Powered by Deep Web Technologies
Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

2

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

3

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code April 25, 2011 - 7:00am Addthis PROBLEM: A vulnerability was reported in Adobe Acrobat and Adobe Reader. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems ABSTRACT: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run

4

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Buffer Overflows and Memory Corruption 8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code November 7, 2012 - 6:00am Addthis PROBLEM: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.4.402.287 and prior for Windows and OS X; 11.2.202.243 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-24 SecurityTracker Alert ID: 1027730 CVE-2012-5274 CVE-2012-5275 CVE-2012-5276 CVE-2012-5277 CVE-2012-5278 CVE-2012-5279 CVE-2012-5280 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Adobe Flash Player. A remote user

5

V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

8: RealPlayer Buffer Overflow and Memory Corruption Error Let 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028953 RealNetworks Security Bulletin CVE-2013-4973 CVE-2013-4974 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted RMP file that, when loaded by the target user, will trigger a stack overflow and execute arbitrary code on the target system. A remote user can create a specially crafted RealMedia file that, when

6

T-625: Opera Frameset Handling Memory Corruption Vulnerability | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Opera Frameset Handling Memory Corruption Vulnerability 5: Opera Frameset Handling Memory Corruption Vulnerability T-625: Opera Frameset Handling Memory Corruption Vulnerability May 18, 2011 - 3:05pm Addthis PROBLEM: A vulnerability has been reported in Opera, which can be exploited by malicious people to compromise a user's system. PLATFORM: Opera versions prior to 11.11 ABSTRACT: The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page. reference LINKS: Secunia Advisory: SA44611 Opera Knowledge Base Opera 11.11 for Windows Opera Download Opera Mobile IMPACT ASSESSMENT: High Discussion: Framesets allow web pages to hold other pages inside them. Certain frameset constructs are not handled correctly when the page is unloaded, causing a

7

T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

22: Adobe Acrobat and Reader Unspecified Memory Corruption 22: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability May 13, 2011 - 3:25am Addthis PROBLEM: Adobe Acrobat and Reader contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. PLATFORM: Adobe Reader versions 9.4.1 and prior, versions 8.2.5 and prior, and version 10.0 Acrobat Standard and Professional versions 9.4.1 and prior and version 10.0 Acrobat Standard and Professional versions 8.2.5 and prior Acrobat Professional Extended versions 9.4.1 and prior Acrobat 3D versions 8.2.5 and prior Adobe Flash Player versions 10.2.159.1 and prior for Windows, Macintosh, Linux, and Solaris ABSTRACT: The vulnerability is due to an unspecified error in the affected software

8

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

9

U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Windows win32k.sys Memory Corruption Vulnerability 5: Microsoft Windows win32k.sys Memory Corruption Vulnerability U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability December 20, 2011 - 9:45am Addthis PROBLEM: Microsoft Windows win32k.sys Memory Corruption Vulnerability. PLATFORM: Operating System Microsoft Windows 7 ABSTRACT: Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. reference LINKS: Secunia Advisory SA47237 MS11-087:Article ID: 2639417 IMPACT ASSESSMENT: High Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page

10

T-627: Adobe Flash Player Memory Corruption | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Memory Corruption 7: Adobe Flash Player Memory Corruption T-627: Adobe Flash Player Memory Corruption May 20, 2011 - 2:50pm Addthis PROBLEM: Adobe Flash Player Memory Corruption, Denial Of Service, Execute Code PLATFORM: Windows, Mac OS X, Linux, and Solaris ABSTRACT: Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file. reference LINKS: CVE Details - CVE-2011-0627 CVE Details - Adobe Flash Player Vulnerability Statistics CVE Details - Adobe Security Vulnerabilities IMPACT ASSESSMENT: High Discussion:

11

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

12

T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Google SketchUp v8.x - '.DAE' File Memory Corruption 6: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 14, 2011 - 9:28am Addthis PROBLEM: Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. PLATFORM: Google SketchUp 8 is vulnerable; other versions may also be affected. ABSTRACT: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability reference LINKS: Vulnerability-Lab SketchUp Downloads IMPACT ASSESSMENT: Medium Discussion: A Memory Corruption vulnerability is detected on the Google s SketchUp v8.x. The vulnerability is caused by an memory corruption when processing corrupt DAE files through the filter, which could be exploited by attackers

13

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets 45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger a heap corruption error in 'vidplin.dll' and execute arbitrary code on the target system. The code will run with the

14

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

15

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

16

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

17

Evaluating operating system vulnerability to memory errors  

Science Conference Proceedings (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While ... Keywords: DRAM failures, fault-tolerance, operating systems

Kurt B. Ferreira; Kevin Pedretti; Ron Brightwell; Patrick G. Bridges; David Fiala; Frank Mueller

2012-06-01T23:59:59.000Z

18

Purify: Fast detection of memory leaks and access errors  

E-Print Network (OSTI)

This paper describes Purifyru, a software testing and quality assurance Ool that detects memory leaks and access erors. Purify inserts additional checking instructions directly into the object code produced by existing compilers. These instructions check every memory read and write performed by the program-under-test and detect several types of access errors, such as reading uninitialized memory or witing to freed memory. Purify inserts checking logic into all of the code in a program, including third-party and vendor object-code libraries, and verifies system call interfaces. In addition, Purify tracks memory usage and identifies individual memory leals using a novel adaptation of garbage collection techniques. Purify produce standard executable files compatible with existing debuggers, and currently runs on Sun Microsystems ' SPARC family of workstations. Purify's neafly-comprehensive memory access checking slows the target program down typically by less than a facor of three and has resulted in significantly more reliable software for several development goups. L.

Reed Hastings; Bob Joyce

1991-01-01T23:59:59.000Z

19

A realistic evaluation of memory hardware errors and software system susceptibility  

Science Conference Proceedings (OSTI)

Memory hardware reliability is an indispensable part of whole-system dependability. This paper presents the collection of realistic memory hardware error traces (including transient and non-transient errors) from production computer systems with more ...

Xin Li; Michael C. Huang; Kai Shen; Lingkun Chu

2010-06-01T23:59:59.000Z

20

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in Adobe AcrobatReader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30...

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

DRAM errors in the wild: a large-scale field study  

Science Conference Proceedings (OSTI)

Errors in dynamic random access memory (DRAM) are a common form of hardware failure in modern compute clusters. Failures are costly both in terms of hardware replacement costs and service disruption. While a large body of work exists on DRAM in laboratory ... Keywords: data corruption, dimm, dram, dram reliability, ecc, empirical study, hard error, large-scale systems, memory, soft error

Bianca Schroeder; Eduardo Pinheiro; Wolf-Dietrich Weber

2009-06-01T23:59:59.000Z

22

Hierarchical decoding of double error correcting codes for high speed reliable memories  

Science Conference Proceedings (OSTI)

As the technology moves into the nano-realm, traditional single-error-correcting, double-error-detecting (SEC-DED) codes are no longer sufficient for protecting memories against transient errors due to the increased multi-bit error rate. The well known ...

Zhen Wang

2013-05-01T23:59:59.000Z

23

U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: libvirt virTypedParameterArrayClear() Memory Access Error 3: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service August 24, 2012 - 7:00am Addthis PROBLEM: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service PLATFORM: Version(s): 0.9.13 and prior ABSTRACT: A vulnerability was reported in libvirt. reference LINKS: libvirt SecurityTracker Alert ID: 1027437 Secunia Advisory SA50118 Bugtraq ID: 54748 CVE-2012-3445 IMPACT ASSESSMENT: Medium Discussion A remote user can send a specially crafted RPC call with the number of parameters set to zero to libvirtd to trigger a memory access error in virTypedParameterArrayClear() and cause the target service to crash. Impact:

24

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

25

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

26

Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing  

SciTech Connect

Faults have become the norm rather than the exception for high-end computing on clusters with 10s/100s of thousands of cores. Exacerbating this situation, some of these faults remain undetected, manifesting themselves as silent errors that corrupt memory while applications continue to operate and report incorrect results. This paper studies the potential for redundancy to both detect and correct soft errors in MPI message-passing applications. Our study investigates the challenges inherent to detecting soft errors within MPI application while providing transparent MPI redundancy. By assuming a model wherein corruption in application data manifests itself by producing differing MPI message data between replicas, we study the best suited protocols for detecting and correcting MPI data that is the result of corruption. To experimentally validate our proposed detection and correction protocols, we introduce RedMPI, an MPI library which resides in the MPI profiling layer. RedMPI is capable of both online detection and correction of soft errors that occur in MPI applications without requiring any modifications to the application source by utilizing either double or triple redundancy. Our results indicate that our most efficient consistency protocol can successfully protect applications experiencing even high rates of silent data corruption with runtime overheads between 0% and 30% as compared to unprotected applications without redundancy. Using our fault injector within RedMPI, we observe that even a single soft error can have profound effects on running applications, causing a cascading pattern of corruption in most cases causes that spreads to all other processes. RedMPI's protection has been shown to successfully mitigate the effects of soft errors while allowing applications to complete with correct results even in the face of errors.

Fiala, David J [ORNL; Mueller, Frank [North Carolina State University; Engelmann, Christian [ORNL; Ferreira, Kurt Brian [Sandia National Laboratories (SNL); Brightwell, Ron [Sandia National Laboratories (SNL); Riesen, Rolf [IBM Research, Ireland

2012-07-01T23:59:59.000Z

27

Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing  

SciTech Connect

Faults have become the norm rather than the exception for high-end computing on clusters with 10s/100s of thousands of cores. Exacerbating this situation, some of these faults remain undetected, manifesting themselves as silent errors that corrupt memory while applications continue to operate and report incorrect results. This paper studies the potential for redundancy to both detect and correct soft errors in MPI message-passing applications. Our study investigates the challenges inherent to detecting soft errors within MPI application while providing transparent MPI redundancy. By assuming a model wherein corruption in application data manifests itself by producing differing MPI message data between replicas, we study the best suited protocols for detecting and correcting MPI data that is the result of corruption. To experimentally validate our proposed detection and correction protocols, we introduce RedMPI, an MPI library which resides in the MPI profiling layer. RedMPI is capable of both online detection and correction of soft errors that occur in MPI applications without requiring any modifications to the application source by utilizing either double or triple redundancy. Our results indicate that our most efficient consistency protocol can successfully protect applications experiencing even high rates of silent data corruption with runtime overheads between 0% and 30% as compared to unprotected applications without redundancy. Using our fault injector within RedMPI, we observe that even a single soft error can have profound effects on running applications, causing a cascading pattern of corruption in most cases causes that spreads to all other processes. RedMPI's protection has been shown to successfully mitigate the effects of soft errors while allowing applications to complete with correct results even in the face of errors.

Fiala, David J [ORNL; Mueller, Frank [North Carolina State University; Engelmann, Christian [ORNL; Ferreira, Kurt Brian [Sandia National Laboratories (SNL); Brightwell, Ron [Sandia National Laboratories (SNL); Riesen, Rolf [IBM Research, Ireland

2013-01-01T23:59:59.000Z

28

Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing  

SciTech Connect

Faults have become the norm rather than the exception for high-end computing on clusters with 10s/100s of thousands of cores. Exacerbating this situation, some of these faults remain undetected, manifesting themselves as silent errors that corrupt memory while applications continue to operate and report incorrect results. This paper studies the potential for redundancy to both detect and correct soft errors in MPI message-passing applications. Our study investigates the challenges inherent to detecting soft errors within MPI application while providing transparent MPI redundancy. By assuming a model wherein corruption in application data manifests itself by producing differing MPI message data between replicas, we study the best suited protocols for detecting and correcting MPI data that is the result of corruption. To experimentally validate our proposed detection and correction protocols, we introduce RedMPI, an MPI library which resides in the MPI profiling layer. RedMPI is capable of both online detection and correction of soft errors that occur in MPI applications without requiring any modifications to the application source by utilizing either double or triple redundancy. Our results indicate that our most efficient consistency protocol can successfully protect applications experiencing even high rates of silent data corruption with runtime overheads between 0% and 30% as compared to unprotected applications without redundancy. Using our fault injector within RedMPI, we observe that even a single soft error can have profound effects on running applications, causing a cascading pattern of corruption in most cases causes that spreads to all other processes. RedMPI's protection has been shown to successfully mitigate the effects of soft errors while allowing applications to complete with correct results even in the face of errors.

Fiala, David J [ORNL; Mueller, Frank [North Carolina State University; Engelmann, Christian [ORNL; Ferreira, Kurt Brian [Sandia National Laboratories (SNL); Brightwell, Ron [Sandia National Laboratories (SNL); Riesen, Rolf [IBM Research, Ireland

2012-07-01T23:59:59.000Z

29

Corruption in Developing Countries  

E-Print Network (OSTI)

Recent years have seen a remarkable expansion in economists' ability to measure corruption. This in turn has led to a new generation of well-identified, microeconomic studies. We review the evidence on corruption in ...

Olken, Benjamin A.

30

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets 4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service May 17, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in Novell eDirectory. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HP/UX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user can cause denial of service conditions. reference LINKS: Novell eDirectory - LDAP-SSL SECURELIST.ORG SecurityFocus BugTrackID: 47858 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Novell eDirectory. A remote user can cause

31

Logic and Memory Design Based on Unequal Error Protection for Voltage-scalable, Robust and Adaptive DSP Systems  

Science Conference Proceedings (OSTI)

In this paper, we propose a system level design approach considering voltage over-scaling (VOS) that achieves error resiliency using unequal error protection of different computation elements, while incurring minor quality degradation. Depending on user ... Keywords: Low power, Memory design, Supply voltage scaling, Variation aware design

Georgios Karakonstantis; Debabrata Mohapatra; Kaushik Roy

2012-09-01T23:59:59.000Z

32

Corruption: A Psychosocial Issue  

E-Print Network (OSTI)

". in Kathmandu Post antlpur Publications, PVI. Lid., Kantipur Complex' Subhldhanagar, Kathmandu, Nepal. ' James, G.S. (19:'9). "The eglect of GrOWing Povel1y Poses a Global Threal. III The Imernational Herald, P.6. Mansukhanl, H.L. (1979). "Corruption and Public...

Upadhyay, Niranjan Prasad

2003-01-01T23:59:59.000Z

33

Corruption and Sustainable Development  

E-Print Network (OSTI)

investments. He reports that an increase in the (perceived) corruption level from that of Singapore to that of Mexico would have the same negative effect on inward foreign direct investment as raising the tax rate on foreign investment by fifty percentage... . It is used to account for energy depletion, mineral depletion, and net forest depletion by subtracting an estimate of the relevant resource rents from net national savings. These rents are calculated as the market price of the resource minus average...

Aidt, Toke S.

34

Linking Error, Passage of Time, the Cerebellum and the Primary Motor Cortex to the Multiple Timescales of Motor Memory By  

E-Print Network (OSTI)

Recently, our laboratory proposed that a single model could account for a large body of behavioral data in numerous motor adaptation paradigms. The idea was that motor memory is supported by at least two interacting processes: a fast process that learns quickly from motor error but rapidly forgets, and a slow process that only gradually learns from error but has long-term retention. The main purpose of this research is to uncover the time and error-dependent properties of these putative processes and to ask whether there is a link between these processes and the functions of the cerebellum and primary motor cortex. How does passage of time affect retention of motor memories? The typical approach is to learn a task, and then look at retention as a function of time. However, if motor memories are supported by multiple processes, then a better way to reveal their timescales is to adapt, reverse adapt, and then quantify retention. The prediction of our theory is that there should be spontaneous recovery of the initial adaptation with passage of time. Because theory predicts that reverse adaptation will primarily engage the fast

Sarah Hemminger; Sarah Hemminger

2010-01-01T23:59:59.000Z

35

Corruption, Institutions and Economic Development  

E-Print Network (OSTI)

in your line of business to have to pay some irregular, addition payments to get things done" would waste less time on such dealing than other managers. Kaufmann and Wei (1999) report that the opposite is, in fact, true! Along similar lines, Fisman... ))] 6 Conclusion Does corruption, then, sand or grease the wheels? While corruption in a very narrow sense can be seen as a lubricator that may speed things up and help entrepreneurs getting on with wealth creation in speci?c instances, in a broader...

Aidt, Toke S

36

A Tunable, Software-based DRAM Error Detection and Correction Library for HPC  

Science Conference Proceedings (OSTI)

Proposed exascale systems will present a number of considerable resiliency challenges. In particular, DRAM soft-errors, or bit-flips, are expected to greatly increase due to the increased memory density of these systems. Current hardware-based fault-tolerance methods will be unsuitable for addressing the expected soft error frequency rate. As a result, additional software will be needed to address this challenge. In this paper we introduce LIBSDC, a tunable, transparent silent data corruption detection and correction library for HPC applications. LIBSDC provides comprehensive SDC protection for program memory by implementing on-demand page integrity verification. Experimental benchmarks with Mantevo HPCCG show that once tuned, LIBSDC is able to achieve SDC protection with 50\\% overhead of resources, less than the 100\\% needed for double modular redundancy.

Fiala, David J [ORNL; Ferreira, Kurt Brian [Sandia National Laboratories (SNL); Mueller, Frank [North Carolina State University; Engelmann, Christian [ORNL

2012-01-01T23:59:59.000Z

37

Uncovering errors: the cost of detecting silent data corruption  

Science Conference Proceedings (OSTI)

Data integrity is pivotal to the usefulness of any storage system. It ensures that the data stored is free from any modification throughout its existence on the storage medium. Hash functions such as cyclic redundancy checks or check-sums are frequently ... Keywords: cyclic redundancy checks, data integrity, parallel file systems

Sumit Narayan; John A. Chandy; Samuel Lang; Philip Carns; Robert Ross

2009-11-01T23:59:59.000Z

38

When Crime Pays: Measuring Judicial Efficacy against Corruption in Brazil  

E-Print Network (OSTI)

for now - crime pays in Brazil. Paginal5de27 ReferencesEfficacy against Corruption in Brazil Carlos Higino Ribeiroa widespread perception in Brazil that civil servants caught

Ribeiro de Alencar, Carlos Higino; Gico, Ivo Jr.

2010-01-01T23:59:59.000Z

39

Tolerating memory leaks  

Science Conference Proceedings (OSTI)

Type safety and garbage collection in managed languages eliminate memory errors such as dangling pointers, double frees, and leaks of unreachable objects. Unfortunately, a program still leaks memory if it maintains references to objects it will never ... Keywords: bug tolerance, managed languages, memory leaks

Michael D. Bond; Kathryn S. McKinley

2008-10-01T23:59:59.000Z

40

Reconstruction of ECG signals in presence of corruption  

E-Print Network (OSTI)

We present an approach to identifying and reconstructing corrupted regions in a multi-parameter physiological signal. The method, which uses information in correlated signals, is specifically designed to preserve clinically ...

Ganeshapillai, Gartheeban

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Memory Usage Considerations on Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Memory Usage Considerations on Hopper Most Hopper compute nodes have 32 GB of physical memory, but, not all that memory is available to user programs. Compute Node Linux (the kernel), the Lustre file system software, and message passing library buffers all consume memory, as does loading the executable into memory. Thus the precise memory available to an application varies. Approximately 31 GB of memory can be allocated from within an MPI program using all 24 cores per node, i.e., 1.29 GB per MPI task on average. If an application uses 12 MPI tasks per node, then each MPI task could use about 2.58 GB of memory. You may see an error message such as "OOM killer terminated this process." "OOM" means Out of Memory and it means that your code has exhausted the

42

Effect of Corruption on Tax Revenues in the Middle East  

E-Print Network (OSTI)

This Working Paper should not be reported as representing the views of the IMF. The views expressed in this Working Paper are those of the authors and do not necessarily represent those of the IMF or IMF policy. Working Papers describe research in progress by the authors and are published to elicit comments and to further debate. This study estimates the impact of corruption on the revenue-generating capacity of different tax categories in the Middle East. We find that the low revenue collection as a share of GDP there compared to other middle-income regions is due in part to corruption, and certain taxes are more affected than others. Taxes that require frequent interaction between the tax authority and individuals, such as taxes on international trade, seem to be more affected by corruption than most other types of taxation. This suggests that if governments need to raise more tax revenues in a way that minimizes distortions and maximizes social welfare, they should implement reforms that either reduce corruption or raise revenues from tax categories that are less susceptible to corruption. Possible reforms of the revenue system and

Patrick A. Imam; Davina F. Jacobs; International Monetary; Fund Wp; Prepared Patrick; A. Imam; Davina F. Jacobs; Thanos Catsambas

2007-01-01T23:59:59.000Z

43

Corruption and energy efficiency in OECD countries: Theory and evidence  

E-Print Network (OSTI)

We investigate the effect of corruption and industry sector size on energy policy outcomes. The main predictions of our theory are that: (i) greater corruptibility of policy makers reduces energy policy stringency; (ii) greater lobby group coordination costs (increased industry sector size) results in more stringent energy policy; and (iii) workers ’ and capital owners ’ lobbying efforts on energy policy are negatively related. These predictions are tested using a unique panel data set on the energy intensity of 11 sectors in 14 OECD countries for years 1982-1996. The evidence generally supports the predictions.

Per G. Fredriksson; Herman R. J. Vollebergh; Elbert Dijkgraaf

2004-01-01T23:59:59.000Z

44

EIA - Sorry! Unexpected Error  

Annual Energy Outlook 2012 (EIA)

Cold Fusion Error Unexpected Error Sorry An error was encountered. This error could be due to scheduled maintenance. Information about the error has been routed to the appropriate...

45

EIA - Sorry! Unexpected Error  

U.S. Energy Information Administration (EIA)

Home > Cold Fusion Error: Unexpected Error Sorry! An error was encountered. This error could be due to scheduled maintenance. Information about the error has ...

46

EIA - Sorry! Unexpected Error  

Annual Energy Outlook 2012 (EIA)

Home > Cold Fusion Error Unexpected Error Sorry An error was encountered. This error could be due to scheduled maintenance. Information about the error has been routed to the...

47

Cultural attitudes to corruption : a perspective on the interplay between cultural and legal norms for Western businesses operating in China  

E-Print Network (OSTI)

Corruption is an important challenge facing those who wish to do business in China. Beyond the commercial context, corruption and attitudes towards it are also more broadly relevant to politics, political economics and ...

Winters, Timothy (Timothy Mark)

2013-01-01T23:59:59.000Z

48

The pros and cons of corruption of firm performance : a micro-level study of businesses in Indonesia  

E-Print Network (OSTI)

Over the past 10 years, different international organization and NGO's have given birth to a whole host of different anti corruption programs in response to the recent "endemic" of corruption which is seen to plague ...

Murdaya, Karuna

2005-01-01T23:59:59.000Z

49

Does Competition for Capital Discipline Governments? Decentralization, Globalization and Corruption  

E-Print Network (OSTI)

Many political economists believe that competition among countries—or regions within them—to attract mobile capital should discipline their governments, rendering them less corrupt and more friendly toward business. This argument surfaces repeatedly in debates over both political decentralization and globalization. We argue that it is based on an assumption— countries or regions start out identical—that is quite unrealistic. We reexamine the standard model that predicts a disciplining effect of capital mobility, and show that if units are sufficiently heterogeneous exactly the opposite prediction often follows. If some units are exogenously much more attractive to investors than others (and competition for capital is intense), the only equilibrium under capital mobility will involve polarization. Initially disadvantaged units will actually be more corrupt, more starved of capital, and slower to grow if capital is mobile than if it is not. By contrast, exogenously attractive units will do more to woo investors, suck capital out of their lower productivity counterparts, and grow faster. We suggest this may help explain the disappointing results of liberalizing capital flows within the Russian federation and in sub-Saharan Africa.

Hongbin Cai A; Daniel Treisman B

2002-01-01T23:59:59.000Z

50

A Small City's Big Scandal: Municipal Corruption, Progressive Reform, and the Grand Rapids, Michigan Water Scandal, 1900-1906.  

E-Print Network (OSTI)

??At the turn of century the city of Grand Rapids, Michigan began debating plans for expanding its water supply. These debates quickly spawned corrupt dealings,… (more)

Sarnacki, Brian F.

2011-01-01T23:59:59.000Z

51

Soft Error Vulnerability of Iterative Linear Algebra Methods  

Science Conference Proceedings (OSTI)

Devices become increasingly vulnerable to soft errors as their feature sizes shrink. Previously, soft errors primarily caused problems for space and high-atmospheric computing applications. Modern architectures now use features so small at sufficiently low voltages that soft errors are becoming significant even at terrestrial altitudes. The soft error vulnerability of iterative linear algebra methods, which many scientific applications use, is a critical aspect of the overall application vulnerability. These methods are often considered invulnerable to many soft errors because they converge from an imprecise solution to a precise one. However, we show that iterative methods can be vulnerable to soft errors, with a high rate of silent data corruptions. We quantify this vulnerability, with algorithms generating up to 8.5% erroneous results when subjected to a single bit-flip. Further, we show that detecting soft errors in an iterative method depends on its detailed convergence properties and requires more complex mechanisms than simply checking the residual. Finally, we explore inexpensive techniques to tolerate soft errors in these methods.

Bronevetsky, G; de Supinski, B

2007-12-15T23:59:59.000Z

52

Examining the relationships among e-government maturity, corruption, economic prosperity and environmental degradation: A cross-country analysis  

Science Conference Proceedings (OSTI)

There is growing interest in the role and contribution of e-government to the levels of corruption, economic prosperity and environmental degradation of nation states. In this paper, we use publicly available archival data to explore the relationships ... Keywords: Archival data, Corruption, E-government maturity, Economic prosperity, Environmental degradation

Satish Krishnan, Thompson S. H. Teo, Vivien K. G. Lim

2013-12-01T23:59:59.000Z

53

Understanding the Impact of Power Loss on Flash Memory Hung-Wei Tseng Laura M. Grupp Steven Swanson  

E-Print Network (OSTI)

and interrupted the power to see which intermediate states the cell passes through. We consider four transitions the transition of cell states from 00 to 10. 4.1.2 Retroactive data corruption The unpredictable effect of power power failure does not always reduce error rates and that a power failure during a program operation can

Simunic, Tajana

54

The Dynamic Effects of Information on Political Corruption: Theory and Evidence from Puerto Rico *  

E-Print Network (OSTI)

Abstract: Does the disclosure of information about corrupt activities induce a sustained reduction in corruption? We use publicly released routine audits of municipal governments in Puerto Rico to answer this question. We first develop a political agency model where voters re-elect incumbents based on their performance while in office. We show that, because voters cannot directly observe incumbents ’ actions, an incumbent whose reputation improved in the previous term is likely to engage in more rent-seeking activities in a future term. Guided by this model, we use longitudinal data on audit results to examine the long-term consequences of providing information to voters on levels of political corruption. We find that municipal corruption levels in subsequent audits are on average the same in municipalities audited preceding the previous election and those not audited then. In spite of this, mayors in municipalities audited preceding the previous election have higher re-election rates, suggesting that audits enable voters to select more competent politicians. We conclude that short-term information dissemination policies do not necessarily align politicians ’ long-term actions with voter preferences as politicians exploit their reputational gains by extracting more rents from office.

Gustavo J. Bobonis; Luis R. Cámara Fuertes; Rainer Schwabe; Leo Feler; Fred Finan; Steven Haider; Anke Kessler; Monica Martínez-bravo; Ben Nyblade; Torsten Persson

2011-01-01T23:59:59.000Z

55

Distortion Representation of Forecast Errors  

Science Conference Proceedings (OSTI)

Forecast error is decomposed into three components, termed displacement error, amplitude error, mid residual error, respectively. Displacement error measures how much of the forecast error can be accounted for by moving the forecast to best fit ...

Ross N. Hoffman; Zheng Liu; Jean-Francois Louis; Christopher Grassoti

1995-09-01T23:59:59.000Z

56

A memory mapping approach for network and controller optimization in parallel interleaver architectures  

Science Conference Proceedings (OSTI)

Recent communication standards and storage systems uses parallel architectures for error correcting codes (LDPC or Turbo-codes) to reliably transfer data between two equipments. However, parallel architectures suffer from memory access conflicts. In ... Keywords: interleavers, memory mapping, parallel architectures

Aroua Briki; Cyrille Chavet; Philippe Coussy

2013-05-01T23:59:59.000Z

57

Cue effectiveness in mitigating postcompletion errors in a routine procedural task  

Science Conference Proceedings (OSTI)

Postcompletion errors, which are omissions of actions required after the completion of a task's main goal, occur in a variety of everyday procedural tasks. Previous research has demonstrated the difficulty of reducing their frequency by means other than ... Keywords: ACT-R, Cognitive architecture, Error intervention, Error mitigation, Goal memory, Human error, Interface design, Modeling, Postcompletion error, Routine procedural task, Visual attention, Visual cue, Visual salience

Phillip H. Chung; Michael D. Byrne

2008-04-01T23:59:59.000Z

58

G20 Anti-Corruption Action Plan Action Point 7: Protection of Whistleblowers  

E-Print Network (OSTI)

whistleblowers as one of the high priority areas in their global anticorruption agenda. Recognizing the importance of effective whistleblower protection laws, Leaders, in point 7 of the G20 Anti-Corruption Action Plan, called on G20 countries to lead by: To protect from discriminatory and retaliatory actions whistleblowers who report in good faith suspected acts of corruption, G-20 countries will enact and implement whistleblower protection rules by the end of 2012. To that end, building upon the existing work of organisations such as the OECD and the World Bank, G-20 experts will study and summarise existing whistleblower protection legislation and enforcement mechanisms, and propose best practices on whistleblower protection legislation. The G20 Anti-Corruption Working Group (AWG), in charge of carrying out the Action Plan assigned the OECD the task of preparing a concept note with proposals to implement this point. Following a discussion of the concept note at their meeting on 25-26 February 2010 in Paris, the G20 Members reiterated the value of a study of the main features of whistleblower protection frameworks currently in place in G20 countries, together with guiding principles and best

unknown authors

2010-01-01T23:59:59.000Z

59

Error detection method  

DOE Patents (OSTI)

An apparatus, program product, and method that run an algorithm on a hardware based processor, generate a hardware error as a result of running the algorithm, generate an algorithm output for the algorithm, compare the algorithm output to another output for the algorithm, and detect the hardware error from the comparison. The algorithm is designed to cause the hardware based processor to heat to a degree that increases the likelihood of hardware errors to manifest, and the hardware error is observable in the algorithm output. As such, electronic components may be sufficiently heated and/or sufficiently stressed to create better conditions for generating hardware errors, and the output of the algorithm may be compared at the end of the run to detect a hardware error that occurred anywhere during the run that may otherwise not be detected by traditional methodologies (e.g., due to cooling, insufficient heat and/or stress, etc.).

Olson, Eric J.

2013-06-11T23:59:59.000Z

60

Human Error Reduction  

Science Conference Proceedings (OSTI)

Reducing human error is recognized in the power-generation industry as a key factor in reducing safety-related events as well as improving asset availability. Achieving a sustainable culture change that leads to human error reduction in plant operations and maintenance remains a significant challenge to the industry. This report presents a behavior-based approach to human performance improvement and error reduction. The report explains fundamental elements of culture change and describes proven practices...

2010-12-23T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Video Signal Error Concealment  

Science Conference Proceedings (OSTI)

... the video quality in packet loss transmission environments: error ... along the direction of each detected straight line. The lines are used to divide the ...

