Powered by Deep Web Technologies
Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets...  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe AcrobatReader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe AcrobatReader PRC Memory Corruption Error Lets Remote Users Execute...

2

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

3

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

4

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library  

Broader source: Energy.gov (indexed) [DOE]

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code April 25, 2011 - 7:00am Addthis PROBLEM: A vulnerability was reported in Adobe Acrobat and Adobe Reader. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems ABSTRACT: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run

5

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Buffer Overflows and Memory Corruption 8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code November 7, 2012 - 6:00am Addthis PROBLEM: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.4.402.287 and prior for Windows and OS X; 11.2.202.243 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-24 SecurityTracker Alert ID: 1027730 CVE-2012-5274 CVE-2012-5275 CVE-2012-5276 CVE-2012-5277 CVE-2012-5278 CVE-2012-5279 CVE-2012-5280 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Adobe Flash Player. A remote user

6

V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8: RealPlayer Buffer Overflow and Memory Corruption Error Let 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028953 RealNetworks Security Bulletin CVE-2013-4973 CVE-2013-4974 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted RMP file that, when loaded by the target user, will trigger a stack overflow and execute arbitrary code on the target system. A remote user can create a specially crafted RealMedia file that, when

7

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption...  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors...

8

T-622: Adobe Acrobat and Reader Unspecified Memory Corruption...  

Broader source: Energy.gov (indexed) [DOE]

2: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability May 13, 2011 - 3:25am Addthis...

9

T-569: Adobe Flash SWF File Processing Memory Corruption Remote...  

Broader source: Energy.gov (indexed) [DOE]

69: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution...

10

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

11

T-625: Opera Frameset Handling Memory Corruption Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Opera Frameset Handling Memory Corruption Vulnerability 5: Opera Frameset Handling Memory Corruption Vulnerability T-625: Opera Frameset Handling Memory Corruption Vulnerability May 18, 2011 - 3:05pm Addthis PROBLEM: A vulnerability has been reported in Opera, which can be exploited by malicious people to compromise a user's system. PLATFORM: Opera versions prior to 11.11 ABSTRACT: The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page. reference LINKS: Secunia Advisory: SA44611 Opera Knowledge Base Opera 11.11 for Windows Opera Download Opera Mobile IMPACT ASSESSMENT: High Discussion: Framesets allow web pages to hold other pages inside them. Certain frameset constructs are not handled correctly when the page is unloaded, causing a

12

T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

22: Adobe Acrobat and Reader Unspecified Memory Corruption 22: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability May 13, 2011 - 3:25am Addthis PROBLEM: Adobe Acrobat and Reader contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. PLATFORM: Adobe Reader versions 9.4.1 and prior, versions 8.2.5 and prior, and version 10.0 Acrobat Standard and Professional versions 9.4.1 and prior and version 10.0 Acrobat Standard and Professional versions 8.2.5 and prior Acrobat Professional Extended versions 9.4.1 and prior Acrobat 3D versions 8.2.5 and prior Adobe Flash Player versions 10.2.159.1 and prior for Windows, Macintosh, Linux, and Solaris ABSTRACT: The vulnerability is due to an unspecified error in the affected software

13

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

14

U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft Windows win32k.sys Memory Corruption Vulnerability 5: Microsoft Windows win32k.sys Memory Corruption Vulnerability U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability December 20, 2011 - 9:45am Addthis PROBLEM: Microsoft Windows win32k.sys Memory Corruption Vulnerability. PLATFORM: Operating System Microsoft Windows 7 ABSTRACT: Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. reference LINKS: Secunia Advisory SA47237 MS11-087:Article ID: 2639417 IMPACT ASSESSMENT: High Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page

15

T-627: Adobe Flash Player Memory Corruption | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Memory Corruption 7: Adobe Flash Player Memory Corruption T-627: Adobe Flash Player Memory Corruption May 20, 2011 - 2:50pm Addthis PROBLEM: Adobe Flash Player Memory Corruption, Denial Of Service, Execute Code PLATFORM: Windows, Mac OS X, Linux, and Solaris ABSTRACT: Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file. reference LINKS: CVE Details - CVE-2011-0627 CVE Details - Adobe Flash Player Vulnerability Statistics CVE Details - Adobe Security Vulnerabilities IMPACT ASSESSMENT: High Discussion:

16

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

17

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...  

Energy Savers [EERE]

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute...

18

T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

6: Google SketchUp v8.x - '.DAE' File Memory Corruption 6: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 14, 2011 - 9:28am Addthis PROBLEM: Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. PLATFORM: Google SketchUp 8 is vulnerable; other versions may also be affected. ABSTRACT: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability reference LINKS: Vulnerability-Lab SketchUp Downloads IMPACT ASSESSMENT: Medium Discussion: A Memory Corruption vulnerability is detected on the Google s SketchUp v8.x. The vulnerability is caused by an memory corruption when processing corrupt DAE files through the filter, which could be exploited by attackers

19

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets 45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger a heap corruption error in 'vidplin.dll' and execute arbitrary code on the target system. The code will run with the

20

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Broader source: Energy.gov (indexed) [DOE]

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

22

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Broader source: Energy.gov (indexed) [DOE]

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

23

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors  

E-Print Network [OSTI]

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

Mather, Mara

24

Practical Memory Checking with Dr. Memory Derek Bruening  

E-Print Network [OSTI]

Practical Memory Checking with Dr. Memory Derek Bruening Google bruening@google.com Qin Zhao Massachusetts Institute of Technology qin zhao@csail.mit.edu Abstract--Memory corruption, reading uninitialized memory, using freed memory, and other memory-related errors are among the most difficult programming bugs

Tomkins, Andrew

25

V-194: Citrix XenServer Memory Management Error Lets Local Administrat...  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local...

26

U-243: libvirt virTypedParameterArrayClear() Memory Access Error...  

Broader source: Energy.gov (indexed) [DOE]

3: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny...

27

U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets  

Broader source: Energy.gov (indexed) [DOE]

3: libvirt virTypedParameterArrayClear() Memory Access Error 3: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service August 24, 2012 - 7:00am Addthis PROBLEM: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service PLATFORM: Version(s): 0.9.13 and prior ABSTRACT: A vulnerability was reported in libvirt. reference LINKS: libvirt SecurityTracker Alert ID: 1027437 Secunia Advisory SA50118 Bugtraq ID: 54748 CVE-2012-3445 IMPACT ASSESSMENT: Medium Discussion A remote user can send a specially crafted RPC call with the number of parameters set to zero to libvirtd to trigger a memory access error in virTypedParameterArrayClear() and cause the target service to crash. Impact:

28

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

29

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

30

Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing  

SciTech Connect (OSTI)

Faults have become the norm rather than the exception for high-end computing on clusters with 10s/100s of thousands of cores. Exacerbating this situation, some of these faults remain undetected, manifesting themselves as silent errors that corrupt memory while applications continue to operate and report incorrect results. This paper studies the potential for redundancy to both detect and correct soft errors in MPI message-passing applications. Our study investigates the challenges inherent to detecting soft errors within MPI application while providing transparent MPI redundancy. By assuming a model wherein corruption in application data manifests itself by producing differing MPI message data between replicas, we study the best suited protocols for detecting and correcting MPI data that is the result of corruption. To experimentally validate our proposed detection and correction protocols, we introduce RedMPI, an MPI library which resides in the MPI profiling layer. RedMPI is capable of both online detection and correction of soft errors that occur in MPI applications without requiring any modifications to the application source by utilizing either double or triple redundancy. Our results indicate that our most efficient consistency protocol can successfully protect applications experiencing even high rates of silent data corruption with runtime overheads between 0% and 30% as compared to unprotected applications without redundancy. Using our fault injector within RedMPI, we observe that even a single soft error can have profound effects on running applications, causing a cascading pattern of corruption in most cases causes that spreads to all other processes. RedMPI's protection has been shown to successfully mitigate the effects of soft errors while allowing applications to complete with correct results even in the face of errors.

Fiala, David J [ORNL; Mueller, Frank [North Carolina State University; Engelmann, Christian [ORNL; Ferreira, Kurt Brian [Sandia National Laboratories (SNL); Brightwell, Ron [Sandia National Laboratories (SNL); Riesen, Rolf [IBM Research, Ireland

2012-07-01T23:59:59.000Z

31

Secure Memories Resistant to Both Random Errors and Fault Injection Attacks Using Nonlinear Error Correction Codes  

E-Print Network [OSTI]

University, Boston , USA shizunge@bu.edu, wang.zhen.mtk@gmail.com, luopei@bu.edu, markkar@bu.edu Abstract and internal memories in em- bedded systems. Non-volatile memories like EEPROM and Flashes are often used author now works for Mediatek Wireless, Inc. The work of the fourth author is sponsored by the NSF grant

32

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets 4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service May 17, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in Novell eDirectory. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HP/UX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user can cause denial of service conditions. reference LINKS: Novell eDirectory - LDAP-SSL SECURELIST.ORG SecurityFocus BugTrackID: 47858 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Novell eDirectory. A remote user can cause

33

Thermalization, Error Correction, and Memory Lifetime for Ising Anyon Systems  

Science Journals Connector (OSTI)

We consider two-dimensional lattice models that support Ising anyonic excitations and are coupled to a thermal bath. We propose a phenomenological model for the resulting short-time dynamics that includes pair creation, hopping, braiding, and fusion of anyons. By explicitly constructing topological quantum error-correcting codes for this class of system, we use our thermalization model to estimate the lifetime of the quantum information stored in the encoded spaces. To decode and correct errors in these codes, we adapt several existing topological decoders to the non-Abelian setting. We perform large-scale numerical simulations of these two-dimensional Ising anyon systems and find that the thresholds of these models range from 13% to 25%. To our knowledge, these are the first numerical threshold estimates for quantum codes without explicit additive structure.

Courtney G. Brell; Simon Burton; Guillaume Dauphinais; Steven T. Flammia; David Poulin

2014-09-30T23:59:59.000Z

34

Corruption in Uganda  

E-Print Network [OSTI]

of corruption in Uganda? Causes and Consequences ofto January 24, 1986, Uganda has lacked exemplary leadership.the Central Bank (Bank of Uganda). If salary and wage rises

Nsibambi, Apolo

1987-01-01T23:59:59.000Z

35

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

and compromise a user's system. 1) An unspecified error can be exploited to corrupt memory. 2) Some unspecified errors can be exploited to corrupt memory. 3) Another unspecified...

36

Corruption, evasion and environmental policy: a game theory approach  

Science Journals Connector (OSTI)

......Stoch. Environ. Res. Risk Assess. Doi:10...success. Working paper. Investment Climate Department...Corruption, public investment, and growth, IMF Working...Kein A. J. ed.), Political Economy of Corruption...2005) Corruption, political competition and environmental......

Roy Cerqueti; Raffaella Coppier

2014-10-01T23:59:59.000Z

37

V-009: Adobe Shockwave Player Buffer Overflows and Array Error...  

Broader source: Energy.gov (indexed) [DOE]

has issued a fix (11.6.8.638). Addthis Related Articles U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player...

38

SHEFFIELD HALLAM UNIVERSITY FRAUD AND CORRUPTION RESPONSE PLAN  

E-Print Network [OSTI]

1 SHEFFIELD HALLAM UNIVERSITY FRAUD AND CORRUPTION RESPONSE PLAN DECEMBER 2011 Compliance for services; all enrolled or registered students. The Fraud & Corruption Response Plan details the responsibilities for action in the event of a suspected fraud, corruption or bribery as defined by the Anti

Wrigley, Stuart

39

CORRUPTION AND ILLEGAL LOGGING IN THE WOOD  

E-Print Network [OSTI]

CORRUPTION AND ILLEGAL LOGGING IN THE WOOD PRODUCTS MARKET: the Italian experience in controlling% of wood international trade is based on illegal logging; a total value of 150 Billion $/year (OECD Environmental Outlook, 2001) · At least 50% of wood removals in the Amazon basin, Central Africa and South

Pettenella, Davide

40

A journey from a corruption port to a tax haven  

Science Journals Connector (OSTI)

Abstract We sketch a model according to which tax havens attract corporate income generated in corrupted countries. We consider the choice of optimal bribes by corrupt officials and the share of the proceeds of corruption that will be concealed in tax havens. Our framework provides novel welfare implications of tax havens. First, tax havens’ services have a positive effect on welfare through encouraging investment by firms fearing expropriation and bribes in corrupt countries. Second, by supporting corruption and the concealment of officials’ bribes, tax havens discourage the provision of public goods and hence have also a negative effect on welfare. The net welfare effect depends on the specified preferences and parameters. One source of this ambiguity is that the presence of multinational firms in corrupted countries is positively associated with demanding tax havens’ operations. Using firm-level data, we provide new empirical results supporting this hypothesis.

Shafik Hebous; Vilen Lipatov

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

When Crime Pays: Measuring Judicial Efficacy against Corruption in Brazil  

E-Print Network [OSTI]

for now - crime pays in Brazil. Paginal5de27 ReferencesEfficacy against Corruption in Brazil Carlos Higino Ribeiroa widespread perception in Brazil that civil servants caught

Ribeiro de Alencar, Carlos Higino; Gico, Ivo Jr.

2010-01-01T23:59:59.000Z

42

Limiting Political Corruption: Some Effective Remedies? Political corruption has a long history and deep roots in all levels of our government.  

E-Print Network [OSTI]

Limiting Political Corruption: Some Effective Remedies? Political corruption has a long history with less political corruption. Moreover, the effect of campaign finance disclosure exerts a bigger effect officials are much more honest than average, or our state's enforcement of political corruption statutes

Ahmad, Sajjad

43

Memory Usage Considerations on Hopper  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Memory Usage Considerations on Hopper Most Hopper compute nodes have 32 GB of physical memory, but, not all that memory is available to user programs. Compute Node Linux (the kernel), the Lustre file system software, and message passing library buffers all consume memory, as does loading the executable into memory. Thus the precise memory available to an application varies. Approximately 31 GB of memory can be allocated from within an MPI program using all 24 cores per node, i.e., 1.29 GB per MPI task on average. If an application uses 12 MPI tasks per node, then each MPI task could use about 2.58 GB of memory. You may see an error message such as "OOM killer terminated this process." "OOM" means Out of Memory and it means that your code has exhausted the

44

The Bigger Picture of Corruption: Europe in Comparative Perspective  

E-Print Network [OSTI]

systems (e.g. Belarus, Ukraine) are located so closely toof corruption are found in Ukraine (7.6), Albania (7.2),Perception Index, 2014). Ukraine Albania Moldova Georgia

Kubbe, Ina

2014-01-01T23:59:59.000Z

45

Reconstruction of ECG signals in presence of corruption  

E-Print Network [OSTI]

We present an approach to identifying and reconstructing corrupted regions in a multi-parameter physiological signal. The method, which uses information in correlated signals, is specifically designed to preserve clinically ...

Ganeshapillai, Gartheeban

46

Issued 28 May 2010 ANTI-FRAUD AND CORRUPTION POLICY  

E-Print Network [OSTI]

Issued 28 May 2010 ANTI-FRAUD AND CORRUPTION POLICY Introduction The purpose of this policy is to set out the University's expectations of staff regarding the prevention of fraud and the procedures to follow where a fraud is detected or suspected. This policy should be read in conjunction with the Code

Feigon, Brooke

47

Samurai: protecting critical data in unsafe languages  

Science Journals Connector (OSTI)

Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present a data-centric solution to memory corruption called critical memory, a ... Keywords: critical memory, error recovery, memory safety

Karthik Pattabiraman; Vinod Grover; Benjamin G. Zorn

2008-04-01T23:59:59.000Z

48

Mechanical memory  

DOE Patents [OSTI]

A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Albuquerque, NM); Baker, Michael S. (Albuquerque, NM)

2006-05-16T23:59:59.000Z

49

Mechanical memory  

DOE Patents [OSTI]

A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Alburquerque, NM); Baker, Michael S. (Albuquerque, NM)

2006-08-15T23:59:59.000Z

50

A Robust Quantum Random Access Memory  

E-Print Network [OSTI]

A "bucket brigade" architecture for a quantum random memory of $N=2^n$ memory cells needs $n(n+5)/2$ times of quantum manipulation on control circuit nodes per memory call. Here we propose a scheme, in which only average $n/2$ times manipulation is required to accomplish a memory call. This scheme may significantly decrease the time spent on a memory call and the average overall error rate per memory call. A physical implementation scheme for storing an arbitrary state in a selected memory cell followed by reading it out is discussed.

Fang-Yu Hong; Yang Xiang; Zhi-Yan Zhu; Li-zhen Jiang; Liang-neng Wu

2012-01-11T23:59:59.000Z

51

Memory distortion: an adaptive perspective  

E-Print Network [OSTI]

concerning factors that can influence the occurrence of memory distortions, such as sleep and retrieval kinds of errors and distortions. Studies of memory distortion have a long history in both theoretical narrative that becomes our autobiography. In the process of reconstructing the past, we color and shape our

Schacter, Daniel

52

Memory effects in a Markov chain dephasing channel  

E-Print Network [OSTI]

We study a dephasing channel with memory, modelled by a Markov chain. We show that even weak memory effects have a detrimental impact on the performance of quantum error correcting schemes designed for uncorrelated errors. We also discuss an alternative scheme that takes advantage of memory effects to protect quantum information.

Antonio D'Arrigo; Elena De Leo; Giuliano Benenti; Giuseppe Falci

2008-02-28T23:59:59.000Z

53

EIA - Sorry! Unexpected Error  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

Cold Fusion Error Unexpected Error Sorry An error was encountered. This error could be due to scheduled maintenance. Information about the error has been routed to the appropriate...

54

The pros and cons of corruption of firm performance : a micro-level study of businesses in Indonesia  

E-Print Network [OSTI]

Over the past 10 years, different international organization and NGO's have given birth to a whole host of different anti corruption programs in response to the recent "endemic" of corruption which is seen to plague ...

Murdaya, Karuna

2005-01-01T23:59:59.000Z

55

An Appliance-driven Approach to Detection of Corrupted Load Curve Data  

E-Print Network [OSTI]

@sfu.ca, jiuyang_tang@nudt.edu.cn, jshlei@shiep.edu.cn ABSTRACT Load curve data in power systems refers to usersAn Appliance-driven Approach to Detection of Corrupted Load Curve Data Guoming Tang1,3 , Kui Wu1 discov- ered in the data. Load curve data, however, usually suffers from corruptions caused by various

Pei, Jian

56

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

a specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system...

57

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

that, when loaded by the target user, will trigger a buffer overflow, use-after-free memory error, or memory corruption error and execute arbitrary code on the target system. The...

58

On-line Self Error Detection with Equal Protection Against All Errors Mark G. Karpovsky, Konrad J. Kulikowski, Zhen Wang  

E-Print Network [OSTI]

On-line Self Error Detection with Equal Protection Against All Errors Mark G. Karpovsky, Konrad J and storage. We also present several design techniques for memories with self-error-detection based on the pro. The proposed robust codes require slightly larger overhead than standard and widely-used linear codes

Karpovsky, Mark

59

An assessment of the waste effects of corruption on infrastructure provision  

Science Journals Connector (OSTI)

In this paper, we investigate the association between the efficiency of infrastructure provision and the level of corruption, in the province in which the infrastructure takes place, employing a large dataset ...

Massimo Finocchiaro Castro; Calogero Guccio…

2014-08-01T23:59:59.000Z

60

Errors Today and Errors Tomorrow  

Science Journals Connector (OSTI)

...even though they encounter flaws when they or their family members are patients, do not see the flaws when they act as health care providers. The invisibility of injuries to patients makes them seem trivial or infrequent. Until we find ways to make errors and injuries routinely visible in local health... If the Institute of Medicine is right, then at the very least, 100 patients will die in hospitals in the United States today because of injuries from their care, not from their diseases. How many will die tomorrow? Tom Nolan, one of the leading quality-...

Berwick D.M.

2003-06-19T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Flexible and Transparent Memory  

E-Print Network [OSTI]

K. L. Wang. , “Robust Bi-Stable Memory Operation in Single-Graphene Ferroelectric Memory,” Appl. Phy. Lett. , 99 (4),Flexible and Transparent Memory” IEEE International Memory

KIM, SUNG MIN

2012-01-01T23:59:59.000Z

62

Money Laundering, Corruption and Growth: An Empirical Rationale for a Global Convergence on Anti-Money Laundering Regulation  

E-Print Network [OSTI]

Control, Autumn 2001. MAURO, Paolo. “Corruption and Growth”.Journal of Economics, August MAURO, Paolo. "The Effects ofparagraph. We first confirmed Mauro’ [1995] results on the

Cavalcante Veiga, Luiz Humberto; Andrade, Joaquim Pinto

2006-01-01T23:59:59.000Z

63

Heralded quantum gates with integrated error detection in optical cavitites  

E-Print Network [OSTI]

We propose and analyze heralded quantum gates between qubits in optical cavities. They employ an auxiliary qubit to report if a successful gate occurred. In this manner, the errors, which would have corrupted a deterministic gate, are converted into a non-unity probability of success: once successful the gate has a much higher fidelity than a similar deterministic gate. Specifically, we describe that a heralded , near-deterministic controlled phase gate (CZ-gate) with the conditional error arbitrarily close to zero and the success probability that approaches unity as the cooperativity of the system, C, becomes large. Furthermore, we describe an extension to near-deterministic N- qubit Toffoli gate with a favorable error scaling. These gates can be directly employed in quantum repeater networks to facilitate near-ideal entanglement swapping, thus greatly speeding up the entanglement distribution.

J. Borregaard; P. Kómár; E. M. Kessler; A. S. Sørensen; M. D. Lukin

2015-01-05T23:59:59.000Z

64

Memory Usage Considerations on Franklin  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Memory Considerations Memory Considerations Memory Usage Considerations on Franklin Each Franklin compute node has 8 GB (8192 MB) of physical memory, but, not all that memory is...

65

Learning, Memory, & Attention Instructor  

E-Print Network [OSTI]

1 COGS 101B: Learning, Memory, & Attention · Welcome! · Instructor ­ Dr. Coulson ­ Email: coulson Attention ­ Divided Attention ­ Automaticity ­ Attentional Capture · Immediate Memory ­ Sensory Memory ­ Short-Term Memory ­ Working Memory · Long-Term Memory ­ Levels of Processing ­ Memory Systems

Coulson, Seana

66

Current Concepts: Memory Dysfunction  

Science Journals Connector (OSTI)

...dysfunction of the episodic memory system (Figure 1). Memory loss attributable to dysfunction of the episodic memory system follows a predictable pattern known as Ribot's law, which states that events just before an ictus are most vulnerable to dissolution, whereas remote memories are most resistant. Thus... This practical review for clinicians explains that memory dysfunction is now understood in terms of four systems: episodic memory, semantic memory, procedural memory, and working memory. Separate anatomical areas of the brain are responsible for each memory system. This overview of memory should help nonspecialists in the evaluation and diagnosis of patients with various types of memory dysfunction.

Budson A.E.; Price B.H.

2005-02-17T23:59:59.000Z

67

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

system. 1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be...

68

Reactivating personal memory 1 RUNNING HEAD: Reactivating personal memory  

E-Print Network [OSTI]

Reactivating personal memory 1 RUNNING HEAD: Reactivating personal memory Modifying memory: Selectively enhancing and updating personal memories for a museum; Reactivating personal memory 2 Abstract Memory can be modified when reactivated

Schacter, Daniel

69

Towards Automated Memory Model Generation Via Event Tracing  

Science Journals Connector (OSTI)

......is a growing concern for high performance computing laboratories around the...with under 7% error. high performance computing|memory|multi-core...is a growing concern for high performance computing laboratories around the......

O.F.J. Perks; D.A. Beckingsale; S.D. Hammond; I. Miller; J.A. Herdman; A. Vadgama; A.H. Bhalerao; L. He; S.A. Jarvis

2013-02-01T23:59:59.000Z

70

When long memory meets the Kalman filter: A comparative study  

Science Journals Connector (OSTI)

The finite sample properties of the state space methods applied to long memory time series are analyzed through Monte Carlo simulations. The state space setup allows to introduce a novel modeling approach in the long memory framework, which directly ... Keywords: ARFIMA models, Level shifts, Measurement error, Missing observations, State space

Stefano Grassi, Paolo Santucci De Magistris

2014-08-01T23:59:59.000Z

71

Spatial memory, recognition memory, and the hippocampus  

E-Print Network [OSTI]

Spatial memory, recognition memory, and the hippocampus Nicola J. Broadbent*, Larry R. Squire. Squire, August 27, 2004 There is wide agreement that spatial memory is dependent on the integrity recognition memory is not as clear. We examined the relationship between hippocampal lesion size and both

Squire, Larry R.

72

Memory Technologies Vivek Asthana  

E-Print Network [OSTI]

Memory Technologies Vivek Asthana 13th Mar 2013 #12;13-Mar-13 2 Memory Usage (2025) #12;13-Mar-13 3 Outline What is a Memory Current Memory technologies · SRAM · DRAM · Flash Upcoming Memory technologies · MRAM · PCRAM · FeRAM · ... #12;13-Mar-13 4 What is a Memory Memory cell: Binary data storage element

Kumar, M. Jagadesh

73

Memory Systems Doug Burger  

E-Print Network [OSTI]

Memory Systems Doug Burger University of Wisconsin-Madison A computer's memory system and produces. A perfect memory system is one that can supply immediately any datum that the CPU requests. This ideal memory is not practically implementable, however, as the three factors of memory capacity, speed

Burger, Doug

74

Memory Coalescing Techniques 1 Accessing Global and Shared Memory  

E-Print Network [OSTI]

Memory Coalescing Techniques 1 Accessing Global and Shared Memory memory coalescing to global memory avoiding bank conflicts in shared memory 2 Memory Coalescing Techniques accessing global memory for a matrix using shared memory for coalescing 3 Avoiding Bank Conflicts computing consecutive powers MCS 572

Verschelde, Jan

75

Genepool Memory Heatmaps  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Genepool Memory Heatmaps Heatmap of Memory and Slots Requested vs Time Waited (in hours) | Queue: All | Last 7 Days Memory Requested Slots <5GB 5-10GB 10-20GB 20-30GB 30-40GB...

76

Shared memory optimizations for distributed memory programming models  

Science Journals Connector (OSTI)

In the world of parallel programming, there are two major classes of programming models: shared memory and distributed memory. Shared memory models share all memory by default, and are most effective on multi-processor systems. Distributed memory models ...

Andrew Friedley / Andrew Lumsdaine

2013-01-01T23:59:59.000Z

77

Memory Usage Considerations on Hopper  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Memory Considerations Memory Considerations Memory Usage Considerations on Edison Edison compute nodes have 64 GB of physical memory (2.67GB per core), but, not all that memory is...

78

ArchShield: architectural framework for assisting DRAM scaling by tolerating high error rates  

Science Journals Connector (OSTI)

DRAM scaling has been the prime driver for increasing the capacity of main memory system over the past three decades. Unfortunately, scaling DRAM to smaller technology nodes has become challenging due to the inherent difficulty in designing smaller geometries, ... Keywords: dynamic random access memory, error correction, hard faults

Prashant J. Nair; Dae-Hyun Kim; Moinuddin K. Qureshi

2013-06-01T23:59:59.000Z

79

Memory Considerations for Carver  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Overview Carver login nodes each have 48GB of physical memory. Most compute nodes have 24GB; however, 80 compute nodes have 48GB. Not all of this memory is available to user processes. Some memory is reserved for the Linux kernel. Furthermore, since Carver nodes have no disk, the "root" file system (including /tmp) is kept in memory ("ramdisk"). The kernel and root file system combined occupy about 4GB of memory. Therefore users should try to use no more than 20GB on most compute nodes, or 44GB on the large-memory compute nodes. There are also two "extra-large" memory nodes; each node has four 8-core Intel X7550 ("Nehalem EX") 2.0 GHz processors (32 cores total) and 1TB memory. These nodes are available through the queue "reg_xlmem". Please

80

Optical memory  

DOE Patents [OSTI]

Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

Mao, Samuel S; Zhang, Yanfeng

2013-07-02T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Memory Hard Drive Peripherals  

E-Print Network [OSTI]

1! CSI3131 Topics CPU Memory Hard Drive Peripherals Computing Systems OS Overview StructureDeadlocks M em ory M anagem ent Basic Memory Managermtn Virtual Memory Storage and I/O File Systems Hard Drive Management Swap I/O Management 2 Module 7: Memory Management Reading: Chapter 8 § To provide a detailed

Stojmenovic, Ivan

82

Hardware-efficient autonomous quantum error correction  

E-Print Network [OSTI]

We propose a new method to autonomously correct for errors of a logical qubit induced by energy relaxation. This scheme encodes the logical qubit as a multi-component superposition of coherent states in a harmonic oscillator, more specifically a cavity mode. The sequences of encoding, decoding and correction operations employ the non-linearity provided by a single physical qubit coupled to the cavity. We layout in detail how to implement these operations in a practical system. This proposal directly addresses the task of building a hardware-efficient and technically realizable quantum memory.

