Powered by Deep Web Technologies
Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

2

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

3

Fisheye Keyboard: Whole Keyboard Displayed on Small Device  

E-Print Network [OSTI]

where he must sometimes search for a character or press several keys to enter one given character, Interaction styles. General terms: Design Keywords: soft keyboard, ultra mobile PC (UMPC), fisheye view that a user might well prefer to enter text on a known character layout rather than on a minimal soft keyboard

Paris-Sud XI, Université de

4

Water Bugs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

5

Keyboard Acoustic Emanations Scott Leishman  

E-Print Network [OSTI]

of this step is the matrix. After that, the Viterbi algorithm [11] is used to infer qi, i.e. the best sequenceKeyboard Acoustic Emanations Scott Leishman ML Tea Talk - May 3rd, 2006 1 (or why you shouldn

Roweis, Sam

6

A bug's leaf | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

7

Underground Layout Configuration  

SciTech Connect (OSTI)

The purpose of this analysis was to develop an underground layout to support the license application (LA) design effort. In addition, the analysis will be used as the technical basis for the underground layout general arrangement drawings.

A. Linden

2003-09-25T23:59:59.000Z

8

Keyboard design variables in dual task mode selection  

E-Print Network [OSTI]

USAF flight gloves. The experimental tasks were as follows: (a) pilots centering a set of crosshairs on a CRT using a joystick with the right hand and; (b) pilots simultaneously performing (a) and selecting flight modes with the left hand without... observing the keyboard. The study investigated the effect of keyboard size, angle of inclination of the keyboard and with and without gloves on response time, keying errors and tracking scores. The flight mode locations remained constant throughout...

Hansen, Mark Douglas

2012-06-07T23:59:59.000Z

9

Massive June Bug Emergence  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

10

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Broader source: Energy.gov (indexed) [DOE]

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

11

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Broader source: Energy.gov (indexed) [DOE]

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

12

TTYYPPEE IINN HHEEBBRREEWW OONN WWIINNDDOOWWSS Installing the Hebrew Keyboard Layout in Windows XP  

E-Print Network [OSTI]

rather than Times New Roman for Hebrew; you can download some Hebrew fonts at: http://bet.iba.org.il/ Click on "Bet Live" at top left to stream live radio and pre-recorded television news from Israel

13

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

14

MEASUREMENT OF IMPEDANCE CHARACTERISTICS OF COMPUTER KEYBOARD KEYS1  

E-Print Network [OSTI]

of computer keyboard keys are commonly used: rubber-dome and coil-spring keys. As indicated by their names, a rubber-dome key has a rubber dome under the keycap whereas a coil-spring key has a coil spring under of keys. From a user's perspective, the rubber-dome and coil-spring keys feel different. The properties

Nagurka, Mark L.

15

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

16

Chinch Bugs in St. Augustine Lawns  

E-Print Network [OSTI]

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

17

Team Bug Bag Biogas For Nicaragua  

E-Print Network [OSTI]

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

18

Summary of Bugs Database Jeremy Kepner  

E-Print Network [OSTI]

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

19

Chapter 3 - Substation Layouts  

Science Journals Connector (OSTI)

Publisher Summary Substations are the points in the power network, where transmission lines and distribution feeders are connected together through circuit breakers or switches via busbars and transformers. This allows for the control of power flows in the network and general switching operations for maintenance purposes. This chapter describes the principal substation layouts, the effects of advancements in substation equipment, the modular design, the compact substations, and the moves toward design and construction “turnkey” contract work. The descriptions concentrate on air insulated switchgear (AIS) outdoor open terminal designs at rated voltages of 72 kV and higher. In an ideal situation all circuits and substation equipment would be duplicated such that following a fault or during maintenance a connection remains available. This would involve very high cost. Methods have therefore been adopted to achieve a compromise between complete security of supply and capital investment. A measure of circuit duplication is adopted while recognizing that duplication may itself reduce the security of supply by, for example, providing additional leakage paths to earth.

C.R. Bayliss; B.J. Hardy

2012-01-01T23:59:59.000Z

20

VDT keyboard wrist rests: an ergonomic evaluation and comparison  

E-Print Network [OSTI]

). As a result of one of these studies, 20 of the 30 participants preferred a keyboard with wrist support and 24 claimed that the wrist support does not impede typing activities (Grandjean, 1987). In support of ergonomic adaptations, the U. S. Army... PPER ARM LOWER ARM WRIST INDEX FINGER LITTLE FINGER RING FINGER MIDDLE FINGER 0 0 0 0 0 0 0 0 0 0 0 CI 0 0 0 CI 0 0 0 0 0 0 0 0 0 0 0 CI 0 CI CI 0 0 CI 0 0 Comments No Dlscoaforl Dlscoarort Does Not lo Tbts Restrict Ares...

Rowell, Thomas Sanford

2012-06-07T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

INTERNATIONAL JOURNAL OF SPEECH TECHNOLOGY 5, 371388, 2002 A Listening Keyboard for Users with Motor Impairments--  

E-Print Network [OSTI]

INTERNATIONAL JOURNAL OF SPEECH TECHNOLOGY 5, 371­388, 2002 ­ 1 ­ A Listening Keyboard for Users-bodied users experience similar difficulties when interacting with mobile devices; this is due to the reduced listening keyboard is better for users with motor impairments than handstick, in terms of task completion

Manaris, Bill

22

An Ant Colony Optimization Algorithm for the Optimization of the Keyboard Arrangement  

E-Print Network [OSTI]

An Ant Colony Optimization Algorithm for the Optimization of the Keyboard Arrangement Problem Jan for several languages. Comparisons are made with standard manually optimized keyboards. Keywords: evolutionary computations, ant colony optimization, key- board arrangement 1 Introduction A computer user or typist

Paris-Sud XI, Université de

23

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

24

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

25

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Broader source: Energy.gov (indexed) [DOE]

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

26

Scale Insects and Mealy Bugs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

27

Pointright: a system to redirect mouse and keyboard control among multiple machines  

DOE Patents [OSTI]

The present invention provides a software system, PointRight, that allows for smooth and effortless control of pointing and input devices among multiple displays. With PointRight, a single free-floating mouse and keyboard can be used to control multiple screens. When the cursor reaches the edge of a screen it seamlessly moves to the adjacent screen and keyboard control is simultaneously redirected to the appropriate machine. Laptops may also redirect their keyboard and pointing device, and multiple pointers are supported simultaneously. The system automatically reconfigures itself as displays go on, go off, or change the machine they display.

Johanson, Bradley E. (Palo Alto, CA); Winograd, Terry A. (Stanford, CA); Hutchins, Gregory M. (Mountain View, CA)

2008-09-30T23:59:59.000Z

28

Patch layout generation by detecting feature networks  

Science Journals Connector (OSTI)

Abstract The patch layout of 3D surfaces reveals the high-level geometric and topological structures. In this paper, we study the patch layout computation by detecting and enclosing feature loops on surfaces. We present a hybrid framework which combines several key ingredients, including feature detection, feature filtering, feature curve extension, patch subdivision and boundary smoothing. Our framework is able to compute patch layouts through concave features as previous approaches, but also able to generate nice layouts through smoothing regions. We demonstrate the effectiveness of our framework by comparing with the state-of-the-art methods.

Yuanhao Cao; Dong-Ming Yan; Peter Wonka

2014-01-01T23:59:59.000Z

29

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

81 - 19790 of 28,905 results. 81 - 19790 of 28,905 results. Article U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny http://energy.gov/cio/articles/u-045-windows-win32ksys-keyboard-layout-bug-lets-local-users-deny-service Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article T-639: Debian update for libxml2 Libxml2 XPath Nodeset Processing Vulnerability http://energy.gov/cio/articles/t-639-debian-update-libxml2 Article T-613: Microsoft Excel Axis Properties Remote Code Execution

30

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network [OSTI]

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

31

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peńas; Richard C. Russell

2012-01-01T23:59:59.000Z

32

MINT Optical Layout Yeong Shang Loh1  

E-Print Network [OSTI]

MINT Optical Layout Yeong Shang Loh1 April 5, 2000 Abstract This paper discusses the criteria affecting the choice of optical configuration for the MINT antennae. Parameters for the shielded Cassegrain degradation from misalignment and mounting errors. 1 Advisor: S. Staggs and L. Page #12;2 MINT Optical Layout

33

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Broader source: Energy.gov (indexed) [DOE]

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

34

Ergonomic Modelling and Optimization of the Keyboard Arrangement with an Ant Colony Optimization  

E-Print Network [OSTI]

Ergonomic Modelling and Optimization of the Keyboard Arrangement with an Ant Colony Optimization justified the choice of heuristic ergonomic criteria, a mathematical function for the ergonomic eval- uation the arrangement have any alphanumeric logical order nor is it optimized according to a high hit rate or ergonomic

Paris-Sud XI, Université de

35

Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier  

E-Print Network [OSTI]

on key 4, CaCl2 on key 5...). As the user enters his PIN, salts get mixed and leave the keyboard, some KCl on key 1, LiCl on key 2, SrCl2 on key 3, BaCl2 on key 4, CaCl2 on key 5...). As the user

36

Fluid samplers: sampling music keyboards having fluidly continuous action and sound, without being electrophones  

Science Journals Connector (OSTI)

Present-day sampling music keyboards are electronic instruments that fall under the last (5th) category of the Hornbostel Sachs musical instrument classification scheme. Conversely, we first propose an entirely acoustic/mechanical mellotron-like sampling ... Keywords: fluid sampling, fluid user-interfaces, hydraulophones, interactive art, tangible user interfaces, water-based immersive multimedia

Steve Mann; Ryan E. Janzen

2007-09-01T23:59:59.000Z

37

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peńas; Richard C. Russell

2012-01-01T23:59:59.000Z

38

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, 1st edition  

Science Journals Connector (OSTI)

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work ...

Brett Shavers

2013-03-01T23:59:59.000Z

39

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Broader source: Energy.gov (indexed) [DOE]

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

40

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

42

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Broader source: Energy.gov (indexed) [DOE]

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

43

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

44

Microsoft Word - Final BUGS article final.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

45

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

46

UCRL-JRNL-211774 Cache-Oblivious Mesh Layouts  

E-Print Network [OSTI]

UCRL-JRNL-211774 Cache-Oblivious Mesh Layouts Sung-Eui Yoon, Peter Lindstrom, Valerio Pascucci endorsement purposes. #12;Cache-Oblivious Mesh Layouts Sung-Eui Yoon1 Peter Lindstrom2 Valerio Pascucci2

Pascucci, Valerio

47

Repository surface design site layout analysis  

SciTech Connect (OSTI)

The purpose of this analysis is to establish the arrangement of the Yucca Mountain Repository surface facilities and features near the North Portal. The analysis updates and expands the North Portal area site layout concept presented in the ACD, including changes to reflect the resizing of the Waste Handling Building (WHB), Waste Treatment Building (WTB), Carrier Preparation Building (CPB), and site parking areas; the addition of the Carrier Washdown Buildings (CWBs); the elimination of the Cask Maintenance Facility (CMF); and the development of a concept for site grading and flood control. The analysis also establishes the layout of the surface features (e.g., roads and utilities) that connect all the repository surface areas (North Portal Operations Area, South Portal Development Operations Area, Emplacement Shaft Surface Operations Area, and Development Shaft Surface Operations Area) and locates an area for a potential lag storage facility. Details of South Portal and shaft layouts will be covered in separate design analyses. The objective of this analysis is to provide a suitable level of design for the Viability Assessment (VA). The analysis was revised to incorporate additional material developed since the issuance of Revision 01. This material includes safeguards and security input, utility system input (size and location of fire water tanks and pump houses, potable water and sanitary sewage rates, size of wastewater evaporation pond, size and location of the utility building, size of the bulk fuel storage tank, and size and location of other exterior process equipment), main electrical substation information, redundancy of water supply and storage for the fire support system, and additional information on the storm water retention pond.

Montalvo, H.R.

1998-02-27T23:59:59.000Z

48

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network [OSTI]

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

49

A Spring-Embedding Approach for the Facility Layout Problem  

E-Print Network [OSTI]

a requirement; for example, planning of an airplane's dashboard, a city or a neighbourhood, a layout of office ... To describe the DISCON4,5 (DISpersion-

2003-01-27T23:59:59.000Z

50

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

51

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

52

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

53

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

54

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Broader source: Energy.gov (indexed) [DOE]

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

55

A WYSIWYG approach for configuring model layout using model transformations  

Science Journals Connector (OSTI)

Model transformation is a core technology in Domain-Specific Modeling (DSM). While a number of model transformation languages and tools have been developed to support model transformation activities, the layout of visual models in the transformation ... Keywords: demonstration, model layout, model transformation

Yu Sun; Jeff Gray; Philip Langer; Manuel Wimmer; Jules White

2010-10-01T23:59:59.000Z

56

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

57

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

58

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

59

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

60

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers [EERE]

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

62

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

63

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

64

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

65

A Voice of Supplication: A Study of Three Genevan Psalm Tunes Set by Jan Pieterszoon Sweelinck for Two Mediums: Keyboard and Chorus  

E-Print Network [OSTI]

Page Introduction………………………………………………………………………………………..1 Chapter I: Jan Pieterszoon Sweelinck: Biography………………………………………………...1 Chapter II: Psalm-Based Works in the Netherlands………………………………………………3 Chapter III: Sweelinck’s Genevan Psalm Settings..., “Germany and the Netherlands,” in Keyboard Music Before 1700, 2nd edition, ed. Alexander Silbiger (New York: Routledge, 2004), 167. 9 Ibid. 10 Dirksen and Vogel, introduction to the Complete Keyboard Works, 9. 11 Tollefsen and Dirksen, "Sweelinck...

Groenewold, Carrie Jane

2014-05-31T23:59:59.000Z

66

A comparison of speech versus keyboard input and scrolling versus nonscrolling menus on a menu-based natural language interface  

E-Print Network [OSTI]

LANGUAGE INTERFACE A Thesis by MARK EDWARD ARMSTRONG Approved as to style and content by: R. D. uchings (Chairman of Co 'ttee) R. J. pa (Member) W. . Johnston (Member) , D. Williams (Member) . K. Be nett (Head of Department) December 198i... 111 ABSTRACT A Comparison ol' Speech Versus Keyboard Input and Scrolling Versus ibonscrolling Xlenus on a ilenu-Based natural Language Interface. (December 198F) %lark Edward Armstrong, B. S. . Texas AhsvI I. niversity. Chairman of Advisory...

Armstrong, Mark Edward

1987-01-01T23:59:59.000Z

67

Chapter 6 - Brake System Layout Design  

Science Journals Connector (OSTI)

Abstract This chapter brings together high-level braking system design (Chapters 3 and 4Chapter 3Chapter 4) and the design of friction brakes (Chapter 5) to complete the ’layout’ design of road vehicle braking systems. Two actuation systems are studied: hydraulic (used on passenger cars and light commercial vehicles) and pneumatic (used on heavy commercial vehicles). Other braking technologies (e.g. regenerative) and actuation systems (e.g. power hydraulic and electromechanical) are also mentioned. A four-step design procedure is presented, which includes designing the basic braking system parameters based on the vehicle configuration, specifying the brakes (size and torque capacity), designing the actuation system, and verification (legislative requirements). Examples are presented for a hydraulic system with a vacuum booster (passenger car) and a pneumatic system (articulated commercial vehicle), which illustrate the important features of achieving a good basic system configuration. In passenger cars, the importance of driver interface parameters such as pedal feel is explained, and for commercial vehicles, compatibility, load sensing, and predominance between the trailer and towing vehicle brake systems is discussed.

Andrew Day

2014-01-01T23:59:59.000Z

68

Microsoft Word - Final BUGS article final.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

69

NSLS-II Source Properties and Floor Layout  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSLS-II Source Properties and Floor Layout NSLS-II Source Properties and Floor Layout April 12, 2010 Contents Basic Storage Ring Parameters Basic and Advanced Source Parameters Brightness Flux Photon Source Size and Divergence Power Infrared Sources Distribution of Sources Available for User Beamlines Floor Layout This document provides a summary of the current NSLS-II source and floor layout parameters. For a more complete description of the NSLS-II accelerator properties planned for NSLS-II, see the NSLS-II Preliminary Design Report Basic NSLS-II Storage Ring Parameters at NSLS-II website. We note that this document summarizes the present status of the design, but that the design continues to be refined and that these parameters may change as part of this process. NSLS-II is designed to deliver photons with high average spectral brightness in the 2 keV to 10 keV

70

Case studies on lithography-friendly vlsi circuit layout  

E-Print Network [OSTI]

lithography-friendly. In this work, we intend to implement these modifications as a series of perturbations on the initial layout generated by the CAD tool for the circuit. To implement these changes we first calculate the feature variations offline...

Shah, Pratik Jitendra

2009-05-15T23:59:59.000Z

71

Photonic Device Layout Within the Foundry CMOS Design Environment  

E-Print Network [OSTI]

A design methodology to layout photonic devices within standard electronic complementary metal-oxide-semiconductor (CMOS) foundry data preparation flows is described. This platform has enabled the fabrication of designs ...

Orcutt, Jason Scott

72

Optimal Heliostat Layout for Concentrating Solar Tower Systems  

Science Journals Connector (OSTI)

A methodology to give an optimal layout of a group of heliostats has been developed for concentrating solar tower ... the method determines an optimal configuration of a heliostat field around a tower where refle...

Motoaki Utamura; Yutaka Tamaura…

2007-01-01T23:59:59.000Z

73

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network [OSTI]

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

74

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network [OSTI]

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

75

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

76

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can...

77

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can...

78

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

79

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

80

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

82

CMOS Photovoltaic-cell Layout Configurations for Harvesting Microsystems  

E-Print Network [OSTI]

CMOS Photovoltaic-cell Layout Configurations for Harvesting Microsystems Rajiv Damodaran Prabha, and radiation, photovoltaic (PV) systems are appealing options. Still, chip-sized CMOS PV cells produce only well in substrate cell are better. Index Terms--Ambient light energy, harvester, CMOS photovoltaic (PV

Rincon-Mora, Gabriel A.

83

Facility Siting and Layout Optimization Based on Process Safety  

E-Print Network [OSTI]

) that identifies potential layouts by minimizing overall costs. This approach gives the coordinates of each facility in a continuous plane, and estimates for the total length of pipes, the land area, and the selection of safety devices. Finally, the 3D...

Jung, Seungho

2012-02-14T23:59:59.000Z

84

Near optimal design of fixture layouts in multi-station assembly processes  

E-Print Network [OSTI]

This dissertation presents a methodology for the near optimal design of fixture layouts in multi-station assembly processes. An optimal fixture layout improves the robustness of a fixture system, reduces product variability and leads...