2011-03-29T23:59:59.000Z

62

Implementation of the memory-safe full ANSI-C compiler  

Science Conference Proceedings (OSTI)

This paper describes a completely memory-safe compiler for C language programs that is fully compatible with the ANSI C specification. Programs written in C often suffer from nasty errors due to dangling pointers and buffer overflow. Such errors in Internet ... Keywords: c language, memory safety

Yutaka Oiwa

2009-06-01T23:59:59.000Z

63

Active memory operations  

Science Conference Proceedings (OSTI)

The performance of modern microprocessors is increasingly limited by their inability to hide main memory latency. The problem is worse in large-scale shared memory systems, where remote memory latencies are hundreds, and soon thousands, of processor ... Keywords: DRAM, cache coherence, distributed shared memory, memory performance, stream processing, thread synchronization

Zhen Fang; Lixin Zhang; John B. Carter; Ali Ibrahim; Michael A. Parker

2007-06-01T23:59:59.000Z

64

PROPANE: An Environment for Examining the Propagation of Errors  

E-Print Network (OSTI)

In order to produce reliable software, it is important to have knowledge on how faults and errors may affect the software. In particular, designing efficient error detection mechanisms requires not only knowledge on which types of errors to detect but also the effect these errors may have on the software as well as how they propagate through the software. This paper presents the Propagation Analysis Environment (PROPANE) which is a tool for profiling and conducting fault injection experiments on software running on desktop computers. PROPANE supports the injection of both software faults (by mutation of source code) and data errors (by manipulating variable and memory contents). PROPANE supports various error types out-of-the-box and has support for user-defined error types. For logging, probes are provided for charting the values of variables and memory areas as well as for registering events during execution of the system under test. PROPANE has a flexible design making it useful for development of a wide range of software systems, e.g., embedded software, generic software components, or user-level desktop applications. We show examples of results obtained using PROPANE and how these can guide software developers to where software error detection and recovery could increase the reliability of the software system.

Martin Hiller; Arshad Jhumka; Neeraj Suri

2002-01-01T23:59:59.000Z

65

A comparison of programming models for multiprocessors with explicitly managed memory hierarchies  

Science Conference Proceedings (OSTI)

On multiprocessors with explicitly managed memory hierarchies (EMM), software has the responsibility of moving data in and out of fast local memories. This task can be complex and error-prone even for expert programmers. Before we can allow compilers ... Keywords: cell be, explicitly managed memory hierarchies, programming models

Scott Schneider; Jae-Seung Yeom; Benjamin Rose; John C. Linford; Adrian Sandu; Dimitrios S. Nikolopoulos

2009-02-01T23:59:59.000Z

66

kMemvisor: flexible system wide memory mirroring in virtual environments  

Science Conference Proceedings (OSTI)

Today's commercial cloud service providers require the availability with an annual uptime percentage at least 99.95\\%. While memory errors become norms instead of exceptions with the increasing memory's density and capacity in cloud applications. Thus, ... Keywords: flexible memory mirroring, system-wide high availability

Bin Wang; Zhengwei Qi; Haibing Guan; Haoliang Dong; Wei Sun; Yaozu Dong

2013-06-01T23:59:59.000Z

67

A Case for Soft Error Detection and Correction in Computational Chemistry  

SciTech Connect

High performance computing platforms are expected to deliver 10(18) floating operations per second by the year 2022 through the deployment of millions of cores. Even if every core is highly reliable the sheer number of the them will mean that the mean time between failures will become so short that most applications runs will suffer at least one fault. In particular soft errors caused by intermittent incorrect behavior of the hardware are a concern as they lead to silent data corruption. In this paper we investigate the impact of soft errors on optimization algorithms using Hartree-Fock as a particular example. Optimization algorithms iteratively reduce the error in the initial guess to reach the intended solution. Therefore they may intuitively appear to be resilient to soft errors. Our results show that this is true for soft errors of small magnitudes but not for large errors. We suggest error detection and correction mechanisms for different classes of data structures. The results obtained with these mechanisms indicate that we can correct more than 95% of the soft errors at moderate increases in the computational cost.

van Dam, Hubertus JJ; Vishnu, Abhinav; De Jong, Wibe A.

2013-09-10T23:59:59.000Z

68

Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Scope, Shape memory alloys (SMA) have received widespread attention from ... The symposium focuses on shape memory and superelastic materials and their ...

69

ARDrone corruption  

Science Conference Proceedings (OSTI)

A drone is a machine which functions either by the remote control of a navigator or pilot or autonomously, that is, as a self-directing entity. Their largest use is within military applications. This machines are smaller than piloted vehicle and so are ...

Eddy Deligne

2012-05-01T23:59:59.000Z

70

Sources of Error  

Science Conference Proceedings (OSTI)

...Sources of error in damage tolerance analysis can be classified as: Uncertainty and assumptions in data input Uncertainty due to assumptions about flaws Interpretations of, and assumptions in, stress history Inaccuracies in stress intensity Computer...

71

Errors of Nonobservation  

U.S. Energy Information Administration (EIA) Indexed Site

Errors of Nonobservation Errors of Nonobservation Finally, several potential sources of nonsampling error and bias result from errors of nonobservation. The 1994 MECS represents, in terms of sampling coverage, the mail frame of the 1994 ASM or 98 percent of the manufacturing universe, which is consistent with the 1991 MECS. Unit Nonresponse Even though the MECS is a legislatively mandated survey and sampled establishments are given sufficient opportunity and time to respond, nonresponse occurs in the MECS and is accounted for in a nonresponse adjustment of sampling weights. Clearly, had these adjustments not been performed, the estimates produced from only the responding establishments would not have been representative of the target universe for the MECS. Such estimates would have been biased. Adjusting the sampling weights to

72

Memory Considerations for Carver  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Overview Carver login nodes each have 48GB of physical memory. Most compute nodes have 24GB; however, 80 compute nodes have 48GB. Not all of this memory is available to user processes. Some memory is reserved for the Linux kernel. Furthermore, since Carver nodes have no disk, the "root" file system (including /tmp) is kept in memory ("ramdisk"). The kernel and root file system combined occupy about 4GB of memory. Therefore users should try to use no more than 20GB on most compute nodes, or 44GB on the large-memory compute nodes. There are also two "extra-large" memory nodes; each node has four 8-core Intel X7550 ("Nehalem EX") 2.0 GHz processors (32 cores total) and 1TB memory. These nodes are available through the queue "reg_xlmem". Please

73

Optical memory  

DOE Patents (OSTI)

Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

Mao, Samuel S; Zhang, Yanfeng

2013-07-02T23:59:59.000Z

74

On the exploitation of the inherent error resilience of wireless systems under unreliable silicon  

Science Conference Proceedings (OSTI)

In this paper, we investigate the impact of circuit misbehavior due to parametric variations and voltage scaling on the performance of wireless communication systems. Our study reveals the inherent error resilience of such systems and argues that sufficiently ... Keywords: energy-efficiency, error-resiliency, memory failures, reliability, wireless communication systems, yield

Georgios Karakonstantis; Christoph Roth; Christian Benkeser; Andreas Burg

2012-06-01T23:59:59.000Z

75

PDSF Memory Considerations  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Interactive Nodes The amount of memory available on the interactive nodes is described on the Interactive (login) Nodes page. The interactive nodes are shared among all users and running high memory jobs on the interactive nodes slows them down for everyone. If you think your work might be disruptive you should either run it in batch or run it interactively on a batch node as described here. Batch Nodes The batch system knows how much memory each node has and how much memory each job requires. By default each job is given 1.1GB, but you can request more or less memory by following the instructions in Submitting Jobs. However, it should be noted that the more memory you require, the harder it will be for the batch system to schedule your job, especially when the

76

SoftPCM: Enhancing Energy Efficiency and Lifetime of Phase Change Memory in Video Applications via Approximate Write  

Science Conference Proceedings (OSTI)

Modern video applications such as video codecs are memory-intensive. As an emerging non-volatile memory technology, phase change memory (PCM) will benefit video applications due to its high density, low leakage power and superior scalability. However, ... Keywords: Approximate write, data-comparison write, error tolerance, PCM, write endurance

Yuntan Fang; Huawei Li; Xiaowei Li

2012-11-01T23:59:59.000Z

77

U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SMB share and repairing the installation. 4) An unspecified error within the JavaScript API can be exploited to corrupt memory. NOTE: This vulnerability affects the Macintosh and...

78

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

adobe-flash-player-buffer-overflows-and-memory-corruption-errors-let-remote-users Event Nano-High: Lawrence Berkeley National Laboratory Lecture on Bad Sugars Nano-High, a program...

79

Design error diagnosis and correction in digital circuits  

E-Print Network (OSTI)

As the design of digital systems is becoming Micrographics. increasingly complex, an undetected design error in the late phase of the design process may have catastrophic consequences. It is thus very important to discover these design errors as early as and efficient way. Simulation and tautology possible, and to correct them in a fast checking can be used for design verification. Their role is only to decide whether the design is correct or not. But when the existence of an error is detected, further mechanized help is needed to and the error correction. Though error diagnosis methods based on simulation are simple and fast, they are not considered accurate enough to be used for error correction. Symbolic methods based on Binary Decision Diagrams (BDDs) are accurate enough to be used both for diagnosis and correction, but they have limited applicability due to the memory explosion problem associated with BDDS. This work presents a simulation-based error correction procedure, which can efficiently overcome the limitations of a symbolic error correction method without sacrificing much accuracy.

Nayak, Debashis

1998-01-01T23:59:59.000Z

80

Modular error embedding  

DOE Patents (OSTI)

A method of embedding auxiliary information into the digital representation of host data containing noise in the low-order bits. The method applies to digital data representing analog signals, for example digital images. The method reduces the error introduced by other methods that replace the low-order bits with auxiliary information. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user through use of a digital key. The modular error embedding method includes a process to permute the order in which the host data values are processed. The method doubles the amount of auxiliary information that can be added to host data values, in comparison with bit-replacement methods for high bit-rate coding. The invention preserves human perception of the meaning and content of the host data, permitting the addition of auxiliary data in the amount of 50% or greater of the original host data.

Sandford, II, Maxwell T. (Los Alamos, NM); Handel, Theodore G. (Los Alamos, NM); Ettinger, J. Mark (Los Alamos, NM)

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Silicon nanocrystal memories  

Science Conference Proceedings (OSTI)

In this paper, we present an overview of memory structures fabricated by our group by using silicon nanocrystals as storage nodes. These devices show promising characteristics as candidates for future deep-submicron non-volatile memories.

S. Lombardo; B. De Salvo; C. Gerardi; T. Baron

2004-05-01T23:59:59.000Z

82

Drifting absence :: drafting memory  

E-Print Network (OSTI)

The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

Kuhn, Marlene Eva

2006-01-01T23:59:59.000Z

83

Samuel Rosen Memorial Award  

Science Conference Proceedings (OSTI)

Recognizing accomplishments in surfactant chemistry. The Samuel Rosen Memorial Award is sponsored by Milton J. Rosen. Samuel Rosen Memorial Award Membership Information achievement application award Awards distinguished division Divisions fats job

84

External Memory Algorithms  

Science Conference Proceedings (OSTI)

Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/ output communication (or I/O) between fast internal memory and slower external memory (such as disks) can be a major performance ...

Jeffrey Scott Vitter

1998-08-01T23:59:59.000Z

85

Contamination of Wind Profiler Data by Migrating Birds: Characteristics of Corrupted Data and Potential Solutions  

Science Conference Proceedings (OSTI)

Winds measured with 915- and 404-MHz wind profilers are frequently found to have nonrandom errors as large as 15 m s?1 when compared to simultaneously measured rawinsonde winds. Detailed studies of these errors which occur only at night below ...

J. M. Wilczak; R. G. Strauch; F. M. Ralph; B. L. Weber; D. A. Merritt; J. R. Jordan; D. E. Wolfe; L. K. Lewis; D. B. Wuertz; J. E. Gaynor; S. A. McLaughlin; R. R. Rogers; A. C. Riddle; T. S. Dye

1995-06-01T23:59:59.000Z

86

Tone Dependent Color Error Diffusion  

E-Print Network (OSTI)

Conventional grayscale error di#usion halftoning produces worms and other objectionable artifacts. Tone dependent error di#usion #Li and Allebach# reduces these artifacts by controlling the di#usion of quantization errors based on the input graylevel. Li and Allebach design error #lter weights and thresholds for each #input# graylevel optimized based on a human visual system #HVS# model. This paper extends tone dependent error di#usion to color. In color error di#usion, what color to render becomes a major concern in addition to #nding optimal dot patterns. We present a visually optimum design approach for input level #tone# dependent error #lters #for each color plane#. The resulting halftones reduce traditional error di#usion artifacts and achieve greater accuracy in color rendition. 1.

Vishal Monga; Brian L. Evans

2004-01-01T23:59:59.000Z

87

Sampling Errors in Seasonal Forecasting  

Science Conference Proceedings (OSTI)

The limited numbers of start dates and ensemble sizes in seasonal forecasts lead to sampling errors in predictions. Defining the magnitude of these sampling errors would be useful for end users as well as informing decisions on resource ...

Stephen Cusack; Alberto Arribas

2009-03-01T23:59:59.000Z

88

The Effect of Cingulate Cortex Lesions on Task Switching and Working Memory  

Science Conference Proceedings (OSTI)

Anatomic interconnections between the prefrontal and anterior cingulate cortices suggest that these areas may have similar functions. Here we report the effect of anterior cingulate removal on task switching, error monitoring, and working memory. Neuroimaging ...

M. F. S. Rushworth; K. A. Hadland; D. Gaffan; R. E. Passingham

2003-04-01T23:59:59.000Z

89

Pocket Guide: Preventing Switching Errors  

Science Conference Proceedings (OSTI)

There are many conditions that are frequently identified as factors contributing to, if not directly causing, accidents and other unwanted events. These have come to be called "error-likely conditions." In 2010, the Electric Power Research Institute (EPRI) published report 1020018, Error-Likely Situations in Power Switching. That report was the first large-scale effort to fill the knowledge gap in the area of error-likely situations in power switching, and it identified over 100 potentially error-likely ...

2011-12-12T23:59:59.000Z

90

Quantum Zero-error Capacity  

E-Print Network (OSTI)

We define here a new kind of quantum channel capacity by extending the concept of zero-error capacity for a noisy quantum channel. The necessary requirement for which a quantum channel has zero-error capacity greater than zero is given. Finally, we point out some directions on how to calculate the zero-error capacity of such channels.

Rex A. C. Medeiros; Francisco M. De Assis

2006-11-08T23:59:59.000Z

91

How Do Actuaries Use Data Containing Errors?: Models of Error Detection and Error Correction  

Science Conference Proceedings (OSTI)

Information systems provide data for business processes and decision making. There is strong evidence that data items stored in organizational databases have a significant rate of errors. If undetected in use, errors in data may significantly affect ...

Barbara D. Klein

1997-10-01T23:59:59.000Z

92

Firewall Configuration Errors Revisited  

E-Print Network (OSTI)

The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general that survey indicated that corporate firewalls were often enforcing poorly written rule-sets, containing many mistakes. The goal of this work is to revisit the first survey. The current study is much larger. Moreover, for the first time, the study includes configurations from two major vendors. The study also introduce a novel "Firewall Complexity" (FC) measure, that applies to both types of firewalls. The findings of the current study indeed validate the 2004 study's main observations: firewalls are (still) poorly configured, and a rule-set's complexity is (still) positively correlated with the number of detected risk items. Thus we can conclude that, for well-configured firewalls, ``small is (still) beautiful''. However, unlike the 2004 study, we see no significant indication that later software versions have fewer errors (for both vendors).

Wool, Avishai

2009-01-01T23:59:59.000Z

93

Quantum error control codes  

E-Print Network (OSTI)

It is conjectured that quantum computers are able to solve certain problems more quickly than any deterministic or probabilistic computer. For instance, Shor's algorithm is able to factor large integers in polynomial time on a quantum computer. A quantum computer exploits the rules of quantum mechanics to speed up computations. However, it is a formidable task to build a quantum computer, since the quantum mechanical systems storing the information unavoidably interact with their environment. Therefore, one has to mitigate the resulting noise and decoherence effects to avoid computational errors. In this dissertation, I study various aspects of quantum error control codes - the key component of fault-tolerant quantum information processing. I present the fundamental theory and necessary background of quantum codes and construct many families of quantum block and convolutional codes over finite fields, in addition to families of subsystem codes. This dissertation is organized into three parts: Quantum Block Codes. After introducing the theory of quantum block codes, I establish conditions when BCH codes are self-orthogonal (or dual-containing) with respect to Euclidean and Hermitian inner products. In particular, I derive two families of nonbinary quantum BCH codes using the stabilizer formalism. I study duadic codes and establish the existence of families of degenerate quantum codes, as well as families of quantum codes derived from projective geometries. Subsystem Codes. Subsystem codes form a new class of quantum codes in which the underlying classical codes do not need to be self-orthogonal. I give an introduction to subsystem codes and present several methods for subsystem code constructions. I derive families of subsystem codes from classical BCH and RS codes and establish a family of optimal MDS subsystem codes. I establish propagation rules of subsystem codes and construct tables of upper and lower bounds on subsystem code parameters. Quantum Convolutional Codes. Quantum convolutional codes are particularly well-suited for communication applications. I develop the theory of quantum convolutional codes and give families of quantum convolutional codes based on RS codes. Furthermore, I establish a bound on the code parameters of quantum convolutional codes - the generalized Singleton bound. I develop a general framework for deriving convolutional codes from block codes and use it to derive families of non-catastrophic quantum convolutional codes from BCH codes. The dissertation concludes with a discussion of some open problems.

Abdelhamid Awad Aly Ahmed, Sala

2008-05-01T23:59:59.000Z

94

Human Error in Airway Facilities  

E-Print Network (OSTI)

This report examines human errors in Airway Facilities (AF) with the intent of preventing these errors from being passed on to the new Operations Control Centers. To effectively manage errors, they first have to be identified. Human factors engineers researched human error literature, analyzed human errors recorded in AF databases, and conducted structured interviews with AF representatives. This study enabled them to categorize the types of human errors, identify potential causal factors, and recommend strategies for their mitigation. The results provide preventative measures that designers, developers, and users can take to reduce human error. 17. Key Words Human Error Error Mitigation Operations Control Centers Error Mitigation Strategies 18. Distribution Statement This document is available to the public through the National Technical Information Service, Springfield, Virginia, 22161. 19. Security Classif. (of this report) 20. Security Classif. (of this page) 21. No. of Pages 23 22. Price Form DOT F 1700.7 (8-72) Reproduction of completed page authorized iii ACKNOWLEDGMENTS This research was accomplished under the sponsorship of the Office of Chief Scientist for Human Factors, AAR-100. The research team greatly appreciates the support supplied by Beverly Clark of AOP-30 and our subject matter expert, Kermit Grayson of Grayson Consulting. We also wish to extend our thanks to the people interviewed at the facilities who gave their valuable time in helping us to achieve the goals of our project. iv v Table of Contents Page Acknowledgments..........................................................................................................................iii Executive Summary......................................................................................

Vicki Ahlstrom; Vicki Ahlstrom Act; Donald G. Hartman

2001-01-01T23:59:59.000Z

95

Exposing Memory Access Regularities Using Object-Relative Memory Profiling  

Science Conference Proceedings (OSTI)

Memory profiling is the process of characterizing a program's memorybehavior by observing and recording its response to specific inputsets. Relevant aspects of the program's memory behavior maythen be used to guide memory optimizations in an aggressively ...

Qiang Wu; Artem Pyatakov; Alexey Spiridonov; Easwaran Raman; Douglas W. Clark; David I. August

2004-03-01T23:59:59.000Z

96

Using Cyclic Memory Allocation to Eliminate Memory Leaks  

E-Print Network (OSTI)

We present and evaluate a new memory management technique for eliminating memory leaks in programs with dynamic memory allocation. This technique observes the execution of the program on a sequence of training inputs to ...

Nguyen, Huu Hai

97

Nebular Abundance Errors  

E-Print Network (OSTI)

The errors inherent to the use of the standard "ionization correction factor" ("i_CF") method of calculating nebular conditions and relative abundances of H, He, N, O, Ne, S, and Ar in emission line nebulae have been investigated under conditions typical for planetary nebulae. The photoionization code CLOUDY was used to construct a series of model nebulae with properties spanning the range typical of PNe. Its radial "profiles" of bright, frequently observed optical emission lines were then summed over a variety of "apertures" to generate sets of emission line measurements. These resulting line ratios were processed using the i_CF method to "derive" nebular conditions and abundances. We find that for lines which are summed over the entire nebula the i_CF-derived abundances differ from the input abundances by less than 5% for He and O up to 25% or more for Ne, S, and Ar. For resolved observations, however, the discrepancies are often much larger and are systematically variable with radius. This effect is especially pronounced in low-ionization zones where nitrogen and oxygen are neutral or once-ionized such as in FLIERs, ansae and ionization fronts. We argue that the reports of stellar-enriched N in the FLIERs of several PNe are probably specious.

J. Alexander; B. Balick

1997-04-30T23:59:59.000Z

98

Browse Error - Energy Innovation Portal  

Share Browse Error - Energy Innovation Portal on Facebook; ... Contacts | Web Site Policies | U.S. Department of Energy | USA.gov Content Last ...

99

Shape memory alloys  

SciTech Connect

A shape memory alloy is disclosed consisting essentially of, by weight ratio, 2 to 15% aluminium, 0.01 to 3% beryllium and the balance being substantially copper, with impurities being inevitably present in the process of preparation, and a shape memory alloy further including 0.05 to 15% zinc, both including composition ranges which allows cold work.

Suzuki, K.

1983-10-04T23:59:59.000Z

100

The Java memory model  

Science Conference Proceedings (OSTI)

This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations ... Keywords: Java, concurrency, memory model, multithreading

Jeremy Manson; William Pugh; Sarita V. Adve

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Hysteresis, Reversibility, and Shape Memory  

Science Conference Proceedings (OSTI)

Basic Properties of Shape Memory Materials from First-Principles ... Control Loops of Shape Memory Actuators by Detection of the Electrical Resistance.

102

Sampling Errors in Rawinsonde-Array Budgets  

Science Conference Proceedings (OSTI)

Rawinsonde data used for sounding-array budget computations have random errors, both instrumental errors and errors of representativeness (here called sampling errors). The latter are associated with the fact that radiosondes do not measure large-...

Brian E. Mapes; Paul E. Ciesielski; Richard H. Johnson

2003-11-01T23:59:59.000Z

103

Computer memory management system  

DOE Patents (OSTI)

A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

Kirk, III, Whitson John (Greenwood, MO)

2002-01-01T23:59:59.000Z

104

Architecture Design for Soft Errors  

Science Conference Proceedings (OSTI)

This book provides a comprehensive description of the architetural techniques to tackle the soft error problem. It covers the new methodologies for quantitative analysis of soft errors as well as novel, cost-effective architectural techniques to mitigate ... Keywords: Computer Architecture, Computer Engineering, Microprocessors

Shubu Mukherjee

2008-02-01T23:59:59.000Z

105

Technology strategy for the semiconductor memory market  

E-Print Network (OSTI)

Solid state memories are used in a variety of applications as data and code storages. A non-volatile memory is a memory that retains information when its power supply is off. Flash memory is a type of nonvolatile memory ...

Nakamura, Tomohiko

2012-01-01T23:59:59.000Z

106

The Geometry of Model Error  

Science Conference Proceedings (OSTI)

This paper investigates the nature of model error in complex deterministic nonlinear systems such as weather forecasting models. Forecasting systems incorporate two components, a forecast model and a data assimilation method. The latter projects ...

Kevin Judd; Carolyn A. Reynolds; Thomas E. Rosmond; Leonard A. Smith

2008-06-01T23:59:59.000Z

107

Reconsidering custom memory allocation  

Science Conference Proceedings (OSTI)

Programmers hoping to achieve performance improvements often use custom memory allocators. This in-depth study examines eight applications that use custom allocators. Surprisingly, for six of these applications, a state-of-the-art general-purpose allocator ...

Emery D. Berger; Benjamin G. Zorn; Kathryn S. McKinley

2002-11-01T23:59:59.000Z

108

Warship : memorial in antithesis  

E-Print Network (OSTI)

This thesis is divided into three distinct yet related parts. The first consists of observations and reflections on some of New York City's many war memorials, ranging from one commemorating the Revolutionary War to one ...

Tchelistcheff, Andre Victor

1992-01-01T23:59:59.000Z

109

Mondriaan memory protection  

E-Print Network (OSTI)

Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

Witchel, Emmett Jethro, 1970-

2004-01-01T23:59:59.000Z

110

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

111

Human Errors: Disadvantages and Advantages  

E-Print Network (OSTI)

The traditional paradigm for learning and training of operators in complex systems is discussed and criticised to react on the strong influence (the doctrine of 'mental logic') coming from research carried out in artificial intelligence (AI). The most well known arguments against the AI-approach are presented and discussed in relation to expertise, intuition and implicit knowledge. The importance of faults and errors are discussed in the context of a new metaphor for cognitive structures to describe expertise, and how knowledge about unsuccessful behavior influences the actual decision making process of experts. Keywords: human error, meta learning, mental model, experience, expertise 1. INTRODUCTION Why is this type of statements "I learned more from my defeats than from my victories" (Napoleon, ca. 1819) sometimes (or always) true? To answer this question we need a new understanding of human errors, inefficient behavior, and expertise. In this paper we will discuss the importance of...

Matthias Rauterberg; Daniel Felix

1996-01-01T23:59:59.000Z

112

Using Cyclic Memory Allocation to Eliminate Memory Leaks  

E-Print Network (OSTI)

We present and evaluate a new memory management technique foreliminating memory leaks in programs with dynamic memoryallocation. This technique observes the execution of the program on asequence of training inputsto find ...

Nguyen, Huu Hai

2005-10-26T23:59:59.000Z

113

Error-correcting codes and cryptography  

Science Conference Proceedings (OSTI)

Oct 20, 2006 ... topics where error-correcting codes overlap with cryptography. In some of these ..... human errors, e.g., misconfigurations or bugs. If biological ...

114

Definition: Time Error | Open Energy Information  

Open Energy Info (EERE)

of Frequency Error over a given period.1 Related Terms Interconnection, sustainability, frequency error, smart grid References Glossary of Terms Used in Reliability...

115

The rope memory: a permanent storage device  

Science Conference Proceedings (OSTI)

A powerful way of increasing the capability and flexibility of digital computing systems is through the use of permanent storage memories. Such memories are also known as readonly memories or NDRO electrically unalterable memories. As an example of the ...

P. Kuttner

1963-11-01T23:59:59.000Z

116

Dynamically replicated memory: building reliable systems from nanoscale resistive memories  

Science Conference Proceedings (OSTI)

DRAM is facing severe scalability challenges in sub-45nm tech- nology nodes due to precise charge placement and sensing hur- dles in deep-submicron geometries. Resistive memories, such as phase-change memory (PCM), already scale well beyond DRAM and ... Keywords: phase-change memory, write endurance

Engin Ipek; Jeremy Condit; Edmund B. Nightingale; Doug Burger; Thomas Moscibroda

2010-03-01T23:59:59.000Z

117

High Temperature Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 5, 2013 ... Shape Memory Response of NiTiHfPd High Strength and High Hysteresis Shape Memory Alloys: Emre Acar1; Haluk Karaca1; Hirobumi Tobe1; ...

118

Thomas H. Smouse Memorial Fellowship  

Science Conference Proceedings (OSTI)

Awarded to a graduate student doing research in areas of interest to AOCS. Thomas H. Smouse Memorial Fellowship Thomas H. Smouse Memorial Fellowship graduate research scholastically outstanding Smouse Award Student Award Student Awards achievemen

119

Unifluxor: a permanent memory element  

Science Conference Proceedings (OSTI)

The Unifluxor is a new binary permanent memory element which appears to have the advantages of high-speed operation, easy fabrication, and low cost. Unlike cores, twistors, capacitors, and other commonly used memory devices, the Unifluxor does not depend ...

A. M. Renard; W. J. Neumann

1960-05-01T23:59:59.000Z

120

Memory Usage Considerations on Franklin  

NLE Websites -- All DOE Office Websites (Extended Search)

the memory requirement vvia internal checking in their codes or by some tools. Craypat could track heap usage. And IPM also tracks memory usage. Last edited: 2013-06-30 08:33:51...

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Shape memory polymer medical device  

SciTech Connect

A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

Maitland, Duncan (Pleasant Hill, CA); Benett, William J. (Livermore, CA); Bearinger, Jane P. (Livermore, CA); Wilson, Thomas S. (San Leandro, CA); Small, IV, Ward (Livermore, CA); Schumann, Daniel L. (Concord, CA); Jensen, Wayne A. (Livermore, CA); Ortega, Jason M. (Pacifica, CA); Marion, III, John E. (Livermore, CA); Loge, Jeffrey M. (Stockton, CA)

2010-06-29T23:59:59.000Z

122

Transparently consistent asynchronous shared memory  

Science Conference Proceedings (OSTI)

The advent of many-core processors is imposing many changes on the operating system. The resources that are under contention have changed; previously, CPU cycles were the resource in demand and required fair and precise sharing. Now compute cycles are ... Keywords: copy on write, memory management, memory sharing, virtual memory

Hakan Akkan, Latchesar Ionkov, Michael Lang

2013-06-01T23:59:59.000Z

123

Machine Translation Errors: English and Iraqi Arabic  

Science Conference Proceedings (OSTI)

Errors in machine translations of English-Iraqi Arabic dialogues were analyzed using the methods developed for the Human Translation Error Rate measure (HTER). Human annotations were used to refine the Translation Error Rate (TER) annotations. The analyses ... Keywords: Arabic, English, error analysis, evaluation, statistical machine translation

S. Condon; D. Parvaz; J. Aberdeen; C. Doran; A. Freeman; M. Awad

2011-03-01T23:59:59.000Z

124

The memory book  

Science Conference Proceedings (OSTI)

In this paper we present an Augmented Reality book for remembering past events and to plan future ones. We have developed this system using Brainstorm eStudio. We have incorporated Augmented Reality options into Brainstorm eStudio using a plugin of ARToolKit. ... Keywords: augmented reality, memory book, storytelling

M. C. Juan; B. Rey; D. Perez; D. Tomas; M. Alcañiz

2005-06-01T23:59:59.000Z

125

Library Book Memorial and  

E-Print Network (OSTI)

Library Book Memorial and Honorary Gift Program A university library provides the information or event. We will inform the individual or family of your gift and the book(s) we add to the library Enclosed is my $___________ contribution for gift books. K $20 or more -- Bookplate(s) K Under $20

VanDieren, Monica

126

Heading Error Removal System for Tracking Devices - Energy ...  

Systems are able to reduce or remove slowly-varying drift errors, such as heading errors, rate of rotation errors, and direction of travel errors, to correct the ...

127

Error Exponent Region for Gaussian  

E-Print Network (OSTI)

Introduction We introduce the notion of error exponent region (EER) for a multi-user channel. This region specifies the set of errorexponent vectors, which are simultaneously achievable by all users in the multi-user channel [1]. In this work, we derive an inner bound (achievable region) and an outer bound for the error exponent region of a Gaussian multiple access channel (GMAC). II. Formulation and Main Result An error exponent region for a multi-user channel depends on the channel operating (rate) point. For a two-user channel, we use the notation EER(R1 , R2 ) to denote the EER when the channel is operated at rate pair (R1 , R2 ). Consider a GMAC Y = X1 +X2 + Z, (1) where X1 and X2 are the channel inputs for user 1 and user 2 with E(X 1 ) = SNR1 , E(X 2 ) = SNR2 , and Z is white Gaussian noise with unit variance. Denote E(R,SNR) the maximum of random coding exponent and expurgated exponent of a single-user Gaussian channel. Our main result follow. Theorem 1: For a two-user GM

Multiple Access Channels; Lihua Weng; Achilleas Anastasopoulos; Eep Pradhan

2004-01-01T23:59:59.000Z

128

Self-correcting quantum memory in a thermal environment  

Science Conference Proceedings (OSTI)

The ability to store information is of fundamental importance to any computer, be it classical or quantum. To identify systems for quantum memories, which rely, analogously to classical memories, on passive error protection (''self-correction''), is of greatest interest in quantum information science. While systems with topological ground states have been considered to be promising candidates, a large class of them was recently proven unstable against thermal fluctuations. Here, we propose two-dimensional (2D) spin models unaffected by this result. Specifically, we introduce repulsive long-range interactions in the toric code and establish a memory lifetime polynomially increasing with the system size. This remarkable stability is shown to originate directly from the repulsive long-range nature of the interactions. We study the time dynamics of the quantum memory in terms of diffusing anyons and support our analytical results with extensive numerical simulations. Our findings demonstrate that self-correcting quantum memories can exist in 2D at finite temperatures.