Zaki Leghtas; Gerhard Kirchmair; Brian Vlastakis; Robert Schoelkopf; Michel Devoret; Mazyar Mirrahimi

2013-01-16T23:59:59.000Z

83

On Memory, Trauma, Public Space, Monuments, and Memorials  

E-Print Network [OSTI]

responsive sites of memory. 18. From conversations withand the Politics of Memory (Stanford: Stanford Universitysuggests that national memory debates are always shot

Bonder, Julian

2009-01-01T23:59:59.000Z

84

Rethinking the memory hierarchy design with nonvolatile memory technologies.  

E-Print Network [OSTI]

??The memory hierarchy, including processor caches and the main memory, is an important component of various computer systems. The memory hierarchy is becoming a fundamental… (more)

Zhao, Jishen

2014-01-01T23:59:59.000Z

85

Device and Architecture Concurrent Optimization for FPGA Transient Soft Error Rate  

E-Print Network [OSTI]

Device and Architecture Concurrent Optimization for FPGA Transient Soft Error Rate Yan Lin and Lei-level transient soft errors in circuit elements other than configuration memory, and transient SER can no longer be ignored. We then de- velop an efficient, yet accurate, transient SER evaluation method, called trace based

He, Lei

86

Errors of Nonobservation  

U.S. Energy Information Administration (EIA) Indexed Site

Errors of Nonobservation Errors of Nonobservation Finally, several potential sources of nonsampling error and bias result from errors of nonobservation. The 1994 MECS represents, in terms of sampling coverage, the mail frame of the 1994 ASM or 98 percent of the manufacturing universe, which is consistent with the 1991 MECS. Unit Nonresponse Even though the MECS is a legislatively mandated survey and sampled establishments are given sufficient opportunity and time to respond, nonresponse occurs in the MECS and is accounted for in a nonresponse adjustment of sampling weights. Clearly, had these adjustments not been performed, the estimates produced from only the responding establishments would not have been representative of the target universe for the MECS. Such estimates would have been biased. Adjusting the sampling weights to

87

Familiar Space in Social Memory  

E-Print Network [OSTI]

would be touched upon by this memory task. Of course, otherfront. Then, I produced memory routes for each list obtainedof people remembered - memory rank + 1) / # of people

Bennardo, Giovanni

2008-01-01T23:59:59.000Z

88

Quantum error control codes  

E-Print Network [OSTI]

QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Abdelhamid Awad Aly Ahmed, Sala

2008-10-10T23:59:59.000Z

89

PDSF Memory Considerations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Interactive Nodes The amount of memory available on the interactive nodes is described on the Interactive (login) Nodes page. The interactive nodes are shared among all users and running high memory jobs on the interactive nodes slows them down for everyone. If you think your work might be disruptive you should either run it in batch or run it interactively on a batch node as described here. Batch Nodes The batch system knows how much memory each node has and how much memory each job requires. By default each job is given 1.1GB, but you can request more or less memory by following the instructions in Submitting Jobs. However, it should be noted that the more memory you require, the harder it will be for the batch system to schedule your job, especially when the

90

Shared Memory Parallel Programming with Entry Consistency for Distributed Memory  

E-Print Network [OSTI]

Midway: Shared Memory Parallel Programming with Entry Consistency for Distributed Memory to ensure a correctly functioning program. Midway is a shared memory parallel programming system which addresses the problem of excessive communication in a distributed memory multiprocessor. Midway programs

91

V-035: Google Chrome Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

of the target user. An out-of-bounds read may occur in Skia CVE-2012-5130. A memory corruption error may occur in the Apple OSX driver for Intel GPUs CVE-2012-5131. A...

92

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

create specially crafted content that, when loaded by the target user, will trigger a memory corruption error CVE-2012-4163, CVE-2012-4164, CVE-2012-4165, CVE-2012-4166 or...

93

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

94

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...  

Broader source: Energy.gov (indexed) [DOE]

a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-114: RealPlayer MP4...

95

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

management domain (Dom0). (CVE-2011-1583) May 18, 2011 T-625: Opera Frameset Handling Memory Corruption Vulnerability The vulnerability is caused due to an error when handling...

96

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run...

97

Memory abstractions for parallel programming  

E-Print Network [OSTI]

A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly ...

Lee, I-Ting Angelina

2012-01-01T23:59:59.000Z

98

Drifting absence :: drafting memory  

E-Print Network [OSTI]

The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

Kuhn, Marlene Eva

2006-01-01T23:59:59.000Z

99

Recoverable distributed shared memory  

E-Print Network [OSTI]

Distributed Shared Memory (DSM) is a model for interprocess communication, implemented on top of message passing systems. In this model, processes running on separate hosts can access a shared, coherent memory address space, provided...

Kanthadai, Sundarrajan S

2012-06-07T23:59:59.000Z

100

Memory-mapped transactions  

E-Print Network [OSTI]

Memory-mapped transactions combine the advantages of both memory mapping and transactions to provide a programming interface for concurrently accessing data on disk without explicit I/O or locking operations. This interface ...

Sukha, Jim

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Truth in Emotional Memories  

Science Journals Connector (OSTI)

One of the ways that true and false memories could be different from one another is in their consequentiality. That is, because true memories represent events that actually happened to people, it is plausible tha...

Cara Laney; Elizabeth F. Loftus

2010-01-01T23:59:59.000Z

102

Cognitive Neuroscience Learning and Memory  

E-Print Network [OSTI]

1 Slide 1 Cognitive Neuroscience PSYC 685 Learning and Memory Raja Parasuraman WorkingWorking MemoryMemory SelectiveSelective AttentionAttention Slide 2 Overview Short term, working, and long-term memory The medial temporal lobe/prefrontal cortex memory system Amnesia Implicit memory Slide 3

Parasuraman, Raja

103

Memory Loss Chapter 6  

E-Print Network [OSTI]

Part II Memory Loss 129 #12;#12;Chapter 6 Generalized Conditionalization Up to this point we have to help CLF model two types of certainty-loss stories: stories in- volving memory loss and stories-sensitivity, (PEP) does almost no work in modeling stories involving memory loss. So we will proceed in stages: We

Fitelson, Branden

104

Quantum random access memory  

E-Print Network [OSTI]

A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially less gates, and leads to an exponential decrease in the power needed for addressing. A quantum optical implementation is presented.

Vittorio Giovannetti; Seth Lloyd; Lorenzo Maccone

2007-08-14T23:59:59.000Z

105

Methods and apparatus using commutative error detection values for fault isolation in multiple node computers  

DOE Patents [OSTI]

Methods and apparatus perform fault isolation in multiple node computing systems using commutative error detection values for--example, checksums--to identify and to isolate faulty nodes. When information associated with a reproducible portion of a computer program is injected into a network by a node, a commutative error detection value is calculated. At intervals, node fault detection apparatus associated with the multiple node computer system retrieve commutative error detection values associated with the node and stores them in memory. When the computer program is executed again by the multiple node computer system, new commutative error detection values are created and stored in memory. The node fault detection apparatus identifies faulty nodes by comparing commutative error detection values associated with reproducible portions of the application program generated by a particular node from different runs of the application program. Differences in values indicate a possible faulty node.

Almasi, Gheorghe (Ardsley, NY) [Ardsley, NY; Blumrich, Matthias Augustin (Ridgefield, CT) [Ridgefield, CT; Chen, Dong (Croton-On-Hudson, NY) [Croton-On-Hudson, NY; Coteus, Paul (Yorktown, NY) [Yorktown, NY; Gara, Alan (Mount Kisco, NY) [Mount Kisco, NY; Giampapa, Mark E. (Irvington, NY) [Irvington, NY; Heidelberger, Philip (Cortlandt Manor, NY) [Cortlandt Manor, NY; Hoenicke, Dirk I. (Ossining, NY) [Ossining, NY; Singh, Sarabjeet (Mississauga, CA) [Mississauga, CA; Steinmacher-Burow, Burkhard D. (Wernau, DE) [Wernau, DE; Takken, Todd (Brewster, NY) [Brewster, NY; Vranas, Pavlos (Bedford Hills, NY) [Bedford Hills, NY

2008-06-03T23:59:59.000Z

106

Finite-Memory Least Squares Universal Prediction of Individual Continuous Sequences  

E-Print Network [OSTI]

the Exponential Decaying Memory (EDM) machine, used in the past for predicting binary sequences, and show bounds consider a class of machines denoted the Degenerated Tracking Memory (DTM) machines that outperform the EDM of individual continuous sequences with square-error loss, using a deterministic finite-state machine (FSM

Feder, Meir

107

Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error Rates in GPGPU  

E-Print Network [OSTI]

Graphics processing units (GPUs) are gaining widespread use in computational chemistry and other scientific simulation contexts because of their huge performance advantages relative to conventional CPUs. However, the reliability of GPUs in error-intolerant applications is largely unproven. In particular, a lack of error checking and correcting (ECC) capability in the memory subsystems of graphics cards has been cited as a hindrance to the acceptance of GPUs as high-performance coprocessors, but the impact of this design has not been previously quantified. In this article we present MemtestG80, our software for assessing memory error rates on NVIDIA G80 and GT200-architecture-based graphics cards. Furthermore, we present the results of a large-scale assessment of GPU error rate, conducted by running MemtestG80 on over 20,000 hosts on the Folding@home distributed computing network. Our control experiments on consumer-grade and dedicated-GPGPU hardware in a controlled environment found no errors. However, our su...

Haque, Imran S

2009-01-01T23:59:59.000Z

108

Memory of myself: Autobiographical memory and identity in Alzheimer's disease  

E-Print Network [OSTI]

Memory of myself: Autobiographical memory and identity in Alzheimer's disease Donna Rose Addis autobiographical memory and identity. To test this we assessed the status of autobiographical memory and identity degree of autobiographical memory impairment was associated with changes in identity. Two tests

Addis, Donna Rose

109

March 29, 2008 Operating Systems: Main Memory 1 Main Memory  

E-Print Network [OSTI]

March 29, 2008 Operating Systems: Main Memory 1 Main Memory Chapter 8 #12;March 29, 2008 Operating Systems: Main Memory 2 Chapter Outline Background Contiguous Memory Allocation Paging Structure of the Page Table Segmentation #12;March 29, 2008 Operating Systems: Main Memory 3 Objectives To provide

Adam, Salah

110

An FPGA-Based Framework for Run-time Injection and Analysis of Soft Errors in Microprocessors  

E-Print Network [OSTI]

-specified memory elements of an entire microprocessor (MIPS32) running application software. While the framework is applicable to arbitrary software, we demonstrate its usage by characterizing soft errors effects on several software filters used in aviation for probabilistic sensor data fusion. I. INTRODUCTION Soft errors cause

Teschner, Matthias

111

A multiplexed quantum memory  

Science Journals Connector (OSTI)

A quantum repeater is a system for long-distance quantum communication that employs quantum memory elements to mitigate optical fiber transmission losses. The multiplexed quantum...

Lan, S -Y; Radnaev, A G; Collins, O A; Matsukevich, D N; Kennedy, T A; Kuzmich, A

2009-01-01T23:59:59.000Z

112

Novel Nanocrystal Floating Gate Memory  

E-Print Network [OSTI]

nanocrystal-based nonvolatile memory. Reference: [1] H. A.process to make metal/high-k core-shell NC memory may openup opportunities for memory applications. References [1] W.

Zhou, Huimei

2012-01-01T23:59:59.000Z

113

The Generation Effect and Memory  

E-Print Network [OSTI]

A distinct form of episodic memory? New York, NY: OxfordA meta- analytic review. Memory & Cognition, 35(2), 201–210.dissociations among memory measures: Support for a transfer-

Rosner, Zachary Alexander

2012-01-01T23:59:59.000Z

114

New 1 Terabyte Memory Node  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New 1 Terabyte Memory Node New 1 Terabyte Memory Node June 17, 2011 by Francesca Verdier (0 Comments) A new "extra large" memory node that has four 8-core Nehalem EX processors (32...

115

Eavesdropping without quantum memory  

E-Print Network [OSTI]

In quantum cryptography the optimal eavesdropping strategy requires that the eavesdropper uses quantum memories in order to optimize her information. What happens if the eavesdropper has no quantum memory? It is shown that the best strategy is actually to adopt the simple intercept/resend strategy.

H. Bechmann-Pasquinucci

2005-04-01T23:59:59.000Z

116

Working memory, long-term memory, and medial temporal lobe function  

E-Print Network [OSTI]

1 ………………………………………………………. ………….. Working Memory, Long-term Memory, and Medial Temporal Lobe Function Whendepend on working memory? ……………………………. Impaired short-term

Jeneson, Annette

2012-01-01T23:59:59.000Z

117

Optical quantum memory  

E-Print Network [OSTI]

Quantum memory is important to quantum information processing in many ways: a synchronization device to match various processes within a quantum computer, an identity quantum gate that leaves any state unchanged, and a tool to convert heralded photons to photons-on-demand. In addition to quantum computing, quantum memory would be instrumental for the implementation of long-distance quantum communication using quantum repeaters. The importance of this basic quantum gate is exemplified by the multitude of optical quantum memory mechanisms being studied: optical delay lines, cavities, electromagnetically-induced transparency, photon-echo, and off-resonant Faraday interaction. Here we report on the state-of-the-art in the field of optical quantum memory, including criteria for successful quantum memory and current performance levels.

A. I. Lvovsky; B. C. Sanders; W. Tittel

2010-02-24T23:59:59.000Z

118

Sleep & Memory/Review Memory reactivation and consolidation during sleep  

E-Print Network [OSTI]

Sleep & Memory/Review Memory reactivation and consolidation during sleep Ken A. Paller1 and Joel L, Illinois 60208-2710, USA Do our memories remain static during sleep, or do they change? We argue here that memory change is not only a natural result of sleep cognition, but further, that such change constitutes

Paller, Ken

119

Nested Quantum Error Correction Codes  

E-Print Network [OSTI]

The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

2009-09-28T23:59:59.000Z

120

Nebular Abundance Errors  

E-Print Network [OSTI]

The errors inherent to the use of the standard "ionization correction factor" ("i_CF") method of calculating nebular conditions and relative abundances of H, He, N, O, Ne, S, and Ar in emission line nebulae have been investigated under conditions typical for planetary nebulae. The photoionization code CLOUDY was used to construct a series of model nebulae with properties spanning the range typical of PNe. Its radial "profiles" of bright, frequently observed optical emission lines were then summed over a variety of "apertures" to generate sets of emission line measurements. These resulting line ratios were processed using the i_CF method to "derive" nebular conditions and abundances. We find that for lines which are summed over the entire nebula the i_CF-derived abundances differ from the input abundances by less than 5% for He and O up to 25% or more for Ne, S, and Ar. For resolved observations, however, the discrepancies are often much larger and are systematically variable with radius. This effect is especially pronounced in low-ionization zones where nitrogen and oxygen are neutral or once-ionized such as in FLIERs, ansae and ionization fronts. We argue that the reports of stellar-enriched N in the FLIERs of several PNe are probably specious.

J. Alexander; B. Balick

1997-04-30T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Device Memories and Matrix Multiplication 1 Device Memories  

E-Print Network [OSTI]

the same location. The GeForce 9400M has 65,536 bytes of constant memory, the total amount of global memory is 254 MBytes. The Tesla C2050/C2070 has 65,536 bytes of constant memory, the total amount of global memory, the total amount of global memory is 4,800 MBytes (5,032,706,048 bytes) with 1

Verschelde, Jan

122

Experimental Uncertainties (Errors) Sources of Experimental Uncertainties (Experimental Errors)  

E-Print Network [OSTI]

the preparation of the lab report. A calculator should 1. Bevington, P. R., Data Reduction and Error Analysis for the Physical Sciences, New York: McGraw-Hill, 1969. 2. Taylor, J. R., An introduction to uncertainty analysis in the lab. In this laboratory, we keep to a very simple form of error analysis, our purpose being more

Mukasyan, Alexander

123

Data& Error Analysis 1 DATA and ERROR ANALYSIS  

E-Print Network [OSTI]

Data& Error Analysis 1 DATA and ERROR ANALYSIS Performing the experiment and collecting data learned, you might get a better grade.) Data analysis should NOT be delayed until all of the data. This will help one avoid the problem of spending an entire class collecting bad data because of a mistake

Mukasyan, Alexander

124

Mondriaan memory protection  

E-Print Network [OSTI]

Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

Witchel, Emmett Jethro, 1970-

2004-01-01T23:59:59.000Z

125

Hardware Transactional Memory  

E-Print Network [OSTI]

This work shows how hardware transactional memory (HTM) can be implemented to support transactions of arbitrarily large size, while ensuring that small transactions run efficiently. Our implementation handles small ...

Lie, Sean

126

Quantum Channels with Memory  

E-Print Network [OSTI]

We present a general model for quantum channels with memory, and show that it is sufficiently general to encompass all causal automata: any quantum process in which outputs up to some time t do not depend on inputs at times t' > t can be decomposed into a concatenated memory channel. We then examine and present different physical setups in which channels with memory may be operated for the transfer of (private) classical and quantum information. These include setups in which either the receiver or a malicious third party have control of the initializing memory. We introduce classical and quantum channel capacities for these settings, and give several examples to show that they may or may not coincide. Entropic upper bounds on the various channel capacities are given. For forgetful quantum channels, in which the effect of the initializing memory dies out as time increases, coding theorems are presented to show that these bounds may be saturated. Forgetful quantum channels are shown to be open and dense in the set of quantum memory channels.

Dennis Kretschmann; Reinhard F. Werner

2005-02-17T23:59:59.000Z

127

Euclid, NERSC's Sunfire Shared Memory Analytics System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

High Throughput Job Carver seriallong queue, or Hopper Hight Throughput Queue Large Memory Batch MPP Code Carver Extra-large memory noderegxlmem queue Large Memory Interactive...

128

Error correcting code with chip kill capability and power saving enhancement  

DOE Patents [OSTI]

A method and system are disclosed for detecting memory chip failure in a computer memory system. The method comprises the steps of accessing user data from a set of user data chips, and testing the user data for errors using data from a set of system data chips. This testing is done by generating a sequence of check symbols from the user data, grouping the user data into a sequence of data symbols, and computing a specified sequence of syndromes. If all the syndromes are zero, the user data has no errors. If one of the syndromes is non-zero, then a set of discriminator expressions are computed, and used to determine whether a single or double symbol error has occurred. In the preferred embodiment, less than two full system data chips are used for testing and correcting the user data.

Gara, Alan G. (Mount Kisco, NY); Chen, Dong (Croton On Husdon, NY); Coteus, Paul W. (Yorktown Heights, NY); Flynn, William T. (Rochester, MN); Marcella, James A. (Rochester, MN); Takken, Todd (Brewster, NY); Trager, Barry M. (Yorktown Heights, NY); Winograd, Shmuel (Scarsdale, NY)

2011-08-30T23:59:59.000Z

129

Efficient Memory Shadowing for 64-bit Architectures  

E-Print Network [OSTI]

Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of application memory. The efficiency of mapping between application memory and shadow memory has substantial impact on the ...

Zhao, Qin

2010-01-01T23:59:59.000Z

130

Cache Memories ALAN JAY SMITH  

E-Print Network [OSTI]

Cache Memories ALAN JAY SMITH Unwersity of California, Berkeley, Californm 94720 Cache memories 1982 #12;474 * A. J. Smith CONTENTS INTRODUCTION Definltlonand Rationale Overwew of Cache Deslgn Cache

Lee, Hsien-Hsin "Sean"

131

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted.  

E-Print Network [OSTI]

parity) Energy demand and GDP per capita (1980-2002) As GDP increases, so does the demand's population is in the Fast- developing regions. Primaryenergypercapita(GJ) GDP per capita (purchasing power;Introduction Top Ten problems of Humanity for next 50 years 1. Energy 2. Water 3

Crawford, T. Daniel

132

Unequal error protection of subband coded bits  

E-Print Network [OSTI]

Source coded data can be separated into different classes based on their susceptibility to channel errors. Errors in the Important bits cause greater distortion in the reconstructed signal. This thesis presents an Unequal Error Protection scheme...

Devalla, Badarinath

2012-06-07T23:59:59.000Z

133

Communication error detection using facial expressions  

E-Print Network [OSTI]

Automatic detection of communication errors in conversational systems typically rely only on acoustic cues. However, perceptual studies have indicated that speakers do exhibit visual communication error cues passively ...

Wang, Sy Bor, 1976-

2008-01-01T23:59:59.000Z

134

Working Memory Overload: Fronto-Limbic Interactions and Effects on Subsequent Working Memory Function  

E-Print Network [OSTI]

involvement in human working memory. Neuroimage, 5(1), 49–constraints in working memory as revealed by function- alin a nonspatial working memory task with functional MRI.

Yun, Richard J.; Krystal, John H.; Mathalon, Daniel H.

2010-01-01T23:59:59.000Z

135

Efficient Main Memory Deduplication Through Cross Layer Integration.  

E-Print Network [OSTI]

??Limited main memory size is the primary bottleneck for consolidating VMs. Memory scanners reduce the memory footprint of VMs by eliminating duplicate memory pages. Our… (more)

Miller, Konrad

2014-01-01T23:59:59.000Z

136

errors  

E-Print Network [OSTI]

... Cant Find Variable Mentioned in NEXT Statement 136 Floating Point Overflow (Number too Large) 137 No Corresponding GOSUB for this RETURN statement ...

137

ERROR ESTIMATIONS FOR INDIRECT MEASUREMENTS  

E-Print Network [OSTI]

Chapter 1 ERROR ESTIMATIONS FOR INDIRECT MEASUREMENTS: RANDOMIZED VS. DETERMINISTIC ALGORITHMS difficult or even impossible to directly measure the quantity in which we are interested: e.g., we cannot directly measure a distance to a distant galaxy or the amount of oil in a given well. Since we cannot

Kreinovich, Vladik

138

TED KYCIA MEMORIAL SYMPOSIUM.  

SciTech Connect (OSTI)

On the afternoon of May 19 2000, a Memorial Seminar was held in the BNL physics Large Seminar Room to honor the memory of Ted Kyeia, a prominent particle physicist who had been a member of the BNL staff for 40 years. Although it was understandably a somewhat sad occasion because Ted was no longer with us, nevertheless there was much for his colleagues and friends to celebrate in recalling the outstanding contributions that he had made in those four decades. The Seminar speakers were all people who had worked with Ted during that period; each discussed one aspect of his career, but also included anecdotes and personal reminiscences. This booklet contains the Seminar program, listing the speakers, and also copies of transparencies of the talks (and one paper which was a later expansion of a talk); sadly, not all of the personal remarks appeared on the transparencies.

LITTENBERG, L.; RUBINSTEIN, R.; SAMIOS, N.; LI, K.; GIACOMELLI, G.; MOCKETT, P.; CARROLL, A.; JOHNSON, R.; BRYMAN, D.; TIPPENS, B.

2000-05-19T23:59:59.000Z

139

Genepool Memory Heatmaps  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Genepool Memory Heatmaps Genepool Memory Heatmaps Heatmap of Memory and Slots Requested vs Time Waited (in hours) | Queue: All | Last 7 Days Memory Requested Slots <5GB 5-10GB 10-20GB 20-30GB 30-40GB 40-50GB 50-100GB 100-150GB 150-200GB 200-256GB 256-512GB 512+GB Job Count Longest Wait 1 2.26 (2693) 10.5 (201167) 3.2 (11650) 0 1.75 (282) 1.49 (1627) 0.03 (1) 0 0 0 0 0 217420 538.96 2 0.26 (103) 1.02 (2817) 0 0 0 0 0 0 0 0 0 0 2920 9.1 4 1.55 (198) 1.48 (104) 0.34 (8) 0 0 0 1.86 (3) 0 0 0 0 0 313 20.48 6 0.01 (1) 0.09 (34) 0 0 0 0 0 0 0 0 0 0 35 1.22 8 0.34 (37) 6.15 (12376) 1.01 (17) 24.7 (1) 0.03 (3) 0 0.02 (6) 0 0 0 0 0 12440 46.16 10 0 8.56 (1) 0 0 0 0 0 0 0 0 0 0 1 8.56 16 0 0.03 (1) 0 0 0 0 0 0 0 0 0 0 1 0.03 24 0 0 0.01 (1) 0 0 0 0 0 0 0 0 0 1 0.01 32 0 0.01 (4) 0.05 (9) 0 0.01 (6) 0 0.0 (1) 0 0 0 0 0 20 0.26

140

Memories of Julian Schwinger  

E-Print Network [OSTI]

The career and accomplishments of Julian Schwinger, who shared the Nobel Prize for physics in 1965, have been reviewed in numerous books and articles. For this reason these Memories, which seek to convey a sense of Schwinger's remarkable talents as a physicist, concentrate primariy (though not entirely) on heretofore unpublished pertinent recollections of the youthful Schwinger by this writer, who first encountered Schwinger in 1934 when they both were undergraduates at the City College of New York.

Gerjuoy, Edward

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Shape memory alloy actuator  

DOE Patents [OSTI]

An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

Varma, Venugopal K. (Knoxville, TN)

2001-01-01T23:59:59.000Z

142

The memory glasses : wearable computing for just-in-time memory support  

E-Print Network [OSTI]

This thesis documents a body of wearable computing research surrounding the development of the Memory Glasses, a new type of proactive memory support technology. The Memory Glasses combines features of existing memory ...

DeVaul, Richard W. (Richard Wayne), 1971-

2004-01-01T23:59:59.000Z

143

Memory effects in quantum channel discrimination  

E-Print Network [OSTI]

We consider quantum-memory assisted protocols for discriminating quantum channels. We show that for optimal discrimination of memory channels, memory assisted protocols are needed. This leads to a new notion of distance for channels with memory. For optimal discrimination and estimation of sets of unitary channels memory-assisted protocols are not required.

Giulio Chiribella; Giacomo M. D'Ariano; Paolo Perinotti

2008-03-21T23:59:59.000Z

144

How Minds Work Working & Episodic Memory  

E-Print Network [OSTI]

1 How Minds Work Working & Episodic Memory Stan Franklin Computer Science Division & Institute for Intelligent Systems The University of Memphis #12;HMW: Working and Episodic Memory 2 Memory Systems #12;HMW: Working and Episodic Memory 3 #12;HMW: Working and Episodic Memory 4 Percept · Result of filtering

Memphis, University of

145

Is memory purely preservative?* Jrme Dokic  

E-Print Network [OSTI]

1 Is memory purely preservative?* J�r�me Dokic (University of Rouen and CREA, Paris) In C. Hoerl & T. McCormack (eds), Time and Memory, Oxford: OUP. �1 Two forms of memory and Goethe's Problem Let us start with a familiar distinction between two forms of memory: episodic memory (remembering a thing

Paris-Sud XI, Université de

146

Gifts in Memory of LEHIGH UNIVERSITY 1 Anonymous, in memory of  

E-Print Network [OSTI]

Gifts in Memory of LEHIGH UNIVERSITY 1 Anonymous, in memory of Gerald G. Leeman '71P '10GP Michael P. Ament, in memory of Hilda P. Ament and Miles K. Ament '49 Allen M. Barnett, in memory of Matthew A. Yantis '01 Samuel W. Barnhart, in memory of Donald H. Dimmick '55 Dorothy Barrows, in memory

Gilchrist, James F.

147

Working Memory and Schizophrenia 1 Running head: working memory and schizophrenia  

E-Print Network [OSTI]

Working Memory and Schizophrenia 1 Running head: working memory and schizophrenia Working memory.Park@vanderbilt.edu or Junghee.Lee@vanderbilt.edu #12;Working Memory and Schizophrenia 2 Abstract Working memory (WM) deficit and/or early part of maintenance may be problematic. #12;Working Memory and Schizophrenia 3

Park, Sohee

148

Carlsbad employees fund veteran memorial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Carlsbad Employees Fund Veteran Memorial Community Connections: Your link to news and opportunities from Los Alamos National Laboratory Latest Issue: Dec. 2014 - Jan. 2015 All...

149

An analysis of MRAM based memory technologies  

E-Print Network [OSTI]

MRAM is a memory (RAM) technology that uses electron spin to store information. Often been called "the ideal memory", it can potentially combine the density of DRAM with the speed of SRAM and non-volatility of FLASH memory ...

