National Library of Energy BETA

Sample records for memory corruption vulnerability

  1. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  2. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  3. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  4. Corruption

    E-Print Network [OSTI]

    Banerjee, Abhijit

    2012-03-13

    In this paper, we provide a new framework for analyzing corruption in public bureaucracies. The standard way to model corruption is as an example of moral hazard, which then leads to a focus on better monitoring and ...

  5. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Broader source: Energy.gov (indexed) [DOE]

    a memory corruption error and execute arbitrary code on the target system. IMPACT: Access control error SOLUTION: vendor recommends upgrading to version 16.0.3.51 Addthis...

  6. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  7. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  8. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  10. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  11. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  12. Low-level software security : exploiting memory safety vulnerabilities and assumptions

    E-Print Network [OSTI]

    Checkoway, Stephen

    2012-01-01

    memory cartridge slots . . . . . . . . . . . . . . . . .by means of a memory cartridge containing a specially-by means of a memory cartridge containing a specially-

  13. Corruption in Developing Countries

    E-Print Network [OSTI]

    Olken, Benjamin A.

    Recent years have seen a remarkable expansion in economists' ability to measure corruption. This in turn has led to a new generation of well-identified, microeconomic studies. We review the evidence on corruption in ...

  14. Electoral Corruption in Developing Democracies

    E-Print Network [OSTI]

    Cantu, Francisco

    electoral corruption has vanished in Mexico today, or if itMéxico. xv ABSTRACT OF THE DISSERTATION Electoral CorruptionMexico before the electoral reform of 1996 (Preston and Dillon, 2004) and Venezuela in 2004 (Hausmann and Rigobón, 2011), corruption

  15. Corruption and Sustainable Development

    E-Print Network [OSTI]

    Aidt, Toke S.

    the exploitation of natural resources to corruption is also abundant, ranging from kick-backs associated with logging concessions in Malaysia and Indonesia to oil concessions in Nigeria. (Rose-Ackerman (1999, chapter 3) provides many more examples... . It is used to account for energy depletion, mineral depletion, and net forest depletion by subtracting an estimate of the relevant resource rents from net national savings. These rents are calculated as the market price of the resource minus average...

  16. Accounting for Corruption: Economic Structure, Democratic Norms, and Trade

    E-Print Network [OSTI]

    Sandholtz, Wayne; Koetzle, William

    1998-01-01

    D. 1991. Corruption and Politics in Mexico. Tuscaloosa, AL:corruption in France (Meny 1992), Ghana (Morris 1991) and Mexico (corruption scandals: France, Italy, Japan, Kenya, Mexico,

  17. Corruption, Institutions and Economic Development

    E-Print Network [OSTI]

    Aidt, Toke S.

    involved with these activities, therefore, go a long way to conceal what they do6 and corruption is by its very nature (mostly) unobserved. Researchers must, as a consequence of this, ?nd ingenious ways of measuring it and inferring its consequences from... to the schools after the money had left the treasury, clearly harmed primary education. Subsequent studies from other countries in the region have revealed slightly smaller, but still very substantial, leakages of funds. Given the importance of primary education...

  18. Policy on Foreign Corrupt Practices Act

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Policy on Foreign Corrupt Practices Act I. Purpose and Scope The university has developed this policy to comply with requirements of the federal Foreign Corrupt Practices Act. The policy applies to university activities throughout the world. II. Definitions For purposes of this Policy, Anything of Value

  19. Transparency, Sanctioning Capacity, and Corruption Displacement : : Multi-Method Evidence from Local Government in Malawi

    E-Print Network [OSTI]

    Zimmerman, Brigitte

    2014-01-01

    2.4.2 Corruption-Sanction Game Between Official and Cit-Matrix in Corruption-Sanction Game . . . . . . . . . . . .of corruption enough to sanction it. My primary hypothesis

  20. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe...

  1. T-627: Adobe Flash Player Memory Corruption | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35:Department|27: Adobe

  2. Corrupting Learning: Evidence From Missing Federal Education Funds in Brazil

    E-Print Network [OSTI]

    Ferraz, Claudio; Finan, Frederico; Moreira, Diana B

    2012-01-01

    higher share of their educational resources from FUNDEF. Wethe same amount of educational resources can experience, formismanagement of educational resources. If corruption and

  3. Detecting Silent Data Corruption Using an Auxiliary Method and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our mechanism can be applied to detect silent data corruption. Bio: Hadrien Croubois is a fourth year student at the cole Normale Suprieure de Lyon, France. After completing...

  4. When Crime Pays: Measuring Judicial Efficacy against Corruption in Brazil

    E-Print Network [OSTI]

    Ribeiro de Alencar, Carlos Higino; Gico, Ivo Jr.

    2010-01-01

    for now - crime pays in Brazil. Paginal5de27 ReferencesEfficacy against Corruption in Brazil Carlos Higino Ribeiroa widespread perception in Brazil that civil servants caught

  5. Korean Implementation of the OECD Bribery Convention: Implications for Global Efforts to Fight Corruption

    E-Print Network [OSTI]

    Kim, Jong Bum

    1999-01-01

    degree of corruption in an economy such as Mexico effec-in corruption level from that of Singapore to that of Mexico

  6. Korean Implementation of the OECD Bribery Convention: Implications for Global Efforts to Fight Corruption

    E-Print Network [OSTI]

    Kim, Jong Bum

    1999-01-01

    FOR GLOBAL EFFORTS TO FIGHT CORRUPTION Jong Bum Kim* TableC. Multilateral Efforts to Fight Transnational1999). GLOBAL EFFORTS TO FIGHT CORRUPTION omitting treatment

  7. Causes and Consequences of Corruption Dr. Bonnie Palifka

    E-Print Network [OSTI]

    Post, David M.

    -Ackerman, Susan. 1999. Corruption and Government: Causes, Consequences, and Reform. Cambridge: Cambridge of Economic Issues XLI,4: 1043-1061. How is corruption measured? Assignment: browse the websites of Transparency International (http://www.transparency.org/) and the World Bank (http://www1.worldbank

  8. Optimal Power Flow: Closing the Loop over Corrupted Data

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    application are the Supervisory Control and Data Acquisition (SCADA) systems. In power networks, the SCADA System. Modern SCADA/EMS systems collect large amounts of measurement data and, using a State Estimator attack. We denote the data corruption by a. cyber attacks on SCADA/EMS systems operating power net- works

  9. Server-Aided Two-Party Computation with Simultaneous Corruption

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ) for the Sino-Danish Center for the Theory of Interactive Computation and from the Center for Research computationally much more efficient than the heavy public-key machin- ery ones needs for the two-party case. The standard model assumes one adversary who may corrupt one of the clients and some number of servers

  10. Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh) to become the root cause of exploitable security vulnerabilities. This paper proposes Watchdog, a hardware full hardware-enforced memory safety at low overheads. 1. Introduction Languages such as C and C

  11. Storage Capacity of the Exponential Correlation Associative Memory

    E-Print Network [OSTI]

    Hancock, Edwin

    In this paper we analyze the pattern storage capacity of the exponential correlation asso- ciative memory(ECAM of the ECAM when presented with corrupted input patterns. Our model leads to an expression for the storage capacity of the ECAM both in terms of the length of the bit-patterns and the probabil- ity of bit

  12. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  13. Conducting business under the Foreign Corrupt Practices Act

    SciTech Connect (OSTI)

    Ittig, J.

