants can also opt to obtain state of the art, post-fabrication services provided at Sandia such as release, packaging, reliability characterization, and failure analysis. This paper discusses the components of the SAMPLES program.

Schriner, H.; Davies, B.; Sniegowski, J.; Rodgers, M.S.; Allen, J.; Shepard, C.

1998-05-01T23:59:59.000Z

214

A pattern matching algorithm for verification and analysis of very large IC layouts  

Science Conference Proceedings (OSTI)

We propose a simple, isometry invariant pattern matching algorithm for an effective data reduction useful in layout-related data processing of very complex IC designs. The repeatable geometrical features and attributes are stored in a pattern database. ...

Mariusz Niewczas; Wojciech Maly; Andrzej Strojwas

1998-04-01T23:59:59.000Z

215

RISCE—a reduced instruction set circuit extractor for hierarchical VLSI layout verification  

Science Conference Proceedings (OSTI)

We present a circuit extractor preserving the hierarchical layout structure isomorphically. As opposed to existing extractors, our approach permits all cell overlaps which are electrically meaningful. New mask operations based on stretched geometries ...

Volker Henkel; Ulrich Golze

1988-06-01T23:59:59.000Z

216

Optimization of central receiver concentrated solar thermal : site selection, heliostat layout & canting  

E-Print Network (OSTI)

In this thesis, two new models are introduced for the purposes of (i) locating sites in hillside terrain suitable for central receiver solar thermal plants and (ii) optimization of heliostat field layouts for any terrain. ...

Noone, Corey J. (Corey James)

2011-01-01T23:59:59.000Z

217

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

218

PARLO: PArallel Run-Time Layout Optimization for Scientific Data Explorations with Heterogeneous Access Pattern  

SciTech Connect

Download Citation Email Print Request Permissions Save to Project The size and scope of cutting-edge scientific simulations are growing much faster than the I/O and storage capabilities of their run-time environments. The growing gap is exacerbated by exploratory, data-intensive analytics, such as querying simulation data with multivariate, spatio-temporal constraints, which induces heterogeneous access patterns that stress the performance of the underlying storage system. Previous work addresses data layout and indexing techniques to improve query performance for a single access pattern, which is not sufficient for complex analytics jobs. We present PARLO a parallel run-time layout optimization framework, to achieve multi-level data layout optimization for scientific applications at run-time before data is written to storage. The layout schemes optimize for heterogeneous access patterns with user-specified priorities. PARLO is integrated with ADIOS, a high-performance parallel I/O middleware for large-scale HPC applications, to achieve user-transparent, light-weight layout optimization for scientific datasets. It offers simple XML-based configuration for users to achieve flexible layout optimization without the need to modify or recompile application codes. Experiments show that PARLO improves performance by 2 to 26 times for queries with heterogeneous access patterns compared to state-of-the-art scientific database management systems. Compared to traditional post-processing approaches, its underlying run-time layout optimization achieves a 56% savings in processing time and a reduction in storage overhead of up to 50%. PARLO also exhibits a low run-time resource requirement, while also limiting the performance impact on running applications to a reasonable level.

Gong, Zhenhuan [North Carolina State University, Raleigh; Boyuka, David [North Carolina State University, Raleigh; Zou, X [North Carolina State University, Raleigh; Liu, Gary [ORNL; Podhorszki, Norbert [ORNL; Klasky, Scott A [ORNL; Ma, Xiaosong [North Carolina State University, Raleigh; Samatova, Nagiza F [ORNL

2013-01-01T23:59:59.000Z

219

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

220

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

C:\MYDOCS\FBSS-M~1\HATTIE\LAYOUT94.TXT  

U.S. Energy Information Administration (EIA) Indexed Site

1993 Federal Buildings Supplemental Survey 1993 Federal Buildings Supplemental Survey Survey Data File Documentation Energy Information Administration August 1997 Overview of Survey Data File Documentation This document contains only the file layouts and variable codes for use with the 1993 Public Use files. For information on the FBSS and the organization and use of these files, please go to http://www/eia.doe.gov/emeu/cbecs/contents.html and click on: "1993 Micro-Data Files." Layout of Data Files A file layout is provided here for each of the 22 files. Column 1 is the variable name that is found in the files; column 2 is a brief description of the variable; column 3 is the variable position on the files.

222

Automatic fault extraction and simulation of layout realistic faults for integrated analogue circuits  

Science Conference Proceedings (OSTI)

A comprehensive tool has been implemented for the comparison of different test preparation techniques and target faults. It comprises of the realistic fault characterisation program LIFT that can extract sets of various faults from a given analogue or ... Keywords: AnaFAUL, LIFT, VCO, analogue integrated circuits, automatic analogue fault simulation program, catastrophic faults, circuit analysis computing, circuit layout, fault diagnosis, integrated analogue circuits, integrated circuit layout, integrated circuit testing, mixed analogue-digital integrated circuits, mixed-signal circuit, parametric faults, realistic fault characterisation program, simulation, test preparation, voltage-controlled oscillators

C. Sebeke; J. P. Teixeira; M. J. Ohletz

1995-03-01T23:59:59.000Z

223

Data Layout Transformation Exploiting Memory-Level Parallelism in Structured Grid Many-Core Applications  

E-Print Network (OSTI)

using a dense, regular grid as the primary data structure. Fluid dynamics and heat distribution, which general than a fixed stencil. Examples of structured grid applications include fluid dy- namics and heatData Layout Transformation Exploiting Memory-Level Parallelism in Structured Grid Many

Hwu, Wen-mei W.

224

Speeding up network layout and centrality measures for social computing goals  

Science Conference Proceedings (OSTI)

This paper presents strategies for speeding up calculation of graph metrics and layout by exploiting the parallel architecture of modern day Graphics Processing Units (GPU), specifically Compute Unified Device Architecture (CUDA) by Nvidia. Graph centrality ... Keywords: CUDA, social computing, social network analysis

Puneet Sharma; Udayan Khurana; Ben Shneiderman; Max Scharrenbroich; John Locke

2011-03-01T23:59:59.000Z

225

Relations, cards, and search templates: user-guided web data integration and layout  

Science Conference Proceedings (OSTI)

We present three new interaction techniques for aiding users in collecting and organizing Web content. First, we demonstrate an interface for creating associations between websites, which facilitate the automatic retrieval of related content. Second, ... Keywords: personalized web search, template-based representation, view and layout editing, web content extraction

Mira Dontcheva; Steven M. Drucker; David Salesin; Michael F. Cohen

2007-10-01T23:59:59.000Z

226

Layout-Aware Multi-Layer Multi-Level Scan Tree Synthesis  

Science Conference Proceedings (OSTI)

In this paper, we propose a layout-aware scan tree synthesis methodology. Scan tree can greatly reduce test data volume, which is very desirable in SOC testing. However, previous researches on scan tree synthesis have not considered routing issues in ...

Sying-Jyan Wang; Xin-Long Li; Katherine Shu-Min Li

2007-10-01T23:59:59.000Z

227

Accelerator-based conversion (ABC) of weapons plutonium: Plant layout study and related design issues  

Science Conference Proceedings (OSTI)

In preparation for and in support of a detailed R and D Plan for the Accelerator-Based Conversion (ABC) of weapons plutonium, an ABC Plant Layout Study was conducted at the level of a pre-conceptual engineering design. The plant layout is based on an adaptation of the Molten-Salt Breeder Reactor (MSBR) detailed conceptual design that was completed in the early 1070s. Although the ABC Plant Layout Study included the Accelerator Equipment as an essential element, the engineering assessment focused primarily on the Target; Primary System (blanket and all systems containing plutonium-bearing fuel salt); the Heat-Removal System (secondary-coolant-salt and supercritical-steam systems); Chemical Processing; Operation and Maintenance; Containment and Safety; and Instrumentation and Control systems. Although constrained primarily to a reflection of an accelerator-driven (subcritical) variant of MSBR system, unique features and added flexibilities of the ABC suggest improved or alternative approaches to each of the above-listed subsystems; these, along with the key technical issues in need of resolution through a detailed R&D plan for ABC are described on the bases of the ``strawman`` or ``point-of-departure`` plant layout that resulted from this study.

Cowell, B.S.; Fontana, M.H. [Oak Ridge National Lab., TN (United States); Krakowski, R.A.; Beard, C.A.; Buksa, J.J.; Davidson, J.W.; Sailor, W.C.; Williamson, M.A. [Los Alamos National Lab., NM (United States)

1995-04-01T23:59:59.000Z

228

Design of wind farm layout for maximum wind energy capture Andrew Kusiak*, Zhe Song  

E-Print Network (OSTI)

Design of wind farm layout for maximum wind energy capture Andrew Kusiak*, Zhe Song Intelligent sources of alternative energy. The construction of wind farms is destined to grow in the U.S., possibly twenty-fold by the year 2030. To maximize the wind energy capture, this paper presents a model for wind

Kusiak, Andrew

229

A density based approach to the access point layout smart distribution grid design optimization problem  

Science Conference Proceedings (OSTI)

Advanced metering infrastructure (AMI) is an integral part of the smart grid. It plays a significant role in control and management for utilities. Along with its pervasiveness, effective AMI network design has drawn more attention. To some extent, the ... Keywords: genetic algorithm, layout optimization, multi-objective optimization, neighborhood area network, smart grid

Bin Zhang; Kamran Shafi; Hussein A. Abbass

2012-12-01T23:59:59.000Z

230

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

231

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

232

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

233

This Bug Man Is a Pest George Ledin teaches students how to write viruses, and it makes  

E-Print Network (OSTI)

's going on in Ledin's classroom. He has been likened to A.Q. Khan, the Pakistani scientist who sold--and the http://www.newsweek.com/2008/08/01/this-bug-man-is-a-pest.prin... 1 of 2 #12;hackers. "We've changed

Ravikumar, B.

234

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

235

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

236

Tube vibration in industrial-size test heat exchanger (90/sup 0/ square layout)  

SciTech Connect

Tube vibrations in heat exchangers are being systematically investigated in a series of tests performed with an industrial-size test exchanger. Results from waterflow tests of eleven different tube bundles, in six- and eight-crosspass configurations on a 90/sup 0/ square layout with a pitch-to-diameter ratio of 1.25 are reported. The test cases include full tube bundles, no-tubes-in-window bundles, finned tube bundles, and proposed field and design fixes. The testing focused on identification of the lowest critical flowrate to initiate fluidelastic instability (large amplitude tube motion) and the location within the bundle of the tubes which first experience instability. The test results are tabulated to permit comparison with results obtained from previous tests with a 30/sup 0/ triangular layout tube bundle. Instability criteria are evaluated preliminarily. Pressure drop data are also generated and reported.

Halle, H.; Wambsganss, M.W.

1983-02-01T23:59:59.000Z

237

DESIGN AND LAYOUT CONCEPTS FOR COMPACT, FACTORY-PRODUCED, TRANSPORTABLE, GENERATION IV REACTOR SYSTEMS  

SciTech Connect

The purpose of this research project is to develop compact (100 to 400 MWe) Generation IV nuclear power plant design and layout concepts that maximize the benefits of factory-based fabrication and optimal packaging, transportation and siting. The reactor concepts selected were compact designs under development in the 2000 to 2001 period. This interdisciplinary project was comprised of three university-led nuclear engineering teams identified by reactor coolant type (water, gas, and liquid metal) and a fourth Industrial Engineering team. The reactors included a Modular Pebble Bed helium-cooled concept being developed at MIT, the IRIS water-cooled concept being developed by a team led by Westinghouse Electric Company, and a Lead-Bismuth-cooled concept developed by UT. In addition to the design and layout concepts this report includes a section on heat exchanger manufacturing simulations and a section on construction and cost impacts of proposed modular designs.

Mynatt Fred R.; Townsend, L.W.; Williamson, Martin; Williams, Wesley; Miller, Laurence W.; Khan, M. Khurram; McConn, Joe; Kadak, Andrew C.; Berte, Marc V.; Sawhney, Rapinder; Fife, Jacob; Sedler, Todd L.; Conway, Larry E.; Felde, Dave K.

2003-11-12T23:59:59.000Z

238

Evaluation of land utilization and circulation system in an urban layout : case study, new town of Gandhinagar, India  

E-Print Network (OSTI)

The study evaluates the issues of an Urban Layout in an existing situation of a new town in India and a model is prepared based on the observations. The comparison is made between the existing case and the proposed model. ...

Dabu, Navroz N

1983-01-01T23:59:59.000Z

239

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Southeastern Power Administration Southeastern Power Administration Annual Report 2012 Hartwell Dam 50th Anniversary 2 0 1 2 A N N U A L R E P O R T S O U T H E A S T E R N P O W E R A D M I N I S T R A T I O N 2 Fast Facts ....................................................................................................................2 Letter to the Secretary ..............................................................................................3 Human Capital Initiatives ......................................................................................4 Strategic Plan 2012 - 2015.........................................................................................4 ePerformance Implementation ...............................................................................4 Information Management........................................................................................4

240

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ANNUAL REPORT 2007 SEPA ANNUAL REPORT Contents Fast Facts ..........................................................................................2 Letter to the Secretary .......................................................................3 Marketing Area .................................................................................4 Customer Funding.............................................................................5 Energy Efficiency and Renewable Energy Program ..............................6 Drought Conditions in the Southeast ..................................................6 Energy Policy Act - Section 1834 Study ..............................................6 Cumberland System Dam Safety Issues ..............................................7 Cyber and Physical Security...............................................................7

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Technology Laboratory's Native American Initiative seeks to stimulate economic development Energy Technology Laboratory's Native American Initiative seeks to stimulate economic development and increase oil and natural gas production on American Indian lands while protecting the environment. The pro- gram supports the development and application of innovative petroleum technologies, and promotes government- to-government relationships and tribal partnerships with industry and academia-resulting in increased revenues and educational benefits for tribal members. Some 13 million barrels of oil and 300 billion cubic feet of natural gas were produced on American Indian lands in 2002, generating $183 million for tribes and allottees. However, potential revenue is far greater. If only a fraction of the estimated 890 million barrels of oil and 5.6 trillion cubic feet of gas on American Indian lands were produced,

242

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ANNUAL ANNUAL REPORT SOUTHEASTERN POWER ADMINISTRATION 1 2010 SEPA ANNUAL REPORT Fast Facts ....................................................................................................................2 Letter to the Secretary ..............................................................................................3 Customer Funding....................................................................................................4 Cumberland System Dam Safety Issues................................................................5 Human Capital Initiatives .......................................................................................5 Contract Negotiations ..............................................................................................5 Energy Efficiency

243

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

Hurricanes Hurricanes are strong storms that cause life- and property- threatening hazards such as flooding, storm surge, high winds and tornadoes. Preparation is the best protection against the dangers of a hurricane. Know the Difference Hurricane Watch-Hurricane conditions are a threat within 48 hours. Review your hurricane plans, keep informed and be ready to act if a warning is issued. Hurricane Warning-Hurricane conditions are expected within 36 hours. Complete your storm preparations and leave the area if directed to do so by authorities. J Listen to a NOAA Weather Radio for critical information from the National Weather Service (NWS). J Check your disaster supplies and replace or restock as needed. J Bring in anything that can be picked up by the wind (bicycles, lawn furniture). J Close windows, doors and hurricane shutters. If you do not have hurricane shutters, close and board up all

244

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

N N NOTICE OTICE In the first instance, an employee was using a floor- mounted abrasive cut-off wheel saw to remove bolts extending past a plate's surface when the wheel shat- tered. The employee's right thumb was impacted, break- ing the thumbnail, splitting open the skin, and shattering the thumb's end bone. Use of a hand-held, angle-head cutting wheel tool, or making a jig to hold the plate in place would have prevented this injury. In the second case, an employee was using a pneu- matic crimping tool. The open end of the tool's jaws was not guarded. The injury occurred when the tip of the employee's right-hand little finger was in the wrong place at the wrong time and the tool's jaws shut on the finger- tip. This resulted in the fingernail being cut through, an open cut on the bottom of the fingertip, and a chipped end bone. The injury would have been avoided had the open jaws been guarded. Unfortunately,

245

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HE HE MISSION of Southeastern Power Administration is to market and deliver federal hydroelectric power at the lowest possible cost to public bodies and cooperatives in the southeastern United States. Southeastern will excel in an evolving energy market by maintaining a well-trained, flexible workforce in an open, rewarding and safe environment. Marketing Area: Alabama, Florida, Georgia, Illinois, Kentucky, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, and West Virginia Customers: Electric Cooperatives .......................................... 198 Public Bodies ........................................................ 290 Investor-Owned Utilities ........................................1 Total..................................................................