Vijayaraghavan, Rangarajan, M. Eng. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

150

Vlsi Design And Comparison Of Bank Memory With Multiport Memory Cell Versus Conventional Multiport And Multibank Sram Memory.  

E-Print Network [OSTI]

??The main focus of this thesis is to determine whether designing a bank memory with multiport memory cell (hybrid design) is advantageous over conventionally used… (more)

Lakkakula, Sunil Kumar

2009-01-01T23:59:59.000Z

151

Human errors and structural failure probability  

Science Journals Connector (OSTI)

Predicting the influence of human errors on structural failure probability is the topic of this paper. There are two principal reasons for needing this information. First, if errors are present after the design of a structure is completed, as is generally the case, this will provide the engineer with a measure of what effect such errors will have on the structural safety. Second, this information is directly useful in the optimisation of quality assurance expenditures, which can effectively be used for controlling the probability of structural failure due to errors. Simplified probabilistic models are developed to integrate human errors into structural risk assessment. Numerical examples illustrate the sensitivity of structural safety to errors.

Dan M. Frangopol

1988-01-01T23:59:59.000Z

152

Nanoparticle shuttle memory  

DOE Patents [OSTI]

A device for storing data using nanoparticle shuttle memory having a nanotube. The nanotube has a first end and a second end. A first electrode is electrically connected to the first end of the nanotube. A second electrode is electrically connected to the second end of the nanotube. The nanotube has an enclosed nanoparticle shuttle. A switched voltage source is electrically connected to the first electrode and the second electrode, whereby a voltage may be controllably applied across the nanotube. A resistance meter is also connected to the first electrode and the second electrode, whereby the electrical resistance across the nanotube can be determined.

Zettl, Alex Karlwalter (Kensington, CA)

2012-03-06T23:59:59.000Z

153

Theories with Memory  

E-Print Network [OSTI]

Dimensionally reduced supersymmetric theories retain a great deal of information regarding their higher dimensional origins. In superspace, this "memory" allows us to restore the action governing a reduced theory to that describing its higher-dimensional progenitor. We illustrate this by restoring four-dimensional N=4 Yang-Mills to its six-dimensional parent, N=(1,1) Yang-Mills. Supersymmetric truncation is introduced into this framework and used to obtain the N=1 action in six dimensions. We work in light-cone superspace, dealing exclusively with physical degrees of freedom.

Sudarshan Ananth

2005-10-07T23:59:59.000Z

154

Software Coherence in Multiprocessor Memory Systems.  

E-Print Network [OSTI]

??Processors are becoming faster and multiprocessor memory interconnection systems are not keeping up. Therefore, it is necessary to have threads and the memory they access… (more)

Bolosky, William J.

2009-01-01T23:59:59.000Z

155

Building Data Centers With Optically Connected Memory  

Science Journals Connector (OSTI)

Future data centers will require novel, scalable memory architectures capable of sustaining high bandwidths while still achieving low memory access latencies. Electronic...

Brunina, Daniel; Lai, Caroline P; Garg, Ajay S; Bergman, Keren

2011-01-01T23:59:59.000Z

156

Hospital Greenspace Lawson Memorial Hospital,  

E-Print Network [OSTI]

H Hospital Greenspace Lawson Memorial Hospital, Golspie ­ Greenspace Case Study Background to hospital greenspace to be carried out in the Highlands. This project is now entering its third phase. Phase of Phase 2. This resulted in the identification of the Lawson Memorial Hospital as the site

157

Shape memory alloy thaw sensors  

DOE Patents [OSTI]

A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

1998-01-01T23:59:59.000Z

158

Phase Errors and the Capture Effect  

SciTech Connect (OSTI)

This slide-show presents analysis of spectrograms and the phase error of filtered noise in a signal. When the filtered noise is smaller than the signal amplitude, the phase error can never exceed 90{deg}, so the average phase error over many cycles is zero: this is called the capture effect because the largest signal captures the phase and frequency determination.

Blair, J., and Machorro, E.

2011-11-01T23:59:59.000Z

159

Efficient Virtual Memory for Big Memory Servers Our analysis shows that many "big-memory" server workloads,  

E-Print Network [OSTI]

-memory" server workloads, such as databases, in-memory caches, and graph analytics, pay a high cost for page introduced [13]. In contrast, virtual memory usage has changed dramatically in recent years. For example-negligible energy [5, 41] To reevaluate the cost and benefit of decades-old page-based vir- tual memory in today

Hill, Mark D.

160

Event Understanding and Memory 1 Running head: Event Understanding and Memory  

E-Print Network [OSTI]

Event Understanding and Memory 1 Running head: Event Understanding and Memory Event Understanding and Memory in Healthy Aging and Dementia of the Alzheimer Type Jeffrey M. Zacks, Nicole K. Speer, Jean M Understanding and Memory 2 Abstract Segmenting ongoing activity into events is important for later memory

Zacks, Jeffrey M.

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Gifts in Memory of LEHIGH UNIVERSITY 1 James B. Abeltin `74 in memory of  

E-Print Network [OSTI]

Gifts in Memory of LEHIGH UNIVERSITY 1 James B. Abeltin `74 in memory of Roger K. McFillin `74 `04P James J. Addonizio `75 in memory of Roger K. McFillin `74 `04P Alan J. & Susan A. Fuirst Philanthropic Fund in memory of David J. Sielewicz `86 Betty W. Alderson in memory of James B. Hobbs Amaranth

Napier, Terrence

162

Item memory, source memory, and the medial temporal lobe: Concordant findings from fMRI  

E-Print Network [OSTI]

Item memory, source memory, and the medial temporal lobe: Concordant findings from fMRI and memory Lake City, UT 84143 Contributed by Larry R. Squire, April 4, 2006 We studied item and source memory with fMRI in healthy volun- teers and carried out a parallel study in memory-impaired patients

Wagner, Anthony

163

Effect of memory access and caching on high performance computing.  

E-Print Network [OSTI]

??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers… (more)

Groening, James

2012-01-01T23:59:59.000Z

164

Collective Memory Transfers for Multi-Core Chips  

E-Print Network [OSTI]

A. McKee, “The impulse memory controller,” IEEE Transactionsand K. Yelick, “Improving memory subsystem performance usingBasu, and E. Horvitz, “Memory constrained face recognition,”

Michelogiannakis, George

2014-01-01T23:59:59.000Z

165

Probability, Statistics, and the Theory of Errors  

Science Journals Connector (OSTI)

1 June 1933 research-article Probability, Statistics, and the Theory of Errors Harold Jeffreys The Royal Society is collaborating with JSTOR to digitize, preserve, and extend access...

1933-01-01T23:59:59.000Z

166

Error analysis for resonant thermonuclear reaction rates  

Science Journals Connector (OSTI)

A detailed presentation is given of estimating uncertainties in thermonuclear reaction rates for stellar nucleosynthesis involving narrow resonances, starting from random errors in measured or calculated resonance and nuclear level properties. Special attention is given to statistical matters such as probability distributions, error propagation, and correlations between errors. Interpretation of resulting uncertainties in reaction rates and the distinction between symmetric and asymmetric errors are also discussed. Computing reaction rate uncertainties is described. We give examples from explosive nucleosynthesis by hydrogen burning on light nuclei.

William J. Thompson; C. Iliadis

1999-01-01T23:59:59.000Z

167

Thermal Hydraulic Simulations, Error Estimation and Parameter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Error Estimation and Parameter Sensitivity Studies in Drekar::CFD Thomas M. Smith, John N. Shadid, Roger P. Pawlowski, Eric C. Cyr and Timothy M. Wildey Sandia National...

168

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets...  

Broader source: Energy.gov (indexed) [DOE]

the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HPUX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user...

169

MC-Checker: Detecting Memory Consistency Errors in MPI One-Sided Applications  

E-Print Network [OSTI]

bugs in MPI one-sided applications, with low overhead, ranging from 24.6% to 71.1%, with an average Terms -- Design, Performance, Reliability Keywords -- Bug Detection, MPI, One-Sided Communication I- world application, where the one-sided MPI_Get operation (line 2) is nonblocking. As a result, the data

Balaji, Pavan

170

Engineering complex topological memories from simple Abelian models  

SciTech Connect (OSTI)

In three spatial dimensions, particles are limited to either bosonic or fermionic statistics. Two-dimensional systems, on the other hand, can support anyonic quasiparticles exhibiting richer statistical behaviors. An exciting proposal for quantum computation is to employ anyonic statistics to manipulate information. Since such statistical evolutions depend only on topological characteristics, the resulting computation is intrinsically resilient to errors. The so-called non-Abelian anyons are most promising for quantum computation, but their physical realization may prove to be complex. Abelian anyons, however, are easier to understand theoretically and realize experimentally. Here we show that complex topological memories inspired by non-Abelian anyons can be engineered in Abelian models. We explicitly demonstrate the control procedures for the encoding and manipulation of quantum information in specific lattice models that can be implemented in the laboratory. This bridges the gap between requirements for anyonic quantum computation and the potential of state-of-the-art technology. - Highlights: > A novel quantum memory using Abelian anyons is developed. > This uses an advanced encoding, inspired by non-Abelian anyons. > Errors are suppressed topologically, by means of single spin interactions. > An implementation with current Josephson junction technology is proposed.

Wootton, James R., E-mail: phyjrw@leeds.ac.uk [School of Physics and Astronomy, University of Leeds, Woodhouse Lane, Leeds LS2 9JT (United Kingdom); Lahtinen, Ville [School of Physics and Astronomy, University of Leeds, Woodhouse Lane, Leeds LS2 9JT (United Kingdom); Doucot, Benoit [Laboratoire de Physique Theorique et Hautes Energies, Universite Paris 6 et 7, Paris (France); Pachos, Jiannis K. [School of Physics and Astronomy, University of Leeds, Woodhouse Lane, Leeds LS2 9JT (United Kingdom)

2011-09-15T23:59:59.000Z

171

Synchronization in the presence of memory  

E-Print Network [OSTI]

We study the effect of memory on synchronization of identical chaotic systems driven by common external noises. Our examples show that while in general synchronization transition becomes more difficult to meet when memory range increases, for intermediate ranges the synchronization tendency of systems can be enhanced. Generally the synchronization transition is found to depend on the memory range and the ratio of noise strength to memory amplitude, which indicates on a possibility of optimizing synchronization by memory. We also point out on a close link between dynamics with memory and noise, and recently discovered synchronizing properties of networks with delayed interactions.

Rafael Morgado; Michal Ciesla; Lech Longa; Fernando A. Oliveira

2006-10-11T23:59:59.000Z

172

Quantum Error Correction Beyond Completely Positive Maps  

E-Print Network [OSTI]

By introducing an operator sum representation for arbitrary linear maps, we develop a generalized theory of quantum error correction (QEC) that applies to any linear map, in particular maps that are not completely positive (CP). This theory of "linear quantum error correction" is applicable in cases where the standard and restrictive assumption of a factorized initial system-bath state does not apply.

A. Shabani; D. A. Lidar

2009-10-21T23:59:59.000Z

173

Remarks on statistical errors in equivalent widths  

E-Print Network [OSTI]

Equivalent width measurements for rapid line variability in atomic spectral lines are degraded by increasing error bars with shorter exposure times. We derive an expression for the error of the line equivalent width $\\sigma(W_\\lambda)$ with respect to pure photon noise statistics and provide a correction value for previous calculations.

Klaus Vollmann; Thomas Eversberg

2006-07-03T23:59:59.000Z

174

QuarkNet Workshop: Beyond Human Error  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Human Error Human Error QuarkNet Workshop for High School Science Teachers 8:30 am to 4:00 pm, August 1 -3, 2012 at Fermi National Accelerator Laboratory This was a three-day workshop for high school science teachers. Measurement and error are key ingredients for all science applications. Both align with the Next Generation Science Standards, but many high school students struggle to understand the importance of error analysis and prevention. Over the three days we examined multiple experiments going on at Fermilab and discussed the ways that scientists take measurements and reduce error on these projects. Participants met and worked with scientists from Fermilab and University of Chicago to look at how error analysis takes place at Fermilab and bridged those ideas into high school classes. Teachers discussed lesson plans available at Fermilab and their own methods of teaching error analysis. Additionally, participants heard from high school students who participated in summer research as they presented their findings and linked students' learning back to the teachers' understanding of error recognition and analysis.

175

Meeting 12 February 25, 1999 Error Measure  

E-Print Network [OSTI]

. The value of â?? is the corresponding eigenvalue. The eigen­ values are the roots of the characteristic distances is non­negative, so Q is pos­ itive semi­definite. The error of an edge contraction is obtained paraboloid as illustrated in Figure 3. In other words, the preimage of a constant error value ffl, E \\Gamma1

California at Berkeley, University of

176

Hopper Trouble Shooting and Error Messages  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Trouble Shooting and Error Messages Trouble Shooting and Error Messages Trouble Shooting and Error Messages Error Messages Message or Symptom Fault Recommendation job hit wallclock time limit user or system Submit job for longer time or start job from last checkpoint and resubmit. If your job hung and produced no output contact consultants. received node failed or halted event for nid xxxx system One of the compute nodes assigned to the job failed. Resubmit the job PtlNIInit failed : PTL_NOT_REGISTERED user The executable is from an XT system (Franklin or Jaguar?) using portals. Recompile on Hopper and resubmit. error while loading shared libraries: libxxxx.so: cannot open shared object file: No such file or directory mostly user, sometimes system Make sure environment variable CRAY_ROOTFS is set to DSL, also the modules loaded when building the dynamic executable is also loaded at run time. Report to consultants if still not resolved.

177

Memory cost of quantum protocols  

E-Print Network [OSTI]

In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-12-16T23:59:59.000Z

178

THE HEART OF CAMPUS Memorial Union Building  

E-Print Network [OSTI]

THE HEART OF CAMPUS Memorial Union Building University of New Hampshire 83 Main Street Durham, NH The Memorial Union Building is "The Heart of Campus" and serves as the official New Hampshire State War

New Hampshire, University of

179

Design of Ferromagnetic Shape Memory Alloy Composites  

E-Print Network [OSTI]

, superelasticity, bending plate, coil spring. INTRODUCTION RECENTLY, FERROMAGNETIC SHAPE memory alloys (FSMAs torque actuator (bending of FSMA composite plate) and spring actuator (torsion of helical FSMA composite spring). KEY WORDS: shape memory alloy, ferromagnetic material, stress-induced martensite transformation

Taya, Minoru

180

Program Transformations in Weak Memory Models   

E-Print Network [OSTI]

We analyse the validity of common optimisations on multi-threaded programs in two memory models—the DRF guarantee and the Java Memory Model. Unlike in the single-threaded world, even simple program transformations, such ...

Sevcik, Jaroslav

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Effect of Negative Emotional Content on Working Memory and Long-Term Memory  

E-Print Network [OSTI]

Effect of Negative Emotional Content on Working Memory and Long-Term Memory Elizabeth A. Kensinger and Suzanne Corkin Massachusetts Institute of Technology In long-term memory, negative information is better remembered than neutral information. Differences in processes important to working memory may contribute

Corkin, Suzanne

182

A Memory Hierarchical Layer Assigning and Prefetching Technique to Overcome the Memory Performance/Energy Bottleneck  

E-Print Network [OSTI]

A Memory Hierarchical Layer Assigning and Prefetching Technique to Overcome the Memory Performance thanail@ee.duth.gr Abstract The memory subsystem has always been a bottleneck in performance as well as significant power contributor in memory intensive applications. Many researchers have pre- sented multi

Paris-Sud XI, Université de

183

A Partial Memory Protection Scheme for Higher Effective Yield of Embedded Memory for Video Data  

E-Print Network [OSTI]

A Partial Memory Protection Scheme for Higher Effective Yield of Embedded Memory for Video Data the on-chip embedded memory will occupy most of the silicon real estate. As the technology proceeds into very deep submicron, the yield of SoCs will drop sharply mainly because of the on-chip memory failure

Eltawil, Ahmed

184

Memory . Author manuscript Episodic memory deficits slow down the dynamics of cognitive procedural  

E-Print Network [OSTI]

Memory . Author manuscript Page /1 10 Episodic memory deficits slow down the dynamics of cognitive, each involving distinct processes. Considering the implication of the episodic memory in the first cognitive stage, the impairment of this memory system might be responsible for a slowing down

Paris-Sud XI, Université de

185

Improving locality with dynamic memory allocation  

E-Print Network [OSTI]

xii LIST OF FIGURES FIGURE Page 1 Object size distribution : : : : : : : : : : : : : : : : : : : : : : : : : 23 2 Memory distribution : : : : : : : : : : : : : : : : : : : : : : : : : : : 23 3 Example where traditional memory allocation does.... The faster, more This dissertation follows the style of ACM Special Interest Group on Programming Languages. 1In spite of a recent slowdown of the processor speed due to shrinking distances, power consumption and heat, memory bandwidth still does not keep up...

Jula, Alin Narcis

2009-05-15T23:59:59.000Z

186

Shape memory polymer foams for endovascular therapies  

DOE Patents [OSTI]

A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

Wilson, Thomas S. (Castro Valley, CA); Maitland, Duncan J. (Pleasant Hill, CA)

2012-03-13T23:59:59.000Z

187

Memory Optimization for Phase-field Simulations  

SciTech Connect (OSTI)

Phase-field simulations are computationally and memory intensive applications. Many of the phase-field simulations being conducted in support of NEAMS were not capable of running on “normal clusters” with 2-4GB of RAM per core, and instead required specialized “big-memory” clusters with 64GB per core. To address this issue, the MOOSE team developed a new Python-based utility called MemoryLogger, and applied it to locate, diagnose, and eradicate memory bottlenecks within the MOOSE framework. MemoryLogger allows for a better understanding of the memory usage of an application being run in parallel across a cluster. Memory usage information is captured for every individual process in a parallel job, and communicated to the head node of the cluster. Console text output from the application itself is automatically matched with this memory usage information to produce a detailed picture of memory usage over time, making it straightforward to identify the subroutines which contribute most to the application’s peak memory usage. The information produced by the MemoryLogger quickly and effectively narrows the search for memory optimizations to the most data-intensive parts of the simulation.

Derek Gaston; John Peterson; Andrew Slaughter; Cody Permann; David Andrs

2014-08-01T23:59:59.000Z

188

Memory consolidation and reconsolidation: what is the  

E-Print Network [OSTI]

Memory consolidation and reconsolidation: what is the role of sleep? Robert Stickgold and Matthew P Deaconess Medical Center E/FD 861, 330 Brookline Avenue, Boston MA 02215, USA Memory consolidation and reconsolidation reflect mol- ecular, cellular and systems-level processes that convert labile memory

Walker, Matthew P.

189

The Cognitive Neuroscience of Human Memory  

E-Print Network [OSTI]

The Cognitive Neuroscience of Human Memory Since H.M. Larry R. Squire1,2,3,4 and John T. Wixted4 1 about the organization of memory that inspired decades of experi- mental work. Since H.M., the study of human memory and its disorders has continued to yield new insights and to improve understanding

Squire, Larry R.

190

Long memory and changing persistence Robinson Kruse  

E-Print Network [OSTI]

Long memory and changing persistence Robinson Kruse and Philipp Sibbertsen August 2010 Abstract We study the empirical behaviour of semi-parametric log-periodogram estimation for long memory models when suggest that evidence for long memory is likely to be found. A recently proposed test by Sibbertsen

Weber, Stefan

191

Scalable extraction of error models from the output of error detection circuits  

E-Print Network [OSTI]

Accurate methods of assessing the performance of quantum gates are extremely important. Quantum process tomography and randomized benchmarking are the current favored methods. Quantum process tomography gives detailed information, but significant approximations must be made to reduce this information to a form quantum error correction simulations can use. Randomized benchmarking typically outputs just a single number, the fidelity, giving no information on the structure of errors during the gate. Neither method is optimized to assess gate performance within an error detection circuit, where gates will be actually used in a large-scale quantum computer. Specifically, the important issues of error composition and error propagation lie outside the scope of both methods. We present a fast, simple, and scalable method of obtaining exactly the information required to perform effective quantum error correction from the output of continuously running error detection circuits, enabling accurate prediction of large-scale behavior.

Austin G. Fowler; D. Sank; J. Kelly; R. Barends; John M. Martinis

2014-05-06T23:59:59.000Z

192

Gifts in Memory of LEHIGH UNIVERSITY 1 ACRIA, in memory of  

E-Print Network [OSTI]

Gifts in Memory of LEHIGH UNIVERSITY 1 ACRIA, in memory of Winifred Duane `41W `73P `76P Actnow Pac Inc., in memory of Winifred Duane `41W `73P `76P Mary E. Adelman, in memory of Joseph M. King, Jr. `61 `95P Ralph P. Adkins, in memory of Joseph M. King, Jr. `61 `95P Alan J & Susan A Fuirst Philanthropic

Gilchrist, James F.

193

Configurable memory system and method for providing atomic counting operations in a memory device  

DOE Patents [OSTI]

A memory system and method for providing atomic memory-based counter operations to operating systems and applications that make most efficient use of counter-backing memory and virtual and physical address space, while simplifying operating system memory management, and enabling the counter-backing memory to be used for purposes other than counter-backing storage when desired. The encoding and address decoding enabled by the invention provides all this functionality through a combination of software and hardware.

Bellofatto, Ralph E. (Ridgefield, CT); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Ohmacht, Martin (Yorktown Heights, NY)

2010-09-14T23:59:59.000Z

194

R. A. Fisher Memorial Appeal  

Science Journals Connector (OSTI)

... SIR JOHN GADDTJM, chairman of the Sir Ronald Fisher Memorial Committee of Great Britain, writes:"R. A. Fisher ranks among ... host of applications of the most practical kind. The University of Adelaide, where Sir Ronald spent his last years, has already established a Sir ...

1964-06-13T23:59:59.000Z

195

Harmonic Analysis Errors in Calculating Dipole,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Harmonic Analysis Errors in Calculating Dipole, Harmonic Analysis Errors in Calculating Dipole, Quadrupole, and Sextupole Magnets using POISSON Ro be rt J. La ri<::::R~ i. September 10, 1985 Introduction LS-32 The computer program POISSON was used to calculate the dipole, quadru- pole, and sextupole magnets of the 6 GeV electron storage ring. A trinagular mesh must first be generated by LATTICE. The triangle size is varied over the "universe" at the discretion of the user. This note describes a series of test calculations that were made to help the user decide on the size of the mesh to reduce the harmonic field calculation errors. A conformal transfor- mation of a multipole magnet into a dipole reduces these errors. Dipole Magnet Calculations A triangular mesh used to calculate a "perfect" dipole magnet is shown in

196

Spatial Error Metrics for Oceanographic Model Verification  

Science Journals Connector (OSTI)

A common problem with modern numerical oceanographic models is spatial displacement, including misplacement and misshapenness of ocean circulation features. Traditional error metrics, such as least squares methods, are ineffective in many such ...

Sean B. Ziegeler; James D. Dykes; Jay F. Shriver

2012-02-01T23:59:59.000Z

197

ACS calibration pipeline testing: error propagation  

E-Print Network [OSTI]

1 ACS calibration pipeline testing: error propagation Doug Van Orsow, Max Mutchler, Warren Hack files (see ISRs 99-03 "CALACS Operation and Implementation" by Hack and 99-04 "ACS calibra- tion

Sirianni, Marco

198

Stabilizer Formalism for Operator Quantum Error Correction  

Science Journals Connector (OSTI)

Operator quantum error correction is a recently developed theory that provides a generalized and unified framework for active error correction and passive error avoiding schemes. In this Letter, we describe these codes using the stabilizer formalism. This is achieved by adding a gauge group to stabilizer codes that defines an equivalence class between encoded states. Gauge transformations leave the encoded information unchanged; their effect is absorbed by virtual gauge qubits that do not carry useful information. We illustrate the construction by identifying a gauge symmetry in Shor’s 9-qubit code that allows us to remove 3 of its 8 stabilizer generators, leading to a simpler decoding procedure and a wider class of logical operations without affecting its essential properties. This opens the path to possible improvements of the error threshold of fault-tolerant quantum computing.

David Poulin

2005-12-01T23:59:59.000Z

199

Error Modeling for Hierarchical Lossless Image Compression  

E-Print Network [OSTI]

We present a new method for error modeling applicable to the MLP algorithm for hierarchical lossless image compression. This method, based on a concept called the variability index, provides accurate models for pixel ...

Howard, Paul G.; Vitter, Jeffrey Scott

1992-01-01T23:59:59.000Z

200

Diagnosing Forecast Errors in Tropical Cyclone Motion  

Science Journals Connector (OSTI)

This paper reports on the development of a diagnostic approach that can be used to examine the sources of numerical model forecast error that contribute to degraded tropical cyclone (TC) motion forecasts. Tropical cyclone motion forecasts depend ...

Thomas J. Galarneau Jr.; Christopher A. Davis

2013-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Organizational Errors: Directions for Future Research  

E-Print Network [OSTI]

The goal of this chapter is to promote research about organizational errors—i.e., the actions of multiple organizational participants that deviate from organizationally specified rules and can potentially result in adverse ...

Carroll, John Stephen

202

Assessment of Wind Speed Dependent Prediction Error  

Science Journals Connector (OSTI)

The investigations in this chapter follow the idea that the prediction error quantitatively depends on the meteorological situation that has to be predicted. As a first approach the wind speed as a main indicator...

Dr. Matthias Lange; Dr. Ulrich Focken

2006-01-01T23:59:59.000Z

203

COS DCE Memory Regions (for Memory Monitor purposes) COS DCE Memory Monitors may select one of three regions: CODE space, External RAM  

E-Print Network [OSTI]

COS DCE Memory Regions (for Memory Monitor purposes) COS DCE Memory Monitors may select one-cut. Within the 8051, the CODE space and XDATA space are separate memory devices unless, by design, a common memory device is used. Both have an address range of 64KB (0000-FFFF). For the COS DCE, below the 16KB

Colorado at Boulder, University of

204

Storage Techniques in Flash Memories and Phase-change Memories  

E-Print Network [OSTI]

advice on research, writing, and presentation. Without Andrew?s encouragement and help during the difficult times in my PhD study, this dissertation would not have been possible. I would like to thank Dr. Jennifer Welch, Dr. Jianer Chen, and Dr. Alex... . . . . . . . . . . . . . . . . 4 1. Principles and Operations in Flash Memories . . . . . 4 a. Read Operation . . . . . . . . . . . . . . . . . . . 5 b. Programming Operation . . . . . . . . . . . . . . 5 c. Erase Operation . . . . . . . . . . . . . . . . . . . 6 d. Decreasing...

Li, Hao

2010-10-12T23:59:59.000Z

205

A systems approach to reducing utility billing errors  

E-Print Network [OSTI]

Many methods for analyzing the possibility of errors are practiced by organizations who are concerned about safety and error prevention. However, in situations where the error occurrence is random and difficult to track, ...

Ogura, Nori

2013-01-01T23:59:59.000Z

206

Evolutionary Algorithm-Based Error Parameterization Methods for Data Assimilation  

Science Journals Connector (OSTI)

The methods of parameterizing model errors have a substantial effect on the accuracy of ensemble data assimilation. After a review of the current error-handling methods, a new blending error parameterization method was designed to combine the ...

Yulong Bai; Xin Li

2011-08-01T23:59:59.000Z

207

Error Detection and Recovery for Robot Motion Planning with Uncertainty  

E-Print Network [OSTI]

Robots must plan and execute tasks in the presence of uncertainty. Uncertainty arises from sensing errors, control errors, and uncertainty in the geometry of the environment. The last, which is called model error, has ...

Donald, Bruce Randall

1987-07-01T23:59:59.000Z

208

Running jobs error: "inet_arp_address_lookup"  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

jobs error: "inetarpaddresslookup" Resolved: Running jobs error: "inetarpaddresslookup" September 22, 2013 by Helen He (0 Comments) Symptom: After the Hopper August 14...

209

The Memory Hierarchy l Storage technologies and trends  

E-Print Network [OSTI]

1 1 The Memory Hierarchy l Topics l Storage technologies and trends l Locality of reference l Caching in the memory hierarchy CS211 Computer Architecture 2 Memory until now... l We've relied on a very simple model of memory for most this class l Main Memory is a linear array of bytes that can be accessed

Badrinath, B. R.