    1982-07-01

    The Foreign Corrupt Practices Act inhibits many businesses conducting international transactions. Although the Senate has proposed revisions to the FCPA to alleviate some of the handicaps of U.S. citizens doing business abroad, the House of Representatives has yet to approve a bill. This study identifies the critical interpretive problems, and suggests protective measures a company can take to avoid problems until the FCPA is amended.

  14. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  15. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  16. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  17. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  18. Mechanical memory

    DOE Patents [OSTI]

    Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Alburquerque, NM); Baker, Michael S. (Albuquerque, NM)

    2006-08-15

    A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

  19. Mechanical memory

    DOE Patents [OSTI]

    Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Albuquerque, NM); Baker, Michael S. (Albuquerque, NM)

    2006-05-16

    A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

  20. The pros and cons of corruption of firm performance : a micro-level study of businesses in Indonesia

    E-Print Network [OSTI]

    Murdaya, Karuna

    2005-01-01

    Over the past 10 years, different international organization and NGO's have given birth to a whole host of different anti corruption programs in response to the recent "endemic" of corruption which is seen to plague ...

  1. Cultural attitudes to corruption : a perspective on the interplay between cultural and legal norms for Western businesses operating in China

    E-Print Network [OSTI]

    Winters, Timothy (Timothy Mark)

    2013-01-01

    Corruption is an important challenge facing those who wish to do business in China. Beyond the commercial context, corruption and attitudes towards it are also more broadly relevant to politics, political economics and ...

  2. Corruption of Pulsed Electric Thruster Voltage Fluctuation Measurements by Transmission Line

    E-Print Network [OSTI]

    Choueiri, Edgar

    Corruption of Pulsed Electric Thruster Voltage Fluctuation Measurements by Transmission Line to transmission line corruption--as an experimental example of the extent to which the power transmission line can termination resistance s Laplace variable V (t) transmission line driving signal Vn Laplace transform

  3. Winter, snow : an inquiry into vulnerability

    E-Print Network [OSTI]

    Orme, Wanda

    2012-01-01

    snow} ..SAN DIEGO Winter, Snow. An Inquiry into Vulnerability. AOF THE THESIS Winter, Snow. An Inquiry into Vulnerability by

  4. MALI CLIMATE VULNERABILITY JANUARY 2014

    E-Print Network [OSTI]

    Columbia University

    MALI CLIMATE VULNERABILITY MAPPING JANUARY 2014 This report is made possible by the support at Columbia University Cover Photo: Overall vulnerability map of Mali (quintile map legend), CIESIN, 2013 Project Manager Burlington, Vermont Tel.: 802-658-3890 Anna.Farmer@tetratech.com #12;MALI CLIMATE

  5. Essays on Labor Supply and Family Risk Sharing, & Understanding Corruption in Developing Countries

    E-Print Network [OSTI]

    Beylis, Guillermo Raul

    2013-01-01

    being audited before the Lula’s anti-corruption program waspolicy implemented by Lula’s government. In this simulation,the probability before the Lula’s program, to 17%, which is

  6. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site ScriptingDepartment

  7. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar through the YearsUsers

  8. T-566: Citrix Secure Gateway Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system.

  9. Abstract: One of the fundamental limits to high-perfor-mance, high-reliability file systems is memory's vulnerabil-

    E-Print Network [OSTI]

    Chen, Peter M.

    's vulnerability to power outages is easy to understand and fix. A $119 uninterruptible power supply can keep data (files) because it is vulnerable to power outages and operating system crashes. Memory a system running long enough to dump memory to disk in the event of a power outage [APC96], or one can use

  10. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  11. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  12. Impact of Disk Corruption on OpenSource DBMS Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan, Haryadi S. Gunawi,

    E-Print Network [OSTI]

    Swift, Michael

    Impact of Disk Corruption on Open­Source DBMS Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan of Computer Science University of Wisconsin, Madison {srirams

  13. Passive Corruption in Statistical Multi-Party Computation Martin Hirt1, Christoph Lucas1, Ueli Maurer1, and Dominik Raub2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Corruption in Statistical Multi-Party Computation Martin Hirt1, Christoph Lucas1, Ueli, secrecy, robustness, and fairness. Corruptions can be either passive or active: A pas- sively corrupted passively. In this work, we consider the statistical setting with mixed adversaries and study the exact con

  14. Passive Corruption in Statistical MultiParty Computation # Martin Hirt 1 , Christoph Lucas 1 , Ueli Maurer 1 , and Dominik Raub 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Corruption in Statistical Multi­Party Computation # Martin Hirt 1 , Christoph Lucas 1, secrecy, robustness, and fairness. Corruptions can be either passive or active: A pas­ sively corrupted passively. In this work, we consider the statistical setting with mixed adversaries and study the exact con

  15. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  16. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  17. Detecting Silent Data Corruption for Extreme-Scale Applications through Data Mining

    SciTech Connect (OSTI)

    Bautista-Gomez, Leonardo; Cappello, Franck

    2014-01-16

    Supercomputers allow scientists to study natural phenomena by means of computer simulations. Next-generation machines are expected to have more components and, at the same time, consume several times less energy per operation. These trends are pushing supercomputer construction to the limits of miniaturization and energy-saving strategies. Consequently, the number of soft errors is expected to increase dramatically in the coming years. While mechanisms are in place to correct or at least detect some soft errors, a significant percentage of those errors pass unnoticed by the hardware. Such silent errors are extremely damaging because they can make applications silently produce wrong results. In this work we propose a technique that leverages certain properties of high-performance computing applications in order to detect silent errors at the application level. Our technique detects corruption solely based on the behavior of the application datasets and is completely application-agnostic. We propose multiple corruption detectors, and we couple them to work together in a fashion transparent to the user. We demonstrate that this strategy can detect the majority of the corruptions, while incurring negligible overhead. We show that with the help of these detectors, applications can have up to 80% of coverage against data corruption.