246

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

This This page intentionally left blank. OCTOBER 1, 2010 - MARCH 31, 2011 1 SEMIANNUAL REPORT TO CONGRESS Table of Contents Message from the Inspector General . . . . . . . . . . . . . . . . . . . . . . . . . 2 Key Accomplishments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Implementation of the American Recovery and Reinvestment Act of 2009 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Other Significant Audits, Inspections, and Reviews . . . . . . . . . . . . 13 Investigative Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Positive Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Highlights Based on Office of Inspector General Work . . . . . . . . . . . . . . . . 29 Congressional Responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Legislative and Regulatory Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Hotline System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Qui Tams . . . . . . . . . . . . . . . .

247

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

October 2010 October 2010 Issue #5 COMMERCIAL MOTOR VEHICLE ROADSIDE TECHNOLOGY CORRIDOR Federal Motor Carrier Safety Administration Office of Analysis, Research, and Technology CMV Technologies Showcased in Tennessee The second triennial Fed- eral Motor Carrier Safety Ad- ministration (FMCSA) Commercial Motor Vehicle (CMV) Safety Technology Showcase was conducted within FMCSA's Commercial Motor Vehicle Roadside Tech- nology Corridor (CMVRTC) at the Greene County, Ten- nessee, CMV Inspection sta- tion on October 14, 2010. The event was conducted in part- nership with Oak Ridge Na- tional Laboratory (ORNL), which facilitated the event, and the Tennessee Department of Transportation, Tennessee Department of Safety, and the University of Tennessee. FMCSA Administrator Anne S. Ferro was among

248

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

22 22 0163-6804/11/$25.00 © 2011 IEEE INTRODUCTION Emerging paradigms for next-generation net- work architectures revolve around the notion of the network as a heterogeneous "multilayer, multitechnology" construct over which multiple "services" can be provided. These services include traditional IP-routed services as well as native access services from lower layers based on technologies such as multiprotocol label switch- ing (MPLS), Ethernet, Ethernet provider back- bone bridge (PBB), synchronous optical networking (SONET)/synchronous digital hierar- chy (SDH), next-generation SONET/SDH, and wavelength-division multiplexing (WDM). It is envisioned that such direct access to and control of lower layers will enable advanced traffic engi- neering of IP routed networks, along with the

249

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

COMMERCIAL MOTOR VEHICLE COMMERCIAL MOTOR VEHICLE ROADSIDE TECHNOLOGY CORRIDOR October 2009 Issue !4 Federal Motor Carrier Safety Administration Office of Analysis, Research, and Technology "In about 96 percent of cases there was not a statistically significant degradation of the brakes during the FOT." (Page 1) "Nearly 64 percent of vehicles flagged by SIRIS were placed OOS, and fully 77 percent were found to exhibit one or more safety flaws." (Page 3) Brake Wear and Performance FOT The Oak Ridge National Laboratory com- pleted the Brake Wear and Performance Test (BWPT) field operation test (FOT) and data analysis in September 2009. This effort in- cluded assisting the Tennessee Department of Safety (TDOS) in the procurement and installa- tion of a Performance-Based Brake Testing

250

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

JGI, JGI, approaching its eighth year of existence and its sixth of operation at the Production Genomics Facility (PGF) in Walnut Creek, continues to grow-in staff, space requirements and the posi- tive impact our sequencing and science are having on the scientific community. As our influence and distance between our workstations expands, there emerges a need to keep our team bet- ter informed and to cultivate an environ- ment that recognizes our meaningful contributions to this growing concern, hence the creation of The JGI Primer. On the occasion of the maiden voyage of our newsletter, The JGI Primer, I would like to share with you my enthusiasm for my favorite holiday, Halloween. For me and my lab, Halloween has always served as an occasion to bring us together for some big fun.

251

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

Liquid-gas cylinder hand trucks similar to the Harper Liquid-gas cylinder hand trucks similar to the Harper Model ULG65050-51 (A) use a spring-loaded hook assembly (B) to engage with the liquid nitrogen Dewar support ring. This provides a positive point of contact allowing the Dewar to be tilted onto the hand truck for transport. Failure of this spring assembly can result in a loss of control, allowing the Dewar to become separated from the hand truck, leading to a very dangerous sit- uation. If the spring is weak such that it fails to fully engage the Dewar, replacement springs can be purchased through welding suppliers using part number HDW- SP-UL650-8 The entire cart assembly can be replaced with a newer model from Harper (model number 650-50-51). A potential replacement is an upright style cart such as the EZ Load 4L for SAFTCART (C). This is a cart

252

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fast Facts ............................................................................................2 Letter to the Secretary .........................................................................3 Customer Funding ...............................................................................4 Energy Efficiency and Renewable Energy Program ................................5 Cumberland System Dam Safety Issues ................................................5 Cyber and Physical Security..................................................................6 Drought Conditions in the Southeast ...................................................6 Marketing Objectives...........................................................................7 Marketing Area....................................................................................8

253

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vi vi This page intentionally left blank. vii Contract and Project Management: Corrective Action Plan JULY 2008 Executive Summary Achieving and maintaining excellence in contract and project management is a top priority for the Department of Energy (DOE). To accomplish this goal, the Department has already implemented a series of significant contract and project management reforms, including the conduct of a root cause analysis (RCA) to identify the major challenges to planning and managing DOE projects. The RCA pinpoints opportunities for improving the Department's management of contracts and projects and is serving as the foundation for developing and implementing corrective measures to improve performance and, ultimately, being removed from the Government Accountability

254

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

14 14 0163-6804/11/$25.00 © 2011 IEEE 1 See the reports collected at http://www.es.net/ requirements.html 2 See "National Lab" and "User Facilities" tabs at http://www.sc.doe.gov/ INTRODUCTION Across a number of scientific disciplines, users are demanding more network capabilities, including higher network end-to-end throughput, guaranteed bandwidth, and quality of service, in order to collaborate and share large amounts of data around the globe. In many fields, scientific discovery is now directly related to the amount of data that can be shared, accessed, and pro- cessed collaboratively. Our understanding of the requirements of modern science for network services has emerged from detailed discussions with researchers 1 about how their analysis and simu-

255

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

A follow- up SAXS experiment exposed the solu- tion to a number of 4-sec x-ray bursts. The experimental data showed that the initially-unordered filaments (revealed by the...

256

Blank Layout  

Science Conference Proceedings (OSTI)

Table 4   Scrap allowance for blanking...t Edge of stock to blank Between blanks in row Thickness of stock, t Edge of stock to blank Between blanks in row mm in. mm in. mm in. mm in. mm in. mm in. Metals in general Up to 0.53 Up to 0.021 1.27 0.050 1.27 0.050 Up to 1.12 Up to 0.044 1.27 0.050 1.27 0.050 Standard strip stock 0.56â??1.40...

257

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

pictures and mirrors, away from beds, couches and anywhere people sleep or sit. Brace overhead light fixtures. Install strong latches or bolts on cabinets. Large or heavy...

258

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

light elements are present in the core? What is the energy source that drives the geomagnetic dynamo? How does the core melting temperature vary with composition? What is the...

259

SQE Layout  

National Nuclear Security Administration (NNSA)

Laboratory: A Hydrodynamic Instability Calculation on the cover: graphic design and production Michael Vittitow - Creative Arts Department-12620, Sandia National...

260

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Governor's Guide to Clean Power Generation and Energy Efficiency A Report for the National Governors Association as part of the Securing a Clean Energy Future Initiative F ounded...

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

Few stop to consider the consequences Few stop to consider the consequences of their daily ablutions, the washing of clothes, the watering of lawns, and the flush of a toilet. However, wastewater treatment-one of the cornerstones of modern civilization-is inside this issue 2. Finishers Convene in NM Spot Awards 3. Termites in Costa Rica 4. Profile: Erika Lindquist 5. Plant Pathogens Decoded OPA Recipients 6. Young Investigator Winner 8. Spotlight on Safety 9. Hazards of Being a Microbiologist 10. All About Webfeeds 11. Eukaryotic Finishing at Stanford 12. Symbiotic Tree Fungus 17. New CSP Targets 19. Pichia stipitis 20. Aspergillus niger PRIMER the October 2006 Volume 3 Issue 2 First Tree Genome Is Published: Poplar Holds Promise as Renewable Bioenergy Resource Wood from a common tree may one day figure prominently in meeting trans-

262

Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

32 32 0163-6804/11/$25.00 © 2011 IEEE INTRODUCTION A grid network is a collection of geographical- ly distributed resources, such as storage clus- ters, supercomputers, and scientific equipment, that are accessible to users over a network. Examples of e-Science grids include the Large Hadron Collider Computing Grid Project, the Biomedical Informatics Research Network, and the George E. Brown Network for Earthquake Engineering and Simulation. These networks typically deal with the trans- fer of large amounts of data in the terabytes and petabytes range. When the grid resources are connected by application-configurable optical paths (e.g., on an optical wavelength- routed network), the grid can be considered a LambdaGrid [1]. Optical wavelength-routed wavelength-divi-

263

Layout 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

s s o u t h e a s t e r n p o w e r a d m i n i s t r a t i o n 2011 a n n u a l r e p o r t 2 s o u t h e a s t e r n p o w e r a d m i n i s t r a t i o n 2 0 1 1 a n n u a l r e p o r t Fast Facts ....................................................................................................................2 Letter to the Secretary ..............................................................................................3 Human Capital .........................................................................................................4 Information Management .......................................................................................4 Energy Efficiency and Renewable Energy ............................................................4 Customer Funding....................................................................................................5

264

Claviers GAG: claviers logiciels optimisés pour la saisie de texte au stylet  

Science Conference Proceedings (OSTI)

The character layout on the keyboards of our computers dates from more than one century and had been designed for reasons which are no longer standing. This layout is all the more annoying when the text input is doing with one finger (or via a stylus) ... Keywords: characters layout, optimisation, soft keyboard

Mathieu Raynal

2006-04-01T23:59:59.000Z

265

Persistent Data Layout and Infrastructure for Efficient Selective Retrieval of Event Data in ATLAS  

E-Print Network (OSTI)

The ATLAS detector at CERN has completed its first full year of recording collisions at 7 TeV, resulting in billions of events and petabytes of data. At these scales, physicists must have the capability to read only the data of interest to their analyses, with the importance of efficient selective access increasing as data taking continues. ATLAS has developed a sophisticated event-level metadata infrastructure and supporting I/O framework allowing event selections by explicit specification, by back navigation, and by selection queries to a TAG database via an integrated web interface. These systems and their performance have been reported on elsewhere. The ultimate success of such a system, however, depends significantly upon the efficiency of selective event retrieval. Supporting such retrieval can be challenging, as ATLAS stores its event data in column-wise orientation using ROOT trees for a number of reasons, including compression considerations, histogramming use cases, and more. For 2011 data, ATLAS will utilize new capabilities in ROOT to tune the persistent storage layout of event data, and to significantly speed up selective event reading. The new persistent layout strategy and its implications for I/O performance are described in this paper.

Peter van Gemmeren; David Malon

2011-09-14T23:59:59.000Z

266

SharedCanvas: A Collaborative Model for Medieval Manuscript Layout Dissemination  

SciTech Connect

In this paper we present a model based on the principles of Linked Data that can be used to describe the interrelationships of images, texts and other resources to facilitate the interoperability of repositories of medieval manuscripts or other culturally important handwritten documents. The model is designed from a set of requirements derived from the real world use cases of some of the largest digitized medieval content holders, and instantiations of the model are intended as the input to collection-independent page turning and scholarly presentation interfaces. A canvas painting paradigm, such as in PDF and SVG, was selected based on the lack of a one to one correlation between image and page, and to fulfill complex requirements such as when the full text of a page is known, but only fragments of the physical object remain. The model is implemented using technologies such as OAI-ORE Aggregations and OAC Annotations, as the fundamental building blocks of emerging Linked Digital Libraries. The model and implementation are evaluated through prototypes of both content providing and consuming applications. Although the system was designed from requirements drawn from the medieval manuscript domain, it is applicable to any layout-oriented presentation of images of text.

Sanderson, Robert D. [Los Alamos National Laboratory; Albritton, Benjamin [Stanford University; Schwemmer, Rafael [e-codices; Van De Sompel, Herbert [Los Alamos National Laboratory

2011-01-01T23:59:59.000Z

267

Optical layout for a 10m Fabry-Pérot Michelson interferometer with tunable stability  

E-Print Network (OSTI)

The sensitivity of high-precision interferometric measurements can be limited by Brownian noise within dielectric mirror coatings. This occurs, for instance, in the optical resonators of gravitational wave detectors where the noise can be reduced by increasing the laser beam size. However, the stability of the resonator and its optical performance often impose a limit on the maximally feasible beam size. In this article we describe the optical design of a 10\\,m Fabry-P\\'erot Michelson interferometer with tunable stability. Our design will allow us to carry out initial commissioning with arm cavities of high stability, while afterwards the arm cavity length can be increased stepwise towards the final, marginally stable configuration. Requiring only minimal hardware changes, with respect to a comparable "static" layout, the proposed technique will not only enable us to explore the stability limits of an optical resonator with realistic mirrors exhibiting inevitable surface imperfections, but also the opportunity to measure coating Brownian noise at frequencies as low as a few hundred Hertz. A detailed optical design of the tunable interferometer is presented and requirements for the optical elements are derived from robustness evaluations.

Christian Gräf; Stefan Hild; Harald Lück; Benno Willke; Kenneth A. Strain; Stefan Goßler; Karsten Danzmann

2011-12-08T23:59:59.000Z

268

On some selected issues in VLSI Interconnect Layouts in the nanometer range by  

E-Print Network (OSTI)

On some selected issues in VLSI Interconnect Layouts in the nanometer range The advent of deep sub-micron and nanometric regime for CMOS semiconductor technology has resulted in several restrictions in the physical design of VLSI circuits primarily through constraints imposed by interconnects. These constraints typically include the interconnect delay, congestion, cross-talk, power dissipation and others. These issues have to be considered in the physical design of VLSI circuits. For a specific set of design goals, faster design convergence is often achieved by considering estimates of some or all of these parameters in the physical synthesis and logic synthesis stages. Thus, accurate estimation of these parameters have direct impact on issues such as convergence, performance, yield and manufacturability of chips, and there is immense scope of research in design and performance of interconnects. In addition to these, efforts are on for exploration and use of routing architectures which are different from the traditional Manhattan architecture. In this survey, we attempt to provide a brief overview of some of the select areas of the state-of-the art research on interconnect routing in the deep sub-micron and nanometer range. 1.