Chesi, Stefano; Roethlisberger, Beat; Loss, Daniel [Department of Physics, University of Basel, Klingelbergstrasse 82, CH-4056 Basel (Switzerland)

2010-08-15T23:59:59.000Z

129

Genepool Memory Heatmaps  

NLE Websites -- All DOE Office Websites (Extended Search)

Genepool Memory Heatmaps Genepool Memory Heatmaps Heatmap of Memory and Slots Requested vs Time Waited (in hours) | Queue: All | Last 7 Days Memory Requested Slots <5GB 5-10GB 10-20GB 20-30GB 30-40GB 40-50GB 50-100GB 100-150GB 150-200GB 200-256GB 256-512GB 512+GB Job Count Longest Wait 1 2.26 (2693) 10.5 (201167) 3.2 (11650) 0 1.75 (282) 1.49 (1627) 0.03 (1) 0 0 0 0 0 217420 538.96 2 0.26 (103) 1.02 (2817) 0 0 0 0 0 0 0 0 0 0 2920 9.1 4 1.55 (198) 1.48 (104) 0.34 (8) 0 0 0 1.86 (3) 0 0 0 0 0 313 20.48 6 0.01 (1) 0.09 (34) 0 0 0 0 0 0 0 0 0 0 35 1.22 8 0.34 (37) 6.15 (12376) 1.01 (17) 24.7 (1) 0.03 (3) 0 0.02 (6) 0 0 0 0 0 12440 46.16 10 0 8.56 (1) 0 0 0 0 0 0 0 0 0 0 1 8.56 16 0 0.03 (1) 0 0 0 0 0 0 0 0 0 0 1 0.03 24 0 0 0.01 (1) 0 0 0 0 0 0 0 0 0 1 0.01 32 0 0.01 (4) 0.05 (9) 0 0.01 (6) 0 0.0 (1) 0 0 0 0 0 20 0.26

130

Shape memory alloy actuator  

DOE Patents (OSTI)

An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

Varma, Venugopal K. (Knoxville, TN)

2001-01-01T23:59:59.000Z

131

Page placement in hybrid memory systems  

Science Conference Proceedings (OSTI)

Phase-Change Memory (PCM) technology has received substantial attention recently. Because PCM is byte-addressable and exhibits access times in the nanosecond range, it can be used in main memory designs. In fact, PCM has higher density and lower idle ... Keywords: hybrid memory, memory controller, phase-change memory

Luiz E. Ramos; Eugene Gorbatov; Ricardo Bianchini

2011-05-01T23:59:59.000Z

132

APC: a performance metric of memory systems  

Science Conference Proceedings (OSTI)

Due to the infamous "memory wall" problem and a drastic increase in the number of data intensive applications, memory rather than processor has become the leading performance bottleneck of modern computing systems. Evaluating and understanding memory ... Keywords: measurement methodology, memory metric, memory performance measurement

Xian-He Sun; Dawei Wang

2012-10-01T23:59:59.000Z

133

Incorporating Misclassification Error in Skill Assessment  

Science Conference Proceedings (OSTI)

It is desirable to account for misclassification error of meteorological observations so that the true skill of the forecast can be assessed. Errors in observations can occur, among other places, in pilot reports of icing and in tornado spotting. ...

William Briggs; Matt Pocernich; David Ruppert

2005-11-01T23:59:59.000Z

134

Sources of Error in Objective Analysis  

Science Conference Proceedings (OSTI)

The errors in objective analysis methods that are based on corrections to first-guess fields are considered. An expression that gives a decomposition of an error into three independent components is derived. To test the magnitudes of the ...

Richard Franke

1985-02-01T23:59:59.000Z

135

Systematic Tendency Error in Budget Calculations  

Science Conference Proceedings (OSTI)

Atmospheric budget calculations suffer from various observational and numerical errors. This paper demonstrates that all budget calculations applied to a large number of samples suffer from additional errors originating from systematic tendency ...

Masao Kanamitsu; Suranjana Saha

1996-06-01T23:59:59.000Z

136

Review of Radiosonde Humidity and Temperature Errors  

Science Conference Proceedings (OSTI)

An attempt is made to provide a brief but comprehensive summary of sources of error in National Weather Service upper air data, and a guide to the relevant literature. Error analysis must be tailored for particular applications. Temperature ...

Robert W. Pratt

1985-09-01T23:59:59.000Z

137

Applications of Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 3, 2011 ... More than 50 years after the discovery of shape memory alloys, and after investments of millions of dollars, there are very few successful ...

138

Using Hardware Memory Protection to Build a High-Performance, Strongly-Atomic Hybrid Transactional Memory  

Science Conference Proceedings (OSTI)

We demonstrate how fine-grained memory protection can be used in support of transactional memory systems: first showing how a software transactional memory system (STM) can be made strongly atomic by using memory protection on transactionally-held state, ... Keywords: Transactional Memory, Hybrid, Memory Protection, Primitives, Abort Handler, Strong Atomicity

Lee Baugh; Naveen Neelakantam; Craig Zilles

2008-06-01T23:59:59.000Z

139

An analysis of MRAM based memory technologies  

E-Print Network (OSTI)

MRAM is a memory (RAM) technology that uses electron spin to store information. Often been called "the ideal memory", it can potentially combine the density of DRAM with the speed of SRAM and non-volatility of FLASH memory ...

Vijayaraghavan, Rangarajan, M. Eng. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

140

Shape memory alloy thaw sensors  

DOE Patents (OSTI)

A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Memory exploration for low power, embedded systems  

Science Conference Proceedings (OSTI)

Keywords: cache simulator, design automation, low power design, low power embedded systems, memory exploration and optimization, memory hierarchy, off-chip data assignment

Wen-Tsong Shiue; Chaitali Chakrabarti

1999-06-01T23:59:59.000Z

142

ELECTROSTATIC MEMORY SYSTEM  

DOE Patents (OSTI)

An improved electrostatic memory system is de scribed fer a digital computer wherein a plarality of storage tubes are adapted to operate in either of two possible modes. According to the present irvention, duplicate storage tubes are provided fur each denominational order of the several binary digits. A single discriminator system is provided between corresponding duplicate tubes to determine the character of the infurmation stored in each. If either tube produces the selected type signal, corresponding to binazy "1" in the preferred embodiment, a "1" is regenerated in both tubes. In one mode of operation each bit of information is stored in two corresponding tubes, while in the other mode of operation each bit is stored in only one tube in the conventional manner.

Chu, J.C.

1958-09-23T23:59:59.000Z

143

[an error occurred while processing this directive  

Science Conference Proceedings (OSTI)

[an error occurred while processing this directive] ... Thus, many systems administrators do not regularly update non ... works well but it does not protect ...

144

[an error occurred while processing this directive  

Science Conference Proceedings (OSTI)

[an error occurred while processing this directive] These are ... of commercial products within NIST web pages is for information only; it does not imply ...

145

Shape memory metals. Final report  

SciTech Connect

The ability to define a manufacturing process to form, heat-treat, and join parts made of nickel-titanium and/or copper-zinc-aluminum shape memory alloys was investigated. The specific emphasis was to define a process that would produce shape memory alloy parts in the configuration of helical coils emulating the appearance of compression springs. In addition, the mechanical strength of the finished parts along with the development of a electrical lead attachment method using shape memory alloy wire was investigated.

Dworak, T.D.

1993-09-01T23:59:59.000Z

146

A durable and energy efficient main memory using phase change memory technology  

Science Conference Proceedings (OSTI)

Using nonvolatile memories in memory hierarchy has been investigated to reduce its energy consumption because nonvolatile memories consume zero leakage power in memory cells. One of the difficulties is, however, that the endurance of most nonvolatile ... Keywords: endurance, low power, phase change memory

Ping Zhou; Bo Zhao; Jun Yang; Youtao Zhang

2009-06-01T23:59:59.000Z

147

Error suppression and error correction in adiabatic quantum computation I: techniques and challenges  

E-Print Network (OSTI)

Adiabatic quantum computation (AQC) is known to possess some intrinsic robustness, though it is likely that some form of error correction will be necessary for large scale computations. Error handling routines developed for circuit-model quantum computation do not transfer easily to the AQC model since these routines typically require high-quality quantum gates, a resource not generally allowed in AQC. There are two main techniques known to suppress errors during an AQC implementation: energy gap protection and dynamical decoupling. Here we show that both these methods are intimately related and can be analyzed within the same formalism. We analyze the effectiveness of such error suppression techniques and identify critical constraints on the performance of error suppression in AQC, suggesting that error suppression by itself is insufficient for large-scale, fault-tolerant AQC and that a form of error correction is needed. We discuss progress towards implementing error correction in AQC and enumerate several key outstanding problems. This work is a companion paper to "Error suppression and error correction in adiabatic quantum computation II: non-equilibrium dynamics"', which provides a dynamical model perspective on the techniques and limitations of error suppression and error correction in AQC. In this paper we discuss the same results within a quantum information framework, permitting an intuitive discussion of error suppression and correction in encoded AQC.

Kevin C. Young; Mohan Sarovar; Robin Blume-Kohout

2013-07-22T23:59:59.000Z

148

OMC-INTEGRAL Memory Management  

Science Conference Proceedings (OSTI)

The management of the memory restrictions imposed by the processor (1750A) was one of the major difficulties found in designing the Software (SW) controlling the Optical Monitoring Camera (OMC) payload of the International Gamma Ray Laboratory (INTEGRAL) ...

Jose Manuel Pérez Lobato; Eva Martín Lobo

2002-06-01T23:59:59.000Z

149

QuarkNet Workshop: Beyond Human Error  

NLE Websites -- All DOE Office Websites (Extended Search)

Human Error Human Error QuarkNet Workshop for High School Science Teachers 8:30 am to 4:00 pm, August 1 -3, 2012 at Fermi National Accelerator Laboratory This was a three-day workshop for high school science teachers. Measurement and error are key ingredients for all science applications. Both align with the Next Generation Science Standards, but many high school students struggle to understand the importance of error analysis and prevention. Over the three days we examined multiple experiments going on at Fermilab and discussed the ways that scientists take measurements and reduce error on these projects. Participants met and worked with scientists from Fermilab and University of Chicago to look at how error analysis takes place at Fermilab and bridged those ideas into high school classes. Teachers discussed lesson plans available at Fermilab and their own methods of teaching error analysis. Additionally, participants heard from high school students who participated in summer research as they presented their findings and linked students' learning back to the teachers' understanding of error recognition and analysis.

150

Density estimation for data with rounding errors  

Science Conference Proceedings (OSTI)

Rounding of data is common in practice. The problem of estimating the underlying density function based on data with rounding errors is addressed. A parametric maximum likelihood estimator and a nonparametric bootstrap kernel density estimator are proposed. ... Keywords: Bootstrapping, Deconvolution density estimation, Fast Fourier transformation, Kernel density estimation, Measurement error

B. Wang, W. Wertelecki

2013-09-01T23:59:59.000Z

151

Automatic detection of dimension errors in spreadsheets  

Science Conference Proceedings (OSTI)

We present a reasoning system for inferring dimension information in spreadsheets. This system can be used to check the consistency of spreadsheet formulas and thus is able to detect errors in spreadsheets. Our approach is based on three static analysis ... Keywords: Dimension, Error detection, Inference rule, Spreadsheet, Static analysis, Unit of measurement

Chris Chambers; Martin Erwig

2009-08-01T23:59:59.000Z

152

Wind Power Forecasting Error Distributions over Multiple Timescales (Presentation)  

DOE Green Energy (OSTI)

This presentation presents some statistical analysis of wind power forecast errors and error distributions, with examples using ERCOT data.

Hodge, B. M.; Milligan, M.

2011-07-01T23:59:59.000Z

153

Dynamics of Prediction Errors under the Combined Effect of Initial Condition and Model Errors  

Science Conference Proceedings (OSTI)

The transient evolution of prediction errors in the short to intermediate time regime is considered under the combined effect of initial condition and model errors. Some generic features are brought out and connected with intrinsic properties. ...

C. Nicolis; Rui A. P. Perdigao; S. Vannitsem

2009-03-01T23:59:59.000Z

154

Word error rates: Decomposition over POS classes and applications for error analysis  

E-Print Network (OSTI)

Evaluation and error analysis of machine translation output are important but difficult tasks. In this work, we propose a novel method for obtaining more details about actual translation errors in the generated output by introducing the decomposition of Word Error Rate (WER) and Position independent word Error Rate (PER) over different Partof-Speech (POS) classes. Furthermore, we investigate two possible aspects of the use of these decompositions for automatic error analysis: estimation of inflectional errors and distribution of missing words over POS classes. The obtained results are shown to correspond to the results of a human error analysis. The results obtained on the European Parliament Plenary Session corpus in Spanish and English give a better overview of the nature of translation errors as well as ideas of where to put efforts for possible improvements of the translation system. 1

Maja Popovi?; Hermann Ney

2007-01-01T23:59:59.000Z

155

Resilience of Hybrid Ensemble/3DVAR Analysis Schemes to Model Error and Ensemble Covariance Error  

Science Conference Proceedings (OSTI)

Previous idealized numerical experiments have shown that a straightforward augmentation of an isotropic error correlation matrix with an ensemble-based error correlation matrix yields an improved data assimilation scheme under certain conditions. ...

Brian J. Etherton; Craig H. Bishop

2004-05-01T23:59:59.000Z

156

Shape memory alloy thaw sensors  

SciTech Connect

A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

Shahinpoor, M.; Martinez, D.R.

1998-04-07T23:59:59.000Z

157

Hopper Trouble Shooting and Error Messages  

NLE Websites -- All DOE Office Websites (Extended Search)

Trouble Shooting and Error Messages Trouble Shooting and Error Messages Trouble Shooting and Error Messages Error Messages Message or Symptom Fault Recommendation job hit wallclock time limit user or system Submit job for longer time or start job from last checkpoint and resubmit. If your job hung and produced no output contact consultants. received node failed or halted event for nid xxxx system One of the compute nodes assigned to the job failed. Resubmit the job PtlNIInit failed : PTL_NOT_REGISTERED user The executable is from an XT system (Franklin or Jaguar?) using portals. Recompile on Hopper and resubmit. error while loading shared libraries: libxxxx.so: cannot open shared object file: No such file or directory mostly user, sometimes system Make sure environment variable CRAY_ROOTFS is set to DSL, also the modules loaded when building the dynamic executable is also loaded at run time. Report to consultants if still not resolved.

158

Energy efficient Phase Change Memory based main memory for future high performance systems  

Science Conference Proceedings (OSTI)

Phase Change Memory (PCM) has recently attracted a lot of attention as a scalable alternative to DRAM for main memory systems. As the need for high-density memory increases, DRAM has proven to be less attractive from the point of view of scaling and ... Keywords: DDR3 commodity DRAM memory system, energy efficient phase change memory, main memory, future high performance systems, energy consumption, latency issues, write energy, write endurance, cache, embedded DRAM

R. A. Bheda; Jason A. Poovey; J. G. Beu; T. M. Conte

2011-07-01T23:59:59.000Z

159

Effect of memory access and caching on high performance computing.  

E-Print Network (OSTI)

??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers… (more)

Groening, James

2012-01-01T23:59:59.000Z

160

Error analysis in wind turbine field testing  

DOE Green Energy (OSTI)

In wind turbine field testing, one of the most important issues is understanding and accounting for data errors. Extended dynamic testing of wind turbines requires a thorough uncertainty analysis and a regimen of quality assurance steps in order to preserve accuracy. Test objectives need to be identified to determine the accuracy requirements of any data measurement, collection, and analysis process. Frequently, the uncertainty analysis reveals that the major sources of error can be allowed for with careful calibration and signal drift tracking procedures. This paper offers a basis for the discussion and development of a repeatable and accurate process to track errors and account for them in data processing.

McNiff, B [McNiff Light Industries, Carlisle, MA (United States); Simms, D [National Renewable Energy Lab., Golden, CO (United States)

1994-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Harmonic Analysis Errors in Calculating Dipole,  

NLE Websites -- All DOE Office Websites (Extended Search)

Harmonic Analysis Errors in Calculating Dipole, Harmonic Analysis Errors in Calculating Dipole, Quadrupole, and Sextupole Magnets using POISSON Ro be rt J. La ri<::::R~ i. September 10, 1985 Introduction LS-32 The computer program POISSON was used to calculate the dipole, quadru- pole, and sextupole magnets of the 6 GeV electron storage ring. A trinagular mesh must first be generated by LATTICE. The triangle size is varied over the "universe" at the discretion of the user. This note describes a series of test calculations that were made to help the user decide on the size of the mesh to reduce the harmonic field calculation errors. A conformal transfor- mation of a multipole magnet into a dipole reduces these errors. Dipole Magnet Calculations A triangular mesh used to calculate a "perfect" dipole magnet is shown in

162

Effectiveness of various error metrics in SCEPTRE.  

Science Conference Proceedings (OSTI)

The objective of this project is to investigate accuracy of error metrics in SCEPTRE and produce useful benchmarks, identify metrics that do not work well, identify metrics that do work well, and produce easy to reference results.

Olson, Aaron

2010-08-01T23:59:59.000Z

163

Spatial Error Metrics for Oceanographic Model Verification  

Science Conference Proceedings (OSTI)

A common problem with modern numerical oceanographic models is spatial displacement, including misplacement and misshapenness of ocean circulation features. Traditional error metrics, such as least squares methods, are ineffective in many such ...

Sean B. Ziegeler; James D. Dykes; Jay F. Shriver

2012-02-01T23:59:59.000Z

164

Error bounds: necessary and sufficient conditions  

E-Print Network (OSTI)

from the primal as well as from the dual space are used to characterize the error bound property .... known as conditioning rate [45]): Er f(¯x) := lim inf x??x.

165

Errors and paradoxes in quantum mechanics  

E-Print Network (OSTI)

Errors and paradoxes in quantum mechanics, entry in the Compendium of Quantum Physics: Concepts, Experiments, History and Philosophy, ed. F. Weinert, K. Hentschel, D. Greenberger and B. Falkenburg (Springer), to appear

D. Rohrlich

2007-08-28T23:59:59.000Z

166

Data Assimilation via Error Subspace Statistical Estimation.  

Science Conference Proceedings (OSTI)

Identical twin experiments are utilized to assess and exemplify the capabilities of error subspace statistical estimation (ESSE). The experiments consists of nonlinear, primitive equation–based, idealized Middle Atlantic Bight shelfbreak front ...

P. F. J. Lermusiaux

1999-07-01T23:59:59.000Z

167

Regression Error Characteristic CurVes  

E-Print Network (OSTI)

Receiver Operating Characteristic (ROC) curves provide a powerful tool for visualizing and comparing classification results. Regression Error Characteristic (REC) curves generalize ROC curves to regression. REC curves plot the error tolerance on the xaxis versus the percentage of points predicted within the tolerance on the y-axis. The resulting curve estimates the cumulative distribution function of the error. The REC curve visually presents commonly-used statistics. The area-over-the-curve (AOC) is a biased estimate of the expected error. The R 2 value can be estimated using the ratio of the AOC for a given model to the AOC for the null model. Users can quickly assess the relative merits of many regression functions by examining the relative position of their REC curves. The shape of the curve reveals additional information that can be used to guide modeling. 1.

Jinbo Bi; Kristin P. Bennett

2003-01-01T23:59:59.000Z

168

Flux Sampling Errors for Aircraft and Towers  

Science Conference Proceedings (OSTI)

Various errors and influences leading to differences between tower- and aircraft-measured fluxes are surveyed. This survey is motivated by reports in the literature that aircraft fluxes are sometimes smaller than tower-measured fluxes. Both tower ...

L. Mahrt

1998-04-01T23:59:59.000Z

169

Minimizing Errors Associated with Multiplate Radiation Shields  

Science Conference Proceedings (OSTI)

Multiplate radiation shield errors are examined using the following techniques: 1) ray tracing analysis, 2) wind tunnel experiments, 3) numerical flow simulations, and 4) field testing. The authors’ objectives are to develop guidelines for ...

Scott J. Richardson; Fred V. Brock; Steven R. Semmer; Cathy Jirak

1999-11-01T23:59:59.000Z

170

Diagnosing Forecast Errors in Tropical Cyclone Motion  

Science Conference Proceedings (OSTI)

This paper reports on the development of a diagnostic approach that can be used to examine the sources of numerical model forecast error that contribute to degraded tropical cyclone (TC) motion forecasts. Tropical cyclone motion forecasts depend ...

Thomas J. Galarneau Jr.; Christopher A. Davis

2013-02-01T23:59:59.000Z

171

Panels with Nonstationary Multifactor Error Structures  

E-Print Network (OSTI)

panel regressions with multifactor error structure. This paper extends this work and examines the important case where the unobserved common factors follow unit root processes and could be cointegrated. It is found that the presence of unit roots does...

Kapetanios, George; Pesaran, M Hashem; Yamagata, Takashi

172

Short-Term Dynamics of Model Errors  

Science Conference Proceedings (OSTI)

The natural instability of the atmosphere is at the origin of the rapid amplification of errors coming from the uncertainty on the initial conditions and from the imperfect representation (the model) of the atmospheric dynamics. In this paper, ...

S. Vannitsem; Z. Toth

2002-09-01T23:59:59.000Z

173

Error driven paraphrase annotation using Mechanical Turk  

Science Conference Proceedings (OSTI)

The source text provided to a machine translation system is typically only one of many ways the input sentence could have been expressed, and alternative forms of expression can often produce a better translation. We introduce here error driven paraphrasing ...

Olivia Buzek; Philip Resnik; Benjamin B. Bederson

2010-06-01T23:59:59.000Z

174

Quantum error-correcting codes and devices  

DOE Patents (OSTI)

A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.

Gottesman, Daniel (Los Alamos, NM)

2000-10-03T23:59:59.000Z

175

Minimizing Binding Errors Using Learned Conjunctive Features  

Science Conference Proceedings (OSTI)

We have studied some of the design trade-offs governing visual representations based on spatially invariant conjunctive feature detectors, with an emphasis on the susceptibility of such systems to false-positive recognition errors—Malsburg's classical ...

Bartlett W. Mel; József W. Fiser

2000-02-01T23:59:59.000Z

176

Minimizing Binding Errors Using Learned Conjunctive Features  

Science Conference Proceedings (OSTI)

We have studied some of the design trade-offs governing visual representations based on spatially invariant conjunctive feature detectors, with an emphasis on the susceptibility of such systems to false-positive recognition errors—Malsburg’s ...

Bartlett W. Mel; Jósef W. Fiser

2000-04-01T23:59:59.000Z

177

Assessing the Ensemble Spread-Error Relationship  

Science Conference Proceedings (OSTI)

The potential ability of an ensemble prediction system (EPS) to represent its own varying forecast error provides strong motivation to produce an EPS over a less expensive deterministic forecast. Traditionally this ability has been assessed by ...

T. M. Hopson

178

Estimation of Errors in Seasonal Cycles  

Science Conference Proceedings (OSTI)

A formula is first given for the error in a 2-harmonic seasonal curve of best fit through a set of N oceanographic data points, assuming the departures from the true mean are independent random numbers.

J. S. Godfrey; K. R. Ridgway

1985-08-01T23:59:59.000Z

179

Organizational Errors: Directions for Future Research  

E-Print Network (OSTI)

The goal of this chapter is to promote research about organizational errors—i.e., the actions of multiple organizational participants that deviate from organizationally specified rules and can potentially result in adverse ...

Carroll, John Stephen

180

Error matrix in quantum process tomography  

E-Print Network (OSTI)

We discuss characterization of experimental quantum gates by the error matrix, which is similar to the standard process matrix $\\chi$ in the Pauli basis, except the desired unitary operation is factored out, by formally placing it either before or after the error process. The error matrix has only one large element, which is equal to the process fidelity, while other elements are small and indicate imperfections. The imaginary parts of the elements along the left column and/or top row directly indicate the unitary imperfection and can be used to find the needed correction. We discuss a relatively simple way to calculate the error matrix for a composition of quantum gates. Similarly, it is rather straightforward to find the first-order contribution to the error matrix due to the Lindblad-form decoherence. We also discuss a way to identify and subtract the tomography procedure errors due to imperfect state preparation and measurement. In appendices we consider several simple examples of the process tomography and also discuss an intuitive physical interpretation of the Lindblad-form decoherence.

Alexander N. Korotkov

2013-09-25T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Ralph H. Potts Memorial Fellowship Award  

Science Conference Proceedings (OSTI)

Awarded to a graduate student doing research in fats and oils. Ralph H. Potts Memorial Fellowship Award Awards Program achievement aocs application award Awards baldwin distinguished division memorial nomination poster program recognizing research

182

How to keep your head above water while detecting errors  

Science Conference Proceedings (OSTI)

Today's distributed systems need runtime error detection to catch errors arising from software bugs, hardware errors, or unexpected operating conditions. A prominent class of error detection techniques operates in a stateful manner, i.e., it keeps track ... Keywords: J2EE multi-tier systems, hidden markov model, high throughput distributed applications, intelligent sampling, stateful error detection

Ignacio Laguna; Fahad A. Arshad; David M. Grothe; Saurabh Bagchi

2009-11-01T23:59:59.000Z

183

Chapter 5: Virtual Memory Management 1 Virtual Memory Management  

E-Print Network (OSTI)

kernel data structures. The zone package This package facilitates fast allocation of memory for kernel data structures, some of which may be in time critical pieces of code. The zone package provides, organization, data structures, interactions. The emphasis is laid on both ma- chine dependent portion

Melbourne, University of

184

Available Technologies:Collective Memory Transfers for ...  

APPLICATIONS OF TECHNOLOGY: High Performance Computing (HPC) Big Data processing and analysis; Processor manufacturers; Memory module manufacturers

185

Battelle Memorial Institute Technology Marketing Summaries ...  

... applications and industries, and development stage. Battelle Memorial ... Typical existing armor for vehicles uses rigid plates of steel.

186

NIST Demonstrates Better Memory with Quantum Computer ...  

Science Conference Proceedings (OSTI)

... to demonstrate a quantum physics version of computer memory lasting ... prospects for making practical, reliable quantum computers (which make ...

2013-01-03T23:59:59.000Z

187

Beyond long memory in heart rate variability: An approach based on fractionally integrated autoregressive moving average time series models with conditional heteroscedasticity  

Science Conference Proceedings (OSTI)

Heart Rate Variability (HRV) series exhibit long memory and time-varying conditional variance. This work considers the Fractionally Integrated AutoRegressive Moving Average (ARFIMA) models with Generalized AutoRegressive Conditional Heteroscedastic (GARCH) errors. ARFIMA-GARCH models may be used to capture and remove long memory and estimate the conditional volatility in 24 h HRV recordings. The ARFIMA-GARCH approach is applied to fifteen long term HRV series available at Physionet

2013-01-01T23:59:59.000Z

188

Shape memory polymer foams for endovascular therapies  

DOE Patents (OSTI)

A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

Wilson, Thomas S. (Castro Valley, CA); Maitland, Duncan J. (Pleasant Hill, CA)

2012-03-13T23:59:59.000Z

189

Specifying memory consistency of write buffer multiprocessors  

Science Conference Proceedings (OSTI)

Write buffering is one of many successful mechanisms that improves the performance and scalability of multiprocessors. However, it leads to more complex memory system behavior, which cannot be described using intuitive consistency models, such as Sequential ... Keywords: Memory consistency framework, alpha, coherence, partial store order, relaxed memory order, sequential consistency, sparc multiprocessors, total store order, write-buffer architectures

Lisa Higham; Lillanne Jackson; Jalal Kawash

2007-02-01T23:59:59.000Z

190

Multistable Circuits for Analog Memories Implementation  

Science Conference Proceedings (OSTI)

In this work two multistable circuits suitable for analog memories implementation will be presented. These circuits have been used to implement completely asynchronous analog memories, one type based on a flash converter and thus having a linear complexity ... Keywords: analog memories, asynchronous converters, successive approximations

Giorgio Biagetti; Massimo Conti; Simone Orcioni

2004-04-01T23:59:59.000Z

191

The Tempest approach to distributed shared memory  

Science Conference Proceedings (OSTI)

This paper summarizes how distributed shared memory (DSM) can be both efficiently and portably supported by the Tempest interface. Tempest is a collection of mechanisms for communication and synchronization in parallel programs. These mechanisms provide ... Keywords: Tempest, Tempest interface, distributed shared memory, message passing, parallel programs, shared memory

David A. Wood; Mark D. Hill; James R. Larus

1996-10-01T23:59:59.000Z

192

Algorithms and data structures for external memory  

Science Conference Proceedings (OSTI)

Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/output communication (or I/O) between fast internal memory and slower external memory (such as disks) can be a major performance ...

Jeffrey Scott Vitter

2008-01-01T23:59:59.000Z

193

Reducing memory sharing overheads in distributed JVMs  

Science Conference Proceedings (OSTI)

Distributed JVM systems by supporting Java’s shared-memory model enable concurrent Java applications to run transparently on clusters of computers. Aiming to reduce the overheads associated to memory coherence enforcement mechanisms required in ... Keywords: JVM, Java, cluster computing, concurrent Java applications, distributed shared memory, high-performance computing

Marcelo Lobosco; Orlando Loques; Claudio L. de Amorim

2005-09-01T23:59:59.000Z

194

Indiana Memorial Union Wells Library  

E-Print Network (OSTI)

Franklin Hall Bryan Hall Law Indiana Memorial Union Jordan Hall Morrison Hall Wells Library Loop (0.5 miles) IMU to Greenhouse (0.3 miles) Business to Law School (0.75 miles) Wells Library to Morrison Hall (0.5 miles) Wells Library to Muisc Library (0.4 miles) #12;

Indiana University

195

Bridging the memory access gap  

Science Conference Proceedings (OSTI)

The rapid growth of electronic data processing over the past two decades has been characterized by an almost insatiable appetite for larger and faster memories. In fact, over this period of time, on-line storage capacity has increased about three times ...

Dennis E. Speliotis

1975-05-01T23:59:59.000Z

196

Trapped-flux superconducting memory  

Science Conference Proceedings (OSTI)

A memory cell based on trapped flux in superconductors has been built and tested. The cell is constructed entirely by vacuum evaporation of thin films and can be selected by coincident current or by other techniques, with drive-current requirements less ...

J. W. Crowe

1957-10-01T23:59:59.000Z

197

A Nonlinear Generalized Additive Error Model of Production and Cost  

E-Print Network (OSTI)

Additive Error Model of Production and Cost by Quirino ParisError Model of Production and Cost Quirino Paris* UniversityAdditive Error Model of Production and Cost I. Introduction

Paris, Quirino; Caputo, Michael R.

2004-01-01T23:59:59.000Z

198

A systems approach to reducing utility billing errors  

E-Print Network (OSTI)

Many methods for analyzing the possibility of errors are practiced by organizations who are concerned about safety and error prevention. However, in situations where the error occurrence is random and difficult to track, ...

Ogura, Nori

2013-01-01T23:59:59.000Z

199

Evolutionary Algorithm-Based Error Parameterization Methods for Data Assimilation  

Science Conference Proceedings (OSTI)

The methods of parameterizing model errors have a substantial effect on the accuracy of ensemble data assimilation. After a review of the current error-handling methods, a new blending error parameterization method was designed to combine the ...

Yulong Bai; Xin Li

2011-08-01T23:59:59.000Z

200

Explicitly Accounting for Observation Error in Categorical Verification of Forecasts  

Science Conference Proceedings (OSTI)

Given an accurate representation of errors in observations it is possible to remove the effect of those errors from categorical verification scores. The errors in the observations are treated as additive white noise that is statistically ...