210

Bounds for Small-Error and Zero-Error Quantum Algorithms Harry Buhrman  

E-Print Network [OSTI]

Bounds for Small-Error and Zero-Error Quantum Algorithms Harry Buhrman CWI Richard Cleve University algorithm with an auxiliary input r, which is uniformly distributed over some underlying sample space. In this case, for any x 2 f0;1gn, f(x) = 1 iff (9r 2 S)(A(x;r) = 1). Grover's quantum search algorithm [15

de Wolf, Ronald

211

Retiming for Soft Error Minimization Under Error-Latching Window Constraints  

E-Print Network [OSTI]

sensitivity to naturally- occurring radiation and the consequent soft error rates of CMOS circuits. Moreover Soft error, also known as single-event upsets (SEU), caused by radiation-induced charged particles circuits [3]: electrical masking occurs when SEUs are attenuated before being latched because

Zhou, Hai

212

Optical triangular-partition fuzzy systems with one-memory-matrix fuzzy associative memory  

Science Journals Connector (OSTI)

Taking advantage of the special properties of fuzzy sets, we propose that one-memory-matrix fuzzy associative memory can be used to realize triangular-partition fuzzy inference...

Zhang, Shuqun; Karim, Mohammad A

1999-01-01T23:59:59.000Z

213

What Scientific Applications can Benefit from Hardware Transactional Memory?  

SciTech Connect (OSTI)

Achieving efficient and correct synchronization of multiple threads is a difficult and error-prone task at small scale and, as we march towards extreme scale computing, will be even more challenging when the resulting application is supposed to utilize millions of cores efficiently. Transactional Memory (TM) is a promising technique to ease the burden on the programmer, but only recently has become available on commercial hardware in the new Blue Gene/Q system and hence the real benefit for realistic applications has not been studied, yet. This paper presents the first performance results of TM embedded into OpenMP on a prototype system of BG/Q and characterizes code properties that will likely lead to benefits when augmented with TM primitives. We first, study the influence of thread count, environment variables and memory layout on TM performance and identify code properties that will yield performance gains with TM. Second, we evaluate the combination of OpenMP with multiple synchronization primitives on top of MPI to determine suitable task to thread ratios per node. Finally, we condense our findings into a set of best practices. These are applied to a Monte Carlo Benchmark and a Smoothed Particle Hydrodynamics method. In both cases an optimized TM version, executed with 64 threads on one node, outperforms a simple TM implementation. MCB with optimized TM yields a speedup of 27.45 over baseline.

Schindewolf, M; Bihari, B; Gyllenhaal, J; Schulz, M; Wang, A; Karl, W

2012-06-04T23:59:59.000Z

214

Finite-Memory Universal Prediction of Individual Continuous Sequences  

E-Print Network [OSTI]

In this paper we consider the problem of universal prediction of individual continuous sequences with square-error loss, using a deterministic finite-state machine (FSM). The goal is to attain universally the performance of the best constant predictor tuned to the sequence, which predicts the empirical mean and incurs the empirical variance as the loss. The paper analyzes the tradeoff between the number of states of the universal FSM and the excess loss (regret). We first present a machine, termed Exponential Decaying Memory (EDM) machine, used in the past for predicting binary sequences, and show bounds on its performance. Then we consider a new class of machines, Degenerated Tracking Memory (DTM) machines, find the optimal DTM machine and show that it outperforms the EDM machine for a small number of states. Incidentally, we prove a lower bound indicating that even with large number of states the regret of the DTM machine does not vanish. Finally, we show a lower bound on the achievable regret of any FSM, a...

Dar, Ronen

2011-01-01T23:59:59.000Z

215

Attachment and memory for negative emotional events  

E-Print Network [OSTI]

Control of Emotions on Explicit Memory. . . . . . Interaction of Anxiety X EEQ Positive Affect on Explicit Memory. . 50 51 51 Mediation Model 52 Interaction of Anxiety X Video Mood on Explicit Memory 52 Interaction of Avoidance X Sex on Imphcit... monitored their responses to the video content through a hidden camera in the laboratory room. The video clip, which came from the Swedish film Autumn Sonata directed by Ingmar Bergman, was selected on the basis of its negative, attachment-relevant content...

Wilson, Carol Leigh

2012-06-07T23:59:59.000Z

216

Silicon Nanowires for Non-Volatile Memory  

E-Print Network [OSTI]

Silicon Nanowires for Non-Volatile Memory P R O J E C T L E A D E R : Curt A. Richter (NIST) C O L approaches for silicon nanowire non-volatile memory. K E Y A C C O M P L I S H M E N T S Fabricated novel non-volatile memory cells with silicon nanowire channels and Al2 O3 /HfO2 /SiO2 gate dielectric storage stacks

217

Memory in the Small: An Application to Provide Task-Based Organizational Memory for a Scientific Community  

E-Print Network [OSTI]

Memory in the Small: An Application to Provide Task-Based Organizational Memory for a Scientific of organizational memory must exist embedded within the organizational processes and tasks. This paper argues that "memory-in-the small," memory utilized in the performance of an organizational task, can serve

Ackerman, Mark S.

218

Disorder-Induced Microscopic Magnetic Memory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

point for future theories. The Persistence of Memory Magnets are not just for refrigerator doors-they are of paramount importance in today's digital information age. In the...

219

Memorandum Memorializing Ex Parte Communication - August 12,...  

Energy Savers [EERE]

Memorandum Memorializing Ex Parte Communication - August 12, 2011 On August 9, 2011, the Air-Conditioning, Heating and Refrigeration Institute's (AHRI) Unitary Small Engineering...

220

Immunological Memory is Associative Derek J. Smith  

E-Print Network [OSTI]

Immunological Memory is Associative Derek J. Smith Department of Computer Science University of New , 1989; Nara & Goudsmit, 1990; Smith, 1994). Immunologists refer to associative recall as a cross

Somayaji, Anil

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Determining Memory Use | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Allinea DDT Core File Settings Determining Memory Use Using VNC with a Debugger bgqstack gdb Coreprocessor TotalView on BGQ Systems Performance Tools & APIs Software & Libraries...

222

Design for an optical random access memory  

Science Journals Connector (OSTI)

Cascadable optically nonlinear arrays of logic devices interconnected with space invariant optical components are proposed for the core memory of a digital computer. Access time to any...

Murdocca, Miles J; Sugla, Binay

1989-01-01T23:59:59.000Z

223

Conjugate memory effect of random scattered waves  

Science Journals Connector (OSTI)

The correlation function between two speckle patterns produced by different incident waves is studied by means of stochastic approaches. The angular-frequency memory effect, which...

Kawanishi, Tetsuya; Wang, Zhi Liang; Izutsu, Masayuki; Ogura, Hisanao

1999-01-01T23:59:59.000Z

224

Shape memory response of ni2mnga and nimncoin magnetic shape memory alloys under compression  

E-Print Network [OSTI]

In this study, the shape memory response of Ni2MnGa and NiMnCoIn magnetic shape memory alloys was observed under compressive stresses. Ni2MnGa is a magnetic shape memory alloy (MSMA) that has been shown to exhibit fully reversible, stressassisted...

Brewer, Andrew Lee

2009-05-15T23:59:59.000Z

225

Common Errors and Innovative Solutions Transcript  

Broader source: Energy.gov [DOE]

An example of case studies, mainly by showing photos of errors and good examples, then discussing the purpose of the home energy professional guidelines and certification. There may be more examples of what not to do only because these were good learning opportunities.

226

Adjoint Error Correction for Integral Outputs  

E-Print Network [OSTI]

a combustor; the total heat ux into a high pressure turbine blade from the surrounding ow; average noise. As an example, consider the wake behind a wing. To adequately resolve the wake requires a #12;ne grid locally in which the grid resolution is rather coarse. Grid adaptation based on error estimates that look

Pierce, Niles A.

227

MEASUREMENT AND CORRECTION OF ULTRASONIC ANEMOMETER ERRORS  

E-Print Network [OSTI]

commonly show systematic errors depending on wind speed due to inaccurate ultrasonic transducer mounting three- dimensional wind speed time series. Results for the variance and power spectra are shown. 1 wind speeds with ultrasonic anemometers: The measu- red flow is distorted by the probe head

Heinemann, Detlev

228

Distribution of Wind Power Forecasting Errors from Operational Systems (Presentation)  

SciTech Connect (OSTI)

This presentation offers new data and statistical analysis of wind power forecasting errors in operational systems.

Hodge, B. M.; Ela, E.; Milligan, M.

2011-10-01T23:59:59.000Z

229

WIPP Weatherization: Common Errors and Innovative Solutions Presentation  

Broader source: Energy.gov [DOE]

This presentation contains information on WIPP Weatherization: Common Errors and Innovative Solutions.

230

Analysis of Solar Two Heliostat Tracking Error Sources  

SciTech Connect (OSTI)

This paper explores the geometrical errors that reduce heliostat tracking accuracy at Solar Two. The basic heliostat control architecture is described. Then, the three dominant error sources are described and their effect on heliostat tracking is visually illustrated. The strategy currently used to minimize, but not truly correct, these error sources is also shown. Finally, a novel approach to minimizing error is presented.

Jones, S.A.; Stone, K.W.

1999-01-28T23:59:59.000Z

231

Analysis of Solar Two heliostat tracking error sources  

SciTech Connect (OSTI)

This paper explores the geometrical errors that reduce heliostat tracking accuracy at Solar Two. The basic heliostat control architecture is described. Then, the three dominant error sources are described and their effect on heliostat tracking is visually illustrated. The strategy currently used to minimize, but not truly correct, these error sources is also shown. Finally, a novel approach to minimizing error is presented.

Stone, K.W.; Jones, S.A.

1999-07-01T23:59:59.000Z

232

Revised 30/04/2014 Lecture 12 -Memory  

E-Print Network [OSTI]

1 Revised 30/04/2014 Lecture 12 - Memory The Physiology of the Senses www.tutis.ca/Senses/ Contents ............................................................................................................ 2 Types of Memory............................................................................................................ 2 Mechanisms of Learning Procedural Memories

Vilis, Tutis

233

Memory Dynamics in Cross-Situational Statistical Learning  

E-Print Network [OSTI]

effect in young children’s memory and category induction.F. (1977). Infant recognition memory: Studies in forgetting.Psychology: Learning, Memory, & Cognition, 38, 246-254. doi:

Vlach, Haley Amelia Heublein

2012-01-01T23:59:59.000Z

234

Memory Slain: Recovering Cultural Heritage in Post-war Bosnia  

E-Print Network [OSTI]

Abdelaziz, A. (1995). Memory of the world—Preserving theIn J. W. Müller (Ed. ), Memory and power in post-war Europe:and constructs of social memory. Archival Issues, 24(2),

Supple, Shannon

2005-01-01T23:59:59.000Z

235

Exercise enhances memory consolidation in the aging brain  

E-Print Network [OSTI]

Persistence of long-term memory storage requires a lateSpatial reference and working memory across the lifespan ofRats depend on habit memory for discrimination learning and

Snigdha, Shikha; de Rivera, Christina; Milgram, Norton W; Cotman, Carl W

2014-01-01T23:59:59.000Z

236

Preserving photon qubits in an unknown quantum state with Knill Dynamical Decoupling - Towards an all optical quantum memory  

E-Print Network [OSTI]

The implementation of polarization-based quantum communication is limited by signal loss and decoherence caused by the birefringence of a single-mode fiber. We investigate the Knill dynamical decoupling scheme, implemented using half-wave plates, to minimize decoherence and show that a fidelity greater than $99\\%$ can be achieved in absence of rotation error and fidelity greater than $96\\%$ can be achieved in presence of rotation error. Such a scheme can be used to preserve any quantum state with high fidelity and has potential application for constructing all optical quantum delay line, quantum memory, and quantum repeater.

Manish K. Gupta; Erik J. Navarro; Todd A. Moulder; Jason D. Mueller; Ashkan Balouchi; Katherine L. Brown; Hwang Lee; Jonathan P. Dowling

2014-12-19T23:59:59.000Z

237

Models on Distributed Memory Architectures  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5/2004 Y.He 1 5/2004 Y.He 1 MPH: a Library for Coupling Multi-Component Models on Distributed Memory Architectures and its Applications Yun (Helen) He and Chris Ding CRD Division Lawrence Berkeley National Laboratory 10/15/2004 Y.He 2 10/15/2004 Y.He 3 Motivation n Application problems grow in scale & complexity n Effective organization of simulation software system that is maintainable, reusable, sharable, and efficient è a major issue n Community Climate System Model (CCSM) development n Software lasts much longer than a computer! 10/15/2004 Y.He 4

238

Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses  

DOE Patents [OSTI]

In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

Ohmacht, Martin

2014-09-09T23:59:59.000Z

239

Detecting/Preventing Information Leakage on the Memory Bus due to Malicious Hardware 1  

E-Print Network [OSTI]

place given surreptitious processor writes to memory. Malicious memory reads can be essentially ignored

Kuzmanovic, Aleksandar

240

Memory-like CD8? T cells generated during homeostatic proliferation defer to antigen-experienced memory cells  

E-Print Network [OSTI]

for CD8 T- cell priming, memory generation and maintenance.Marzo. 2006. The descent of memory T-cell subsets. Nat RevHomeostasis of naive and memory T cells. Immunity 29:848-

Cheung, Kitty Pui Hang

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

DOE - Office of Legacy Management -- Memorial Hospital - NY 0...  

Office of Legacy Management (LM)

Memorial Hospital - NY 0-16 FUSRAP Considered Sites Site: MEMORIAL HOSPITAL (NY.0-16 ) Eliminated from consideration under FUSRAP Designated Name: Not Designated Alternate Name:...

242

Consent Order, Battelle Memorial Institute - October 24, 2014...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Battelle Memorial Institute - October 24, 2014 October 24, 2014 Worker Safety and Health Enforcement Consent Order issued to Battelle Memorial Institute for deficiencies...

243

Y-12 historian assists in Lincoln Memorial University display...  

National Nuclear Security Administration (NNSA)

assists in Lincoln Memorial University display design NNSA Blog Y-12 historian Ray Smith, left, joins Lincoln Memorial University board of trustees chairman Pete DeBusk in...

244

Whirlpools on the Nanoscale Could Multiply Magnetic Memory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Whirlpools on the Nanoscale Could Multiply Magnetic Memory Whirlpools on the Nanoscale Could Multiply Magnetic Memory Print Tuesday, 21 May 2013 00:00 Research at the Advanced...

245

Situating ethics and memory. by Wilma Koutstaal  

E-Print Network [OSTI]

Situating ethics and memory. by Wilma Koutstaal Ethics and memory are better regarded as partially of the idea of forgetting the distinction between right and wrong, makes ethical knowledge too isolated from other kinds of knowledge. Considerations such as the role played by reminding in inculcating ethics

Koutstaal, Wilma

246

Tier identification (TID) for tiered memory characteristics  

DOE Patents [OSTI]

A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

2014-03-25T23:59:59.000Z

247

Memory and Reality Marcia K. Johnson  

E-Print Network [OSTI]

Memory and Reality Marcia K. Johnson Yale University Although it may be disconcerting guilty that we didn't save any for my father (Johnson, 1985). When I finished, my parents laughed in reality monitoring, or a false memory (Johnson, 1977, 1988; Johnson & Raye, 1981, 1998). Of course, people

Johnson, Marcia K.

248

Path Delay Test Through Memory Arrays  

E-Print Network [OSTI]

Memory arrays cannot be as easily tested as other storage elements in a chip. Most of the flip-flops (FFs) in a chip can be replaced by scan cells in scan-based design. However, the bits in memory arrays cannot be replaced by scan cells, due...

Pokharel, Punj

2013-07-29T23:59:59.000Z

249

Shape memory polymer actuator and catheter  

DOE Patents [OSTI]

An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

Maitland, Duncan J. (Pleasant Hill, CA); Lee, Abraham P. (Walnut Creek, CA); Schumann, Daniel L. (Concord, CA); Matthews, Dennis L. (Moss Beach, CA); Decker, Derek E. (Byron, CA); Jungreis, Charles A. (Pittsburgh, PA)

2007-11-06T23:59:59.000Z

250

Memory effects in turbulent transport  

E-Print Network [OSTI]

In the mean-field theory of magnetic fields, turbulent transport, i.e. the turbulent electromotive force, is described by a combination of the alpha effect and turbulent magnetic diffusion, which are usually assumed to be proportional respectively to the mean field and its spatial derivatives. For a passive scalar there is just turbulent diffusion, where the mean flux of concentration depends on the gradient of the mean concentration. However, these proportionalities are approximations that are valid only if the mean field or the mean concentration vary slowly in time. Examples are presented where turbulent transport possesses memory, i.e. where it depends crucially on the past history of the mean field. Such effects are captured by replacing turbulent transport coefficients with time integral kernels, resulting in transport coefficients that depend effectively on the frequency or the growth rate of the mean field itself. In this paper we perform numerical experiments to find the characteristic timescale (or memory length) of this effect as well as simple analytical models of the integral kernels in the case of passive scalar concentrations and kinematic dynamos. The integral kernels can then be used to find self-consistent growth or decay rates of the mean fields. In mean-field dynamos the growth rates and cycle periods based on steady state values of alpha effect and turbulent diffusivity can be quite different from the actual values.

Alexander Hubbard; Axel Brandenburg

2008-11-17T23:59:59.000Z

251

Performing an allreduce operation using shared memory  

DOE Patents [OSTI]

Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

Archer, Charles J. (Rochester, MN); Dozsa, Gabor (Ardsley, NY); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2012-04-17T23:59:59.000Z

252

Quantum memory in non-inertial frames  

E-Print Network [OSTI]

We study the effect of quantum memory in non-inertial frames under the influence of amplitude damping, depolarizing, phase flip and bit-phase flip channels. It is shown that the entanglement of initial state is heavily influenced by quantum correlations. It is seen that quantum memory compensates the loss of entanglement generated caused by the Unruh effect. It is interesting to note that the sudden death of entanglement disappears for any acceleration for higher values of memory. Therefore, it is possible to avoid ESD in non-inertial frames due to the presence of quantum memory. Furthermore, the degree of entanglement is enhanced as we increase the degree of memory and it maximizes for maximum correlations.

M. Ramzan; M. K. Khan

2011-01-15T23:59:59.000Z

253

Adiabatic Quantum Optimization for Associative Memory Recall  

E-Print Network [OSTI]

Hopfield networks are a variant of associative memory that recall information stored in the couplings of an Ising model. Stored memories are fixed points for the network dynamics that correspond to energetic minima of the spin state. We formulate the recall of memories stored in a Hopfield network using energy minimization by adiabatic quantum optimization (AQO). Numerical simulations of the quantum dynamics allow us to quantify the AQO recall accuracy with respect to the number of stored memories and the noise in the input key. We also investigate AQO performance with respect to how memories are stored in the Ising model using different learning rules. Our results indicate that AQO performance varies strongly with learning rule due to the changes in the energy landscape. Consequently, learning rules offer indirect methods for investigating change to the computational complexity of the recall task and the computational efficiency of AQO.

Hadayat Seddiqi; Travis S. Humble

2014-07-07T23:59:59.000Z

254

Memorials  

Science Journals Connector (OSTI)

...attempt was made for a cooperative reform of rock nomenclature, by reorganizing...more largely to your push and energy in the matter than to anything...for he was a man of surpassing energy and a voluminous writer. In...as reports on "The gems of Mexico," "The history of the gems...

255

Error Notification, Brookhaven National Laboratory (BNL)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Frequently Searched For Frequently Searched For Helpdesk Home Web Services BNL Site Index Can't View PDFs? Need Help Helpdesk Homepage Call the Helpdesk for 24x7 support Bus: 631.344.5522 Fax: 631-344-2140 Email: itdhelp@bnl.gov HTTP Error Forbidden: Page Access Rejected You are not authorized to view this page - This error is caused when the server has a list of IP addresses that are not allowed to access the site, and the IP address you are using is in this list. If the problem persists or if you believe you should be able to view this directory or page, please contact the Web server's administrator or call the Helpdesk by using the email address or phone number listed below. Some reasons for getting this notice: All people outside of the BNL Domain (130.199.0.0) will get this notice.

256

Error Notification, Brookhaven National Laboratory (BNL)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Frequently Searched For Frequently Searched For Helpdesk Home Application Services BNL Site Index Can't View PDFs? Need Help Helpdesk Homepage Call the Helpdesk for 24x7 support Bus: 631.344.5522 Fax: 631-344-2140 Email: itdhelp@bnl.gov HTTP Error Forbidden: Page Access Rejected You are not authorized to view this page - This error is caused when the server has a list of IP addresses that are not allowed to access the site, and the IP address you are using is in this list. If the problem persists or if you believe you should be able to view this directory or page, please contact the Web server's administrator or call the Helpdesk by using the email address or phone number listed below. Some reasons for getting this notice: All people outside of the BNL Domain (130.199.0.0) will get this notice.

257

Tensor Networks and Quantum Error Correction  

Science Journals Connector (OSTI)

We establish several relations between quantum error correction (QEC) and tensor network (TN) methods of quantum many-body physics. We exhibit correspondences between well-known families of QEC codes and TNs, and demonstrate a formal equivalence between decoding a QEC code and contracting a TN. We build on this equivalence to propose a new family of quantum codes and decoding algorithms that generalize and improve upon quantum polar codes and successive cancellation decoding in a natural way.

Andrew J. Ferris and David Poulin

2014-07-16T23:59:59.000Z

258

Unified and Generalized Approach to Quantum Error Correction  

Science Journals Connector (OSTI)

We present a unified approach to quantum error correction, called operator quantum error correction. Our scheme relies on a generalized notion of a noiseless subsystem that is investigated here. By combining the active error correction with this generalized noiseless subsystems method, we arrive at a unified approach which incorporates the known techniques—i.e., the standard error correction model, the method of decoherence-free subspaces, and the noiseless subsystem method—as special cases. Moreover, we demonstrate that the quantum error correction condition from the standard model is a necessary condition for all known methods of quantum error correction.

David Kribs; Raymond Laflamme; David Poulin

2005-05-09T23:59:59.000Z

259

Correlated errors can lead to better performance of quantum codes  

E-Print Network [OSTI]

A formulation for evaluating the performance of quantum error correcting codes for a general error model is presented. In this formulation, the correlation between errors is quantified by a Hamiltonian description of the noise process. We classify correlated errors using the system-bath interaction: local versus nonlocal and two-body versus many-body interactions. In particular, we consider Calderbank-Shor-Steane codes and observe a better performance in the presence of correlated errors depending on the timing of the error recovery. We also find this timing to be an important factor in the design of a coding system for achieving higher fidelities.

A. Shabani

2008-03-06T23:59:59.000Z

260

Random access memory immune to single event upset using a T-resistor  

DOE Patents [OSTI]

In a random access memory cell, a resistance "T" decoupling network in each leg of the cell reduces random errors caused by the interaction of energetic ions with the semiconductor material forming the cell. The cell comprises two parallel legs each containing a series pair of complementary MOS transistors having a common gate connected to the node between the transistors of the opposite leg. The decoupling network in each leg is formed by a series pair of resistors between the transistors together with a third resistor interconnecting the junction between the pair of resistors and the gate of the transistor pair forming the opposite leg of the cell.

Ochoa, Jr., Agustin (Vista, CA)

1989-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Automatic Memory Partitioning and Scheduling for Throughput and Power Optimization  

E-Print Network [OSTI]

- matic memory partitioning technique which can efficiently improve throughput and reduce energy to tackle this problem is to increase memory ports in the final memory imple- mentations. However, recent research in [16] shows that the size of memory cells increases almost quadratically with port number N

Cong, Jason "Jingsheng"

262

Memory Effects in Quantum Channel Discrimination Giulio Chiribella,1  

E-Print Network [OSTI]

Memory Effects in Quantum Channel Discrimination Giulio Chiribella,1 Giacomo M. D'Ariano,1 quantum-memory assisted protocols for discriminating quantum channels. We show that for optimal discrimination of memory channels, memory assisted protocols are needed. This leads to a new notion of distance

D'Ariano, Giacomo Mauro

263

Memory Intensive Computing Shahar Kvatinsky, Avinoam Kolodny, and Uri C.  

E-Print Network [OSTI]

Memory Intensive Computing Shahar Kvatinsky, Avinoam Kolodny, and Uri C. Weiser Department, New York 14627, USA Abstract-- Over the past years, new memory technologies such as RRAM, STT present these emerging memory technologies as enablers to the era of memory- intensive computing, which

Friedman, Eby G.

264

Chemical Memory DOI: 10.1002/anie.200600400  

E-Print Network [OSTI]

Chemical Memory DOI: 10.1002/anie.200600400 A Reaction­Diffusion Memory Device** Akiko Kaminaga, Vladimir K. Vanag, and Irving R. Epstein* Any computer consists of processor and memory elements. Patterns suggested as media for memory-storage devices.[6] The BZ system dispersed in a water-in-oil microemulsion

Epstein, Irving R.

265

MEMORY AWARE HIGH-LEVEL SYNTHESIS FOR EMBEDDED SYSTEMS  

E-Print Network [OSTI]

MEMORY AWARE HIGH-LEVEL SYNTHESIS FOR EMBEDDED SYSTEMS Gwenole Corre, Eric Senn, Nathalie Julien to take into account the memory architecture and the memory mapping in the High- Level Synthesis of Real-Time embedded systems. We formalize the memory mapping as a set of constraints for the synthesis, and defined

Paris-Sud XI, Université de

266

L3: Memory Hierarchy Optimization I, Locality and Data Placement  

E-Print Network [OSTI]

1/25/12 1 L3: Memory Hierarchy Optimization I, Locality and Data Placement CS6235 L3: Memory: Memory Hierarchy, 1 Overview of Lecture · Where data can be stored · And how to get/Write ­ Footprint of data · High level description of how to write code to optimize for memory hierarchy ­ More

Hall, Mary W.

267

Memory for events and their spatial context: models and experiments  

E-Print Network [OSTI]

Memory for events and their spatial context: models and experiments Neil Burgess1,2* , Suzanna Main Street West, Hamilton, Ontario L8S 4K1, Canada The computational role of the hippocampus in memory-limited store supporting neocortical long-term memory; and (iii) a content-addressable associative memory

Haykin, Simon

268

Securing non-volatile memory regions  

DOE Patents [OSTI]

Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

2013-08-20T23:59:59.000Z

269

Non-volatile memory for checkpoint storage  

DOE Patents [OSTI]

A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, the non-volatile memory is a pluggable flash memory card.

Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.; Coteus, Paul W.; Gara, Alan; Heidelberger, Philip; Jeanson, Mark J.; Kopcsay, Gerard V.; Ohmacht, Martin; Takken, Todd E.

2014-07-22T23:59:59.000Z

270

Memory for Light as a Quantum Process  

E-Print Network [OSTI]

We report complete characterization of an optical memory based on electromagnetically induced transparency. We recover the superoperator associated with the memory, under two different working conditions, by means of a quantum process tomography technique that involves storage of coherent states and their characterization upon retrieval. In this way, we can predict the quantum state retrieved from the memory for any input, for example, the squeezed vacuum or the Fock state. We employ the acquired superoperator to verify the nonclassicality benchmark for the storage of a Gaussian distributed set of coherent states.

M. Lobino; C. Kupchak; E. Figueroa; A. I. Lvovsky

2008-12-21T23:59:59.000Z

271

Memory Effect and Fast Spinodal Decomposition  

E-Print Network [OSTI]

We consider the modification of the Cahn-Hilliard equation when a time delay process through a memory function is taken into account. We then study the process of spinodal decomposition in fast phase transitions associated with a conserved order parameter. The introduced memory effect plays an important role to obtain a finite group velocity. Then, we discuss the constraint for the parameters to satisfy causality. The memory effect is seen to affect the dynamics of phase transition at short times and has the effect of delaying, in a significant way, the process of rapid growth of the order parameter that follows a quench into the spinodal region.

T. Koide; G. Krein; Rudnei O. Ramos

2007-08-28T23:59:59.000Z

272

Examination of a simple example of gravitational wave memory  

E-Print Network [OSTI]

We examine a simple example of gravitational wave memory due to the decay of a point particle into two point particles. In the case where one of the decay products is null, there are two types of memory: a null memory due to the null particle and an ordinary memory due to the recoiling timelike particle. In the case where both decay products are timelike, there is only ordinary memory. However, this ordinary memory can mimic the null memory in the limit where one of the decay products has a large velocity.

Tolish, Alexander; Garfinkle, David; Wald, Robert M

2014-01-01T23:59:59.000Z

273

Examination of a simple example of gravitational wave memory  

E-Print Network [OSTI]

We examine a simple example of gravitational wave memory due to the decay of a point particle into two point particles. In the case where one of the decay products is null, there are two types of memory: a null memory due to the null particle and an ordinary memory due to the recoiling timelike particle. In the case where both decay products are timelike, there is only ordinary memory. However, this ordinary memory can mimic the null memory in the limit where one of the decay products has a large velocity.