  18. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of cyber security architectures and frameworks, including some for microgrids. Detailed vulnerability assessment of systems, devices, components, and procedures....

  19. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  20. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  1. VULCAN: Vulnerability Assessment Framework for Cloud Computing

    E-Print Network [OSTI]

    Kavi, Krishna

    services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform services on Cloud is complex because the security depends on the vulnerability of infrastruc- ture?". Or "I want to host this software application in this cloud environment, what security vulnerabilities I

  2. APPROACHES TO VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Bateman, Ian J.

    APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger CSERGE Working Paper GEC 96-05 #12;APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger Centre for Social and Economic Research and Physical Approaches to Vulnerability to Climate Change in Vietnam' is also gratefully acknowledged. ISSN

  3. SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW

    E-Print Network [OSTI]

    Columbia University

    SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA, METHODS, AND ISSUES AUGUST 2014: A Review of Data, Methods, and Issues i SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA Climate Change Vulnerability Assessments: A Review of Data, Methods, and Issues ii TABLE OF CONTENTS

  4. SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA Seismic hazard and vulnerability

    E-Print Network [OSTI]

    SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA I Seismic hazard and vulnerability assessment in Turrialba, Costa Rica Rafael German Urban Lamadrid March 2002 #12;SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA II Seismic hazard and vulnerability assessment in Turrialba

  5. Many countries around the world are wounded with conflict, poverty, and political corruption, pushing disease prevention aside for more

    E-Print Network [OSTI]

    Rock, Chris

    Many countries around the world are wounded with conflict, poverty, and political corruption. Africa, southern Europe, southern Mexico, South America, and Asia are all faced with the devastating toll

  6. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  7. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  8. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on...

  9. Holographic Vulnerability Studies: Vulnerabilities as Fractures in Interpretation as Information Flows Across

    E-Print Network [OSTI]

    Crandall, Jedidiah R.

    Flows Across Abstraction Boundaries Jedidiah R. Crandall Univ. of New Mexico, Dept. of Computer Science Mail Stop: MSC01 1130, 1 Univ. of New Mexico, Albuquerque, NM 87131 crandall@cs.unm.edu Daniela. Attackers exploit this fact to corrupt the receiving process and cause it to execute machine code

  10. [ME]morial

    E-Print Network [OSTI]

    Lee, Beomki

    2015-01-01

    Challenging an archetypal relationship between collective memory and a multitude of traditional memorials, "[ME]morial" presents a new concept in memorial architecture based on the reinterpretation of Freud's and Bergson's ...

  11. Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory

    E-Print Network [OSTI]

    components of the total cost of ownership (TCO) of a datacenter [1]: (1) capital costs (those associated- cent studies have shown that capital costs can account for the majority (e.g., around 57% in [1 cooling and power supply techniques. Of the dominant component of datacenter TCO (capital costs associated

  12. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  13. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion MeasurementMemorandum ofMemory Considerations Memory

  14. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion MeasurementMemorandum ofMemory ConsiderationsMemory

  15. UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of

    E-Print Network [OSTI]

    Sorin, Eric J.

    UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of Hawaiian jacks captured tournaments can provide synoptic data on diet and gear vulnerability that would otherwise be very dif

  16. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  17. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  18. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  19. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of...

  20. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  1. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  2. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  3. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  4. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion MeasurementMemorandum ofMemory Considerations

  5. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion MeasurementMemorandum ofMemory

  6. Cizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially flooded

    E-Print Network [OSTI]

    Cizelj, Leon

    flooded PWR reactor cavity to a steam explosion Leon Cizelj, Bostjan Koncar, Matjaz Leskovar "Jozef StefanCizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially 5885 215; fax + 386 1 5885 377; e-mail: Leon.Cizelj@ijs.si Keywords Steam explosion, reactor cavity

  7. Optical memory

    DOE Patents [OSTI]

    Mao, Samuel S; Zhang, Yanfeng

    2013-07-02

    Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

  8. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  9. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  10. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  11. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  12. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  13. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  14. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  15. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  16. FAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    models for the related processes. A few vulnerability discovery models (VDMs) have been proposed recently that attempt to model the vulnerability discovery process during the lifecycle of a given software productFAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution HyunChul Joh, Jinyoo Kim

  17. Modeling Learningless Vulnerability Discovery using a Folded Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    model is logistic, and thus the increase and decrease in the discovery process is assumedModeling Learningless Vulnerability Discovery using a Folded Distribution Awad A. Younis1 , Hyun, CO 80523, USA Abstract ­ A vulnerability discovery model describes the vulnerability discovery rate

  18. On automated prepared statement generation to remove SQL injection vulnerabilities

    E-Print Network [OSTI]

    Xie, Tao

    On automated prepared statement generation to remove SQL injection vulnerabilities Stephen Thomas in revised form 5 August 2008 Accepted 8 August 2008 Available online 27 September 2008 Keywords: SQL vulnerabilities were SQL injection vulnerabilities (SQLIVs). This paper presents an algorithm of prepared

  19. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  20. Memory abstractions for parallel programming

    E-Print Network [OSTI]

    Lee, I-Ting Angelina

    2012-01-01

    A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly ...

  1. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3D stacked memory interposed between the KNL chip and the slower off-package DDR memory. Compared to the on-node DDR4 memory, the high-bandwidth memory (HBM) has...

  2. Drifting absence :: drafting memory

    E-Print Network [OSTI]

    Kuhn, Marlene Eva

    2006-01-01

    The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

  3. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  4. RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory of J. Ronald Miner, an

    E-Print Network [OSTI]

    Tullos, Desiree

    RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory & Ecological Engineering. DONOR Ron Miner Memorial Bioengineering Scholarship Fund ELIGIBILITY REQUIREMENTS

  5. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect (OSTI)

    LaChance, J.; Kolaczkowski, A.; Kahn, J. [and others

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  6. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy & Drilling Technology HomeGrid Cyber Vulnerability

  7. March 29, 2008 Operating Systems: Main Memory 1 Main Memory

    E-Print Network [OSTI]

    Adam, Salah

    March 29, 2008 Operating Systems: Main Memory 1 Main Memory Chapter 8 #12;March 29, 2008 Operating Systems: Main Memory 2 Chapter Outline Background Contiguous Memory Allocation Paging Structure of the Page Table Segmentation #12;March 29, 2008 Operating Systems: Main Memory 3 Objectives To provide

  8. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  9. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  10. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  11. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  12. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  13. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  14. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  15. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  16. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  17. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  18. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  19. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  1. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change...