Neill E. Bowler

2006-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

ERROR COMPENSATOR FOR A POSITION TRANSDUCER  

DOE Patents (OSTI)

A device is designed for eliminating the effect of leadscrew errors in positioning machines in which linear motion of a slide is effected from rotary motion of a leadscrew. This is accomplished by providing a corrector cam mounted on the slide, a cam follower, and a transducer housing rotatable by the follower to compensate for all the reproducible errors in the transducer signal which can be related to the slide position. The transducer has an inner part which is movable with respect to the transducer housing. The transducer inner part is coupled to the means for rotating the leadscrew such that relative movement between this part and its housing will provide an output signal proportional to the position of the slide. The corrector cam and its follower perform the compensation by changing the angular position of the transducer housing by an amount that is a function of the slide position and the error at that position. (AEC)

Fowler, A.H.

1962-06-12T23:59:59.000Z

202

Minimum error discrimination of Pauli channels  

E-Print Network (OSTI)

We solve the problem of discriminating with minimum error probability two given Pauli channels. We show that, differently from the case of discrimination between unitary transformations, the use of entanglement with an ancillary system can strictly improve the discrimination, and any maximally entangled state allows to achieve the optimal discrimination. We also provide a simple necessary and sufficient condition in terms of the structure of the channels for which the ultimate minimum error probability can be achieved without entanglement assistance. When such a condition is satisfied, the optimal input state is simply an eigenstate of one of the Pauli matrices.

Massimiliano F. Sacchi

2005-06-09T23:59:59.000Z

203

Laser Phase Errors in Seeded FELs  

Science Conference Proceedings (OSTI)

Harmonic seeding of free electron lasers has attracted significant attention from the promise of transform-limited pulses in the soft X-ray region. Harmonic multiplication schemes extend seeding to shorter wavelengths, but also amplify the spectral phase errors of the initial seed laser, and may degrade the pulse quality. In this paper we consider the effect of seed laser phase errors in high gain harmonic generation and echo-enabled harmonic generation. We use simulations to confirm analytical results for the case of linearly chirped seed lasers, and extend the results for arbitrary seed laser envelope and phase.

Ratner, D.; Fry, A.; Stupakov, G.; White, W.; /SLAC

2012-03-28T23:59:59.000Z

204

Underestimating Costs in Public Works Projects: Error or Lie?  

E-Print Network (OSTI)

1964). Errors in project cost estimates. Indian Eco- nomicSystematic errors in cost estimates for public investmentprojects compare in cost estimate experience? (Reprint No.

Flyvbjerg, Bent; Holm, Mette Skamris; Buhl, Søren

2006-01-01T23:59:59.000Z

205

U-058: Apache Struts Conversion Error OGNL Expression Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Apache Struts Conversion Error OGNL Expression Injection Vulnerability U-058: Apache Struts Conversion Error OGNL Expression Injection Vulnerability December 12, 2011 - 9:00am...

206

Experts Recommend Measures to Reduce Human Error in ...  

Science Conference Proceedings (OSTI)

... 34 recommendations addressing the problems resulting from ... is understood that some human error is inevitable ... that openness about errors leads to ...

2012-02-21T23:59:59.000Z

207

GenERRate: generating errors for use in grammatical error detection  

Science Conference Proceedings (OSTI)

This paper explores the issue of automatically generated ungrammatical data and its use in error detection, with a focus on the task of classifying a sentence as grammatical or ungrammatical. We present an error generation tool called GenERRate and show ...

Jennifer Foster; Øistein E. Andersen

2009-06-01T23:59:59.000Z

208

Modeling Human Error For Experimentation, Training, And Error-Tolerant Design  

E-Print Network (OSTI)

Human error in computer systems has been blamed for many military and civilian catastrophes resulting in mission failure and loss of money and lives. However, the root cause of such failures often lies in the system’s design. A central theme in designing for human-error tolerance is to build a multi-layered defense. Creating such a robust system requires that designers effectively manage several aspects of erroneous system usage: prevention, reduction, detection, identification, recovery, and mitigation. These also correspond to discrete stages before and after error occurrence where different defensive measures can be taken. Human error models can be used to better understand these stages, the underlying cognitive mechanisms responsible for errors, and ultimately how to design systems and training to reduce the effects of inherent human limitations. This paper presents a general framework for human error recovery based on five key stages of erroneous performance: the commission of an error, its detection, identification, and correction, and resumption of the original task. These stages constitute the main components of a state model that characterizes human performance, and allows designers and trainers comprehensively address the most important aspects of error-tolerant design. Furthermore, these performance stages can be modeled computationally, to varying degrees, using standard information processing architectures. This work also demonstrates the effectiveness of a technique using GOMS models to design systems to

Scott D. Wood; David E. Kieras

2002-01-01T23:59:59.000Z

209

Error resilient video streaming for heterogeneous networks  

Science Conference Proceedings (OSTI)

We consider the problem of video streaming for a critical private web cast, for a medium sized audience with heterogeneous nodes having different bandwidths and reliabilities. The nodes can distribute video in a peer-to-peer manner by forming a multicast ... Keywords: error resilience, multiple description coding (MDC), path diversity, video streaming

Divyashikha Sethia; Huzur Saran

2006-12-01T23:59:59.000Z

210

Regularities and their relations to error bounds  

Science Conference Proceedings (OSTI)

In this paper, we mainly study various notions of regularity for a finite collection {C1,?,Cm} of closed convex subsets of a Banach space X and their relations with other fundamental concepts. ... Keywords: error bound, graph, linearly regular, multifunction, normal cone, positive linear functional, property (G), regular, strong CHIP, tangent cone

Kung Fu Ng; Wei Hong Yang

2004-04-01T23:59:59.000Z

211

Error bounds of certain Gaussian quadrature formulae  

Science Conference Proceedings (OSTI)

We study the kernel of the remainder term of Gauss quadrature rules for analytic functions with respect to one class of Bernstein-Szego weight functions. The location on the elliptic contours where the modulus of the kernel attains its maximum value ... Keywords: Analytic function, Elliptic contour, Error bound, Gauss quadrature, Kernel, Remainder term, primary, secondary

Miodrag M. Spalevi?; Miroslav S. Prani?

2010-06-01T23:59:59.000Z

212

Explaining ML type errors by data flows  

Science Conference Proceedings (OSTI)

We present a novel approach to explaining ML type errors: Since the type system inhibits data flows that would abort the program at run-time, our type checker identifies as explanations those data flows that violate the typing rules. It also detects ...

Holger Gast

2004-09-01T23:59:59.000Z

213

Collective error detection for MPI collective operations  

Science Conference Proceedings (OSTI)

An MPI profiling library is a standard mechanism for intercepting MPI calls by applications. Profiling libraries are so named because they are commonly used to gather performance data on MPI programs. Here we present a profiling library whose purpose ... Keywords: MPI, collective, datatype, errors, hashing

Chris Falzone; Anthony Chan; Ewing Lusk; William Gropp

2005-09-01T23:59:59.000Z

214

Analysis of Solar Two Heliostat Tracking Error Sources  

DOE Green Energy (OSTI)

This paper explores the geometrical errors that reduce heliostat tracking accuracy at Solar Two. The basic heliostat control architecture is described. Then, the three dominant error sources are described and their effect on heliostat tracking is visually illustrated. The strategy currently used to minimize, but not truly correct, these error sources is also shown. Finally, a novel approach to minimizing error is presented.

Jones, S.A.; Stone, K.W.

1999-01-28T23:59:59.000Z

215

Distribution of Wind Power Forecasting Errors from Operational Systems (Presentation)  

SciTech Connect

This presentation offers new data and statistical analysis of wind power forecasting errors in operational systems.

Hodge, B. M.; Ela, E.; Milligan, M.

2011-10-01T23:59:59.000Z

216

Error Notification, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Frequently Searched For Frequently Searched For Helpdesk Home Web Services BNL Site Index Can't View PDFs? Need Help Helpdesk Homepage Call the Helpdesk for 24x7 support Bus: 631.344.5522 Fax: 631-344-2140 Email: itdhelp@bnl.gov HTTP Error Forbidden: Page Access Rejected You are not authorized to view this page - This error is caused when the server has a list of IP addresses that are not allowed to access the site, and the IP address you are using is in this list. If the problem persists or if you believe you should be able to view this directory or page, please contact the Web server's administrator or call the Helpdesk by using the email address or phone number listed below. Some reasons for getting this notice: All people outside of the BNL Domain (130.199.0.0) will get this notice.

217

Error Notification, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Frequently Searched For Frequently Searched For Helpdesk Home Application Services BNL Site Index Can't View PDFs? Need Help Helpdesk Homepage Call the Helpdesk for 24x7 support Bus: 631.344.5522 Fax: 631-344-2140 Email: itdhelp@bnl.gov HTTP Error Forbidden: Page Access Rejected You are not authorized to view this page - This error is caused when the server has a list of IP addresses that are not allowed to access the site, and the IP address you are using is in this list. If the problem persists or if you believe you should be able to view this directory or page, please contact the Web server's administrator or call the Helpdesk by using the email address or phone number listed below. Some reasons for getting this notice: All people outside of the BNL Domain (130.199.0.0) will get this notice.

218

Improved Error Bounds for the Adiabatic Approximation  

E-Print Network (OSTI)

Since the discovery of adiabatic quantum computing, a need has arisen for rigorously proven bounds for the error in the adiabatic approximation. We present in this paper, a rigorous and elementary derivation of upper and lower bounds on the error incurred from using the adiabatic approximation for quantum systems. Our bounds are often asymptotically tight in the limit of slow evolution for fixed Hamiltonians, and are used to provide sufficient conditions for the application of the adiabatic approximation. We show that our sufficiency criteria exclude the Marzlin--Sanders counterexample from the class of Hamiltonians that obey the adiabatic approximation. Finally, we demonstrate the existence of classes of Hamiltonians that resemble the Marzlin--Sanders counterexample Hamiltonian, but also obey the adiabatic approximation.

Cheung, Donny; Wiebe, Nathan

2011-01-01T23:59:59.000Z

219

Disaggregated memory for expansion and sharing in blade servers  

Science Conference Proceedings (OSTI)

Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contributed by memory systems to total datacenter costs and power consumption during ... Keywords: disaggregated memory, memory blades, memory capacity expansion, power and cost efficiencies

Kevin Lim; Jichuan Chang; Trevor Mudge; Parthasarathy Ranganathan; Steven K. Reinhardt; Thomas F. Wenisch

2009-06-01T23:59:59.000Z

220

Architecture extensions for efficient management of scratch-pad memory  

Science Conference Proceedings (OSTI)

Nowadays, many embedded processors include in their architecture on-chip static memories, so called scratch-pad memories (SPM). Compared to cache, these memories do not require complex control logic, thus resulting in increased efficiency both in silicon ... Keywords: embedded processors, memory architecture, scratch-pad memory

José V. Busquets-Mataix; Carlos Catalá; Antonio Martí-Campoy

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Introspection-based memory de-duplication and migration  

Science Conference Proceedings (OSTI)

Memory virtualization abstracts a physical machine's memory resource and presents to the virtual machines running on it a piece of physical memory that could be shared, compressed and moved. To optimize the memory resource utilization by fully leveraging ... Keywords: introspection, memory de-duplication, vm migration

Jui-Hao Chiang; Han-Lin Li; Tzi-cker Chiueh

2013-03-01T23:59:59.000Z

222

Experiments with Memory-to-Memory Coupling for End-to-End Fusion Simulation Workflows  

Science Conference Proceedings (OSTI)

Scientific applications are striving to accurately simulate multiple interacting physical processes that comprise complex phenomena being modeled. Efficient and scalable parallel implementations of these coupled simulations present challenging interaction ... Keywords: coupling, memory-to-memory, rdma, workflows

Ciprian Docan; Fan Zhang; Manish Parashar; Julian Cummings; Norbert Podhorszki; Scott Klasky

2010-05-01T23:59:59.000Z

223

MEASUREMENTS, ERRORS, AND NEGATIVE KINETIC ENERGY  

E-Print Network (OSTI)

An analysis of errors in measurement yields new insight into the penetration of quantum particles into classically forbidden regions. In addition to “physical” values, realistic measurements yield “unphysical ” values which, we show, can form a consistent pattern. An experiment to isolate a particle in a classically forbidden region obtains negative values for its kinetic energy. These values realize the concept of a weak value, discussed in previous works. 0

Yakir Aharonov; Sandu Popescu; Daniel Rohrlich; Lev Vaidman

1993-01-01T23:59:59.000Z

224

Minimal Achievable Error in the LED problem  

E-Print Network (OSTI)

This paper presents a theoretical model to predict the minimal achievable error, given a noise ratio #, in the LED data set problem. The motivation for developing this theoretical model is to understand and explain some of the results that di#erent systems achieve when they solve the LED problem. Moreover, given a new learning algorithm that solves the LED problem, we can now bound its optimal generalization accuracy.

Xavier Llora; Xavier Llora; David E. Goldberg; David E. Goldberg

2002-01-01T23:59:59.000Z

225

Systematic errors in long baseline oscillation experiments  

Science Conference Proceedings (OSTI)

This article gives a brief overview of long baseline neutrino experiments and their goals, and then describes the different kinds of systematic errors that are encountered in these experiments. Particular attention is paid to the uncertainties that come about because of imperfect knowledge of neutrino cross sections and more generally how neutrinos interact in nuclei. Near detectors are planned for most of these experiments, and the extent to which certain uncertainties can be reduced by the presence of near detectors is also discussed.

Harris, Deborah A.; /Fermilab

2006-02-01T23:59:59.000Z

226

Continuous-time quantum error correction  

E-Print Network (OSTI)

Continuous-time quantum error correction (CTQEC) is an approach to protecting quantum information from noise in which both the noise and the error correcting operations are treated as processes that are continuous in time. This chapter investigates CTQEC based on continuous weak measurements and feedback from the point of view of the subsystem principle, which states that protected quantum information is contained in a subsystem of the Hilbert space. We study how to approach the problem of constructing CTQEC protocols by looking at the evolution of the state of the system in an encoded basis in which the subsystem containing the protected information is explicit. This point of view allows us to reduce the problem to that of protecting a known state, and to design CTQEC procedures from protocols for the protection of a single qubit. We show how previously studied CTQEC schemes with both direct and indirect feedback can be obtained from strategies for the protection of a single qubit via weak measurements and weak unitary operations. We also review results on the performance of CTQEC with direct feedback in cases of Markovian and non-Markovian decoherence, where we have shown that due to the existence of a Zeno regime in non-Markovian dynamics, the performance of CTQEC can exhibit a quadratic improvement if the time resolution of the weak error-correcting operations is high enough to reveal the non-Markovian character of the noise process.

Ognyan Oreshkov

2013-11-11T23:59:59.000Z

227

What Scientific Applications can Benefit from Hardware Transactional Memory?  

Science Conference Proceedings (OSTI)

Achieving efficient and correct synchronization of multiple threads is a difficult and error-prone task at small scale and, as we march towards extreme scale computing, will be even more challenging when the resulting application is supposed to utilize millions of cores efficiently. Transactional Memory (TM) is a promising technique to ease the burden on the programmer, but only recently has become available on commercial hardware in the new Blue Gene/Q system and hence the real benefit for realistic applications has not been studied, yet. This paper presents the first performance results of TM embedded into OpenMP on a prototype system of BG/Q and characterizes code properties that will likely lead to benefits when augmented with TM primitives. We first, study the influence of thread count, environment variables and memory layout on TM performance and identify code properties that will yield performance gains with TM. Second, we evaluate the combination of OpenMP with multiple synchronization primitives on top of MPI to determine suitable task to thread ratios per node. Finally, we condense our findings into a set of best practices. These are applied to a Monte Carlo Benchmark and a Smoothed Particle Hydrodynamics method. In both cases an optimized TM version, executed with 64 threads on one node, outperforms a simple TM implementation. MCB with optimized TM yields a speedup of 27.45 over baseline.

Schindewolf, M; Bihari, B; Gyllenhaal, J; Schulz, M; Wang, A; Karl, W

2012-06-04T23:59:59.000Z

228

Rotary actuator utilizing a shape memory alloy  

SciTech Connect

An apparatus is described comprising; (a) rotary accumulator means for accumulating a length of a shape memory alloy wire; (b) the shape memory alloy wire attached at one end to a point fixed with respect to the rotary accumulator means and attached at a second end to the rotary accumulator means; (c) biasing means for biasing the rotary accumulator means to a first position; and (d) means for heating the shape memory alloy wire to cause the shape memory alloy wire to contract, thereby rotating the rotary accumulator means from the first position to a second position.

Bloch, J.T.

1988-08-09T23:59:59.000Z

229

Characterization of Shape Memory Alloys: Deformation Behavior  

Science Conference Proceedings (OSTI)

Feb 28, 2011... expected that NiTi shape memory alloys (SMA) actuators would provide simple and light weight replacements for controlling chevron-shaped ...

230

ON EFFICIENTLY COMBINING LIMITED MEMORY AND TRUST ...  

E-Print Network (OSTI)

... Euclidean norm with an insignificant computational overhead compared with the cost of computing the quasi-Newton direction in line-search limited memory ...

231

Determining Memory Use | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Allinea DDT Core File Settings Determining Memory Use Using VNC with a Debugger bgqstack gdb Coreprocessor TotalView on BGQ Systems Performance Tools & APIs Software & Libraries...

232

Exploiting Data Similarity to Reduce Memory Footprints  

SciTech Connect

Memory size has long limited large-scale applications on high-performance computing (HPC) systems. Since compute nodes frequently do not have swap space, physical memory often limits problem sizes. Increasing core counts per chip and power density constraints, which limit the number of DIMMs per node, have exacerbated this problem. Further, DRAM constitutes a significant portion of overall HPC system cost. Therefore, instead of adding more DRAM to the nodes, mechanisms to manage memory usage more efficiently - preferably transparently - could increase effective DRAM capacity and thus the benefit of multicore nodes for HPC systems. MPI application processes often exhibit significant data similarity. These data regions occupy multiple physical locations across the individual rank processes within a multicore node and thus offer a potential savings in memory capacity. These regions, primarily residing in heap, are dynamic, which makes them difficult to manage statically. Our novel memory allocation library, SBLLmalloc, automatically identifies identical memory blocks and merges them into a single copy. SBLLmalloc does not require application or OS changes since we implement it as a user-level library. Overall, we demonstrate that SBLLmalloc reduces the memory footprint of a range of MPI applications by 32.03% on average and up to 60.87%. Further, SBLLmalloc supports problem sizes for IRS over 21.36% larger than using standard memory management techniques, thus significantly increasing effective system size. Similarly, SBLLmalloc requires 43.75% fewer nodes than standard memory management techniques to solve an AMG problem.

Biswas, S; de Supinski, B R; Schulz, M; Franklin, D; Sherwood, T; Chong, F T

2011-01-28T23:59:59.000Z

233

Memory resource management in vmware esx server  

E-Print Network (OSTI)

VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified commodity operating systems. This paper introduces several novel ESX Server mechanisms and policies for managing memory. A ballooning technique reclaims the pages considered least valuable by the operating system running in a virtual machine. An idle memory tax achieves efficient memory utilization while maintaining performance isolation guarantees. Content-based page sharing and hot I/O page remapping exploit transparent page remapping to eliminate redundancy and reduce copying overheads. These techniques are combined to efficiently support virtual machine workloads that overcommit memory. 1

Carl A. Waldspurger

2002-01-01T23:59:59.000Z

234

Memorandum Memorializing Ex Parte Communication - August 12,...  

NLE Websites -- All DOE Office Websites (Extended Search)

Memorandum Memorializing Ex Parte Communication - August 12, 2011 On August 9, 2011, the Air-Conditioning, Heating and Refrigeration Institute's (AHRI) Unitary Small Engineering...

235

Julian Szekely Memorial Symposium Rental Car Information  

Science Conference Proceedings (OSTI)

The Julian Szekely Memorial Symposium on Materials Processing will be held at the Royal Sonesta Hotel in Cambridge, Massachusetts, October 5-8, 1997.

236

Models on Distributed Memory Architectures  

NLE Websites -- All DOE Office Websites (Extended Search)

5/2004 Y.He 1 5/2004 Y.He 1 MPH: a Library for Coupling Multi-Component Models on Distributed Memory Architectures and its Applications Yun (Helen) He and Chris Ding CRD Division Lawrence Berkeley National Laboratory 10/15/2004 Y.He 2 10/15/2004 Y.He 3 Motivation n Application problems grow in scale & complexity n Effective organization of simulation software system that is maintainable, reusable, sharable, and efficient è a major issue n Community Climate System Model (CCSM) development n Software lasts much longer than a computer! 10/15/2004 Y.He 4

237

A DSL approach for object memory management of small devices  

Science Conference Proceedings (OSTI)

Small devices have a specific hardware configuration. In particular, they usually include several types of memories (typically ROM, internal and external RAM, Flash memory) different in quantities and properties. We propose an object memory management ...

Kevin Marquet; Gilles Grimaud

2007-09-01T23:59:59.000Z

238

Distributed anemone: transparent low-latency access to remote memory  

Science Conference Proceedings (OSTI)

Performance of large memory applications degrades rapidly once the system hits the physical memory limit and starts paging to local disk. We present the design, implementation and evaluation of Distributed Anemone (Adaptive Network Memory Engine) ...

Michael R. Hines; Jian Wang; Kartik Gopalan

2006-12-01T23:59:59.000Z

239

Error Reduction for Weigh-In-Motion  

Science Conference Proceedings (OSTI)

Federal and State agencies need certifiable vehicle weights for various applications, such as highway inspections, border security, check points, and port entries. ORNL weigh-in-motion (WIM) technology was previously unable to provide certifiable weights, due to natural oscillations, such as vehicle bouncing and rocking. Recent ORNL work demonstrated a novel filter to remove these oscillations. This work shows further filtering improvements to enable certifiable weight measurements (error < 0.1%) for a higher traffic volume with less effort (elimination of redundant weighing).

Hively, Lee M [ORNL; Abercrombie, Robert K [ORNL; Scudiere, Matthew B [ORNL; Sheldon, Frederick T [ORNL

2009-01-01T23:59:59.000Z

240

Shape memory polymer actuator and catheter  

SciTech Connect

An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

Maitland, Duncan J. (Pleasant Hill, CA); Lee, Abraham P. (Walnut Creek, CA); Schumann, Daniel L. (Concord, CA); Matthews, Dennis L. (Moss Beach, CA); Decker, Derek E. (Byron, CA); Jungreis, Charles A. (Pittsburgh, PA)

2007-11-06T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Quantifying Dynamic Stability of Genetic Memory Circuits  

Science Conference Proceedings (OSTI)

Bistability/Multistability has been found in many biological systems including genetic memory circuits. Proper characterization of system stability helps to understand biological functions and has potential applications in fields such as synthetic biology. ... Keywords: Dynamic stability, genetic memory, gene circuit, dynamic noise margin.

Yong Zhang; Peng Li; Garng Huang

2012-05-01T23:59:59.000Z

242

Memory Fault Modeling Trends: A Case Study  

Science Conference Proceedings (OSTI)

In recent years, embedded memories are the fastest growing segment of system on chip. They therefore have a major impact on the overall Defect per Million (DPM). Further, the shrinking technologies and processes introduce new defects that cause previously ... Keywords: data backgrounds, dynamic faults, fault coverage, fault models, memory tests, static faults

Said Hamdioui; Rob Wadsworth; John Delos Reyes; Ad J. Van De Goor

2004-06-01T23:59:59.000Z

243

Optimizing memory accesses for spatial computation  

Science Conference Proceedings (OSTI)

In this paper we present the internal representation and optimizations used by the CASH compiler for improving the memory parallelism of pointer-based programs. CASH uses an SSA-based representation for memory, which compactly summarizes both control-flow-and ...

Mihai Budiu; Seth C. Goldstein

2003-03-01T23:59:59.000Z

244

Optimum LDPC decoder: a memory architecture problem  

Science Conference Proceedings (OSTI)

This paper addresses a frequently overlooked problem: designing a memory architecture for an LDPC decoder. We analyze the requirements to support the codes defined in the IEEE 802.11n and 802.16e standards. We show a design methodology for a flexible ... Keywords: LDPC codes, low power architectures, memory optimization

Erick Amador; Renaud Pacalet; Vincent Rezard

2009-07-01T23:59:59.000Z

245

DOE - Office of Legacy Management -- Memorial Hospital - NY 0...  

Office of Legacy Management (LM)

Memorial Hospital - NY 0-16 FUSRAP Considered Sites Site: MEMORIAL HOSPITAL (NY.0-16 ) Eliminated from consideration under FUSRAP Designated Name: Not Designated Alternate Name:...

246

Crystallographic Boundary in a Magnetic Shape Memory Material  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Science Highlights Science Briefs Crystallographic Boundary in a Magnetic Shape Memory Material Crystallographic Boundary in a Magnetic Shape Memory Material Print...

247

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised) Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised)...

248

Improving Organizational Memories Through User Feedback  

E-Print Network (OSTI)

The benefits of an organizational memory are ultimately determined by the usefulness of the organizational memory as perceived by its users. Therefore, an improvement of an organizational memory should be measured in the added perceived usefulness. Unfortunately, the perceived usefulness has many impact factors (e.g., the precision of the user query, the urgency with which the user needs information, the coverage of the underlying knowledge base, the quality of the schema used to store knowledge, and the quality of the implementation). Hence, it is difficult to identify good starting points for improvement. This paper presents the goal-oriented method OMI (Organizational Memory Improvement) for improving an organizational memory incrementally from the user's point of view. It has been developed through several case studies and consists of a general usage model, a set of indicators for improvement potential, and a cause-effect model. At each step of the general usage model of OMI, pro...

Klaus-Dieter Althoff; Markus Nick; Carsten Tautz

1999-01-01T23:59:59.000Z

249

Session Cookie Error, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Session Cookie Error Session Cookie Error We're Sorry, either you don't have Session Cookies enabled in your browser or your session has expired. Some functions in this site will not work properly without it enabled. Please enable session cookies, then go back and try again or close and re-open your browser to view these web pages correctly. What is a Cookie? What are Cookies used for? What are Persistent Cookies? What are Session Cookies? How can I control or enable which Cookies I want to accept? Need help? What is a Cookie? A "cookie" is a small piece of information that is sent by a web server to be stored on a web browser, so that it can later be read back from that browser the next time this unique visitor returns to that web server. This becomes useful for having the browser remember specific information about this visitor like location of their last visit, time spent, or user preferences (like style sheets). The cookie is a text file that is saved in the browser's directory and is stored in RAM while the browser is running. Also, the cookie may be stored on the computer's hard drive once you log off from that web site or web server.

250

Accounting for Model Errors in Ensemble Data Assimilation  

Science Conference Proceedings (OSTI)

This study addresses the issue of model errors with the ensemble Kalman filter. Observations generated from the NCEP–NCAR reanalysis fields are assimilated into a low-resolution AGCM. Without an effort to account for model errors, the performance ...

Hong Li; Eugenia Kalnay; Takemasa Miyoshi; Christopher M. Danforth

2009-10-01T23:59:59.000Z

251

Distributed Forcing of Forecast and Assimilation Error Systems  

Science Conference Proceedings (OSTI)

Temporally distributed deterministic and stochastic excitation of the tangent linear forecast system governing forecast error growth and the tangent linear observer system governing assimilation error growth is examined. The method used is to ...

Brian F. Farrell; Petros J. Ioannou

2005-02-01T23:59:59.000Z

252

Stability of error bounds for convex constraint systems in Banach ...  

E-Print Network (OSTI)

Jan 7, 2010 ... space X the error bound property is defined by the inequality ... is the error bound modulus [8]) (also known as conditioning rate [23]) of f at ¯x.

253

An Objective Method for Inferring Sources of Model Error  

Science Conference Proceedings (OSTI)

A restricted statistical correction (RSC) approach is introduced to assess the sources of error in general circulation models (GCMs). RSC models short-term forecast error by considering linear transformations of the GCM's forcing terms, which ...

Siegfried Schubert; Yehui Chang

1996-02-01T23:59:59.000Z

254

Forecast-Error Statistics for Homogeneous and Inhomogeneous Observation Networks  

Science Conference Proceedings (OSTI)

Objective analysis procedures such as statistical interpolation require reliable estimates of forecast-error statistics in order to optimize the analysis weights. Reasonably good estimates of the forecast-error statistics can be obtained from ...

Roger Daley

1992-04-01T23:59:59.000Z

255

Human error contribution to nuclear materials-handling events  

E-Print Network (OSTI)

This thesis analyzes a sample of 15 fuel-handling events from the past ten years at commercial nuclear reactors with significant human error contributions in order to detail the contribution of human error to fuel-handling ...

Sutton, Bradley (Bradley Jordan)

2007-01-01T23:59:59.000Z

256

Zero-error capacity of a quantum channel  

E-Print Network (OSTI)

We define the quantum zero-error capacity, a new kind of classical capacity of a noisy quantum channel. Moreover, the necessary requirement for which a quantum channel has zero-error capacity greater than zero is also given.

Rex A. C. Medeiros; Francisco M. de Assis

2004-03-26T23:59:59.000Z

257

Prediction of Consensus Tropical Cyclone Track Forecast Error  

Science Conference Proceedings (OSTI)

The extent to which the tropical cyclone (TC) track forecast error of a consensus model (CONU) routinely used by the forecasters at the National Hurricane Center can be predicted is determined. A number of predictors of consensus forecast error, ...

James S. Goerss

2007-05-01T23:59:59.000Z

258

Hidden Error Variance Theory. Part I: Exposition and Analytic Model  

Science Conference Proceedings (OSTI)

A conundrum of predictability research is that while the prediction of flow-dependent error distributions is one of its main foci, chaos fundamentally hides flow-dependent forecast error distributions from empirical observation. Empirical ...

Craig H. Bishop; Elizabeth A. Satterfield

2013-05-01T23:59:59.000Z

259

The Midlatitude Development of Regional Errors in a Global GCM  

Science Conference Proceedings (OSTI)

The growth of geographically confined errors is studied in six experiments with a five-level global spectral (rhomboidal 30) general circulation model. Each experiment consists of 36 identical twin integrations with the initial errors localized ...

David M. Straus

1993-08-01T23:59:59.000Z

260

Error Estimation Using Wavelet Analysis for Data Assimilation: EEWADAi  

Science Conference Proceedings (OSTI)

A new method is presented for estimating numerical errors in simulations as a function of space and time. This knowledge of numerical errors can provide critical information for the effective assimilation of external data. The new method utilizes ...

Leland Jameson; Takuji Waseda

2000-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

MEASURING LOCAL GRADIENT AND SKEW QUADRUPOLE ERRORS IN RHIC IRS.  

SciTech Connect

The measurement of local linear errors at RHIC interaction regions using an ''action and phase'' analysis of difference orbits has already been presented. This paper evaluates the accuracy of this technique using difference orbits that were taken when known gradient errors and skew quadrupole errors were intentionally introduced. It also presents action and phase analysis of simulated orbits when controlled errors are intentionally placed in a RHIC simulation model.

CARDONA,J.; PEGGS,S.; PILAT,R.; PTITSYN,V.

2004-07-05T23:59:59.000Z

262

Effects of uncertainties and errors on Lyapunov control  

E-Print Network (OSTI)

Lyapunov control (open-loop) is often confronted with uncertainties and errors in practical applications. In this paper, we analyze the robustness of Lyapunov control against the uncertainties and errors in quantum control systems. The analysis is carried out through examinations of uncertainties and errors, calculations of the control fidelity under influences of the certainties and errors, as well as discussions on the caused effects. Two examples, a closed control system and an open control system, are presented to illustrate the general formulism.