Alexander Tolish; Lydia Bieri; David Garfinkle; Robert M. Wald

2014-05-25T23:59:59.000Z

274

Human error contribution to nuclear materials-handling events  

E-Print Network [OSTI]

This thesis analyzes a sample of 15 fuel-handling events from the past ten years at commercial nuclear reactors with significant human error contributions in order to detail the contribution of human error to fuel-handling ...

Sutton, Bradley (Bradley Jordan)

2007-01-01T23:59:59.000Z

275

Mining API Error-Handling Specifications from Source Code  

Science Journals Connector (OSTI)

API error-handling specifications are often not documented, ... , we present a novel framework for mining API error-handling specifications automatically from API client code, without any user input. ... to disti...

Mithun Acharya; Tao Xie

2009-01-01T23:59:59.000Z

276

Shared Memory And Distributed Shared Memory Systems: A Survey Krishna Kavi, Hyong-Shik Kim, University of Alabama in Huntsville  

E-Print Network [OSTI]

Shared Memory And Distributed Shared Memory Systems: A Survey Krishna Kavi, Hyong-Shik Kim memory modules via a crossbar switch. This can be viewed as a Symmetric Multiprocessor (SMP) or a shared memory system. The next version of a multiprocessor system at CMU was known as Cm* and can be deemed

Lee, Ben

277

Standard errors of parameter estimates in the ETAS model  

E-Print Network [OSTI]

1 Standard errors of parameter estimates in the ETAS model Abstract Point process models of seismic catalogs and in short- term earthquake forecasting. The standard errors of parameter estimates of conventional standard error estimates based on the Hessian matrix of the log- likelihood function of the ETAS

Schoenberg, Frederic Paik (Rick)

278

ABSTENTION REDUCES ERRORS DECISION ABSTAINING N-VERSION GENETIC PROGRAMMING  

E-Print Network [OSTI]

reduces errors when applied to an E. coli promoter sequence classification problem [1]. Genetic-off between abstention rate and error reduction. 1 INTRODUCTION This paper investigates the effect by human experts) [2]. Abstention reduces the number of errors, potentially avoiding overfitting [2

Fernandez, Thomas

279

ABSTENTION REDUCES ERRORS DECISION ABSTAINING NVERSION GENETIC PROGRAMMING  

E-Print Network [OSTI]

reduces errors when applied to an E. coli promoter sequence classification problem [1]. Genetic­off between abstention rate and error reduction. 1 INTRODUCTION This paper investigates the effect by human experts) [2]. Abstention reduces the number of errors, potentially avoiding overfitting [2

Fernandez, Thomas

280

Predictors of Threat and Error Management: Identification of Core  

E-Print Network [OSTI]

Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Categorization of Software Errors that led to Security Breaches  

E-Print Network [OSTI]

Categorization of Software Errors that led to Security Breaches Wenliang Du Email: duw University, W. Lafayette, IN 47907, USA Abstract A set of errors known to have led to security breaches in computer systems was analyzed. The analysis led to a categorization of these errors. After examining

Du, Wenliang "Kevin"

282

Mining API Error-Handling Specifications from Source Code  

E-Print Network [OSTI]

Mining API Error-Handling Specifications from Source Code Mithun Acharya and Tao Xie Department}@csc.ncsu.edu Abstract. API error-handling specifications are often not documented, necessi- tating automated present a novel framework for mining API error- handling specifications automatically from API client code

Xie, Tao

283

Memorial University Counselling Centre Professional Psychology  

E-Print Network [OSTI]

1 Memorial University Counselling Centre Doctoral Professional Psychology Residency Programme 2013-2014 Accredited by the Canadian Psychological Association www of Counseling Services (IACS) www.iacsinc.org Participating Member: Canadian Council of Professional Psychology

deYoung, Brad

284

Commercialization of germanium based nanocrystal memory  

E-Print Network [OSTI]

This thesis explores the commercialization of germanium-based nanocrystal memories. Demand for smaller and faster electronics and embedded systems supports the development of high-density, low-power non-volatile electronic ...

Seow, Kian Chiew

2007-01-01T23:59:59.000Z

285

Size Effects in Ferromagnetic Shape Memory Alloys  

E-Print Network [OSTI]

effects in these mechanisms has both scientific and technological relevance. Superelastic behavior of Ni54Fe19Ga27 shape memory alloy single crystalline pillars was studied under compression as a function of pillar diameter. Multiple pillars...

Ozdemir, Nevin

2012-07-16T23:59:59.000Z

286

Cultural differences on the children's memory scale  

E-Print Network [OSTI]

). Cultural effects of bilingualism on verbal learning and memory in Hispanic adults have also been found (Figueroa, 1983; Gutierrez-Clellen & Calderon, 2004; Harris, Cullum, & Puente, 1995). Ardila, Rosselli, and Rosas (1989) assessed verbal learning...

Cash, Deborah Dyer

2009-05-15T23:59:59.000Z

287

Engineer Nanocrystal Floating Gate Memory Scaling  

E-Print Network [OSTI]

flash memory [2-9]. Metal silicide NCs, with high density ofsemiconductors [14], metal, metallic silicide and metal-like2, 3], metal [4, 5], metallic silicide [6, 7, 8], core-shell

Ren, Jingjian

2012-01-01T23:59:59.000Z

288

Robust exponential memory in Hopfield networks  

E-Print Network [OSTI]

The Hopfield recurrent neural network is an auto-associative distributed model of memory. This architecture is able to store collections of generic binary patterns as robust attractors; i.e., fixed-points of the network dynamics having large basins of attraction. However, the number of (randomly generated) storable memories scales at most linearly in the number of neurons, and it has been a long-standing question whether robust super-polynomial storage is possible in recurrent networks of linear threshold elements. Here, we design sparsely-connected Hopfield networks on $n$-nodes having \\[\\frac{2^{\\sqrt{2n} + \\frac{1}{4}}}{n^{1/4} \\sqrt{\\pi}}\\] graph cliques as robust memories by analytically minimizing the probability flow objective function over these patterns. Our methods also provide a biologically plausible convex learning algorithm that efficiently discovers these networks from training on very few sample memories.

Christopher Hillar; Ngoc M. Tran

2014-11-17T23:59:59.000Z

289

Orthopaedic applications of ferromagnetic shape memory alloys  

E-Print Network [OSTI]

Ferromagnetic shape memory alloys (FSMAs) are a new class of magnetic field-actuated active materials with no current commercial applications. By applying a magnetic field of around 0.4 T, they can exert a stress of ...

Guo, Weimin, M. Eng. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

290

Biopolymers: Shape memory in spider draglines  

Science Journals Connector (OSTI)

... a dangling spider twist and turn in the breeze. Measurements on the dragline of the humble garden spider show why. The silk has a torsional shape memory, and can totally ...

Olivier Emile; Albert Le Floch; Fritz Vollrath

2006-03-29T23:59:59.000Z

291

A strategy of memory : Suzhou, China  

E-Print Network [OSTI]

The thesis is trying to establish a strategy of memory for the urban preservation of old cities, like Suzhou, within the context of the rapid growing economy in Southern China. The general attitude towards the problem ...

Chang, Ping Hung

1995-01-01T23:59:59.000Z

292

Memory system characterization of commercial workloads  

Science Journals Connector (OSTI)

Commercial applications such as databases and Web servers constitute the largest and fastest-growing segment of the market for multiprocessor servers. Ongoing innovations in disk subsystems, along with the ever increasing gap between processor and memory ...

Luiz André Barroso; Kourosh Gharachorloo; Edouard Bugnion

1998-04-01T23:59:59.000Z

293

Resolving a gravitational wave memory paradox  

E-Print Network [OSTI]

Two different approaches to gravitational perturbation theory appear to give two different answers for the properties of gravitational wave memory. We show that this contradiction is only apparent and the two approaches actually agree.

David Garfinkle; Istvan Racz

2014-06-20T23:59:59.000Z

294

Session Cookie Error, Brookhaven National Laboratory (BNL)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Session Cookie Error Session Cookie Error We're Sorry, either you don't have Session Cookies enabled in your browser or your session has expired. Some functions in this site will not work properly without it enabled. Please enable session cookies, then go back and try again or close and re-open your browser to view these web pages correctly. What is a Cookie? What are Cookies used for? What are Persistent Cookies? What are Session Cookies? How can I control or enable which Cookies I want to accept? Need help? What is a Cookie? A "cookie" is a small piece of information that is sent by a web server to be stored on a web browser, so that it can later be read back from that browser the next time this unique visitor returns to that web server. This becomes useful for having the browser remember specific information about this visitor like location of their last visit, time spent, or user preferences (like style sheets). The cookie is a text file that is saved in the browser's directory and is stored in RAM while the browser is running. Also, the cookie may be stored on the computer's hard drive once you log off from that web site or web server.

295

Post polymerization cure shape memory polymers  

DOE Patents [OSTI]

This invention relates to chemical polymer compositions, methods of synthesis, and fabrication methods for devices regarding polymers capable of displaying shape memory behavior (SMPs) and which can first be polymerized to a linear or branched polymeric structure, having thermoplastic properties, subsequently processed into a device through processes typical of polymer melts, solutions, and dispersions and then crossed linked to a shape memory thermoset polymer retaining the processed shape.

Wilson, Thomas S; Hearon, Michael Keith; Bearinger, Jane P

2014-11-11T23:59:59.000Z

296

Distributed trace using central performance counter memory  

DOE Patents [OSTI]

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L; Sexton, James C

2013-10-22T23:59:59.000Z

297

Associative memory in phasing neuron networks  

SciTech Connect (OSTI)

We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

2014-01-01T23:59:59.000Z

298

The relationship between posture, mood and memory  

E-Print Network [OSTI]

THE RELATIONSHIP BETWEEN POSTURE, MOOD AND MEMORY A Thesis by RODNEY FLANARY Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirements for the degree of MASTER of SCIENCE July, l984 Major Subject...: psychology THE RELATIONSHIP BETWEEN POSTURE, MOOD AND MEMORY A Thesis by Rodney Flanary Approved as to style and content by t ven M. ms h (Chairman of Committee) Michael Du y (Member) Steve Rho es (for John Riskind) teve Wore el (Head of Department...

Flanary, Rodney

2012-06-07T23:59:59.000Z

299

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

2010-10-19T23:59:59.000Z

300

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2007-02-06T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Neoclassical toroidal viscosity and error-field penetration in tokamaks  

SciTech Connect (OSTI)

A model for field error penetration is developed that includes nonresonant as well as the usual resonant field error effects. The nonresonant components cause a neoclassical toroidal viscous torque that tries to keep the plasma rotating at a rate comparable to the ion diamagnetic frequency. The new theory is used to examine resonant error-field penetration threshold scaling in ohmic tokamak plasmas. Compared to previous theoretical results, the plasma is found to be less susceptible to error-field penetration and locking, by a factor that depends on the nonresonant error-field amplitude.

Cole, A. J.; Hegna, C. C.; Callen, J. D. [University of Wisconsin, Madison, Wisconsin 53706-1609 (United States)

2008-05-15T23:59:59.000Z

302

Persistent memory retention of reward events and proactive interference in reward series learning by mice  

E-Print Network [OSTI]

Grouping, chunking, memory, and learning. The Quarterlyto the organization of memory and the abstract concept ofcan be sustained by event memories alone. Animal Learning &

Taniuchi, Tohru

2014-01-01T23:59:59.000Z

303

Noradrenergic activation of the basolateral amygdala modulates the consolidation of object-in-context recognition memory  

E-Print Network [OSTI]

and context recognition memory involve different regions ofplasticity and recognition memory in the perirhinal cortex.emo- tionally influenced memory storage. Neurobiol. Learn.

Barsegyan, Areg; McGaugh, James L; Roozendaal, Benno

2014-01-01T23:59:59.000Z

304

Integrating human related errors with technical errors to determine causes behind offshore accidents  

E-Print Network [OSTI]

errors were embedded as an integral part of the oil well drilling opera- tion. To reduce the number assessment of the failure. The method is based on a knowledge model of the oil-well drilling process. All of non-productive time (NPT) during oil-well drilling. NPT exhibits a much lower declining trend than

Aamodt, Agnar

305

Pressure Change Measurement Leak Testing Errors  

SciTech Connect (OSTI)

A pressure change test is a common leak testing method used in construction and Non-Destructive Examination (NDE). The test is known as being a fast, simple, and easy to apply evaluation method. While this method may be fairly quick to conduct and require simple instrumentation, the engineering behind this type of test is more complex than is apparent on the surface. This paper intends to discuss some of the more common errors made during the application of a pressure change test and give the test engineer insight into how to correctly compensate for these factors. The principals discussed here apply to ideal gases such as air or other monoatomic or diatomic gasses; however these same principals can be applied to polyatomic gasses or liquid flow rate with altered formula specific to those types of tests using the same methodology.

Pryor, Jeff M [ORNL] [ORNL; Walker, William C [ORNL] [ORNL

2014-01-01T23:59:59.000Z

306

Quantum Error Correction with magnetic molecules  

E-Print Network [OSTI]

Quantum algorithms often assume independent spin qubits to produce trivial $|\\uparrow\\rangle=|0\\rangle$, $|\\downarrow\\rangle=|1\\rangle$ mappings. This can be unrealistic in many solid-state implementations with sizeable magnetic interactions. Here we show that the lower part of the spectrum of a molecule containing three exchange-coupled metal ions with $S=1/2$ and $I=1/2$ is equivalent to nine electron-nuclear qubits. We derive the relation between spin states and qubit states in reasonable parameter ranges for the rare earth $^{159}$Tb$^{3+}$ and for the transition metal Cu$^{2+}$, and study the possibility to implement Shor's Quantum Error Correction code on such a molecule. We also discuss recently developed molecular systems that could be adequate from an experimental point of view.

José J. Baldoví; Salvador Cardona-Serra; Juan M. Clemente-Juan; Luis Escalera-Moreno; Alejandro Gaita-Ariño; Guillermo Mínguez Espallargas

2014-08-22T23:59:59.000Z

307

Shape memory system with integrated actuation using embedded particles  

DOE Patents [OSTI]

A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

2012-05-29T23:59:59.000Z

308

Error compensation in insertion-region magnets  

SciTech Connect (OSTI)

In heavy ion storage rings, intra-beam scattering (IBS) between high charge state ions results in a large beam emittance during storage. The ultimate machine performance depends on achieving the highest possible magnetic field quality and alignment accuracy in the insertion-region (IR) triplet magnets during low-{beta} operation when the beam size is the largest in the triplets. Therefore, effective compensation of magnet construction errors and misalignments is crucial. Heavy-ion beams (Au{sup 79+} will be accelerated and stored for 10 hours in the Relativistic Heavy Ion Collider (RHIC) at the energy of 100 GeV/u in two separated rings consisting of superconducting magnets. Due to strong IBS, the transverse beam emittance grows from 10{pi} mm-mr at injection to more than 40{pi} mm-mr at storage. Dipoles and riplets of quadrupoles of large bore are placed on both sides of the six interaction points (IP). In order to maximize the luminosity at two IPs with proposed experiments, the nearby triplets are designed to enable the collision {beta}-function to be reduced to {beta} = 1 m. Consequently, the rms transverse beam size becomes large at the triplets ({beta}{sub max} = 1400 m), increasing from {sigma} = 2.3 mm to 4.7 mm during the period of storage. At the end of storage, the 5{sigma} beam size becomes about 71% of the coil radius (65 mm). The goal if IR triplet error compensation is to ensure satisfactory magnetic field quality and beam long-term stability up to this 5{sigma} radius.

Wei, Jie

1995-12-31T23:59:59.000Z

309

Does an awareness of differing types of spreadsheet errors aid end-users in identifying spreadsheets errors?  

E-Print Network [OSTI]

The research presented in this paper establishes a valid, and simplified, revision of previous spreadsheet error classifications. This investigation is concerned with the results of a web survey and two web-based gender and domain-knowledge free spreadsheet error identification exercises. The participants of the survey and exercises were a test group of professionals (all of whom regularly use spreadsheets) and a control group of students from the University of Greenwich (UK). The findings show that over 85% of users are also the spreadsheet's developer, supporting the revised spreadsheet error classification. The findings also show that spreadsheet error identification ability is directly affected both by spreadsheet experience and by error-type awareness. In particular, that spreadsheet error-type awareness significantly improves the user's ability to identify, the more surreptitious, qualitative error.

Purser, Michael

2008-01-01T23:59:59.000Z

310

Heliostat image drift behavior for different error sources  

Science Journals Connector (OSTI)

Drift is ubiquitous in heliostat fields and may be caused by diverse geometrical inaccuracies during heliostat installation and operation. This phenomenon is studied for three important primary errors in the present paper: Angular offset in the drive mechanism pedestal tilt and canting error. Each error produces characteristic signatures but there is a diversity of behavior depending on the error parameters and location of the heliostat. The variation of the extent of drift curves is studied as a function of distance for fixed error parameters. It is found that in general this extent is not proportional to distance except for far heliostats and depends on a complicated manner on the different parameters involved. Moreover even though the extent of drift curves becomes proportional to distance for far heliostats the convergence is very slow and very variable with the error parameters.

Rafael E. Cabanillas; Claudio A. Estrada

2014-01-01T23:59:59.000Z

311

Corruption in India Andrew Sanchez  

E-Print Network [OSTI]

citizens to access resources and preferential state treatment to which they are not entitled. Second much worse, including regional neighbours Pakistan and Bangladesh. However, the real significance

312

Electoral Corruption in Developing Democracies  

E-Print Network [OSTI]

Results . . . . . 5.2 Venezuela . . . . . . . . .5.2.1Results for each Forensic Analysis in Mexico, Venezuela andelections in Venezuela. . . . . . . . . . . . . . . . . . .

Cantu, Francisco

313

Parallel Worldline Numerics: Implementation and Error Analysis  

E-Print Network [OSTI]

We give an overview of the worldline numerics technique, and discuss the parallel CUDA implementation of a worldline numerics algorithm. In the worldline numerics technique, we wish to generate an ensemble of representative closed-loop particle trajectories, and use these to compute an approximate average value for Wilson loops. We show how this can be done with a specific emphasis on cylindrically symmetric magnetic fields. The fine-grained, massive parallelism provided by the GPU architecture results in considerable speedup in computing Wilson loop averages. Furthermore, we give a brief overview of uncertainty analysis in the worldline numerics method. There are uncertainties from discretizing each loop, and from using a statistical ensemble of representative loops. The former can be minimized so that the latter dominates. However, determining the statistical uncertainties is complicated by two subtleties. Firstly, the distributions generated by the worldline ensembles are highly non-Gaussian, and so the standard error in the mean is not a good measure of the statistical uncertainty. Secondly, because the same ensemble of worldlines is used to compute the Wilson loops at different values of $T$ and $x_\\mathrm{ cm}$, the uncertainties associated with each computed value of the integrand are strongly correlated. We recommend a form of jackknife analysis which deals with both of these problems.

Dan Mazur; Jeremy S. Heyl

2014-07-28T23:59:59.000Z

314

Memorandum Memorializing Ex Parte Communication, DOE impending  

Broader source: Energy.gov (indexed) [DOE]

Memorandum Memorializing Ex Parte Communication, DOE impending Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. The meeting was requested by AMCA International to introduce the association's leadership, standards, and experience in developing fan standards to DOE; to learn more about the DOE process for developing regulations for fan efficiency standards; and to inform DOE on how commercial and industrial fan markets work. AMCA_Ex_Parte.pdf More Documents & Publications DOE-STD-1168-2013 DOE Meeting Memorandum: Ex Parte Communications Independent Oversight Review, Savannah River Site - August 2011

315

Hydrodynamical random walker with chemotactic memory  

E-Print Network [OSTI]

A three-dimensional hydrodynamical model for a micro random walker is combined with the idea of chemotactic signaling network of E. coli. Diffusion exponents, orientational correlation functions and their dependence on the geometrical and dynamical parameters of the system are analyzed numerically. Because of the chemotactic memory, the walker shows superdiffusing displacements in all directions with the largest diffusion exponent for a direction along the food gradient. Mean square displacements and orientational correlation functions show that the chemotactic memory washes out all the signatures due to the geometrical asymmetry of the walker and statistical properties are asymmetric only with respect to the direction of food gradient. For different values of the memory time, the Chemotactic index (CI) is also calculated.

H. Mohammady; B. Esckandariun; A. Najafi

2014-10-01T23:59:59.000Z

316

Hydrodynamical random walker with chemotactic memory  

E-Print Network [OSTI]

A three-dimensional hydrodynamical model for a micro random walker is combined with the idea of chemotactic signaling network of E. coli. Diffusion exponents, orientational correlation functions and their dependence on the geometrical and dynamical parameters of the system are analyzed numerically. Because of the chemotactic memory, the walker shows superdiffusing displacements in all directions with the largest diffusion exponent for a direction along the food gradient. Mean square displacements and orientational correlation functions show that the chemotactic memory washes out all the signatures due to the geometrical asymmetry of the walker and statistical properties are asymmetric only with respect to the direction of food gradient. For different values of the memory time, the Chemotactic index (CI) is also calculated.

Mohammady, H; Najafi, A

2014-01-01T23:59:59.000Z

317

Simulation and Experiment of Wide Bandgap Material Based Nonvolatile Memory  

E-Print Network [OSTI]

phase-change nonvolatile memories”, IEEE Transactions on Device and Materialsphase change phenomena of GST (Germanium-Antimony-Tellurium) materialmaterials and structures are developed to replace the floating gate memory. Phase change

LI, ZONGLIN

2012-01-01T23:59:59.000Z

318

Towards Automated Memory Model Generation Via Event Tracing  

Science Journals Connector (OSTI)

......opportunities may be created to reduce the memory configuration of a machine during procurement, reducing initial capital expenditure. In this paper, we introduce WMTools, a memory manage- ment analysis suite, comprising a lightweight profiling......

O.F.J. Perks; D.A. Beckingsale; S.D. Hammond; I. Miller; J.A. Herdman; A. Vadgama; A.H. Bhalerao; L. He; S.A. Jarvis

2013-02-01T23:59:59.000Z

319

Speedy transactions in multicore in-memory databases  

E-Print Network [OSTI]

Silo is a new in-memory database that achieves excellent performance and scalability on modern multicore machines. Silo was designed from the ground up to use system memory and caches efficiently. For instance, it avoids ...

Tu, Stephen

320

Performance analysis of fault-tolerant nanoelectronic memories  

E-Print Network [OSTI]

important that defect and fault-tolerant schemes be incorporated into the design of nanotechnology related devices. In this dissertation, we focus on the study of a novel and promising class of computer chip memories called crossbar molecular switch memories...

Coker, Ayodeji

2009-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Building and exploiting ontologies for an automobile project memory  

Science Journals Connector (OSTI)

This paper describes SAMOVAR (Systems Analysis of Modelling and Validation of Renault Automobiles), aiming at preserving and exploiting the memory of past projects in automobile design (in particular the memory of the problems encountered during a project) ...

Joanna Golebiowska; Rose Dieng-Kuntz; Olivier Corby; Didier Mousseau

2001-10-01T23:59:59.000Z

322

A regularized limited-memory BFGS method for unconstrained ...  

E-Print Network [OSTI]

Aug 5, 2014 ... the BFGS method requires O(n2) memory to store the approximate ... A popular method for large-scale problems (1.1) is the limited-memory.

2014-08-05T23:59:59.000Z

323

Nonlinear local error bounds via a change of metric  

E-Print Network [OSTI]

Oct 23, 2014 ... Abstract: In this work, we improve the approach of Corvellec-Motreanu to nonlinear error bounds for lowersemicontinuous functions on ...

Dominique Azé

2014-10-23T23:59:59.000Z

324

Paging memory from random access memory to backing storage in a parallel computer  

DOE Patents [OSTI]

Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

2013-05-21T23:59:59.000Z

325

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

19, 2011 19, 2011 T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583) May 18, 2011 T-625: Opera Frameset Handling Memory Corruption Vulnerability The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

326

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

December 22, 2011 December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. December 20, 2011 U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. December 19, 2011 U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. December 16, 2011 U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code A remote user can cause the target application to execute arbitrary code on

327

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

May 16, 2011 May 16, 2011 T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks The software does not properly filter HTML code from user-supplied input before displaying the input. May 13, 2011 T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user. May 10, 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011

328

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

April 26, 2011 April 26, 2011 T-610: Red Hat kdenetwork security update A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. April 25, 2011 T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user. April 22, 2011 T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to

329

Shape memory behavior of ultrafine grained NiTi and TiNiPd shape memory alloys  

E-Print Network [OSTI]

The cyclic instability in shape memory characteristics of NiTi-based shape memory alloys (SMAs), such as transformation temperatures, transformation and irrecoverable strains and transformation hysteresis upon thermal and mechanical cycling limits...

Kockar, Benat

2009-05-15T23:59:59.000Z

330

The nature of the working memory system underlying language processing and its relationship to the long-term memory system  

E-Print Network [OSTI]

This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

Fedorenko, Evelina Georgievna

2007-01-01T23:59:59.000Z

331

Characterization of Shape Memory Alloys Using Artificial Neural Networks  

E-Print Network [OSTI]

1 Characterization of Shape Memory Alloys Using Artificial Neural Networks Jim Henrickson, Kenton � Shape Memory Alloys � Artificial Neural Networks Process � Implement Shape Memory Alloy Model � Generate Training Data � Train Artificial Neural Network Results Conclusion Characterization of Shape

Valasek, John

332

Coding-based Energy Minimization for Phase Change Memory  

E-Print Network [OSTI]

-1-4503-1199-1/12/06 ...$10.00. states of the phase-change material. In one state, the ma- terial is amorphous with a highCoding-based Energy Minimization for Phase Change Memory Azalia Mirhoseini Electrical and Computer Phase Change Memory write energy. Our method minimizes the energy required for memory rewrites

333

Phase Change Memory An Architecture and Systems Perspective  

E-Print Network [OSTI]

#12;Phase Change Memory Store data within phase change material [Ovshinsky68] Set phase via currentPhase Change Memory An Architecture and Systems Perspective Benjamin Lee Computer Architecture lifetime 1 B.Lee et al. "Architecting phase change memory as a scalable DRAM alternative." ISCA-36

Lee, Benjamin C.

334

DSK: k-mer counting with very low memory usage  

Science Journals Connector (OSTI)

......k-mer counting with very low memory usage Guillaume Rizk 1 Dominique Lavenier 2 Rayan...function of the desired memory and disk usage. In Section 3, DSK is used to count all...sequences, k-mer length k, target memory usage M (bits), target disk space D (bits......

Guillaume Rizk; Dominique Lavenier; Rayan Chikhi

2013-03-01T23:59:59.000Z

335

Evaluating Memory Energy Efficiency in Parallel I/O Workloads  

E-Print Network [OSTI]

Evaluating Memory Energy Efficiency in Parallel I/O Workloads Jianhui Yue,Yifeng Zhu , Zhao Cai the ever- widening gap between disk and processor speeds, memory energy efficiency becomes an increasingly management policies heavily influence the overall memory energy efficiency. In partic- ular, under the same

Zhu, Yifeng

336

GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS  

E-Print Network [OSTI]

GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS Maha IDRISSI AOUAD.loria.fr/zendra Keywords: Energy consumption reduction, Genetic heuristics, memory allocation management, optimizations on heuristic methods for SPMs careful management in order to reduce memory energy consumption. We propose

Schott, René - Institut de Mathématiques �lie Cartan, Université Henri Poincaré

337

Direct match data flow memory for data driven computing  

DOE Patents [OSTI]

A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

1997-01-01T23:59:59.000Z

338

L6: Memory Hierarchy Optimization III, Bandwidth Optimization  

E-Print Network [OSTI]

2/9/10 1 L6: Memory Hierarchy Optimization III, Bandwidth Optimization CS6963 Administrative · Next! ­ cs6963s10-teach@list.eng.utah.edu · Please use for questions to Protonu and me CS6963 2 L6:Memory CUDA installed 3 L6:MemoryHierarchyIII CS6963 Overview · Complete discussion of data placement

Hall, Mary W.