Kim, Pansoo

2004-11-15T23:59:59.000Z

85

Automated material handling systems: an approach to robust layout planning of AMHS  

Science Journals Connector (OSTI)

The simulation-based layout planning of automated material handling systems (AMHS) for microelectronics and semiconductor manufacturing demands adequate simulation models. An approach for measuring and quantifying the AMHS layout performance of alternative ...

Roland Sturm; Joachim Seidelmann; Johann Dorner; Kevin Reddig

2003-12-01T23:59:59.000Z

86

Microsoft Word - EN_M278 - NIM Optical Layout.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SSRL ENGINEERING NOTE M278 Page 1 of 6 March 20, 1997 M. Rowen Beam Line 5-4 NIM, Optical Layout and Alignment Data Purpose: This document specifies the optical layout for the beam...

87

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

88

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network [OSTI]

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

89

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Broader source: Energy.gov (indexed) [DOE]

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

90

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Broader source: Energy.gov (indexed) [DOE]

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

91

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

92

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Broader source: Energy.gov (indexed) [DOE]

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

93

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

94

Application of the Analytic Network Process to facility layout selection  

Science Journals Connector (OSTI)

Abstract This paper applies the Analytic Network Process (ANP) method to the selection of the best facility layout plan based on multiple dependent and independent criteria. This is the first time that this method is used in such a context. An ANP model is built taking into account the interdependencies between criteria that are found based on experts’ opinions and fundamental equations. A network structure is built that shows all elements and clusters and their interactions that can be used to find the most effective layout. Limit priorities are computed which identify the most important factors in the selection process. A case study is conducted in a wood factory which represents a real demonstration of the developed model. A comparison is conducted between ANP and Analytic Hierarchy Process (AHP) which shows the differences between the two methods. Finally, sensitivity analysis shows the robustness of the model.

Tarek Al-Hawari; Ahmad Mumani; Amer Momani

2014-01-01T23:59:59.000Z

95

EVACUATED TUBE COLLECTORS SIMPLIFY SOLAR THERMAL SYSTEM LAYOUT  

Science Journals Connector (OSTI)

SUMMARY Evacuated tube collectors (ETC's) differ quite markedly in their behaviour from the more familiar flat plate solar collectors. The consequences in cost of the entire system are investigated for a typical residential dwelling, making full use of the advantages offered by ETC's. A significant saving in initial cost as well as in maintenance costs can be realised. KEYWORDS Evacuated tube collectors; solar system layout; freeze protection; overheat protection.

C.W.J. van Koppen; P. Verhaart

1986-01-01T23:59:59.000Z

96

Coherent Image Layout using an Adaptive Visual Vocabulary  

SciTech Connect (OSTI)

When querying a huge image database containing millions of images, the result of the query may still contain many thousands of images that need to be presented to the user. We consider the problem of arranging such a large set of images into a visually coherent layout, one that places similar images next to each other. Image similarity is determined using a bag-of-features model, and the layout is constructed from a hierarchical clustering of the image set by mapping an in-order traversal of the hierarchy tree into a space-filling curve. This layout method provides strong locality guarantees so we are able to quantitatively evaluate performance using standard image retrieval benchmarks. Performance of the bag-of-features method is best when the vocabulary is learned on the image set being clustered. Because learning a large, discriminative vocabulary is a computationally demanding task, we present a novel method for efficiently adapting a generic visual vocabulary to a particular dataset. We evaluate our clustering and vocabulary adaptation methods on a variety of image datasets and show that adapting a generic vocabulary to a particular set of images improves performance on both hierarchical clustering and image retrieval tasks.

Dillard, Scott E.; Henry, Michael J.; Bohn, Shawn J.; Gosink, Luke J.

2013-03-06T23:59:59.000Z

97

An interactive algorithm for editing VLSI geometric layouts  

E-Print Network [OSTI]

as the original design. In VLSI designs, this can mean up to 60 man-years just for debugging ~1'. The tools depicted in the left portion of Fig. 1 are used extensively to detect and correct as many of the design and layout errors as possible before the circuit... the start. it is only logical to lay out the mask in a manner which reflects this modularity. The 4echnique of so called floor planning [6j is first used to define the overall location of the various subsystems in the physical layou4 space. The size ol...

Denman, Stephen David

1984-01-01T23:59:59.000Z

98

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

99

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

100

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Broader source: Energy.gov (indexed) [DOE]

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

102

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

103

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

104

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

105

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

106

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

107

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

108

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Broader source: Energy.gov (indexed) [DOE]

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

109

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

110

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

111

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

112

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

113

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

114

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Broader source: Energy.gov (indexed) [DOE]

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

115

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

116

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

117

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

118

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Broader source: Energy.gov (indexed) [DOE]

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

119

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

120

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Broader source: Energy.gov (indexed) [DOE]

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

122

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

123

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

124

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

125

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Broader source: Energy.gov (indexed) [DOE]

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

126

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

127

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

128

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Broader source: Energy.gov (indexed) [DOE]

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

129

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

130

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

131

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

132

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

133

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

134

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

135

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

136

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

137

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

138

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

139

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

140

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

142

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Broader source: Energy.gov (indexed) [DOE]

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

143

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

144

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

145

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

146

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Broader source: Energy.gov (indexed) [DOE]

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

147

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

148

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

149

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Broader source: Energy.gov (indexed) [DOE]

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

150

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

151

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

152

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

153

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

154

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

155

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

156

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Broader source: Energy.gov (indexed) [DOE]

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

157

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

158

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

159

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

160

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

162

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

163

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

164

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Broader source: Energy.gov (indexed) [DOE]

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

165

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

166

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

167

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Broader source: Energy.gov (indexed) [DOE]

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

168

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Broader source: Energy.gov (indexed) [DOE]

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

169

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

170

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

171

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

172

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

173

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

174

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Broader source: Energy.gov (indexed) [DOE]

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

175

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

176

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

177

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

178

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

179

E-Print Network 3.0 - automated fixture layout Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 Individual Dissertation (G53IDS) Summary: than fixtures per day). Before designing any interface layouts I decided to conduct research... Automated Scheduling of Sport...

180

Efficient Formulations for the Multi-Floor Facility Layout Problem with ...  

E-Print Network [OSTI]

Feb 28, 2007 ... Abstract: The block layout problem for a multi-floor facility is an important sub ... Category 2: Applications -- OR and Management Sciences ...

Marc Goetschalckx

2007-02-28T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Optimization Online - A binary LP model to the facility layout problem  

E-Print Network [OSTI]

Abstract: In facility layout problems, a major concern is the optimal design or remodeling of the ... Category 1: Applications -- OR and Management Sciences.

Christos Papahristodoulou

182

LAYOUT AND SIZING OF ESF ALCOVES AND REFUGE CHAMBERS  

SciTech Connect (OSTI)

The purpose of this analysis is to establish size requirements and approximate locations of Exploratory Studies Facility (ESF) test and operations alcoves, including refuge chambers during construction of the Topopah Spring (TS) loop. Preliminary conceptual layouts for non-deferred test alcoves will be developed to examine construction feasibility based on current test plans and available equipment. The final location and configuration layout for alcoves will be developed when in-situ rock conditions can be visually determined. This will be after the TBM has excavated beyond the alcove location and the rock has been exposed. The analysis will examine the need for construction of walkways and electrical alcoves in the ramps and main drift. Niches that may be required to accommodate conveyor booster drives and alignments are not included in this analysis. The analysis will develop design criteria for refuge chambers to meet MSHA requirements and will examine the strategic location of refuge chambers based on their potential use in various ESF fire scenarios. This document supersedes DI:BABE00000-01717-0200-00003 Rev 01, ''TS North Ramp Alcove and Stubout Location Analysis'' in its entirety (Reference 5-6).

John Beesley and Romeo S. Jurani

1995-08-25T23:59:59.000Z

183

Heliostat Field Optimization: A New Computationally Efficient Model and Biomimetic Layout  

E-Print Network [OSTI]

Heliostat Field Optimization: A New Computationally Efficient Model and Biomimetic Layout Corey J for heliostat field layout optimization are introduced. The model, described and validated herein, includes & blocking, aberration and atmospheric attenuation. The model is based on a discretization of the heliostats

184

Quantifying the sensitivity of wind farm performance to array layout options using large-eddy simulation  

E-Print Network [OSTI]

the effects of array layout on the performance of offshore wind farms. Array layout is characterized by the spacing between wind turbines (along and across the prevailing wind direction) and by their alignment and is coupled with an actuator line model to simulate the effects of the rotating wind turbine blades. A control

185

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network [OSTI]

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

186

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

187

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network [OSTI]

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

188

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network [OSTI]

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

189

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

190

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

191

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

192

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Broader source: Energy.gov (indexed) [DOE]

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

193

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

194

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

195

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

196

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

197

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

198

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

199

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

200

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Broader source: Energy.gov (indexed) [DOE]

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

202

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

203

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

204

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

205

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

206

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

207

Simulation of Turbulent Flow Inside and Above Wind Farms: Model Validation and Layout Effects  

Science Journals Connector (OSTI)

A recently-developed large-eddy simulation framework is validated and used to investigate turbulent flow within and above wind farms under neutral conditions. Two different layouts are considered, consisting of t...

Yu-Ting Wu; Fernando Porté-Agel

2013-02-01T23:59:59.000Z

208

Study on the general layout of semi-submersible offshore drilling platforms based on process flow  

Science Journals Connector (OSTI)

The general layout of 6th generation semi-submersible drilling platforms is the main factor impacting the efficiency ... a reference for implementation of domestic designs of semi-submersible rigs.

Ji-xiang Yue ???; Yao-guang Qi ???…

2009-06-01T23:59:59.000Z

209

Concurrent design of facility layout and flow-based department formation  

E-Print Network [OSTI]

of their similarities in manufacturing and design [30]. The department may be formed based on the product family, the process, or a combination of both, and the part-machine incidence matrix is traditionally used to form the department. The fractal layout [31, 32... be placed randomly throughout the manufacturing facility with no speci?c department boundary, while the product family and fractal layout assume that the number of departments and the maximum number of machines assigned to each department are known...

Chae, Junjae

2005-02-17T23:59:59.000Z

210

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

211

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

212

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

213

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

214

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

215

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

216

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

217

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

218

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

219

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

220

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Broader source: Energy.gov (indexed) [DOE]

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

222

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

223

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network [OSTI]

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

224

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network [OSTI]

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

225

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

226

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

227

ADORE: Alternative detector layout optimization for ROP system of CANDU reactors  

Science Journals Connector (OSTI)

In CANDU® reactor design, the regional overpower protection (ROP) systems protect the reactor against overpower in the fuel which could reduce the safety margin-to-dryout. Specifically for the CANDU® 600 MW (CANDU 6) design, there are two ROP systems in the core, one for each fast-acting shutdown systems. Each ROP system includes a number of fast-responding, self-powered flux detectors suitably distributed throughout the core within vertical and horizontal assemblies. The placement of these ROP detectors is a challenging discrete optimization problem. The DLO (detector layout optimization) module of ROVER-F code was used to design the existing ROP detector layout of CANDU 6 reactors. In the past couple of years, a new methodology for designing the detector layout for the ROP system, called DETPLASA algorithm, has been developed. This method utilizes the simulated annealing (SA) technique to optimize the placement of the detectors in the core. This algorithm was developed to overcome the shortcoming of DLO method to produce a detector layout configuration when the size of the problem is large. An alternative method has been recently developed for solving the ROP detector placement problem. This method is called ADORE (Alternative Detector layout Optimization for \\{REgional\\} overpower protection system). Although technically any stochastic optimization technique can be utilized, presently this method utilizes the SA technique as its optimization engine. This paper presents an overview of ADORE methodology and provides some numerical results from its execution.

Doddy Y.F. Kastanya

2011-01-01T23:59:59.000Z

228

C:\MYDOCS\FBSS-M~1\HATTIE\LAYOUT94.TXT  

U.S. Energy Information Administration (EIA) Indexed Site

1993 Federal Buildings Supplemental Survey 1993 Federal Buildings Supplemental Survey Survey Data File Documentation Energy Information Administration August 1997 Overview of Survey Data File Documentation This document contains only the file layouts and variable codes for use with the 1993 Public Use files. For information on the FBSS and the organization and use of these files, please go to http://www/eia.doe.gov/emeu/cbecs/contents.html and click on: "1993 Micro-Data Files." Layout of Data Files A file layout is provided here for each of the 22 files. Column 1 is the variable name that is found in the files; column 2 is a brief description of the variable; column 3 is the variable position on the files.

229

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

230

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

231

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Broader source: Energy.gov (indexed) [DOE]

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

232

A new method for the design of the heliostat field layout for solar tower power plant  

Science Journals Connector (OSTI)

A new method for the design of the heliostat field layout for solar tower power plant is proposed. In the new method, the heliostat boundary is constrained by the receiver geometrical aperture and the efficiency factor which is the product of the annual cosine efficiency and the annual atmospheric transmission efficiency of heliostat. With the new method, the annual interception efficiency does not need to be calculated when places the heliostats, therefore the total time of design and optimization is saved significantly. Based on the new method, a new code for heliostat field layout design (HFLD) has been developed and a new heliostat field layout for the PS10 plant at the PS10 location has been designed by using the new code. Compared with current PS10 layout, the new designed heliostats have the same optical efficiency but with a faster response speed. In addition, to evaluate the feasibility of crops growth on the field land under heliostats, a new calculation method for the annual sunshine duration on the land surface is proposed as well.

Xiudong Wei; Zhenwu Lu; Zhifeng Wang; Weixing Yu; Hongxing Zhang; Zhihao Yao

2010-01-01T23:59:59.000Z

233

Linear Regression and Random Forests for Layer Identification in IC Layout Reverse-Engineering  

E-Print Network [OSTI]

050 051 052 053 Linear Regression and Random Forests for Layer Identification in IC Layout Reverse in the process; the bulk of the work consists of tracing from the die images the regions which form components, resistors, and capacitors. The common types of layers are the bulk (substrate, i.e. the base silicon

de Freitas, Nando

234

Design and Layout of Schottky Diodes in a Standard CMOS Process Ben Rivera1  

E-Print Network [OSTI]

semiconductor is the anode and the semiconductor material, contacted through an ohmic contact, is the cathode a layout design solution. To increase the frequency and active range of the diode, reducing the series. When the two materials are brought into contact with each other the difference in potential gives rise

Baker, R. Jacob

235

A Mathematical Programming Model for Optimal Layout Considering Quantitative Risk Analysis  

E-Print Network [OSTI]

, Departamento de IngenierĂ­a QuĂ­mica, Celaya, Gto 38010 MĂ©xico 2 Carnegie Mellon University, Chemical Engineering). #12;The Center for Chemical Process Safety (CCPS) has published guidelines for facility siting model for safe process layout considering three possible hazardous incidents in an ethylene oxide plant

Grossmann, Ignacio E.

236

Design of wind farm layout for maximum wind energy capture Andrew Kusiak*, Zhe Song  

E-Print Network [OSTI]

Design of wind farm layout for maximum wind energy capture Andrew Kusiak*, Zhe Song Intelligent sources of alternative energy. The construction of wind farms is destined to grow in the U.S., possibly twenty-fold by the year 2030. To maximize the wind energy capture, this paper presents a model for wind

Kusiak, Andrew

237

Data Layout Transformation Exploiting Memory-Level Parallelism in Structured Grid Many-Core Applications  

E-Print Network [OSTI]

using a dense, regular grid as the primary data structure. Fluid dynamics and heat distribution, which general than a fixed stencil. Examples of structured grid applications include fluid dy- namics and heatData Layout Transformation Exploiting Memory-Level Parallelism in Structured Grid Many

Hwu, Wen-mei W.

238

Wireless Cloud Networks for the Factory of Things: Connectivity Modeling and Layout Design  

E-Print Network [OSTI]

measurements in an oil refinery site (modelled by 3D CAD) using industry standard ISA IEC 62734 devices operating at 2.4GHz. A graph-theoretic approach to node deployment is discussed by focusing on practical network architecture. Field device (FD) layout over 3D-CAD model of the plant (oil refinery site). Bottom

Savazzi, Stefano

239

Process-circuit and layout solutions for steam-turbine units and performance efficiency of thermal power plants  

Science Journals Connector (OSTI)

Criteria for evaluating process-circuit and layout solutions adopted in designing steam-turbine units are presented together with their values for a number of steam-turbine units produced by the Ural Turbine Work...