  2. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  3. [MRO] Oligocrystalline Shape Memory Alloys

    E-Print Network [OSTI]

    Chen, Ying

    Copper-based shape memory alloys (SMAs) exhibit excellent shape memory properties in single crystalline form. However, when they are polycrystalline, their shape memory properties are severely compromised by brittle fracture ...

  4. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  5. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  6. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  7. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  8. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John (Greenwood, MO)

    2002-01-01

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  9. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    that the open nature of web browsers provides a feasible \\point of entry" for this attack via a corrupted plug of web-browser plug-ins could easily provide a \\point of entry" for chosen-plaintext attacks

  10. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  11. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  12. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience...

  13. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  14. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  15. Warship : memorial in antithesis

    E-Print Network [OSTI]

    Tchelistcheff, Andre Victor

    1992-01-01

    This thesis is divided into three distinct yet related parts. The first consists of observations and reflections on some of New York City's many war memorials, ranging from one commemorating the Revolutionary War to one ...

  16. Schema and memory consolidation 

    E-Print Network [OSTI]

    Tse, Dorothy

    2011-06-27

    The traditional view of systems memory consolidation is that it is a gradual process that takes place over days or weeks. Within this approach, the hippocampus (HPC) is thought to be involved in the rapid encoding of ...

  17. Hardware Transactional Memory

    E-Print Network [OSTI]

    Lie, Sean

    This work shows how hardware transactional memory (HTM) can be implemented to support transactions of arbitrarily large size, while ensuring that small transactions run efficiently. Our implementation handles small ...

  18. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  19. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  20. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  1. VULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS

    E-Print Network [OSTI]

    Atkinson, Robert C

    be routed around electricity substation compounds wirelessly. Furthermore, wireless communication with the deployment of Bluetooth (and other similar wireless technologies) in electricity substations for controlVULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS S A Bhattil

  2. Vulnerability assessment of water supply systems for insufficient fire flows 

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15

    Water supply systems’ vulnerability towards physical, chemical, biological, and cyber threats was recognized and was under study long before September 11, 2001. But greater attention toward security measures for water ...

  3. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  4. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  5. Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

    E-Print Network [OSTI]

    Saxena, Prateek

    2012-01-01

    HTML content of the blog. HTML and other web languages lackmecha- nisms in HTML and other web languages to separateHTML pseudocode generated by a vulnerable social networking web

  6. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  7. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted.

    E-Print Network [OSTI]

    Crawford, T. Daniel

    -croatia.ppt #12;The Energy implica8ons of increasing prosperity 40% of the world/day will take 34 years to generate 12,5 TW!! EIA Intl Energy Outlook 2004 http World Energy Demand total industrial developing US ee/fsu Hoffert et al Nature 395, 883,1998; msd-energy

  8. Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    1 Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya Computer Science models for the vulnerability discovery process have just been published recently. Such models will allow of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models

  9. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  10. An analog memory using a CCD memory cell 

    E-Print Network [OSTI]

    Murray, James Ray

    1983-01-01

    23 26 29 E. Digital-to-Analog Converter F. Analog-to-Digital Converter G. Operation CHAPTER IV. ANALYSIS OF THE CIRCUIT A. Testing of Major Components B. Performance of the Memory C. Comparison with Digital Memories D. Proposed Modifications... of Memory Cell 24. Four Interconnected Memory Cells 25. Four-to-Sixteen Converter 26. Column Address Decoding Circuit. 27. Row Address Decoding Circuit 28. Digital-to-Analog Converter 29. Comparator Circuit Diagram . 30. DC Transfer Function...

  11. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    memory Introduction The NERSC-8 system will include a novel feature on its node architecture: 16 GB of high-bandwidth 3D stacked memory interposed between the KNL chip and the...

  12. Total ionizing dose effect of ?-ray radiation on the switching characteristics and filament stability of HfOx resistive random access memory

    SciTech Connect (OSTI)

    Fang, Runchen; Yu, Shimeng; Gonzalez Velo, Yago; Chen, Wenhao; Holbert, Keith E.; Kozicki, Michael N.; Barnaby, Hugh

    2014-05-05

    The total ionizing dose (TID) effect of gamma-ray (?-ray) irradiation on HfOx based resistive random access memory was investigated by electrical and material characterizations. The memory states can sustain TID level ?5.2 Mrad (HfO{sub 2}) without significant change in the functionality or the switching characteristics under pulse cycling. However, the stability of the filament is weakened after irradiation as memory states are more vulnerable to flipping under the electrical stress. X-ray photoelectron spectroscopy was performed to ascertain the physical mechanism of the stability degradation, which is attributed to the Hf-O bond breaking by the high-energy ?-ray exposure.

  13. Shape memory polymer medical device

    DOE Patents [OSTI]

    Maitland, Duncan (Pleasant Hill, CA); Benett, William J. (Livermore, CA); Bearinger, Jane P. (Livermore, CA); Wilson, Thomas S. (San Leandro, CA); Small, IV, Ward (Livermore, CA); Schumann, Daniel L. (Concord, CA); Jensen, Wayne A. (Livermore, CA); Ortega, Jason M. (Pacifica, CA); Marion, III, John E. (Livermore, CA); Loge, Jeffrey M. (Stockton, CA)

    2010-06-29

    A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

  14. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  15. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  16. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding

    E-Print Network [OSTI]

    Breaux, Travis D.

    , as applied to criminal court records to identify mitigating requirements that improve privacy protectionsIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding Travis D,jdlewis,pnotto,anton}@ncsu.edu ABSTRACT Information systems governed by laws and regulations are subject to civil and criminal violations

  17. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings

    E-Print Network [OSTI]

    Young, R. Michael

    and goal models, as applied to criminal court records to identify mitigating requirements. In a sustainableIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings Travis D,jdlewis,pnotto,anton}@ncsu.edu Abstract Information systems governed by laws and regulations are subject to both civil and criminal

  18. Flood Vulnerability and Flood Protection North and Baltic Seas

    E-Print Network [OSTI]

    Vries, Hans de

    G G G G Flood Vulnerability and Flood Protection North and Baltic Seas Meteorological Forcings for the Dutch Continental Shelf Model Hans de Vries KNMI, Weather Service Research and Development G G G G control forecast 50 perturbed forecasts 240 hours 2 per day Not enough spread for tf

  19. Predicting Cancer-Specific Vulnerability via Data-Driven

    E-Print Network [OSTI]