339

Shared-Memory Programming in OpenMP  

E-Print Network [OSTI]

Shared-Memory Programming in OpenMP Advanced Research Computing #12;Advanced Research Research Compu:ng What is OpenMP? · API for parallel programming on shared memory · Scalability limited by memory architecture ­To a single node (8 to 32 cores

Crawford, T. Daniel

340

A Memory Selection Algorithm for HighPerformance Pipelines  

E-Print Network [OSTI]

A Memory Selection Algorithm for High­Performance Pipelines Smita Bakshi Daniel D. Gajski Technical that the memory organization satisfy both the storage and the performance requirements of the design. In this report, we present an algorithm to select a memory organization, in addition to selecting a pipeline

California at Irvine, University of

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Memory Systems for Cognitive Agents Uma Ramamurthy1  

E-Print Network [OSTI]

Memory Systems for Cognitive Agents Uma Ramamurthy1 and Stan Franklin2 Abstract. The several different memory systems in human beings play crucial roles in facilitating human cognition. To build and cognitive science. In this paper we describe the various memory systems in the LIDA Architecture, which

Ramamurthy, Uma

342

Memory Scaling: A Systems Architecture Perspective Carnegie Mellon University  

E-Print Network [OSTI]

Memory Scaling: A Systems Architecture Perspective Onur Mutlu Carnegie Mellon University onur@cmu.edu http://users.ece.cmu.edu/omutlu/ Abstract--The memory system is a fundamental performance and energy that require more capacity, bandwidth, efficiency, and predictability out of the memory system make it an even

343

L4: Memory Hierarchy Optimization I, Locality and Data Placement  

E-Print Network [OSTI]

2/1/10 1 L4: Memory Hierarchy Optimization I, Locality and Data Placement CS6963 Administrative! ­ cs6963s10-teach@list.eng.utah.edu · Please use for questions to Protonu and me CS6963 2 L4:Memory to write code to optimize for memory hierarchy ­ More details Wednesday and (probably) next week · Reading

Hall, Mary W.

344

MEMORY MANAGEMENT FOR LARGE-SCALE NUMA MULTIPROCESSORS  

E-Print Network [OSTI]

MEMORY MANAGEMENT FOR LARGE-SCALE NUMA MULTIPROCESSORS Thomas J. LeBlanc Brian D. Marsh Michael L@cs.rochester.edu marsh@cs.rochester.edu scott@cs.rochester.edu March 1989 Abstract Large-scale shared-memory multiprocessors such as the BBN Butterfly and IBM RP3 Introduce a new level In the memory hierarchy: multiple

Scott, Michael L.

345

Episodic Memory, Semantic Memory, and Amnesia Larry R. Squire1,2,3,4* and Stuart M. Zola1,2,3  

E-Print Network [OSTI]

COMMENTARY Episodic Memory, Semantic Memory, and Amnesia Larry R. Squire1,2,3,4* and Stuart M. Zola 4Department of Psychology, University of California, La Jolla, California ABSTRACT: Episodic memory and semantic memory are two types of declarative memory. There have been two principal views about how

Squire, Larry R.

346

Hopfield model associative memory with nonzero-diagonal terms in memory matrix  

Science Journals Connector (OSTI)

The discrete-valued neural network proposed by Hopfield requires zero-diagonal terms in the memory matrix so that the net evolves toward a local minimum of an energy function. For a...

Gindi, Gene R; Gmitro, Arthur F; Parthasarathy, K

1988-01-01T23:59:59.000Z

347

Synthesis of Feedforward Networks in Supremum Error Bound  

E-Print Network [OSTI]

1 Synthesis of Feedforward Networks in Supremum Error Bound Krzysztof Ciesielski, Jaroslaw P. Sacha of Colorado at Denver, USA; e-mail: KCios@carbon.cudenver.edu #12;SYNTHESIS OF FEEDFORWARD NETWORKS 2 Abstract synthesis. The result can also be used to estimate complexity of the maximum-error network and

Ciesielski, Krzysztof Chris

348

Synthesis of Feedforward Networks in Supremum Error Bound  

E-Print Network [OSTI]

1 Synthesis of Feedforward Networks in Supremum Error Bound Krzysztof Ciesielski, Jarosl/aw P is with the University of Colorado at Denver, USA; e­mail: KCios@carbon.cudenver.edu #12; SYNTHESIS OF FEEDFORWARD network synthesis. The result can also be used to estimate complexity of the maximum­error network and

Ciesielski, Krzysztof Chris

349

PERIOD ERROR ESTIMATION FOR THE KEPLER ECLIPSING BINARY CATALOG  

SciTech Connect (OSTI)

The Kepler Eclipsing Binary Catalog (KEBC) describes 2165 eclipsing binaries identified in the 115 deg{sup 2} Kepler Field based on observations from Kepler quarters Q0, Q1, and Q2. The periods in the KEBC are given in units of days out to six decimal places but no period errors are provided. We present the PEC (Period Error Calculator) algorithm, which can be used to estimate the period errors of strictly periodic variables observed by the Kepler Mission. The PEC algorithm is based on propagation of error theory and assumes that observation of every light curve peak/minimum in a long time-series observation can be unambiguously identified. The PEC algorithm can be efficiently programmed using just a few lines of C computer language code. The PEC algorithm was used to develop a simple model that provides period error estimates for eclipsing binaries in the KEBC with periods less than 62.5 days: log {sigma}{sub P} Almost-Equal-To - 5.8908 + 1.4425(1 + log P), where P is the period of an eclipsing binary in the KEBC in units of days. KEBC systems with periods {>=}62.5 days have KEBC period errors of {approx}0.0144 days. Periods and period errors of seven eclipsing binary systems in the KEBC were measured using the NASA Exoplanet Archive Periodogram Service and compared to period errors estimated using the PEC algorithm.

Mighell, Kenneth J. [National Optical Astronomy Observatory, 950 North Cherry Avenue, Tucson, AZ 85719 (United States); Plavchan, Peter [NASA Exoplanet Science Institute, California Institute of Technology, Pasadena, CA 91125 (United States)

2013-06-15T23:59:59.000Z

350

Mining API Error-Handling Specifications from Source Code  

E-Print Network [OSTI]

Abstract. API error-handling specifications are often not documented, necessitating automated specification mining. Automated mining of error-handling specifications is challenging for procedural languages such as C, which lack explicit exception-handling mechanisms. Due to the lack of explicit exception handling, error-handling code is often scattered across different procedures and files making it difficult to mine error-handling specifications through manual inspection of source code. In this paper, we present a novel framework for mining API errorhandling specifications automatically from API client code, without any user input. In our framework, we adapt a trace generation technique to distinguish and generate static traces representing different API run-time behaviors. We apply data mining techniques on the static traces to mine specifications that define correct handling of API errors. We then use the mined specifications to detect API error-handling violations. Our framework mines 62 error-handling specifications and detects 264 real error-handling defects from the analyzed open source packages. 1 1

Mithun Acharya; Tao Xie

351

Modeling and Predicting Pointing Errors in Two Dimensions  

E-Print Network [OSTI]

to complement Fitts' law's predictive model of pointing speed. However, their model was based on one-dimensional time, error prediction, error rates. ACM Classification Keywords: H.5.2 [Information interfaces and presentation]: User interfaces ­ theory and methods; H.1.2 [Models and principles]: User/machine systems

Anderson, Richard

352

Optimal Audio Transmission over Error-Prone Wireless Links  

E-Print Network [OSTI]

1 Optimal Audio Transmission over Error-Prone Wireless Links Ala' Khalifeh, Student Member IEEE for transmitting high quality audio sequences over error-prone wireless links. Our framework introduces apparatus and technique to optimally protect a stored audio sequence transmitted over a wireless link while considering

Yousefi'zadeh, Homayoun

353

Audio quality for a simple forward error correcting code  

E-Print Network [OSTI]

Audio quality for a simple forward error correcting code Yvan Calas LIRMM - University the audio quality offered by a simple Forward Error Correction (FEC) code used in audio applications like Freephone or Rat. This coding technique consists in adding to every audio packet a redundant information

Paris-Sud XI, Université de

354

Enhancing Compiler Techniques for Memory Energy Optimizations  

E-Print Network [OSTI]

in the total energy consumption equation. 1 Introduction As the market for embedded systems continues to growEnhancing Compiler Techniques for Memory Energy Optimizations Joseph Zambreno1 , Mahmut Taylan Evanston IL 60208, USA {zambro1,choudhar}@ece.northwestern.edu 2 Microsystems Design Lab Pennsylvania State

Kuzmanovic, Aleksandar

355

What, where and when: deconstructing memory  

Science Journals Connector (OSTI)

...memories, such as remembering that the Battle of Hastings took place in 1066, an episodic...of the window while learning about the Battle of Hastings. Given that the focus of...flowers in the midday test (as this test is midway between two known but different rewards...

2013-01-01T23:59:59.000Z

356

3, 16031627, 2006 long-memory  

E-Print Network [OSTI]

HESSD 3, 1603­1627, 2006 Detecting long-memory W. Wang et al. Title Page Abstract Introduction Discussion EGU Hydrol. Earth Syst. Sci. Discuss., 3, 1603­1627, 2006 www.hydrol-earth-syst-sci-discuss.net/3/1603 2006 ­ Published: 14 July 2006 Correspondence to: W. Wang (w.wang@126.com) 1603 #12;HESSD 3, 1603

Boyer, Edmond

357

From Shared Memory to Message Passing  

E-Print Network [OSTI]

memory, but pass messages along networks: ... but also smart grids... Smart grid with renewable energy? The node measuring the hottest temperature? Etc. - Election of a leader - Coloring the network (e.g., frequency spectrum allocation in wireless networks), computing independent sets, etc. Complexity evaluation

Schmid, Stefan

358

CAUSALITY, MEMORY ERASING AND DELAYED CHOICE EXPERIMENTS  

E-Print Network [OSTI]

Comment on [R.L. Ingraham, Phys. Rev. A 50, 4502 (1994)]. Ingraham suggested ``a delayed-choice experiment with partial, controllable memory erasing''. It is shown that he cannot be right since his predictions contradict relativistic causality. A subtle quantum effect which was overlooked by Ingraham is explained.

Y. Aharonov; S. Popsecu; L. Vaidman

1995-01-08T23:59:59.000Z

359

Associative Memory Computing Power and Its Simulation  

E-Print Network [OSTI]

The associative memory (AM) system is a computing device made of hundreds of AM ASICs chips designed to perform “pattern matching” at very high speed. Since each AM chip stores a data base of 130000 pre-calculated patterns and large numbers of chips can be easily assembled together, it is possible to produce huge AM banks. Speed and size of the system are crucial for real-time High Energy Physics applications, such as the ATLAS Fast TracKer (FTK) Processor. Using 80 million channels of the ATLAS tracker, FTK finds tracks within 100 micro seconds. The simulation of such a parallelized system is an extremely complex task if executed in commercial computers based on normal CPUs. The algorithm performance is limited, due to the lack of parallelism, and in addition the memory requirement is very large. In fact the AM chip uses a content addressable memory (CAM) architecture. Any data inquiry is broadcast to all memory elements simultaneously, thus data retrieval time is independent of the database size. The gr...

Volpi, G; The ATLAS collaboration

2014-01-01T23:59:59.000Z

360

Associative Memory computing power and its simulation  

E-Print Network [OSTI]

The associative memory (AM) system is a computing device made of hundreds of AM ASICs chips designed to perform “pattern matching” at very high speed. Since each AM chip stores a data base of 130000 pre-calculated patterns and large numbers of chips can be easily assembled together, it is possible to produce huge AM banks. Speed and size of the system are crucial for real-time High Energy Physics applications, such as the ATLAS Fast TracKer (FTK) Processor. Using 80 million channels of the ATLAS tracker, FTK finds tracks within 100 micro seconds. The simulation of such a parallelized system is an extremely complex task if executed in commercial computers based on normal CPUs. The algorithm performance is limited, due to the lack of parallelism, and in addition the memory requirement is very large. In fact the AM chip uses a content addressable memory (CAM) architecture. Any data inquiry is broadcast to all memory elements simultaneously, thus data retrieval time is independent of the database size. The gr...

Ancu, L S; The ATLAS collaboration; Britzger, D; Giannetti, P; Howarth, J W; Luongo, C; Pandini, C; Schmitt, S; Volpi, G

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Mondriaan Memory Protection Emmett Jethro Witchel  

E-Print Network [OSTI]

Mondriaan Memory Protection by Emmett Jethro Witchel Submitted to the Department of Electrical the reliability and security of computer systems, but will be adopted only if the protection mechanism does for large systems, like operating systems, web servers and web clients. Protection between modules written

Asanoviæ, Krste

362

Memory effect of the online user preference  

E-Print Network [OSTI]

The mechanism of the online user preference evolution is of great significance for understanding the online user behaviors and improving the quality of online services. Since users are allowed to rate on objects in many online systems, ratings can well reflect the users' preference. With two benchmark datasets from online systems, we uncover the memory effect in users' selecting behavior which is the sequence of qualities of selected objects and the rating behavior which is the sequence of ratings delivered by each user. Furthermore, the memory duration is presented to describe the length of a memory, which exhibits the power-law distribution, i.e., the probability of the occurring of long-duration memory is much higher than that of the random case which follows the exponential distribution. We present a preference model in which a Markovian process is utilized to describe the users' selecting behavior, and the rating behavior depends on the selecting behavior. With only one parameter for each of the user's s...

Hou, Lei; Guo, Qiang; Liu, Jian-Guo

2014-01-01T23:59:59.000Z

363

A Sensing Error Aware MAC Protocol for Cognitive Radio Networks  

E-Print Network [OSTI]

Cognitive radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, we present a spectrum sensing error aware MAC protocol for a CR network collocated with multiple primary networks. We explicitly consider both types of sensing errors in the CR MAC design, since such errors are inevitable for practical spectrum sensors and more important, such errors could have significant impact on the performance of the CR MAC protocol. Two spectrum sensing polices are presented, with which secondary users collaboratively sense the licensed channels. The sensing policies are then incorporated into p-Persistent CSMA to coordinate opportunistic spectrum access for CR network users. We present an analysis of the interference and throughput performance of the proposed CR MAC, and find the analysis highly accurate in our simulation studies. The proposed sensing error aware CR MAC p...

Hu, Donglin

2011-01-01T23:59:59.000Z

364

KVP meter errors induced by plastic wrap  

SciTech Connect (OSTI)

The purpose of this study was to determine whether erroneous kVp meter readings, induced by plastic wrap, affected the actual kVp (output) of a dental X-ray machine. To evaluate the effect of plastic wrap on dental X-ray machine kVp meters, a radiation output device was used to measure output in mR/ma.s. An intraoral dental X-ray unit (S.S. White Model {number sign}90W) was used to make the exposures. First, the kVp meter was not covered with plastic wrap and output readings were recorded at various kVp settings with the milliamperage and time held constant. Secondly, the same kVp settings were selected before the plastic wrap was placed. Milliamperage and time were again held to the same constant. The X-ray console was then covered with plastic wrap prior to measuring the output for each kVp. The wrap possessed a static charge. This charge induced erroneous kVp meter readings. Out-put readings at the various induced kVp settings were then recorded. A kVp of 50 with no wrap present resulted in the same output as a kVp of 50 induced to read 40 or 60 kVp by the presence of wrap. Similar results were obtained at other kVp settings. This indicates that the plastic wrap influences only the kVp meter needle and not the actual kilovoltage of the X-ray machine. Dental X-ray machine operators should select kVp meter readings prior to placing plastic wrap and should not adjust initial settings if the meter is deflected later by the presence of wrap. The use of such a procedure will result in proper exposures, fewer retakes, and less patient radiation. If plastic wrap leads to consistent exposure errors, clinicians may wish to use a 0.5% sodium hypochlorite disinfectant as an alternative to the barrier technique.

Jefferies, D.; Morris, J.W.; White, V.P. (Southern Illinois Univ., Carbondale (USA))

1991-02-01T23:59:59.000Z

365

Memory functions and Correlations in Additive Binary Markov Chains  

E-Print Network [OSTI]

A theory of additive Markov chains with long-range memory, proposed earlier in Phys. Rev. E 68, 06117 (2003), is developed and used to describe statistical properties of long-range correlated systems. The convenient characteristics of such systems, a memory function, and its relation to the correlation properties of the systems are examined. Various methods for finding the memory function via the correlation function are proposed. The inverse problem (calculation of the correlation function by means of the prescribed memory function) is also solved. This is demonstrated for the analytically solvable model of the system with a step-wise memory function.

S. S. Melnyk; O. V. Usatenko; V. A. Yampol'skii; S. S. Apostolov; Z. A. Mayzelis

2006-03-21T23:59:59.000Z

366

Process estimation in presence of time-invariant memory effects  

E-Print Network [OSTI]

Any repeated use of a fixed experimental instrument is subject to memory effects. We design an estimation method uncovering the details of the underlying interaction between the system and the internal memory without having any experimental access to memory degrees of freedom. In such case, by definition, any memoryless quantum process tomography (QPT) fails, because the observed data sequences do not satisfy the elementary condition of statistical independence. However, we show that the randomness implemented in certain QPT schemes is sufficient to guarantee the emergence of observable "statistical" patterns containing complete information on the memory channels. We demonstrate the algorithm in details for case of qubit memory channels with two-dimensional memory. Interestingly, we found that for arbitrary estimation method the memory channels generated by controlled unitary interactions are indistinguishable from memoryless unitary channels.

Tomas Rybar; Mario Ziman

2014-09-15T23:59:59.000Z

367

Measuring worst-case errors in a robot workcell  

SciTech Connect (OSTI)

Errors in model parameters, sensing, and control are inevitably present in real robot systems. These errors must be considered in order to automatically plan robust solutions to many manipulation tasks. Lozano-Perez, Mason, and Taylor proposed a formal method for synthesizing robust actions in the presence of uncertainty; this method has been extended by several subsequent researchers. All of these results presume the existence of worst-case error bounds that describe the maximum possible deviation between the robot`s model of the world and reality. This paper examines the problem of measuring these error bounds for a real robot workcell. These measurements are difficult, because of the desire to completely contain all possible deviations while avoiding bounds that are overly conservative. The authors present a detailed description of a series of experiments that characterize and quantify the possible errors in visual sensing and motion control for a robot workcell equipped with standard industrial robot hardware. In addition to providing a means for measuring these specific errors, these experiments shed light on the general problem of measuring worst-case errors.

Simon, R.W.; Brost, R.C.; Kholwadwala, D.K. [Sandia National Labs., Albuquerque, NM (United States). Intelligent Systems and Robotics Center

1997-10-01T23:59:59.000Z

368

Phase errors and predicted spectral performance of a prototype undulator  

SciTech Connect (OSTI)

A prototype undulator has been used to study different magnetic end-configurations and shimming techniques for straightening the beam trajectory. Field distributions obtained by Hall probe measurements were analyzed in terms of trajectory, phase errors, and on-axis brightness for the purpose of correlating predicted spectral intensity with the calculated phase errors. Two device configurations were analyzed. One configuration had a full-strength first magnet at each end and the next-to-last pole was recessed to make the trajectory through the middle of the undulator parallel to the undulator axis. For the second configuration, the first permanent magnet at each end was replaced by a half-strength magnet to reduce the trajectory displacement and the next-to-last pole was adjusted appropriately, and shims were added to straighten the trajectory. Random magnetic field errors can cause trajectory deviations that will affect the optimum angle for viewing the emitted radiation, and care must be taken to select the appropriate angle when calculating the phase errors. This angle may be calculated from the average trajectory angle evaluated at the location of the poles. For the second configuration, we find an rms phase error of less than 3{degrees} and predict 87% of the ideal value of the on-axis brightness for the third harmonic. We have also analyzed the gap dependence of the phase errors and spectral brightness and have found that the rms phase error remain small at all gap settings.

Dejus, R.J.; Vassrman, I.; Moog, E.R.; Gluskin, E.

1994-08-01T23:59:59.000Z

369

Model based Open-loop Correction of Heliostat Tracking Errors  

Science Journals Connector (OSTI)

Abstract The heliostat field is by far the most expensive part of a typical Central Receiver (CR) plant. To achieve high conversion efficiencies, heliostats with very high tracking accuracy are needed, but errors are introduced due to manufacturing-, installation- and alignment tolerances as well control system granularity. Mechanical error profiles are unique for every heliostat and cause tracking errors that vary over the course of days and seasons and therefore cannot be corrected by once-off angle offset corrections. Developments in microcontroller technology drives decentralization of CR control systems. Powerful open-loop error correction algorithms can run on low cost heliostat local controllers, enabling high tracking accuracy from lower cost heliostats with reduced tolerances. A prototype array of 18 heliostats, each 1 ft2 in size, was constructed to validate the field control system functionality and final tracking accuracy. Tests were conducted at SU's solar laboratory with an 18m tower and heliostat slant ranges of around 40 m. Prototype experiments indicate a daily open-loop RMS normal vector tracking error below 1 mrad. Strong correlation exists between successive days’ residual error curves, indicating that further model refinements may be possible, including frequency spectrum analysis (using FFT) to identify and correct for mechanism-specific periodic drivetrain errors.

K. Malan; P. Gauché

2014-01-01T23:59:59.000Z

370

Disorder-Induced Microscopic Magnetic Memory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disorder-Induced Microscopic Magnetic Memory Print Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

371

Disorder-Induced Microscopic Magnetic Memory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disorder-Induced Microscopic Disorder-Induced Microscopic Magnetic Memory Disorder-Induced Microscopic Magnetic Memory Print Wednesday, 26 October 2005 00:00 The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

372

Disorder-Induced Microscopic Magnetic Memory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disorder-Induced Microscopic Magnetic Memory Print Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

373

Quantum Memory with a controlled homogeneous splitting  

E-Print Network [OSTI]

We propose a quantum memory protocol where a input light field can be stored onto and released from a single ground state atomic ensemble by controlling dynamically the strength of an external static and homogeneous field. The technique relies on the adiabatic following of a polaritonic excitation onto a state for which the forward collective radiative emission is forbidden. The resemblance with the archetypal Electromagnetically-Induced-Transparency (EIT) is only formal because no ground state coherence based slow-light propagation is considered here. As compared to the other grand category of protocols derived from the photon-echo technique, our approach only involves a homogeneous static field. We discuss two physical situations where the effect can be observed, and show that in the limit where the excited state lifetime is longer than the storage time, the protocols are perfectly efficient and noise-free. We compare the technique to other quantum memories, and propose atomic systems where the experiment c...

Hétet, G; Chanelière, T

2013-01-01T23:59:59.000Z

374

Memory effect in uniformly heated granular gases  

E-Print Network [OSTI]

We evidence a Kovacs-like memory effect in a uniformly driven granular gas. A system of inelastic hard particles, in the low density limit, can reach a non-equilibrium steady state when properly forced. By following a certain protocol for the drive time dependence, we prepare the gas in a state where the granular temperature coincides with its long time value. The temperature subsequently does not remain constant, but exhibits a non-monotonic evolution with either a maximum or a minimum, depending on the dissipation, and on the protocol. We present a theoretical analysis of this memory effect, at Boltzmann-Fokker-Planck equation level, and show that when dissipation exceeds a threshold, the response can be coined anomalous. We find an excellent agreement between the analytical predictions and direct Monte Carlo simulations.

E. Trizac; A. Prados

2014-07-15T23:59:59.000Z

375

: A Scalable Shared-memory Multicore Architecture  

E-Print Network [OSTI]

-chip memory accesses, EM2 improves energy consumption by 1.3Ã? on average, and the energy-delay product by up an address not locally cached on the core it is executing on, it migrates to the home core for that data, we show that EM2 outperforms directory-based cache-coherence 1.13Ã? on average using a high

Devadas, Srinivas

376

Error 401 on upload? | OpenEI Community  

Open Energy Info (EERE)

Error 401 on upload? Error 401 on upload? Home > Groups > Databus Hi, I get an HTTP error 401 when trying to upload data. My first thought is that this is related to the robot's credentials, but I've checked that carefully; robot is in a group with access to the table, etc. Is there something else that can cause error 401? thanks, Submitted by Hopcroft on 23 September, 2013 - 13:02 1 answer Points: 0 uploading data using the GUI (csv upload button) or uploading data using json? What type of access does the group have to the database? Try adding the robot to the group directly as well as a work around and let me know what happens(we have people using the robots but perhaps there is an issue somewhere). Is your user and your api key working at all? (your user key is in the help section System Access on your version of databus). Deanhiller

377

Error 401 on upload? | OpenEI Community  

Open Energy Info (EERE)

Error 401 on upload? Error 401 on upload? Home > Groups > Databus Hi, I get an HTTP error 401 when trying to upload data. My first thought is that this is related to the robot's credentials, but I've checked that carefully; robot is in a group with access to the table, etc. Is there something else that can cause error 401? thanks, Submitted by Hopcroft on 23 September, 2013 - 13:02 1 answer Points: 0 uploading data using the GUI (csv upload button) or uploading data using json? What type of access does the group have to the database? Try adding the robot to the group directly as well as a work around and let me know what happens(we have people using the robots but perhaps there is an issue somewhere). Is your user and your api key working at all? (your user key is in the help section System Access on your version of databus). Deanhiller

378

Sensitivity to Error Fields in NSTX High Beta Plasmas  

SciTech Connect (OSTI)

It was found that error field threshold decreases for high ? in NSTX, although the density correlation in conventional threshold scaling implies the threshold would increase since higher ? plasmas in our study have higher plasma density. This greater sensitivity to error field in higher ? plasmas is due to error field amplification by plasmas. When the effect of amplification is included with ideal plasma response calculations, the conventional density correlation can be restored and threshold scaling becomes more consistent with low ? plasmas. However, it was also found that the threshold can be significantly changed depending on plasma rotation. When plasma rotation was reduced by non-resonant magnetic braking, the further increase of sensitivity to error field was observed.

Jong-Kyu Park, Jonathan E. Menard, Stefan P. Gerhardt, Richard J. Buttery, Steve A. Sabbagh, Ronald E. Bell and Benoit P. LeBlanc

2011-11-07T23:59:59.000Z

379

Global Consequences of the Bioenergy Greenhouse Gas Accounting Error  

Science Journals Connector (OSTI)

Like the global financial crisis, which resulted in part from misguided accounting of mortgages, global policies to expand transportation biofuels and bioelectricity reflect an accounting error. Although the carb...

Tim Searchinger

2012-01-01T23:59:59.000Z

380

Synthesis of Feedforward Networks in Supremum Error Bound  

E-Print Network [OSTI]

Synthesis of Feedforward Networks in Supremum Error Bound Krzysztof@c* *arbon.cudenver.edu #12;SYNTHESIS OF FEEDFORWARD NETWORKS and a linear output. This result is applied to formulate a new * *method of neural network synthesis

Ciesielski, Krzysztof Chris

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A Priori Error Estimates for Some Discontinuous Galerkin Immersed ...  

E-Print Network [OSTI]

estimate in a mesh-dependant energy norm is derived, and this error ... 0 (Th), integrate both sides on each element K ? Th, and apply the Green's formula to.

2015-01-12T23:59:59.000Z

382

An Approximation Algorithm for Constructing Error Detecting Prefix ...  

E-Print Network [OSTI]

Sep 2, 2006 ... Hamming prefix code with an additive error of at most O(log log log n) bits ...... (b) represents both the tree T after the removal of the leaves at.

2006-09-02T23:59:59.000Z

383

Error estimation and adaptive mesh refinement for aerodynamic flows  

E-Print Network [OSTI]

Error estimation and adaptive mesh refinement for aerodynamic flows Ralf Hartmann1 and Paul Houston2 1 Institute of Aerodynamics and Flow Technology DLR (German Aerospace Center) Lilienthalplatz 7

Hartmann, Ralf

384

Purchasing Power Parity: Error Correction Models and Structural Breaks  

Science Journals Connector (OSTI)

This paper examines purchasing power parity (PPP) behavior using error correction models (ECM) and allowing for structural breaks. We distinguish four different objectives: first, this paper examines which var...

Amalia Morales Zumaquero; Rodrigo Peruga Urrea

2002-01-01T23:59:59.000Z

385

Kinetic energy error in the NIMROD spheromak simulations Carl Sovinec  

E-Print Network [OSTI]

Kinetic energy error in the NIMROD spheromak simulations Carl Sovinec 10/25/00 Dmitri Ryutov at the ends (as in the spheromak simulations), it may lead to compression in a boundary layer.] The maximum

Sovinec, Carl

386

Detector error and Einstein-Podolsky-Rosen correlations  

Science Journals Connector (OSTI)

The question of how data collected in the spin-½ Einstein-Podolsky-Rosen experiment become compatible with local realism for increasing detector error is investigated in two ways. (1) It is shown that data obtained in any experiment with three settings of one detector axis and any number of settings of the other will be compatible with local realism if the detector error is such that data obtained with any two settings of each detector axis are compatible with local realism. (The error rate must be more than 7.96% for this to be so.) (2) It is shown that a detector error rate of 14.64% is enough to mask nonclassical correlations in any experiment with any number of settings of both detector axes; this improves on the figure of 21.13% given by Mermin and Schwarz.