Partha Sarathi Dasgupta

2008-01-01T23:59:59.000Z

269

Layout-Aware I/O Scheduling for Terabits Data Movement  

Science Conference Proceedings (OSTI)

Many science facilities, such as the Department of Energy s Leadership Computing Facilities and experimental facilities including the Spallation Neutron Source, Stanford Linear Accelerator Center, and Advanced Photon Source, produce massive amounts of experimental and simulation data. These data are often shared among the facilities and with collaborating institutions. Moving large datasets over the wide- area network (WAN) is a major problem inhibiting collaboration. Next- generation, terabit-networks will help alleviate the problem, however, the parallel storage systems on the end-system hosts at these institutions can become a bottleneck for terabit data movement. The parallel storage system (PFS) is shared by simulation systems, experimental systems, analysis and visualization clusters, in addition to wide-area data movers. These competing uses often induce temporary, but significant, I/O load imbalances on the storage system, which impact the performance of all the users. The problem is a serious concern because some resources are more expensive (e.g. super computers) or have time-critical deadlines (e.g. experimental data from a light source), but parallel file systems handle all requests fairly even if some storage servers are under heavy load. This paper investigates the problem of competing workloads accessing the parallel file system and how the performance of wide-area data movement can be improved in these environments. First, we study the I/O load imbalance problems using actual I/O performance data collected from the Spider storage system at the Oak Ridge Leadership Computing Facility. Second, we present I/O optimization solutions with layout-awareness on end-system hosts for bulk data movement. With our evaluation, we show that our I/O optimization techniques can avoid the I/O congested disk groups, improving storage I/O times on parallel storage systems for terabit data movement.

Kim, Youngjae [ORNL] [ORNL; Atchley, Scott [ORNL] [ORNL; Vallee, Geoffroy R [ORNL] [ORNL; Shipman, Galen M [ORNL] [ORNL

2013-01-01T23:59:59.000Z

270

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

271

A new code for the design and analysis of the heliostat field layout for power tower system  

Science Conference Proceedings (OSTI)

A new code for the design and analysis of the heliostat field layout for power tower system is developed. In the new code, a new method for the heliostat field layout is proposed based on the edge ray principle of nonimaging optics. The heliostat field boundary is constrained by the tower height, the receiver tilt angle and size and the heliostat efficiency factor which is the product of the annual cosine efficiency and the annual atmospheric transmission efficiency. With the new method, the heliostat can be placed with a higher efficiency and a faster response speed of the design and optimization can be obtained. A new module for the analysis of the aspherical heliostat is created in the new code. A new toroidal heliostat field is designed and analyzed by using the new code. Compared with the spherical heliostat, the solar image radius of the field is reduced by about 30% by using the toroidal heliostat if the mirror shape and the tracking are ideal. In addition, to maximize the utilization of land, suitable crops can be considered to be planted under heliostats. To evaluate the feasibility of the crop growth, a method for calculating the annual distribution of sunshine duration on the land surface is developed as well. (author)

Wei, Xiudong; Lu, Zhenwu; Yu, Weixing [Changchun Institute of Optics, Fine Mechanics and Physics of Chinese Academy of Sciences, Changchun 130033 (China); Wang, Zhifeng [The Key Laboratory of Solar Thermal Energy and Photovoltaic system, Institute of Electrical Engineering, Chinese Academy of Sciences, Beijing 100190 (China)

2010-04-15T23:59:59.000Z

272

Keyboards redux: Fast mobile text entry  

E-Print Network (OSTI)

Text entry research is in vogue again, and inventors are flocking to conferences and meetings worldwide to show their methods. What’s causing this resurgence of interest in a topic that’s been dormant for so long? WIRELESS MESSAGING In 2003, wireless messaging accounted for US$16 billion in revenue for mobile phone service providers. Some forecasters predict that between 1 and 2 trillion messages will be sent this year, and analysts say that mobile email will be the next big market for the European industry. Other markets, such as mobile gaming

Thad E. Starner; Thad Starner

2004-01-01T23:59:59.000Z

273

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

burden of drug-resistant TB, including four – China, India,on drug-resistant TB organized by WHO in Beijing, China, inChina, the Democratic Republic of the Congo, Estonia, Ethiopia, Georgia, India, Indonesia, in new drug-

WHO

2012-01-01T23:59:59.000Z

274

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

27 such countries: Armenia, Azerbaijan, Bangladesh, Belarus,independent states, such as Azerbaijan, the Republic of49 avian influenza 126 Azerbaijan 114 B bacille Calmette–

WHO

2012-01-01T23:59:59.000Z

275

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

276

Personalized input: improving ten-finger touchscreen typing through automatic adaptation  

Science Conference Proceedings (OSTI)

Although typing on touchscreens is slower than typing on physical keyboards, touchscreens offer a critical potential advantage: they are software-based, and, as such, the keyboard layout and classification models used to interpret key presses can dynamically ... Keywords: adaptive interfaces, personalization, touchscreen text input

Leah Findlater; Jacob Wobbrock

2012-05-01T23:59:59.000Z

277

layout pages.indd  

Science Conference Proceedings (OSTI)

Aug 14, 2005 ... Noble Metal & SCC Mitigation Cliff Lodge, Ballroom I .... In Search of the True Temperature and Stress Intensity Factor Dependencies for ...

278

NUCLEAR ENERGY RESEARCH INITIATIVE (NERI) PROGRAM GRANT NUMBER DE-FG03-00SF22168 TECHNICAL PROGRESS REPORT (Nov. 15, 2001 - Feb. 15,2002) ''Design and Layout Concepts for Compact, Factory-Produced, Transportable, Generation IV Reactor Systems''  

SciTech Connect

The objectives of this project are to develop and evaluate nuclear power plant designs and layout concepts to maximize the benefits of compact modular Generation IV reactor concepts including factory fabrication and packaging for optimal transportation and siting. Three nuclear power plant concepts are being studied representing water, helium and lead-bismuth coolants. This is the sixth quarterly progress report.

Fred R. Mynatt; Andy Kadak; Marc Berte; Larry Miller; Mohammed Khan; Joe McConn; Lawrence Townsend; Wesley Williams; Martin Williamson

2002-03-15T23:59:59.000Z

279

C++ Gotchas: Avoiding Common Problems in Coding and Design  

Science Conference Proceedings (OSTI)

From the Book:This book is the result of nearly two decades of minor frustrations, serious bugs, late nights, and weekends spent involuntarily at the keyboard. This collection consists of 99 of some of the more common, severe, or interesting C++ gotchas, ...

Stephen Dewhurst

2002-12-01T23:59:59.000Z

280

Symplectic Integrator Mercury: Bug Report  

E-Print Network (OSTI)

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

OpenEI Community - bug  

Open Energy Info (EERE)

Image upload with broken thumbnail image http:en.openei.orgcommunitydiscussionimage-upload-broken-thumbnail-image

OpenEI users can upload images to the wiki by typing a new...

282

inside layout/FR.ind  

NLE Websites -- All DOE Office Websites (Extended Search)

Spent Fuel Treatment and Storage Facility Glass Waste Storage Capacity Highly Enriched Uranium Blend-down - H Canyon Upgrade 2,000,000 782,000 300,000 154,000 100,000...

283

Brooks layout InD  

scan and report in about a minute. ... realistic testing environment. In these ... gamma radiation is 10 times stronger than

284

Layouts_Inside_1.eps  

NLE Websites -- All DOE Office Websites (Extended Search)

From Berkeley Lab to the Marketplace Smart Lawrence Berkeley National Laboratory Technology Transfer with Partner Berkeley Lab Lawrence Berkeley National Laboratory Technology...

285

Inside layout(for pdf)  

Science Conference Proceedings (OSTI)

... and development, mix- ture proportioning and optimization, and troubleshooting. ... include building designers, manufacturers of HVAC and other ...

2002-03-26T23:59:59.000Z

286

Santer_layout_InD  

NLE Websites -- All DOE Office Websites (Extended Search)

causes of climate change is highly complex. Now, an international team of scientists, led by researchers from Lawrence Livermore, has added another piece to this puzzle. The...

287

NUCLEAR ENERGY RESEARCH INITIATIVE (NERI) PROGRAM GRANT NUMBER DE-FG03-00SF22168 TECHNICAL PROGRESS REPORT (Nov. 15, 2001 - Feb. 15,2002) ''Design and Layout Concepts for Compact, Factory-Produced, Transportable, Generation IV Reactor Systems''  

SciTech Connect

The objectives of this project are to develop and evaluate nuclear power plant designs and layout concepts to maximize the benefits of compact modular Generation IV reactor concepts including factory fabrication and packaging for optimal transportation and siting. Three nuclear power plant concepts are being studied representing water, helium and lead-bismuth coolants. This is the sixth quarterly progress report.

Fred R. Mynatt; Andy Kadak; Marc Berte; Larry Miller; Mohammed Khan; Joe McConn; Lawrence Townsend; Wesley Williams; Martin Williamson

2002-03-15T23:59:59.000Z

288

'Combinatorial' Approach Squashes Software Bugs Faster ...  

Science Conference Proceedings (OSTI)

... combinatorial testing.” The NIST-Texas tool, described at a recent conference,* could save software developers significant time and money when it ...

2013-09-26T23:59:59.000Z

289

'Bugs' used to treat FGD wastewater  

SciTech Connect

Tough regulation of heavy metals may justify a bioreactor approach in addition to chemical treatment of FGD wastewater. Two of Duke Energy' coal-fired plants, Belews Creek and Allen (in North Carolina) have installed new biological reactor systems to increase selenium removal to levels not achievable by existing scrubber waste water systems. The ABMet system removes nitrate and selenium in a single step. Progress Energy has installed the system at Roxboro and Mayo Stations, also in North Carolina. 1 fig., 2 photos.

Blankinship, S.

2009-09-15T23:59:59.000Z

290

Predicting software bugs using ARIMA model  

Science Conference Proceedings (OSTI)

The number of software products available in market is increasing rapidly. Many a time, multiple companies develop software products of similar functionalities. Thus the competition among those owning companies is becoming tougher every day. Moreover, ... Keywords: ARIMA models, evaluation approach, information theory, prediction models

Lisham L. Singh; Al Muhsen Abbas; Flaih Ahmad; Srinivasan Ramaswamy

2010-04-01T23:59:59.000Z

291

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

Design Process Design Process While there were less tangible products resulting from the design as- sistanceand demonstration activities of this research, we better under- stood the process of achieving integration in the real-world. We found today'sprocess of designing the envelope andlighting system for most new and retrofit construction to be dysfunctional. To achieve success in this work: a) the concept of an integrated approachmust be introduced atthe startof new projectswhen design solutions such as building orien- tation, articulated floor plans, or exterior shading systems can still be considered. For retrofit projects, a proactive systems approach must be taken when upgrading building components for energy- efficiency in order to achieve cost-effective solutions that improve

292

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

Production Readiness Production Readiness Weprogressed towardmarketadoptionby developing, build- ing and testing prototype systems using numerical simula- tion tools andfield tests,by working with industry andmanu- facturing partners, and by demonstrating the technologies in full-scalecommercialbuildings. Thisprovidedabroad,highly defensible record of documented performance. Prototypeswere developed in cooperationwith industrypart- ners to speed commercializationand to work out market bar- riers to full-scaleadoption.Industrypartners in glazing, win- dow systems, shading systems, controls hardware and light- ing were solicited to participate. Feedback through trade as- sociations, conferences and industry associations helped to identify potential obstaclessuch asdifficulties with cross-dis-

293

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

DesignAssistance DesignAssistance IMAGE imgs/esl363.jpg This multi-year project provided a mechanism for inves- tigating advanced daylighting technologies, strategies, commercial prototypes, and demonstrations in collabo- ration with designers, manufacturers, owners, and re- searchers. Guidance was provided to industry to ensure that their market perspective was sufficiently broad--we found that many material or technology developers were solving problems from either a lighting or windows discipline and therefore had a limited approach. In general, we provided detailed analyses of product performance; e.g., holographic glazings, advanced skylights, angular-selec- tive glazings, etc. In one case, we worked with a skylight manufacturer to develop and evaluate new skylighting

294

10_9:Layout 1.qxd  

NLE Websites -- All DOE Office Websites (Extended Search)

Safe Transport of Hazardous Materials Safe Transport of Hazardous Materials APS users are reminded that hazardous materials, including samples, cannot be packed in personal luggage and brought on public transport. APS Policy & Procedure 3.1.34 Hazardous Material Transportation provides the APS requirements related to the packaging and transportation of hazardous materials. According to this all hazardous material must be * Packaged in accordance with Department of Transportation (DOT) requirements and * Shipped to Argonne from, or shipped from Argonne to, the home institute. * Specific exceptions have been obtained for movement of small quantities in personal vehicles for non-Argonne users, dry ship- ping cryogenic samples, and shipping cryo-preserved biological samples by air transport.

295

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

3.jpg IMAGE imgs/esl384.jpg 3.jpg IMAGE imgs/esl384.jpg IMAGE imgs/esl385.jpg Variation in daylight correlation coefficient as blind angle is varied for a) summer direct lighting conditions, b) summer diffuse lighting conditions, c) winter direct lighting conditions, d) winter diffuse lighting conditions The "gain" of a typical closed-loopproportional systemvarieswiththespatial distributionof daylightin a space. This critical parameter is set once upon the daylighting control system's installation then left to control the lighting for all electric and daylighting conditions within the space over the entire year. Occupants will complain and even sabotage the system if the lights are too dim--a result of improper commissioning. We show above how this gain parameter

296

17784_Tour_Brochure_CR:Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

genome of an organism contains all of genome of an organism contains all of its genetic material or DNA, molecules made up of four bases known as A, C, T and G. When scientists sequence the genome, it's like taking apart a puzzle someone else completed to figure out what each section is made up of, and then re-assemble the information so that scientists can understand the big picture. The U.S. Department of Energy Joint Genome Institute has been headquartered in Walnut Creek, California since 1999, sequencing plants, microbes and communities of microbes called metagenomes that are related to the DOE mission areas of bioenergy, the carbon cycle and biogeochemistry. A fifth of the sequencing projects done worldwide is done right here in Walnut Creek. JOINT GENOME INSTITUTE sequencing the world of possibilities

297

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

9.jpg A B C D E F Overall lighting comfortable? 9.jpg A B C D E F Overall lighting comfortable? Automatic 0 29 14 57 0 0 Semi-control 0 21 0 71 7 0 Manual-control 0 7 7 64 21 0 Lighting uncomfortably bright for tasks? Automatic 43 50 7 0 0 0 Semi-control 21 71 7 0 0 0 Manual-control 29 71 0 0 0 0 Lighting uncomfortably dim for tasks? Automatic 21 21 29 29 0 0 Semi-control 7 71 14 7 0 0 Manual-control 14 79 7 0 0 0 Lighting poorly distributed? Automatic 21 36 7 36 0 0 Semi-control 21 57 7 14 0 0 Manual-control 21 64 7 7 0 0 Lighting caused deep shadows? Automatic 21 50 29 0 0 0 Semi-control 21 57 14 7 0 0 Manual-control 29 71 0 0 0 0 Reflections from light fixtures hindered work? Automatic 36 43 7 0 0 14 Semi-control 36 50 14 0 0 0 Manual-control 21 64 7 0 0 7 Lighting fixtures too bright? Automatic 29 50 7 0 0 14