Yi, X X; Wu, Chunfeng; Oh, C H

2010-01-01T23:59:59.000Z

263

Unitary application of the quantum error correction codes  

E-Print Network (OSTI)

From the set of operators for errors and its correction code, we introduce the so-called complete unitary transformation. It can be used for encoding while the inverse of it can be applied for correcting the errors of the encoded qubit. We show that this unitary protocol can be applied for any code which satisfies the quantum error correction condition.

Xoaohua Wu; Bo You

2011-06-24T23:59:59.000Z

264

Coded DNA Self-Assembly for Error Detection/Location  

Science Conference Proceedings (OSTI)

This paper proposes a novel framework in which DNA self-assembly can be analyzed for error detection/ location. The proposed framework relies on coding and mapping functions that allow to establish the presence of erroneous bonded tiles based on the ... Keywords: Coding, Nano Manufacturing, Error Detection, Error Resilience

Zahra Mashreghian Arani; Masoud Hashempour; Fabrizio Lombardi

2009-10-01T23:59:59.000Z

265

Semantic errors in SQL queries: a quite complete list  

Science Conference Proceedings (OSTI)

We investigate classes of SQL queries which are syntactically correct, but certainly not intended, no matter for which task the query was written. For instance, queries that are contradictory, i.e. always return the empty set, are obviously not intended. ... Keywords: SQL, SQL exams, bugs, database courses, databases, errors, logical errors, queries, semantic errors, software correctness, static analysis, teaching

Stefan Brass; Christian Goldberg

2006-05-01T23:59:59.000Z

266

Error minimizing algorithms for nearest eighbor classifiers  

SciTech Connect

Stack Filters define a large class of discrete nonlinear filter first introd uced in image and signal processing for noise removal. In recent years we have suggested their application to classification problems, and investigated their relationship to other types of discrete classifiers such as Decision Trees. In this paper we focus on a continuous domain version of Stack Filter Classifiers which we call Ordered Hypothesis Machines (OHM), and investigate their relationship to Nearest Neighbor classifiers. We show that OHM classifiers provide a novel framework in which to train Nearest Neighbor type classifiers by minimizing empirical error based loss functions. We use the framework to investigate a new cost sensitive loss function that allows us to train a Nearest Neighbor type classifier for low false alarm rate applications. We report results on both synthetic data and real-world image data.

Porter, Reid B [Los Alamos National Laboratory; Hush, Don [Los Alamos National Laboratory; Zimmer, G. Beate [TEXAS A& M

2011-01-03T23:59:59.000Z

267

Graphical Quantum Error-Correcting Codes  

E-Print Network (OSTI)

We introduce a purely graph-theoretical object, namely the coding clique, to construct quantum errorcorrecting codes. Almost all quantum codes constructed so far are stabilizer (additive) codes and the construction of nonadditive codes, which are potentially more efficient, is not as well understood as that of stabilizer codes. Our graphical approach provides a unified and classical way to construct both stabilizer and nonadditive codes. In particular we have explicitly constructed the optimal ((10,24,3)) code and a family of 1-error detecting nonadditive codes with the highest encoding rate so far. In the case of stabilizer codes a thorough search becomes tangible and we have classified all the extremal stabilizer codes up to 8 qubits.

Sixia Yu; Qing Chen; C. H. Oh

2007-09-12T23:59:59.000Z

268

Asymmetric error field interaction with rotating conducting walls  

Science Conference Proceedings (OSTI)

The interaction of error fields with a system of differentially rotating conducting walls is studied analytically and compared to experimental data. Wall rotation causes eddy currents to persist indefinitely, attenuating and rotating the original error field. Superposition of error fields from external coils and plasma currents are found to break the symmetry in wall rotation direction. The vacuum and plasma eigenmodes are modified by wall rotation, with the error field penetration time decreased and the kink instability stabilized, respectively. Wall rotation is also predicted to reduce error field amplification by the marginally stable plasma.

Paz-Soldan, C.; Brookhart, M. I.; Hegna, C. C.; Forest, C. B. [Department of Physics, University of Wisconsin-Madison, Madison, Wisconsin 53706 (United States)

2012-07-15T23:59:59.000Z

269

Reasoning about human error by modeling cognition and interaction  

E-Print Network (OSTI)

In this paper we focus on system resilience from the perspective of understanding human error. In particular, we consider systematic cognitive slips, including postcompletion errors, which are persistent, though infrequent. We outline the findings from empirical studies that have identified various factors that provoke or mitigate against such errors. We then describe approaches we are pursuing to encapsulate these insights in ways that can be re-used within system design. More broadly, we argue that an understanding of the factors that influence the likelihood of such errors can support organizations in designing systems and processes to minimize the likelihood of such errors.

Ann Blandford; Jonathan Back; Paul Curzon; Simon Y. W. Li; Rimvydas Ruksenas

2006-01-01T23:59:59.000Z

270

A Quantum Information Retrieval Approach to Memory  

E-Print Network (OSTI)

As computers approach the physical limits of information storable in memory, new methods will be needed to further improve information storage and retrieval. We propose a quantum inspired vector based approach, which offers a contextually dependent mapping from the subsymbolic to the symbolic representations of information. If implemented computationally, this approach would provide exceptionally high density of information storage, without the traditionally required physical increase in storage capacity. The approach is inspired by the structure of human memory and incorporates elements of Gardenfors' Conceptual Space approach and Humphreys et al.'s matrix model of memory.

Kirsty Kitto; Peter Bruza; Liane Gabora

2013-10-11T23:59:59.000Z

271

Purify: Fast Detection of Memory Leaks and Access Errors This paper describes Purify, a software testing and quality assurance tool that detects memory leaks and  

E-Print Network (OSTI)

], Catalytix [Feuer85] and various similar malloc_debug packages use. Byte and two-byte checking cannot spent eliminating leaks in the X11R4 server for Sun workstations. All that effort, yet dozens of leaks as gcc. The data was collected on a Sun SPARCstation SLC running SUNOS 4.1.1, and all times are real

Qin, Feng

272

Crystallographic attributes of a shape-memory alloy  

SciTech Connect

Shape-memory alloys are attractive for many potential applications. In an attempt to provide ideas and guidelines for the development of new shape-memory alloys, this paper reports on a series of investigations that examine the reasons in the crystallography that made (i) shape-memory alloys special amongst martensites and (ii) Nickel-Titanium special among shape-memory alloys.

Bhattacharya, K. [California Inst. of Tech., Pasadena, CA (United States). Div. of Engineering and Applied Science

1999-01-01T23:59:59.000Z

273

L6: Memory Hierarchy Optimization III, Bandwidth Optimization  

E-Print Network (OSTI)

wherever there are capacity limitations ­ Between grids if total data exceeds global memory capacity will "spill" data to local memory · Local memory ­ Deals with capacity limitations of registers and shared ­ Across thread blocks if shared data exceeds shared memory capacity (also to partition computation across

Hall, Mary W.

274

Journal of Experimental Psychology: Learning, Memory, and Cognition  

E-Print Network (OSTI)

explicit and implicit tests of memory (for reviews, see Graf & Masson, 1993; Lewandosky, Dunn, & Kirsner

Shimamura, Arthur P.

275

Persistent systems techniques in forensic acquisition of memory  

Science Conference Proceedings (OSTI)

In this paper we discuss how operating system design and implementation influence the methodology for computer forensics investigations, with the focus on forensic acquisition of memory. In theory the operating system could support such investigations ... Keywords: Computer forensics, Memory acquisition, Memory forensics, Memory persistence, Persistent operating systems

Ewa Huebner; Derek Bem; Frans Henskens; Mark Wallis

2007-09-01T23:59:59.000Z

276

Memory energy management for an enterprise decision support system  

Science Conference Proceedings (OSTI)

Energy efficiency is an important factor in designing and configuring enterprise servers. In these servers, memory may consume 40% of the total system power. Different memory configurations (sizes, numbers of ranks, speeds, etc.) can have significant ... Keywords: memory power management, power-aware memory

Karthik Kumar; Kshitij Doshi; Martin Dimitrov; Yung-Hsiang Lu

2011-08-01T23:59:59.000Z

277

Architecting phase change memory as a scalable dram alternative  

Science Conference Proceedings (OSTI)

Memory scaling is in jeopardy as charge storage and sensing mechanisms become less reliable for prevalent memory technologies, such as DRAM. In contrast, phase change memory (PCM) storage relies on scalable current and thermal mechanisms. To exploit ... Keywords: dram alternative, endurance, energy, pcm, performance, phase change memory, power, scalability

Benjamin C. Lee; Engin Ipek; Onur Mutlu; Doug Burger

2009-06-01T23:59:59.000Z

278

Cork: dynamic memory leak detection for garbage-collected languages  

Science Conference Proceedings (OSTI)

A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap growth, degrading performance and resulting in program crashes after ... Keywords: dynamic, garbage collection, memory leak detection, memory leaks, runtime analysis

Maria Jump; Kathryn S. McKinley

2007-01-01T23:59:59.000Z

279

Characterizing the Memory Behavior of Compiler-Parallelized Applications  

Science Conference Proceedings (OSTI)

Abstract¿Compiler-parallelized applications are increasing in importance as moderate-scale multiprocessors become common. This paper evaluates how features of advanced memory systems (e.g., longer cache lines) impact memory system behavior for applications ... Keywords: Parallelizing compilers, memory hierarchies, shared-memory multiprocessors, cache performance, false and true sharing, parallelism granularity.

Evan Torrie; Margaret Martonosi; Chau-Wen Tseng; Mary W. Hall

1996-12-01T23:59:59.000Z

280

Dynamic tracking of page miss ratio curve for memory management  

Science Conference Proceedings (OSTI)

Memory can be efficiently utilized if the dynamic memory demands of applications can be determined and analyzed at run-time. The page miss ratio curve(MRC), i.e. page miss rate vs. memory size curve, is a good performance-directed metric to serve this ... Keywords: memory management, power management, resource allocation

Pin Zhou; Vivek Pandey; Jagadeesan Sundaresan; Anand Raghuraman; Yuanyuan Zhou; Sanjeev Kumar

2004-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Shared Memory Programming in Metacomputing Environments: The Global Array Approach  

Science Conference Proceedings (OSTI)

The performance of the Global Array shared-memory nonuniform memory-access programming model is explored in a wide-area-network (WAN) distributed supercomputer environment. The Global Array model is extended by introducing a concept of mirrored arrays ... Keywords: Metacomputing, NUMA memory architecture, distributed arrays, global arrays, shared-memory programming

Jarek Nieplocha; Robert Harrison

1997-10-01T23:59:59.000Z

282

On Working Memory: Its organization and capacity limits  

E-Print Network (OSTI)

64 iii 6.2 Working memory capacity10 1.4 Capacity limits of workingcapacity . . . . . . . . . . . . . . . . . . . . . . . . . .

Lara, Antonio Homero

2010-01-01T23:59:59.000Z

283

Why Has the Land Memory Changed?  

Science Conference Proceedings (OSTI)

The “land memory” refers to an interseasonal predictability of the summer monsoon rainfall in the southwestern United States, describing a relationship of the summer monsoon rainfall anomaly with anomalies in the antecedent winter season snow and ...

Qi Hu; Song Feng

2004-08-01T23:59:59.000Z

284

The Neural Substrate of Orientation Working Memory  

Science Conference Proceedings (OSTI)

We have used positron emission tomography (PET) to identify the neural substrate of two major cognitive components of working memory (WM), maintenance and manipulation of a single elementary visual attribute, i.e., the orientation of a grating presented ...

L. Cornette; P. Dupont; E. Salmon; Guy A. Orban

2001-08-01T23:59:59.000Z

285

30 days to a more powerful memory  

Science Conference Proceedings (OSTI)

With phones ringing off the hook, constantly changing to-do lists, and increasingly complicated schedules, having a good memory has become more important than ever. Drawing on the latest research from cognitive experts and psychologists, 30 Days to a ...

Gini Scott

2007-04-01T23:59:59.000Z

286

Revisiting parallel rendering for shared memory machines  

Science Conference Proceedings (OSTI)

Increasing the core count of CPUs to increase computational performance has been a significant trend for the better part of a decade. This has led to an unprecedented availability of large shared memory machines. Programming paradigms and systems are ...

B. Nouanesengsy; J. Ahrens; J. Woodring; H. Shen

2011-04-01T23:59:59.000Z

287

Commercialization of germanium based nanocrystal memory  

E-Print Network (OSTI)

This thesis explores the commercialization of germanium-based nanocrystal memories. Demand for smaller and faster electronics and embedded systems supports the development of high-density, low-power non-volatile electronic ...

Seow, Kian Chiew

2007-01-01T23:59:59.000Z

288

A strategy of memory : Suzhou, China  

E-Print Network (OSTI)

The thesis is trying to establish a strategy of memory for the urban preservation of old cities, like Suzhou, within the context of the rapid growing economy in Southern China. The general attitude towards the problem ...

Chang, Ping Hung

1995-01-01T23:59:59.000Z

289

Cultural differences on the children's memory scale  

E-Print Network (OSTI)

Memory is an essential component for learning. Deficits in verbal short-term memory (STM) and working memory (WM) are thought to hinder language learning, reading acquisition, and academic achievement. The Children’s Memory Scale (CMS) is an assessment instrument used to identify memory and learning deficits and strengths in children ages five through 16. This study investigated the impact of culture and parent educational level (PEL) on student performance on the Children’s Memory Scale using the CMS standardization data. The major question addressed was: Will CMS subtest performance differ significantly between ethnic groups or as a function of PEL? The results of this study support a relationship between STM and WM performance and culture. Culture as defined by ethnicity minimally impacted student subtest performance on the CMS when PEL was taken into account. In contrast, PEL was significantly associated with student subtest performance within each ethnic group. Student subtest performance improved with each increase in PEL regardless of ethnicity. CMS subtest performance of Hispanic and African American students was most affected by PEL; however, no difference occurred in subtest performance by ethnicity or as a function of PEL for African American and Hispanic students on the Family Pictures subtest which examines visual and auditory memory processes through recall of everyday life tasks in meaningful context. Although statistical significance was found between CMS subtest performance and cultural factors, the effect sizes were mainly in the small range and variance was not specific to any one subtest. Larger effect sizes were found on verbal subtests which in previous studies have been found to be most impacted by quality of schooling and lower PELs. Mean score differences did not exceed one standard deviation with the exception of one subtest. The results of this study provide a better understanding of the effect of culture and PEL on memory and learning.

Cash, Deborah Dyer

2007-08-01T23:59:59.000Z

290

Distributed trace using central performance counter memory  

SciTech Connect

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L.; Sexton, James C.

2013-01-22T23:59:59.000Z

291

Distributed trace using central performance counter memory  

Science Conference Proceedings (OSTI)

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L; Sexton, James C

2013-10-22T23:59:59.000Z

292

Error Covariance Modeling in the GMAO Ocean Ensemble Kalman Filter  

Science Conference Proceedings (OSTI)

In practical applications of the ensemble Kalman filter (EnKF) for ocean data assimilation, the computational burden and memory limitations usually require a trade-off between ensemble size and model resolution. This is certainly true for the ...

Christian L. Keppenne; Michele M. Rienecker; Jossy P. Jacob; Robin Kovach

2008-08-01T23:59:59.000Z

293

Merchant Commodity Storage and Term Structure Model Error  

E-Print Network (OSTI)

Merchants operations involves valuing and hedging the cash flows of commodity and energy conversion assets as real options based on stochastic models that inevitably embed model error. In this paper we quantify how empirically calibrated model errors about the futures price term structure affect the valuation and hedging of commodity storage assets, specifically the storage of natural gas, an important energy source. We also explore ways to mitigate the impact of these errors. Our analysis demonstrates the differential impact of term structure model error on natural gas storage valuation versus hedging. We also propose an effective approach to deal with the negative effect of such model error on factor hedging, a specific hedging approach. More generally, our work suggests managerial principles for option valuation and hedging in the presence of term structure model error. These principles should have relevance for the merchant management of other commodity conversion assets and for the management of financial options that also depend on term structure dynamics

Nicola Secom; Guoming Lai; François Margot; Alan Scheller-wolf

2011-01-01T23:59:59.000Z

294

Electoral Corruption in Developing Democracies  

E-Print Network (OSTI)

Results . . . . . 5.2 Venezuela . . . . . . . . .5.2.1Results for each Forensic Analysis in Mexico, Venezuela andelections in Venezuela. . . . . . . . . . . . . . . . . . .

Cantu, Francisco

295

Running jobs error: "inet_arp_address_lookup"  

NLE Websites -- All DOE Office Websites (Extended Search)

maintenance, users reporting get the error message similar as follows occassionaly: PE456:inetarpaddresslookup:Failed to read output of sbinarp -a -i ipogif0 command. Try...

296

Historical Ocean Subsurface Temperature Analysis with Error Estimates  

Science Conference Proceedings (OSTI)

An objective analysis of monthly ocean subsurface temperatures from 1950 to 1998 is carried out. The analysis scheme and the results with estimated analysis errors are presented.

Masayoshi Ishii; Masahide Kimoto; Misako Kachi

2003-01-01T23:59:59.000Z

297

Loaded Transmission Error Measurement System for Spur and Helical Gears.  

E-Print Network (OSTI)

??The majority of loaded static transmission error test stands developed in the past had little success generating accurate results versus analytical predictions for parallel-axis gearing.… (more)

Wright, Zachary Harrison

2009-01-01T23:59:59.000Z

298

Generic Error Model of Human-Robot Interaction  

E-Print Network (OSTI)

Wrong human-robot interactions are at the origin of severe damages. Safety requirements ask the analysis of these interactions. At first, erroneous interactions have to be identified. In this paper, we propose to use UML (Unified Modeling Language) to specify human robot interaction. Then, generic error models, associated with the message feature provided by UML, are presented. These error models allow interaction errors to be automatically deduced from the modeling of the human-robot interactions. The use of these generic error models is illustrated on a medical robot for teleechography.

J. Guiochet; et al.

2004-01-01T23:59:59.000Z

299

ERROR BOUNDS FOR VECTOR-VALUED FUNCTIONS ON ...  

E-Print Network (OSTI)

referred to the survey papers by Azé [2], Lewis & Pang [25], Pang [33], as well as the book by Auslender & Teboule [1]. Numerous characterizations of the error ...

300

Use of Quantum Error Coding in a 4-Blade Neutron ...  

Science Conference Proceedings (OSTI)

Use of Quantum Error Coding in a 4-Blade Neutron Interferometer. Summary: ... Figure 1: A schematic diagram of the 5-blade neutron interferometer. ...

2013-07-30T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

NIST Achieves Record-Low Error Rate for Quantum ...  

Science Conference Proceedings (OSTI)

... The horizontal and vertical lines separate gold electrodes, which are tuned to ... errors caused by instability in laser beam pointing and power, as well ...

2011-08-30T23:59:59.000Z

302

Memory access scheduling and binding considering energy minimization in multi-bank memory systems  

Science Conference Proceedings (OSTI)

Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g., active, standby, nap, power-down) to facilitate energy saving. Furthermore, ... Keywords: binding, low energy design, scheduling

Chun-Gi Lyuh; Taewhan Kim

2004-06-01T23:59:59.000Z

303

Shape memory system with integrated actuation using embedded particles  

SciTech Connect

A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

2009-09-22T23:59:59.000Z

304

Shape memory system with integrated actuation using embedded particles  

DOE Patents (OSTI)

A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

2012-05-29T23:59:59.000Z

305

Compile-Time Compaction Of Traces For Memory Simulation  

E-Print Network (OSTI)

This thesis examines compile-time compaction of program execution traces. It presents a new method for compacting traces for memory simulation. Further, it describes a tool prototype that implements the method. Experiments with the tool prototype show that the new method reduces the time needed in simulating the operation of memories. Memory simulation is needed in the performance analysis and in the design of programs. In high performance applications, the data transfer between different layers of memory is one of the main bottlenecks. A program execution trace is a list of memory references. Using traces as simulation inputs is a flexible way of analyzing the memory perfor...

Vesa Hirvisalo; Vesa Hirvisalo; Dr. Tech Esko Nuutila

1998-01-01T23:59:59.000Z

306

The capacity of hybrid quantum memory  

E-Print Network (OSTI)

The general stable quantum memory unit is a hybrid consisting of a classical digit with a quantum digit (qudit) assigned to each classical state. The shape of the memory is the vector of sizes of these qudits, which may differ. We determine when N copies of a quantum memory A embed in N(1+o(1)) copies of another quantum memory B. This relationship captures the notion that B is as at least as useful as A for all purposes in the bulk limit. We show that the embeddings exist if and only if for all p >= 1, the p-norm of the shape of A does not exceed the p-norm of the shape of B. The log of the p-norm of the shape of A can be interpreted as the maximum of S(\\rho) + H(\\rho)/p (quantum entropy plus discounted classical entropy) taken over all mixed states \\rho on A. We also establish a noiseless coding theorem that justifies these entropies. The noiseless coding theorem and the bulk embedding theorem together say that either A blindly bulk-encodes into B with perfect fidelity, or A admits a state that does not visibly bulk-encode into B with high fidelity. In conclusion, the utility of a hybrid quantum memory is determined by its simultaneous capacity for classical and quantum entropy, which is not a finite list of numbers, but rather a convex region in the classical-quantum entropy plane.

Greg Kuperberg

2002-03-21T23:59:59.000Z

307

Organic Data Memory using the DNA Approach  

Science Conference Proceedings (OSTI)

A data preservation problem looms large behind today's information superhighway. During the prehistoric age, humans preserved their knowledge by engraving bones and rocks. About two millenniums ago, people invented paper and started writing and publishing. In today?s electronic age, we use magnetic media and silicon chips to store our data. But bones and rocks erode, paper disintegrates, and electronic memory simply loses its contents into thin air. All these storage media require constant attention to maintain their information content. All of them can easily be destroyed intentionally or accidentally by people or natural disasters. With the large amount of information generated by our society every day, it is time to think of a new generation of data memory. In an effort to search for an inexpensive and lasting data memory, scientists at the Pacific Northwest National Laboratory (PNNL) have investigated the use of deoxyribonucleic acid--commonly known as DNA--as an information storage medium since 1998. The ambitious goal is to develop a data memory technology that has a life expectancy much longer than any of the existing ones. The creation of our initial DNA memory prototype consists of four major steps: encoding meaningful information as artificial DNA sequences, transforming the sequences to living organisms, allowing the organisms to grow and multiply, and eventually extracting the information back from the organisms. This article describes the objective of our investigation, followed by a brief description of our recent experiments and several potential applications being considered at PNNL.

Wong, Pak C.; Wong, Kwong K.; Foote, Harlan P.

2003-01-01T23:59:59.000Z

308

Creative Uses of Software Errors: Glitches and Cheats  

Science Conference Proceedings (OSTI)

Video games constitute a major sector of computing with distinctive social implications. Analysis of video game programming errors, design limitations, and rule ambiguities suggests a range of positive functions that glitches and cheats may perform. ... Keywords: cheat, computer, error, glitch, video game

Wilma Alice Bainbridge; William Sims Bainbridge

2007-02-01T23:59:59.000Z

309

Multistrategy Discovery and Detection of Novice Programmer Errors  

Science Conference Proceedings (OSTI)

Detecting and diagnosing errors in novice behavior is an important student modeling task. In this paper, we describe MEDD, an unsupervised incremental multistrategy system for the discovery of classes of errors from, and their detection in, novice programs. ... Keywords: conceptual clustering, multistrategy learning, student modeling, unsupervised learning

Raymund C. Sison; Masayuki Numao; Masamichi Shimura

2000-01-01T23:59:59.000Z

310

Network protocols: correcting transmission errors of up to two bits  

Science Conference Proceedings (OSTI)

While the construction of Hamming Codes that can detect and correct 1-bit transmission errors has been illustrated [1], Hamming Codes that will detect and correct transmission errors of more than 1 bit remain yet to be constructed. In this paper, ...

Sei-Jong Chung

2003-12-01T23:59:59.000Z

311

Estimating Sampling Errors in Large-Scale Temperature Averages  

Science Conference Proceedings (OSTI)

A method is developed for estimating the uncertainty (standard error) of observed regional, hemispheric, and global-mean surface temperature series due to incomplete spatial sampling. Standard errors estimated at the grid-box level [SE2 = S2(1 ? ...

P. D. Jones; T. J. Osborn; K. R. Briffa

1997-10-01T23:59:59.000Z

312

Tangential residual as error estimator in the boundary element method  

Science Conference Proceedings (OSTI)

In this paper a new error estimator based on tangential derivative Boundary Integral Equation residuals for 2D Laplace and Helmholtz equations is shown. The direct problem for general mixed boundary conditions is solved using standard and hypersingular ... Keywords: Adaptivity, Boundary Integral Equation residual, Boundary element method, Error estimation, Mesh adaptation, Mesh refinement, Nodal sensitivity

Alejandro E. Martínez-Castro; Rafael Gallego

2005-04-01T23:59:59.000Z

313

Error estimates for the numerical approximation of Neumann control problems  

Science Conference Proceedings (OSTI)

We continue the discussion of error estimates for the numerical analysis of Neumann boundary control problems we started in Casas et al. (Comput. Optim. Appl. 31:193-219, 2005). In that paper piecewise constant functions were used to approximate the ... Keywords: boundary control, error estimates, numerical approximation, semilinear elliptic equation

Eduardo Casas; Mariano Mateos

2008-04-01T23:59:59.000Z

314

Analyzing localization errors in one-dimensional sensor networks  

Science Conference Proceedings (OSTI)

One-dimensional sensor networks can be found in many fields and demand node location information for various applications. Developing localization algorithms in one-dimensional sensor networks is trivial, due to the fact that existing localization algorithms ... Keywords: Cramér-Rao lower bound, Error propagation, Estimation errors, Localization, One-dimensional sensor networks

Baoqi Huang; Changbin Yu; Brian D. O. Anderson

2012-02-01T23:59:59.000Z

315

How to communicate unit error messages in spreadsheets  

E-Print Network (OSTI)

In previous work we have designed and implemented an automatic reasoning system for spreadsheets, called UCheck, that infers unit information for cells in a spreadsheet. Based on this unit information, UCheck can identify cells in the spreadsheet that contain erroneous formulas. However, the information about an erroneous cell is reported to the user currently in a rather crude way by simply coloring the cell, which does not tell anything about the nature of error and thus offers no help to the user as to how to fix it. In this paper we describe an extension of UCheck, called UFix, which improves the error messages reported to the spreadsheet user dramatically. The approach essentially consists of three steps: First, we identify different categories of spreadsheet errors from an end-user’s perspective. Second, we map units that indicate erroneous formulas to these error categories. Finally, we create customized error messages from the unit information and the identified error category. In many cases, these error messages also provide suggestions on how to fix the reported errors.

Robin Abraham; Martin Erwig

2005-01-01T23:59:59.000Z

316

Type error slicing in implicitly typed higher-order languages  

Science Conference Proceedings (OSTI)

Previous methods have generally identified the location of a type error as a particular program point or the program subtree rooted at that point. We present a new approach that identifies the location of a type error as a set of program points (a slice) ...

Christian Haack; J. B. Wells

2003-04-01T23:59:59.000Z

317

Discriminative sum types locate the source of type errors  

Science Conference Proceedings (OSTI)

We propose a type system for locating the source of type errors in an applied lambda calculus with ML-style polymorphism. The system is based on discriminative sum types---known from work on soft typing---with annotation subtyping and recursive types. ... Keywords: polymorphism, type errors, type inference

Matthias Neubauer; Peter Thiemann

2003-08-01T23:59:59.000Z

318

An Efficient Approach towards Mitigating Soft Errors Risks  

E-Print Network (OSTI)

Smaller feature size, higher clock frequency and lower power consumption are of core concerns of today's nano-technology, which has been resulted by continuous downscaling of CMOS technologies. The resultant 'device shrinking' reduces the soft error tolerance of the VLSI circuits, as very little energy is needed to change their states. Safety critical systems are very sensitive to soft errors. A bit flip due to soft error can change the value of critical variable and consequently the system control flow can completely be changed which leads to system failure. To minimize soft error risks, a novel methodology is proposed to detect and recover from soft errors considering only 'critical code blocks' and 'critical variables' rather than considering all variables and/or blocks in the whole program. The proposed method shortens space and time overhead in comparison to existing dominant approaches.

Sadi, Muhammad Sheikh; Uddin, Md Nazim; Jürjens, Jan

2011-01-01T23:59:59.000Z

319

Inductively Coupled Plasma Mass Spectrometry Uranium Error Propagation  

SciTech Connect

The Hazards Control Department at Lawrence Livermore National Laboratory (LLNL) uses Inductively Coupled Plasma Mass Spectrometer (ICP/MS) technology to analyze uranium in urine. The ICP/MS used by the Hazards Control Department is a Perkin-Elmer Elan 6000 ICP/MS. The Department of Energy Laboratory Accreditation Program requires that the total error be assessed for bioassay measurements. A previous evaluation of the errors associated with the ICP/MS measurement of uranium demonstrated a {+-} 9.6% error in the range of 0.01 to 0.02 {micro}g/l. However, the propagation of total error for concentrations above and below this level have heretofore been undetermined. This document is an evaluation of the errors associated with the current LLNL ICP/MS method for a more expanded range of uranium concentrations.

Hickman, D P; Maclean, S; Shepley, D; Shaw, R K

2001-07-01T23:59:59.000Z

320

Quantum states characterization for the zero-error capacity  

E-Print Network (OSTI)

The zero-error capacity of quantum channels was defined as the least upper bound of rates at which classical information can be transmitted through a quantum channel with probability of error equal to zero. This paper investigates some properties of input states and measurements used to attain the quantum zero-error capacity. We start by reformulating the problem of finding the zero-error capacity in the language of graph theory. This alternative definition is used to prove that the zero-error capacity of any quantum channel can be reached by using tensor products of pure states as channel inputs, and projective measurements in the channel output. We conclude by presenting an example that illustrates our results.

Rex A C Medeiros; Romain Alleaume; Gerard Cohen; Francisco M. de Assis

2006-11-03T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Development of a shape memory alloy actuated biomimetic hydrofoil  

E-Print Network (OSTI)

The development of an active biomimetic hydrofoil that utilizes Shape Memory Alloy (SMA) actuator technology is presented herein. This work describes the design and testing of two experimental hydrofoils. The first model had a trailing edge flap deflected by a pair of SMA wires and demonstrated the feasibility of using SMAs in an aquatic environment. The second hydrofoil had a skeletal structure similar to a fish with internal SMA muscles. This hydrofoil was able to deform to several shapes mimicking aquatic animals with controlled oscillation frequencies of up to 1 Hz, with 1/2 Hz oscillation producing the largest useful amplitudes. Measurable force was generated when the biomimetic hydrofoil was defected underwater. The magnitude of the force was limited by the high flexibility of the tail. An adaptive model for control of SMA actuators is also presented. The control method combines predetermined open-loop modeling with an error feedback for updating of the hysteresis model. The model was capable of tracking a single SMA wire up to 20 Hz, but had trouble simultaneously controlling six wires.

Wilson, Larry Nixon

2000-01-01T23:59:59.000Z

322

Memorandum Memorializing Ex Parte Communication, DOE impending  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Memorandum Memorializing Ex Parte Communication, DOE impending Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. The meeting was requested by AMCA International to introduce the association's leadership, standards, and experience in developing fan standards to DOE; to learn more about the DOE process for developing regulations for fan efficiency standards; and to inform DOE on how commercial and industrial fan markets work. AMCA_Ex_Parte.pdf More Documents & Publications DOE-STD-1168-2013 DOE Meeting Memorandum: Ex Parte Communications Independent Oversight Review, Savannah River Site - August 2011

323

REMEM: REmote MEMory as Checkpointing Storage  

SciTech Connect

Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively studied in research but made little success in practice due to its complexity and potential reliability concerns. In this study we present the design and implementation of REMEM, a REmote MEMory checkpointing system to extend the checkpointing storage from disk to remote memory. A unique feature of REMEM is that it can be integrated into existing disk-based checkpointing systems seamlessly. A user can flexibly switch between REMEM and disk as checkpointing storage to balance the efficiency and reliability. The implementation of REMEM on Open MPI is also introduced. The experimental results confirm that REMEM and the proposed adaptive checkpointing storage selection are promising in both performance, reliability and scalability.