Anupam Garg

1983-08-15T23:59:59.000Z

387

Inhomogeneous Background Error Modeling and Estimation over Antarctica  

Science Journals Connector (OSTI)

The structure of the analysis increments in a variational data assimilation scheme is strongly driven by the formulation of the background error covariance matrix, especially in data-sparse areas such as the Antarctic region. The gridpoint ...

Yann Michel; Thomas Auligné

2010-06-01T23:59:59.000Z

388

Probabilistic state estimation in regimes of nonlinear error growth  

E-Print Network [OSTI]

State estimation, or data assimilation as it is often called, is a key component of numerical weather prediction (NWP). Nearly all implementable methods of state estimation suitable for NWP are forced to assume that errors ...

Lawson, W. Gregory, 1975-

2005-01-01T23:59:59.000Z

389

Advisory on the reporting error in the combined propane stocks...  

Gasoline and Diesel Fuel Update (EIA)

Advisory on the reporting error in the combined propane stocks for PADDs 4 and 5 Release Date: June 12, 2013 The U.S. Energy Information Administration issued the following...

390

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

SciTech Connect (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

391

US-LHC IR magnet error analysis and compensation  

SciTech Connect (OSTI)

This paper studies the impact of the insertion-region (IR) magnet field errors on LHC collision performance. Compensation schemes including magnet orientation optimization, body-end compensation, tuning shims, and local nonlinear correction are shown to be highly effective.

Wei, J.; Ptitsin, V.; Pilat, F.; Tepikian, S. [Brookhaven National Lab., Upton, NY (United States); Gelfand, N.; Wan, W.; Holt, J. [Fermi National Accelerator Lab., Batavia, IL (United States)

1998-08-01T23:59:59.000Z

392

US-LHC IR MAGNET ERROR ANALYSIS AND COMPENSATION.  

SciTech Connect (OSTI)

This paper studies the impact of the insertion-region (IR) magnet field errors on LHC collision performance. Compensation schemes including magnet orientation optimization, body-end compensation, tuning shims, and local nonlinear correction are shown to be highly effective.

WEI, J.

1998-06-26T23:59:59.000Z

393

Computer correction of resistance errors in polarization data. Technical report  

SciTech Connect (OSTI)

RESIST is a short microcomputer program that detects and corrects resistance (IR) errors in cathodic polarization data. It requires a minute or less to calculate the corrosion rate, the cathodic Tafel constant, and the resistance.

Gandhi, R.H.; Greene, N.D.

1983-08-01T23:59:59.000Z

394

Tracing of Error in a Time Series Data  

E-Print Network [OSTI]

A physical (e.g. astrophysical, geophysical, meteorological etc.) data may appear as an output of an experiment or it may contain some sociological, economic or biological information. Whatever be the source of a time series data some amount of noise is always expected to be embedded in it. Analysis of such data in presence of noise may often fail to give accurate information. Although text book data filtering theory is primarily concerned with the presences of random, zero mean errors; but in reality, errors in data are often systematic rather than random. In the present paper we produce different models of systematic error in the time series data. This will certainly help to trace the systematic error present in the data and consequently that can be removed as possible to make the data compatible for further study.

Koushik Ghosh; Probhas Raychaudhuri

2007-01-30T23:59:59.000Z

395

Using doppler radar images to estimate aircraft navigational heading error  

DOE Patents [OSTI]

A yaw angle error of a motion measurement system carried on an aircraft for navigation is estimated from Doppler radar images captured using the aircraft. At least two radar pulses aimed at respectively different physical locations in a targeted area are transmitted from a radar antenna carried on the aircraft. At least two Doppler radar images that respectively correspond to the at least two transmitted radar pulses are produced. These images are used to produce an estimate of the yaw angle error.

Doerry, Armin W. (Albuquerque, NM); Jordan, Jay D. (Albuquerque, NM); Kim, Theodore J. (Albuquerque, NM)

2012-07-03T23:59:59.000Z

396

An error correcting procedure for imperfect supervised, nonparametric classification  

E-Print Network [OSTI]

AN ERROR CORRECTING PROCEDJJRE FOR IMPERFECTI, Y SUPERVISED, NONPARAMETRIC CLASSIFICATION A Thesis by DENNIS RAY FERRELL Submitted to the Graduate College of Texas AAM University in partial fulfillment of the requirement for the degree...) (Head f Depart en ) (Member) (Member) PE y (Memb ei) (Member) August 1973 ABSTRACT An Error Correcting Procedure For Imperfectly Supervised, Nonparametric Classification (August 1973) Dennis Ray Ferrell, B. S. , I, omar University Directed by...

Ferrell, Dennis Ray

2012-06-07T23:59:59.000Z

397

Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error Rates in GPGPU  

E-Print Network [OSTI]

-GPGPU hardware in a controlled environment found no errors. However, our survey on Folding@home finds that carried out on over 50,000 GPUs on the Folding@home distributed computing network. MemtestG80

Pratt, Vaughan

398

Mercury, to put it plainly, is bad stuff. In people, it causes exhaustion, headaches, memory loss, even brain damage; in birds it appears to have similar nervous system impacts and can harm their eggs; in the environment, there's almost no way to get rid  

E-Print Network [OSTI]

Mercury, to put it plainly, is bad stuff. In people, it causes exhaustion, headaches, memory loss; in the environment, there's almost no way to get rid of it. Mercury in the San Francisco Bay is especially sinister with for cleaning up our bay and mitigating past errors, often make mercury levels worse. But why that is, where it

399

Memory consistency models for high performance distributed computing  

E-Print Network [OSTI]

This thesis develops a mathematical framework for specifying the consistency guarantees of high performance distributed shared memory multiprocessors. This framework is based on computations, which specify the operations ...

Luchangco, Victor

2001-01-01T23:59:59.000Z

400

False Memories of UFO Encounters: An fMRI Investigation .  

E-Print Network [OSTI]

??The idea of ‘false memories’ for traumatic events has powered numerous controversies. For this reason, the present study was designed as an attempt to resolve… (more)

Lambrinos, Angela

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Experimental and Simulation Study of Resistive Switches for Memory Applications  

E-Print Network [OSTI]

7, 8]), so that the resistance of the material will changebased Resistance change Memory” Advanced Materials 2008, 20,material on the top, it effectively determines the overall resistance

Pan, Feng

2012-01-01T23:59:59.000Z

402

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...  

Broader source: Energy.gov (indexed) [DOE]

& Publications Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised) DOE and NREL Technical Assistance Building Green in Greensburg:...

403

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...  

Broader source: Energy.gov (indexed) [DOE]

the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas. 47461.pdf More Documents & Publications Rebuilding it Better:...

404

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure)  

SciTech Connect (OSTI)

This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas.

Not Available

2010-03-01T23:59:59.000Z

405

Recommendation 196: Alternatives to Memorialize the K-25 Building  

Broader source: Energy.gov [DOE]

The ORSSAB Recommends to DOE Alternatives to Memorialize the K-25 Building at East Tennessee Technology Park and Manhattan Project Exhibits in Oak Ridge, Tennessee.

406

Life-cycle assessment of NAND flash memory  

E-Print Network [OSTI]

OF SSD VS . HDD Primary energy consumption MJ 96 GB ?ashpaired trends, primary energy consumption per gigabyte (GB)have been Fig. 2. Primary energy consumption per memory

Boyd, Sarah; Horvath, A; Dornfeld, David

2010-01-01T23:59:59.000Z

407

Building Green in Greensburg: Kiowa County Memorial Hospital  

Office of Energy Efficiency and Renewable Energy (EERE)

This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

408

Optimization Online - On Efficiently Combining Limited Memory and ...  

E-Print Network [OSTI]

Nov 25, 2013 ... Abstract: Limited memory quasi-Newton methods and trust-region methods represent two efficient approaches used for solving unconstrained ...

Oleg Burdakov

2013-11-25T23:59:59.000Z

409

Memory Effects and Transport Coefficients for Non-Newtonian Fluids  

E-Print Network [OSTI]

We discuss the roles of viscosity in relativistic fluid dynamics from the point of view of memory effects. Depending on the type of quantity to which the memory effect is applied, different terms appear in higher order corrections. We show that when the memory effect applies on the extensive quantities, the hydrodynamic equations of motion become non-singular. We further discuss the question of memory effect in the derivation of transport coefficients from a microscopic theory. We generalize the application of the Green-Kubo-Nakano (GKN) to calculate transport coefficients in the framework of projection operator formalism, and derive the general formula when the fluid is non-Newtonian.

T. Kodama; T. Koide

2008-12-22T23:59:59.000Z

410

Optimization Online - A regularized limited-memory BFGS method ...  

E-Print Network [OSTI]

Aug 4, 2014 ... Abstract: The limited-memory BFGS (L-BFGS) algorithm is a popular method of solving large-scale unconstrained minimization problems.

Shinji Sugimoto

2014-08-04T23:59:59.000Z

411

Bayesian Semiparametric Density Deconvolution and Regression in the Presence of Measurement Errors  

E-Print Network [OSTI]

Although the literature on measurement error problems is quite extensive, solutions to even the most fundamental measurement error problems like density deconvolution and regression with errors-in-covariates are available only under numerous...

Sarkar, Abhra

2014-06-24T23:59:59.000Z

412

Estimation of the error for small-sample optimal binary filter design using prior knowledge  

E-Print Network [OSTI]

Optimal binary filters estimate an unobserved ideal quantity from observed quantities. Optimality is with respect to some error criterion, which is usually mean absolute error MAE (or equivalently mean square error) for the binary values. Both...

Sabbagh, David L

1999-01-01T23:59:59.000Z

413

Computational Thermodynamics of CoNiGa High Temperature Shape Memory Alloys  

E-Print Network [OSTI]

Shape Memory Alloys (SMAs) are advanced materials with interesting properties such as pseudoelasticity (PE) and the shape memory effect (SME). Recently, the CoNiGa system has emerged as the basis for very promising High Temperature Shape Memory...

Chari, Arpita

2012-10-19T23:59:59.000Z

414

Memory, brain and aging: The good, the bad and the promising  

E-Print Network [OSTI]

temporal region — endur- ing memory impairment following aE. 1994. What are the memory systems of 1994? In: SchacterDL, Tulving E (eds. ). Memory Systems 1994. Cambridge, MA:

Ober, Beth A.

2010-01-01T23:59:59.000Z

415

Prospective memory impairment in early breast cancer survivors: Finally homing in on the real deficit?  

Science Journals Connector (OSTI)

...2012; San Antonio, TX Prospective memory impairment in early breast cancer survivors...early breast cancer (EBC) treatment on memory functioning. One limitation of existing...may not be sensitive enough to detect memory problems as encountered in daily life...

S Verma; B Collins; X Song; M Bedard; L Paquet

2012-12-17T23:59:59.000Z

416

Memory in Microbes: Quantifying History-Dependent Behavior in a Bacterium  

E-Print Network [OSTI]

4. Casadesus J, D'Ari R (2002) Memory in bacteria and phage.2004) Switches, cross?talk and memory in Escherichia coli2007) Rational design of memory in eukaryotic cells. Genes

Wolf, Denise M.

2009-01-01T23:59:59.000Z

417

Memory in microbes: quantifying history-Dependent behavior in a bacterium.  

E-Print Network [OSTI]

4. Casadesus J, D'Ari R (2002) Memory in bacteria and phage.2004) Switches, cross-talk and memory in Escherichia coli2007) Rational design of memory in eukaryotic cells. Genes

Wolf, Denise M.

2010-01-01T23:59:59.000Z

418

Memory-like CD8? T cells generated during homeostatic proliferation defer to antigen-experienced memory cells.  

E-Print Network [OSTI]

??Naïve T cells proliferate in response to lymphopenia and acquire the phenotypic and functional qualities of memory T cells, providing enhanced protection against infection. How… (more)

Cheung, Kitty Pui Hang

2009-01-01T23:59:59.000Z

419

Hippocampal damage impairs recognition memory broadly, affecting both parameters in two prominent models of memory  

Science Journals Connector (OSTI)

...Psychology and Neuroscience Center, Brigham Young University, Provo, UT 84143; anddPulmonary...resulted from hypoxia secondary to heroin abuse. Yonelinas et al. (18, p. 395) wrote that...memory for travel scenes taken from the Internet, the DPSD model performed better (27...

Adam J. O. Dede; John T. Wixted; Ramona O. Hopkins; Larry R. Squire

2013-01-01T23:59:59.000Z

420

Effects of Constrained Aging on the Shape Memory Response of Nickel Rich Niti Shape Memory Alloys  

E-Print Network [OSTI]

Ni50.6Ti49.4 single and Ni52Ti48 polycrystalline shape memory alloy samples were subjected to aging under a uniaxial stress, to form a single Ni4Ti3 precipitate variant and to investigate the effects of single versus multi-variant coherent...

Barrie, Fatmata Haja

2011-02-22T23:59:59.000Z

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

E-Print Network 3.0 - automatic global error Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DesignRule Checking John Ousterhout Summary: ; when the violation is corrected, the error paint will go away automatically. Error paint is written... a layout with Magic, the...

422

T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

719:Apache modproxyajp HTTP Processing Error Lets Remote Users Deny Service T-719:Apache modproxyajp HTTP Processing Error Lets Remote Users Deny Service September 16, 2011 -...

423

Oil Price Trackers Inspired by Immune Memory  

E-Print Network [OSTI]

We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

Wilson, WIlliam; Aickelin, Uwe

2010-01-01T23:59:59.000Z

424

U-054: Security Advisory for Adobe Reader and Acrobat | Department of  

Broader source: Energy.gov (indexed) [DOE]

54: Security Advisory for Adobe Reader and Acrobat 54: Security Advisory for Adobe Reader and Acrobat U-054: Security Advisory for Adobe Reader and Acrobat December 7, 2011 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader U3D Memory Corruption Error Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.6 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.6 and earlier 9.x versions for Windows and Macintosh ABSTRACT: This U3D memory corruption vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that the vulnerability is being actively

425

E-Print Network 3.0 - access memory cell Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and 2) that the difference between naive and memory... of naive and memory T ... Source: Utrecht, Universiteit - Departement Biologie, Theoretical BiologyBioinformatics Group...

426

Memory management in a large project developed in C/C++.  

E-Print Network [OSTI]

?? This thesis has been a study in memory management in C/C++, with practical work in finding and solving memory leaks in a large project.… (more)

Suopanki, Peter

2012-01-01T23:59:59.000Z

427

E-Print Network 3.0 - anterograde associative memory Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

associative memory Search Powered by Explorit Topic List Advanced Search Sample search results for: anterograde associative memory Page: << < 1 2 3 4 5 > >> 1 Reduction in Learning...

428

E-Print Network 3.0 - auditory memory induced Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

memory induced Search Powered by Explorit Topic List Advanced Search Sample search results for: auditory memory induced Page: << < 1 2 3 4 5 > >> 1 PERSPECTIVES timely to consider...

429

E-Print Network 3.0 - aversive memory recall Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

memory recall Search Powered by Explorit Topic List Advanced Search Sample search results for: aversive memory recall Page: << < 1 2 3 4 5 > >> 1 Behavioural Brain Research 125...

430

E-Print Network 3.0 - alters memory anxiety Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

memory anxiety Search Powered by Explorit Topic List Advanced Search Sample search results for: alters memory anxiety Page: << < 1 2 3 4 5 > >> 1 Neurobiology of...

431

The minimum variance of the squared error adaptive algorithm  

E-Print Network [OSTI]

of the coefficient error l 0&@, & k(2k ? 1) E[n ']T~? (2. 18) where p ? = =maximal eigenvalue of R. In practice, finding p, maybe difficult; however, the maximal eigenvalue of a positive definite matrix can be above bounded by its trace and in this case, tr... large and thus, p is very small. Without these assumptions, some of the analysis breaks down; that is why the "low noise" case is tr?ated separately. Also, it is possible to observe differences in the mean squared error and the variance of the squared...

Gray, Steven Deward

2012-06-07T23:59:59.000Z

432

Fitting Pulsar Wind Tori. II. Error Analysis and Applications  

E-Print Network [OSTI]

We have applied the torus fitting procedure described in Ng & Romani (2004) to PWNe observations in the Chandra data archive. This study provides quantitative measurement of the PWN geometry and we characterize the uncertainties in the fits, with statistical errors coming from the fit uncertainties and systematic errors estimated by varying the assumed fitting model. The symmetry axis $\\Psi$ of the PWN are generally well determined, and highly model-independent. We often derive a robust value for the spin inclination $\\zeta$. We briefly discuss the utility of these results in comparison with new radio and high energy pulse measurements

Ng, C -Y

2007-01-01T23:59:59.000Z

433

Current Concepts: Disclosing Harmful Medical Errors to Patients  

Science Journals Connector (OSTI)

...organizations, and legislators in the United States and other countries are moving to bridge the gap by developing standards, programs, and laws that encourage transparent communication with patients after harmful errors have been made. In the United States, the National Quality Forum (NQF), an organization... Historically, fear of malpractice litigation made clinicians cautious about informing patients when they made mistakes in their care. This article reviews recent efforts by regulators, hospitals, accreditation organizations, and legislators to encourage and facilitate discussions between health care providers and patients when patients are harmed by medical errors.

Gallagher T.H.Studdert D.Levinson W.

2007-06-28T23:59:59.000Z

434

Improved energy confinement in spheromaks with reduced field errors  

Science Journals Connector (OSTI)

An increase in the global energy confinement time (?E) was obtained in the CTX spheromak by replacing the high-field-error mesh-wall flux conserver with a low-field-error solid-wall flux conserver. The maximum ?E is now 0.18 ms, an order of magnitude greater than previously reported values of ?0.017 ms. Both ?E and the magnetic energy decay time (?W) now increase with central electron temperature, which was not previously observed. These new results are consistent with a previously proposed energy-loss mechanism associated with high edge helicity dissipation.

F. J. Wysocki; J. C. Fernández; I. Henins; T. R. Jarboe; G. J. Marklin

1990-07-02T23:59:59.000Z

435

Error estimates and specification parameters for functional renormalization  

SciTech Connect (OSTI)

We present a strategy for estimating the error of truncated functional flow equations. While the basic functional renormalization group equation is exact, approximated solutions by means of truncations do not only depend on the choice of the retained information, but also on the precise definition of the truncation. Therefore, results depend on specification parameters that can be used to quantify the error of a given truncation. We demonstrate this for the BCS–BEC crossover in ultracold atoms. Within a simple truncation the precise definition of the frequency dependence of the truncated propagator affects the results, indicating a shortcoming of the choice of a frequency independent cutoff function.

Schnoerr, David [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany)] [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany); Boettcher, Igor, E-mail: I.Boettcher@thphys.uni-heidelberg.de [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany)] [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany); Pawlowski, Jan M. [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany) [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany); ExtreMe Matter Institute EMMI, GSI Helmholtzzentrum für Schwerionenforschung mbH, D-64291 Darmstadt (Germany); Wetterich, Christof [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany)] [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany)

2013-07-15T23:59:59.000Z

436

Analysis of transmission errors in pyramid vector quantizer  

E-Print Network [OSTI]

codes of length RL for transmission over a. binary symmetric channel. The natural binary code (NBC), the Gray code (GC) and the folded binary code (FBC) will be used to study the effect of channel noise in this thesis. The bit error probability p... binary code (FBC) leads to smaller channel error variance than say the natural binary code (NBC) or the Gray code (GC) [15, 17]. This is illustrated in Figure 4 for the scalar quantization of a source at a, rate of 3 bits per symbol. Notice that one...

Ifesinachukwu, Gozie Kenneth

2012-06-07T23:59:59.000Z

437

Fitting Pulsar Wind Tori. II. Error Analysis and Applications  

E-Print Network [OSTI]

We have applied the torus fitting procedure described in Ng & Romani (2004) to PWNe observations in the Chandra data archive. This study provides quantitative measurement of the PWN geometry and we characterize the uncertainties in the fits, with statistical errors coming from the fit uncertainties and systematic errors estimated by varying the assumed fitting model. The symmetry axis $\\Psi$ of the PWN are generally well determined, and highly model-independent. We often derive a robust value for the spin inclination $\\zeta$. We briefly discuss the utility of these results in comparison with new radio and high energy pulse measurements

C. -Y. Ng; Roger W. Romani

2007-10-23T23:59:59.000Z

438

Flash Memory Garbage Collection in Hard Real-Time Systems  

E-Print Network [OSTI]

-date behavior and time consuming garbage collection mechanism, NAND-based flash memory is difficult to integrate into hard-real-time embedded systems. In this thesis, I propose a performance model for flash memory garbage collection that can be used...

Lai, Chien-An

2012-10-19T23:59:59.000Z

439

ESSES 2003 2003, Carla Schlatter Ellis Power-Aware Memory  

E-Print Network [OSTI]

1 ESSES 2003© 2003, Carla Schlatter Ellis Power-Aware Memory Management 2ESSES 2003© 2003, Carla management · OS page allocation policies · Experimental results · Future work, open questions #12;2 3ESSES Allocation [ASPLOS00] ESSES 2003© 2003, Carla Schlatter Ellis Memory System Power Consumption · Laptop

Ellis, Carla

440

Dynamic Loading of Polycrystalline Shape Memory Alloy Rods  

E-Print Network [OSTI]

Memory Alloys are a class of materials that change their internal struc- ture due to changes austenite phase (A). At low temperatures the material exists in a low symmetry martensite phase (M with the specific way the phase transition occurs (Funakubo, 1987). The shape memory effect allows material which

Popov, Peter

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Stream and Memory Hierarchy Design for Multi-Purpose Accelerators  

E-Print Network [OSTI]

Stream and Memory Hierarchy Design for Multi-Purpose Accelerators Sylvain Girbal, Sami Yehia Hugues-purpose loop-based generated accelerators have emerged as an especially attractive accelerator option, with multiple streams, the memory behavior of such accelerators can become at least as complex

Boyer, Edmond

442

Data Representation for Efficient and Reliable Storage in Flash Memories  

E-Print Network [OSTI]

schemes are designed for already deployed low-power devices that use on-chip ash memory. Moreover, while devices at the scale of sensor nodes might switch to block-grained, large o -chip ash memory, RFID-scale platforms might not bene t from...

Wang, Yue

2013-05-02T23:59:59.000Z

443

Ubiquitous Memory Introspection Qin Zhao1,2  

E-Print Network [OSTI]

Center 4 Massachusetts Institute of Technology Abstract Modern memory systems play a critical role of a low cost, online, and accurate methodology for deriving fine- grained memory behavior profiles can delinquent load instruc- tions with an 88% rate of accuracy for applications with a relatively high number

Wong, Weng Fai

444

A novel memory management scheme for residential gateways  

Science Journals Connector (OSTI)

Home gateways must manage services despite limited memory resources. In home gateway models (e.g., OSGi), services are implemented as software bundles (or plug-ins) that can be downloaded from the Internet and executed in the gateway. Services, in gateways, ... Keywords: Memory management, Pervasive computing, Smart homes

Ibrahim Kamel; Beizhong Chen

2009-11-01T23:59:59.000Z

445

Parallel memory prediction for fused linear algebra kernels  

Science Journals Connector (OSTI)

The performance of many scientific programs is limited by data movement. Loop fusion is one optimization used to increase the speed of memory bound operations. To automate loop fusion for matrix computations, we developed the Build to Order (BTO) compiler. ... Keywords: auto-tuning, memory modeling, parallel processing

Ian Karlin; Elizabeth Jessup; Geoffrey Belter; Jeremy G. Siek

2011-03-01T23:59:59.000Z

446

Memories of Seaborg shared in celebration of his life  

Science Journals Connector (OSTI)

Memories of Seaborg shared in celebration of his life ... A memorial session honoring the life of Glenn T. Seaborg attracted hundreds of the late chemist's colleagues, students, and admirers at the American Chemical Society national meeting last week. ... "Glenn stuck his neck out and had me work on some of the early stages of the Manhattan Project This ... ...

LINDA RABER

1999-03-29T23:59:59.000Z

447

Optimizing Potential Information Transfer with Self-referential Memory  

E-Print Network [OSTI]

-theoretic design principle, intended to support an evolution of a memory structure fitting a specific selection computation; dis- tributed storage and transmission: e.g., neural networks and associative memory; search principles, underlying many recent developments. This is unsatisfactory not only from a methodological

Polani, Daniel

448

Rosebud: A Place for Interaction between Memory, Story, and Self  

E-Print Network [OSTI]

as part of the human­computer interaction. Ullmer & Ishii [55] make a comparison between levels of stories, memories, and identity. We describe the cognitive, social, and psychological aspects of one, identity, stuffed animals, tangible interfaces, memory, children, education. Scenario Susan, an eight year

Nehaniv, Chrystopher

449

Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses  

E-Print Network [OSTI]

Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses Bertrand Le pipelined memory access controllers can be generated improving the pipeline access mode to RAM. We focus as unpredictable ones (dynamic address computations) in a pipeline way. 1 Introduction Actual researches

Paris-Sud XI, Université de

450

Spatial working memory in rats: no differences between the sexes  

Science Journals Connector (OSTI)

...November 1999 research-article Spatial working memory in rats: no differences between the sexes Susan D Healy 1 2...spatial learning and memory abilities of male and female rats. The rats were tested across a number of consecutive days during...

1999-01-01T23:59:59.000Z

451

Asymptotic dynamics of inertial particles with memory  

E-Print Network [OSTI]

Recent experimental and numerical observations have shown the significance of the Basset--Boussinesq memory term on the dynamics of small spherical rigid particles (or inertial particles) suspended in an ambient fluid flow. These observations suggest an algebraic decay to an asymptotic state, as opposed to the exponential convergence in the absence of the memory term. Here, we prove that the observed algebraic decay is a universal property of the Maxey--Riley equation. Specifically, the particle velocity decays algebraically in time to a limit that is $\\mathcal O(\\epsilon)$-close to the fluid velocity, where $0<\\epsilon\\ll 1$ is proportional to the square of the ratio of the particle radius to the fluid characteristic length-scale. These results follows from a sharp analytic upper bound that we derive for the particle velocity. For completeness, we also present a first proof of existence and uniqueness of global solutions to the Maxey--Riley equation, a nonlinear system of fractional-order differential equations.

Gabriel Provencher Langlois; Mohammad Farazmand; George Haller

2014-09-02T23:59:59.000Z

452

Asymptotic dynamics of inertial particles with memory  

E-Print Network [OSTI]

Recent experimental and numerical observations have shown the significance of the Basset--Boussinesq memory term on the dynamics of small spherical rigid particles (or inertial particles) suspended in an ambient fluid flow. These observations suggest an algebraic decay to an asymptotic state, as opposed to the exponential convergence in the absence of the memory term. Here, we prove that the observed algebraic decay is a universal property of the Maxey--Riley equation. Specifically, the particle velocity decays algebraically in time to a limit that is $\\mathcal O(\\epsilon)$-close to the fluid velocity, where $0<\\epsilon\\ll 1$ is proportional to the square of the ratio of the particle radius to the fluid characteristic length-scale. These results follows from a sharp analytic upper bound that we derive for the particle velocity. For completeness, we also present a first proof of existence and uniqueness of global solutions to the Maxey--Riley equation, a nonlinear system of fractional-order differential equ...

Langlois, Gabriel Provencher; Haller, George

2014-01-01T23:59:59.000Z

453

Memory Imperfections in Atomic Ensemble-based Quantum Repeaters  

E-Print Network [OSTI]

Quantum repeaters promise to deliver long-distance entanglement overcoming noise and loss in realistic quantum channels. A promising class of repeaters, based on atomic ensemble quantum memories and linear optics, follow the proposal by Duan et al [Nature 414, 413, 2001]. Here we analyse this protocol in terms of a very general model for the quantum memories employed. We derive analytical expressions for scaling of entanglement with memory imperfections, dark counts, loss and distance, and apply our results to two specific quantum memory protocols. Our methods apply to any quantum memory with an interaction Hamiltonian at most quadratic in the mode operators and are in principle extendible to more recent modifications of the original DLCZ proposal.

Jonatan Bohr Brask; Anders Sondberg Sorensen

2008-03-14T23:59:59.000Z

454

Quantum error correction with degenerate codes for correlated noise  

SciTech Connect (OSTI)

We introduce a quantum packing bound on the minimal resources required by nondegenerate error-correction codes for any kind of noise. We prove that degenerate codes can outperform nondegenerate ones in the presence of correlated noise, by exhibiting examples where the quantum packing bound is violated.