298

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

7.jpg 7.jpg productivity by even a small amount are thus highly cost-effective. While there is little hard data that shows a direct relationship between energy-efficient daylighting designs and productivity, there is anecdotal evidence that views of the outdoors, connections to the outside, and a glare-free and thermally comfortable environ- ment all contribute to a more satisfied worker--who is likely to be more productive than an unhappy, uncomfortable worker. We evaluated the occupants' acceptance and satisfaction of their work environ- ment in a limited full-scale test with the automated blind|lighting system. A small number of occupants performed a limited set of visual tasks. These occupants re- ported that they were generally satisfied with the performance of the automated

299

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Envelope and Integrated Envelope and Lighting Systems IMAGE imgs/esl321.jpg IMAGE imgs/esl320.jpg Traditional approaches to creating energy-efficient buildings involve selecting from long lists of efficient components. By taking an inte- grated systems approach to combining disparate building envelope and lighting components, we can attain greater energy savings and improved occupant comfort compared to conventional energy-effi- cient design practice. Windows +Lighting +Mechanical This integrated systems approach was the basis for a multiyear project supported by the California Institute for Energy Efficiency with co- support from DOE, to develop and promote advanced building sys- tems integrating high-performance envelope and lighting technolo- gies. Since the illumination and cooling of commercial buildings

300

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

2800 2800 IMAGE imgs/esl394.jpg IMAGE imgs/esl396.jpg IMAGE imgs/esl395.jpg Performance of the dynamic blind system (DB ) compared to a static horizontal blind (SB) system. Notetheuncontrolleddaylight levels of the horizontal blind of 2400 lux, which results in higher daily cooling of 21% and peak cooling loads of 13%. Daily light- ingenergyreductions were21%. Thesedata arefor a southeast-facing windowin Oakland on a clear day in August. Both roomshave thesame daylighting control system. 0 Hour IMAGE imgs/esl398.jpg IMAGE imgs/esl397.jpg Performance of the dynamic blind system comparedtoa static 45º blindsystem. Here, thedaily cooling loadand peak coolingload reductions were more modest,4% and 8%, respectively, comparedtothis partly-closed blind;butdaily lighting energysavings were

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

1.jpg 1.jpg Demonstration A full-scale demonstration of a light-redirecting skylight was conducted in the Palm Springs Chamber of Commerce. Because cooling loads area major problem in this climate and sunlight is almost always available, we designed a solution around a small skylight that admits and redirects direct sunlight to the ceiling of two separate interior rooms. The geometry of the internal skylight reflector was designed to provide daylight under all seasonal solar conditions, without allowing direct sunlight penetration to the task areas. The optical materials (reflectors and diffusers) were selected to provide good optical efficiency throughout the year. Initial surveys of the occupants indicated that they enjoyed the variability intrinsic in such a system and that it met their lighting needs well even during the winter.

302

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

0.jpg 0.jpg Environmental Quality IMAGE imgs/esl3121.jpg There have been unsubstantiatedclaims that daylighting benefits the health, satisfaction, and even productivity of humans. Both daylighting prototypes were designed to improve comfort as well as increase energ y-efficiency. With this research, we beg an the process of quantifying the qualitative benefits of dynamic andlight-redirecting window/lighting systems using simulationtools, reduced-scalefield tests,andfull-scaledemonstrations. Some of our arguments for qualityimprovements comparedto conventional systems were madebased on meeting well-known design constraints,thresholds setby experimentalfield data (e.g., glare or thermal comfort indices), or industry guidelines (e.g., IES RP-1 for visualcomfort). These methods only partiallydescribe the fitness of a

303

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

3.jpg base case dif - 3.jpg base case dif - fusing skylight distribution ver- sus the light-re- direct ing sky- light IMAGE imgs/esl3124.jpg IMAGE imgs/esl3125.jpg "I like the feeling of sunlight... To me, the light gives me the feeling of my home environment because I have patches of light at home. I like this interplay of natural light. What I like most about the skylight is that it doesn't seem artificial. I feel like I'm outdoors but under the canopy of a tree." "I like to trace the angles and think about how the sun angles are caught by the angles of the reflectors. I find the complexitypleasant. I like looking at how the light is reflected--it's fantastic. I don't understand the physics of it but I'm amazed at how the light is diverted to the ceiling and walls and how the angles are working with the sun..."

304

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

jpg IMAGE imgs/esl337.jpg jpg IMAGE imgs/esl337.jpg IMAGE imgs/esl338.jpg IMAGE imgs/esl339.jpg ering the solar heat gain coefficient to reduce cooling while maintaining the visual transmission of the glass to capture daylight savings. However, harnessing daylight in a build- ing poses asignificanttechnicalchallenge because ofthe great variability in daylight intensity. Achieving higher energy savings under these conditions requires looking beyond static systemstodynamic systemsthatrespond tochanging climatic or occupant conditions. By linking a dimmableelectric light- ing system with daylighting controls to a fenestrationsystem that can automatically modify the transmission of daylight, we can get real-time control of the cooling and lighting en- ergy balance while addressing glare and thermal comfort.

305

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

4.jpg 4.jpg Peak Demand Reductions When daylight availabilityand summer outdoor temperatures are hig h, daylighting can substan- tially reduce peak electric loads due to cooling andlighting. This will result in monthly savings in demand charges, but it also reduces pressure on the utilityto addnew generating capacity(e.g. hydroelectric, nuclear, etc.). In the case of a ret- rofit of an existing building, it provides new available capacity for other needs. Some utili- ties are still willing to "purchase" these "negawatts"with upfront rebates that help off- set the building owner's first cost. Conceptu- ally, the g lazing system becomes an energy source (relativeto aconventionalalternative) and the utility makes an investment in this "energy

306

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

jpg Electric light ing comprises 515,000,000 MWh or 20% of the nation's electricity consumption. Of this total, approximately 10-15% is used to light a building's perimeter zone...

307

layout FAR onsite.pm7 copy  

NLE Websites -- All DOE Office Websites (Extended Search)

with the Ten- nessee Valley Authority (TVA) that will eventually convert highly enriched uranium into a form that TVA can use as fuel in its reactors and initiated...

308

NIST CENTER FOR NEUTRON RESEARCH LAYOUT  

Science Conference Proceedings (OSTI)

... 4 NG-7 30m SANS Small Angle Neutron Scattering instrument for microstructure measurement sponsored by NIST, the Exxon Research and ...

1999-06-25T23:59:59.000Z

309

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

such as reduced energy bills and lower capital or first costs due to reduc- tions in space conditioning capacity. Other non-economic benefits can be attained such as greater...

310

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

energy consistently and reliably while delivering amenity, satisfaction, comfort, and health to its occupants through sensitive con- trol of daylight intensity and...

311

Optimizing the Layout of Proportional Symbol Maps  

E-Print Network (OSTI)

in the visualization and analysis of quantitative data associated with ..... lem on a 2.4GHz IntelR CoreTM2 Quad processor, with 4GB of RAM. We limit each run to ...

312

2.Friedmann layout_InD  

NLE Websites -- All DOE Office Websites (Extended Search)

injected into Teapot Dome fields to boost oil production, and researchers will evaluate technologies for both sequestration and enhanced oil recovery. Livermore geologist Julio...

313

REPOSITORY SUBSURFACE LAYOUT OPTIONS AND ESF INTERFACE  

SciTech Connect

This report summarizes work completed by the repository subsurface design group during the 1993 fiscal year (FY93), and represents a portion of the ongoing, repository Advanced Conceptual Design (ACD) effort. The ACD work is being performed in accordance with guidance and controls established for the United States Department of Energy's (DOE) Yucca Mountain Project (YMP). This document draws information from other ACD reports prepared and submitted during the year, and from other program studies, including the Exploratory Studies Facility (ESF) Title II design. Site specific data gathered by the Surface Based Testing (SBT) program has been included to the extent that it became available early enough for use in the designs presented herein.

Dana J. Rogers

1993-12-20T23:59:59.000Z

314

18109_COPA_form1109:Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

overlap of Laboratory and private interests, competition with Laboratory projects, disclosure of in- formation not yet in the public domain)? No Yes (attach detailed...

315

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

evenly to attaina functional and com- fortable lighting environment for a wide range of sun positions and sky typesrequires ingenuity. Wedesigned prototype lightshelves,...

316

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

changes in sun and sk y condi- tions in order to con- trol daylight intensity and solar heat gains, and provide a more uniform, comfortable interior work environ- ment....

317

1663Layout_27FEB2013.indd  

NLE Websites -- All DOE Office Websites (Extended Search)

A L A M O S S C I E N C E A N D T E C H N O L O G Y M A G A Z I N E M A R C H 2 0 1 3 Quantum Computing with Discord Entombing Nuclear Waste Rapid Toxicity Testing Supermassive...

318

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

IMAGE imgsesl3111.jpg December noon 21 2 Annual Lighting and Total Electricity Use (kWhft 2 flooryr) with lower window Dayltg Zones Total Elec. (kWh ft2 yr) Lighting...

319

NIST CENTER FOR NEUTRON RESEARCH LAYOUT  

Science Conference Proceedings (OSTI)

... 4 NG-7 30 m SANS Small Angle Neutron Scattering instrument for microstructure measurement sponsored by NIST, the ExxonMobil Research ...

2000-02-29T23:59:59.000Z

320

NIST CENTER FOR NEUTRON RESEARCH LAYOUT  

Science Conference Proceedings (OSTI)

... 17 18 19 13 13 Spin Echo Spectrometer offer- ing neV energy resolution, based upon Jülich design, sponsored by NIST, Jülich, and ExxonMobil. ...

2001-02-27T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

of our refinements will need a solid commitment from U.S. manufacturers to redesign their systems. Commissioning solution: Past daylighting controls research has been devoted to...

322

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

91.jpg aging daylight and electric light to provide 50 fc (500 lux) on the workplane, and permitting view whenever possible. The system was built from readily-available components,...

323

suggestion revision for org chart layout  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OF HUMAN CAPITAL MANAGEMENT Kenneth Venuto (HC-1.2) PERFORMANCE AND BUDGET STAFF Tony Nguyen (HC-1.5) ADMINISTRATIVE MANAGEMENT STAFF Theresa Heinicke (HC-33) HQ EMPLOYEE LABOR...

324

Class A car prop Layout1 (1)  

NLE Websites -- All DOE Office Websites (Extended Search)

05174.000 F0F0 0613 RTL3 204 Appendix B VFT Design Drawings 1205174.000 F0F0 0613 RTL3 205 Appendix C Microbac Laboratories Report COVER LETTER 2101 Van Deman Street Baltimore,...

325

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

Daylighting algorithms Daylighting algorithms IMAGE imgs/esl375.jpg The tools for describing the performance of daylighting systems are limited, in part because there is currently little research activity within industry and the business community to advance the science of daylighting with "advanced" window systems, such as automated blinds or holographic glazings. A new approach was devised that combined experimen- tal measurements with simulation tools to produce an accurate characterization of interior illuminance levels. This method is combined with an energy simulation engine such as DOE-2 to produce estimates of annual energy usage. The work provided a basis for more flex- ible daylight modeling tools that can ultimately be used by conventional engineering consultants.

326

10_9:Layout 1.qxd  

NLE Websites -- All DOE Office Websites (Extended Search)

NOTICE NOTICE OTICE Two minor electrical incidents in the past months at the APS resulted in a minor shock from inadequately grounded equipment, and a damaged stainless steel waterline when an arc occurred between the waterline and defective heat tape. The investigation of the shock incident identified several deficiencies in the electrical grounding of equipment carts (right) purchased from a reputable electrical manufacturer. The defective grounding of one of the carts resulted in a shock from ~60-V AC when an employee leaned against the cart while in contact with a well-grounded surface. An examination of the cart and all others like it at the APS identified improper grounding such as loose ground wiring, grounding to painted surfaces, and a butt-splice in ground

327

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Facts Project Facts Daylighting systems in use world-wide rarely capture the energy-savings predicted by simulation tools and that we believe are achievable in real buildings. One of the primary reasons for this is that window and lighting systemsare not designed and operated as an integrated system. Our effortsover the last five years have been targeted toward 1) development and testing of new technological solutions that involve a higher degree of systemsintegration than has been typical in the past,and 2) addressing current design and technological barriers that are often missed with component-oriented research. We summarize the results from this body of cross-disciplinary research and discuss its effects on the existing and future practice of daylighting in commercial buildings.

328

arch layout 11.21.98  

NLE Websites -- All DOE Office Websites (Extended Search)

.jpg .jpg problem Despite the tremendous architectural interest and the large po- tential energy savings, the actual number of effectively daylit buildings that demonstrably save energy is very small. This is due to numerous design, implementation,and technological bar- riers: A major barrier to the use of daylighting is technological. Daylighting is unique in that it requires designers to solve not only complex technical issues on a case-by-casebasis, but also qualitative issues as well. There are a lack of good modular inte- grated building systems that perform well across energy-efficiency and qualitative criteria and can be easily used in most buildings. Concepts for innovative technologies need to be comprehensively tested to determine if they are truly viable and acceptable. Evalu-

329

Applying mobile device soft keyboards to collaborative multitouch tabletop displays: design and evaluation  

Science Conference Proceedings (OSTI)

We present an evaluation of text entry methods for tabletop displays given small display space allocations, an increasingly important design constraint as tabletops become collaborative platforms. Small space is already a requirement of mobile text entry ... Keywords: collaboration, computer-supported collaborative work (CSCW), tabletop displays, text entry

Sungahn Ko; KyungTae Kim; Tejas Kulkarni; Niklas Elmqvist

2011-11-01T23:59:59.000Z

330

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

file CVE-2012-1942. Version 12 on Windows is affected. The Content Security Policy's (CSP) inline-script blocking feature may not protect against some inline event handlers...

331

Got bugs? We've got a Goanna The Features  

E-Print Network (OSTI)

timetables on track. Working much like a sophisticated spell-checker for software, Goanna detects issues / Bldg 193 (Dept. of Electrical and Electronic Engineering) The University of Melbourne VIC 3010 Tel: +61 research. NICTA drives innovation through high-quality research, research training and technology transfer

332

What Keeps Bugs from Being Bigger? | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

effect is most pronounced in the orifices leading to the legs, where more and more of the space is taken up by tracheal tubes in larger species." The team then examined the...

333

Tracking system bugs: why are buffer overruns still around?  

Science Conference Proceedings (OSTI)

A buffer overrun is caused by the limited size of a string variable's allocated space and the unlimited size of the actual string that is stored in the space. In the C programming language, it is the programmer's responsibility to make sure the actual ... Keywords: buffer overrun, c programming, string overwrite

Cherry Keahey Owen

2007-10-01T23:59:59.000Z

334

CTrigger: Exposing Atomicity Violation Bugs from Their Hiding Places  

E-Print Network (OSTI)

of the two molecules, broken down by atom, helps the user to understand which atoms of the drug and protein

Lu, Shan

335

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will access deleted memory (while JavaScript is disabled) and potentially execute arbitrary code on the target system CVE-2011-2373. A...

336

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

an authentication flaw and gain access to the target user's account CVE-2011-3416. A remote user can exploit a flaw in the handling of cached content when Forms Authentication...

337

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based...