Jin, Hui [Illinois Institute of Technology; Sun, Xian-He [Illinois Institute of Technology; Chen, Yong [ORNL; Ke, Tao [Illinois Institute of Technology

2010-01-01T23:59:59.000Z

324

Profile Guided Load Marking for Memory Renaming  

E-Print Network (OSTI)

Memory operations remain a significant bottleneck in dynamically scheduled pipelined processors, due in part to the inability to statically determine the existence of memory address dependencies. Hardware memory renaming techniques have been proposed which predict which stores a load might be dependent upon. These prediction techniques can be used to speculatively forward a value from a predicted store dependency to a load through a value prediction table; however, these techniques require large and time-consuming hardware tables. In this paper we propose a software-guided approach for identifying dependencies between store and load instructions and the Load Marking (LM) architecture to communicate these dependencies to the hardware. Compiler analysis and profiles are used to find important store/load relationships, and these relationships are identified during execution via hints or an n-bit tag. For those loads that are not marked for renaming, we then use additional profiling inform...

Glenn Reinman; Brad Calder; Dean Tullsen; Gary Tyson; Todd Austin

1998-01-01T23:59:59.000Z

325

Home-based Shared Virtual Memory  

E-Print Network (OSTI)

In this dissertation, I investigate how to improve the performance of shared virtual memory (SVM) by examining consistency models, protocols, hardware support and applications. The main conclusion of this research is that the performance of shared virtual memory can be significantly improved when performance-enhancing techniques from all these areas are combined. This dissertation proposes home-based lazy release consistency as a simple, effective, and scalable way to build shared virtual memory systems. In home-based protocols each shared page has a home to which all writes are propagated and from which all copies are derived. Two home-based protocols are described, implemented and evaluated on two hardware and software platforms: Automatic Update Release Consistency (AURC), which requires hardware support for fine-grained remote writes (automatic updates), and Homebased Lazy Release Consistency (HLRC), which is implemented exclusively in software. The dissertation investigates the ...

Liviu Iftode

1998-01-01T23:59:59.000Z

326

DIODE STEERED MANGETIC-CORE MEMORY  

DOE Patents (OSTI)

A word-arranged magnetic-core memory is designed for use in a digital computer utilizing the reverse or back current property of the semi-conductor diodes to restore the information in the memory after read-out. In order to ob tain a read-out signal from a magnetic core storage unit, it is necessary to change the states of some of the magnetic cores. In order to retain the information in the memory after read-out it is then necessary to provide a means to return the switched cores to their states before read-out. A rewrite driver passes a pulse back through each row of cores in which some switching has taken place. This pulse combines with the reverse current pulses of diodes for each column in which a core is switched during read-out to cause the particular cores to be switched back into their states prior to read-out. (AEC)

Melmed, A.S.; Shevlin, R.T.; Laupheimer, R.

1962-09-18T23:59:59.000Z

327

Memory device using movement of protons  

DOE Patents (OSTI)

An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

2000-01-01T23:59:59.000Z

328

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583) May 18, 2011 T-625: Opera Frameset Handling Memory Corruption Vulnerability The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

329

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 22, 2011 December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. December 20, 2011 U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. December 19, 2011 U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. December 16, 2011 U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code A remote user can cause the target application to execute arbitrary code on

330

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 16, 2011 May 16, 2011 T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks The software does not properly filter HTML code from user-supplied input before displaying the input. May 13, 2011 T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user. May 10, 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011

331

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 26, 2011 April 26, 2011 T-610: Red Hat kdenetwork security update A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. April 25, 2011 T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user. April 22, 2011 T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to

332

Hidden Error Variance Theory. Part II: An Instrument That Reveals Hidden Error Variance Distributions from Ensemble Forecasts and Observations  

Science Conference Proceedings (OSTI)

In Part I of this study, a model of the distribution of true error variances given an ensemble variance is shown to be defined by six parameters that also determine the optimal weights for the static and flow-dependent parts of hybrid error ...

Craig H. Bishop; Elizabeth A. Satterfield; Kevin T. Shanley

2013-05-01T23:59:59.000Z

333

Estimating Local Memory of Tropical Cyclones through MPI Anomaly Evolution  

Science Conference Proceedings (OSTI)

This study examines the local memory of atmospheric and oceanic changes associated with a tropical cyclone (TC). The memory is quantified through anomalous maximum potential intensity (MPI) evolution for 20 days prior to the arrival of a TC ...

Robert E. Hart; Ryan N. Maue; Michael C. Watson

2007-12-01T23:59:59.000Z

334

Speedy transactions in multicore in-memory databases  

Science Conference Proceedings (OSTI)

Silo is a new in-memory database that achieves excellent performance and scalability on modern multicore machines. Silo was designed from the ground up to use system memory and caches efficiently. For instance, it avoids all centralized contention points, ...

Stephen Tu, Wenting Zheng, Eddie Kohler, Barbara Liskov, Samuel Madden

2013-11-01T23:59:59.000Z

335

Design and Implementation of High Speed Memory in 130 nm  

Science Conference Proceedings (OSTI)

This paper deals with the design and analysis of high speed SRAM memory using ATD (Address Transition Detector) technique in 130 nm with the capacitive load of the memory is 5pF

Sampath Kumar; Arti Noor; Sanjay Kr. Singh

2010-01-01T23:59:59.000Z

336

Dynamic Memory Optimization using Pool Allocation and Prefetching  

E-Print Network (OSTI)

Heap memory allocation plays an important role in modern applications. Conventional heap allocators, however, generally ignore the underlying memory hierarchy of the system, favoring instead a low runtime overhead and fast ...

Zhao, Qin

337

Clotho: decoupling memory page layout from storage organization  

Science Conference Proceedings (OSTI)

As database application performance depends on the utilization of the memory hierarchy, smart data placement plays a central role in increasing locality and in improving memory utilization. Existing techniques, however, do not optimize accesses to all ...

Minglong Shao; Jiri Schindler; Steven W. Schlosser; Anastassia Ailamaki; Gregory R. Ganger

2004-08-01T23:59:59.000Z

338

Teapot: language support for writing memory coherence protocols  

Science Conference Proceedings (OSTI)

Recent shared-memory parallel computer systems offer the exciting possibility of customizing memory coherence protocols to fit an application's semantics and sharing patterns. Custom protocols have been used to achieve message-passing performance---while ...

Satish Chandra; Brad Richards; James R. Larus

1996-05-01T23:59:59.000Z

339

Intellectual property strategy : analysis of the flash memory industry  

E-Print Network (OSTI)

This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

Ogura, Tomoko H

2006-01-01T23:59:59.000Z

340

THE FOUNDATION, INC. THE ALLEN SHACKELFORD AIFD MEMORIAL SCHOLARSHIP FUND  

E-Print Network (OSTI)

THE FOUNDATION, INC. THE ALLEN SHACKELFORD AIFD MEMORIAL SCHOLARSHIP FUND THE EULALAH OVERMEYER of an application for scholarship under The Allen Shackelford AIFD Memorial Scholarship Fund, The Eulalah Overmeyer

Schweik, Charles M.

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Shape Memory Behavior of Heat Treated Ni60Ti40 (wt%)  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Shape Memory Behavior of Heat ...

342

Precipitate Phases in Several High Temperature Shape Memory ...  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Precipitate Phases in Several High ...

343

Physical and Mechanical Metallurgy of Shape Memory Alloys for ...  

Science Conference Proceedings (OSTI)

About this Symposium. Meeting, 2011 TMS Annual Meeting & Exhibition. Symposium, Physical and Mechanical Metallurgy of Shape Memory Alloys for Actuator ...

344

Societal Implicit Memory and his Speed on Tracking Extrema in ...  

E-Print Network (OSTI)

of emergent adaptive memory, cooperative learning and perception ..... comparison purposes, we plotted bold curves for static Ackley functions with respective ...

345

Improving the Performance of Software Distributed Shared Memory with Speculation  

E-Print Network (OSTI)

in a release consistent software distributed shared memory system. We propose a new protocol, Speculative Home-based

Alvisi, Lorenzo

346

FRamework Assessing Notorious Contributing Influences for Error (FRANCIE): Perspective on Taxonomy Development to Support Error Reporting and Analysis  

Science Conference Proceedings (OSTI)

Beginning in the 1980s a primary focus of human reliability analysis was estimation of human error probabilities. However, detailed qualitative modeling with comprehensive representation of contextual variables often was lacking. This was likely due to the lack of comprehensive error and performance shaping factor taxonomies, and the limited data available on observed error rates and their relationship to specific contextual variables. In the mid 90s Boeing, America West Airlines, NASA Ames Research Center and INEEL partnered in a NASA sponsored Advanced Concepts grant to: assess the state of the art in human error analysis, identify future needs for human error analysis, and develop an approach addressing these needs. Identified needs included the need for a method to identify and prioritize task and contextual characteristics affecting human reliability. Other needs identified included developing comprehensive taxonomies to support detailed qualitative modeling and to structure meaningful data collection efforts across domains. A result was the development of the FRamework Assessing Notorious Contributing Influences for Error (FRANCIE) with a taxonomy for airline maintenance tasks. The assignment of performance shaping factors to generic errors by experts proved to be valuable to qualitative modeling. Performance shaping factors and error types from such detailed approaches can be used to structure error reporting schemes. In a recent NASA Advanced Human Support Technology grant FRANCIE was refined, and two new taxonomies for use on space missions were developed. The development, sharing, and use of error taxonomies, and the refinement of approaches for increased fidelity of qualitative modeling is offered as a means to help direct useful data collection strategies.

Lon N. Haney; David I. Gertman

2003-04-01T23:59:59.000Z

347

Deriving Human-Error Tolerance Requirements from Tasks  

E-Print Network (OSTI)

In this paper we show how an understanding of a dynamic system from the point of view of the tasks that it supports and an understanding of human error can guide a process of deriving human error tolerance requirements. Our aim is to provide a means whereby, rather than relying on training as a means of improving operator performance, designers may develop interactive systems with human error tolerance in mind. We extend an established methodology (SHARP) by employing a software engineering notation (CSP) that provides a bridge between a theory of error and the practice of design and implementation. In this paper we outline approaches to human error, describe a task notation based on CSP which helps us to elicit requirements on human-error tolerance expressed as functional properties of the system. The technique is used to analyse an engine fire recovery procedure in order to derive human error tolerance requirements. 1 Introduction Walk-up-and-use systems, such as automated teller ma...

Peter Wright; Bob Fields; Michael Harrison

1994-01-01T23:59:59.000Z

348

Slope Error Measurement Tool for Solar Parabolic Trough Collectors: Preprint  

DOE Green Energy (OSTI)

The National Renewable Energy Laboratory (NREL) has developed an optical measurement tool for parabolic solar collectors that measures the combined errors due to absorber misalignment and reflector slope error. The combined absorber alignment and reflector slope errors are measured using a digital camera to photograph the reflected image of the absorber in the collector. Previous work using the image of the reflection of the absorber finds the reflector slope errors from the reflection of the absorber and an independent measurement of the absorber location. The accuracy of the reflector slope error measurement is thus dependent on the accuracy of the absorber location measurement. By measuring the combined reflector-absorber errors, the uncertainty in the absorber location measurement is eliminated. The related performance merit, the intercept factor, depends on the combined effects of the absorber alignment and reflector slope errors. Measuring the combined effect provides a simpler measurement and a more accurate input to the intercept factor estimate. The minimal equipment and setup required for this measurement technique make it ideal for field measurements.

Stynes, J. K.; Ihas, B.

2012-04-01T23:59:59.000Z

349

The nature of the working memory system underlying language processing and its relationship to the long-term memory system  

E-Print Network (OSTI)

This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

Fedorenko, Evelina Georgievna

2007-01-01T23:59:59.000Z

350

Direct match data flow memory for data driven computing  

DOE Patents (OSTI)

A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

1997-01-01T23:59:59.000Z

351

Performance implications of fence-based memory models  

Science Conference Proceedings (OSTI)

Most mainstream shared-memory parallel programming languages are converging to a memory model, or shared variable semantics, centered on providing sequential consistency for most data-race-free programs. OpenMP, along with a small number of other languages, ... Keywords: OpenMP, atomic operations, critical sections, fences, locks, memory model

Hans-J. Boehm

2011-06-01T23:59:59.000Z

352

Guide wire extension for shape memory polymer occlusion removal devices  

DOE Patents (OSTI)

A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

Maitland, Duncan J. (Pleasant Hill, CA); Small, IV, Ward (Livermore, CA); Hartman, Jonathan (Sacramento, CA)

2009-11-03T23:59:59.000Z

353

Better I/O through byte-addressable, persistent memory  

Science Conference Proceedings (OSTI)

Modern computer systems have been built around the assumption that persistent storage is accessed via a slow, block-based interface. However, new byte-addressable, persistent memory technologies such as phase change memory (PCM) offer fast, fine-grained ... Keywords: file systems, performance, phase change memory

Jeremy Condit; Edmund B. Nightingale; Christopher Frost; Engin Ipek; Benjamin Lee; Doug Burger; Derrick Coetzee

2009-10-01T23:59:59.000Z

354

Energy Efficient Proactive Thermal Management in Memory Subsystem  

E-Print Network (OSTI)

Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

Simunic, Tajana

355

Quantum interference of electromagnetic fields from remote quantum memories  

E-Print Network (OSTI)

We observe quantum, Hong-Ou-Mandel, interference of fields produced by two remote atomic memories. High-visibility interference is obtained by utilizing the finite atomic memory time in four-photon delayed coincidence measurements. Interference of fields from remote atomic memories is a crucial element in protocols for scalable generation of multi-node remote qubit entanglement.

T. Chaneliere; D. N. Matsukevich; S. D. Jenkins; S. -Y. Lan; R. Zhao; T. A. B. Kennedy; A. Kuzmich

2006-09-27T23:59:59.000Z

356

Nonlinear quantization on Hebbian-type associative memories  

Science Conference Proceedings (OSTI)

Hebbian-type associative memory is characterized by its simple architecture. However, the hardware implementation of Hebbian-type associative memories is normally complicated when there are a huge number of patterns stored. To simplify the interconnection ... Keywords: Hebbian-type associative memory, Interconnection, Neuron, Nonlinear quantization, Probability of direct convergence

Chishyan Liaw; Ching-Tsorng Tsai; Chao-Hui Ko

2012-06-01T23:59:59.000Z

357

Self-Optimizing Memory Controllers: A Reinforcement Learning Approach  

Science Conference Proceedings (OSTI)

Efficiently utilizing off-chip DRAM bandwidth is a critical issuein designing cost-effective, high-performance chip multiprocessors(CMPs). Conventional memory controllers deliver relativelylow performance in part because they often employ fixed,rigid ... Keywords: Chip Multiprocessors, Memory Systems, Memory Controller, Machine Learning, Reinforcement Learning

Engin Ipek; Onur Mutlu; José F. Martínez; Rich Caruana

2008-06-01T23:59:59.000Z

358

Buffer memory optimization for video codec application modeled in Simulink  

Science Conference Proceedings (OSTI)

Reduction of the on-chip memory size is a key issue in video codec system design. Because video codec applications involve complex algorithms that are both data-intensive and control-dependent, memory optimization based on global and precise analysis ... Keywords: Simulink, memory size reduction, video codec application

Sang-Il Han; Xavier Guerin; Soo-Ik Chae; Ahmed A. Jerraya

2006-07-01T23:59:59.000Z

359

A memory aid with remote communication using distributed technology  

Science Conference Proceedings (OSTI)

Electronic memory aids have been used successfully to give reminders to individuals with memory problems. These aids usually present short action reminders that are acknowledged by the user. The recent enhancement of handheld computers with wireless ... Keywords: Elderly, Memory-impaired users, Personal digital assistant, Remote communication

Andrea Szymkowiak; Kenny Morrison; Peter Gregor; Prveen Shah; J. Evans; A. Wilson

2005-01-01T23:59:59.000Z

360

Wind Power Forecasting Error Distributions: An International Comparison; Preprint  

DOE Green Energy (OSTI)

Wind power forecasting is expected to be an important enabler for greater penetration of wind power into electricity systems. Because no wind forecasting system is perfect, a thorough understanding of the errors that do occur can be critical to system operation functions, such as the setting of operating reserve levels. This paper provides an international comparison of the distribution of wind power forecasting errors from operational systems, based on real forecast data. The paper concludes with an assessment of similarities and differences between the errors observed in different locations.

Hodge, B. M.; Lew, D.; Milligan, M.; Holttinen, H.; Sillanpaa, S.; Gomez-Lazaro, E.; Scharff, R.; Soder, L.; Larsen, X. G.; Giebel, G.; Flynn, D.; Dobschinski, J.

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Predicting locality phases for dynamic memory optimization  

Science Conference Proceedings (OSTI)

Dynamic data, cache, and memory adaptation can significantly improve program performance when they are applied on long continuous phases of execution that have dynamic but predictable locality. To support phase-based adaptation, this paper defines the ... Keywords: Dynamic optimization, Locality analysis and optimization, Phase hierarchy, Program phase prediction, Reconfigurable architecture

Xipeng Shen; Yutao Zhong; Chen Ding

2007-07-01T23:59:59.000Z

362

A Memory Efficient 3-D DWT Architecture  

Science Conference Proceedings (OSTI)

This paper proposes a memory efficientreal-time 3-D DWT algorithm and its architectural implementation. As the running JD-DWT refreshes the wavelet coefficients with the arrival of every two newframes, the latency of the conventional 3D-DWT reduces by ...

B. Das; Swapna Banerjee

2003-01-01T23:59:59.000Z

363

Memory in the system: trajectory-environment  

E-Print Network (OSTI)

In the paper the memory effect in the system consisting from a trajectory of process and an environment is considered. The environment is presented by scalar potential and noise. The evolution of system is interpreted as process of the continuous "measurement" of a trajectory by an environment and\\or on the contrary. In this sense the measured value is entropy-the information about embedding of the trajectory into configurations space. The concepts "measurement" and "interaction" are identified alike in quantum theory. Thus, the entropy evolution is not only the effect of dynamics, but also its cause, if it is possible to speak about causality in this case. It is shown, that such non-elastic interaction leads to occurrence of memory in the system. The reflex memory mechanism is realized as a real conformal dynamic metrics. The metastable event (attractor) is defined and time of its life is estimated. It is shown, that in the system there is a change of dynamic modes from spatial localization to random walk (fluctuation, relaxation). On scale of the attractors dynamics the memory is appearing as a semi-regular (in some information sense) drift of the image of fluctuations in a power spectrum of environment to absolute minimum. The latter properties (topological convergence) attract the attention to algorithmic aspect of a considered system.

Maxim Budaev

2007-08-10T23:59:59.000Z

364

A performance study of memory consistency models  

Science Conference Proceedings (OSTI)

Recent advances in technology are such that the speed of processors is increasing faster than memory latency is decreasing. Therefore the relative cost of a cache miss is becoming more important. However, the full cost of a cache miss need not be paid ...

Richard N. Zucker; Jean-Loup Baer

1992-04-01T23:59:59.000Z

365

Cohesion: a hybrid memory model for accelerators  

Science Conference Proceedings (OSTI)

Two broad classes of memory models are available today: models with hardware cache coherence, used in conventional chip multiprocessors, and models that rely upon software to manage coherence, found in compute accelerators. In some systems, both types ... Keywords: accelerator, cache coherence, computer architecture

John H. Kelm; Daniel R. Johnson; William Tuohy; Steven S. Lumetta; Sanjay J. Patel

2010-06-01T23:59:59.000Z

366

Verifying concurrent memory reclamation algorithms with grace  

Science Conference Proceedings (OSTI)

Memory management is one of the most complex aspects of modern concurrent algorithms, and various techniques proposed for it--such as hazard pointers, read-copy-update and epoch-based reclamation--have proved very challenging for formal reasoning. In ...

Alexey Gotsman; Noam Rinetzky; Hongseok Yang

2013-03-01T23:59:59.000Z

367

Hybrid cache architecture with disparate memory technologies  

Science Conference Proceedings (OSTI)

Caching techniques have been an efficient mechanism for mitigating the effects of the processor-memory speed gap. Traditional multi-level SRAM-based cache hierarchies, especially in the context of chip multiprocessors (CMPs), present many challenges ... Keywords: hybrid cache architecture, three-dimensional ic

Xiaoxia Wu; Jian Li; Lixin Zhang; Evan Speight; Ram Rajamony; Yuan Xie

2009-06-01T23:59:59.000Z

368

Fast Access to Distributed Atomic Memory  

Science Conference Proceedings (OSTI)

We study efficient and robust implementations of an atomic read-write data structure over an asynchronous distributed message-passing system made of reader and writer processes, as well as a number of servers implementing the data structure. We determine ... Keywords: Byzantine failures, atomic registers, distributed algorithms, fault-tolerance, shared-memory emulations, time-complexity

Partha Dutta; Rachid Guerraoui; Ron R. Levy; Marko Vukoli?

2010-08-01T23:59:59.000Z

369

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

370

Teuchos C++ memory management classes, idioms, and related topics, the complete reference : a comprehensive strategy for safe and efficient memory management in C++ for high performance computing.  

SciTech Connect

The ubiquitous use of raw pointers in higher-level code is the primary cause of all memory usage problems and memory leaks in C++ programs. This paper describes what might be considered a radical approach to the problem which is to encapsulate the use of all raw pointers and all raw calls to new and delete in higher-level C++ code. Instead, a set of cooperating template classes developed in the Trilinos package Teuchos are used to encapsulate every use of raw C++ pointers in every use case where it appears in high-level code. Included in the set of memory management classes is the typical reference-counted smart pointer class similar to boost::shared ptr (and therefore C++0x std::shared ptr). However, what is missing in boost and the new standard library are non-reference counted classes for remaining use cases where raw C++ pointers would need to be used. These classes have a debug build mode where nearly all programmer errors are caught and gracefully reported at runtime. The default optimized build mode strips all runtime checks and allows the code to perform as efficiently as raw C++ pointers with reasonable usage. Also included is a novel approach for dealing with the circular references problem that imparts little extra overhead and is almost completely invisible to most of the code (unlike the boost and therefore C++0x approach). Rather than being a radical approach, encapsulating all raw C++ pointers is simply the logical progression of a trend in the C++ development and standards community that started with std::auto ptr and is continued (but not finished) with std::shared ptr in C++0x. Using the Teuchos reference-counted memory management classes allows one to remove unnecessary constraints in the use of objects by removing arbitrary lifetime ordering constraints which are a type of unnecessary coupling [23]. The code one writes with these classes will be more likely to be correct on first writing, will be less likely to contain silent (but deadly) memory usage errors, and will be much more robust to later refactoring and maintenance. The level of debug-mode runtime checking provided by the Teuchos memory management classes is stronger in many respects than what is provided by memory checking tools like Valgrind and Purify while being much less expensive. However, tools like Valgrind and Purify perform a number of types of checks (like usage of uninitialized memory) that makes these tools very valuable and therefore complement the Teuchos memory management debug-mode runtime checking. The Teuchos memory management classes and idioms largely address the technical issues in resolving the fragile built-in C++ memory management model (with the exception of circular references which has no easy solution but can be managed as discussed). All that remains is to teach these classes and idioms and expand their usage in C++ codes. The long-term viability of C++ as a usable and productive language depends on it. Otherwise, if C++ is no safer than C, then is the greater complexity of C++ worth what one gets as extra features? Given that C is smaller and easier to learn than C++ and since most programmers don't know object-orientation (or templates or X, Y, and Z features of C++) all that well anyway, then what really are most programmers getting extra out of C++ that would outweigh the extra complexity of C++ over C? C++ zealots will argue this point but the reality is that C++ popularity has peaked and is becoming less popular while the popularity of C has remained fairly stable over the last decade22. Idioms like are advocated in this paper can help to avert this trend but it will require wide community buy-in and a change in the way C++ is taught in order to have the greatest impact. To make these programs more secure, compiler vendors or static analysis tools (e.g. klocwork23) could implement a preprocessor-like language similar to OpenMP24 that would allow the programmer to declare (in comments) that certain blocks of code should be ''pointer-free'' or allow smaller blocks to be 'pointers allowed'. This would signific

Bartlett, Roscoe Ainsworth

2010-05-01T23:59:59.000Z

371

Error 401 on upload? | OpenEI Community  

Open Energy Info (EERE)

Error 401 on upload? Error 401 on upload? Home > Groups > Databus Hi, I get an HTTP error 401 when trying to upload data. My first thought is that this is related to the robot's credentials, but I've checked that carefully; robot is in a group with access to the table, etc. Is there something else that can cause error 401? thanks, Submitted by Hopcroft on 23 September, 2013 - 13:02 1 answer Points: 0 uploading data using the GUI (csv upload button) or uploading data using json? What type of access does the group have to the database? Try adding the robot to the group directly as well as a work around and let me know what happens(we have people using the robots but perhaps there is an issue somewhere). Is your user and your api key working at all? (your user key is in the help section System Access on your version of databus). Deanhiller

372

Error 401 on upload? | OpenEI Community  

Open Energy Info (EERE)

Error 401 on upload? Error 401 on upload? Home > Groups > Databus Hi, I get an HTTP error 401 when trying to upload data. My first thought is that this is related to the robot's credentials, but I've checked that carefully; robot is in a group with access to the table, etc. Is there something else that can cause error 401? thanks, Submitted by Hopcroft on 23 September, 2013 - 13:02 1 answer Points: 0 uploading data using the GUI (csv upload button) or uploading data using json? What type of access does the group have to the database? Try adding the robot to the group directly as well as a work around and let me know what happens(we have people using the robots but perhaps there is an issue somewhere). Is your user and your api key working at all? (your user key is in the help section System Access on your version of databus). Deanhiller

373

Representation Error of Oceanic Observations for Data Assimilation  

Science Conference Proceedings (OSTI)

A simple approach to the estimation of representation error (RE) of sea level (?), temperature (T), and salinity (S) observations for ocean data assimilation is described. It is assumed that the main source of RE is due to unresolved processes ...

Peter R. Oke; Pavel Sakov

2008-06-01T23:59:59.000Z

374

Weather Regimes and Forecast Errors in the Pacific Northwest  

Science Conference Proceedings (OSTI)

Despite overall improvements in numerical weather prediction and data assimilation, large short-term forecast errors of sea level pressure and 2-m temperature still occur. This is especially true for the west coast of North America where short-...

Lynn A. McMurdie; Joseph H. Casola

2009-06-01T23:59:59.000Z

375

Sampling Errors in Flux Measurements of Slowly Depositing Pollutants  

Science Conference Proceedings (OSTI)

Sampling errors in vertical flux measurements obtained by eddy correlation methods are investigated by specifying a jointly normal–lognormal density distribution for the vertical velocity and scalar concentration. The probability density function ...

Edward E. O'Brien

1985-07-01T23:59:59.000Z

376

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

DOE Green Energy (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

377

EVAL: Utilizing processors with variation-induced timing errors  

Science Conference Proceedings (OSTI)

Parameter variation in integrated circuits causes sections of a chip to be slower than others. If, to prevent any resulting timing errors, we design processors for worst-case parameter values, we may lose substantial performance. An alternate approach ...

Smruti Sarangi; Brian Greskamp; Abhishek Tiwari; Josep Torrellas

2008-11-01T23:59:59.000Z

378

Stratospheric Analysis and Forecast Errors Using Hybrid and Sigma Coordinates  

Science Conference Proceedings (OSTI)

Past investigations have documented large divergent wind anomalies in stratospheric reanalyses over steep terrain, which were attributed to discretization errors produced by the terrain-following (sigma) vertical coordinate in the forecast model. ...

Stephen D. Eckermann; John P. McCormack; Jun Ma; Timothy F. Hogan; Katherine A. Zawdie

379

US-LHC IR magnet error analysis and compensation  

SciTech Connect

This paper studies the impact of the insertion-region (IR) magnet field errors on LHC collision performance. Compensation schemes including magnet orientation optimization, body-end compensation, tuning shims, and local nonlinear correction are shown to be highly effective.

Wei, J.; Ptitsin, V.; Pilat, F.; Tepikian, S. [Brookhaven National Lab., Upton, NY (United States); Gelfand, N.; Wan, W.; Holt, J. [Fermi National Accelerator Lab., Batavia, IL (United States)

1998-08-01T23:59:59.000Z

380

Underestimating Costs in Public Works Projects: Error or Lie?  

E-Print Network (OSTI)

J. M. (1964). Errors in project cost estimates. Indian Eco-leave out important project costs and risks in order to makeclearly, comparing actual project costs with esti- mated

Flyvbjerg, Bent; Holm, Mette Skamris; Buhl, Søren

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A Preliminary Investigation of Temperature Errors in Operational Forecasting Models  

Science Conference Proceedings (OSTI)

Temperatures taken from model output (FOUS reports) routinely transmitted by the National Centers for Environmental Prediction are tabulated to determine errors during three months in the summer of 1996. These short-term model forecasts are ...

Frank P. Colby Jr.

1998-03-01T23:59:59.000Z

382

ATLAS Self-Siphoning Rain Gauge Error Estimates  

Science Conference Proceedings (OSTI)

This report describes sampling and error characteristics of self-siphoning rain gauges used on moored buoys designed and assembled at NOAA's Pacific Marine Environmental Laboratory (PMEL) for deployment in the tropical Pacific and Atlantic Oceans ...

Yolande L. Serra; Patrick A'Hearn; H. Paul Freitag; Michael J. McPhaden

2001-12-01T23:59:59.000Z

383

Probabilistic state estimation in regimes of nonlinear error growth  

E-Print Network (OSTI)

State estimation, or data assimilation as it is often called, is a key component of numerical weather prediction (NWP). Nearly all implementable methods of state estimation suitable for NWP are forced to assume that errors ...

Lawson, W. Gregory, 1975-

2005-01-01T23:59:59.000Z

384

Toward Estimating Climatic Trends in SST. Part II: Random Errors  

Science Conference Proceedings (OSTI)

Random observational errors for sea surface temperature (SST) are estimated using merchant ship reports from the International Comprehensive Ocean–Atmosphere Data Set (ICOADS) for the period of 1970–97. A statistical technique, semivariogram ...

Elizabeth C. Kent; Peter G. Challenor

2006-03-01T23:59:59.000Z

385

Error Statistics of VPR Corrections in Stratiform Precipitation  

Science Conference Proceedings (OSTI)

Errors in surface rainfall estimates that are caused by ignoring the vertical profile of reflectivity (VPR) and range effects have been assessed by simulating how fine-resolution 3D reflectivity measurements at close ranges are sampled by the ...

Aldo Bellon; Gyu Won Lee; Isztar Zawadzki

2005-07-01T23:59:59.000Z

386

A Cautionary Note on the Use of Error Bars  

Science Conference Proceedings (OSTI)

Climate studies often involve comparisons between estimates of some parameter derived from different observed and/or model-generated datasets. It is common practice to present estimates of two or more statistical quantities with error bars about ...

John R. Lanzante

2005-09-01T23:59:59.000Z

387

An Error Analysis of Atlantic Tropical Cyclone Track Guidance Models  

Science Conference Proceedings (OSTI)

Mean track forecast errors over the 6-yr period 1983–88 are compared for four tropical cyclone-track forecast models in use at the National Hurricane Center (NHC). The model types represented are statistical, statistical-dynamical, barctropic-...

Mark Demaria; Miles B. Lawrence; James T. Kroll

1990-03-01T23:59:59.000Z

388

Some Characteristics of Time Interpolation Errors for Fluid Flows  

Science Conference Proceedings (OSTI)

The size of errors due to linear time interpolation varies parabolically with a maximum at the center of the interpolation interval in most of the cases examined here. These cases include simple situations that are analyzed analytically and ...