A. A. Gol’dberg; T. L. Shibaev

2014-12-01T23:59:59.000Z

240

Abstract-The ALICE trigger system is situated in the experimental cavern and has a centralized layout: the Central  

E-Print Network [OSTI]

Abstract- The ALICE trigger system is situated in the experimental cavern and has a centralized. Layout of the ALICE CTP in the experimental cavern The ALICE Central Trigger System D. Evans1 , S. Fedor2

Birmingham, University of

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

242

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Broader source: Energy.gov (indexed) [DOE]

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

243

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

244

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Broader source: Energy.gov (indexed) [DOE]

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

245

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

246

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network [OSTI]

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

247

Layout 1  

Broader source: Energy.gov (indexed) [DOE]

Southeastern Power Administration Southeastern Power Administration Annual Report 2012 Hartwell Dam 50th Anniversary 2 0 1 2 A N N U A L R E P O R T S O U T H E A S T E R N P O W E R A D M I N I S T R A T I O N 2 Fast Facts ....................................................................................................................2 Letter to the Secretary ..............................................................................................3 Human Capital Initiatives ......................................................................................4 Strategic Plan 2012 - 2015.........................................................................................4 ePerformance Implementation ...............................................................................4 Information Management........................................................................................4

248

Layout 1  

Broader source: Energy.gov (indexed) [DOE]

ANNUAL REPORT 2007 SEPA ANNUAL REPORT Contents Fast Facts ..........................................................................................2 Letter to the Secretary .......................................................................3 Marketing Area .................................................................................4 Customer Funding.............................................................................5 Energy Efficiency and Renewable Energy Program ..............................6 Drought Conditions in the Southeast ..................................................6 Energy Policy Act - Section 1834 Study ..............................................6 Cumberland System Dam Safety Issues ..............................................7 Cyber and Physical Security...............................................................7

249

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Technology Laboratory's Native American Initiative seeks to stimulate economic development Energy Technology Laboratory's Native American Initiative seeks to stimulate economic development and increase oil and natural gas production on American Indian lands while protecting the environment. The pro- gram supports the development and application of innovative petroleum technologies, and promotes government- to-government relationships and tribal partnerships with industry and academia-resulting in increased revenues and educational benefits for tribal members. Some 13 million barrels of oil and 300 billion cubic feet of natural gas were produced on American Indian lands in 2002, generating $183 million for tribes and allottees. However, potential revenue is far greater. If only a fraction of the estimated 890 million barrels of oil and 5.6 trillion cubic feet of gas on American Indian lands were produced,

250

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Few stop to consider the consequences Few stop to consider the consequences of their daily ablutions, the washing of clothes, the watering of lawns, and the flush of a toilet. However, wastewater treatment-one of the cornerstones of modern civilization-is inside this issue 2. Finishers Convene in NM Spot Awards 3. Termites in Costa Rica 4. Profile: Erika Lindquist 5. Plant Pathogens Decoded OPA Recipients 6. Young Investigator Winner 8. Spotlight on Safety 9. Hazards of Being a Microbiologist 10. All About Webfeeds 11. Eukaryotic Finishing at Stanford 12. Symbiotic Tree Fungus 17. New CSP Targets 19. Pichia stipitis 20. Aspergillus niger PRIMER the October 2006 Volume 3 Issue 2 First Tree Genome Is Published: Poplar Holds Promise as Renewable Bioenergy Resource Wood from a common tree may one day figure prominently in meeting trans-

251

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

32 32 0163-6804/11/$25.00 © 2011 IEEE INTRODUCTION A grid network is a collection of geographical- ly distributed resources, such as storage clus- ters, supercomputers, and scientific equipment, that are accessible to users over a network. Examples of e-Science grids include the Large Hadron Collider Computing Grid Project, the Biomedical Informatics Research Network, and the George E. Brown Network for Earthquake Engineering and Simulation. These networks typically deal with the trans- fer of large amounts of data in the terabytes and petabytes range. When the grid resources are connected by application-configurable optical paths (e.g., on an optical wavelength- routed network), the grid can be considered a LambdaGrid [1]. Optical wavelength-routed wavelength-divi-

252

Layout 1  

Broader source: Energy.gov (indexed) [DOE]

ANNUAL ANNUAL REPORT SOUTHEASTERN POWER ADMINISTRATION 1 2010 SEPA ANNUAL REPORT Fast Facts ....................................................................................................................2 Letter to the Secretary ..............................................................................................3 Customer Funding....................................................................................................4 Cumberland System Dam Safety Issues................................................................5 Human Capital Initiatives .......................................................................................5 Contract Negotiations ..............................................................................................5 Energy Efficiency

253

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hurricanes Hurricanes are strong storms that cause life- and property- threatening hazards such as flooding, storm surge, high winds and tornadoes. Preparation is the best protection against the dangers of a hurricane. Know the Difference Hurricane Watch-Hurricane conditions are a threat within 48 hours. Review your hurricane plans, keep informed and be ready to act if a warning is issued. Hurricane Warning-Hurricane conditions are expected within 36 hours. Complete your storm preparations and leave the area if directed to do so by authorities. J Listen to a NOAA Weather Radio for critical information from the National Weather Service (NWS). J Check your disaster supplies and replace or restock as needed. J Bring in anything that can be picked up by the wind (bicycles, lawn furniture). J Close windows, doors and hurricane shutters. If you do not have hurricane shutters, close and board up all

254

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

N N NOTICE OTICE In the first instance, an employee was using a floor- mounted abrasive cut-off wheel saw to remove bolts extending past a plate's surface when the wheel shat- tered. The employee's right thumb was impacted, break- ing the thumbnail, splitting open the skin, and shattering the thumb's end bone. Use of a hand-held, angle-head cutting wheel tool, or making a jig to hold the plate in place would have prevented this injury. In the second case, an employee was using a pneu- matic crimping tool. The open end of the tool's jaws was not guarded. The injury occurred when the tip of the employee's right-hand little finger was in the wrong place at the wrong time and the tool's jaws shut on the finger- tip. This resulted in the fingernail being cut through, an open cut on the bottom of the fingertip, and a chipped end bone. The injury would have been avoided had the open jaws been guarded. Unfortunately,

255

Layout 1  

Broader source: Energy.gov (indexed) [DOE]

HE HE MISSION of Southeastern Power Administration is to market and deliver federal hydroelectric power at the lowest possible cost to public bodies and cooperatives in the southeastern United States. Southeastern will excel in an evolving energy market by maintaining a well-trained, flexible workforce in an open, rewarding and safe environment. Marketing Area: Alabama, Florida, Georgia, Illinois, Kentucky, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, and West Virginia Customers: Electric Cooperatives .......................................... 198 Public Bodies ........................................................ 290 Investor-Owned Utilities ........................................1 Total..................................................................

256

Layout 1  

Broader source: Energy.gov (indexed) [DOE]

This This page intentionally left blank. OCTOBER 1, 2010 - MARCH 31, 2011 1 SEMIANNUAL REPORT TO CONGRESS Table of Contents Message from the Inspector General . . . . . . . . . . . . . . . . . . . . . . . . . 2 Key Accomplishments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Implementation of the American Recovery and Reinvestment Act of 2009 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Other Significant Audits, Inspections, and Reviews . . . . . . . . . . . . 13 Investigative Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Positive Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Highlights Based on Office of Inspector General Work . . . . . . . . . . . . . . . . 29 Congressional Responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Legislative and Regulatory Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Hotline System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Qui Tams . . . . . . . . . . . . . . . .

257

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

October 2010 October 2010 Issue #5 COMMERCIAL MOTOR VEHICLE ROADSIDE TECHNOLOGY CORRIDOR Federal Motor Carrier Safety Administration Office of Analysis, Research, and Technology CMV Technologies Showcased in Tennessee The second triennial Fed- eral Motor Carrier Safety Ad- ministration (FMCSA) Commercial Motor Vehicle (CMV) Safety Technology Showcase was conducted within FMCSA's Commercial Motor Vehicle Roadside Tech- nology Corridor (CMVRTC) at the Greene County, Ten- nessee, CMV Inspection sta- tion on October 14, 2010. The event was conducted in part- nership with Oak Ridge Na- tional Laboratory (ORNL), which facilitated the event, and the Tennessee Department of Transportation, Tennessee Department of Safety, and the University of Tennessee. FMCSA Administrator Anne S. Ferro was among

258

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

22 22 0163-6804/11/$25.00 © 2011 IEEE INTRODUCTION Emerging paradigms for next-generation net- work architectures revolve around the notion of the network as a heterogeneous "multilayer, multitechnology" construct over which multiple "services" can be provided. These services include traditional IP-routed services as well as native access services from lower layers based on technologies such as multiprotocol label switch- ing (MPLS), Ethernet, Ethernet provider back- bone bridge (PBB), synchronous optical networking (SONET)/synchronous digital hierar- chy (SDH), next-generation SONET/SDH, and wavelength-division multiplexing (WDM). It is envisioned that such direct access to and control of lower layers will enable advanced traffic engi- neering of IP routed networks, along with the

259

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

COMMERCIAL MOTOR VEHICLE COMMERCIAL MOTOR VEHICLE ROADSIDE TECHNOLOGY CORRIDOR October 2009 Issue !4 Federal Motor Carrier Safety Administration Office of Analysis, Research, and Technology "In about 96 percent of cases there was not a statistically significant degradation of the brakes during the FOT." (Page 1) "Nearly 64 percent of vehicles flagged by SIRIS were placed OOS, and fully 77 percent were found to exhibit one or more safety flaws." (Page 3) Brake Wear and Performance FOT The Oak Ridge National Laboratory com- pleted the Brake Wear and Performance Test (BWPT) field operation test (FOT) and data analysis in September 2009. This effort in- cluded assisting the Tennessee Department of Safety (TDOS) in the procurement and installa- tion of a Performance-Based Brake Testing

260

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JGI, JGI, approaching its eighth year of existence and its sixth of operation at the Production Genomics Facility (PGF) in Walnut Creek, continues to grow-in staff, space requirements and the posi- tive impact our sequencing and science are having on the scientific community. As our influence and distance between our workstations expands, there emerges a need to keep our team bet- ter informed and to cultivate an environ- ment that recognizes our meaningful contributions to this growing concern, hence the creation of The JGI Primer. On the occasion of the maiden voyage of our newsletter, The JGI Primer, I would like to share with you my enthusiasm for my favorite holiday, Halloween. For me and my lab, Halloween has always served as an occasion to bring us together for some big fun.

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Liquid-gas cylinder hand trucks similar to the Harper Liquid-gas cylinder hand trucks similar to the Harper Model ULG65050-51 (A) use a spring-loaded hook assembly (B) to engage with the liquid nitrogen Dewar support ring. This provides a positive point of contact allowing the Dewar to be tilted onto the hand truck for transport. Failure of this spring assembly can result in a loss of control, allowing the Dewar to become separated from the hand truck, leading to a very dangerous sit- uation. If the spring is weak such that it fails to fully engage the Dewar, replacement springs can be purchased through welding suppliers using part number HDW- SP-UL650-8 The entire cart assembly can be replaced with a newer model from Harper (model number 650-50-51). A potential replacement is an upright style cart such as the EZ Load 4L for SAFTCART (C). This is a cart

262

Layout 1  

Broader source: Energy.gov (indexed) [DOE]

Fast Facts ............................................................................................2 Letter to the Secretary .........................................................................3 Customer Funding ...............................................................................4 Energy Efficiency and Renewable Energy Program ................................5 Cumberland System Dam Safety Issues ................................................5 Cyber and Physical Security..................................................................6 Drought Conditions in the Southeast ...................................................6 Marketing Objectives...........................................................................7 Marketing Area....................................................................................8

263

Layout 1  

Broader source: Energy.gov (indexed) [DOE]

vi vi This page intentionally left blank. vii Contract and Project Management: Corrective Action Plan JULY 2008 Executive Summary Achieving and maintaining excellence in contract and project management is a top priority for the Department of Energy (DOE). To accomplish this goal, the Department has already implemented a series of significant contract and project management reforms, including the conduct of a root cause analysis (RCA) to identify the major challenges to planning and managing DOE projects. The RCA pinpoints opportunities for improving the Department's management of contracts and projects and is serving as the foundation for developing and implementing corrective measures to improve performance and, ultimately, being removed from the Government Accountability

264

Cleanroom Layout  

Science Journals Connector (OSTI)

Since we now have some understanding of the problems of microcontamination and have acquired some elementary knowledge about how to create basic clean areas, it is time to tackle the problem of how to put togethe...

M. Kozicki; S. Hoenig; P. Robinson

1991-01-01T23:59:59.000Z

265

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Aiken Chamber of Commerce Greater Aiken Chamber of Commerce Appointment Dr. Sandra J. Jordan University of South Carolina Aiken Congressional Appointment Anna G. Loadholt...

266

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

& Nuclear Fuels Materials SPOTLIGHT Idaho National Laboratory P.O. Box 1625 Mailstop 3878 Idaho Falls, ID 83415-3878 INLNFMSpotlight@inl.gov Tel: 208-526-9549 Fax: 208-526-2930...

267

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chancellor's Distinguished Lectureship Series Nanotechnology: Thinking Small or Small Thinking? Chad Mirkin Northwestern University Director of Institute for Nanotechnology...

268

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SCIENCE 2010 RESEARCh ANd ENgINEERINg hIghLIghtS fRoM thE AdvANCEd PhotoN SouRCE At ARgoNNE NAtIoNAL LAboRAtoRy ANL-1035 ISSN 1931-5007 May 2011 ANL-1035 ISSN 1931-5007 May 2011...

269

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Advancing Science by Accelerating Science Access Delivering smart, global search technologies to speed discovery U.S. Department of Energy Office of Science Office of Scientific...

270

SQE Layout  

National Nuclear Security Administration (NNSA)

Carolyn MS-A105 ALDNW 1 McCoy, Don MS-F652 NW-SC 1 McKinney, Gregg MS-F663 X-5 1 Mercer-Smith, Jas MS-A105 ALDNW 1 Miller, Charlie MS-F652 NW-SC 1 Morrison, John MS-B260 CIC-DO 1...

271

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

14 14 0163-6804/11/$25.00 © 2011 IEEE 1 See the reports collected at http://www.es.net/ requirements.html 2 See "National Lab" and "User Facilities" tabs at http://www.sc.doe.gov/ INTRODUCTION Across a number of scientific disciplines, users are demanding more network capabilities, including higher network end-to-end throughput, guaranteed bandwidth, and quality of service, in order to collaborate and share large amounts of data around the globe. In many fields, scientific discovery is now directly related to the amount of data that can be shared, accessed, and pro- cessed collaboratively. Our understanding of the requirements of modern science for network services has emerged from detailed discussions with researchers 1 about how their analysis and simu-

272

Layout 1  

Broader source: Energy.gov (indexed) [DOE]

s s o u t h e a s t e r n p o w e r a d m i n i s t r a t i o n 2011 a n n u a l r e p o r t 2 s o u t h e a s t e r n p o w e r a d m i n i s t r a t i o n 2 0 1 1 a n n u a l r e p o r t Fast Facts ....................................................................................................................2 Letter to the Secretary ..............................................................................................3 Human Capital .........................................................................................................4 Information Management .......................................................................................4 Energy Efficiency and Renewable Energy ............................................................4 Customer Funding....................................................................................................5

273

Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

* BUS: Make sure she knows where and when to be picked up before and after school * BICYCLE: Review road safety and make sure he has a helmet * ON FOOT: Walk the route together...

274

Optical layout and mechanical structure of polarimeter-interferometer system for Experimental Advanced Superconducting Tokamak  

SciTech Connect (OSTI)

A Far-InfaRed (FIR) three-wave POlarimeter-INTerferometer (POINT) system for measurement current density profile and electron density profile is under development for the EAST tokamak. The FIR beams are transmitted from the laser room to the optical tower adjacent to EAST via ?20 m overmoded dielectric waveguide and then divided into 5 horizontal chords. The optical arrangement was designed using ZEMAX, which provides information on the beam spot size and energy distribution throughout the optical system. ZEMAX calculations used to optimize the optical layout design are combined with the mechanical design from CATIA, providing a 3D visualization of the entire POINT system.

Zou, Z. Y.; Liu, H. Q., E-mail: hqliu@ipp.ac.cn; Jie, Y. X.; Wang, Z. X.; Shen, J. S.; An, Z. H.; Yang, Y.; Zeng, L.; Wei, X. C.; Li, G. S.; Zhu, X. [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); Ding, W. X.; Brower, D. L. [Department of Physics and Astronomy, University of California Los Angeles, Los Angeles, California 90095 (United States); Lan, T. [Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

2014-11-15T23:59:59.000Z

275

Empirical Performance Model-Driven Data Layout Optimization and Library Call Selection for Tensor Contraction Expressions  

SciTech Connect (OSTI)

Empirical optimizers like ATLAS have been very effective in optimizing computational kernels in libraries. The best choice of parameters such as tile size and degree of loop unrolling is determined by executing different versions of the computation. In contrast, optimizing compilers use a model-driven approach to program transformation. While the model-driven approach of optimizing compilers is generally orders of magnitude faster than ATLAS-like library generators, its effectiveness can be limited by the accuracy of the performance models used. In this paper, we describe an approach where a class of computations is modeled in terms of constituent operations that are empirically measured, thereby allowing modeling of the overall execution time. The performance model with empirically determined cost components is used to perform data layout optimization together with the selection of library calls and layout transformations in the context of the Tensor Contraction Engine, a compiler for a high-level domain-specific language for expressing computational models in quantum chemistry. The effectiveness of the approach is demonstrated through experimental measurements on representative computations from quantum chemistry.

Lu, Qingda; Gao, Xiaoyang; Krishnamoorthy, Sriram; Baumgartner, Gerald; Ramanujam, J.; Sadayappan, Ponnuswamy

2012-03-01T23:59:59.000Z

276

Design and Realize of the Graphics Platform for LED Lamps’ Layout Based on GDI+ and Dual-Buffer  

Science Journals Connector (OSTI)

Based on the GDI+ class library and dual-buffer technology of .NET framework, the software for LED lamps’ layout is developed. On the basis of determining the scheme of layout platform, the metafile class library model by Composite design-set and the process of calling the LED pixels metafile symbol interface are designed firstly. The design method of realizing the LED pixels metafile visual editing on the drawn LED logical pixel based on GDI+ is analyzed. The dual-buffer technology is used to solve the problem of flicker when fast refreshing. The testing results show that the platform can meet the basic function requirements of engineering application, and realize partial adjust on the process of LED lamps layout without distortion.

Wen Yuanmei; Nie Xinming; Liu Guixiong

2012-01-01T23:59:59.000Z

277

AUGUST 2014 | DALHOUSIE BRAND GUIDE AND TOOL KIT Some of the slide layouts in the Dalhousie PowerPoint template contain text in the  

E-Print Network [OSTI]

AUGUST 2014 | DALHOUSIE BRAND GUIDE AND TOOL KIT Some of the slide layouts in the Dalhousie Power. Navigate to the VIEW tab. 2. Click the SLIDE MASTER button. 3. Choose the fifth thumbnail in the slide GUIDE AND TOOL KIT Some of the slide layouts in the Dalhousie PowerPoint template contain text

Dellaire, Graham

278

A new approach to teaching factory layout using closed-circuit television  

E-Print Network [OSTI]

HNT ~ III. D. Vl&OP". "!'. NT 0! TH'": SYST'i:N ~ ~ ~ c ~ I'V. USING Tll"-' S1ST":N IN FACTOH': LAYOUT Vc BY-PPOBUCTS C!F TH"' S5'STHlf c 31 ~ ~ ~ ~ ~ 38 VI. CONC1USION ~ ~ BIBB IOGHAPHY ~ ~ ~ ~ ~ ~ c ~ ~ c ~ 45 LIST OF' TABLES 1. Table of lnit...- 'coals an&1 sounds t;o his aud1ence. CCTV has b ien used. 1!& many cases as a su?&s&iitui fox an inst;rucbor. n this use, t;he instructor makes a video recol-ding of hi&& lecture. The. tsoo is t:hen "played bac&&" to s u;. el!i;oi 1n the appro...

Britain, Jack Chancellor

2012-06-07T23:59:59.000Z

279

The effects of the RHIC E-lenses magnetic structure layout on the proton beam trajectory  

SciTech Connect (OSTI)

We are designing two electron lenses (E-lens) to compensate for the large beam-beam tune spread from proton-proton interactions at IP6 and IP8 in the Relativistic Heavy Ion Collider (RHIC). They will be installed in RHIC IR10. First, the layout of these two E-lenses is introduced. Then the effects of e-lenses on proton beam are discussed. For example, the transverse fields of the e-lens bending solenoids and the fringe field of the main solenoids will shift the proton beam. For the effects of the e-lens on proton beam trajectory, we calculate the transverse kicks that the proton beam receives in the electron lens via Opera at first. Then, after incorporating the simplified E-lens lattice in the RHIC lattice, we obtain the closed orbit effect with the Simtrack Code.

Gu, X.; Pikin, A.; Luo, Y.; Okamura, M.; Fischer, W.; Gupta, R.; Hock, J.; Raparia, D.