338

NERSC_AR_06_released:Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

RESEARCH RESEARCH SCIENTIFIC COMPUTING CENTER ANNUAL REPORT 2006 NATIONAL ENERGY RESEARCH SCIENTIFIC COMPUTING CENTER ANNUAL REPORT 2006 Ernest Orlando Lawrence Berkeley National Laboratory 1 Cyclotron Road, Berkeley, CA 94720-8148 This work was supported by the Director, Office of Science, Office of Advanced Scientific Computing Research of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231. LBNL-63342, August 2007 THE YEAR IN PERSPECTIVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 RESEARCH NEWS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

339

6_07_sft_ntce_electrical:Layout 1.qxd  

NLE Websites -- All DOE Office Websites (Extended Search)

USER FACILITIES USER FACILITIES SAFETY NOTICE Three "close-call" electrical-short events occurred at Argonne within the past six months. All involved shorts across the prongs of electrical plugs inserted into energized receptacles. While no shocks or injuries resulted, and equipment damage was minor, the potential for injury was very real. Each event was reported to the Department of Energy. SUF_6.07 Electrical Shorts across Plug Prongs All employees and users at Argonne should exercise great vigilance in checking to see that: * Only NRTL-labeled equipment (in- cluding separate cables) or equip- ment inspected by a designated elec- trical equipment inspector is used. * Damaged electrical equipment is immediately brought to the attention of safety or beamline personnel.

340

cr_14229_JGI_Primer_Fall07 :Layout 1  

NLE Websites -- All DOE Office Websites (Extended Search)

JGI Community Sequencing JGI Community Sequencing Program (CSP) is contributing to an ambi- tious international effort to decode the genome of Eucalyptus, one of the world's most valuable fiber and paper-producing trees-with the goal to maximize its poten- tial in the burgeoning bioenergy market and for capturing excess atmospheric carbon. The scientific effort to characterize the Eucalyptus genome, uniting some two dozen institutions worldwide, is led by Alexander Myburg of the University of Pretoria (South Africa), with co-leads Dario Grattapaglia, of EMBRAPA and Catholic University of Brasília (Brazil), and Jerry Tuskan of Oak Ridge National Laboratory-JGI's Laboratory Science Program lead. The 600-million-nucleotide tree genome was selected as one of JGI's CSP FY2008 major allocations.

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

15810_WoGS_released:WoGS Final Layout  

NLE Websites -- All DOE Office Websites (Extended Search)

world of world of GREAT SCIENCE ... and great science solutions From the infinite scale of the universe to the infinitesimal scale of subatomic particles, researchers at the Lawrence Berkeley National Laboratory - Berkeley Lab - are advancing the scope of human knowledge and seeking technical solutions to some of the greatest problems facing humankind. Scientific excellence and an unparalleled record of achievement have been the hallmarks of this Laboratory since it was founded by Ernest O. Lawrence in 1931. Eleven scientists associated with Berkeley Lab have won the Nobel Prize, and 55 other Nobel Laureates either trained here or had significant collabo- rations with Laboratory researchers. Thirteen Berkekey Lab scientists have also won the National Medal of Science, the

342

Tabu search for the single row facility layout problem using ...  

E-Print Network (OSTI)

Jan 13, 2012 ... P&QM Area, IIM Ahmedabad, Vastrapur, Ahmedabad 380015, Gujarat, INDIA ...... 20 23 26 53 10 11 57 5 58 51 6 19 65 2 33 44 45 24 42 47 16.

343

Computing Globally Optimal Solutions for Single-Row Layout ...  

E-Print Network (OSTI)

History: Accepted by Karen Aardal, Area Editor for Design and Analysis of Algorithms; ..... 7:51:58.2. 5. Conclusions. We demonstrated that the combination of a ...

344

Fixture layout optimization for flexible aerospace parts based on self ...  

Science Conference Proceedings (OSTI)

stochastic methods [7, 8]. No derivates are .... selection, stochastic tournament, and expected value .... remaining degrees of freedom are resisted by the friction.

345

Integrated Approach for Safe and Efficient Plant Layout Development  

Science Conference Proceedings (OSTI)

Retrofit of a Combined Breaker Feeder with a Chisel Bath Contact Detection System to Reduce Anode Effect Frequency in a Potroom · Simulating Traffic in a ...

346

Dynamic Parameter Spring Model for Automatic Graph Layout  

E-Print Network (OSTI)

.3....(..............................),max()( )8.3....(..............................),max()( ),( ),( ),( ),( ),( ),( ),( ),( rifd Cifsp

Tanaka, Jiro

347

System Definition and Analysis: Power Plant Design and Layout  

SciTech Connect

This is the Topical report for Task 6.0, Phase 2 of the Advanced Turbine Systems (ATS) Program. The report describes work by Westinghouse and the subcontractor, Gilbert/Commonwealth, in the fulfillment of completing Task 6.0. A conceptual design for critical and noncritical components of the gas fired combustion turbine system was completed. The conceptual design included specifications for the flange to flange gas turbine, power plant components, and balance of plant equipment. The ATS engine used in the conceptual design is an advanced 300 MW class combustion turbine incorporating many design features and technologies required to achieve ATS Program goals. Design features of power plant equipment and balance of plant equipment are described. Performance parameters for these components are explained. A site arrangement and electrical single line diagrams were drafted for the conceptual plant. ATS advanced features include design refinements in the compressor, inlet casing and scroll, combustion system, airfoil cooling, secondary flow systems, rotor and exhaust diffuser. These improved features, integrated with prudent selection of power plant and balance of plant equipment, have provided the conceptual design of a system that meets or exceeds ATS program emissions, performance, reliability-availability-maintainability, and cost goals.

1996-05-01T23:59:59.000Z

348

FINAL LAYOUT_ 7-24-13dp.indd  

NLE Websites -- All DOE Office Websites (Extended Search)

for characteristic signs of ionizing radiation exposure, a protocol known as radiation dosimetry. Animal testing has revealed a panel of biomarkers in blood that appears in...

349

Automated layout of small lattices using layer diagrams  

Science Conference Proceedings (OSTI)

Good quality concept lattice drawings are required to effectively communicate logical structure in Formal Concept Analysis. Data analysis frameworks such as the Toscana System use manually arranged concept lattices to avoid the problem of automatically ...

Richard Cole; Jon Ducrou; Peter Eklund

2006-02-01T23:59:59.000Z

350

Influence of Heat Source Cooling Limitation on ORC System Layout ...  

Science Conference Proceedings (OSTI)

... compensates for the temperature loss induced by a second heat exchanger. ... Abart CDS - a New Compact Multi-pollutant Pot Gas and Alumina Handling ...

351

Scatter search algorithms for the single row facility layout problem  

E-Print Network (OSTI)

Mar 22, 2012... for a SRFLP is an evolutionary technique which orients its exploration ..... flexible manufacturing systems, International Journal of Production ...

352

Clotho: decoupling memory page layout from storage organization  

Science Conference Proceedings (OSTI)

As database application performance depends on the utilization of the memory hierarchy, smart data placement plays a central role in increasing locality and in improving memory utilization. Existing techniques, however, do not optimize accesses to all ...

Minglong Shao; Jiri Schindler; Steven W. Schlosser; Anastassia Ailamaki; Gregory R. Ganger

2004-08-01T23:59:59.000Z

353

Carbon Nanotube Growth Using Ni Catalyst in Different Layouts  

E-Print Network (OSTI)

Vertically aligned carbon nanotubes have been grown using Ni as catalyst by plasma enhanced chemical vapor deposition system (PECVD) in various pre-patterned substrates. Ni was thermally evaporated on silicon substrates ...

Nguyen, H. Q.

354

A Semidefinite Optimization Approach for the Single-Row Layout ...  

E-Print Network (OSTI)

Mar 28, 2005 ... angular facilities so as to minimize the total cost associated with the (known or projected) in- ... second area is concerned with extensions of the problem in order to account for additional ... power and important improvements in mathematical programming algorithms. ..... problems on computational grids.

355

Offshore Wind Farm Layout Optimization (OWFLO) Project: Preliminary Results  

E-Print Network (OSTI)

literature to date has focused on land-based wind farms, rather than on offshore farms. Typically, energy wind energy. The project combines an energy production model--taking into account wake effects the cost of energy while maximizing the energy production of the wind farm. Particular attention has been

Massachusetts at Amherst, University of

356

A Polyhedral Approach to the Single Row Facility Layout Problem  

E-Print Network (OSTI)

problem of arranging facilities on a line, while minimizing a weighted sum of the ..... heuristic, are an essential component of branch-and-cut algorithms. We now.

357

Layout impact of resolution enhancement techniques: impediment or opportunity?  

Science Conference Proceedings (OSTI)

This tutorial introduces the reader to the basic concepts of optical lithography, derives fundamental resolution limits, reviews the challenges facing future technology nodes, explains the principles of resolution enhancement techniques and their impact ... Keywords: design for manufacturability, lithography, radically restricted designs, resolution enhancement techniques

Lars W. Liebmann

2003-04-01T23:59:59.000Z

358

A binary LP model to the facility layout problem Abstract  

E-Print Network (OSTI)

Domschke and Drexl [4] and the other by Francis, McGinnis and White [5], ... In this paper a simple pure-binary linear programming (PBLP) model has been developed to find the ..... AB AC AD AE AF BC BD BE BF CD CE CF DE DF EF. 12. X*.

359

Photovoltaic System Layout for Optimized Self-Consumption.  

E-Print Network (OSTI)

?? Most of the photovoltaic (solar cell) systems in Sweden today are installed on private houses and connected to the public grid. Photovoltaic (PV) power… (more)

Luthander, Rasmus

2013-01-01T23:59:59.000Z

360

Feedback linking: optimizing object code layout for updates  

Science Conference Proceedings (OSTI)

Firmware over the air (FOTA) is becoming a standard procedure for maintaining and updating wireless embedded systems. To cope with bandwidth and storage constraints this is facilitated using incremental updates based on delta technology, i.e. only the ... Keywords: flash memory, incremental software update

Carl von Platen; Johan Eker

2006-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

D0-EC RTD Wiring Layout (North Calorimeter)  

SciTech Connect

The temperature of the North End-Calorimeter of the D-Zero detector is to be monitored by several RTD temperature sensors. The location and other important information pertaining to each individual RTD is included in the following tables, which are grouped by bundle number. There are mne 60 pIll port connectors. Each connector corresponds to a bundle of twisted pairs. Twisted pairs, of one of eight colors along with either a black or white wire, run to 10-pin connectors which have a mate on the module or cryostat wall. In general, all 60 pins, or all 10 pins are not used. The color scheme of the wires was designed so that all the twisted pairs with white run West from the instrumentation port, and twisted pairs with black run East. This scheme proved to be very successful and efficient during the installation process. After being installed, every RTD connection was checked and their corresponding resistances were recorded by Jerry Blazey. All the RTD's tested successfully, except for 2. The 2 dead RTD's were: Channel 17 on bundle 4, which is located on the front of MH module 8L; and Channel 13 on bundle 5, which is located on the Bottom of the Middle Coarse Plate of the IH.

Primdahl, K.; /Fermilab

1991-06-04T23:59:59.000Z

362

D0-EC RTD Wiring Layout (South Calorimter)  

SciTech Connect

The temperature of the South End-Calorimeter of the D-Zero detector is to be monitored by several RTD temperature sensors. The location and other important information pertaining to each individual RTD is included in the following tables, which are grouped by bundle number. There are nine 60 pin port connectors. Each connector corresponds to a bundle of twisted pairs. Twisted pairs, of one of eight colors along with either a black or white wire, run to 10-pin connectors which have a mate on the module or cryostat wall. In general, all 60 pins, or all 10 pins are not used. The color scheme of the wires was deSigned so that all the twisted pairs with white run West from the instrumentation port, and twisted pairs with black run East. This scheme proved to be very successful and efficient during the installation process. After being installed, every RTD connection was checked and their corresponding resistances were recorded by Jerry Blazey. All the ATD's tested successfully, except for 4. The 4 dead RTD's were: Channel 12 on bundle 1, which is located on the back of OH module 7R; Channel 19 on bundle 4, which is located on the back of MH module 5L; Channel 9 on bundle 5, which is located on the IH fine 2-inch strap; and Channel 25 on bundle 7, which is located on the east strongback.

Leibfritz, J.R.; /Fermilab

1991-08-06T23:59:59.000Z

363

FINAL LAYOUT_ 7-24-13dp.indd  

NLE Websites -- All DOE Office Websites (Extended Search)

IMPACTS ON SANDIA BIOSCIENCES IMPACTS ON SANDIA BIOSCIENCES B i o t h re a t s t o B i o f u e l s 2 S a n d i a N a t i o n a l L a b o r a t o r i e s From the Chief Technolog y Of ficer The LDRD Program Innovates for Sandia's Biosciences Mission T he face of Sandia's Biosciences program is undergoing dramatic change and growth as the role of this foundational area in U.S. national security becomes increasingly important, for example in the areas of new biothreat organisms (arising both naturally and through genetic engineering), and the exciting prospect of multiple potential routes for improving biofuel production. Simultaneously, the scope of biomedical knowledge itself continues its recent pattern of explosive growth. This state of affairs poses both an exciting opportunity and a major challenge to the Sandia Biosciences

364

Optimization Online - Optimizing the Layout of Proportional Symbol ...  

E-Print Network (OSTI)

Nov 10, 2010... quantitative data associated with specific locations, such as earthquake magnitudes, oil well production, and temperature at weather stations.

365

Voter Personas: Designing for people who can vote ...  

Science Conference Proceedings (OSTI)

... keyboard. Angela uses a power wheelchair and has a service dog. ... keyboard. Angela uses a power wheelchair and has a service dog. ...

2013-03-27T23:59:59.000Z

366

Microsoft Word - Title page K.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

2003. Print. Dussling, Jennifer. Bugs bugs bugs. New York: DK Pub., 1998. Print. Fowler, Allan. From seed to plant. New York: Children's Press, 2001. Print. ---. It's a good...

367

Feature Story --The Right Bugs | Miller-McCune Magazine Feature Story  

E-Print Network (OSTI)

an engineer, in a sense, because he works on how to use microbes to effect environmental change." In 1995 later patented them. Hazen began working at the Hanford Site in 2002, when hexavalent chromium with telephone poles is the only human signature for 10 miles beyond the security checkpoint at the Hanford Site

Hazen, Terry

368

U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Deny Service PLATFORM: Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module ABSTRACT: Several vulnerabilities were reported in...

369

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Routers (ISRs) Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs) Cisco Catalyst 3750G Integrated WLCs Cisco Flex 7500 Series Cloud Controller Cisco Virtual Wireless...

370

April 30, 2010 Getting the Bugs Out, a New Approach to Renewable  

E-Print Network (OSTI)

of the federal stimulus money. It hopes to generate the energy-rich fuel octanol. 'Magic' done on a rooftop "With you can run on a rooftop." And so, on a rooftop at UMass, the researchers grow bacteria on the surface of a graphite electrode. A nearby solar panel captures energy and delivers it to the bacteria-laden electrode

Lovley, Derek

371

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The patch kits and installation instructions are available from: HP Support Center Home. Addthis Related Articles U-032: Microsoft Security Bulletin Windows TCPIP MS11-083...

372

The Natural History of Bugs: Using Formal Methods to Analyse Software Related Failures in Space Missions  

E-Print Network (OSTI)

Johnson,C.W. Formal Methods 2005, F. Fitzgerald, I.J. Hayes and A. Tarlecki (eds), Springer Verlag, LNCS 3582 pp 9-25 Springer Verlag

Johnson, C.W.

373

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access...

374

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

crafted Applix spreadsheet can trigger this flaw CVE-2011-1216. A specially crafted Zip File Viewer document can trigger this flaw CVE-2011-1218. Impact: A remote user can...