Ross N. Hoffman; S. Mark Leidner

2010-07-01T23:59:59.000Z

389

Optimal complexity correction of correlated errors in the surface code  

E-Print Network (OSTI)

The surface code is designed to suppress errors in quantum computing hardware and currently offers the most believable pathway to large-scale quantum computation. The surface code requires a 2-D array of nearest-neighbor coupled qubits that are capable of implementing a universal set of gates with error rates below approximately 1%, requirements compatible with experimental reality. Consequently, a number of authors are attempting to squeeze additional performance out of the surface code. We describe an optimal complexity error suppression algorithm, parallelizable to O(1) given constant computing resources per unit area, and provide evidence that this algorithm exploits correlations in the error models of each gate in an asymptotically optimal manner.

Austin G. Fowler

2013-10-02T23:59:59.000Z

390

Correcting Errors in Streamflow Forecast Ensemble Mean and Spread  

Science Conference Proceedings (OSTI)

When hydrological models are used for probabilistic streamflow forecasting in the Ensemble Streamflow Prediction (ESP) framework, the deterministic components of the approach can lead to errors in the estimation of forecast uncertainty, as ...

Andrew W. Wood; John C. Schaake

2008-02-01T23:59:59.000Z

391

Air Temperature Measurement Errors in Naturally Ventilated Radiation Shields  

Science Conference Proceedings (OSTI)

Two sources of systematic errors are considered for estimating air temperature. The first source is ambiguity of the definition of the standardized measurement height over vegetated surfaces of varying heights. Without such a standardization, ...

Reina Nakamura; L. Mahrt

2005-07-01T23:59:59.000Z

392

Evaluating Error Propagation in Coupled Land–Atmosphere Models  

Science Conference Proceedings (OSTI)

This study examines how land-use errors from the Land Transformation Model (LTM) propagate through to climate as simulated by the Regional Atmospheric Model System (RAMS). The authors conducted five simulations of regional climate over East Africa:...

Bryan Pijanowski; Nathan Moore; Dasaraden Mauree; Dev Niyogi

2011-10-01T23:59:59.000Z

393

Singular Vector Calculations with an Analysis Error Variance Metric  

Science Conference Proceedings (OSTI)

Singular vectors of the navy's global forecast model are calculated using an initial norm consistent with an estimate of analysis error variance provided by the Naval Research Laboratory's (NRL) Atmospheric Variational Data Assimilation System (...

Ronald Gelaro; Thomas Rosmond; Roger Daley

2002-05-01T23:59:59.000Z

394

Annotating language errors in texts: investigating argumentation and decision schemas  

Science Conference Proceedings (OSTI)

In this short paper, we present annotations for tagging grammatical and stylistic errors, together with attributes about the nature of the correction which are then interpreted as arguments. A decision model is introduced in order for the author to be ...

Camille Albert; Laurie Buscail; Marie Garnier; Arnaud Rykner; Patrick Saint-Dizier

2009-08-01T23:59:59.000Z

395

Vertical Correlation Functions for Temperature and Relative Humidity Errors  

Science Conference Proceedings (OSTI)

This article gives the details and results of an investigation into the properties of the temperature and relative humidity errors from the Navy Operational Global Atmospheric Prediction System for a 4-month period from March to June 1998. The ...

Richard Franke; Edward Barker

2000-12-01T23:59:59.000Z

396

Servo control booster system for minimizing following error  

DOE Patents (OSTI)

A closed-loop feedback-controlled servo system is disclosed which reduces command-to-response error to the system's position feedback resolution least increment, .DELTA.S.sub.R, on a continuous real-time basis for all operating speeds. The servo system employs a second position feedback control loop on a by exception basis, when the command-to-response error .gtoreq..DELTA.S.sub.R, to produce precise position correction signals. When the command-to-response error is less than .DELTA.S.sub.R, control automatically reverts to conventional control means as the second position feedback control loop is disconnected, becoming transparent to conventional servo control means. By operating the second unique position feedback control loop used herein at the appropriate clocking rate, command-to-response error may be reduced to the position feedback resolution least increment. The present system may be utilized in combination with a tachometer loop for increased stability.

Wise, William L. (Mountain View, CA)

1985-01-01T23:59:59.000Z

397

Measure of Diffusion Model Error for Thermal Radiation Transport  

E-Print Network (OSTI)

The diffusion approximation to the equation of transfer (Boltzmann transport equation) is usually applied to media where scattering dominates the interactions. Diffusion approximation helps in significant savings in terms of code complexity and computational time. However, this approximation often has significant error. Error due to the inherent nature of a physics model is called model error. Information about the model error associated with the diffusion approximation is clearly desirable. An indirect measure of model error is a quantity that is related in some way to the error but not equal to the error. In general, indirect measures of error are expected to be less costly than direct measures. Perhaps the most well-known indirect measure of the diffusion model error is the variable-Eddington tensor. This tensor provides a great deal of information about the angular dependence of the angular intensity solution, but it is not always simple to interpret. We define a new indirect measure of the diffusion model error called the diffusion model error source (DME source). When this DME source is added to the diffusion equation, the transport solution for the angular-integrated intensity is obtained. In contrast to the variable-Eddington tensor, our DME source is a scalar that is conceptually easy to interpret. In addition to defining the DME source analytically, we show how to generate this source numerically relative to the Sn radiative transfer equations with linear-discontinuous spatial discretization. This numerical source is computationally tested and shown to reproduce the Sn solution for a number of problems. Our radiative transfer model solves a coupled, time dependent, multi-frequency, 1-D slab equation and material heat transfer equation. We then use diffusion approximation to solve the same problem. The difference due to this approximation can be modelled by a “diffusion source”. The diffusion source is defined as an amount of inhomogeneous source that, when added to a diffusion calculation, gives a solution for the angle-integrated intensity that is equal to the transport solution.

Kumar, Akansha

2013-05-01T23:59:59.000Z

398

Human Operational Errors Involving Control, Relay, and Auxiliary Equipment  

Science Conference Proceedings (OSTI)

This report describes the objectives, information gathering and analysis, and findings of a research effort related to human operational errors involving control, relay, and auxiliary equipment. This research is conducted by the Switching Safety and Reliability Project of EPRI8217s Substations Program. The project consists of three separate studies: 8226 an analysis of relay-related incidents attributed to human errors, 8226 a compilation of work practices when planning and performing work on relays, an...

2006-12-08T23:59:59.000Z

399

Using doppler radar images to estimate aircraft navigational heading error  

SciTech Connect

A yaw angle error of a motion measurement system carried on an aircraft for navigation is estimated from Doppler radar images captured using the aircraft. At least two radar pulses aimed at respectively different physical locations in a targeted area are transmitted from a radar antenna carried on the aircraft. At least two Doppler radar images that respectively correspond to the at least two transmitted radar pulses are produced. These images are used to produce an estimate of the yaw angle error.

Doerry, Armin W. (Albuquerque, NM); Jordan, Jay D. (Albuquerque, NM); Kim, Theodore J. (Albuquerque, NM)

2012-07-03T23:59:59.000Z

400

Generalized Error Analysis for Conventional and Remote Reference Magnetotellurics  

DOE Green Energy (OSTI)

An error analysis which applies to both conventional and remote reference magnetotelluric impedance and tipper estimates is developed based on the assumption that noise in the field measurements is governed by a complex normal distribution. Under the assumed model of noise it is shown that the theoretical expressions for the variances and covariances derived recently by Gamble et al (1979b) specifically for remote reference estimates apply to conventional estimates as well. However, calculations are biased if the impedance or tipper functions are biased. The impedance and tipper functions are calculated as ratios of two random functions of noisy field measurements. The expressions for the variances and covariances account for noise in both the numerator and denominator of the estimates. They are useful provided the probability that the magnitude of the random error in the denominator exceeds the magnitude of its expected value is small. Expressions for the bias errors of the impedance and tipper functions are obtained in order to assess the relative contributions of random and bias errors to the man squared error of the estimates. The relative magnitude of both random and bias errors depends on the noise level and on the values of the sample coherencies between various pairs of the field measurements used to compute a particular estimate.

Stodt, John A.

1982-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

A new parallel sorting approach with sorting memory module  

Science Conference Proceedings (OSTI)

A new approach to accelerating parallel sorting processes is introduced in this paper. This approach involves the design of a new type of memory chip with sorting functions. This type of sorting memory chip is feasible with today's VLSI techniques. A memory module organizing several sorting memory chips associated with additional ECL or TTL control logic circuits is also presented. Using the sorting memory modules in a shared memory parallel processor machine, parallel sorting algorithms such as the column sort method can reduce the row access time significantly and avoid data collisions in the interconnection network. Experimental simulation results on the practical speedup achieved and the memory utilization for the proposed approach are described.

Zhu, C.Q. (Illinois Univ., Urbana, IL (USA). Center for Supercomputing Research and Development); Fang, Z. (Research and Development, Concurrent Computer Corp., Tinton Falls, NJ (US)); Li, X. (Dept. of Computing Science, Univ. of Alberta, Edmonton, Alberta (CA))

1989-12-01T23:59:59.000Z

402

Human Error Mitigation in Future Operations Control Centers  

E-Print Network (OSTI)

This report documents a human error mitigation study conducted at the William J. Hughes Technical Center Research Development & Human Factors Laboratory. The study examined potential causes of human errors in future Airway Facilities (AF) operations control centers (OCCs). The participants consisted of nine specialists having expertise in current AF operations and knowledge of human error tendencies. The participants explored four operational scenarios, identified potential sources of error, and recommended specific solutions. A research team extracted common themes from participant responses to each of the four scenarios and identified general sources of potential error. They made specific recommendations for mitigating error in future OCC facilities. 17. Key Words NIMS, operations control centers, fault management, errors, human factors, event ticketing 18. Distribution Statement This document is available to the public through the National Technical Information Service, Springfield, Virginia, 22161 19. Security Classif. (of this report) 20. Security Classif. (of this page) 21. No. of Pages 48 22. Price Form DOT F 1700.7 (8-72) Reproduction of completed page authorized iii Acknowledgments This research would not have been possible without the support and sponsorship of AAR-100, the Office of the Chief Scientific and Technical Advisor for Human Factors. The research team greatly appreciated the outstanding support provided by Jack Oxford, FDC, who headed the effort to develop futuristic scenarios and to recruit participants. Dan Wagner and Armida Rosiles, ACT-530, and Anton Koros, FDC, played important roles in the completion of this study. Subject matter experts who supported scenario development included Patrick Marable, Kermit Grayson, and William Bauerle...

Vicki Ahlstrom, Ph.D.; Yvette J Tenney; Richard W. Pew; Robert L. Cranston; Richard Mogford, Ph.D.; Author(s Vicki Ahlstrom (act; Jean MacMillen; Jean Macmillan; Yvette Tenney; Richard Pew

1999-01-01T23:59:59.000Z

403

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Disorder-Induced Microscopic Magnetic Memory Disorder-Induced Microscopic Magnetic Memory Print Wednesday, 26 October 2005 00:00 The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

404

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Magnetic Memory Print Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

405

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Magnetic Memory Print Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

406

Complex bodies with memory: linearized setting  

E-Print Network (OSTI)

The mechanics of complex bodies with memory effects is discussed in linearized setting. The attention is focused on the characterization of free energies in terms of minimum work and maximum recoverable work in the bulk and along a discontinuity surface endowed with its own surface energy, a surface internal to the body. To this aim, use is made of techniques proposed by Del Piero. Consequences of the Clausius-Duhem inequality are investigated for complex bodies with instantaneous linear elastic response.

Paolo Maria Mariano; Paolo Paoletti

2008-05-28T23:59:59.000Z

407

Optimal superdense coding over memory channels  

SciTech Connect

We study the superdense coding capacity in the presence of quantum channels with correlated noise. We investigate both the cases of unitary and nonunitary encoding. Pauli channels for arbitrary dimensions are treated explicitly. The superdense coding capacity for some special channels and resource states is derived for unitary encoding. We also provide an example of a memory channel where nonunitary encoding leads to an improvement in the superdense coding capacity.

Shadman, Z.; Kampermann, H.; Bruss, D.; Macchiavello, C. [Institute fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, DE-40225 Duesseldorf (Germany); Dipartimento di Fisica ''A. Volta'' and INFM-Unita di Pavia, Via Bassi 6, IT-27100 Pavia (Italy)

2011-10-15T23:59:59.000Z

408

Adding aggressive error correction to a high-performance compressing flash file system  

Science Conference Proceedings (OSTI)

While NAND flash memories have rapidly increased in both capacity and performance and are increasingly used as a storage device in many embedded systems, their reliability has decreased both because of increased density and the use of multi-level cells ... Keywords: compression, file system, nand flash memory, non-volatile memory, reliability

Yangwook Kang; Ethan L. Miller

2009-10-01T23:59:59.000Z

409

Shape Memory Polymer Therapeutic Devices for Stroke  

SciTech Connect

Shape memory polymers (SMPs) are attracting a great deal of interest in the scientific community for their use in applications ranging from light weight structures in space to micro-actuators in MEMS devices. These relatively new materials can be formed into a primary shape, reformed into a stable secondary shape, and then controllably actuated to recover their primary shape. The first part of this presentation will be a brief review of the types of polymeric structures which give rise to shape memory behavior in the context of new shape memory polymers with highly regular network structures recently developed at LLNL for biomedical devices. These new urethane SMPs have improved optical and physical properties relative to commercial SMPs, including improved clarity, high actuation force, and sharper actuation transition. In the second part of the presentation we discuss the development of SMP based devices for mechanically removing neurovascular occlusions which result in ischemic stroke. These devices are delivered to the site of the occlusion in compressed form, are pushed through the occlusion, actuated (usually optically) to take on an expanded conformation, and then used to dislodge and grip the thrombus while it is withdrawn through the catheter.

Wilson, T S; Small IV, W; Benett, W J; Bearinger, J P; Maitland, D J

2005-10-11T23:59:59.000Z

410

Performance of memory reclamation for lockless synchronization  

E-Print Network (OSTI)

Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace locks with non-blocking synchronization to protect against deadlock, priority inversion, and convoying. In both cases, dynamic data structures that avoid locking require a memory reclamation scheme that reclaims elements once they are no longer in use. The performance of existing memory reclamation schemes has not been thoroughly evaluated. We conduct the first fair and comprehensive comparison of three recent schemes—quiescent-state-based reclamation, epoch-based reclamation, and hazard-pointer-based reclamation—using a flexible microbenchmark. Our results show that there is no globally optimal scheme. When evaluating lockless synchronization, programmers and algorithm designers should thus carefully consider the data structure, the workload, and the execution environment, each of which can dramatically affect the memory reclamation performance. We discuss the consequences of our results for programmers and algorithm designers. Finally, we describe the use of one scheme, quiescentstate-based reclamation, in the context of an OS kernel—an execution environment which is well suited to this scheme.

Thomas E. Hart; Paul E. McKenney; Angela Demke Brown; Jonathan Walpole

2007-01-01T23:59:59.000Z

411

Measuring contextual fitness using error contexts extracted from the Wikipedia revision history  

Science Conference Proceedings (OSTI)

We evaluate measures of contextual fitness on the task of detecting real-word spelling errors. For that purpose, we extract naturally occurring errors and their contexts from the Wikipedia revision history. We show that such natural errors are better ...

Torsten Zesch

2012-04-01T23:59:59.000Z

412

Analysis and Reduction of Systematic Errors through a Seamless Approach to Modeling Weather and Climate  

Science Conference Proceedings (OSTI)

The reduction of systematic errors is a continuing challenge for model development. Feedbacks and compensating errors in climate models often make finding the source of a systematic error difficult. In this paper, it is shown how model ...

G. M. Martin; S. F. Milton; C. A. Senior; M. E. Brooks; S. Ineson; T. Reichler; J. Kim

2010-11-01T23:59:59.000Z

413

Assessing the Impact of Differential Genotyping Errors on Rare Variant Tests of Association  

E-Print Network (OSTI)

Genotyping errors are well-known to impact the power and type I error rate in single marker tests of association. Genotyping errors that happen according to the same process in cases and controls are known as non-differential ...

Fast, Shannon Marie

414

Estimating Model-Error Covariances for Application to Atmospheric Data Assimilation  

Science Conference Proceedings (OSTI)

Forecast-error statistics have traditionally been used to investigate model performance and to calculate analysis weights for atmospheric data assimilation. Forecast error has two components: the model error, caused by model imperfections, and ...

Roger Daley

1992-08-01T23:59:59.000Z

415

Error in Measurements of Incoming Shortwave Radiation Made from Ships and Buoys  

Science Conference Proceedings (OSTI)

Errors in shortwave solar radiation measurements resulting from mean tils and rocking motions, as well as from the response time of the sensors, are determined experimentally. The magnitude of the mean tilt error can be large and lead to errors ...

M. A. MacWhorter; R. A. Weller

1991-02-01T23:59:59.000Z

416

A Practical Approach to Sequential Estimation of Systematic Error on Near-Surface Mesoscale Grids  

Science Conference Proceedings (OSTI)

Statistical analysis arguments are used to construct an estimation algorithm for systematic error of near-surface temperatures on a mesoscale grid. The systematic error is defined as the observed running-mean error, and an averaging length of 7 ...

Joshua P. Hacker; Daran L. Rife

2007-12-01T23:59:59.000Z

417

Multi-vector tests: a path to perfect error-rate testing  

Science Conference Proceedings (OSTI)

The importance of testing approaches that exploit error tolerance to improve yield has previously been established. Error rate, defined as the percentage of vectors for which the value at a circuit's output deviates from the corresponding error-free ...

Shideh Shahidi; Sandeep Gupta

2008-03-01T23:59:59.000Z

418

Errors and Artefacts in Agent-Based Modelling  

E-Print Network (OSTI)

The objectives of this paper are to define and classify different types of errors and artefacts that can appear in the process of developing an agent-based model, and to propose activities aimed at avoiding them during the model construction and testing phases. To do this in a structured way, we review the main concepts of the process of developing such a model – establishing a general framework that summarises the process of designing, implementing, and using agent-based models. Within this framework we identify the various stages where different types of errors and artefacts may appear. Finally we propose activities that could be used to detect (and hence eliminate) each type of error or artefact.

José Manuel Galán; Luis R. Izquierdo; Segismundo S. Izquierdo; José Ignacio Santos; Ricardo Del Olmo; Adolfo López-Paredes; Bruce Edmonds

2009-01-01T23:59:59.000Z

419

Lossless Data Compression with Error Detection using Cantor Set  

E-Print Network (OSTI)

In 2009, a lossless compression algorithm based on 1D chaotic maps known as Generalized Lur\\"{o}th Series (or GLS) has been proposed. This algorithm (GLS-coding) encodes the input message as a symbolic sequence on an appropriate 1D chaotic map (GLS) and the compressed file is obtained as the initial value by iterating backwards on the map. For ergodic sources, it was shown that GLS-coding achieves the best possible lossless compression (in the noiseless setting) bounded by Shannon entropy. However, in the presence of noise, even small errors in the compressed file leads to catastrophic decoding errors owing to sensitive dependence on initial values. In this paper, we first show that Repetition codes $\\mathcal{R}_n$ (every symbol is repeated $n$ times, where $n$ is a positive odd integer), the oldest and the most basic error correction and detection codes in literature, actually lie on a Cantor set with a fractal dimension of $\\frac{1}{n}$, which is also the rate of the code. Inspired by this, we incorporate error detection capability to GLS-coding by ensuring that the compressed file (initial value on the map) lies on a Cantor set of measure zero. Even a 1-bit error in the initial value will throw it outside the Cantor set which can be detected while decoding. The error detection performance (and also the rate of the code) can be controlled by the fractal dimension of the Cantor set and could be suitably adjusted depending on the noise level of the communication channel.

Nithin Nagaraj

2013-08-10T23:59:59.000Z

420

Laser Phase Errors in Seeded Free Electron Lasers  

SciTech Connect

Harmonic seeding of free electron lasers has attracted significant attention as a method for producing transform-limited pulses in the soft x-ray region. Harmonic multiplication schemes extend seeding to shorter wavelengths, but also amplify the spectral phase errors of the initial seed laser, and may degrade the pulse quality and impede production of transform-limited pulses. In this paper we consider the effect of seed laser phase errors in high gain harmonic generation and echo-enabled harmonic generation. We use simulations to confirm analytical results for the case of linearly chirped seed lasers, and extend the results for arbitrary seed laser envelope and phase.

Ratner, D.; Fry, A.; Stupakov, G.; White, W.; /SLAC

2012-04-17T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

JLab SRF Cavity Fabrication Errors, Consequences and Lessons Learned  

Science Conference Proceedings (OSTI)

Today, elliptical superconducting RF (SRF) cavities are preferably made from deep-drawn niobium sheets as pursued at Jefferson Laboratory (JLab). The fabrication of a cavity incorporates various cavity cell machining, trimming and electron beam welding (EBW) steps as well as surface chemistry that add to forming errors creating geometrical deviations of the cavity shape from its design. An analysis of in-house built cavities over the last years revealed significant errors in cavity production. Past fabrication flaws are described and lessons learned applied successfully to the most recent in-house series production of multi-cell cavities.

Frank Marhauser

2011-09-01T23:59:59.000Z

422

Composite Toffoli gate with two-round error detection  

E-Print Network (OSTI)

We introduce a fault-tolerant construction to implement a composite quantum operation of four overlapping Toffoli gates. The same construction can produce two independent Toffoli gates. This result lowers resource overheads in designs for quantum computers by more than an order of magnitude. The procedure uses Clifford operations and 64 copies of the non-Clifford gate $T = \\exp[i \\pi (I - \\sigma^z) /8]$. Quantum codes detect errors in the circuit. When the dominant source of error is $T$-gate failure with probability $p$, then the composite Toffoli circuit has postselected failure rate of $3072p^4$ to lowest order.

Cody Jones

2013-03-27T23:59:59.000Z

423

Meta Modeling of Transmission Error for Spur, Helical and Planetary Gears for Wind Turbine Application.  

E-Print Network (OSTI)

??Detailed analysis of drive train dynamics requires accounting for the transmission error that arises in gears. However, the direct computation of the transmission error requires… (more)

Irfan, Muhammad

2013-01-01T23:59:59.000Z

424

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute...

425

HitME: low power Hit MEmory buffer for embedded systems  

Science Conference Proceedings (OSTI)

In this paper, we present a novel HitME (Hit-MEmory) buffer to reduce the energy consumption of memory hierarchy in embedded processors. The HitME buffer is a small direct-mapped cache memory that is added as additional memory into existing cache memory ...

Andhi Janapsatya; Sri Parameswaran; Aleksandar Ignjatovi?

2009-01-01T23:59:59.000Z

426

Non-iterative joint decoding and signal processing: universal coding approach for channels with memory  

E-Print Network (OSTI)

A non-iterative receiver is proposed to achieve near capacity performance on intersymbol interference (ISI) channels. There are two main ingredients in the proposed design. i) The use of a novel BCJR-DFE equalizer which produces optimal soft estimates of the inputs to the ISI channel given all the observations from the channel and L past symbols exactly, where L is the memory of the ISI channel. ii) The use of an encoder structure that ensures that L past symbols can be used in the DFE in an error free manner through the use of a capacity achieving code for a memoryless channel. Computational complexity of the proposed receiver structure is less than that of one iteration of the turbo receiver. We also provide the proof showing that the proposed receiver achieves the i.i.d. capacity of any constrained input ISI channel. This DFE-based receiver has several advantages over an iterative (turbo) receiver, such as low complexity, the fact that codes that are optimized for memoryless channels can be used with channels with memory, and finally that the channel does not need to be known at the transmitter. The proposed coding scheme is universal in the sense that a single code of rate r; optimized for a memoryless channel, provides small error probability uniformly across all AWGN-ISI channels of i.i.d. capacity less than r: This general principle of a proposed non-iterative receiver also applies to other signal processing functions, such as timing recovery, pattern-dependent noise whiten ing, joint demodulation and decoding etc. This makes the proposed encoder and receiver structure a viable alternative to iterative signal processing. The results show significant complexity reduction and performance gain for the case of timing recovery and patter-dependent noise whitening for magnetic recording channels.

Nangare, Nitin Ashok

2003-05-01T23:59:59.000Z

427

The Third Claude E. Shannon Memorial Lecture  

E-Print Network (OSTI)

(Physics) · Aperture · Frequency · Power · Shannon (Mathematics) · Error-Correction · Data Compression #12 It Worth the Effort? #12;"Frequently the messages have meaning" #12;A Tour of the Solar System. #12;A Tour of the Solar System. UCSD April 29, 2005 Ludwig van Beethoven, Moonlight Sonata Daniel Barenboim, pianist #12

Adolphs, Ralph

428

(Ni,Pt)Ti High Temperature Shape Memory Alloys  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Phase Field Modeling of P-Phase ...

429

Determination of the recovery stresses developed by shape memory alloys  

SciTech Connect

A simple relationship has been developed between recovery stresses, temperature, and strain, to explain the mechanical shape memory effect in some alloys which undergo thermoelastic martensitic transformation. (GHT)

Mohamed, H.A.

1978-03-01T23:59:59.000Z

430

Novel and NiTi-based Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 4, 2013 ... Phase Constitution, Mechanical and Shape Memory Properties of (Pt,Co)Ti Alloys: Hideki Hosoda1; Satoshi Tsutsumi1; Masaki Tahara1; ...

431

Superelastic and Shape Memory Effects of Copper-Based Shape ...  

Science Conference Proceedings (OSTI)

Abstract Scope, Shape memory alloys have been considered for applications as sensors, actuators, and energy-absorbing materials because of their impressive ...

432

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(Brochure) (Revised) This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas. 47461.pdf More...

433

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure)  

Science Conference Proceedings (OSTI)

This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas.

Not Available

2010-03-01T23:59:59.000Z

434

Whirlpools on the Nanoscale Could Multiply Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

cells housed on nanoscale metal disks, instead of the two-bit magnetic domains of standard magnetic memories. In magnetic vortices, parallel electron spins point either...

435

Optimization Online - On Efficiently Combining Limited Memory and ...  

E-Print Network (OSTI)

Nov 25, 2013... the limited memory methods are usually combined with a line search. ... by the Euclidean norm with an insignificant computational overhead ...

436

Y-12 historian assists in Lincoln Memorial University display...  

National Nuclear Security Administration (NNSA)

of Lincoln Memorial University in Harrogate, Tenn. Located in LMU's new Math and Science Building, the display pays tribute to nuclear energy research and the subsequent creation...

437

Fundamentals of Shape Memory and Related Transitions (Electronic ...  

Science Conference Proceedings (OSTI)

Jun 1, 2007 ... These papers are based on presentations prepared for the symposium Fundamentals of Shape Memory and Related Transitions. The original ...

438

False Memories of UFO Encounters: An fMRI Investigation .  

E-Print Network (OSTI)

??The idea of ‘false memories’ for traumatic events has powered numerous controversies. For this reason, the present study was designed as an attempt to resolve… (more)

Lambrinos, Angela

2011-01-01T23:59:59.000Z

439

Physical and Mechanical Metallurgy of Shape Memory Alloys for ...  

Science Conference Proceedings (OSTI)

Physical and Mechanical Metallurgy of. Shape Memory Alloys for Actuator Applications. Sponsored by. TMS Structural Materials Division (SMD). TMS/ASM:  ...

440

Institute of Computer Science New class of limited-memory ...  

E-Print Network (OSTI)

Institute of Computer Science. Academy of Sciences of the Czech Republic. New class of limited-memory variationally-derived variable metric methods. J. Vlcek ...

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Institute of Computer Science Limited-memory projective variable ...  

E-Print Network (OSTI)

Institute of Computer Science. Academy of Sciences of the Czech Republic. Limited-memory projective variable metric methods for unconstrained minimization.

442

Building Green in Greensburg: Kiowa County Memorial Hospital  

Energy.gov (U.S. Department of Energy (DOE))

This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

443

Some aspects regarding human error assessment in resilient sociotechnical systems  

Science Conference Proceedings (OSTI)

The paper focuses on a human reliability analysis (HRA) that provides estimates of relative frequencies for human errors in particular critical tasks, highlighting the exposed areas of the system in which the improvements will be beneficial. The dynamic ... Keywords: human factor qualitative, quantitative analysis, risk, sociotechnical system

Gabriela Tont; Luige Vladareanu; Radu Adrian Munteanu; Dan George Tont

2009-11-01T23:59:59.000Z

444

Automated Source-Level Error Localization in Hardware Designs  

Science Conference Proceedings (OSTI)

Recent achievements in formal verification techniques allow for fault detection even in large real-world designs. Tool support for localizing the faulty statements is critical, because it reduces development time and overall project costs. Automated ... Keywords: design error diagnosis, software debugging, model-based diagnosis, fault localization

Bernhard Peischl; Franz Wotawa

2006-01-01T23:59:59.000Z

445

Jackknife empirical likelihood tests for error distributions in regression models  

Science Conference Proceedings (OSTI)

Regression models are commonly used to model the relationship between responses and covariates. For testing the error distribution, some classical test statistics such as Kolmogorov-Smirnov test and Cramer-von-Mises test suffer from the complicated limiting ... Keywords: Goodness-of-fit test, Jackknife empirical Likelihood method, Regression model, primary

Huijun Feng; Liang Peng

2012-11-01T23:59:59.000Z

446

An algorithm for recovering camouflage errors on moving people  

Science Conference Proceedings (OSTI)

In this paper we present a model-based algorithm working as a post-processing phase of any foreground object detector. The model is suited to recover camouflage errors producing the segmentation of an entity in small and unconnected parts. The model ...

D. Conte; P. Foggia; G. Percannella; F. Tufano; M. Vento

2010-08-01T23:59:59.000Z

447

Error mining for wide-coverage grammar engineering  

Science Conference Proceedings (OSTI)

Parsing systems which rely on hand-coded linguistic descriptions can only perform adequately in as far as these descriptions are correct and complete.The paper describes an error mining technique to discover problems in hand-coded linguistic descriptions ...

Gertjan van Noord

2004-07-01T23:59:59.000Z

448

Evaluate error sources and uncertainty in large scale measurement systems  

Science Conference Proceedings (OSTI)

Modern manufacturing technologies place increasingly higher demands on industrial measurement systems. Over the last decade there have been rapid developments in 3D measurement systems, with the primary requirement coming from industries such as automotives, ... Keywords: Best fit methods, Laser scanner, Measurement errors, Uncertainty

Qing Wang; Nick Zissler; Roger Holden

2013-02-01T23:59:59.000Z

449

Testing and Error Analysis of Acceleration of Rotating Transformer  

Science Conference Proceedings (OSTI)

From the working principle of rotary transformers, the paper in-depth analyses the relationship between output voltage and rotor angle as well as speed. By using the method of series expansion and discrete, angular acceleration formula which is used ... Keywords: Rotating Transformer, Acceleration, Error of Measurement, slip frequency

Lu Xiuhe; Xue Peng

2010-07-01T23:59:59.000Z

450

DISPERSION AND DISSIPATION ERRORS OF TWO FULLY DISCRETE DISCONTINUOUS GALERKIN  

E-Print Network (OSTI)

-dimensional Euler equations in gas dynamics. There has been abundant study on the dispersion analysis of many nuDISPERSION AND DISSIPATION ERRORS OF TWO FULLY DISCRETE DISCONTINUOUS GALERKIN METHODS HE YANG, FENGYAN LI, AND JIANXIAN QIU Abstract. The dispersion and dissipation properties of numerical meth- ods

Li, Fengyan

451

A JVM for soft-error-prone embedded systems  

Science Conference Proceedings (OSTI)

The reduction of structure sizes in microcontollers, environmental conditions or low supply voltages increase the susceptibility of embedded systems to soft errors. As a result, the employment of fault-detection and fault-tolerance measures is becoming ... Keywords: KESO, RTSJ, embedded systems, java, real-time systems, reliability

Isabella Stilkerich, Michael Strotz, Christoph Erhardt, Martin Hoffmann, Daniel Lohmann, Fabian Scheler, Wolfgang Schröder-Preikschat

2013-06-01T23:59:59.000Z

452

On the Pressure Gradient Force Error in ?-Coordinate Spectral Models  

Science Conference Proceedings (OSTI)

The pressure gradient force error of the spectral technique used in combination with the ? vertical coordinate was examined in an idealized case of an atmosphere at rest and in hydrostatic equilibrium. Small-scale (one-point and three-point) ...