2011-03-28T23:59:59.000Z

280

ATLAS-Experiment Abbildung 48: Monte-Carlo-Simulation eines tt-Ereignisses in einem Layout fur den Inne-  

E-Print Network [OSTI]

ATLAS-Experiment Abbildung 48: Monte-Carlo-Simulation eines t¯t-Ereignisses in einem Layout f¨ur den Inne- ren Detektor des ATLAS-Experiments mit vier Lagen von Silizium-Pixeldetektoren und f¨unf Lagen von Silizium-Streifendetektoren. 82 #12;ATLAS-Experiment ATLAS-Experiment Gruppenleiter: M

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Large Cryogenic Infrastructure for LHC Superconducting Magnet and Cryogenic Component Tests: Layout, Commissioning and Operational Experience  

SciTech Connect (OSTI)

The largest cryogenic test facility at CERN, located at Zone 18, is used to validate and to test all main components working at cryogenic temperature in the LHC (Large Hadron Collider) before final installation in the machine tunnel. In total about 1300 main dipoles, 400 main quadrupoles, 5 RF-modules, eight 1.8 K refrigeration units will be tested in the coming years.The test facility has been improved and upgraded over the last few years and the first 18 kW refrigerator for the LHC machine has been added to boost the cryogenic capacity for the area via a 25,000 liter liquid helium dewar. The existing 6 kW refrigerator, used for the LHC Test String experiments, will also be employed to commission LHC cryogenic components.We report on the design and layout of the test facility as well as the commissioning and the first 10,000 hours operational experience of the test facility and the 18 kW LHC refrigerator.

Calzas, C.; Chanat, D.; Knoops, S.; Sanmarti, M.; Serio, L. [Accelerator Technology Division, CERN, 1211 Geneva 23 (Switzerland)

2004-06-23T23:59:59.000Z

282

SharedCanvas: A Collaborative Model for Medieval Manuscript Layout Dissemination  

SciTech Connect (OSTI)

In this paper we present a model based on the principles of Linked Data that can be used to describe the interrelationships of images, texts and other resources to facilitate the interoperability of repositories of medieval manuscripts or other culturally important handwritten documents. The model is designed from a set of requirements derived from the real world use cases of some of the largest digitized medieval content holders, and instantiations of the model are intended as the input to collection-independent page turning and scholarly presentation interfaces. A canvas painting paradigm, such as in PDF and SVG, was selected based on the lack of a one to one correlation between image and page, and to fulfill complex requirements such as when the full text of a page is known, but only fragments of the physical object remain. The model is implemented using technologies such as OAI-ORE Aggregations and OAC Annotations, as the fundamental building blocks of emerging Linked Digital Libraries. The model and implementation are evaluated through prototypes of both content providing and consuming applications. Although the system was designed from requirements drawn from the medieval manuscript domain, it is applicable to any layout-oriented presentation of images of text.

Sanderson, Robert D. [Los Alamos National Laboratory; Albritton, Benjamin [Stanford University; Schwemmer, Rafael [e-codices; Van De Sompel, Herbert [Los Alamos National Laboratory

2011-01-01T23:59:59.000Z

283

A system-level cost-of-energy wind farm layout optimization with landowner modeling  

SciTech Connect (OSTI)

This work applies an enhanced levelized wind farm cost model, including landowner remittance fees, to determine optimal turbine placements under three landowner participation scenarios and two land-plot shapes. Instead of assuming a continuous piece of land is available for the wind farm construction, as in most layout optimizations, the problem formulation represents landowner participation scenarios as a binary string variable, along with the number of turbines. The cost parameters and model are a combination of models from the National Renewable Energy Laboratory (NREL), Lawrence Berkeley National Laboratory, and Windustiy. The system-level cost-of-energy (COE) optimization model is also tested under two land-plot shapes: equally-sized square land plots and unequal rectangle land plots. The optimal COEs results are compared to actual COE data and found to be realistic. The results show that landowner remittances account for approximately 10% of farm operating costs across all cases. Irregular land-plot shapes are easily handled by the model. We find that larger land plots do not necessarily receive higher remittance fees. The model can help site developers identify the most crucial land plots for project success and the optimal positions of turbines, with realistic estimates of costs and profitability. (C) 2013 Elsevier Ltd. All rights reserved.

Chen, Le [Ames Laboratory; MacDonald, Erin [Ames Laboratory

2013-10-01T23:59:59.000Z

284

A comparative study on substation types and network layouts in connection with low-energy district heating systems  

Science Journals Connector (OSTI)

The study deals with low-energy District Heating (DH) networks operating in low temperatures such as 55 °C in terms of supply and 25 °C in terms of return. The network layout, additional booster pumps, and different substation types such as storage tanks either equipped or not equipped in domestic hot water production site were examined. Effects of booster pumps on pipe dimensions in the latter case were investigated. Temperature drops during the summer months due to low heat demands of consumers were explored. Use of approaches such as looped networks and branched network layouts with bypasses for end-consumers were also studied, heat loss from these networks and the drop in temperature in the heat-carrier-supply medium being compared.

Hakan ?brahim Tol; Svend Svendsen

2012-01-01T23:59:59.000Z

285

ADORE-GA: Genetic algorithm variant of the ADORE algorithm for ROP detector layout optimization in CANDU reactors  

Science Journals Connector (OSTI)

The regional overpower protection (ROP) systems protect CANDU® reactors against overpower in the fuel that could reduce the safety margin-to-dryout. The overpower could originate from a localized power peaking within the core or a general increase in the global core power level. The design of the detector layout for ROP systems is a challenging discrete optimization problem. In recent years, two algorithms have been developed to find a quasi optimal solution to this detector layout optimization problem. Both of these algorithms utilize the simulated annealing (SA) algorithm as their optimization engine. In the present paper, an alternative optimization algorithm, namely the genetic algorithm (GA), has been implemented as the optimization engine. The implementation is done within the ADORE algorithm. Results from evaluating the effects of using various mutation rates and crossover parameters are presented in this paper. It has been demonstrated that the algorithm is sufficiently robust in producing similar quality solutions.

Doddy Kastanya

2012-01-01T23:59:59.000Z

286

Layout-Aware I/O Scheduling for Terabits Data Movement  

SciTech Connect (OSTI)

Many science facilities, such as the Department of Energy s Leadership Computing Facilities and experimental facilities including the Spallation Neutron Source, Stanford Linear Accelerator Center, and Advanced Photon Source, produce massive amounts of experimental and simulation data. These data are often shared among the facilities and with collaborating institutions. Moving large datasets over the wide- area network (WAN) is a major problem inhibiting collaboration. Next- generation, terabit-networks will help alleviate the problem, however, the parallel storage systems on the end-system hosts at these institutions can become a bottleneck for terabit data movement. The parallel storage system (PFS) is shared by simulation systems, experimental systems, analysis and visualization clusters, in addition to wide-area data movers. These competing uses often induce temporary, but significant, I/O load imbalances on the storage system, which impact the performance of all the users. The problem is a serious concern because some resources are more expensive (e.g. super computers) or have time-critical deadlines (e.g. experimental data from a light source), but parallel file systems handle all requests fairly even if some storage servers are under heavy load. This paper investigates the problem of competing workloads accessing the parallel file system and how the performance of wide-area data movement can be improved in these environments. First, we study the I/O load imbalance problems using actual I/O performance data collected from the Spider storage system at the Oak Ridge Leadership Computing Facility. Second, we present I/O optimization solutions with layout-awareness on end-system hosts for bulk data movement. With our evaluation, we show that our I/O optimization techniques can avoid the I/O congested disk groups, improving storage I/O times on parallel storage systems for terabit data movement.

Kim, Youngjae [ORNL] [ORNL; Atchley, Scott [ORNL] [ORNL; Vallee, Geoffroy R [ORNL] [ORNL; Shipman, Galen M [ORNL] [ORNL

2013-01-01T23:59:59.000Z

287

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network [OSTI]

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

288

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network [OSTI]

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

289

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cédric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Hervé Darbon

2001-10-02T23:59:59.000Z

290

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249–261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

291

A new code for the design and analysis of the heliostat field layout for power tower system  

Science Journals Connector (OSTI)

A new code for the design and analysis of the heliostat field layout for power tower system is developed. In the new code, a new method for the heliostat field layout is proposed based on the edge ray principle of nonimaging optics. The heliostat field boundary is constrained by the tower height, the receiver tilt angle and size and the heliostat efficiency factor which is the product of the annual cosine efficiency and the annual atmospheric transmission efficiency. With the new method, the heliostat can be placed with a higher efficiency and a faster response speed of the design and optimization can be obtained. A new module for the analysis of the aspherical heliostat is created in the new code. A new toroidal heliostat field is designed and analyzed by using the new code. Compared with the spherical heliostat, the solar image radius of the field is reduced by about 30% by using the toroidal heliostat if the mirror shape and the tracking are ideal. In addition, to maximize the utilization of land, suitable crops can be considered to be planted under heliostats. To evaluate the feasibility of the crop growth, a method for calculating the annual distribution of sunshine duration on the land surface is developed as well.

Xiudong Wei; Zhenwu Lu; Weixing Yu; Zhifeng Wang

2010-01-01T23:59:59.000Z

292

A new code for the design and analysis of the heliostat field layout for power tower system  

SciTech Connect (OSTI)

A new code for the design and analysis of the heliostat field layout for power tower system is developed. In the new code, a new method for the heliostat field layout is proposed based on the edge ray principle of nonimaging optics. The heliostat field boundary is constrained by the tower height, the receiver tilt angle and size and the heliostat efficiency factor which is the product of the annual cosine efficiency and the annual atmospheric transmission efficiency. With the new method, the heliostat can be placed with a higher efficiency and a faster response speed of the design and optimization can be obtained. A new module for the analysis of the aspherical heliostat is created in the new code. A new toroidal heliostat field is designed and analyzed by using the new code. Compared with the spherical heliostat, the solar image radius of the field is reduced by about 30% by using the toroidal heliostat if the mirror shape and the tracking are ideal. In addition, to maximize the utilization of land, suitable crops can be considered to be planted under heliostats. To evaluate the feasibility of the crop growth, a method for calculating the annual distribution of sunshine duration on the land surface is developed as well. (author)

Wei, Xiudong; Lu, Zhenwu; Yu, Weixing [Changchun Institute of Optics, Fine Mechanics and Physics of Chinese Academy of Sciences, Changchun 130033 (China); Wang, Zhifeng [The Key Laboratory of Solar Thermal Energy and Photovoltaic system, Institute of Electrical Engineering, Chinese Academy of Sciences, Beijing 100190 (China)

2010-04-15T23:59:59.000Z

293

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect (OSTI)

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

294

Maximising Longwall performance and profitability by the introduction of moving car bunker systems into outbye haulage layouts  

SciTech Connect (OSTI)

In order to maximize the profitability of Longwall mining operations, outbye materials handling systems should be cost effectively engineered to both fully harmonize with cyclical surges in output and to maintain high levels of availability. With the introduction of new Longwall systems into existing mines, the upgrading of outbye haulage to handle peak production from the Longwall panel can prove to be extremely expensive and is often unnecessary. In addition, despite high levels of investment in new equipment, many mines are still failing to achieve planned gains in Longwall productivity due to persistent downtime on outbye haulage routes. This paper details the planning, production and engineering considerations necessary to maximize profitability by the introduction of moving car bunker systems to underground haulage layouts. It also examines case studies of recent installations within the North American coal mining industry and charts the significant success being achieved in improving profitability at these mines.

Barlow, P.M.

1996-12-31T23:59:59.000Z

295

Abstract--Layout of the conductor material in the dc bus of a photovoltaic (PV) array to lower first cost and ohmic losses is  

E-Print Network [OSTI]

its operating economy by reducing installed cost and ohmic losses. Index Terms--Photovoltaic systemsAbstract--Layout of the conductor material in the dc bus of a photovoltaic (PV) array to lower first cost and ohmic losses is reviewed. Six PV materials are characterized for their voltage swings

King, Roger

296

Using cell phone keyboards is (NP) hard  

Science Journals Connector (OSTI)

Sending text messages on cell phones which only contain the keys 0 through 9 and # and * can be a painful experience. We consider the problem of designing an optimal mapping of numbers to sets of letters to act as an alternative to the standard {2 ? ...

Peter Boothe

2010-06-01T23:59:59.000Z

297

Generated using V3.0 of the official AMS LATEX templatejournal page layout FOR AUTHOR USE ONLY, NOT FOR SUBMISSION! Measurement and statistical modeling of the urban heat island of the city of Utrecht  

E-Print Network [OSTI]

Generated using V3.0 of the official AMS LATEX template­journal page layout FOR AUTHOR USE ONLY Netherlands) Theo Brandsma , Dirk Wolters Royal Netherlands Meteorological Institute, De Bilt, The Netherlands

Brandsma, Theo

298

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

299

Bugs, Drugs & Smoke  

E-Print Network [OSTI]

Panic in Surat Then came Ebola Change in awareness Ready tonew diseases (e.g. Ebola and Marburg) have appeared. Thissomething far more serious. Ebola first appeared in 1976 in

WHO

2012-01-01T23:59:59.000Z

300

Bugs, Drugs & Smoke  

E-Print Network [OSTI]

in saving lives, poor sanitation, unclean water (Photo 2.9)and food due to poor hygiene and sanitation. administered by

WHO

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Generated using V3.2 of the official AMS LATEX templatejournal page layout FOR AUTHOR USE ONLY, NOT FOR SUBMISSION! Constraining a system of interacting parameterizations through multiple-parameter  

E-Print Network [OSTI]

Generated using V3.2 of the official AMS LATEX template­journal page layout FOR AUTHOR USE ONLY Netherlands Meteorological Institute (KNMI), De Bilt, The Netherlands A. P. Siebesma Royal Netherlands Meteorological Institute (KNMI), De Bilt, The Netherlands Delft University of Technology, Delft, The Netherlands

Siebesma, Pier

302

Common Keyboard Shortcuts Program To Do This PressWindows  

E-Print Network [OSTI]

SHIFT + DELETE Help Menu F1 Open shortcut menu (equivalent of right clicking) SHIFT + F10 Open Start

303

sustain.layout3.indd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of the U.S. Department of Energy under contract DE-ACC52-06NA25396. A U.S. Department of Energy Laboratory Printed on 100% recycled content paper with Soy based ink LA-UR-13-29595...

304

Symplectic Integrator Mercury: Bug Report  

E-Print Network [OSTI]

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

305

The Harlequin Cabbage-bug.  

E-Print Network [OSTI]

SUBSTATIONS P. L. DOWNS, President, Temple .................................................................................. Term expires 1919 CHARLES ROGAN, Vzce Preszdent, Austin ...................................................................... Term.... V. M., .Veterinarian SUBSTATION NO. 1: Beeville, Bee Connty DIVISION OF CHEMISTRY E. E. BINFORD, B. S., Superintendent G. S. FRAPS,.~~. D., Chemist in Charge; SUBSTATION NO. 2: Troup, Smith State Chemlst R H RIDGELL B. S Assistant Chemist W. S...

Paddock, F.B. (Floyd B.)

1915-01-01T23:59:59.000Z

306

OpenEI Community - bug  

Open Energy Info (EERE)

Ghost" entries http:en.openei.orgcommunitydiscussionghost-entries

There is an issue that Illinois State University has come across.  From Nick B:

307

The Fast-spectrum Transmutation Experimental Facility FASTEF: Main design achievements (part 2: Reactor building design and plant layout) within the FP7-CDT collaborative project of the European Commission  

SciTech Connect (OSTI)

MYRRHA (Multi-purpose hybrid Research Reactor for High-tech Applications) is the flexible experimental accelerator-driven system (ADS) in development at SCK-CEN in replacement of its material testing reactor BR2. SCK-CEN in association with 17 European partners from industry, research centres and academia, responded to the FP7 (Seventh Framework Programme) call from the European Commission to establish a Central Design Team (CDT) for the design of a Fast Spectrum Transmutation Experimental Facility (FASTEF) able to demonstrate efficient transmutation and associated technology through a system working in subcritical and/or critical mode. The project has started on April 01, 2009 for a period of three years. In this paper, we present the latest concept of the reactor building and the plant layout. The FASTEF facility has evolved quite a lot since the intermediate reporting done at the ICAPP'10 and ICAPP'11 conferences 1,2. Many iterations have been performed to take into account the safety requirements. The present configuration enables an easy operation and maintenance of the facility, including the possibility to change large components of the reactor. In a companion paper 3, we present the latest configuration of the reactor core and primary system. (authors)

De Bruyn, D.; Engelen, J. [Belgian Nuclear Research Centre SCK CEN, Boeretang 200, 2400 Mol (Belgium); Ortega, A.; Aguado, M. P. [Empresarios Agrupados A.I.E., Magallanes 3, 28015 Madrid (Spain)

2012-07-01T23:59:59.000Z

308

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Design Process Design Process While there were less tangible products resulting from the design as- sistanceand demonstration activities of this research, we better under- stood the process of achieving integration in the real-world. We found today'sprocess of designing the envelope andlighting system for most new and retrofit construction to be dysfunctional. To achieve success in this work: a) the concept of an integrated approachmust be introduced atthe startof new projectswhen design solutions such as building orien- tation, articulated floor plans, or exterior shading systems can still be considered. For retrofit projects, a proactive systems approach must be taken when upgrading building components for energy- efficiency in order to achieve cost-effective solutions that improve

309

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Production Readiness Production Readiness Weprogressed towardmarketadoptionby developing, build- ing and testing prototype systems using numerical simula- tion tools andfield tests,by working with industry andmanu- facturing partners, and by demonstrating the technologies in full-scalecommercialbuildings. Thisprovidedabroad,highly defensible record of documented performance. Prototypeswere developed in cooperationwith industrypart- ners to speed commercializationand to work out market bar- riers to full-scaleadoption.Industrypartners in glazing, win- dow systems, shading systems, controls hardware and light- ing were solicited to participate. Feedback through trade as- sociations, conferences and industry associations helped to identify potential obstaclessuch asdifficulties with cross-dis-

310

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DesignAssistance DesignAssistance IMAGE imgs/esl363.jpg This multi-year project provided a mechanism for inves- tigating advanced daylighting technologies, strategies, commercial prototypes, and demonstrations in collabo- ration with designers, manufacturers, owners, and re- searchers. Guidance was provided to industry to ensure that their market perspective was sufficiently broad--we found that many material or technology developers were solving problems from either a lighting or windows discipline and therefore had a limited approach. In general, we provided detailed analyses of product performance; e.g., holographic glazings, advanced skylights, angular-selec- tive glazings, etc. In one case, we worked with a skylight manufacturer to develop and evaluate new skylighting

311

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Daylighting algorithms Daylighting algorithms IMAGE imgs/esl375.jpg The tools for describing the performance of daylighting systems are limited, in part because there is currently little research activity within industry and the business community to advance the science of daylighting with "advanced" window systems, such as automated blinds or holographic glazings. A new approach was devised that combined experimen- tal measurements with simulation tools to produce an accurate characterization of interior illuminance levels. This method is combined with an energy simulation engine such as DOE-2 to produce estimates of annual energy usage. The work provided a basis for more flex- ible daylight modeling tools that can ultimately be used by conventional engineering consultants.