    Ruppin, Eytan

    Resource Predicting Cancer-Specific Vulnerability via Data-Driven Detection of Synthetic LethalityCancer Research UK, The Beatson Institute for Cancer Research, Switchback Road, Glasgow G61 1BD, Scotland the inhibition of each single gene is not. It can be harnessed to selectively treat cancer by identifying

  20. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  1. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  2. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  3. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  4. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot­ tleneck in mobile devices (the battery power

  5. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot- tleneck in mobile devices (the battery power

  6. USIMM: the Utah SImulated Memory Module A Simulation Infrastructure for the JWAC Memory

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    memory controllers and four DDR3 memory channels [19, 31]. While other memory channel and memory for DDR3 channels and DIMMs. 1 #12;A modern DDR3 channel typically has a 64-bit data bus and a 23-bit

  7. The memory glasses : wearable computing for just-in-time memory support

    E-Print Network [OSTI]

    DeVaul, Richard W. (Richard Wayne), 1971-

    2004-01-01

    This thesis documents a body of wearable computing research surrounding the development of the Memory Glasses, a new type of proactive memory support technology. The Memory Glasses combines features of existing memory ...

  8. TED KYCIA MEMORIAL SYMPOSIUM.

    SciTech Connect (OSTI)

    LITTENBERG, L.; RUBINSTEIN, R.; SAMIOS, N.; LI, K.; GIACOMELLI, G.; MOCKETT, P.; CARROLL, A.; JOHNSON, R.; BRYMAN, D.; TIPPENS, B.

    2000-05-19

    On the afternoon of May 19 2000, a Memorial Seminar was held in the BNL physics Large Seminar Room to honor the memory of Ted Kyeia, a prominent particle physicist who had been a member of the BNL staff for 40 years. Although it was understandably a somewhat sad occasion because Ted was no longer with us, nevertheless there was much for his colleagues and friends to celebrate in recalling the outstanding contributions that he had made in those four decades. The Seminar speakers were all people who had worked with Ted during that period; each discussed one aspect of his career, but also included anecdotes and personal reminiscences. This booklet contains the Seminar program, listing the speakers, and also copies of transparencies of the talks (and one paper which was a later expansion of a talk); sadly, not all of the personal remarks appeared on the transparencies.

  9. Shape memory alloy actuator

    DOE Patents [OSTI]

    Varma, Venugopal K. (Knoxville, TN)

    2001-01-01

    An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

  10. Memory effects in quantum channel discrimination

    E-Print Network [OSTI]

    Giulio Chiribella; Giacomo M. D'Ariano; Paolo Perinotti

    2008-04-02

    We consider quantum-memory assisted protocols for discriminating quantum channels. We show that for optimal discrimination of memory channels, memory assisted protocols are needed. This leads to a new notion of distance for channels with memory. For optimal discrimination and estimation of sets of unitary channels memory-assisted protocols are not required.

  11. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the...

  12. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    E-Print Network [OSTI]

    Ryder, Barbara G.

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud large-scale cloud applications. Index Terms--cloud security, outsourced computation, side- channel, newly discovered vulnerabilities in cloud virtualization envi- ronment have threatened the security

  13. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  14. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  15. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  16. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  17. The severe scaling challenges of mainstream memories mo vated recent ac ve research on emerging nonvola le memory (eNVM) technologies. Some promising candidates, i.e., phase change memory, spintronic memory, and resis ve memory

    E-Print Network [OSTI]

    DeMara, Ronald F.

    nonvola le memory (eNVM) technologies. Some promising candidates, i.e., phase change memory, spintronic

  18. Memorial University Department of Psychology

    E-Print Network [OSTI]

    Oyet, Alwell

    1 Memorial University Department of Psychology GRADUATE STUDENT & SUPERVISOR HANDBOOK 2014 ­ 2015 .........................................................................................................................5 Masters of Applied Social Psychology (MASP ............................................................................9 Experimental Psychology

  19. Vulnerability Discovery in Multi-Version Software Systems Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

    E-Print Network [OSTI]

    Ray, Indrakshi

    a model of the discovery process that can predict the number of vulnerabilities that are likely to be discovered in a given time frame. Recent studies have produced vulnerability discovery process models a new approach for quantitatively modeling the vulnerability discovery process, based on shared source

  20. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies vulnerabilities such as failures of the communication and control systems that transmit and implement critical smart grids. In this paper the vulnerabilities in the control and communication system are coupled

  1. GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE DULY genetically modified organisms. Key words: Consumer. Vulnerability. Lacking of resources. GMO Résumé - Le : France (2010)" #12;GMO, consumption and consumer vulnerability in Brazilian Consumer Law: the right

  2. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  3. An analysis of MRAM based memory technologies

    E-Print Network [OSTI]

    Vijayaraghavan, Rangarajan, M. Eng. Massachusetts Institute of Technology

    2006-01-01

    MRAM is a memory (RAM) technology that uses electron spin to store information. Often been called "the ideal memory", it can potentially combine the density of DRAM with the speed of SRAM and non-volatility of FLASH memory ...

  4. Creating a False Memory in the Hippocampus

    E-Print Network [OSTI]

    Ramirez Moreno, Steve

    Memories can be unreliable. We created a false memory in mice by optogenetically manipulating memory engram–bearing cells in the hippocampus. Dentate gyrus (DG) or CA1 neurons activated by exposure to a particular context ...

  5. Nitinol-reinforced shape-memory polymers

    E-Print Network [OSTI]

    Di Leo, Claudio V

    2010-01-01

    Reinforced shape-memory polymers have been developed from an acrylate based thermoset shape-memory polymer and nitinol wires. A rectangular shape-memory polymer measuring approximately 1 by 2 by 0.1 inches has a ten fold ...

  6. MultiScale: Memory System DVFS with Multiple Memory Controllers

    E-Print Network [OSTI]

    Wenisch, Thomas F.

    of server energy consumed by the memory system has been increasing rapidly and is now on par with that consumed by processors. Recent work demonstrates that substantial memory energy can be saved with only to select and apply a frequency combination that will minimize the overall system energy within user

  7. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  8. Structural Vulnerability Analysis of Electric Power Distribution Grids

    E-Print Network [OSTI]

    Koc, Yakup; Warnier, Martijn; Kumar, Tarun

    2015-01-01

    Power grid outages cause huge economical and societal costs. Disruptions in the power distribution grid are responsible for a significant fraction of electric power unavailability to customers. The impact of extreme weather conditions, continuously increasing demand, and the over-ageing of assets in the grid, deteriorates the safety of electric power delivery in the near future. It is this dependence on electric power that necessitates further research in the power distribution grid security assessment. Thus measures to analyze the robustness characteristics and to identify vulnerabilities as they exist in the grid are of utmost importance. This research investigates exactly those concepts- the vulnerability and robustness of power distribution grids from a topological point of view, and proposes a metric to quantify them with respect to assets in a distribution grid. Real-world data is used to demonstrate the applicability of the proposed metric as a tool to assess the criticality of assets in a distribution...