375

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

376

U-155: WebCalendar Access Control and File Inclusion Bugs Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

request to 'pref.php' to include an arbitrary local file. magicquotesgpc must be disabled to exploit this flaw. Impact: A remote user may be able to execute arbitrary PHP code...

377

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

input elements may be autocompleted even if the site specifies that autocomplete be disabled CVE-2012-0680. A remote user can create specially crafted HTML that, when loaded by...

378

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not remotely exploitable without authentication, i.e., may...

379

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the target system. A remote authenticated user can execute SQL commands on the underlying database. A remote user can spoof connections in certain cases. Solution: The vendor has...

380

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting...

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Researchers combat resurgence of bed bug in behavioral studies and monitor trials  

E-Print Network (OSTI)

pitfall traps baited with carbon dioxide, heat, and chemicalGibb, Bennett 2009). carbon dioxide and pheromones, and theywere disturbed with carbon dioxide (fig. 1, orange line).

Lewis, Vernard R; Moore, Sara E; Tabuchi, Robin L; Sutherland, Andrew M; Choe, Dong-Hwan; Tsutsui, Neil D

2013-01-01T23:59:59.000Z

382

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

with large RRSIG RRsets to act as the trigger. The attacker would then find ways to query an organization's caching resolvers for non-existent names in the domain served by the...

383

U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE))

Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

384

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in combination with some plugins, inject scripting code to cause...

385

[Unfortunately due to a bug that slipped by in testing we never ...  

E-Print Network (OSTI)

... sage to magma by an order of magnitude [Reviewed by Martin Albrecht, Michael Abshoff] #4769: Minh Van Nguyen, Michael Abshoff: add 5 people to devmap ...

386

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

biomass to fuels will involve the development of dedicated energy plants that maximize solar energy conversion to chemical

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

387

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

economically viable biofuel production, all aspects of thesemany challenges on biofuel production [1,3 ,28-30]. Some ofhigh-flux reactions. Biofuel production efforts can benefit

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

388

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

of microbial hosts for biofuels production. Metab Eng 2008,delivers next-generation biofuels. Nat Biotechnol 27.furfural (HMF). Biotechnol Biofuels 2008, 1:12. 40. Trinh

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

389

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

SciTech Connect

The ability to generate microorganisms that can produce biofuels similar to petroleum-based transportation fuels would allow the use of existing engines and infrastructure and would save an enormous amount of capital required for replacing the current infrastructure to accommodate biofuels that have properties significantly different from petroleum-based fuels. Several groups have demonstrated the feasibility of manipulating microbes to produce molecules similar to petroleum-derived products, albeit at relatively low productivity (e.g. maximum butanol production is around 20 g/L). For cost-effective production of biofuels, the fuel-producing hosts and pathways must be engineered and optimized. Advances in metabolic engineering and synthetic biology will provide new tools for metabolic engineers to better understand how to rewire the cell in order to create the desired phenotypes for the production of economically viable biofuels.

Kuk Lee, Sung; Chou, Howard; Ham, Timothy S.; Soon Lee, Taek; Keasling, Jay D.

2009-12-02T23:59:59.000Z

390

X-ray science taps bug biology to design better materials and...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Reports Summer Science Writing Internship Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk...

391

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

available as potential biofuel candidates and productionfuels and alternative biofuel molecules An understanding ofto consider when designing biofuel candidates ( Table 1).

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

392

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will...

393

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...  

NLE Websites -- All DOE Office Websites (Extended Search)

of service conditions A local user can obtain root privileges on the target system A remote user can partially access and modify data on the target system SOLUTION: Vendor...

394

X-ray science taps bug biology to design better materials and reduce  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. "(Caddisfly silk) is really not much stronger than super glue, but try to put super glue in your bathtub without it ever getting a chance to dry," says Jeff Yarger, professor of chemistry, biochemistry and physics at Arizona State University. Courtesy: Bennett Addison. Click to enlarge.

395

Optimal partitioned fault-tolerant bus layout for reducing power in nanometer designs  

Science Conference Proceedings (OSTI)

As technology scales down to nanometer dimensions, coupling capacitances between adjacent bus wires grow rapidly, and have a significant impact on power consumption and signal integrity of an integrated circuit. As buses are major components of a design, ... Keywords: coupling capacitance, fault-tolerant, low power, reliability

Shanq-Jang Ruan; Edwin Naroska; Chun-Chih Chen

2006-04-01T23:59:59.000Z

396

Insertion based Lin-Kernighan heuristic for single row facility layout  

E-Print Network (OSTI)

Jan 13, 2012 ... P&QM Area, IIM Ahmedabad, Vastrapur, Ahmedabad 380015, ...... 64 414323.5 14 11 8 60 55 40 41 48 12 28 3 51 21 22 15 45 35 50 63 54 20.

397

Running fermi with one-stage compressor: advantages, layout,performance  

Science Conference Proceedings (OSTI)

CBP-Tech Note-345 (July 2005), devoted to a study of microbunching instability in FERMI@ELETTRA linac quotes '...the above analysis shows that the most of the gain in microbunching instability occurs after BC2, i.e. after transformation of the energy modulation to the spatial modulation that takes place in BC2. It is possible to avoid that if we use only BC1 for all our needs for bunch compression. There are also additional advantages for a mitigation of the microbunching instability related to that. First, we would need to increase R56 in BC1 (for given energy chirp in the electron beam). Second, a relative energy spread is significantly larger at BC1 than at BC2. Both these factors would contribute to instability suppression due to increased Landau damping effect.' One additional argument was however missed in that report. Instability smearing due to finite emittance is stronger in BC1 simply because the geometrical emittance is larger than in BC2. In spite of the considerations in favor of a lattice with one-stage compressor, it was thought at the time that the two bunch compressors configuration was still preferable as it appeared difficult to obtain a flat-flat distribution at the end of the linac with only one bunch compressor. A flat-flat distribution has constant medium energy and a constant peak current along the electron bunch. Now, two years later and more studies behind, this problem is solvable. It has been demonstrated1 that shaping the intensity of the electron bunch at the injector using intensity modulation of the photocathode laser allows to use the linac structural wake fields to advantage to obtain a flat-flat distribution at the end of the linac in a two-stage compressor. This report shows that, using the back-tracking technique, it is possible to obtain a flat-flat distribution also in a single-stage compressor. Preliminary results of a study of the microbunching instability applied to the FERMI lattice with one-stage compressor are shown in this report . There is concern that the effect of jitter in accelerator parameters is more pronounced with one bunch compressor: the results of jitter studies are given and are compared with the case of a two-stage compressor.

Cornacchia, M.; Craievich, P.; Di Mitri, S.; Penco, G.; Venturini, M.; Zholents, A.

2007-05-25T23:59:59.000Z

398

Modeling and Layout Optimization of VLSI Devices and Interconnects In Deep Submicron Design  

E-Print Network (OSTI)

. Jeppson, "CMOS Circuit Speed and Buffer Optimization," IEEE Trans. on Computer-Aided Design, 1987, pp. 270

Cong, Jason "Jingsheng"

399

Production system improvement at a medical devices company : floor layout reduction and manpower analysis  

E-Print Network (OSTI)

Due to the low demand and the need to introduce other production lines in the floor, the medical devices company wants to optimize the utilization of space and manpower for the occlusion system product. This thesis shows ...

AlEisa, Abdulaziz A. (Abdulaziz Asaad)

2012-01-01T23:59:59.000Z

400

3678500_RV10bd_032009_4sprachig_ue:Layout 1  

Science Conference Proceedings (OSTI)

... Refer to the chapter entitled "Commissioning" in the hea- ting bath instruction manual! ... 8 Fig. 9 D E Page 19. ? Feed the steam pipe in until it stops. ...

2011-09-20T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

On-chip interconnect architectures : perspectives of layout, circuits, and systems  

E-Print Network (OSTI)

dissipation overhead of the transmission line shunts is onlyk vias aligned in a line, the track overhead on the middleoverhead = 9 Figure II.17: Via tunnels with vias aligned in a line

Chen, Hongyu

2006-01-01T23:59:59.000Z

402

BlendDB : blending table layouts to support efficient browsing of relational databases  

E-Print Network (OSTI)

The physical implementation of most relational databases follows their logical description, where each relation is stored in its own file or collection of files on disk. Such an implementation is good for queries that ...

Marcus, Adam, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

403

Layout techniques for radiation hardening of standard CMOS active pixel sensors  

Science Conference Proceedings (OSTI)

This paper presents a radiation hardened Active Pixel Sensor implemented in a standard 0.35?m CMOS process. The integrated circuit is composed of a 64x64 pixel matrix with a 25?m pixel pitch and has four different pixel architectures. There ... Keywords: CMOS, active pixel sensor, radiation hardeness

Leo Huf Campos Braga; Suzana Domingues; Milton F. Rocha; Leonardo Bruno Sá; Fernando Campos; Filipe V. Santos; Antonio Carneiro Mesquita; Mário Vaz Silva; Jacobus W. Swart

2007-09-01T23:59:59.000Z

404

A performance study of data layout techniques for improving data locality in refinement-based pathfinding  

Science Conference Proceedings (OSTI)

The widening gap between processor speed and memory latency increases the importance of crafting data structures and algorithms to exploit temporal and spatial locality. Refinement-based pathfinding algorithms, such as Classic Refinement (CR), find quality ... Keywords: Cache-conscious algorithms, classical refinement, pathfinding

Robert Niewiadomski; José Nelson Amaral; Robert C. Holte

2004-12-01T23:59:59.000Z

405

On-chip interconnect architectures : perspectives of layout, circuits, and systems  

E-Print Network (OSTI)

Transmission Lines . . . . . . . . . . . . . . 1. DistortionTransmission Line . . . . . . . . . . . . . . . . . .of Distortionless Transmission Lines to the Parameters

Chen, Hongyu

2006-01-01T23:59:59.000Z

406

Microsoft Word - EN_M278 - NIM Optical Layout.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

5-4 Normal Incidence Monochromator (NIM) and the position of all otical elements and brass plugs for use in alignment. The 5-4 NIM is optimized for high flux with resolution to...

407

The Integration Of The LHC Cryogenics Control System Data Into The CERN Layout Database  

E-Print Network (OSTI)

The Large Hadron Collider’s Cryogenic Control System makes extensive use of several databases to manage data appertaining to over 34,000 cryogenic instrumentation channels. This data is essential for populating the software of the PLCs which are responsible for maintaining the LHC at the appropriate temperature. In order to reduce the number of data sources and the overall complexity of the system, the databases have been rationalised and the automatic tool, that extracts data for the control software, has been simplified. This paper describes the main improvements that have been made and considers the success of the project.

Fortescue-Beck, E; Gomes, P

2011-01-01T23:59:59.000Z

408

Beam Dump and Local Shielding Layout Around the ITEP Radiation Test Facility  

Science Conference Proceedings (OSTI)

Shielding / Special Issue on the 11th International Conference on Radiation Shielding and the 15th Topical Meeting of the Radiation Protection and Shielding Division (Part 2) / Radiation Protection

Yury Titarenko; Viacheslav Batyaev; Alexey Titarenko; Michael Butko; Kirill Pavlov; Sergey Florya; Roman Tikhonov; Pavel Boyko; Alexey Kovalenko; Nikolai Sobolevsky; Vasily Anashin; Stepan Mashnik; Waclaw Gudowski; Nikolai Mokhov; Igor Rakhno

409

T:\\ClearanceEMEUConsumption\\cbecs\\pubuse89\\txt\\layouts&formats...  

Gasoline and Diesel Fuel Update (EIA)

C3C Energy used for cooling COOL4 34- 34 XXSUPL. C3D Energy used for domestic hot water WATR4 36- 36 XXSUPL. C3E Energy used for commercial cooking COOK4 38- 38 XXSUPL. C3F...

410

T:\\ClearanceEMEUConsumption\\cbecs\\pubuse86\\txt\\cb86sasfmt&layout...  

Gasoline and Diesel Fuel Update (EIA)

Propane supplied PRSUPL3 127- 127 XXSUPL. Steam supplied STSUPL3 129- 129 XXSUPL. Hot water supplied HWSUPL3 131- 131 XXSUPL. I-4a Energy used for heat HEAT13 133- 133 XXSUPL....

411

Mixed-Integer Linear Methods for Layout-Optimization of Screening ...  

E-Print Network (OSTI)

In this work the screening process in a fixed installation is simulated ... They deal with the process of distillation, allowing for separators and dividers in the.

412

On-chip interconnect architectures : perspectives of layout, circuits, and systems  

E-Print Network (OSTI)

Transmission Lines . . . . . . . . . . . . . . 1. DistortionIV Distortionless Transmission Line for On-Chip Electricallong transmission line . . . . . . . . . . . . . . . . . . .

Chen, Hongyu

2006-01-01T23:59:59.000Z

413

ALFRED I. duPONT PAPERS 1897 (1900-1935) 1950  

E-Print Network (OSTI)

Airlines round trip flights; Yamaha keyboard; Frigidaire fridge; Halcyon Morningstar air bed; Mediacom bus

Marsh, David

414

Myriad Mirids: The spectacular radiation of Pseudoloxops (Hemiptera: Miridae) plant bugs in French Polynesia (and the kids that love them!)  

E-Print Network (OSTI)

water (mixed with motor oil) Spray bottles Microscope Laptopspraying them with water and motor oil. They didn’t seem to

Balukjian, Bradley James

2013-01-01T23:59:59.000Z

415

Myriad Mirids: The spectacular radiation of Pseudoloxops (Hemiptera: Miridae) plant bugs in French Polynesia (and the kids that love them!)  

E-Print Network (OSTI)

stripe ventrally and crossing hockey-stick-pattern dorsally,yellow with crossing red hockey stick-shaped stripes meetingyellow with red crossing hockey-stick pattern meeting in

Balukjian, Bradley James

2013-01-01T23:59:59.000Z

416

Don’t Let the HumBUG Get Achoo - Tips for a healthy winter at work and home  

SciTech Connect

Safety-related article for recurrinig column in the Tri-City Area Journal of Business. Focuses on seasonal wellness tips for employers and employees - namely, cold and flu prevention through personal hygiene.

Schlender, Michael H.

2006-12-15T23:59:59.000Z

417

Performance Optimization of VLSI Interconnect Layout Jason Cong, Lei He, Cheng-Kok Koh and Patrick H. Madden  

E-Print Network (OSTI)

, 780 Creston Hatchery Road, Kalispell, Montana 59901 D.W. Garfield 3489 Trails End Road, Missoula decline (Jeppson and Platts 1959; Bjornn 1961; Martin and Olver 1980; Fraley and Shepard 1989; Spencer et for adult lake trout and bull trout (Jeppson and Platts 1959; Bjornn 1961; Martin and Olver 1980; Fraley

He, Lei

418

Transient thermal analysis of PWR’s by a single-pass procedure using a simplified nodal layout  

E-Print Network (OSTI)

PWR accident conditions and analysis methods have been reviewed. Limitations of the simplified method with respect to analysis of these accident conditions are drawn and two transients ( loss of coolant flow, seized rotor) ...

Liu, Jack S. H.

1979-01-01T23:59:59.000Z

419

The Design and Assessment of Advanced Daylighting Systems Integrated with Typical Interior Layouts in Multi-Story Office Buildings.  