312

10_9:Layout 1.qxd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NOTICE NOTICE OTICE Two minor electrical incidents in the past months at the APS resulted in a minor shock from inadequately grounded equipment, and a damaged stainless steel waterline when an arc occurred between the waterline and defective heat tape. The investigation of the shock incident identified several deficiencies in the electrical grounding of equipment carts (right) purchased from a reputable electrical manufacturer. The defective grounding of one of the carts resulted in a shock from ~60-V AC when an employee leaned against the cart while in contact with a well-grounded surface. An examination of the cart and all others like it at the APS identified improper grounding such as loose ground wiring, grounding to painted surfaces, and a butt-splice in ground

313

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Facts Project Facts Daylighting systems in use world-wide rarely capture the energy-savings predicted by simulation tools and that we believe are achievable in real buildings. One of the primary reasons for this is that window and lighting systemsare not designed and operated as an integrated system. Our effortsover the last five years have been targeted toward 1) development and testing of new technological solutions that involve a higher degree of systemsintegration than has been typical in the past,and 2) addressing current design and technological barriers that are often missed with component-oriented research. We summarize the results from this body of cross-disciplinary research and discuss its effects on the existing and future practice of daylighting in commercial buildings.

314

10_9:Layout 1.qxd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safe Transport of Hazardous Materials Safe Transport of Hazardous Materials APS users are reminded that hazardous materials, including samples, cannot be packed in personal luggage and brought on public transport. APS Policy & Procedure 3.1.34 Hazardous Material Transportation provides the APS requirements related to the packaging and transportation of hazardous materials. According to this all hazardous material must be * Packaged in accordance with Department of Transportation (DOT) requirements and * Shipped to Argonne from, or shipped from Argonne to, the home institute. * Specific exceptions have been obtained for movement of small quantities in personal vehicles for non-Argonne users, dry ship- ping cryogenic samples, and shipping cryo-preserved biological samples by air transport.

315

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3.jpg IMAGE imgs/esl384.jpg 3.jpg IMAGE imgs/esl384.jpg IMAGE imgs/esl385.jpg Variation in daylight correlation coefficient as blind angle is varied for a) summer direct lighting conditions, b) summer diffuse lighting conditions, c) winter direct lighting conditions, d) winter diffuse lighting conditions The "gain" of a typical closed-loopproportional systemvarieswiththespatial distributionof daylightin a space. This critical parameter is set once upon the daylighting control system's installation then left to control the lighting for all electric and daylighting conditions within the space over the entire year. Occupants will complain and even sabotage the system if the lights are too dim--a result of improper commissioning. We show above how this gain parameter

316

17784_Tour_Brochure_CR:Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

genome of an organism contains all of genome of an organism contains all of its genetic material or DNA, molecules made up of four bases known as A, C, T and G. When scientists sequence the genome, it's like taking apart a puzzle someone else completed to figure out what each section is made up of, and then re-assemble the information so that scientists can understand the big picture. The U.S. Department of Energy Joint Genome Institute has been headquartered in Walnut Creek, California since 1999, sequencing plants, microbes and communities of microbes called metagenomes that are related to the DOE mission areas of bioenergy, the carbon cycle and biogeochemistry. A fifth of the sequencing projects done worldwide is done right here in Walnut Creek. JOINT GENOME INSTITUTE sequencing the world of possibilities

317

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9.jpg A B C D E F Overall lighting comfortable? 9.jpg A B C D E F Overall lighting comfortable? Automatic 0 29 14 57 0 0 Semi-control 0 21 0 71 7 0 Manual-control 0 7 7 64 21 0 Lighting uncomfortably bright for tasks? Automatic 43 50 7 0 0 0 Semi-control 21 71 7 0 0 0 Manual-control 29 71 0 0 0 0 Lighting uncomfortably dim for tasks? Automatic 21 21 29 29 0 0 Semi-control 7 71 14 7 0 0 Manual-control 14 79 7 0 0 0 Lighting poorly distributed? Automatic 21 36 7 36 0 0 Semi-control 21 57 7 14 0 0 Manual-control 21 64 7 7 0 0 Lighting caused deep shadows? Automatic 21 50 29 0 0 0 Semi-control 21 57 14 7 0 0 Manual-control 29 71 0 0 0 0 Reflections from light fixtures hindered work? Automatic 36 43 7 0 0 14 Semi-control 36 50 14 0 0 0 Manual-control 21 64 7 0 0 7 Lighting fixtures too bright? Automatic 29 50 7 0 0 14

318

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7.jpg 7.jpg productivity by even a small amount are thus highly cost-effective. While there is little hard data that shows a direct relationship between energy-efficient daylighting designs and productivity, there is anecdotal evidence that views of the outdoors, connections to the outside, and a glare-free and thermally comfortable environ- ment all contribute to a more satisfied worker--who is likely to be more productive than an unhappy, uncomfortable worker. We evaluated the occupants' acceptance and satisfaction of their work environ- ment in a limited full-scale test with the automated blind|lighting system. A small number of occupants performed a limited set of visual tasks. These occupants re- ported that they were generally satisfied with the performance of the automated

319

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Integrated Envelope and Integrated Envelope and Lighting Systems IMAGE imgs/esl321.jpg IMAGE imgs/esl320.jpg Traditional approaches to creating energy-efficient buildings involve selecting from long lists of efficient components. By taking an inte- grated systems approach to combining disparate building envelope and lighting components, we can attain greater energy savings and improved occupant comfort compared to conventional energy-effi- cient design practice. Windows +Lighting +Mechanical This integrated systems approach was the basis for a multiyear project supported by the California Institute for Energy Efficiency with co- support from DOE, to develop and promote advanced building sys- tems integrating high-performance envelope and lighting technolo- gies. Since the illumination and cooling of commercial buildings

320

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2800 2800 IMAGE imgs/esl394.jpg IMAGE imgs/esl396.jpg IMAGE imgs/esl395.jpg Performance of the dynamic blind system (DB ) compared to a static horizontal blind (SB) system. Notetheuncontrolleddaylight levels of the horizontal blind of 2400 lux, which results in higher daily cooling of 21% and peak cooling loads of 13%. Daily light- ingenergyreductions were21%. Thesedata arefor a southeast-facing windowin Oakland on a clear day in August. Both roomshave thesame daylighting control system. 0 Hour IMAGE imgs/esl398.jpg IMAGE imgs/esl397.jpg Performance of the dynamic blind system comparedtoa static 45Âş blindsystem. Here, thedaily cooling loadand peak coolingload reductions were more modest,4% and 8%, respectively, comparedtothis partly-closed blind;butdaily lighting energysavings were

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1.jpg 1.jpg Demonstration A full-scale demonstration of a light-redirecting skylight was conducted in the Palm Springs Chamber of Commerce. Because cooling loads area major problem in this climate and sunlight is almost always available, we designed a solution around a small skylight that admits and redirects direct sunlight to the ceiling of two separate interior rooms. The geometry of the internal skylight reflector was designed to provide daylight under all seasonal solar conditions, without allowing direct sunlight penetration to the task areas. The optical materials (reflectors and diffusers) were selected to provide good optical efficiency throughout the year. Initial surveys of the occupants indicated that they enjoyed the variability intrinsic in such a system and that it met their lighting needs well even during the winter.

322

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0.jpg 0.jpg Environmental Quality IMAGE imgs/esl3121.jpg There have been unsubstantiatedclaims that daylighting benefits the health, satisfaction, and even productivity of humans. Both daylighting prototypes were designed to improve comfort as well as increase energ y-efficiency. With this research, we beg an the process of quantifying the qualitative benefits of dynamic andlight-redirecting window/lighting systems using simulationtools, reduced-scalefield tests,andfull-scaledemonstrations. Some of our arguments for qualityimprovements comparedto conventional systems were madebased on meeting well-known design constraints,thresholds setby experimentalfield data (e.g., glare or thermal comfort indices), or industry guidelines (e.g., IES RP-1 for visualcomfort). These methods only partiallydescribe the fitness of a

323

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3.jpg base case dif - 3.jpg base case dif - fusing skylight distribution ver- sus the light-re- direct ing sky- light IMAGE imgs/esl3124.jpg IMAGE imgs/esl3125.jpg "I like the feeling of sunlight... To me, the light gives me the feeling of my home environment because I have patches of light at home. I like this interplay of natural light. What I like most about the skylight is that it doesn't seem artificial. I feel like I'm outdoors but under the canopy of a tree." "I like to trace the angles and think about how the sun angles are caught by the angles of the reflectors. I find the complexitypleasant. I like looking at how the light is reflected--it's fantastic. I don't understand the physics of it but I'm amazed at how the light is diverted to the ceiling and walls and how the angles are working with the sun..."

324

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

jpg IMAGE imgs/esl337.jpg jpg IMAGE imgs/esl337.jpg IMAGE imgs/esl338.jpg IMAGE imgs/esl339.jpg ering the solar heat gain coefficient to reduce cooling while maintaining the visual transmission of the glass to capture daylight savings. However, harnessing daylight in a build- ing poses asignificanttechnicalchallenge because ofthe great variability in daylight intensity. Achieving higher energy savings under these conditions requires looking beyond static systemstodynamic systemsthatrespond tochanging climatic or occupant conditions. By linking a dimmableelectric light- ing system with daylighting controls to a fenestrationsystem that can automatically modify the transmission of daylight, we can get real-time control of the cooling and lighting en- ergy balance while addressing glare and thermal comfort.

325

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4.jpg 4.jpg Peak Demand Reductions When daylight availabilityand summer outdoor temperatures are hig h, daylighting can substan- tially reduce peak electric loads due to cooling andlighting. This will result in monthly savings in demand charges, but it also reduces pressure on the utilityto addnew generating capacity(e.g. hydroelectric, nuclear, etc.). In the case of a ret- rofit of an existing building, it provides new available capacity for other needs. Some utili- ties are still willing to "purchase" these "negawatts"with upfront rebates that help off- set the building owner's first cost. Conceptu- ally, the g lazing system becomes an energy source (relativeto aconventionalalternative) and the utility makes an investment in this "energy

326

Markov Logic Networks for Document Layout Correction  

E-Print Network [OSTI]

, and Nicola Di Mauro Department of Computer Science, LACAM laboratory University of Bari "Aldo Moro", via or merge operations #12;2 Stefano Ferilli, Teresa M.A. Basile, and Nicola Di Mauro are performed using

Di Mauro, Nicola

327

Seamless integration of layout and simulation  

Science Journals Connector (OSTI)

This document talks about the usage of Simulation Data Exchange (SDX) (Moorthy 1999) in order to enable a consistent digital model of automotive factories. The scope of the digital model is to plan and analyze the factory by using different software ...

Karsten Mecklenburg

2001-12-01T23:59:59.000Z

328

Smart Bengali Cell Phone Keypad Layout  

E-Print Network [OSTI]

Nowadays cell phone is the most common communicating used by mass people. SMS based communication is a cheap and popular communication method. It is human tendency to have the opportunity to write SMS in their mother language. Text input in mother language is more flexible when the alphabets of that language are printed on the keypad. Bangla mobile keypad based on phonetics has been proposed earlier. But the keypad is not scientific from frequency and flexibility point of view. Since it is not a feasible solution in this paper we have proposed an efficient Bengali keypad for cell phone and other cellular device. The proposed keypad is based on the frequency of the alphabets in Bengali language and also with the view of structure of human finger movements. We took the two points in count to provide a flexible and fast cell phone keypad.

Azad, Md Abul Kalam; Ahmad, Shabbir; Kamruzzaman, S M

2010-01-01T23:59:59.000Z

329

A Cadence layout wrapper for MATLAB.  

E-Print Network [OSTI]

?? In this thesis, the focus is on creating a wrapper between MATLAB and the Cadence Virtuoso design environment. The central idea is to use… (more)

Tsirepli, Ismini

2006-01-01T23:59:59.000Z

330

1663Layout_27FEB2013.indd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

dioxide and other greenhouse gases, which drive increased tempera- tures and climate change worldwide. the capture and long-term storage of carbon dioxide in deep, geological...

331

Optimizing the Layout of Proportional Symbol Maps  

E-Print Network [OSTI]

perature at weather stations, etc.). As the name suggests, symbol sizes ..... NOAA Satellite and Information Service. National geophysical data center. http:.

2010-11-10T23:59:59.000Z

332

This is a layout for the letterhead  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2015. Please note that this is a call for proposals for all experiments using stable beams, radioactive beams produced by the in-flight technique, and low-energy and...

333

arch layout 11.21.98  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

.jpg .jpg problem Despite the tremendous architectural interest and the large po- tential energy savings, the actual number of effectively daylit buildings that demonstrably save energy is very small. This is due to numerous design, implementation,and technological bar- riers: A major barrier to the use of daylighting is technological. Daylighting is unique in that it requires designers to solve not only complex technical issues on a case-by-casebasis, but also qualitative issues as well. There are a lack of good modular inte- grated building systems that perform well across energy-efficiency and qualitative criteria and can be easily used in most buildings. Concepts for innovative technologies need to be comprehensively tested to determine if they are truly viable and acceptable. Evalu-

334

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...in the accommodation sector, the key to reducing...consisted of a hemispherical construction that insects could climb...233, 234). The heating of whole rooms comes...insecticides to open spaces via aerosols), space sprays, and incendiary...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peńas; Richard C. Russell

2012-01-01T23:59:59.000Z

335

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...the treatment of field infestations...95) and cedar oil. The modes of...Best Yet cedar oil can kill all bed...the control of field infestations...complexes, as the gas cannot be tightly...Insecticides The cost to develop and...insects during spray operations. In laboratory...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peńas; Richard C. Russell

2012-01-01T23:59:59.000Z

336

DOODLE-BUGS AND LAW-MAKERS  

Science Journals Connector (OSTI)

...through adolescence. A research group has been assembled. The fund...This committee is conducting a group of studies, of bio-logical...turned south and east via the Klamath lakes to north-western Nevada...some day a wandering ant will fall into the pit and thus keep alive...

J. F. McClendon

1932-07-22T23:59:59.000Z

337

'Bugs' used to treat FGD wastewater  

SciTech Connect (OSTI)

Tough regulation of heavy metals may justify a bioreactor approach in addition to chemical treatment of FGD wastewater. Two of Duke Energy' coal-fired plants, Belews Creek and Allen (in North Carolina) have installed new biological reactor systems to increase selenium removal to levels not achievable by existing scrubber waste water systems. The ABMet system removes nitrate and selenium in a single step. Progress Energy has installed the system at Roxboro and Mayo Stations, also in North Carolina. 1 fig., 2 photos.

Blankinship, S.

2009-09-15T23:59:59.000Z

338

noBugs - project tracking system.  

E-Print Network [OSTI]

??Testing has become a major part of any project in IT industry. Testing is done at every phase of SDLC because the cost and risk… (more)

Kankanawadi, Jyoti Manjunath

2011-01-01T23:59:59.000Z

339

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...of Prurigo of Hebra in Egypt. J. Egypt. Soc. Parasitol. 15...saw a bedbug. New York Daily News. http://articles...Bedbugs not back by popular demand. Dimens. Crit. Care...at Seaport. New York Daily News. http://articles...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peńas; Richard C. Russell

2012-01-01T23:59:59.000Z

340

Ergonomic, adaptable keyboard for fast data entry on mobile computing devices  

E-Print Network [OSTI]

The usefulness of modem portable computational devices such as cellular phones and portable digital assistants (PDAs) is currently limited by the lack of an effective method for text entry. The currently available input ...

Mekelburg, Alexander (Alexander Mark)

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A review of "The Keyboard in Baroque Europe" by Christopher Hogwood, ed.  

E-Print Network [OSTI]

of this composer. Included are stops in Dresden, Brussels, Utrecht, London, Paris, REVIEWS 309 and Regensburg. The reader learns that, during his time in Brussels, Froberger was not in the service of Archduke Leopold Wilhelm of Austria, as has been asserted... of this composer. Included are stops in Dresden, Brussels, Utrecht, London, Paris, REVIEWS 309 and Regensburg. The reader learns that, during his time in Brussels, Froberger was not in the service of Archduke Leopold Wilhelm of Austria, as has been asserted...

Graham H. Phipps

2004-01-01T23:59:59.000Z

342

Bug Bytes,Summer 2008 1 W elcome to Bug Bytes, our newly  

E-Print Network [OSTI]

was named the best in the country by the Chronicle of Higher Education, considered the top news and job for that perfect entomological t-shirts, books, insect art prints, insect candy, and posters of California drag- insect. You can see what's available at www. bohartmuseum.com. Purchases at the Education Programs

Ishida, Yuko

343

What is a bed bug? Bed bugs are small, oval, reddish brown, non-  

E-Print Network [OSTI]

zippers. Thus, experts recommend using hard luggage that closes tight. ·Protectyourclothes. Seal your clothes inside air-tight bags. ·Protectyourluggage. Never set your luggage on the bed or on a couch. Put. ·Treatyourluggagebeforeyoustoreit. After you have unpacked, vacuum your luggage thoroughly. Also, if it is hot outside, you can seal

Almor, Amit

344

NERSC_AR_06_released:Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

RESEARCH RESEARCH SCIENTIFIC COMPUTING CENTER ANNUAL REPORT 2006 NATIONAL ENERGY RESEARCH SCIENTIFIC COMPUTING CENTER ANNUAL REPORT 2006 Ernest Orlando Lawrence Berkeley National Laboratory 1 Cyclotron Road, Berkeley, CA 94720-8148 This work was supported by the Director, Office of Science, Office of Advanced Scientific Computing Research of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231. LBNL-63342, August 2007 THE YEAR IN PERSPECTIVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 RESEARCH NEWS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

345

6_07_sft_ntce_electrical:Layout 1.qxd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

USER FACILITIES USER FACILITIES SAFETY NOTICE Three "close-call" electrical-short events occurred at Argonne within the past six months. All involved shorts across the prongs of electrical plugs inserted into energized receptacles. While no shocks or injuries resulted, and equipment damage was minor, the potential for injury was very real. Each event was reported to the Department of Energy. SUF_6.07 Electrical Shorts across Plug Prongs All employees and users at Argonne should exercise great vigilance in checking to see that: * Only NRTL-labeled equipment (in- cluding separate cables) or equip- ment inspected by a designated elec- trical equipment inspector is used. * Damaged electrical equipment is immediately brought to the attention of safety or beamline personnel.