  9. Genepool Memory Heatmaps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclearlong version)shortGate HoursGenepool Memory

  10. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  11. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  12. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

    1998-01-01

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

  13. Paver Program Oklahoma Memorial Union

    E-Print Network [OSTI]

    Oklahoma, University of

    Paver Program Oklahoma Memorial Union The UniversiTy of oklahoma Alumni Association Pave the Way in the Oklahoma Memorial Union Courtyard. Now you can. The UniversiTy of oklahoma Alumni Association 900 Asp Ave of Oklahoma is an equal opportunity institution. This brochure was printed at no cost to the taxpayers

  14. Unconditional Room Temperature Quantum Memory

    E-Print Network [OSTI]

    M. Hosseini; G. Campbell; B. M. Sparkes; P. K. Lam; B. C. Buchler

    2015-02-10

    Just as classical information systems require buffers and memory, the same is true for quantum information systems. The potential that optical quantum information processing holds for revolutionising computation and communication is therefore driving significant research into developing optical quantum memory. A practical optical quantum memory must be able to store and recall quantum states on demand with high efficiency and low noise. Ideally, the platform for the memory would also be simple and inexpensive. Here, we present a complete tomographic reconstruction of quantum states that have been stored in the ground states of rubidium in a vapour cell operating at around 80$^o$C. Without conditional measurements, we show recall fidelity up to 98% for coherent pulses containing around one photon. In order to unambiguously verify that our memory beats the quantum no-cloning limit we employ state independent verification using conditional variance and signal transfer coefficients.

  15. Working memory MARK D'ESPOSITO*

    E-Print Network [OSTI]

    subjects is usually six to seven digits (Lezak, 1995). In contrast, long-term memory is prop- erly defined underpinnings of memory function. The most common theoretical classification of mem- ory distinguishes short-term and long-term memory. In clinical practice, the terms short-term and long-term memory are used imprecisely

  16. Energy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems

    E-Print Network [OSTI]

    Conte, Thomas M.

    time of a slow PCM based memory and significant energy reductions against a DDR3 commodity DRAM memoryEnergy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems Abstract the point of view of scaling and energy consumption. PCM-only memories suffer from latency issues, high

  17. Scalable Dynamic Memory Management Module on Shared Memory Multiprocessors

    E-Print Network [OSTI]

    memory multiprocessors. The focus is to achieve scalability; for this purpose, both garbage collector (GC is done on Sun Ultra Enterprise 10000 (symmetric multiprocessor) and Origin 2000 (distributed shared

  18. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  19. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  20. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have been

  1. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  2. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  3. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergyMultiple

  4. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities

  5. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, M.; Martinez, D.R.

    1998-04-07

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

  6. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  7. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  8. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  9. Seismic Vulnerability and Performance Level of confined brick walls

    SciTech Connect (OSTI)

    Ghalehnovi, M.; Rahdar, H. A. [University of Sistan and Baluchestan, Zahedan (Iran, Islamic Republic of)

    2008-07-08

    There has been an increase on the interest of Engineers and designers to use designing methods based on displacement and behavior (designing based on performance) Regarding to the importance of resisting structure design against dynamic loads such as earthquake, and inability to design according to prediction of nonlinear behavior element caused by nonlinear properties of constructional material.Economically speaking, easy carrying out and accessibility of masonry material have caused an enormous increase in masonry structures in villages, towns and cities. On the other hand, there is a necessity to study behavior and Seismic Vulnerability in these kinds of structures since Iran is located on the earthquake belt of Alpide.Different reasons such as environmental, economic, social, cultural and accessible constructional material have caused different kinds of constructional structures.In this study, some tied walls have been modeled with software and with relevant accelerator suitable with geology conditions under dynamic analysis to research on the Seismic Vulnerability and performance level of confined brick walls. Results from this analysis seem to be satisfactory after comparison of them with the values in Code ATC40, FEMA and standard 2800 of Iran.

  10. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Thermoelectric power generation is vulnerable to increasing temperatures and reduced water availability in most regions, particularly in the Midwest, Great Plains, and southern...

  11. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  12. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  13. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  14. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  15. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  16. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  17. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  18. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    code analysis to detect software security vulnerabilities—A systematic review of software fault prediction studies.47] Noopur Davis. Secure Software Development Life Cycle

  19. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  20. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  1. Insights into the Mechanism of Memory Allocation Through the Trapping and Activating of Emotional Memories

    E-Print Network [OSTI]

    Rogerson, Thomas William Arundel

    2013-01-01

    Secondly, synaptic allocation functions to allocate memorieswhile neuronal allocation functions to allocate memories onwill be how memory allocation functions in the formation of

  2. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  3. The extreme vulnerability of interdependent spatially embedded networks

    E-Print Network [OSTI]

    Bashan, Amir; Buldyrev, Sergey V; Havlin, Shlomo

    2015-01-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, while below this "critical dependency" (CD) a failure of few nodes leads only to small damage to the system. So far, the research has been focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically analyze the stability of systems consisting of interdependent spatially embedded networks modeled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no CD and \\textit{any} small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of t...

  4. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  5. Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State University

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State Discovery Models (VDMs) have been proposed to model vulnerability discovery and have has been fitted discovery process, presenting a static approach to estimating the initial values of one of the VDM

  6. VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA RICA

    E-Print Network [OSTI]

    VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA and Earth Observation (ITC) Enschede Netherlands Figure 5.4. Damage maps for #12;Vulnerability Analysis And Risk Assessment For Seismic And Flood Hazard In Turialba City, Costa Rica By Muh Aris Marfai and Jacob

  7. Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset-based approach

    E-Print Network [OSTI]

    Krivobokova, Tatyana

    Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset vulnerability to poverty and livelihood choices in small-scale fishing areas. The use of an asset on natural resources for their livelihoods, such as fishing, are often marginalized or ignored in national

  8. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  9. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  10. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Hu, Fei

    of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE on supervisory control and data acquisition (SCADA) systems. Compliance of the require- ment to meet the standard a vulnerability assessment framework to systemat- ically evaluate the vulnerabilities of SCADA systems at three