E-Print Network (OSTI)

??Two sidelighting solutions — a light shelf system and an optical louver system (FISCH) are assessed and compared in terms of lighting quantity and quality… (more)

Hu, Jianxin

2003-01-01T23:59:59.000Z

420

Microsoft 2.4GHz Wireless Protocol White Paper  

E-Print Network (OSTI)

to turn on the light-emitting diode in the keyboard's Caps Lock, or change the functions of the mouse

Narasayya, Vivek

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

ls ~shigeo/SOTSURON directory? ~shigeo/SOTSURON  

E-Print Network (OSTI)

cat layout4.tcl #12;le name? layout4.tcl 3.6 head ( ) 3.6: head 14 #12; head -40 layout4.tcl number? 40 #12;le name? layout4.tcl -5 head -5 layout4.tcl -5 #12;le name? layout4.tcl -10 10 head -10 layout4.tcl -10 #12;le name? layout4.tcl -20 20 head -20 layout4.tcl -20 #12;le name? layout4.tcl 15 #12

Tanaka, Jiro

422

Aspect-Oriented Programming with Jiazzi Sean McDirmid, Wilson C. Hsieh  

E-Print Network (OSTI)

) to understand why atomicity violation bugs are hard to expose. Second, it proposes CTrigger to effectively

Utah, University of

423

Engineering the Synthesis of Five-Carbon Alcohols from Isopentenyl Diphosphate and Increasing its Production Using an Adaptive Control System  

E-Print Network (OSTI)

of microorganisms for biofuel production: from bugs tofor Direct Biofuel Production from Brown Microalgae. Science

Chou, Howard

2012-01-01T23:59:59.000Z

424

Slide 1  

NLE Websites -- All DOE Office Websites (Extended Search)

Contractor: National Electric Systems Contract Completed Oct 2011 BUILDING STRONG Transformer Location & Cable BUS Layout Current Layout Previous Layout BUILDING STRONG ...

425

Jeremy Coulter  

Science Conference Proceedings (OSTI)

Design and Layout Editor inform magazine Jeremy Coulter Contact Information contact contact us Jeremy Coulter Design and Layout Editor ...

426

Introduction Systems Engineering Fundamentals ENGINEERING  

E-Print Network (OSTI)

. Any supporting calculation shall be made according to MIL-HDBK217. 6.2.2 Mechanical layout The layout

Rhoads, James

427

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

.7% (no enrichment) and around 20% · Large amount of depleted uranium results from enrichment Energy an integrated facility (Integral Fast Reactor), where only small amounts of natural uranium or waste depleted nuclear fuel cycles Ore · All fuel cycles begin with uranium and/or thorium which are the only naturally

Lovley, Derek

428

Breathing rust -and new life into bug science | csmonitor.com WORLD USA COMMENTARY WORK & MONEY LEARNING LIVING SCI / TECH ARTS & LEISURE BOOKS THE HOME FORUM  

E-Print Network (OSTI)

has an alternative, successfully tested at a uranium mine in Colorado the past two summers. By pumping where uranium now poisons the groundwater, Lovley says, the cost would bankrupt the country. His team

Lovley, Derek

429

Gases to gases n Scanning the horizon n Hunting the last ice sheet n Bugs, bogs and gravity www.planetearth.nerc.ac.uk Summer2010  

E-Print Network (OSTI)

of the Rewa Head Anacondas and giant otters ­ experiencing Guyana's biodiversity up close! 15 Scanning

430

Design of a 16T Nb{sub3}Sn Twin Bore Accelerator Dipole with a Window-frame Conductor Layout  

E-Print Network (OSTI)

Research, Office of High Energy and Nuclear Physics, HighOffice of High Energy and Nuclear Physics, High EnergyOffice of High Energy and Nuclear Physics, High Energy

van Oort, J.M.

2011-01-01T23:59:59.000Z

431

The FERMI @ Elettra Technical Optimization Study: General Layout and Parameters and Physics Studies of Longitudinal Space Charge, the Spreader, the Injector, and Preliminary FEL Performance  

E-Print Network (OSTI)

laser systems for a FEL user facility”, M.B Danailov, F. Ö.system intended for a user facility that is operated on a

2005-01-01T23:59:59.000Z

432

XRY Report  

Science Conference Proceedings (OSTI)

Summary Case Data Device/General Information Device/App Usage Device/Keyboard Cache Device/Accounts Contacts Calls Calendar/Calendar ...

2013-08-13T23:59:59.000Z

433

XRY Report  

Science Conference Proceedings (OSTI)

Summary Case Data Device/General Information Device/Network Information Device/App Usage Device/Keyboard Cache Device/Accounts ...

2013-08-13T23:59:59.000Z

434

Partnering Today: Technology Transfer Highlights  

operator with only minimal training. The unit contains a membrane keyboard with extra-large keys allowing the unit to be used with protective gloves.

435

Standards and Trade -- Who Really Cares?  

Science Conference Proceedings (OSTI)

... the arrangement of keyboard characters,; the threads for light bulbs,; rules for the construction and care of steam boilers and pressure vessels, and; ...

2013-07-23T23:59:59.000Z

436

VisVIP: Installation Instructions for UNIX Executable  

Science Conference Proceedings (OSTI)

... invokes Xlib for graphic input (mouse, spaceball, keyboard) and exchanges information with the Tcl/Tk menu via generated X events. ...

437

This is a General University (G.U.) Classroom Audio-Visual assistance & information  

E-Print Network (OSTI)

& troubleshooting Audio & video equipment & controls Rack computers, keyboards & mice Transparency projectors troubleshooting · Wireless & wired network issues · Audience response `Clicker' training & assistance Room

Lennard, William N.

438

Cosmo Player 2.1.1 Quick Reference Guide  

Science Conference Proceedings (OSTI)

... Slide Click Slide and then drag to slide straight up or down, or to slide right or left. ... Keyboard equivalent: Tab or + (plus sign on numeric keypad). ...

2011-02-07T23:59:59.000Z

439

Environment/Health/Safety (EHS): Safety Minute  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidelines - 1 of 2 (PDF, PPT) Computer Monitor Height Guidelines - 2 of 2 (PDF, PPT) Computers: Do You Know Your Keyboard Shortcuts (Windows)? (PDF, PPT) Computers: Take Frequent...

440

Urban Turbulence in Space and in Time  

Science Conference Proceedings (OSTI)

The utility of aggregating data from near-surface meteorological networks for initiating dispersion models is examined by using data from the “WeatherBug” network that is operated by Earth Networks, Inc. WeatherBug instruments are typically ...

Bruce B. Hicks; William J. Callahan; William R. Pendergrass III; Ronald J. Dobosy; Elena Novakovskaia

2012-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Bedbugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bedbugs Bedbugs Nature Bulletin No. 487-A March 31, 1973 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation BEDBUGS The name "bug" frequently and carelessly applied to insects in general, really belongs only to certain special kinds. A true bug differs from other insects in having a beak with which it pierces the skin and sucks the juices from plants or animals, a characteristic odor, and peculiar wings. Further, instead of having four stages in its life history -- egg, larva, pupa and adult -- it has only three. The tiny young, or "nymphs", resemble their parents as soon as hatched from the egg. The water bugs, stink bugs, squash bug, chinch bug, boxelder bug -- and that hated blood-sucking parasite, the Bedbug -- are true bugs.

442

Web sites and resources - SAMATE  

Science Conference Proceedings (OSTI)

... scanning open source "to uncover some of the most critical types of bugs". Software Assurance in the SCADA Community. ...

2013-05-22T23:59:59.000Z

443

Recent Corporate Combinations in the Natural Gas Industry  

U.S. Energy Information Administration (EIA)

Gas Inc plants and Energy Cogeneration, BUG sought to cogeneration maximize shareholder value and pursue other investment opportunities.

444

How someone with a neuromuscular disease experiences operating a PC (and how to successfully counteract that)  

Science Conference Proceedings (OSTI)

This paper describes the experiences of the first author, who has been diagnosed with the neuromuscular disease Friedreich's Ataxia more than 25 years ago, with the innovative approach to human-computer interaction characterized by the software tool ... Keywords: Friedreich's Ataxia, ambiguous keyboard, dysarthria, human-computer interaction, keyboard replacement, mouse emulator, neuromuscular disease, word prediction

Torsten Felzer, Stephan Rinderknecht

2013-10-01T23:59:59.000Z

445

A framework for the static verification of api calls  

Science Conference Proceedings (OSTI)

A number of tools can statically check program code to identify commonly encountered bug patterns. At the same time, programs are increasingly relying on external apis for performing the bulk of their work: the bug-prone program logic is being fleshed-out, ... Keywords: FindBugs, Library, Programming by contract, Static analysis, api

Diomidis Spinellis; Panagiotis Louridas

2007-07-01T23:59:59.000Z

446

Tracking defect warnings across versions  

Science Conference Proceedings (OSTI)

Various static analysis tools will analyze a software artifact in order to identify potential defects, such as misused APIs, race conditions and deadlocks, and security vulnerabilities. For a number of reasons, it is important to be able to track the ... Keywords: FindBugs, Java, bug histories, bug tracking, static analysis

Jaime Spacco; David Hovemeyer; William Pugh

2006-05-01T23:59:59.000Z

447

TMS Two-Column Proceedings Publications: Formatting Instructions  

Science Conference Proceedings (OSTI)

(Mac & Windows) page-layout program. InDesign. (Mac & Windows) page-layout program. Quark Xpress (Mac & Windows) ... WordPerfect (Windows) advanced ...

448

Generated using V3.1.2 of the official AMS LATEX templatejournal page layout FOR AUTHOR USE ONLY, NOT FOR SUBMISSION! Quantifying uncertainty for climate change and long range forecasting scenarios with  

E-Print Network (OSTI)

out in the training phase of the unperturbed climate. 1. Introduction One of the ultimate goals atmosphere-ocean simulation (AOS) models which necessarily parameterize some physical features such as clouds, sea ice cover, etc., as well as turbulent fluxes due subgrid processes in the resolved dynamics

Majda, Andrew J.

449

Zevenhoven & Kilpinen CROSS EFFECTS, TOTAL SYSTEM LAY-OUT 13.6.2001 10-1 Figure 10.1 Typical pulverised coal combustion and gas clean-up system: dry scrubber +  

E-Print Network (OSTI)

REGULATIONS Although incinerator flue gas emission limits for acid gases have been imposed by the federal, such as sodium chlorite (NaCI02), is added to oxidize flue gas NO to N02, which can be removed by a sodium of saturated flue gas to approximately 60°C ( 140°F), the total (par ticulate and gaseous) mercury emissions

Laughlin, Robert B.

450

4.3. The Layer List  

Science Conference Proceedings (OSTI)

... To do this easily, use the keyboard accelerators control-L and control-R , corresponding to the Raise.One_Level and Lower.One_Level in the OOF ...

2013-08-23T23:59:59.000Z

451

OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...  

Office of Scientific and Technical Information (OSTI)

space? How about microbes, bugs, or mutants? Related Topics: audio, DOE laboratories, open government plan, research, ScienceCinema, sciencecinema Read more... DOE research...

452

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VNXVNXe Access Control Bug Lets Remote Authenticated Users Access FilesDirectories A vulnerability was reported in EMC CelerraVNXVNXe. A remote authenticated user can access...

453

OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...  

Office of Scientific and Technical Information (OSTI)

about DOE's work in robotics, antimatter, or outer space? How about microbes, bugs, or mutants? Related Topics: audio indexing, DOE laboratories, open government plan, research...

454

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Table' privileges can gain 'SYS' privileges on the target system. http:energy.govcioarticlesu-233-oracle-database-indextype-ctxsyscontext-bug-lets-remote-authenticated-u...

455

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Users Deny Service Several vulnerabilities were reported in Wireshark. http:energy.govcioarticlesv-037-wireshark-multiple-bugs-let-remote-users-deny-service Article Students...

456

SSRL Web Requests  

NLE Websites -- All DOE Office Websites (Extended Search)

pagesite Change Fix existing form or application Develop new form or application Web-ImagesGraphics Web-Flash Webserver bug - error report Login Help Details of your...

457

diff -crN oommf-1.0b2/CHANGES oommf/CHANGES  

Science Conference Proceedings (OSTI)

... Expanded Tcl/Tk support. ... agrees with Tcl/Tk 8.0.3 and later. + - optional optimization flags in config/cache/*.tcl comments. +. + * Bug fixes. ...

458

Error-correcting codes and cryptography  

Science Conference Proceedings (OSTI)

Oct 20, 2006 ... topics where error-correcting codes overlap with cryptography. In some of these ..... human errors, e.g., misconfigurations or bugs. If biological ...

459

PETSc: Documentation: AMS  

NLE Websites -- All DOE Office Websites (Extended Search)

- Argonne Memory Snooper Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation AMS Changes Bug Reporting Code Management FAQ...

460

Mercury | RPC for High-Performance Computing  

NLE Websites -- All DOE Office Websites (Extended Search)

RPC for High-Performance Computing Skip to content Home About Overview Collaborators Downloads Documentation Getting Started Doxygen Publications Support Mailing Lists Bug Reports...

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

NATURE WALKS SCHEDULE - SPRING 2013  

NLE Websites -- All DOE Office Websites (Extended Search)

items include water, binoculars, field guide to birds, field guide to stars, bug spray if needed. We should see American woodcock flight displays, we will have a...

462

Rapsodia  

NLE Websites -- All DOE Office Websites (Extended Search)

a code generator to efficiently compute higher order derivatives via operator overloading LEM3 logo Argonne logo Access -- API Documentation -- Manual -- Bugs -- Tests -- Contact...

463

NIST SP 800-155, BIOS Integrity Measurement Guidelines ...  

Science Conference Proceedings (OSTI)

... failure, information leakage, and other losses of confidentiality ... fix bugs in the power management subsystem ... hard disk or network management, or ...

2013-04-25T23:59:59.000Z

464

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

gain 'SYS' privileges on the target system. http:energy.govcioarticlesu-233-oracle-database-indextype-ctxsyscontext-bug-lets-remote-authenticated-users-gain Article Small...

465

The National Institute of Standards & Technology (NIST) is a ...  

Science Conference Proceedings (OSTI)

... including: power outages due to storms, failures in backup generators, software bugs ... average anti-fitness to drop and then climb back up during the ...

2012-11-02T23:59:59.000Z

466

U-021: Cisco Unified Communications Manager Directory Traversal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

467

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Remote Authenticated Users Gain Elevated Privileges V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-535: Oracle Critical Patch Update -...

468

V-073: IBM Tivoli Federated Identity Manager Signature Verification...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities...

469

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Science, announced... http:energy.govarticlesusstatements-international-fusion-reactor-iter-siting-decision Article U-121: Apple iOS Bugs Let Remote Users Execute...

470

PETSc: Documentation: Installation  

NLE Websites -- All DOE Office Websites (Extended Search)

Installation Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation AMS Changes Bug Reporting Code Management FAQ License Linear...

471

ZeptoOS // Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links ZeptoOS-specific resources: Subversion repository Kernel GIT repository Bug tracking system Blue Gene resources: ALCF: Argonne Leadership Computing Facility Blue Gene...