346

FINAL LAYOUT_ 7-24-13dp.indd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

IMPACTS ON SANDIA BIOSCIENCES IMPACTS ON SANDIA BIOSCIENCES B i o t h re a t s t o B i o f u e l s 2 S a n d i a N a t i o n a l L a b o r a t o r i e s From the Chief Technolog y Of ficer The LDRD Program Innovates for Sandia's Biosciences Mission T he face of Sandia's Biosciences program is undergoing dramatic change and growth as the role of this foundational area in U.S. national security becomes increasingly important, for example in the areas of new biothreat organisms (arising both naturally and through genetic engineering), and the exciting prospect of multiple potential routes for improving biofuel production. Simultaneously, the scope of biomedical knowledge itself continues its recent pattern of explosive growth. This state of affairs poses both an exciting opportunity and a major challenge to the Sandia Biosciences

347

cr_14229_JGI_Primer_Fall07 :Layout 1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JGI Community Sequencing JGI Community Sequencing Program (CSP) is contributing to an ambi- tious international effort to decode the genome of Eucalyptus, one of the world's most valuable fiber and paper-producing trees-with the goal to maximize its poten- tial in the burgeoning bioenergy market and for capturing excess atmospheric carbon. The scientific effort to characterize the Eucalyptus genome, uniting some two dozen institutions worldwide, is led by Alexander Myburg of the University of Pretoria (South Africa), with co-leads Dario Grattapaglia, of EMBRAPA and Catholic University of BrasĂ­lia (Brazil), and Jerry Tuskan of Oak Ridge National Laboratory-JGI's Laboratory Science Program lead. The 600-million-nucleotide tree genome was selected as one of JGI's CSP FY2008 major allocations.

348

15810_WoGS_released:WoGS Final Layout  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

world of world of GREAT SCIENCE ... and great science solutions From the infinite scale of the universe to the infinitesimal scale of subatomic particles, researchers at the Lawrence Berkeley National Laboratory - Berkeley Lab - are advancing the scope of human knowledge and seeking technical solutions to some of the greatest problems facing humankind. Scientific excellence and an unparalleled record of achievement have been the hallmarks of this Laboratory since it was founded by Ernest O. Lawrence in 1931. Eleven scientists associated with Berkeley Lab have won the Nobel Prize, and 55 other Nobel Laureates either trained here or had significant collabo- rations with Laboratory researchers. Thirteen Berkekey Lab scientists have also won the National Medal of Science, the

349

Layout optimization in ultra deep submicron VLSI design  

E-Print Network [OSTI]

, respectively. More specifically, at layer assignment, we have proposed an improved probabilistic model to quickly estimate the amount of coupling capacitance for timing optimization. Antenna effects are also handled at layer assignment through a linear...

Wu, Di

2006-08-16T23:59:59.000Z

350

Machine Learning for Digital Document Processing: From Layout Analysis To  

E-Print Network [OSTI]

Floriana Esposito1 , Stefano Ferilli1 , Teresa M.A. Basile1 , and Nicola Di Mauro1 Universit`a degli Studi and N. Di Mauro focused on principles and techniques for setting up and managing document collections

Di Mauro, Nicola

351

A binary LP model to the facility layout problem Abstract  

E-Print Network [OSTI]

Such locations will influence material handling or distance costs and ..... binary row) and select the location which will be placed (based on the lowest value in ...

Cpu

2002-04-04T23:59:59.000Z

352

A graph layout algorithm for drawing metabolic pathways  

Science Journals Connector (OSTI)

......out thanks to the support of the German Ministry for Education and Sciences (BMBF) (Project Bioregio 0312212) and the Klaus...59. Michal,G. (1993) Biochemical Pathways (poster). Boehringer Mannheim GmbH. Michal,G. (1999......

Moritz Y. Becker; Isabel Rojas

2001-05-01T23:59:59.000Z

353

A Polyhedral Approach to the Single Row Facility Layout Problem  

E-Print Network [OSTI]

These validity of these inequalities for MinLA was observed by Liu Van- nelli [19]. ..... [29] Torgerson, W.S.: Multidimensional scaling I: theory and method. Psy-.

2011-01-20T23:59:59.000Z

354

A New Modelling Approach for Cyclic Layouts and its Practical ...  

E-Print Network [OSTI]

Sep 15, 2014 ... operations research problem and arises in different areas of application. ..... also supported by the extensive experiments conducted in the ...

2014-09-15T23:59:59.000Z

355

D0-EC RTD Wiring Layout (South Calorimter)  

SciTech Connect (OSTI)

The temperature of the South End-Calorimeter of the D-Zero detector is to be monitored by several RTD temperature sensors. The location and other important information pertaining to each individual RTD is included in the following tables, which are grouped by bundle number. There are nine 60 pin port connectors. Each connector corresponds to a bundle of twisted pairs. Twisted pairs, of one of eight colors along with either a black or white wire, run to 10-pin connectors which have a mate on the module or cryostat wall. In general, all 60 pins, or all 10 pins are not used. The color scheme of the wires was deSigned so that all the twisted pairs with white run West from the instrumentation port, and twisted pairs with black run East. This scheme proved to be very successful and efficient during the installation process. After being installed, every RTD connection was checked and their corresponding resistances were recorded by Jerry Blazey. All the ATD's tested successfully, except for 4. The 4 dead RTD's were: Channel 12 on bundle 1, which is located on the back of OH module 7R; Channel 19 on bundle 4, which is located on the back of MH module 5L; Channel 9 on bundle 5, which is located on the IH fine 2-inch strap; and Channel 25 on bundle 7, which is located on the east strongback.

Leibfritz, J.R.; /Fermilab

1991-08-06T23:59:59.000Z

356

Preprocessing Steiner Problems from VLSI Layout Eduardo Uchoa  

E-Print Network [OSTI]

in Graphs (STPG) is the following: given a connected graph G = (V; E), non­negative costs c(e) associated 0 ; E 0 ) with T ` V 0 minimizing P e2E 0 c(e). The STPG is one of the most widely studied NP­hard problems. Koch and Martin [4] presented a very good implementation of an exact algorithm for STPG

Poggi de AragĂŁo, Marcus V. S.

357

Carbon Nanotube Growth Using Ni Catalyst in Different Layouts  

E-Print Network [OSTI]

Vertically aligned carbon nanotubes have been grown using Ni as catalyst by plasma enhanced chemical vapor deposition system (PECVD) in various pre-patterned substrates. Ni was thermally evaporated on silicon substrates ...

Nguyen, H. Q.

358

A Hybrid Layout Algorithm for Sub-Quadratic Multidimensional Scaling  

E-Print Network [OSTI]

Morrison,A.J. Ross,G. Chalmers,M. IEEE Symposium on Information Visualization (Boston, USA) pp 152-160 IEEE Computer Society Press

Morrison, A.J.

359

PRODUCTION ANALYSIS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect (OSTI)

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr.

2003-12-01T23:59:59.000Z

360

The baron of bugs: Researcher keeps waterborne pathogens at bay  

E-Print Network [OSTI]

of organisms in the environment, except instead of working with soil now I was working with water,? he said. ?Since it was a drinking water company, the focus was detecting pathogens in source water used for drinking water production, as well as finished... drinking water itself.? Though he believed great advancements in basic and applied waterborne pathogen research were being made, he foresaw limited research opportunities at the water company. At this time, Di Giovanni said, the water indus- try...

Swyden, Courtney

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Phoenix: Detecting and Recovering from Permanent Processor Design Bugs  

E-Print Network [OSTI]

approaches are ineffective Micro-code patching Compiler workarounds OS hacks Firmware #12;http Condition L1, ALU, Memory, etc. Hang, data corruption IO failure, wrong data A (BCD) Signal Snoop L1 hit IO

Torrellas, Josep

362

UMass builds bugs to eat MTBE ByAuriaCimino  

E-Print Network [OSTI]

a toxic gasoline component might be just what the doctor ordered for Maine's con- taminated groundwater with methyl tertiary butyl ether (MTBE), which is found in gasoline. Once the first field trial is complete out of the reformulated gasoline pro- gram (RFG) .The gasoline, which con- tains 11 percent MTBE

Lovley, Derek

363

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug...  

Broader source: Energy.gov (indexed) [DOE]

target system. A remote user can obtain potentially sensitive information. Solution: A patch matrix is available in the vendor's advisory. Addthis Related Articles V-076: Cisco...

364

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

user can redirect users to arbitrary sites. Solution: The vendor has issued a fix. A patch matrix is available in the vendor's advisory. Microsoft Security Bulletin MS11-100...

365

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

that, when loaded by the target user, will trigger a buffer overflow, use-after-free memory error, or memory corruption error and execute arbitrary code on the target system. The...

366

Assassin bug uses aggressive mimicry to lure spider prey  

Science Journals Connector (OSTI)

...vibrometer (Polytec PDV100, Germany). The AES (Audio Engineering Society) output of the laser vibrometer was converted to EBU (CO3, Midiman, M-Audio, USA) and synchronized to the audio track of the video recording. Vibrations...

2011-01-01T23:59:59.000Z

367

Digital Integrated Circuit (IC) Layout andDigital Integrated Circuit (IC) Layout and DesignDesign --Week 10, Lecture 20Week 10, Lecture 20  

E-Print Network [OSTI]

Power Consumption Robustness Complexity Some new circuit solutions and design methodologies are coming. · Data latched in inverter pair. · Word line high: Writing / Reading · Writing: Write by force. · Reading of new tools. Non-recurring costs dominate the price effectiveness of low-volume ASICs. Need to have

368

U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service...  

Broader source: Energy.gov (indexed) [DOE]

Wireshark Bug Database - Bug 7666 SecurityTracker Alert ID: 1027464 Bugtraq ID: 55284 Red Hat Bugzilla - Bug 849926 CVE-2012-3548 IMPACT ASSESSMENT: Medium Discussion: An...

369

Top ten list of user-hostile interface design  

SciTech Connect (OSTI)

This report describes ten of the most frequent ergonomic problems found in human-computer interfaces (HCIs) associated with complex industrial machines. In contrast with being thought of as ``user friendly,`` many of these machines are seen as exhibiting ``user-hostile`` attributes by the author. The historical lack of consistent application of ergonomic principles in the HCIs has led to a breed of very sophisticated, complex manufacturing equipment that few people can operate without extensive orientation, training, or experience. This design oversight has produced the need for extensive training programs and help documentation, unnecessary machine downtime, and reduced productivity resulting from operator stress and confusion. Ergonomic considerations affect industrial machines in at least three important areas: (1) the physical package including CRT and keyboard, maintenance access areas, and dedicated hardware selection, layout, and labeling; (2) the software by which the user interacts with the computer that controls the equipment; and (3) the supporting documentation.

Miller, D.P.

1994-10-01T23:59:59.000Z

370

Effect Of CRAC Location On A Fixed Rack Layout Of A Data Center.  

E-Print Network [OSTI]

??Agonafer, Dereje Microprocessor driven escalation of thermal management needs has resulted in significant cooling challenges at the data center facility level, which can house thousands… (more)

Bedekar, Vishwas

2007-01-01T23:59:59.000Z

371

Exploiting the Graph Description of Indoor Layout for Ray Persistency Modeling in Moving Channel  

E-Print Network [OSTI]

. The human motion introduces small scale and large scale variations. This paper focuses on large scale nature of the channel and for explaining the exponential decay of the Power Delay Profile (PDP

Paris-Sud XI, Université de

372

Flexible Facility Interior Layout: A Real Options and Chung-Li Tseng  

E-Print Network [OSTI]

, Delta Consulting Group, Inc., 310 Commerce Street, Occoquan, VA 22125, USA. Tel: (703) 497-7735, fax, University of Missouri-Rolla, Rolla, MO 65409, USA. Tel: (573) 341-7621, fax: (573) 341-6567, email: chungli will be evaluated. The concept of real options, stemming from financial options, refers to flexibility em- bedded

Tseng, Chung-Li

373

Evolutionary optimization of layouts for high density free space optical network links  

Science Journals Connector (OSTI)

Electrical chip- and board-level connections are becoming more and more a bottleneck in computation. A solution to that problem could be optical connections, which allow a higher bandwidth. The usage of free space optics can avoid the problem of crosstalk ... Keywords: CLOS network, PIFSO, distributed computing, evolutionary algorithm, optical interconnect, optimization

Steffen Limmer; Dietmar Fey; Ulrich Lohmann; Jürgen Jahns

2011-07-01T23:59:59.000Z

374

Production system improvement at a medical devices company : floor layout reduction and manpower analysis  

E-Print Network [OSTI]

Due to the low demand and the need to introduce other production lines in the floor, the medical devices company wants to optimize the utilization of space and manpower for the occlusion system product. This thesis shows ...

AlEisa, Abdulaziz A. (Abdulaziz Asaad)

2012-01-01T23:59:59.000Z

375

Designs for critical secondary control layouts for vehicles for the physically challenged  

E-Print Network [OSTI]

of the TALK system between able-bodied and physically challenged persons. . . . . . . . . . . . . . . . 3 Comparison of the accuracy for the TALK and TONE systems. 25 26 INTRODUCTION In the area of automotive adaptive equipment, safety is even inore... obtained through interviews, conducted by the author, with qualified experts in the automotive adaptive equipment field from industry and academia. This compilation of expert opinions and ideas helped to contribute to the design approaches discussed...

Lostetter, Michael F

2012-06-07T23:59:59.000Z

376

Proceedings of ICRC 2001: 703 c Copernicus Gesellschaft 2001 Layout of the Pierre Auger Observatory  

E-Print Network [OSTI]

. del Libertador 8250, (1429) Buenos Aires, Argentina 2 Observatorio Pierre Auger, Av. San Mart´in Norte 304, (5613) Malarg¨ue, Argentina Abstract. The Pierre Auger Collaboration was formed to study the highest energy cosmic ray showers, focusing the attention on energies above 5·1019 eV. The strong flux sup

377

Efficient Formulations for the Multi-Floor Facility Layout Problem with ...  

E-Print Network [OSTI]

Feb 22, 2007 ... block diagram shows the location and dimensions of the building and .... where the material handling transportation between floors is executed ...

Marc Goetschalckx and Takashi Irohara

2007-02-22T23:59:59.000Z

378

Consistent Weighted Graph Layouts Dana Vrajitoru and Jason DeBoni  

E-Print Network [OSTI]

of years from now some aliens discover traces of human civilization on Earth and they try to recover our, and that all that the aliens find is a schedule of an airline company containing the amount of time that each flight would require to connect a given city to another. The problem is, can the aliens reconstruct

Vrajitoru, Dana

379

Efficient chip-level CMP models are required to predict dielectric planarization performance for arbitrary layouts  

E-Print Network [OSTI]

distributed load. The characteris- tic length of the filter, L, is a model parameter which must be z1 z=0 z dropped to 2/. The filter shape corresponds to the deformation profile of an elastic material under distributed load in a circle of radius L/2. ELLIPTIC WEIGHTING FILTER An Integrated Characterization

Boning, Duane S.

380

SUPPORTING INFORMATION Growth of Manganese Oxide Nanostructures Alters the Layout of  

E-Print Network [OSTI]

of Squares Mean Square F Value Probability > F Model§ : fmax = apH1 + bpH2 + c 2 0.1116 0.0558 0.96 0 t Value Probability > |t| a 1 0.29 0.10 2.9 0.02 b 1 -0.10 0.08 1.25 0.16 c 1 0.64 0.63 1.01 0.21 F-test and t-test follow standard procedures outlined in Introduction to the Practice of Statistics by Moore

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

1. POSSO ALLEGARE PDF CON LAYOUT EDITORIALE 2. posso saltare tutti i passi successivi  

E-Print Network [OSTI]

caso stia depositando la mia versione finale (ovvero un file di Word o altro processore di testi) SALVO

Sproston, Jeremy

382

The Conceptional Design of the Shielding Layout and Beam Absorber at the PXIE  

SciTech Connect (OSTI)

Project X is a high intensity proton facility conceived to support a world-leading physics program at Fermilab. Project X will provide high intensity beams for neutrino, kaon, muon, and nuclei based experiments and for studies supporting energy applications. The Project X Injector Experiment (PIXIE) is a prototype of the Project X front end. A 30 MeV 50 kW beam will be used to validate the design concept of the Project X. This paper discusses a design of the accelerator enclosure radiation shielding and the beam dump.

Eidelman, Yu.; Kerby, J.; Lebedev, V.; Leibfritz, J.; Leveling, T.; Nagaisev, S.; Stanek, R.; /Fermilab

2012-05-14T23:59:59.000Z

383

State College WWTP Tour 2003 A map of the plant layout is given to visitors  

E-Print Network [OSTI]

the sludge go? Lets see... #12;Sludge first goes to a sludge thickener #12;It looks bad and smells bad, but the supernatent is quite clear. #12;This is the first digestor used to treat the sludge. #12;The second digestor is underground #12;The temperature of the sludge units is kept at about 95oF to enhance fermentation

384

On-chip interconnect architectures : perspectives of layout, circuits, and systems  

E-Print Network [OSTI]

The clock distribution network design has been a greatto a clock distribution network design in 70 nm technology.low skew distribution, one exemplary design is DEC Alpha

Chen, Hongyu

2006-01-01T23:59:59.000Z

385

Visualizing Multivariate Network Using GeoSOM and Spherical Disk Layout School of Information Technologies  

E-Print Network [OSTI]

. Connections in the network describe relationships/activities between the data points. Many real world data countries are repre- sented as nodes, each country has properties like gross domestic product (GDP), GDP Previously, we treat each graph node as a point in high-dimensional space and use GeoSOM to project the nodes

Hong,Seokhee

386

The effect of layout modification on latchup triggering in CMOS by experimental and simulation approaches  

SciTech Connect (OSTI)

The influence of certain geometrical parameters on latchup triggering in CMOS-1.2[mu]m structure is studied by means of experiments and simulations on test structures. Electrical characterizations are made in order to validate quantitatively the analysis achieved by numerical simulations. The results of heavy ion irradiation from two different sources are given and discussed with regard to the influence of the same geometrical parameters on the sensitivity of the test structures to latchup.

La Rochette, H. de; Bruguier, G.; Palau, J.M.; Gasiot, J. (Univ. Montpellier II (France). Centre d'Electronique de Montpellier); Ecoffet, R. (Centre National d'Etudes Spatiales, Toulouse (France))

1994-12-01T23:59:59.000Z

387

HyLog: A High Performance Approach to Managing Disk Layout  

Science Journals Connector (OSTI)

Our objective is to improve disk I/O performance in multi-disk systems supporting multiple concurrent users, such as file servers, database servers, and email servers. In such systems, many disk reads are absorbed by large in-memory buffers, and so disk ...

Wenguang Wang; Yanping Zhao; Rick Bunt

2004-03-01T23:59:59.000Z

388

HyLog: a high performance approach to managing disk layout  

Science Journals Connector (OSTI)

Our objective is to improve disk I/O performance in multi-disk systems supporting multiple concurrent users, such as file servers, database servers, and email servers. In such systems, many disk reads are absorbed by large in-memory buffers, and so disk ...