Chiribella, Giulio [Perimeter Institute for Theoretical Physics, 31 Caroline St. North, Waterloo, Ontario N2L 2Y5 (Canada); Dall'Arno, Michele; D'Ariano, Giacomo Mauro; Macchiavello, Chiara; Perinotti, Paolo [Quit group, Dipartimento di Fisica 'A. Volta', via Bassi 6, I-27100 Pavia (Italy); INFN Sezione di Pavia, via Bassi 6, I-27100 Pavia (Italy)

2011-05-15T23:59:59.000Z

455

Quantum Error Correction of Continuous Variable States against Gaussian Noise  

E-Print Network [OSTI]

We describe a continuous variable error correction protocol that can correct the Gaussian noise induced by linear loss on Gaussian states. The protocol can be implemented using linear optics and photon counting. We explore the theoretical bounds of the protocol as well as the expected performance given current knowledge and technology.

T. C. Ralph

2011-05-22T23:59:59.000Z

456

MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS  

E-Print Network [OSTI]

MULTI­TARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS RALF HARTMANN # Abstract. Important quantities in aerodynamic flow simulations are the aerodynamic force coe subject classifications. 65N12,65N15,65N30 1. Introduction. In aerodynamic computations like compressible

Hartmann, Ralf

457

Error estimation and adaptive mesh refinement for aerodynamic flows  

E-Print Network [OSTI]

Error estimation and adaptive mesh refinement for aerodynamic flows Ralf Hartmann, Joachim Held-oriented mesh refinement for single and multiple aerodynamic force coefficients as well as residual-based mesh refinement applied to various three-dimensional lam- inar and turbulent aerodynamic test cases defined

Hartmann, Ralf

458

MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS  

E-Print Network [OSTI]

MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS RALF HARTMANN Abstract. Important quantities in aerodynamic flow simulations are the aerodynamic force coefficients including Navier-Stokes equations AMS subject classifications. 65N12,65N15,65N30 1. Introduction. In aerodynamic

Hartmann, Ralf

459

Analysis of possible systematic errors in the Oslo method  

SciTech Connect (OSTI)

In this work, we have reviewed the Oslo method, which enables the simultaneous extraction of the level density and {gamma}-ray transmission coefficient from a set of particle-{gamma} coincidence data. Possible errors and uncertainties have been investigated. Typical data sets from various mass regions as well as simulated data have been tested against the assumptions behind the data analysis.

Larsen, A. C.; Guttormsen, M.; Buerger, A.; Goergen, A.; Nyhus, H. T.; Rekstad, J.; Siem, S.; Toft, H. K.; Tveten, G. M.; Wikan, K. [Department of Physics, University of Oslo, N-0316 Oslo (Norway); Krticka, M. [Institute of Particle and Nuclear Physics, Charles University, Prague (Czech Republic); Betak, E. [Institute of Physics SAS, 84511 Bratislava (Slovakia); Faculty of Philosophy and Science, Silesian University, 74601 Opava (Czech Republic); Schiller, A.; Voinov, A. V. [Department of Physics and Astronomy, Ohio University, Athens, Ohio 45701 (United States)

2011-03-15T23:59:59.000Z

460

Maximum Norm Error Estimators For Three Dimensional Elliptic Problems  

E-Print Network [OSTI]

Bariloche, CNEA, 8400 Bariloche, Rio Negro, Argentina. y Departamento de Matem#19;atica, Facultad de Ciencias Exactas, Universidad de Buenos Aires, 1428 Buenos Aires, Argentina. 1 #12; behaviour of the Green, error estimators for the energy norm for this method were introduced and analyzed in [7, 8, 13, 16]. Our

Duran, Ricardo

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Stateful Testing: Finding More Errors in Code and Contracts  

E-Print Network [OSTI]

. The generated test cases are designed to violate the dynamically inferred contracts (invariants) characterizing the existing test suite. As a consequence, they are in a good position to detect new faults, and alsoStateful Testing: Finding More Errors in Code and Contracts Yi Wei · Hannes Roth · Carlo A. Furia

Meyer, Bertrand

462

Expressive Power and Approximation Errors of Restricted Boltzmann Machines  

E-Print Network [OSTI]

#12;Expressive Power and Approximation Errors of Restricted Boltzmann Machines Guido F. Montufar1 Boltzmann Machines (RBMs) depending on the number of units that they contain, and which are representative Machine (RBM) [23, 10] is a learning system con- sisting of two layers of binary stochastic units

463

Deformable Organisms and Error Learning for Brain Segmentation  

E-Print Network [OSTI]

Deformable Organisms and Error Learning for Brain Segmentation Gautam Prasad1,2 , Anand A. Joshi3 be easily incorporated into the plan. We validate this framework by creating a plan to locate the brain in 3D magnetic resonance images of the head (skull-stripping). This is important for surgical planning

Boyer, Edmond

464

Sensitivity of OFDM Systems to Synchronization Errors and Spatial Diversity  

E-Print Network [OSTI]

Single Input Single Output SNR Signal-to-Noise Ratio STBC Space-Time Block Codes STTC Space-Time Trellis Codes SVD Singular Value Decomposition UWB Ultra Wideband WSSUS Wide Sense Stationary Uncorrelated Scattering ZP Zero Padding ix TABLE... . . . . . . . . . . . . . . . . . . . . . . . . 13 A. Sensitivity of Multi-Band ZP-OFDM Ultra Wideband Receivers to Synchronization Errors . . . . . . . . . . . . . 13 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 13 2. System Model . . . . . . . . . . . . . . . . . . . . . . 16...

Zhou, Yi

2012-02-14T23:59:59.000Z

465

The contour method cutting assumption: error minimization and correction  

SciTech Connect (OSTI)

The recently developed contour method can measure 2-D, cross-sectional residual-stress map. A part is cut in two using a precise and low-stress cutting technique such as electric discharge machining. The contours of the new surfaces created by the cut, which will not be flat if residual stresses are relaxed by the cutting, are then measured and used to calculate the original residual stresses. The precise nature of the assumption about the cut is presented theoretically and is evaluated experimentally. Simply assuming a flat cut is overly restrictive and misleading. The critical assumption is that the width of the cut, when measured in the original, undeformed configuration of the body is constant. Stresses at the cut tip during cutting cause the material to deform, which causes errors. The effect of such cutting errors on the measured stresses is presented. The important parameters are quantified. Experimental procedures for minimizing these errors are presented. An iterative finite element procedure to correct for the errors is also presented. The correction procedure is demonstrated on experimental data from a steel beam that was plastically bent to put in a known profile of residual stresses.

Prime, Michael B [Los Alamos National Laboratory; Kastengren, Alan L [ANL

2010-01-01T23:59:59.000Z

466

Deterministic transmission of an arbitrary single-photon polarization state through bit-flip error channel  

Science Journals Connector (OSTI)

We present two error-tolerance transmission protocols of a single-photon polarization state when bit-flip error is taken into account. For achieving the transmission target of the single-photon state, the first protocol needs to encode it to a nonmaximally ... Keywords: Bit-flip error channel, Error-tolerance transmission, Parity analysis

Li Dong, Jun-Xi Wang, Hong-Zhi Shen, Dan Li, Xiao-Ming Xiu, Ya-Jun Gao, X. X. Yi

2014-06-01T23:59:59.000Z

467

PROPANE: an environment for examining the propagation of errors in software  

Science Journals Connector (OSTI)

In order to produce reliable software, it is important to have knowledge on how faults and errors may affect the software. In particular, designing efficient error detection mechanisms requires not only knowledge on which types of errors to detect but ... Keywords: error propagation analysis, fault injection, software development tools, software reliability

Martin Hiller; Arshad Jhumka; Neeraj Suri

2002-07-01T23:59:59.000Z

468

Determining Error Bounds for Hypothesis Tests in Risk Assessment: A Research Agenda  

E-Print Network [OSTI]

utilities) for the consequences of these errors, default error bounds are typically used. However, while for the error bounds on a case-by-case basis. This would make explicit the anticipated consequences of errors Introduction: The Problem Statistical inference is not deductively valid: the truth of a statement made about

Parsons, Simon

469

PERI Auto-tuning Memory Intensive Kernels  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PERI PERI - Auto-tuning Memory Intensive Kernels for Multicore Samuel Williams † , Kaushik Datta † , Jonathan Carter , Leonid Oliker † , John Shalf , Katherine Yelick † , David Bailey CRD/NERSC, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA † Computer Science Division, University of California at Berkeley, Berkeley, CA 94720, USA E-mail: SWWilliams@lbl.gov, kdatta@eecs.berkeley.edu, JTCarter@lbl.gov, LOliker@lbl.gov, JShalf@lbl.gov, KAYelick@lbl.gov, DHBailey@lbl.gov Abstract. We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of search-based performance optimizations, popular in linear algebra and FFT libraries, to application-specific computational kernels. Our work applies this strategy to Sparse Matrix Vector Multiplication

470

Release mechanism utilizing shape memory polymer material  

DOE Patents [OSTI]

Microfabricated therapeutic actuators are fabricated using a shape memory polymer (SMP), a polyurethane-based material that undergoes a phase transformation at a specified temperature (Tg). At a temperature above temperature Tg material is soft and can be easily reshaped into another configuration. As the temperature is lowered below temperature Tg the new shape is fixed and locked in as long as the material stays below temperature Tg. Upon reheating the material to a temperature above Tg, the material will return to its original shape. By the use of such SMP material, SMP microtubing can be used as a release actuator for the delivery of embolic coils through catheters into aneurysms, for example. The microtubing can be manufactured in various sizes and the phase change temperature Tg is determinate for an intended temperature target and intended use.

Lee, Abraham P. (Walnut Creek, CA); Northrup, M. Allen (Berkeley, CA); Ciarlo, Dino R. (Livermore, CA); Krulevitch, Peter A. (Pleasanton, CA); Benett, William J. (Livermore, CA)

2000-01-01T23:59:59.000Z

471

Direct memory access transfer completion notification  

DOE Patents [OSTI]

Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

2010-07-27T23:59:59.000Z

472

Remote direct memory access over datagrams  

DOE Patents [OSTI]

A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

2014-12-02T23:59:59.000Z

473

A New Approach to Equations with Memory  

E-Print Network [OSTI]

In this work, we present a novel approach to the mathematical analysis of equations with memory based on the notion of a state, namely, the initial configuration of the system which can be unambiguously determined by the knowledge of the future dynamics. As a model, we discuss the abstract version of an equation arising from linear viscoelasticity. It is worth mentioning that our approach goes back to the heuristic derivation of the state framework, devised by L.Deseri, M.Fabrizio and M.J.Golden in "The concept of minimal state in viscoelasticity: new free energies and applications to PDEs", Arch. Ration. Mech. Anal., vol. 181 (2006) pp.43-96. Starting from their physical motivations, we develop a suitable functional formulation which, as far as we know, is completely new.

M. Fabrizio; C. Giorgi; V. Pata

2009-01-26T23:59:59.000Z

474

Memory of Initial Conditions in Gravitational Clustering  

E-Print Network [OSTI]

We study the nonlinear propagator, a key ingredient in renormalized perturbation theory (RPT) that allows a well-controlled extension of perturbation theory into the nonlinear regime. We show that it can be thought as measuring the memory of density and velocity fields to their initial conditions. This provides a clean definition of the validity of linear theory, which is shown to be much more restricted than usually recognized in the literature. We calculate the nonlinear propagator in RPT and compare to measurements in numerical simulations, showing remarkable agreement well into the nonlinear regime. We also show that N-body simulations require a rather large volume to recover the correct propagator, due to the missing large-scale modes. Our results for the nonlinear propagator provide an essential element to compute the nonlinear power spectrum in RPT.

M. Crocce; R. Scoccimarro

2005-09-15T23:59:59.000Z

475

Quantifying Contention and Balancing Memory Load on Hardware DSM Multiprocessors1  

E-Print Network [OSTI]

Quantifying Contention and Balancing Memory Load on Hardware DSM Multiprocessors1 Dimitrios S a new methodology for quantifying remote memory access contention on hardware DSM multiprocessors node of the DSM to each page in memory. A trace of the memory accesses of the program obtained

Nikolopoulos, Dimitris

476

Quantifying and Resolving Remote Memory Access Contention on Hardware DSM Multiprocessors  

E-Print Network [OSTI]

Quantifying and Resolving Remote Memory Access Contention on Hardware DSM Multiprocessors Dimitrios contributions: It pro- poses a new methodology for quantifying remote memory access contention on hardware DSM each DSM node to each page in memory. A trace of the memory accesses of the pro- gram obtained

Nikolopoulos, Dimitris

477

files between "helped" and "unhelped" memory CD8 T cells to better understand  

E-Print Network [OSTI]

265 files between "helped" and "unhelped" memory CD8 T cells to better understand how memory CD8 the presence of CD4 help during "unhelped" memory CD8 T cell recall responses could not rem- edy their proliferative defects; and vice versa, the lack of CD4 help during "helped" memory CD8 T cell recall re- sponses

478

Composition–Structure–Function Diagrams of Ti–Ni–Au Thin Film Shape Memory Alloys  

Science Journals Connector (OSTI)

thin films; annealing; high temperature shape memory alloys; combinatorial materials science; phase transformation ...

Pio John S. Buenconsejo; Alfred Ludwig

2014-11-04T23:59:59.000Z

479

E-Print Network 3.0 - associative memory model Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

model Search Powered by Explorit Topic List Advanced Search Sample search results for: associative memory model...

480

E-Print Network 3.0 - associative memory models Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

models Search Powered by Explorit Topic List Advanced Search Sample search results for: associative memory models...

Note: This page contains sample records for the topic "memory corruption error" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Memory Dependence Prediction using Store Sets George Z. Chrysos and Joel S. Emer  

E-Print Network [OSTI]

Memory Dependence Prediction using Store Sets George Z. Chrysos and Joel S. Emer Digital Equipment-of-order processor must issue load instructions as early as possible, while avoiding memory-order violations with prior store in- structions that write to the same memory location. One approach is to use memory

Lee, Ruby B.

482

A Memory Aware High Level Synthesis Tool Gwenol Corre, Eric Senn, Nathalie Julien and Eric Martin  

E-Print Network [OSTI]

A Memory Aware High Level Synthesis Tool Gwenolé Corre, Eric Senn, Nathalie Julien and Eric Martin.corre@univ-ubs.fr Abstract We introduce a new approach to take into account the memory architecture and the memory mapping in High- Level Synthesis for data intensive applications. We formalize the memory mapping as a set

Paris-Sud XI, Université de

483

Memory Accesses Management During High Level Gwenole Corre, Eric Senn, Pierre Bomel, Nathalie Julien, Eric Martin  

E-Print Network [OSTI]

Memory Accesses Management During High Level Synthesis Gwenol´e Corre, Eric Senn, Pierre Bomel architecture and the memory mapping in behavioral synthesis. We formalize the memory mapping as a set of constraints for the synthesis, and defined a Memory Con- straint Graph and an accessibility criterion

Paris-Sud XI, Université de

484

A Memory Aware Behavioral Synthesis Tool for Real-Time VLSI Circuits  

E-Print Network [OSTI]

A Memory Aware Behavioral Synthesis Tool for Real-Time VLSI Circuits Gwenol´e Corre, Eric Senn the mem- ory architecture and the memory mapping in the Behav- ioral Synthesis of Real-Time VLSI circuits. We formalize the memory mapping as a set of constraints for the syn- thesis, and defined a Memory

Paris-Sud XI, Université de

485

MODA A Framework for Memory Centric Performance Characterization  

SciTech Connect (OSTI)

In the age of massive parallelism, the focus of performance analysis has switched from the processor and related structures to the memory and I/O resources. Adapting to this new reality, a performance analysis tool has to provide a way to analyze resource usage to pinpoint existing and potential problems in a given application. This paper provides an overview of the Memory Observant Data Analysis (MODA) tool, a memory-centric tool first implemented on the Cray XMT supercomputer. Throughout the paper, MODA's capabilities have been showcased with experiments done on matrix multiply and Graph-500 application codes.

Shrestha, Sunil; Su, Chun-Yi; White, Amanda M.; Manzano Franco, Joseph B.; Marquez, Andres; Feo, John T.

2012-06-29T23:59:59.000Z

486

A stacked memory device on logic 3D technology for ultra-high-density data storage  

Science Journals Connector (OSTI)

We have demonstrated, for the first time, a novel three-dimensional (3D) memory chip architecture of stacked-memory-devices-on-logic (SMOL) achieving up to 95% of cell-area efficiency by directly building up memory devices on top of front-end CMOS devices. In order to realize the SMOL, a unique 3D Flash memory device and vertical integration structure have been successfully developed. The SMOL architecture has great potential to achieve tera-bit level memory density by stacking memory devices vertically and maximizing cell-area efficiency. Furthermore, various emerging devices could replace the 3D memory device to develop new 3D chip architectures.

Jiyoung Kim; Augustin J Hong; Sung Min Kim; Kyeong-Sik Shin; Emil B Song; Yongha Hwang; Faxian Xiu; Kosmas Galatsis; Chi On Chui; Rob N Candler; Siyoung Choi; Joo-Tae Moon; Kang L Wang

2011-01-01T23:59:59.000Z

487

An examination of content similarity within the memory of HPC applications.  

SciTech Connect (OSTI)

Memory content similarity has been e ectively exploited for more than a decade to reduce memory consumption. By consolidating duplicate and similar pages in the address space of an application, we can reduce the amount of memory it consumes without negatively a ecting the application's perception of the memory resources available to it. In addition to memory de-duplication, there may be many other ways that we can exploit memory content similarity to improve system characteristics. In this paper, we examine the memory content similarity of several HPC applications. By characterizing the memory contents of these applications, we hope to provide a basis for ef- forts to e ectively exploit memory content similarity to improve system performance beyond memory deduplication. We show that several applications exhibit signi cant similarity and consider the source of the similarity.

Levy, Scott N. [University of New Mexico; Bridges, Patrick G. [University of New Mexico; Ferreira, Kurt Brian; Thompson, Aidan Patrick; Trott, Christian Robert

2013-01-01T23:59:59.000Z

488

Method and system for reducing errors in vehicle weighing systems  

DOE Patents [OSTI]

A method and system (10, 23) for determining vehicle weight to a precision of <0.1%, uses a plurality of weight sensing elements (23), a computer (10) for reading in weighing data for a vehicle (25) and produces a dataset representing the total weight of a vehicle via programming (40-53) that is executable by the computer (10) for (a) providing a plurality of mode parameters that characterize each oscillatory mode in the data due to movement of the vehicle during weighing, (b) by determining the oscillatory mode at which there is a minimum error in the weighing data; (c) processing the weighing data to remove that dynamical oscillation from the weighing data; and (d) repeating steps (a)-(c) until the error in the set of weighing data is <0.1% in the vehicle weight.

Hively, Lee M. (Philadelphia, TN); Abercrombie, Robert K. (Knoxville, TN)

2010-08-24T23:59:59.000Z

489

Magnetic error analysis of recycler pbar injection transfer line  

SciTech Connect (OSTI)

Detailed study of Fermilab Recycler Ring anti-proton injection line became feasible with its BPM system upgrade, though the beamline has been in existence and operational since year 2000. Previous attempts were not fruitful due to limitations in the BPM system. Among the objectives are the assessment of beamline optics and the presence of error fields. In particular the field region of the permanent Lambertson magnets at both ends of R22 transfer line will be scrutinized.

Yang, M.J.; /Fermilab

2007-06-01T23:59:59.000Z

490

Systematic intensity errors caused by spectral truncation: origin and remedy  

Science Journals Connector (OSTI)

X-ray absorption by the monochromator determines the wavelength dispersion in the monochromated X-ray beam and explains the values of 0.03, 0.14 and 0.16 for graphite(002)-monochromated Cu, Mo and Rh radiation. To eliminate the systematic intensity truncation errors, caused by the large wavelength dispersion, a correction is proposed based on the applied scan angle and the real beam spectrum.

Lenstra, A.T.H.

2001-10-26T23:59:59.000Z

491

Table 2b. Relative Standard Errors for Electricity Consumption and  

U.S. Energy Information Administration (EIA) Indexed Site

2b. Relative Standard Errors for Electricity 2b. Relative Standard Errors for Electricity Table 2b. Relative Standard Errors for Electricity Consumption and Electricity Intensities, per Square Foot, Specific to Occupied and Vacant Floorspace, 1992 Building Characteristics All Buildings Using Electricity (thousand) Total Electricity Consumption (trillion Btu) Electricity Intensities (thousand Btu) In Total Floor- space In Occupied Floor- space In Vacant Floor- space Per Square Foot Per Occupied Square Foot Per Vacant Square Foot All Buildings 4 5 5 9 4 4 4 Building Floorspace (Square Feet) 1,001 to 5,000 5 6 6 12 6 6 9 5,001 to 10,000 4 9 9 13 9 9 9 10,001 to 25,000 5 7 7 14 5 5 7 25,001 to 50,000 7 10 10 21 10 10 11 50,001 to 100,000 7 12 12 15 8 8 10 100,001 to 200,000 9 13 13 24 10 11 10 200,001 to 500,000 10 13 13 19 11 11 10 Over 500,000 26 18 18 34

492

Estimating the error in simulation prediction over the design space  

SciTech Connect (OSTI)

This study addresses the assessrnent of accuracy of simulation predictions. A procedure is developed to validate a simple non-linear model defined to capture the hardening behavior of a foam material subjected to a short-duration transient impact. Validation means that the predictive accuracy of the model must be established, not just in the vicinity of a single testing condition, but for all settings or configurations of the system. The notion of validation domain is introduced to designate the design region where the model's predictive accuracy is appropriate for the application of interest. Techniques brought to bear to assess the model's predictive accuracy include test-analysis coi-relation, calibration, bootstrapping and sampling for uncertainty propagation and metamodeling. The model's predictive accuracy is established by training a metalnodel of prediction error. The prediction error is not assumed to be systcmatic. Instead, it depends on which configuration of the system is analyzed. Finally, the prediction error's confidence bounds are estimated by propagating the uncertainty associated with specific modeling assumptions.

Shinn, R. (Rachel); Hemez, F. M. (François M.); Doebling, S. W. (Scott W.)

2003-01-01T23:59:59.000Z

493

Wind and Load Forecast Error Model for Multiple Geographically Distributed Forecasts  

SciTech Connect (OSTI)

The impact of wind and load forecast errors on power grid operations is frequently evaluated by conducting multi-variant studies, where these errors are simulated repeatedly as random processes based on their known statistical characteristics. To generate these errors correctly, we need to reflect their distributions (which do not necessarily follow a known distribution law), standard deviations, auto- and cross-correlations. For instance, load and wind forecast errors can be closely correlated in different zones of the system. This paper introduces a new methodology for generating multiple cross-correlated random processes to simulate forecast error curves based on a transition probability matrix computed from an empirical error distribution function. The matrix will be used to generate new error time series with statistical features similar to observed errors. We present the derivation of the method and present some experimental results by generating new error forecasts together with their statistics.

Makarov, Yuri V.; Reyes Spindola, Jorge F.; Samaan, Nader A.; Diao, Ruisheng; Hafen, Ryan P.

2010-11-02T23:59:59.000Z

494

Enforcement Letter, Battelle Memorial Institute - May 5, 2004 | Department  

Broader source: Energy.gov (indexed) [DOE]

Memorial Institute - May 5, 2004 Memorial Institute - May 5, 2004 Enforcement Letter, Battelle Memorial Institute - May 5, 2004 May 5, 2004 Enforcement Letter issued to Battelle Memorial Institute related to Radiological Work Practices at the Pacific Northwest National Laboratory The subject NTS report described multiple deficiencies identified through a DOE-RL assessment of contamination control and survey practices associated with fume hood work at the PNNL Radiochemical Processing Laboratory. The DOE-RL assessment was formally transmitted to PNNL on November 10, 2003. Specific deficiencies identified as part of the DOE assessment included multiple instances of workers failing to perform required contamination self-surveys, workers performing incomplete or cursory self-surveys, and workers failing to perform or

495

Rebuilding It Better: Greensburg, Kansas, Kiowa County Memorial Hospital |  

Open Energy Info (EERE)

Rebuilding It Better: Greensburg, Kansas, Kiowa County Memorial Hospital Rebuilding It Better: Greensburg, Kansas, Kiowa County Memorial Hospital Jump to: navigation, search Name Rebuilding It Better: Greensburg, Kansas, Kiowa County Memorial Hospital Agency/Company /Organization National Renewable Energy Laboratory Focus Area Agriculture, Buildings, Economic Development, Energy Efficiency, Water Conservation, Renewable Energy, Wind Phase Bring the Right People Together, Create a Vision, Evaluate Options, Develop Goals Resource Type Case studies/examples Availability Publicly available--Free Publication Date 8/1/2010 Website http://apps1.eere.energy.gov/b Locality Greensburg, Kansas References Rebuilding It Better: Greensburg, Kansas, Kiowa County Memorial Hospital[1] Contents 1 Overview 2 Highlights 3 Environmental Aspects

496

Enfrocement Letter, Battelle Memorial Institute - May 20, 2010 | Department  

Broader source: Energy.gov (indexed) [DOE]

Enfrocement Letter, Battelle Memorial Institute - May 20, 2010 Enfrocement Letter, Battelle Memorial Institute - May 20, 2010 Enfrocement Letter, Battelle Memorial Institute - May 20, 2010 May 20, 2010 Enforcement Letter issued to Battelle Memorial Institute related to an Unintentional Firearm Discharge at the Volpentest HAMMER Training and Education Center at the Hanford Site, The Office of Health, Safety and Security's Office of Enforcement conducted an evaluation of the accidental firearm discharge that occurred in an occupied classroom during training led by Ballelle at the Volpentest HAMMER Training and Education Center (HAMMER) in August 2009. The weapon discharge, which occurred during unsupervised student handling of a handgun, could have resulted in a fatal injury to one of the many students in the classroom. Battelle

497

DOE Cites Battelle Memorial Institute for Price-Anderson Violations |  

Broader source: Energy.gov (indexed) [DOE]

Memorial Institute for Price-Anderson Violations Memorial Institute for Price-Anderson Violations DOE Cites Battelle Memorial Institute for Price-Anderson Violations January 3, 2008 - 5:04pm Addthis WASHINGTON, DC - The Department of Energy (DOE) today issued a Preliminary Notice of Violation (PNOV) to the Battelle Memorial Institute (Battelle) for nuclear safety violations at the Pacific Northwest National Laboratory (PNNL). Battelle is the managing and operating contractor for PNNL in Richland, Washington. The PNOV today issued a series of violations related to two radiological events that occurred at PNNL during the last year. In December 2006, an airborne release of plutonium from a glovebox in the Radiochemical Processing Laboratory occurred as a result of a split in a vacuum exhaust line caused by an inappropriate modification to the vacuum system. In

498

Whirlpools on the Nanoscale Could Multiply Magnetic Memory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Whirlpools on the Nanoscale Could Whirlpools on the Nanoscale Could Multiply Magnetic Memory Whirlpools on the Nanoscale Could Multiply Magnetic Memory Print Tuesday, 21 May 2013 00:00 Research at the Advanced Light Source may lead to four-bit magnetic cells housed on nanoscale metal disks, instead of the two-bit magnetic domains of standard magnetic memories. In magnetic vortices, parallel electron spins point either clockwise or counterclockwise, while in their crowded centers the spins point either down or up. "From the scientist's point of view, magnetism is about controlling electron spin," says Peter Fischer of the Materials Sciences Division, who leads the work at beamline 6.1.2. Four orientations could provide multibits in a new kind of memory. The next step is to control the states independently and simultaneously.

499

Enfrocement Letter, Battelle Memorial Institute - May 20, 2010 | Department  

Broader source: Energy.gov (indexed) [DOE]

Enfrocement Letter, Battelle Memorial Institute - May 20, 2010 Enfrocement Letter, Battelle Memorial Institute - May 20, 2010 Enfrocement Letter, Battelle Memorial Institute - May 20, 2010 May 20, 2010 Enforcement Letter issued to Battelle Memorial Institute related to an Unintentional Firearm Discharge at the Volpentest HAMMER Training and Education Center at the Hanford Site, The Office of Health, Safety and Security's Office of Enforcement conducted an evaluation of the accidental firearm discharge that occurred in an occupied classroom during training led by Ballelle at the Volpentest HAMMER Training and Education Center (HAMMER) in August 2009. The weapon discharge, which occurred during unsupervised student handling of a handgun, could have resulted in a fatal injury to one of the many students in the classroom. Battelle

500

Modesto Memorial Hospital Space Heating Low Temperature Geothermal Facility  

Open Energy Info (EERE)

Memorial Hospital Space Heating Low Temperature Geothermal Facility Memorial Hospital Space Heating Low Temperature Geothermal Facility Jump to: navigation, search Name Modesto Memorial Hospital Space Heating Low Temperature Geothermal Facility Facility Modesto Memorial Hospital Sector Geothermal energy Type Space Heating Location Modesto, California Coordinates 37.6390972°, -120.9968782° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[]}