  11. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  12. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  13. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  14. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    ). · Identify most prominent vulnerabilities of the units to RF direct injection and irradiation, and examine and fabricated and the packaged chips were placed on the boards with matching elements for RF injection. The RF vulnerabilities are examined both by simulation and experimental injection of RF at the MOSFETGate, Drain, Source

  15. Memory cost of quantum protocols

    E-Print Network [OSTI]

    Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

    2011-12-16

    In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

  16. Hipikat: A Project Memory for Software Development

    E-Print Network [OSTI]

    van der Hoek, André

    Hipikat: A Project Memory for Software Development Davor CCubranicc, Gail C. Murphy, Member, IEEE's usefulness in software modification tasks. One study evaluated the usefulness of Hipikat's recommendations Terms--Software development teams, project memory, software artifacts, recommender system, user studies

  17. Hardware support for unbounded transactional memory

    E-Print Network [OSTI]

    Lie, Sean, 1980-

    2004-01-01

    In this thesis, I propose a design for hardware transactional memory where the transaction size is not bounded by a specialized hardware buffer such as a cache. I describe an unbounded transactional memory system called ...

  18. E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing

    E-Print Network [OSTI]

    Scott, Michael L.

    E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing Nikolaos Hardavellas@cs.rochester.edu Abstract Memory-mapped network interfaces provide users with fast and cheap access to remote memory access capabilities of these networks suggest the need to re-evaluate the assumptions underlying

  19. Brain&oscillations&mediate&memory&suppression&1! Running&Title:&BRAIN&OSCILLATIONS&MEDIATE&MEMORY&SUPPRESSION&

    E-Print Network [OSTI]

    Schubart, Christoph

    Brain&oscillations&mediate&memory&suppression&1! & ! Running&Title:&BRAIN&OSCILLATIONS&MEDIATE&MEMORY&SUPPRESSION& & & Brain&oscillations&mediate&successful&suppression&of&unwanted&memories& Gerd&T.&Waldhauser1,&Karl1Heinz.de& Phone:&+49(0)753118815707& Fax:&+49(0)753118814829& #12;Brain&oscillations&mediate&memory&suppression&2

  20. Memory with memory: Soft assignment in Genetic Programming

    E-Print Network [OSTI]

    Poli, Riccardo

    that an instruction of the form x:=y or LOAD R2 R1 completely overwrites the previous value of a memory location or register. That earlier value is lost forever, and has no impact on the future be- havior of the system traditional GP). Instead of having the new value completely overwrite the old value of the register

  1. Memory with Memory: Soft Assignment in Genetic Programming

    E-Print Network [OSTI]

    Fernandez, Thomas

    that an instruction of the form x:=y or LOAD R2 R1 completely overwrites the previous value of a memory location or register. That earlier value is lost forever, and has no impact on the future be- havior of the system traditional GP). Instead of having the new value completely overwrite the old value of the register

  2. Memory Optimization for Phase-field Simulations

    SciTech Connect (OSTI)

    Derek Gaston; John Peterson; Andrew Slaughter; Cody Permann; David Andrs

    2014-08-01

    Phase-field simulations are computationally and memory intensive applications. Many of the phase-field simulations being conducted in support of NEAMS were not capable of running on “normal clusters” with 2-4GB of RAM per core, and instead required specialized “big-memory” clusters with 64GB per core. To address this issue, the MOOSE team developed a new Python-based utility called MemoryLogger, and applied it to locate, diagnose, and eradicate memory bottlenecks within the MOOSE framework. MemoryLogger allows for a better understanding of the memory usage of an application being run in parallel across a cluster. Memory usage information is captured for every individual process in a parallel job, and communicated to the head node of the cluster. Console text output from the application itself is automatically matched with this memory usage information to produce a detailed picture of memory usage over time, making it straightforward to identify the subroutines which contribute most to the application’s peak memory usage. The information produced by the MemoryLogger quickly and effectively narrows the search for memory optimizations to the most data-intensive parts of the simulation.

  3. DESIGNING EFFICIENT MEMORY FOR FUTURE COMPUTING SYSTEMS

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    , limited pin counts, increasing heterogeneity and complexity, and the diminished importance of cost main memory system with the following innovative features: (i) overfetch-aware re-organized chips, (ii) low-cost silicon photonic memory channels, (iii) largely autonomous memory modules with a packet

  4. Configurable memory system and method for providing atomic counting operations in a memory device

    DOE Patents [OSTI]

    Bellofatto, Ralph E. (Ridgefield, CT); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Ohmacht, Martin (Yorktown Heights, NY)

    2010-09-14

    A memory system and method for providing atomic memory-based counter operations to operating systems and applications that make most efficient use of counter-backing memory and virtual and physical address space, while simplifying operating system memory management, and enabling the counter-backing memory to be used for purposes other than counter-backing storage when desired. The encoding and address decoding enabled by the invention provides all this functionality through a combination of software and hardware.

  5. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  6. Phenomenological memory-kernel master equations and time-dependent Markovian processes

    E-Print Network [OSTI]

    L. Mazzola; E. -M. Laine; H. -P. Breuer; S. Maniscalco; J. Piilo

    2011-03-03

    Do phenomenological master equations with memory kernel always describe a non-Markovian quantum dynamics characterized by reverse flow of information? Is the integration over the past states of the system an unmistakable signature of non-Markovianity? We show by a counterexample that this is not always the case. We consider two commonly used phenomenological integro-differential master equations describing the dynamics of a spin 1/2 in a thermal bath. By using a recently introduced measure to quantify non-Markovianity [H.-P. Breuer, E.-M. Laine, and J. Piilo, Phys. Rev. Lett. 103, 210401 (2009)] we demonstrate that as far as the equations retain their physical sense, the key feature of non-Markovian behavior does not appear in the considered memory kernel master equations. Namely, there is no reverse flow of information from the environment to the open system. Therefore, the assumption that the integration over a memory kernel always leads to a non-Markovian dynamics turns out to be vulnerable to phenomenological approximations. Instead, the considered phenomenological equations are able to describe time-dependent and uni-directional information flow from the system to the reservoir associated to time-dependent Markovian processes.

  7. Shape memory alloy/shape memory polymer tools

    DOE Patents [OSTI]

    Seward, Kirk P.; Krulevitch, Peter A.