Wenguang Wang; Yanping Zhao; Rick Bunt

2004-03-01T23:59:59.000Z

389

An Energy-Efficient Algorithm For Conflict-Free AGV Routing On A Linear Path Layout  

E-Print Network [OSTI]

consumption will unavoidably become an important consideration for the AGV systems. The primary objective the energy, aiming to minimize energy consumption of the vehicles during routing. As the energy resource, to account for the energy consumption, we formulate a basic energy model for AGV routing, and the energy

Zeng, Jianyang "Michael"

390

An EnergyEfficient Algorithm For ConflictFree AGV Routing On A Linear Path Layout  

E-Print Network [OSTI]

consumption will unavoidably become an important consideration for the AGV systems. The primary objective the energy, aiming to minimize energy consumption of the vehicles during routing. As the energy resource, to account for the energy consumption, we formulate a basic energy model for AGV routing, and the energy

Zeng, Jianyang "Michael"

391

On Using a Gradient-based Method for Heliostat Field Layout Optimization  

Science Journals Connector (OSTI)

Abstract The most widely used methods for heliostat field optimization assume a particular pattern and then optimize the parameters that define the pattern to obtain a specified objective such as optimum optical efficiency or maximum power output. It has been demonstrated that these optimized patterns are not necessarily optimal; improvements are possible. Allowing heliostat field placement independent of an a priori pattern may therefore result in improved performance. While initial placement of heliostats in a fixed pattern may reduce computational burden, this paper demonstrates that an optimal field can be designed using a gradient-based optimization method starting from a random initial field and resulting in a field performing better than optimized patterns. The greatest challenge is computational expense. However, a simplified field analysis tool used as an objective function in a suitable optimization procedure sufficiently reduces the computational expense. An algorithm for very large scale optimal design, denoted SAOi, is applied. The algorithm is based on sequential approximate optimization and exploits some of the advantages of quadratic approximations while minimizing storage requirements. This algorithm proves attractive for the present problem where the design variables are large and the constraints outnumber the design variables. The procedure is applied to redesign the PS10 field with an improvement of 1.2% in annual intercepted energy. The research presented herein shows how heliostat placement can be done with each heliostat location as a separate design variable resulting in wholly optimal field placements.

S.L. Lutchman; A.A. Groenwold; P. Gauché; S. Bode

2014-01-01T23:59:59.000Z

392

Optimization of central receiver concentrated solar thermal : site selection, heliostat layout & canting .  

E-Print Network [OSTI]

??In this thesis, two new models are introduced for the purposes of (i) locating sites in hillside terrain suitable for central receiver solar thermal plants… (more)

Noone, Corey J. (Corey James)

2011-01-01T23:59:59.000Z

393

Turbine layout for and optimization of solar chimney power conversion units.  

E-Print Network [OSTI]

??ENGLISH ABSTRACT: The power conversion unit of a large solar chimney power plant converts the fluid power, first into mechanical power, and then into electrical… (more)

Fluri, Thomas Peter

2008-01-01T23:59:59.000Z

394

T:\\ClearanceEMEUConsumption\\cbecs\\pubuse86\\txt\\cb86sasfmt&layout...  

U.S. Energy Information Administration (EIA) Indexed Site

54- 55 B-9Bf Percent public order and safety PORDP3 57- 58 B-9Bg Percent out-patient health care HCOUTP3 60- 61 B-9Bh Percent industrial INDUSP3 63- 64 B-9Bi Percent...

395

T:\\ClearanceEMEUConsumption\\cbecs\\pubuse89\\txt\\layouts&formats...  

U.S. Energy Information Administration (EIA) Indexed Site

B6F Percent public order and safety PORDP4 43- 45 MISS3CH. B6G Percent out-patient health care HCOUTP4 47- 49 MISS3CH. B6H Percent industrial INDUSP4 51- 53 MISS3CH. B6I...

396

On-chip interconnect architectures : perspectives of layout, circuits, and systems  

E-Print Network [OSTI]

network. We get the equivalent resistance factor of “one-that there is an equivalent resistance factor k to captureThe value of the equivalent resistance ratio, k, depends

Chen, Hongyu

2006-01-01T23:59:59.000Z

397

Double-stage genetic algorithm for wind farm layout optimization on complex terrains  

Science Journals Connector (OSTI)

This paper deals with the problem of optimal wind turbine micro siting on complex terrains. A realistic wind farm terrain can be very complex not only for the topography of the terrain but also for other factors. Such factors are the environmental impact of the wind farm the costs of land the costs of access roads wind turbine installation and maintenance costs the costs of electrical infrastructure etc. A grid-based wind farm model that takes all of these factors into consideration is proposed. For the purpose of an optimization algorithm a double-stage genetic algorithm is proposed. In the first stage the optimal micro-areas for wind turbine positioning are determined whereas the second stage defines precise optimal positions of wind turbine foundations. The double-stage genetic algorithm increases the accuracy of wind turbine positioning and decreases the dimensionality of the problem. The algorithm has been tested on a realistic wind farm terrain in Serbia.

Goran Dobri?

2014-01-01T23:59:59.000Z

398

X-ray science taps bug biology to design better materials and reduce  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. "(Caddisfly silk) is really not much stronger than super glue, but try to put super glue in your bathtub without it ever getting a chance to dry," says Jeff Yarger, professor of chemistry, biochemistry and physics at Arizona State University. Courtesy: Bennett Addison. Click to enlarge.

399

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and...  

Broader source: Energy.gov (indexed) [DOE]

A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs, setting attributes on...

400

Feature Story --The Right Bugs | Miller-McCune Magazine Feature Story  

E-Print Network [OSTI]

reactors begin to punctuate the landscape. The once prolific nuclear production site has the aura of an Old it is pumped and to produce the next generation of green fuels. He catches alligators sometimes, too. By Bijal sprawl of sagebrush and brown cheatgrass, until the harsh geometric silhouettes of entombed nuclear

Hazen, Terry

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

402

Gold bugs and beyond: a review of iridescence and structural colour mechanisms in beetles (Coleoptera)  

Science Journals Connector (OSTI)

...reflectors in beetles. The body plan of beetles is probably a key...non-homologous structures. In this review, we have aimed to provide accurate...The order Coleoptera is by any standard a prodigious showcase for the...of optical terms used in this review and/or commonly encountered...

2009-01-01T23:59:59.000Z

403

CARBON AND OXYGEN ISOTOPIC ANALYSIS: BUG, CHEROKEE, AND PATTERSON CANYON FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect (OSTI)

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

David E. Eby; Thomas C. Chidsey Jr; Kevin McClure; Craig D. Morgan; Stephen T. Nelson

2003-12-01T23:59:59.000Z

404

CAPILLARY PRESSURE/MERCURY INJECTION ANALYSIS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect (OSTI)

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby

2003-12-01T23:59:59.000Z

405

THIN SECTION DESCRIPTIONS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect (OSTI)

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby

2003-12-01T23:59:59.000Z

406

SCANNING ELECTRON MICROSCOPY AND PORE CASTING: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect (OSTI)

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby; Louis H. Taylor

2003-12-01T23:59:59.000Z

407

Bugs on a budget: Distributed sensing with cost for reporting and nonreporting  

Science Journals Connector (OSTI)

We consider a simple model of sequential decisions made by a fusion agent that receives binary-passive reports from distributed sensors. The main result is an explicit formula for the probability of making a decision before a fixed budget is exhausted. ...

Vladimir Pozdnyakov; J. michael Steele

2010-10-01T23:59:59.000Z

408

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities...

409

U-155: WebCalendar Access Control and File Inclusion Bugs Let...  

Broader source: Energy.gov (indexed) [DOE]

were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966...

410

Automated classification of local earthquake data in the BUG small array  

Science Journals Connector (OSTI)

......situation, a viable alternative to local networks...weaker signal energy in the actual...with frequent car and bustraffic...our tests of alternative approaches to...reflects the energy increase of noise...masks the signal energy in upper frequencies...suggesting alternative identifications......

Manfred Joswig

1995-02-01T23:59:59.000Z

411

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Execute Arbitrary Commands V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code U-058: Apache Struts Conversion Error...

412

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Broader source: Energy.gov (indexed) [DOE]

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

413

Uncovering Causal Relationships between Software Metrics and Bugs Cesar Couto, Christofer Silva  

E-Print Network [OSTI]

data (e.g. to show whether changes in oil prices cause recession) [12], [13]. Although more used of almost four years. Particularly, we have been able to discover in the history of metrics the causes

Paris-Sud XI, Université de

414

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...  

Energy Savers [EERE]

11.2.0.2 and 11.2.0.3 are not affected on systems that have the July 2012 Critical Patch Update. Impact: A remote authenticated user with 'Create Table' privileges can gain...

415

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

Impact: A remote user can access internal servers. Solution: The vendor has issued a patch for version 2.2.21 Apache 2.2.21 (released 2011-09-13) Addthis Related Articles U-046:...

416

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions...

417

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

Sudo version 1.8.3p1 may be updated to version 1.8.3p2 via the file sudo-1.8.3p2.patch.gz. For sudo versions 1.8.0-1.8.3, the patch to sudo.c in sudo-1.8.3p2.patch.gz will...

418

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...  

Broader source: Energy.gov (indexed) [DOE]

reported in Solaris REFERENCE LINKS: SecurityTracker Alert ID: 1028802 Oracle Critical Patch Update Advisory - July 2013 CVE-2013-3745 CVE-2013-3746 CVE-2013-3748 CVE-2013-3750...

419

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Broader source: Energy.gov (indexed) [DOE]

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

420

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files...  

Broader source: Energy.gov (indexed) [DOE]

affects PHP 5.3.6 and earlier versions. No new package has been released yet, but a patch can be grabbed from the repository and applied manually. The vulnerability does not...

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

Impact: A remote user can cause the target system to crash. Solution: IBM has issued a patch available via ftp at "aix.software.ibm.comaixefixessecuritylargesendfix.tar" The...

422

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

access. Impact: A remote user can gain unauthorized access. Solution: HP has made patch kits available to resolve the vulnerability. The patch kits and installation...

423

Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware  

E-Print Network [OSTI]

, Phoenix flushes the pipeline and either retries or invokes a customized recovery han- dler. Phoenix is about to be exercised, and either avert it or repair its effect on the fly. S

Torrellas, Josep

424

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

create specially crafted content that, when loaded by the target user, will trigger a memory corruption error CVE-2012-4163, CVE-2012-4164, CVE-2012-4165, CVE-2012-4166 or...

425

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

426

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

427

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially...  

Broader source: Energy.gov (indexed) [DOE]

A remote user can send specially crafted HTTP 100 responses to trigger a memory access error in the MSN protocol plugin and cause the target user's client to crash....

428

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

429

G54SIM Lab 02 Tutorial: Laptop Simulation Build a simulation model of a laptop operation. When the laptop is on and the user is working, i.e. is pressing the keyboard keys and moving the mouse, the laptop  

E-Print Network [OSTI]

: Fixed; From 0; To: 200] o Choose bottom graph (we use it to display the energy consumption) [Click +Add the battery usage. To wake the laptop up you need to press the power button. In any of the three states On formula [d(Battery)/dt=: -EnergyConsumption] is automatically created for you :-)] o Add code to the flow

Aickelin, Uwe

430

Three Dimensional Design and Simulation of Work Space Layouts and Work Activities that Contribute to Productive and Safe Employees  

Broader source: Energy.gov [DOE]

Presenters: Karen Bills, Shannon Roddy, Gary Hagan, Pete Calkin, Y-12 National Security Complex Track 5-6

431

FIESTA, software package for the design, synthesis, and integrated circuit layout of continuous-time OTA-C filters  

E-Print Network [OSTI]

ect speci f ications 15 Fig. 4. Arbitrary specifications Fig. 5. Input file form Fig. 6, Conventional magnitude approximation algorithm Fig. 7. Random midpoint optimization algorithm Fig. 8. Relaxation of specifications Fig. 9. Search... 1. (b) Lowpass biquad: structure 2. (c) Lowpass biquad: structure 3. (d) Bandpass biquad: structure 4. (e) Bandpass biquad: structure 5. ( f ) Bandpass biquad: structure 6. (g) Highpass biquad: structure 7. (h) Notch biquad: structure S. (i) All...

Kobe, Michael Robert

2012-06-07T23:59:59.000Z

432

Syngas-fueled, chemical-looping combustion-based power plant lay-out for clean energy generation  

Science Journals Connector (OSTI)

Of the various clean combustion technologies with carbon capture and sequestration (CCS) possibilities, chemical-looping combustion (CLC) promises to be an efficient...2 compression to 110 bar to facilitate CCS.

R. J. Basavaraj; S. Jayanti

2014-05-01T23:59:59.000Z

433

SEISMIC MONITORING APPLIED TO MINES SAFETY AND OPTIMAL DESIGN OF MINE LAYOUTS IN HARD ROCK MASS SITATIONS  

E-Print Network [OSTI]

of dynamic rock fäilures ranging from surrounding audi- ble rock noises to large scale failure phenom- ena äs induced stress changes are a basic parameter of large scale disruptions in the rock mass, and this happens to be especially the case in tabular mining. The openings and large voids created by the mining operations cause

Boyer, Edmond

434

Integrating spatial layout of object parts into classification without pairwise terms: application to fast body parts estimation from depth  

E-Print Network [OSTI]

, 2005). The underlying discrete optimization problem is similar to the one in graph matching: an energy the minimization of complex energy functions, which is prohibitive in most real world applications and therefore in their degree of usage of spa- tial relationships, between methods not using them at all, as for instance

Baskurt, Atilla

435

Taxonomy, Phylogenetics, Comparative Morphology and Evolution of Assassin Bugs (Hemiptera: Reduviidae) With Emphasis on Harpactorinae and Peiratinae  

E-Print Network [OSTI]

4.9, 4.19. H OLOTYPE : SURINAME: Commewijne: Leliendaal, 17new designation): SURINAME: Commewijne: Rust en Werk,UCR_ENT 00009270) (USNM). SURINAME: Unknown: unknown, 12 Dec

Zhang, Guanyang

2012-01-01T23:59:59.000Z

436

The water system of traditional rice paddies as an important habitatof the giant water bug, Lethocerus deyrollei (Heteroptera: Belostomatidae)  

Science Journals Connector (OSTI)

The population dynamics of Lethocerus deyrollei, including the seasonal change in the habitat utilization, were studied in five types of waters, permanent and temporary pools, ditch, rice paddy and marsh in a Sat...

Yasuo Mukai; Naoto Baba; Minoru Ishii

2005-06-01T23:59:59.000Z

437

V-163: Red Hat Network Satellite Server Inter-Satellite Sync...  

Broader source: Energy.gov (indexed) [DOE]

Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

438

DESIGN OF A MOBILE LABORATORY FOR VENTILATION STUDIES AND INDOOR AIR POLLUTION MONITORING  

E-Print Network [OSTI]

circuit layout layout Electrical Pump rack wiring schematicMain instrumentation rack panel layout System flow diagramRear View Main Instrumentation Rack CBB Front Interior Wall

Berk, James V.

2011-01-01T23:59:59.000Z

439

2196 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 53, NO. 6, JUNE 2005 Layout-Level Synthesis of RF Inductors and Filters  

E-Print Network [OSTI]

is with Jacket Micro Devices Inc., Atlanta, GA, 30308 USA. M. Swaminathan is with the Department of Electrical Devices Inc., Atlanta, GA, 30308 USA. Digital Object Identifier 10.1109/TMTT.2005.848782 factor and stripline configuration are within 5% of data obtained from electromagnetic (EM) simulations. For RF

Swaminathan, Madhavan

440

Generated using V3.2 of the official AMS LATEX templatejournal page layout FOR AUTHOR USE ONLY, NOT FOR SUBMISSION!  

E-Print Network [OSTI]

layer on external forcings. Formulating separate equations for the lifting condensation level, controlling to an important extent the height, the efficiency of vertical transport and the opacity of the boundary layer. However, these clouds are also notoriously hard to model due to the high resolution needed

Siebesma, Pier

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

R&D Requirements, RF Gun Mode Studies, FEL-2 Steady-State Studies, Preliminary FEL-1 Time-Dependent Studies, and Preliminary Layout Option Investigation  

E-Print Network [OSTI]

R&D Requirements, RF Gun Mode Studies, FEL-2 Steady-Stateinitial studies of the RF gun mode-coupling and potentialas more novel rf photocathode gun configurations – these may

2005-01-01T23:59:59.000Z

442

Abstract --In interconnect-dominated designs, the ability to minimize layout-induced parasitic effects is crucial for rapid design closure.  

E-Print Network [OSTI]

effects is crucial for rapid design closure. Deep sub-micron effects and ubiquitous interference in mixed-signal environments cause designers to be less reliant on optimization based solely on schematic models. Performance driven the inter- ests in rapid design and development of robust mixed-signal inte- grated circuits using

Zilic, Zeljko

443

How to Make a Poster Using PowerPoint Start PowerPoint: Make a New presentation a blank one. When asked for a Layout, choose a blank  

E-Print Network [OSTI]

How to Make a Poster Using PowerPoint Start PowerPoint: Make a New presentation ­ a blank one. When poster: Go to File> Page Setup. A Page Setup screen will appear. In the Slides sized for option, choose Custom. Put the actual size of poster for the Height and the Width. (If printing at the TLTC, no larger

Zhang, Yuanlin

444

Development and reliability testing of a self-report instrument to measure the office layout as a correlate of occupational sitting  

E-Print Network [OSTI]

Background: Spatial configurations of office environments assessed by Space Syntax methodologies are related to employee movement patterns. These methods require analysis of floors plans which are not readily available ...

Duncan, Mitch J.; Rashid, Mahbub; Vandelanotte, Corneel; Cutumisu, Nicoleta; Plotnikoff, Ronald C.

2013-02-04T23:59:59.000Z

445

Mixed n-Step MIR Inequalities, n-Step Conic MIR Inequalities and a Polyhedral Study of Single Row Facility Layout Problem  

E-Print Network [OSTI]

of these inequalities. First we introduce the mixed n-step mixed integer rounding (MIR) inequalities for a generalization of the mixing set which we refer to as the n-mixing set. The n-mixing set is a multi-constraint mixed integer set in which each constraint has n...

Sanjeevi, Sujeevraja

2012-10-19T23:59:59.000Z

446

Title: The Ariane 5 bug and a few lessons Author: Les Hatton, Oakwood Computing, U.K. and the Computing Laboratory,  

E-Print Network [OSTI]

, its use ceasing at the point of lift-off. However, it continued to run. Approximately 37 seconds such that a 64 bit floating point number was shoe-horned into a 16-bit integer. This is not easy in Ada. There were seven such occasions but only four of them protected against the possibility of overflow

Hatton, Les

447

GEOPHYSICAL WELL LOG/CORE DESCRIPTIONS, CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH, AND LITTLE UTE AND SLEEPING UTE FIELDS, MONTEZUMA COUNTY, COLORADO  

SciTech Connect (OSTI)

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby; Laura L. Wray

2003-12-01T23:59:59.000Z

448

CROSS SECTIONS AND FIELD MAPS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH, AND LITTLE UTE AND SLEEPING UTE FIELDS, MONTEZUMA COUNTY, COLORADO  

SciTech Connect (OSTI)

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; Craig D. Morgan; Kevin McClure; David E. Eby; Laura L. Wray

2003-12-01T23:59:59.000Z

449

POROSITY/PERMEABILITY CROSS-PLOTS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH, AND LITTLE UTE AND SLEEPING UTE FIELDS, MONTEZUMA COUNTY, COLORADO  

SciTech Connect (OSTI)

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby; Laura L. Wray

2003-12-01T23:59:59.000Z

450

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

SciTech Connect (OSTI)

This paper presents an overview of the International Energy Agency Solar Heating and Cooling Task 34 and Energy Conservation in Buildings and Community Systems Annex 43.