Zavis?a I. Janji?

1989-10-01T23:59:59.000Z

453

Counter example-based error localization of behavior models  

Science Conference Proceedings (OSTI)

Behavior models are often used to describe behaviors of the system-to-be during requirements analysis or design phases. The correctness of the specified model can be formally verified by model checking techniques. Model checkers provide counterexamples ... Keywords: design, error localization, model checking, requirements analysis

Tsutomu Kumazawa; Tetsuo Tamai

2011-04-01T23:59:59.000Z

454

Verification of unfold error estimates in the unfold operator code  

SciTech Connect

Spectral unfolding is an inverse mathematical operation that attempts to obtain spectral source information from a set of response functions and data measurements. Several unfold algorithms have appeared over the past 30 years; among them is the unfold operator (UFO) code written at Sandia National Laboratories. In addition to an unfolded spectrum, the UFO code also estimates the unfold uncertainty (error) induced by estimated random uncertainties in the data. In UFO the unfold uncertainty is obtained from the error matrix. This built-in estimate has now been compared to error estimates obtained by running the code in a Monte Carlo fashion with prescribed data distributions (Gaussian deviates). In the test problem studied, data were simulated from an arbitrarily chosen blackbody spectrum (10 keV) and a set of overlapping response functions. The data were assumed to have an imprecision of 5{percent} (standard deviation). One hundred random data sets were generated. The built-in estimate of unfold uncertainty agreed with the Monte Carlo estimate to within the statistical resolution of this relatively small sample size (95{percent} confidence level). A possible 10{percent} bias between the two methods was unresolved. The Monte Carlo technique is also useful in underdetermined problems, for which the error matrix method does not apply. UFO has been applied to the diagnosis of low energy x rays emitted by Z-pinch and ion-beam driven hohlraums. {copyright} {ital 1997 American Institute of Physics.}

Fehl, D.L.; Biggs, F. [Sandia National Laboratories, Albuquerque, New Mexico 87185 (United States)] [Sandia National Laboratories, Albuquerque, New Mexico 87185 (United States)

1997-01-01T23:59:59.000Z

455

Error computation for predictable real-time software synthesis  

Science Conference Proceedings (OSTI)

Synthesizing an implementation from a model in a predictable way is one of the major challenges in real-time system design. In our previous work we addressed this problem by generating in real-time an execution path through a model and by synchronizing ... Keywords: error computation, predictable design, property prediction, real-time systems

Jeroen Voeten; Oana Florescu; Jinfeng Huang; Henk Corporaal

2011-04-01T23:59:59.000Z

456

Note: Statistical errors estimation for Thomson scattering diagnostics  

SciTech Connect

A practical way of estimating statistical errors of a Thomson scattering diagnostic measuring plasma electron temperature and density is described. Analytically derived expressions are successfully tested with Monte Carlo simulations and implemented in an automatic data processing code of the JET LIDAR diagnostic.

Maslov, M.; Beurskens, M. N. A.; Flanagan, J.; Kempenaars, M. [EURATOM-CCFE Fusion Association, Culham Science Centre, Abingdon, Oxon OX14 3DB (United Kingdom); Collaboration: JET-EFDA Contributors

2012-09-15T23:59:59.000Z

457

U-054: Security Advisory for Adobe Reader and Acrobat | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Security Advisory for Adobe Reader and Acrobat 54: Security Advisory for Adobe Reader and Acrobat U-054: Security Advisory for Adobe Reader and Acrobat December 7, 2011 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader U3D Memory Corruption Error Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.6 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.6 and earlier 9.x versions for Windows and Macintosh ABSTRACT: This U3D memory corruption vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that the vulnerability is being actively

458

Strata: wait-free synchronization with efficient memory reclamation by using chronological memory allocation  

Science Conference Proceedings (OSTI)

A locking is the typical mechanism to coordinate the race between multiple threads. But it downgrades the overall system performance due to the waiting time for the locked data to be unlocked. Wait-free synchronization is the one of the schemes to cope ... Keywords: memory management, wait-free synchronization

Eunhwan Shin; Inhyuk Kim; Junghan Kim; Young Ik Eom

2011-06-01T23:59:59.000Z

459

Allegories of Modernity, Geographies of Memory  

E-Print Network (OSTI)

This dissertation examines how postmodernist narratives of memory in Graham Swift's Waterland, Salman Rushdie's Midnight's Children, and Amitav Ghosh's The Shadow Lines retrieve the stories of those who have been lost or forgotten in official history and refigure the temporal and spatial imaginary in intertwining personal stories of crisis with public history through acts of remembering. Questioning the modernist ideology of progress based on the idea of linear sequence of time, the novels not only retrace the heterogeneous and discontinuous layers of stories overlooked or repressed in official accounts of modern history, but also re-examine the contradictory and contested process by which subjects are situated or positioned, and its effects on the production of knowledge. These postmodern historical novels examine history as a discourse and explore its limits. The narrators of the novels are engaged with an autobiographical act of rewriting their lives, but their efforts to reconstitute themselves in unity and continuity are undermined by the disjunctive narrative form of the novels. The layered narrative of memory through which the novels reconstruct modern history is allegorical in the double sense that it exposes the act of signification by decentering the symbol of the transcendental signifier while telling an allegorical story of personal and familial history that mirrors national history in a fragmented way. In Waterland, Tom Crick retells his personal and familial stories intertwined with local and national history as alternative history lessons and challenges the Idea of Progress by revisiting sites of traumatic memory. Midnight's Children constructs counter-stories of Post-Independence India as multiple alternatives to one official version of history and addresses the limits of history in terms of "a border zone of temporality." In The Shadow Lines, the narrator retells his family history as a story of borders through his struggle with gaps in official history and creates a national imaginary with mirror images and events. The postmodernist narrative of memory in these novels turns the time of the now into a time for the "past as to come," a time to detect the unrealized and unfulfilled possibilities of the past, through retellings of the past.

Jeon, Seenhwa

2012-08-01T23:59:59.000Z

460

Nickel porphyrins for memory optical applications  

DOE Patents (OSTI)

The present invention relates to a nickel-porphyrin derivative in a matrix, the nickel-porphyrin derivative comprising at least two conformational isomers, a lower-energy-state conformer and a higher-energy-state conformer, such that when the higher-energy-state conformer is generated from the lower-energy-state conformer following absorption of a photon of suitable energy, the time to return to the lower-energy-state conformer is greater than 40 nanoseconds at approximately room temperature. The nickel-porphyrin derivative is useful in optical memory applications.

Shelnutt, John A. (Tijeras, NM); Jia, Songling (Albuquerque, NM); Medforth, Craig (Vacaville, CA); Holten, Dewey (St. Louis, MO); Nelson, Nora Y. (Manteca, CA); Smith, Kevin M. (Davis, CA)

2000-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Oil Price Trackers Inspired by Immune Memory  

E-Print Network (OSTI)

We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

Wilson, WIlliam; Aickelin, Uwe

2010-01-01T23:59:59.000Z

462

Highly multimode memory in a crystal  

E-Print Network (OSTI)

We experimentally demonstrate the storage of 1060 temporal modes onto a thulium-doped crystal using an atomic frequency comb (AFC). The comb covers 0.93 GHz defining the storage bandwidth. As compared to previous AFC preparation methods (pulse sequences i.e. amplitude modulation), we only use frequency modulation to produce the desired optical pumping spectrum. To ensure an accurate spectrally selective optical pumping, the frequency modulated laser is self-locked on the atomic comb. Our approach is general and should be applicable to a wide range of rare-earth doped material in the context of multimode quantum memory.

Bonarota, M; Chanelière, T

2010-01-01T23:59:59.000Z

463

Highly multimode memory in a crystal  

E-Print Network (OSTI)

We experimentally demonstrate the storage of 1060 temporal modes onto a thulium-doped crystal using an atomic frequency comb (AFC). The comb covers 0.93 GHz defining the storage bandwidth. As compared to previous AFC preparation methods (pulse sequences i.e. amplitude modulation), we only use frequency modulation to produce the desired optical pumping spectrum. To ensure an accurate spectrally selective optical pumping, the frequency modulated laser is self-locked on the atomic comb. Our approach is general and should be applicable to a wide range of rare-earth doped material in the context of multimode quantum memory.

M. Bonarota; J. -L. Le Gouët; T. Chanelière

2010-09-13T23:59:59.000Z

464

Hybrid NOrec: a case study in the effectiveness of best effort hardware transactional memory  

Science Conference Proceedings (OSTI)

Transactional memory (TM) is a promising synchronization mechanism for the next generation of multicore processors. Best-effort Hardware Transactional Memory (HTM) designs, such as Sun's prototype Rock processor and AMD's proposed Advanced Synchronization ... Keywords: transactional memory

Luke Dalessandro; François Carouge; Sean White; Yossi Lev; Mark Moir; Michael L. Scott; Michael F. Spear

2012-06-01T23:59:59.000Z

465

PROPANE: an environment for examining the propagation of errors in software  

Science Conference Proceedings (OSTI)

In order to produce reliable software, it is important to have knowledge on how faults and errors may affect the software. In particular, designing efficient error detection mechanisms requires not only knowledge on which types of errors to detect but ... Keywords: error propagation analysis, fault injection, software development tools, software reliability

Martin Hiller; Arshad Jhumka; Neeraj Suri

2002-07-01T23:59:59.000Z

466

B-spline goal-oriented error estimators for geometrically nonlinear rods  

Science Conference Proceedings (OSTI)

We consider goal-oriented a posteriori error estimators for the evaluation of the errors on quantities of interest associated with the solution of geometrically nonlinear curved elastic rods. For the numerical solution of these nonlinear one-dimensional ... Keywords: B-spline basis, Error estimators, Geometrically nonlinear rods, Goal-oriented a posteriori error estimation, Isogeometric analysis

L. Dedè; H. A. Santos

2012-01-01T23:59:59.000Z

467

Final Technical Report: Nanostructured Shape Memory ALloys  

SciTech Connect

With this grant we explored the properties that result from combining the effects of nanostructuring and shape memory using both experimental and theoretical approaches. We developed new methods to make nanostructured NiTi by melt-spinning and cold rolling fabrication strategies, which elicited significantly different behavior. A template synthesis method was also used to created nanoparticles. In order to characterize the particles we created, we developed a new magnetically-assisted particle manipulation technique to manipulate and position nanoscale samples for testing. Beyond characterization, this technique has broader implications for assembly of nanoscale devices and we demonstrated promising applications for optical switching through magnetically-controlled scattering and polarization capabilities. Nanoparticles of nickel-titanium (NiTi) shape memory alloy were also produced using thin film deposition technology and nanosphere lithography. Our work revealed the first direct evidence that the thermally-induced martensitic transformation of these films allows for partial indent recovery on the nanoscale. In addition to thoroughly characterizing and modeling the nanoindentation behavior in NiTi thin films, we demonstrated the feasibility of using nanoindentation on an SMA film for write-read-erase schemes for data storage.

Wendy Crone; Walter Drugan; Arthur Ellis; John Perepezko

2005-07-28T23:59:59.000Z

468

Symposium in Memory of Robert H. Siemann  

Science Conference Proceedings (OSTI)

The Symposium in Memory of Robert H. Siemann was held on July 7th, 2009 to honor the life and achievements of one of the pioneers of accelerator physics. Speakers and participants from around the world came together at SLAC to celebrate his contributions to science and to the scientific community. Speakers from each of the chapters of Bob's life were asked to provide a broad retrospective of the man and his career. Students provided brief perspectives of specific aspects of his work, and of his role as a mentor. The Siemann family attended and offered personal reminiscences. A redwood tree and memorial plaque were dedicated on the SLAC main Green in his honor. Many who attended the event felt they had learned something they did not know about their longtime colleague. In the pages that follow, the prepared remarks and slides of speakers have been collected. The richness of the contributions and breadth of topics covered are a reflection of the richness and breadth of Bob's life. The event was video recorded, and may be viewed at the SLAC library or online through the SLAC website.

Not Available

2009-12-09T23:59:59.000Z

469

Power shifts in web-based translation memory  

Science Conference Proceedings (OSTI)

Web-based translation memory (TM) is a recent and little-studied development that is changing the way localisation projects are conducted. This article looks at the technology that allows for the sharing of TM databases over the internet to find out ... Keywords: Internationalization, Localization, Machine-aided translation, Translation memory, Web-based translation

Ignacio Garcia

2007-03-01T23:59:59.000Z

470

Curating Memory: 9/11 Commemoration and Foucault's Archive  

E-Print Network (OSTI)

This study of commemoration of 9/11 on the 10th anniversary is performed at the intersection of public memory and rhetorical studies. Examining the role of the individual within public memory, this study furthers both fields by expanding on the definitions, processes, and negotiation between official and vernacular discourse. With a theoretical frame work that uses Foucault's concept of discursive archive, rhetors involved in the creation of public memory are framed as curators of a discursive archive of 9/11 memory. The role and limitations of the curatorial role is explored in three cases studies: a local ceremony, national newspapers, and Twitter hashtags. The study finds that there is a complicated interaction between vernacular and official memory and narrow definitions of the terms are not sufficient to describe the processes through which individuals take part in public memory. Rhetors involved in the public memory process may take on complex and ambiguous roles within the entangled discourses of official and vernacular memory. Within these case studies, individual curators crafted messages about the 10th anniversary of 9/11 that reify the importance of individuals tied to particular groups, urge for unity, and focus on the ten years since the tragedies.

Rowe, Sara 1988-

2012-12-01T23:59:59.000Z

471

Fragile X syndrome: Neural network models of sequencing and memory  

Science Conference Proceedings (OSTI)

A comparative framework of memory processes in males with fragile X syndrome (FXS) and typically developing (TYP) mental age-match children is presented. Results indicate a divergence in sequencing skills, such that males with FXS recall sequences similarly ... Keywords: FXS, Fragile X syndrome, Intellectual disabilities, Literacy, Memory in atypical populations, Modeling, Neural networks, Phonology

Mina C. Johnson-Glenberg

2008-10-01T23:59:59.000Z

472

SPLASH: Stanford parallel applications for shared-memory  

Science Conference Proceedings (OSTI)

We present the Stanford Parallel Applications for Shared-Memory (SPLASH), a set of parallel applications for use in the design and evaluation of shared-memory multiprocessing systems. Our goal is to provide a suite of realistic applications that will ...

Jaswinder Pal Singh; Wolf-Dietrich Weber; Anoop Gupta

1992-03-01T23:59:59.000Z

473

Memory access problems in block cyclic reduction on vector computers  

Science Conference Proceedings (OSTI)

In the present paper, modifications of block cyclic reduction are introduced by which the often significant memory access problems of this method on vector computers can be drastically reduced. The modifications are discussed in the context of an interval ... Keywords: Block cyclic reduction, interval arithmetics, memory access problems, vector computers

Hartmut Schwandt

1991-06-01T23:59:59.000Z

474

Freely movable ferromagnetic shape memory nanostructures for actuation  

Science Conference Proceedings (OSTI)

This paper presents the design and fabrication of freely movable ferromagnetic shape memory nanostructures for actuation in nanometer dimensions. Ni-Mn-Ga is chosen as a transducer material as it combines the shape memory effect and ferromagnetic properties. ... Keywords: Electron beam lithography, Epitaxial Ni-Mn-Ga films, Ion beam etching, Nanostructures

M. Schmitt; A. Backen; S. FäHler; M. Kohl

2012-10-01T23:59:59.000Z

475

2013 Special Issue: Controlling working memory with learned instructions  

Science Conference Proceedings (OSTI)

Many neural network models of cognition rely heavily on the modeler for control over aspects of model behavior, such as when to learn and whether an item is judged to be present in memory. Developing neurocomputational methods that allow these cognitive ... Keywords: Adaptive gating, Cognitive control, Hopfield attractor networks, Temporally asymmetric Hebbian learning, Working memory, n-back

J. C. Sylvester; J. A. Reggia; S. A. Weems; M. F. Bunting

2013-05-01T23:59:59.000Z

476

Safe optimisations for shared-memory concurrent programs  

Science Conference Proceedings (OSTI)

Current proposals for concurrent shared-memory languages, including C++ and C, provide sequential consistency only for programs without data races (the DRF guarantee). While the implications of such a contract for hardware optimisations are relatively ... Keywords: compiler optimizations, relaxed memory models, semantics

Jaroslav Šev?ík

2011-06-01T23:59:59.000Z

477

Minimizing bank selection instructions for partitioned memory architecture  

Science Conference Proceedings (OSTI)

Bank switching is a technique that increases the code and data memory in microcontrollers without extending the address buses. Given a program in which variables have been assigned to data banks, we present a novel optimization technique that minimizes ... Keywords: PBQP, RAM allocation, bank-switching, compiler optimization, microcontrollers, partitioned memory architecture

Bernhard Scholz; Bernd Burgstaller; Jingling Xue

2006-10-01T23:59:59.000Z

478

Advanced contention management for dynamic software transactional memory  

Science Conference Proceedings (OSTI)

The obstruction-free Dynamic Software Transactional Memory (DSTM) system of Herlihy et al@. allows only one transaction at a time to acquire an object for writing. Should a second require an object currently in use, a contention manager must determine ... Keywords: contention management, obstruction-freedom, synchronization, transactional memory

William N. Scherer, III; Michael L. Scott

2005-07-01T23:59:59.000Z

479

Performance directed energy management for main memory and disks  

Science Conference Proceedings (OSTI)

Much research has been conducted on energy management for memory and disks. Most studies use control algorithms that dynamically transition devices to low power modes after they are idle for a certain threshold period of time. The control algorithms ... Keywords: Disk energy management, adaptation algorithms, control algorithms, low-power design, memory energy management, multiple-power mode device, performance guarantee

Xiaodong Li; Zhenmin Li; Yuanyuan Zhou; Sarita Adve

2005-08-01T23:59:59.000Z

480

A frequent-value based PRAM memory architecture  

Science Conference Proceedings (OSTI)

Phase Change Random Access Memory (PRAM) has great potential as the replacement of DRAM as main memory, due to its advantages of high density, non-volatility, fast read speed, and excellent scalability. However, poor endurance and high write energy appear ...

Guangyu Sun; Dimin Niu; Jin Ouyang; Yuan Xie

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Zooming, Multiple Windows, and Visual Working Memory Matthew Plumlee  

E-Print Network (OSTI)

1 Zooming, Multiple Windows, and Visual Working Memory Matthew Plumlee Department of Computer, USA E-mail: colinw@cisunix.unh.edu ABSTRACT Zooming and multiple windows are two techniques designed windows comes in the way they aid visual working memory. The task to which we apply our model

New Hampshire, University of

482

Peculiar aspects of nanocrystal memory cells: data and extrapolations  

Science Conference Proceedings (OSTI)

Nanocrystal memory cell are a promising candidate for the scaling of nonvolatile memories in which the conventional floating gate is replaced by an array of nanocrystals. The aim of this paper is to present the results of a thorough investigation of ...

I. Crupi; D. Corso; G. Ammendola; S. Lombardo; C. Gerardi; B. DeSalvo; G. Ghibaudo; E. Rimini; M. Melanotte

2003-12-01T23:59:59.000Z

483

Broad-coverage parsing using human-like memory constraints  

Science Conference Proceedings (OSTI)

Human syntactic processing shows many signs of taking place within a general-purpose short-term memory. But this kind of memory is known to have a severely constrained storage capacity---possibly constrained to as few as three or four distinct elements. ...

William Schuler; Samir AbdelRahman; Tim Miller; Lane Schwartz

2010-03-01T23:59:59.000Z

484

Organizational Memory/Knowledge Effects on Productivity: A Longitudinal Study  

Science Conference Proceedings (OSTI)

This paper discusses a longitudinal study that explored the relationship between use of organizational memory and knowledge (OM/K) and knowledge worker productivity within the engineering group at a nuclear power plant. Three data points were taken over ... Keywords: Knowledge Management Systems, Organizational Memory Systems, Organizational Learning, IS Success

M. Jennex; L. Olfman

2002-01-01T23:59:59.000Z

485

Transactional memories for multi-processor FPGA platforms  

Science Conference Proceedings (OSTI)

Programming efficiency of heterogeneous concurrent systems is limited by the use of lock-based synchronization mechanisms. Transactional memories can greatly improve the programming efficiency of such systems. In field-programmable computing machines, ... Keywords: Multi-processor FPGAs, Transactional memories

Christoforos Kachris; Chidamber Kulkarni

2011-01-01T23:59:59.000Z

486

Programmer-centric conditions for itanium memory consistency  

Science Conference Proceedings (OSTI)

We formulate a programmer-centric description of the memory consistency model provided by the Itanium architecture. This allows reasoning about programs at a non-operational level in the natural way, not obscured by the implementation details of the ... Keywords: itanium multi-processor, programmer-centric memory consistency

Lisa Higham; LillAnne Jackson; Jalal Kawash

2006-12-01T23:59:59.000Z

487

How Long is the Memory of Tropical Ocean Dynamics?  

Science Conference Proceedings (OSTI)

Combining classic equatorial wave dynamics and midlatitude wave dynamics, a unified view is proposed to account for the memory of tropical ocean dynamics in terms of oceanic basin modes. It is shown that the dynamic memory of the ocean is bounded ...

Z. Liu

2002-12-01T23:59:59.000Z

488

Efficient data race detection for distributed memory parallel programs  

Science Conference Proceedings (OSTI)

In this paper we present a precise data race detection technique for distributed memory parallel programs. Our technique, which we call Active Testing, builds on our previous work on race detection for shared memory Java and C programs and it handles ...

Chang-Seo Park; Koushik Sen; Paul Hargrove; Costin Iancu

2011-11-01T23:59:59.000Z

489

Cache coherence tradeoffs in shared-memory MPSoCs  

Science Conference Proceedings (OSTI)

Shared memory is a common interprocessor communication paradigm for single-chip multiprocessor platforms. Snoop-based cache coherence is a very successful technique that provides a clean shared-memory programming abstraction in general-purpose chip multiprocessors, ... Keywords: Cache coherence, low power, multiprocessor, system-on-chip

Mirko Loghi; Massimo Poncino; Luca Benini

2006-05-01T23:59:59.000Z

490

Hybrid checkpointing using emerging nonvolatile memories for future exascale systems  

Science Conference Proceedings (OSTI)

The scalability of future Massively Parallel Processing (MPP) systems is being severely challenged by high failure rates. Current centralized Hard Disk Drive (HDD) checkpointing results in overhead of 25% or more at petascale. Since systems become ... Keywords: Checkpoint, background checkpoint, checkpoint prototype, exascale, hybrid checkpoint, in-disk checkpoint, in-memory checkpoint, incremental checkpoint, optimum checkpoint model, petascale, phase-change memory

Xiangyu Dong; Yuan Xie; Naveen Muralimanohar; Norman P. Jouppi

2011-07-01T23:59:59.000Z

491

In-Situ Synthesis of Shape Memory Alloy-Nitinol by Laser Direct ...  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, In-Situ Synthesis of Shape Memory ...

492

Flash Memory Garbage Collection in Hard Real-Time Systems  

E-Print Network (OSTI)

Due to advances in capacity, speed, and economics, NAND-based flash memory technology is increasingly integrated into all types of computing systems, ranging from enterprise servers to embedded devices. However, due to its unpredictable up-date behavior and time consuming garbage collection mechanism, NAND-based flash memory is difficult to integrate into hard-real-time embedded systems. In this thesis, I propose a performance model for flash memory garbage collection that can be used in conjunction with a number of different garbage collection strategies. I describe how to model the cost of reactive (lazy) garbage collection and compare it to that of more proactive schemes. I develop formulas to assess the schedulability of hard real- time periodic task sets under simplified memory consumption models. Results show that I prove the proactive schemes achieve the larger maximum schedulable utilization than the traditional garbage collection mechanism for hard real-time systems in flash memory.

Lai, Chien-An

2011-08-01T23:59:59.000Z

493

Comparison of Wind Power and Load Forecasting Error Distributions: Preprint  

DOE Green Energy (OSTI)

The introduction of large amounts of variable and uncertain power sources, such as wind power, into the electricity grid presents a number of challenges for system operations. One issue involves the uncertainty associated with scheduling power that wind will supply in future timeframes. However, this is not an entirely new challenge; load is also variable and uncertain, and is strongly influenced by weather patterns. In this work we make a comparison between the day-ahead forecasting errors encountered in wind power forecasting and load forecasting. The study examines the distribution of errors from operational forecasting systems in two different Independent System Operator (ISO) regions for both wind power and load forecasts at the day-ahead timeframe. The day-ahead timescale is critical in power system operations because it serves the unit commitment function for slow-starting conventional generators.

Hodge, B. M.; Florita, A.; Orwig, K.; Lew, D.; Milligan, M.

2012-07-01T23:59:59.000Z

494

Human Errors as an Invaluable Source for Experienced Decision Making  

E-Print Network (OSTI)

: In this paper the traditional paradigm for learning and training of operators in complex systems is discussed and criticised. There is a strong influence (the doctrine of 'mental logic') coming from research carried out in artificial intelligence. The most well known arguments against the artificial intelligence approach are presented and discussed in relation to expertise, intuition and implicit knowledge. The importance of faults and errors are discussed to describe expertise, and how knowledge about unsuccessful behaviour influences the actual decision making process of experts. 1. Introduction In this paper we will discuss the importance of learning from unsuccessful behaviour. What percentage of unanticipated events (e.g., accidents) is caused by human error? This is a question that vexed researchers for years in the context of human interaction with complex systems. In general, incident surveys in a variety of industries attribute high percentages of critical events to ...

Matthias Rauterberg; Roger Aeppli

1996-01-01T23:59:59.000Z

495

Table 2b. Relative Standard Errors for Electricity Consumption and  

U.S. Energy Information Administration (EIA) Indexed Site

2b. Relative Standard Errors for Electricity 2b. Relative Standard Errors for Electricity Table 2b. Relative Standard Errors for Electricity Consumption and Electricity Intensities, per Square Foot, Specific to Occupied and Vacant Floorspace, 1992 Building Characteristics All Buildings Using Electricity (thousand) Total Electricity Consumption (trillion Btu) Electricity Intensities (thousand Btu) In Total Floor- space In Occupied Floor- space In Vacant Floor- space Per Square Foot Per Occupied Square Foot Per Vacant Square Foot All Buildings 4 5 5 9 4 4 4 Building Floorspace (Square Feet) 1,001 to 5,000 5 6 6 12 6 6 9 5,001 to 10,000 4 9 9 13 9 9 9 10,001 to 25,000 5 7 7 14 5 5 7 25,001 to 50,000 7 10 10 21 10 10 11 50,001 to 100,000 7 12 12 15 8 8 10 100,001 to 200,000 9 13 13 24 10 11 10 200,001 to 500,000 10 13 13 19 11 11 10 Over 500,000 26 18 18 34

496

Numerical study of error propagation in Monte Carlo depletion simulations  

Science Conference Proceedings (OSTI)

Improving computer technology and the desire to more accurately model the heterogeneity of the nuclear reactor environment have made the use of Monte Carlo depletion codes more attractive in recent years, and feasible (if not practical) even for 3-D depletion simulation. However, in this case statistical uncertainty is combined with error propagating through the calculation from previous steps. In an effort to understand this error propagation, a numerical study was undertaken to model and track individual fuel pins in four 17 x 17 PWR fuel assemblies. By changing the code's initial random number seed, the data produced by a series of 19 replica runs was used to investigate the true and apparent variance in k{sub eff}, pin powers, and number densities of several isotopes. While this study does not intend to develop a predictive model for error propagation, it is hoped that its results can help to identify some common regularities in the behavior of uncertainty in several key parameters. (authors)

Wyant, T.; Petrovic, B. [Nuclear and Radiological Engineering, Georgia Inst. of Technology, 770 State Street, Atlanta, GA 30332-0745 (United States)

2012-07-01T23:59:59.000Z

497

Wind and Load Forecast Error Model for Multiple Geographically Distributed Forecasts  

Science Conference Proceedings (OSTI)

The impact of wind and load forecast errors on power grid operations is frequently evaluated by conducting multi-variant studies, where these errors are simulated repeatedly as random processes based on their known statistical characteristics. To generate these errors correctly, we need to reflect their distributions (which do not necessarily follow a known distribution law), standard deviations, auto- and cross-correlations. For instance, load and wind forecast errors can be closely correlated in different zones of the system. This paper introduces a new methodology for generating multiple cross-correlated random processes to simulate forecast error curves based on a transition probability matrix computed from an empirical error distribution function. The matrix will be used to generate new error time series with statistical features similar to observed errors. We present the derivation of the method and present some experimental results by generating new error forecasts together with their statistics.

Makarov, Yuri V.; Reyes Spindola, Jorge F.; Samaan, Nader A.; Diao, Ruisheng; Hafen, Ryan P.

2010-11-02T23:59:59.000Z

498

Memory device using movement of protons  

DOE Green Energy (OSTI)

An enhancement of an electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure during an anneal in an atmosphere containing hydrogen gas. Device operation is enhanced by concluding this anneal step with a sudden cooling. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronics elements on the same silicon substrate.

Warren, William L. (900 N. Randolph St., Arlington, VA 22203); Vanheusden, Karel J. R. (8401 Spain Rd., Albuquerque, NM 87111); Fleetwood, Daniel M. (5513 Estrellita del Norte, NE., Albuquerque, NM 87111); Devine, Roderick A. B. (12 Impasse de la Liberation, 38950 St. Martin le Vinoux, FR); Archer, Leo B. (3108 Vicky Ct., Garland, TX 75044); Brown, George A. (1512 Ridgeview Dr., Arlington, TX 76012-1940); Wallace, Robert M. (428 Park Bend Dr., Richardson, TX 75081)

2000-01-01T23:59:59.000Z

499

Release mechanism utilizing shape memory polymer material  

SciTech Connect

Microfabricated therapeutic actuators are fabricated using a shape memory polymer (SMP), a polyurethane-based material that undergoes a phase transformation at a specified temperature (Tg). At a temperature above temperature Tg material is soft and can be easily reshaped into another configuration. As the temperature is lowered below temperature Tg the new shape is fixed and locked in as long as the material stays below temperature Tg. Upon reheating the material to a temperature above Tg, the material will return to its original shape. By the use of such SMP material, SMP microtubing can be used as a release actuator for the delivery of embolic coils through catheters into aneurysms, for example. The microtubing can be manufactured in various sizes and the phase change temperature Tg is determinate for an intended temperature target and intended use.

Lee, Abraham P. (Walnut Creek, CA); Northrup, M. Allen (Berkeley, CA); Ciarlo, Dino R. (Livermore, CA); Krulevitch, Peter A. (Pleasanton, CA); Benett, William J. (Livermore, CA)

2000-01-01T23:59:59.000Z

500

Shape memory alloy seals for geothermal applications  

SciTech Connect

A shape memory radial seal was fabricated with a ''U'' cross section. Upon heating the seal recovered its original ''V'' shape and produced a high pressure seal. The sealing pressure which can be developed is approximately 41 MPa (60,000 psi), well in excess of the pressure which can be produced in conventional elastomeric seals. The low modulus martensite can conform readily to the sealing surface, and upon recovery produce a seal capable of high pressure fluid or gas confinement. The corrosion resistance of nickel-titanium in a broad range of aggressive fluids has been well established and, as such, there is little doubt that, had time permitted, a geothermal pump of flange fluid tried would have been successful.

1985-09-15T23:59:59.000Z