472

Production-run software failure diagnosis via hardware performance counters  

Science Conference Proceedings (OSTI)

Sequential and concurrency bugs are widespread in deployed software. They cause severe failures and huge financial loss during production runs. Tools that diagnose production-run failures with low overhead are needed. The state-of-the-art diagnosis techniques ... Keywords: concurrency bugs, failure diagnosis, performance counters, production run

Joy Arulraj; Po-Chun Chang; Guoliang Jin; Shan Lu

2013-04-01T23:59:59.000Z

473

Software change contracts  

Science Conference Proceedings (OSTI)

Incorrect program changes including regression bugs, incorrect bug-fixes, incorrect feature updates are pervasive in software. These incorrect program changes affect software quality and are difficult to detect/correct. In this paper, we propose the ... Keywords: JML, change contract, regression testing, software evolution

Dawei Qi; Jooyong Yi; Abhik Roychoudhury

2012-11-01T23:59:59.000Z

474

Generating analyses for detecting faults in path segments  

Science Conference Proceedings (OSTI)

Although static bug detectors are extensively applied, there is a cost in using them. One challenge is that static analysis often reports a large number of false positives but little diagnostic information. Also, individual bug detectors need to be built ... Keywords: demand-driven, generate analysis, path segment, specification

Wei Le; Mary Lou Soffa

2011-07-01T23:59:59.000Z

475

UNIVERSITY RESEARCH 64 November 2007 www.pctonline.com  

E-Print Network (OSTI)

infestations as of May 2007. Insecticide sprays, steam machineapplications examining the bed bug distribution,weplacedthebeddingmateri- als in plastic bags and asked the residentsSultS.Theaveragenumberofbedbugs found per apartment was 157 (range: 3 to 425) (see Table 1, page 68). Distribution of the bed bugs

Wang, Changlu

476

North Carolina Cooperative Extension Service  

E-Print Network (OSTI)

by leaf dip and spray tower against Bemisia argentifolii (Homoptera: Aleyrodidae). Pestic. Sci. 44, 317e extract of Chenopodium ambrosioides), BugOil (a mixture of four plant essential oils), and SunSpray oil (a on the leaves treated with SunSpray Oil, BugOil or Requiem 3 d after treatment. The repellency rates

477

Do not blame users for misconfigurations  

Science Conference Proceedings (OSTI)

Similar to software bugs, configuration errors are also one of the major causes of today's system failures. Many configuration issues manifest themselves in ways similar to software bugs such as crashes, hangs, silent failures. It leaves users clueless ... Keywords: constraint, inference, misconfiguration, testing, vulnerability

Tianyin Xu, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy

2013-11-01T23:59:59.000Z

478

Accentuating the positive: atomicity inference and enforcement using correct executions  

Science Conference Proceedings (OSTI)

Concurrency bugs are often due to inadequate synchronization that fail to prevent specific (undesirable) thread interleavings. Such errors, often referred to as Heisenbugs, are difficult to detect, prevent, and repair. In this paper, we present a new ... Keywords: atomicity, concurrency bugs, debugging, locking, profile

Dasarath Weeratunge; Xiangyu Zhang; Suresh Jaganathan

2011-10-01T23:59:59.000Z

479

LiteRace: effective sampling for lightweight data-race detection  

Science Conference Proceedings (OSTI)

Data races are one of the most common and subtle causes of pernicious concurrency bugs. Static techniques for preventing data races are overly conservative and do not scale well to large programs. Past research has produced several dynamic data race ... Keywords: concurrency bugs, dynamic data race detection, sampling

Daniel Marino; Madanlal Musuvathi; Satish Narayanasamy

2009-06-01T23:59:59.000Z

480

NEWTON, Ask a Scientist at Argonne National Labs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bacteria Resistance Bacteria Resistance Name: Brittany Status: student Grade: 6-8 Location: AZ Country: USA Date: Spring 2012 Question: Why have bacteria evolved resistance so rapidly? Replies: Suppose you have a bug spray and you use it to exterminate a cloud of mosquitoes. In the cloud of mosquitoes there may be one or two that are immune to the effects of the bug spray. So what you do is kill all the mosquitoes that don't have resistance to the bug spray Leaving behind the mosquitoes that do, and then those remaining mosquitoes regenerate. That is the sad story of how bugs develop resistance to our countermeasures. So far, we have always been able to find a bug spray formula to take care of the present cloud of mosquitoes. Sincere regards, Mike Stewart Brittany, To answer your question, a couple of things need to be considered.

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Monthly report of activities: JUNE 1, 1969  

SciTech Connect

Some of the things discussed in this report are: (1) Computation--NAL is now obtaining satisfactory service on NYU's 6600 computer via the telephone data link. Until about two weeks ago we were plagued by numerous breakdowns of the computer itself (one lasting about three weeks), and bugs in the NYU programs that control the transmission. Early this month a two month complete rebuilding of the NYU computer was begun. During this period Control Data Corporation is making a new computer at their Manhattan data center available to NYU and to the remote-terminal users. This computer is reasonably reliable, and the most serious bugs have apparently been removed from the transmission system. NAL now has immediate access to the computer for most of the day and turn-around time for jobs with moderate amounts of output is often less than one hour. We have always received excellent service and help from Argonne's Applied Mathematics Division, which has made its two computers, a CDC 3600 and an IBM 360-75, available to us. At present we have a courier service to Argonne making three trips a day, soon to be extended to five. In addition IBM is furnishing very competent personnel to help convert 6600 programs to the 360. (2) Main-Ring Lattice--A small adjustment has been made in the quadrupoles of the long straight sections. Since the beam cross section is greatest there, these quadrupoles have been increased in aperture. To preserve focal length and pole-tip field, their length was also increased at the expense of about a meter of straight section length. The lattice is quite stable against changes of v. If all the quadrupole gradients are increased or decreased proportionately to cover a range of v between 18.5 and 22, the maximum increase in B is less than 20%, except for the stopland at v = 21 of width {Delta}v {approx_equal} {+-} 0.1, due to the structure resonance arising from the six -fold periodicity. (3) Injection Energy--A study was made of the appropriate injection energy for a 5 Hz booster to be used in connection with the accumulator ring. Both cost and performance were considered. The conclusion is that 200 MeV is still the most desirable injection energy for such a booster. (4) Main-Ring Magnet Computations--The design work using the computer program TRIM for the main ring bending magnet is continuing. The effort so far indicates that field shapes well within acceptable tolerance can be obtained up to at least 18 kG without crenellation for both B1 and B2 magnets and the degree of saturation can be made quite small (about 3.5% at 18 kG) and equal for both magnets. The proper coil configurations are 4 turns out of 12 placed between poles for B1 and 4 turns out of 16 placed in between poles for B2. With these coil configurations, the proper pole widths are approximately 8.5 in. for B1 and 8.8 in. for B2. (5) Secondary Beams--Studies are being made with A. L. Read of possible secondary beam layouts. One scheme is to channel a secondary beam through bending magnets and a set of three quadrupole triplets producing 3600 phase advance from source to target, with a momentum-analyzing slit at an image point 1800 downstream.

1968-06-01T23:59:59.000Z

482

FISSEA Newsletter - December 2002  

Science Conference Proceedings (OSTI)

... format, layout and design Increase distribution (eg, CIO Council and ... Task #4 - Database Use database information for: o Membership records. ...

483

Hierarchical extraction of critical area for shorts in very large ICs  

Science Conference Proceedings (OSTI)

This paper describes an algorithm for efficiently extracting critical area in large VLSI circuits. The algorithm, implemented to handle shorts between electrical nets, takes advantage of the available hierarchy in the layout description in order to speed-up ... Keywords: CREST software, IC design, VLSI, circuit layout CAD, critical area extraction, hierarchical extraction, integrated circuit layout, large VLSI circuits, layout description, shorts, very large ICs

P. K. Nag; W. Maly

1995-11-01T23:59:59.000Z

484

Put Your Presentation Title Here  

Science Conference Proceedings (OSTI)

... Laser Platform Layout / DFM CaF2 Substrate Potential Showstopper / Requires Invention Critical Issue / Development Required Solution Known ...

2011-10-03T23:59:59.000Z

485

Introduction to High Performance Computers Richard Gerber NERSC User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

What are the main parts of a What are the main parts of a computer? Merit Badge Requirements ... 4. Explain the following to your counselor: a. The five major parts of a computer. ... Boy Scouts of America Offer a Computers Merit Badge 5 What are the "5 major parts"? 6 Five Major Parts eHow.com Answers.com Fluther.com Yahoo! Wikipedia CPU CPU CPU CPU Motherboard RAM Monitor RAM RAM Power Supply Hard Drive Printer Storage Power Supply Removable Media Video Card Mouse Keyboard/ Mouse Video Card Secondary Storage Monitor Motherboard Keyboard Motherboard Motherboard Sound Card Case / Power Supply IO Peripherals 7 * What is a computer? - It depends what you are interested in. * CPU, memory, video card, motherboard, ... * Monitor, mouse, keyboard, speakers, camera,

486

A New Flow Diagramming Scheme For Mapping And Analysis Of Multi-Product Flows In A Facility  

Science Conference Proceedings (OSTI)

The design of layouts for facilities that process a high variety of products requires the analysis of a large number of different product routings and their spatial representation on a planar layout of the facility. Traditionally, the representations ... Keywords: Material flow analysis, cascading flowlines, cluster analysis, facility layout, modified multi-product process chart (MM-PPC), string alignment

Jin Zhou; Shahrukh A. Irani

2003-01-01T23:59:59.000Z

487

Author manuscript, published in "13th International Conference on Quality Software (QSIC 2013), Nanjing: China (2013)" An Empirical Study of Adoption of Software Testing in Open Source Projects  

E-Print Network (OSTI)

Abstract—Testing is an indispensable part of software development efforts. It helps to improve the quality of software systems by finding bugs and errors during development and deployment. Huge amount of resources are spent on testing efforts. However, to what extent are they used in practice? In this study, we investigate the adoption of testing in open source projects. We study more than 20,000 non-trivial software projects and explore the correlation of test cases with various project development characteristics including: project size, development team size, number of bugs, number of bug reporters, and the programming languages of these projects. Keywords-Empirical study, Software testing, Adequacy, Test cases

Pavneet Singh Kochhar; Tegawendé F. Bissy; David Lo; Lingxiao Jiang

2013-01-01T23:59:59.000Z

488

Open Issues  

NLE Websites -- All DOE Office Websites (Extended Search)

FIXED] JGI data loss in /projectb/sandbox area [purge] FIXED] JGI data loss in /projectb/sandbox area [purge] August 19, 2013 by Kjiersten Fagnan | 0 Comments We have discovered a serious bug in our purge scripts on /global/projectb. The */global/projectb/sandbox* areas are supposed to be immune from the purge (like the project directories); however, there is a bug in the purge script that caused some files to be deleted if they had not been touched for 90+ days (like data in the scratch directories). *The sandbox areas are not backed up*, so if this data was not in more than one location on disk or in HPSS, it has been lost. We have found the bug and have suspended the purge script until the bug is fixed. 0 comments | Read the full post [FIXED] perl 5.16.0 File::Glob() causes crashes August 15, 2013 by Doug Jacobsen | 1 Comments

489

TAO: Contact Us  

NLE Websites -- All DOE Office Websites (Extended Search)

The TAO e-mail address tao-comments@mcs.anl.gov is provided for users to communicate with the TAO developers on topics such as reporting bugs, asking for clarification, asking for help in tracking down bugs, and requesting new features within TAO. We try to respond to this email promptly. Please do not send maintenance requests to the individual TAO authors; all e-mail to tao-comments@mcs.anl.gov is automatically distributed to all of the TAO authors, so our response time using this address will be faster. Guidelines for Bug Reports: The more information that you convey about a bug, the easier it will be for us to target the problem. We suggest providing the following information: If the problem involves installation, then send the entire log file from running make.

490

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61 - 28570 of 31,917 results. 61 - 28570 of 31,917 results. Article U-141: Sourcefire Defense Center Bugs Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system. http://energy.gov/cio/articles/u-141-sourcefire-defense-center-bugs Article U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. http://energy.gov/cio/articles/u-075-apache-struts-bug-lets-remote-users-overwrite-files-and-execute-arbitrary-code Article U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system.

491

Developer | OpenEI Community  

Open Energy Info (EERE)

bug bug Type Term Title Author Replies Last Post sort icon Discussion bug Image upload with broken thumbnail image Rmckeel 1 13 Aug 2012 - 08:22 Discussion bug "Ghost" entries Rmckeel 1 19 Jun 2012 - 08:05 Groups Menu You must login in order to post into this group. Recent content Thank you Jon, I know about th... Hi Yury-Thank you for your i... source code for OpenEI extensions Timo,My apologies for the ... Browse by region (RaphaelSVGMap) more Group members (19) Managers: Rmckeel Recent members: Yury Katkov Sangduen Timo.Kouwenhoven Jwkropf KingJahfy Graham7781 Ianjkalin Autumn1 Mvdv Sprzesmi Satish Cdonnelly Wzeng Twong Jayhuggins Jorn.aabakken Jweers NickL 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142253338

492

Operation Epsilon: Science, History, and Theatrical Narrative  

E-Print Network (OSTI)

In 1945, shortly after VE day, the Anglo-American forces rounded up ten renowned nuclear scientists and interned them at Farm Hall, an estate near Cambridge, England. All the rooms on the estate had been bugged. The ...

Brody, Alan

493

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Execute Arbitrary Code A vulnerability was reported in HP SiteScope. http:energy.govcioarticlesu-265-hp-sitescope-bugs-sitescope-soap-feature-let-remote-users-obtain-inform...

494

Measuring architecture quality by structure plus history analysis  

Science Conference Proceedings (OSTI)

This case study combines known software structure and revision history analysis techniques, in known and new ways, to predict bug-related change frequency, and uncover architecture-related risks in an agile industrial software development project. We ...

Robert Schwanke, Lu Xiao, Yuanfang Cai

2013-05-01T23:59:59.000Z

495

EXPGUI Revision Log  

Science Conference Proceedings (OSTI)

... 03/24 fix bug in save options Add unix capability to print selected text (should work on OS X if lpr points to desired printer -- I think) orient.tcl 1.9 2005 ...

496

Lens-array PDV Probe Using a Pyramid Prism  

SciTech Connect

A bug eye probe is shown using a pyramid prism, and its advantages and disadvantages are enumerated. Also shown is abug eye imaging probe, with its advantages and disadvantages enumerated.

Malone, R. M., Kaufman, M. I., Cox, B., Romero, V., Cata B., Sorenson, D. Pazuchanics, P.

2011-11-01T23:59:59.000Z

497

Tk Japanization Patch  

Science Conference Proceedings (OSTI)

... to fix the bug in the original Tcl/Tk. ... ѬÑ?Ñ?Ñ?Ñ?ñ? Tcl/Tk ñ?ѽÑ?Ñ? Ñ?Ñ?Ñ?Ñó????Ñ?í?Ñ»Ñ?Ññ??ñ? John Ousterhout. ...

498

Brede tools and federating online neuroinformatics databases Finn Arup Nielsen  

E-Print Network (OSTI)

Information Framework (NIF) that uses the Neuro- science Information Framework standardized (NIF- STD) ontology (Bug et al, 2008). With this ontology NIF performs term expansion from a user query. The expanded

499

TransDPOR: a novel dynamic partial-order reduction technique for testing actor programs  

Science Conference Proceedings (OSTI)

To detect hard-to-find concurrency bugs, testing tools try to systematically explore all possible interleavings of the transitions in a concurrent program. Unfortunately, because of the nondeterminism in concurrent programs, exhaustively exploring all ...

Samira Tasharofi; Rajesh K. Karmani; Steven Lauterburg; Axel Legay; Darko Marinov; Gul Agha

2012-06-01T23:59:59.000Z

500

The Entire Veterinary Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

Dying Cat Behavior Cat and Dog Age Rabies Transmission Dogs and Health Field Mice and Lyme Disease Feline Leukemia Shed less Dogs Dogs and Rubber Trees June Bug Meals Cedar and...