Judkoff, R.; Neymark, J.

2009-06-01T23:59:59.000Z

451

The Monthly installmentOctober 2014, Volume 10(4) The common bed bug has long been a pest feeding on  

E-Print Network [OSTI]

or all of these signs and symptoms: Fever or feeling feverish/chills Cough Sore throat Runny or stuffy with the flu cough, sneeze or talk. Droplets can land in the mouths or noses of people who are nearby. Less o

Portman, Douglas

452

Damage assessment and sampling of the rice stink bug, Oebalus pugnax (Fabricius) (Hemiptera: Pentatomidae), in rice, Oryza sativa L., in Texas  

E-Print Network [OSTI]

Field and greenhouse experiments were conducted from 2003 to 2006 at the Texas A&M University Agricultural Research and Extension Center at Beaumont and commercial rice fields throughout the Texas Rice Belt with the objectives of characterizing...

Vargas, Luis Espino

2009-06-02T23:59:59.000Z

453

Bedbugs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bedbugs Bedbugs Nature Bulletin No. 487-A March 31, 1973 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation BEDBUGS The name "bug" frequently and carelessly applied to insects in general, really belongs only to certain special kinds. A true bug differs from other insects in having a beak with which it pierces the skin and sucks the juices from plants or animals, a characteristic odor, and peculiar wings. Further, instead of having four stages in its life history -- egg, larva, pupa and adult -- it has only three. The tiny young, or "nymphs", resemble their parents as soon as hatched from the egg. The water bugs, stink bugs, squash bug, chinch bug, boxelder bug -- and that hated blood-sucking parasite, the Bedbug -- are true bugs.

454

Managing Insects and Mite Pests of Texas Sorghum  

E-Print Network [OSTI]

Chinch bug .....................................................................16 Corn earworm and fall armyworm (whorlworms) .......17 Banks grass mite ...........................................................18 GRAIN HEAD INSECT PESTS... .......................................................19 Sorghum midge ............................................................19 Corn earworm and fall armyworm (headworms) ........22 Sorghum webworm ........................................................24 Grain head-feeding bugs...

Cronholm, Gregory B.; Knutson, Allen E.; Parker, Roy D.; Pendleton, Bonnie

2007-06-20T23:59:59.000Z

455

V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...  

Broader source: Energy.gov (indexed) [DOE]

Qpid Bug Lets Certain Remote Users Bypass Authentication T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0...

456

CS 201 Lab: Debugging 1 The PDB debugger  

E-Print Network [OSTI]

subtle and surreptitious bugs into your code that might be hard to find. Perhaps you might make inserting

Musicant, Dave

457

Hidden Costs of Graphical User Interfaces: Failure to Make the Transition from Menus and Icon  

E-Print Network [OSTI]

Hidden Costs of Graphical User Interfaces: Failure to Make the Transition from Menus and Icon of Psychology Rice University Graphical interfaces allow users to issue commands using pull-down menus, icon toolbars, and keyboard shortcuts. Menus and icon toolbars are easier to learn, whereas keyboard shortcuts

Lane, David

458

Investigating the effectiveness of tactile feedback for mobile touchscreens  

Science Journals Connector (OSTI)

This paper presents a study of finger-based text entry for mobile devices with touchscreens. Many devices are now coming to market that have no physical keyboards (the Apple iPhone being a very popular example). Touchscreen keyboards lack any tactile ... Keywords: fingertip interaction, mobile interaction, multimodal interaction, tactile feedback, touchscreens

Eve Hoggan; Stephen A. Brewster; Jody Johnston

2008-04-01T23:59:59.000Z

459

HortTips NewsletterVol. 2, No. 3 Welcome to our new newsletter for current issues in the landscape and garden. This newsletter is aimed  

E-Print Network [OSTI]

out for in your landscape Wheel bug chowing down on a Japanese beetle. At least something is eating them. Wheel bug on the hunt for lunch Assassin bug nymph...good guy! Scoliid wasp, a parasite of white! Cute spider! Syrphid fly is a good fly Sand wasp digging on a ball field. It is a predator of stink

Hill, Wendell T.

460

Virtuous Cycle Cycles of activity and software projects  

E-Print Network [OSTI]

Inspection #12;Programming Cycle - single bug Selected Bug Shared Code Fix Bug Continuous Integration ~8 cycle cvscheck compilation style checking testing javadocs documentation jumble quality of unit testing #12;NetValue Development cvscheck - Source Code Control and Build Shared Centralized Automatic

Pfahringer, Bernhard

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Codetrail: Connecting Source Code and Web Resources Max Goldman and Robert C. Miller  

E-Print Network [OSTI]

-accessible interfaces for a development team's own bug database or version control, there is no one way to characterize-ins for integrating with version control systems, bug databases, and many other tools. But integration with web for documentation, examples, bug fixes, error descriptions, code snippets, workarounds, templates, patterns

Reuter, Martin

462

Universitätsadresse  

E-Print Network [OSTI]

Herausgeber: Verantwortlich: Datenbasis Dateanufbereitung, Satz und Layout: Präsident der Johannes Gutenberg-Universität Mainz

Johannes Gutenberg-universität Mainz; D- Mainz; Besucheranschriften Siehe Jeweilige Einzelinstitution

463

FINAL PROJECT REPORT LOAD MODELING TRANSMISSION RESEARCH  

E-Print Network [OSTI]

commercial building energy use and cost analysis. With input of building layout, construction types, space usage,

Lesieutre, Bernard

2013-01-01T23:59:59.000Z

464

Generated using V3.0 of the official AMS LATEX templatejournal page layout FOR AUTHOR USE ONLY, NOT FOR SUBMISSION! An exact thickness-weighted average formulation of the Boussinesq equations  

E-Print Network [OSTI]

, NOT FOR SUBMISSION! An exact thickness-weighted average formulation of the Boussinesq equations William R. Young. ABSTRACT We show that a systematic application of thickness-weighted averaging to the Boussinesq equations

Young, William R.

466

Zevenhoven & Kilpinen CROSS EFFECTS, TOTAL SYSTEM LAY-OUT 13.6.2001 10-1 Figure 10.1 Typical pulverised coal combustion and gas clean-up system: dry scrubber +  

E-Print Network [OSTI]

pulverised coal combustion and gas clean-up system: dry scrubber + baghouse filter for SO2 and particulate For a conventional pulverised coal-fired power plant a set-up is shown in Figure 10.1, with a gas clean-up system scrubber (pH ~ 6) 60 - 70 7 Re-heater 350 - 400 8 SCR DeNOx 300 - 400 9 Active coke bed 100 - 150 Figure 10

Zevenhoven, Ron

467

Generated using V3.1.2 of the official AMS LATEX templatejournal page layout FOR AUTHOR USE ONLY, NOT FOR SUBMISSION! Hadley circulation response to orbital precession. Part I: Aquaplanets  

E-Print Network [OSTI]

, NOT FOR SUBMISSION! Hadley circulation response to orbital precession. Part I: Aquaplanets Timothy M. Merlis-mean Hadley circulation to orbital precession is examined in an idealized atmospheric general circulation Hadley circulation is weaker when perihelion occurs at the summer solstice than when aphelion occurs

Heaton, Thomas H.

468

Generated using V3.1.2 of the official AMS LATEX templatejournal page layout FOR AUTHOR USE ONLY, NOT FOR SUBMISSION! Hadley circulation response to orbital precession. Part II: Subtropical continent  

E-Print Network [OSTI]

, NOT FOR SUBMISSION! Hadley circulation response to orbital precession. Part II: Subtropical continent Timothy M and annual-mean Hadley circulation to orbital precession is examined in an idealized atmospheric general precession does not affect annual-mean insolation, the annual-mean Hadley circulation does respond to orbital

Heaton, Thomas H.

469

Generated using V3.1.2 of the official AMS LATEX templatejournal page layout FOR AUTHOR USE ONLY, NOT FOR SUBMISSION! Quantifying uncertainty for climate change and long range forecasting scenarios with  

E-Print Network [OSTI]

of a turbulent tracer with a mean gradient with the background turbulent field velocity generated by the first of contemporary climate science. An impor-14 tant feature of all the current computer Atmosphere Ocean15 Science of understanding of the underlying19 physical processes or the limitations of computing power20 with the necessary

Majda, Andrew J.

470

Mechanisms of Performance Enhancement With Force Feedback Christopher R. Wagner Robert D. Howe  

E-Print Network [OSTI]

by the instrument and to reduce unwanted motions that exceed a force threshold [3]. Virtual environments have also or the interface mechanism. Finger and wrist impedance models have been developed to examine keyboard design [6

471

Design and implementation of a universal controller  

E-Print Network [OSTI]

control programs which are developed using our hardware-in-the-loop personal computer CAD facility. The system also has a keyboard and an LCD display module for system operation monitoring....

Wei, Xiaoyan

2012-06-07T23:59:59.000Z

472

Training Room Equipment Instructions Projector and TV Display  

E-Print Network [OSTI]

Training Room Equipment Instructions Projector and TV Display The control panel on the wall are connected to a training room computer and room is equipped with a keyboard, mouse and clicker. Connect USB

Crawford, T. Daniel

473

Investigating the Design and Development of Multitouch Applications  

E-Print Network [OSTI]

developer.apple.com/technologies/ios. [7] Autodesk. Maya.www.autodesk.com/. [8] Autodesk. SketchBook Pro. http://keyboard interface such as Autodesk Maya [7]. Although ad-

Kin, Kenrick

2012-01-01T23:59:59.000Z

474

MSU Recycling recycle.msu.edu 517-355-1723 MARCH 15, 2014 9:00A.M.1:00P.M.  

E-Print Network [OSTI]

ELECTRONICS Computers (All Parts) Mice Keyboards Laptops All Types of External Drives CRT Monitors LCD Makers Fryers Toaster Ovens Electric Knives Electric Razors/Trimmers Hair Dryers Electric Toothbrushes

Liu, Taosheng

475

SECURING UNFAMILAR SYSTEM ENTRY POINTS AGAINST FAULTY USER AUTHENTICATION VIA  

E-Print Network [OSTI]

of electromagnetic interference produced by these circuits. Furthermore, this paper outlines a novel approach to user the electromagnetic interference produced by the keyboard device, making it considerably harder to isolate

Thornton, Mitchell

476

House Matters: A Novel  

E-Print Network [OSTI]

the PC. Dozens of opened Coke cans surround the keyboard andfull ashtrays. “You want a Coke? ” he says, reaching into ahis mom enters with a tray of Cokes and glasses. “You boys

Pappas, Scott

2012-01-01T23:59:59.000Z

477

Prof. Dr. Fumiya Iida Bachelor-Thesis  

E-Print Network [OSTI]

. . . . . . . . 29 A.2 MATLAB-code for the FFT and resonance frequency . . . . . . . . . 30 A.3 Arduino-code for controlling the robot with the keyboard . . . . . 35 B.2 Arduino-code for controlling the robot

Daraio, Chiara

478

Review of the Apollo Testbed Project Massoud Pedram  

E-Print Network [OSTI]

#12;BitsyX Platform (cont'd) Power consumption Running mode (9.4W) ! PXA255 processor core in turbo keyboard, USB mouse, touch screen Note Not expandable Expandable using PCI bus Power consumption 9.4W

Pedram, Massoud

479

Data Entry  

Science Journals Connector (OSTI)

Data entry is the process of entering data into a computerized or spreadsheet. Data entry can be performed by an individual typing at a keyboard or by a machine entering data electronically.

2008-01-01T23:59:59.000Z

480

Project Year Project Team  

E-Print Network [OSTI]

; Ian Sims, Student, Electrical and Computer Engineering, Whiting School of Engineering Project Title and Jazz Theory/Keyboard I & II. Technologies Used Digital Audio, Digital Video, Graphic Design, HTML

Gray, Jeffrey J.

Note: This page contains sample records for the topic "keyboard layout bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Identity verification by keystroke timing  

E-Print Network [OSTI]

Special Publication 500-23 (June). U. S. Government Printing Office, Washington D. C. 30 Shapiro, N. 1984. Personal communication with Dave Umphress. Spillane, R. J. 1975. Keyboard apparatus for personal identification. IBM Technical Disclosure... Special Publication 500-23 (June). U. S. Government Printing Office, Washington D. C. 30 Shapiro, N. 1984. Personal communication with Dave Umphress. Spillane, R. J. 1975. Keyboard apparatus for personal identification. IBM Technical Disclosure...

Usnick, Mark C.

2012-06-07T23:59:59.000Z

482

The effectiveness of sulphur when used as a diluent for certain insecticides  

E-Print Network [OSTI]

. Control of Cotton Aphids with Benzene Hexachloride- Clay and Benzene Hexachloride-Sulphur at a Medium Temperature (80-87?F.)..................... 20 IV. Control of Cotton Aphids with Benzene Hexachloride- Clay and Benzene Hexachloride-Sulphur at a Low... Milkweed Bugs with Benzene Hexa- chloride-Clay and Benzene Hexachloride-Sulphur...... J+0 XIV. Control of Large Milkweed Bugs with Chlordan-Clay and Chlordan-Sulphur................ .......... .... 4-2 XV. Control of Large Milkweed Bugs with DDT...

Hanna, Ralph Lynn

2013-10-04T23:59:59.000Z

483

G129 S129 Equipment List Windbreaker  

E-Print Network [OSTI]

(optional) Water shoes (tevas or old tennis shoes) Gaitors (optional) COURSE EQUIPMENT*: Pocket or wrist operated) Bug Spray Deck of cards, musical instrument, Frisbee, etc (optional) * Textbooks should

Polly, David

484

E-Print Network 3.0 - affetti da beta-talassemia Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mathematics 32 Modelli e Metodi per la Sicurezza delle Applicazioni Nicola Di Mauro Summary: rendono inefficaci le comuni difese I bug XSS sono facili da sfruttare...

485

California cotton growers utilize integrated pest management  

E-Print Network [OSTI]

economic thresholds in cotton. In: Frisbie RE, Adkission,the Good Bugs in Cotton: Field Guide to Predators, ParasitesInsect and Mite Pests of Cotton. Texas Agricultural

Brodt, Sonja; Goodell, Peter B.; Krebill-Prather, Rose L.; Vargas, Ron N.

2007-01-01T23:59:59.000Z

486

Lygus hesperus Knight in the Texas High Plains: Cotton compensation after fruit damage and host plant selection with implications for cotton IPM.  

E-Print Network [OSTI]

??Texas High Plains is known for its extensive cotton cultivation in the world. Considering the importance of Lygus bug as one of the insect pests… (more)

Barman, Apurba K.

2006-01-01T23:59:59.000Z

487

The California Demonstration Program for Control of PM from Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Backup Generators (BUGs) CARB Verification of Catalyzed Diesel Particulate Filters for Emergency Generator Sets Measuring "Real World" Heavy-Duty Diesel Emissions with a Mobile Lab...

488

V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Linux Kernel. REFERENCE LINKS: Secunia Advisory SA53670 Red Hat Bugzilla - Bug 968036 CVE-2013-2850 IMPACT ASSESSMENT: Medium DISCUSSION: The...

489

The California Demonstration Program for Control of PM from Diesel...  

Broader source: Energy.gov (indexed) [DOE]

for Control of PM from Diesel Backup Generators (BUGs) David R. Cocker III, Kent Johnson, John Lee, Marla Mueller, Sandip Shah, Bonnie Soriano, Bill Welch Supporting...

490

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

491

E-Print Network 3.0 - attenuata ii accumulation Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the wild tobacco Nicotiana attenuata Andre Kessler and Ian T. Baldwin Department... plant, Nicotiana attenuata, against Manduca hornworms by prior attack from the mirid bug,...

492

NNSA Nuclear Security Sites Net 18 R&D 100 Awards | National...  

National Nuclear Security Administration (NNSA)

computer tools, including defect detection tools to uncover undetected bugs, code optimization tools to maximize program performance and program transformation tools that allow...

493

Microsoft Word - Accommodates All Generation Storage Options...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(BUGs) attractive for interconnection, including methods to significantly reduce their environmental impact. 4. DER will be aggregated. For instance, wind and solar units may be...

494

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

495

SSRL Web Requests  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

pagesite Change Fix existing form or application Develop new form or application Web-ImagesGraphics Web-Flash Webserver bug - error report Login Help Details of your...

496

blog  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

upc-bug-reports Deadlock during first touch of upcalloc'd remote memory when target is in upcbarrier http:www.nersc.govuserssoftwarecompilers...

497

www.ipm.ucdavis.edu Pistachio Year-Round IPM Program  

E-Print Network [OSTI]

on air and water quality. What should you be doing during this time? Carry out dormant season sanitation for live and parasitized soft scales, paying special attention to previously infested areas. Treat ground cover before bloom for frost protection and to reduce small plant bug and false chinch bug

Ishida, Yuko

498

Examples of spectacular software failure The last three examples from Software Engineering, by Hans Van Vliet.  

E-Print Network [OSTI]

by a software bug in an energy management system sold by General Electric, according to a story on SecurityFocus. The bug meant that a computerized alarm that should have been triggered never went o#, hindering FirstEnergy Kruskal's Algorithm must compute a (i) spanning tree of (ii) minimal cost. Clarity refers to the overall

Soltys, Michael

499

Reid Rosnick/DC/USEPA/US 10/04/2011 10:22 AM  

E-Print Network [OSTI]

(my favorite has been the MBTA), and I hate to bug you about this, but I'm looking at my current with all sorts of projects (my favorite has been the MBTA), and I hate to bug you about this, but I cannot avoid the emergency projects that keep popping up (like the MBTA issue), which unfortunately

500

CADRE: Cycle-Accurate Deterministic Replay for Hardware DebuggingReplay for Hardware Debugging  

E-Print Network [OSTI]

OverheadPerformance Overhead Smruti R. Sarangi 4 #12;Design Bugs An example of a design bug in IBM G3 Power-Determinism Handling Non-Determinism in Busesg CADRE Architecture EvaluationEvaluation Space Overhead PerformanceAND L2 is being invalidated All the L2 lines might not be invalidated Two FeaturesTwo Features

Torrellas, Josep