    2005-03-29

    Micro-electromechanical tools for minimally invasive techniques including microsurgery. These tools utilize composite shape memory alloy (SMA), shape memory polymer (SMP) and combinations of SMA and SMP to produce catheter distal tips, actuators, etc., which are bistable. Applications for these structures include: 1) a method for reversible fine positioning of a catheter tip, 2) a method for reversible fine positioning of tools or therapeutic catheters by a guide catheter, 3) a method for bending articulation through the body's vasculature, 4) methods for controlled stent delivery, deployment, and repositioning, and 5) catheters with variable modulus, with vibration mode, with inchworm capability, and with articulated tips. These actuators and catheter tips are bistable and are opportune for in vivo usage because the materials are biocompatible and convenient for intravascular use as well as other minimal by invasive techniques.

  8. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  9. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  10. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  11. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica 

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20

    relationships between selected characteristics of adopter innovativeness and farmer vulnerability level. Random sampling was used to select participants (N=52). Personal interviews were conducted with farmers using an instrument consisting of LVI components...

  12. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to ...

  13. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    C Lisp Scala Scheme Erlang SQL Lua 17.  Please enter your Ernst. Automatic Creation of SQL Injection and Cross-SiteXSS and first-order SQL injection vulnerabilities (i.e. ,

  14. Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian Universities

    E-Print Network [OSTI]

    Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian universities, among these causes of weaknesses was: weak interest in the Arab world in general scientific

  15. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  16. In vivo Raman spectral pathology of human atherosclerosis and vulnerable plaque

    E-Print Network [OSTI]

    Motz, Jason T.

    The rupture of vulnerable atherosclerotic plaque accounts for the majority of clinically significant acute cardiovascular events. Because stability of these culprit lesions is directly related to chemical and morphological ...

  17. Public health implications of hot summer days and vulnerability indexes in Massachusetts

    E-Print Network [OSTI]

    Reeves, Halley Brunsteter

    2015-01-01

    Due to ever-increasing summer temperatures and a population with minimal technological adaptations to help them cope, extreme heat events will likely have a large impact on vulnerable populations in Massachusetts. As such, ...

  18. Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss Model

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss to be surveyed and defined. Within this context the State of Florida has created the Florida Public Hurricane

  19. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  20. A case study of social vulnerability mapping: issues of scale and aggregation 

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15

    phenomena to anthropogenic calamities (Burton, Kates, and White 1993). The effects of these environmental hazards can change where and how a population develops (Van der Veen and Logtmeijer 2005). A challenge for geographers is locating vulnerable... populations, and calculating what makes these populations susceptible to harm from environmental hazards before a calamity happens. This study examines the challenges of mapping and calculating social vulnerability by expanding on concepts and knowledge...

  1. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  2. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  3. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  4. Children with disabilities in the context of disaster: A social vulnerability perspective 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    that various factors may con- tribute to the physical, psychological, and educational vulnerability of children with disabilities in disaster, including higher poverty rates, elevated risk exposure, greater vulnerability to traumatic loss or separation from...- tions of the article draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a...

  5. Galen Sasaki EE 361 University of Hawaii 1 Memory technologies

    E-Print Network [OSTI]

    Sasaki, Galen H.

    1 Galen Sasaki EE 361 University of Hawaii 1 Memory · Memory technologies · Memory hierarchy of Hawaii 2 Memory Technologies · Read Only Memory (ROM) · Static RAM (SRAM) ­ Basic cell: clocked D latch) ­ Basic cell ­ Faster DRAM, e.g. synchronous DRAM #12;2 Galen Sasaki EE 361 University of Hawaii 3 ROM

  6. Quantum memories: emerging applications and recent advances

    E-Print Network [OSTI]

    Khabat Heshami; Duncan G. England; Peter C. Humphreys; Philip J. Bustard; Victor M. Acosta; Joshua Nunn; Benjamin J. Sussman

    2015-11-12

    Quantum light-matter interfaces are at the heart of photonic quantum technologies. Quantum memories for photons are a prominent consequence of superb control over interactions between light and matter, where non-classical states of photons are mapped onto stationary matter states and preserved for subsequent retrieval into photonic excitations. The ability of quantum memories to synchronize probabilistic events makes them a key component in quantum repeaters and quantum computation based on linear optics. This has motivated several groups to dedicate theoretical and experimental research to develop quantum memory devices. In recent years, exciting new applications and more advanced developments of quantum memories have proliferated. In this review, we outline some of the emerging applications of quantum memories in optical signal processing, quantum computation, and nonlinear optics. We review recent experimental and theoretical developments, and their impacts on more advanced photonic quantum technologies based on quantum memories.

  7. Raman Quantum Memory of Photonic Polarised Entanglement

    E-Print Network [OSTI]

    Dong-Sheng Ding; Wei Zhang; Zhi-Yuan Zhou; Shuai Shi; Bao-Sen Shi; Guang-Can Guo

    2014-11-06

    Quantum entanglement of particles is regarded as a fundamental character in quantum information, in which quantum state should be given for whole system instead of independently describing single particle. Constructing quantum memory of photonic entanglement is essential for realizing quantum networks, which had been performed previously by many memory protocols. Of which Raman quantum memory gives advantages in broadband and high-speed properties, resulting in huge potential in quantum network and quantum computation. However, Raman quantum memory of photonic polarised entanglement is a challenge work and still missing. Here, we report two Raman quantum memories based on gas atomic ensembles: 1. Heralded Raman quantum memory of hybrid entanglement of path and polarization of single photon. 2. Raman storage of two-particle photonic polarised entangled state. Our experimental performances of these two different Raman quantum storages of photonic entanglement show a very promising prospective in quantum information science.

  8. Memorandum Memorializing Ex Parte Communication, DOE impending...

    Energy Savers [EERE]

    Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. Memorandum Memorializing Ex Parte Communication, DOE impending...

  9. Improving Memory Error Handling Using Linux

    SciTech Connect (OSTI)

    Carlton, Michael Andrew [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Blanchard, Sean P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Debardeleben, Nathan A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-07-25

    As supercomputers continue to get faster and more powerful in the future, they will also have more nodes. If nothing is done, then the amount of memory in supercomputer clusters will soon grow large enough that memory failures will be unmanageable to deal with by manually replacing memory DIMMs. "Improving Memory Error Handling Using Linux" is a process oriented method to solve this problem by using the Linux kernel to disable (offline) faulty memory pages containing bad addresses, preventing them from being used again by a process. The process of offlining memory pages simplifies error handling and results in reducing both hardware and manpower costs required to run Los Alamos National Laboratory (LANL) clusters. This process will be necessary for the future of supercomputing to allow the development of exascale computers. It will not be feasible without memory error handling to manually replace the number of DIMMs that will fail daily on a machine consisting of 32-128 petabytes of memory. Testing reveals the process of offlining memory pages works and is relatively simple to use. As more and more testing is conducted, the entire process will be automated within the high-performance computing (HPC) monitoring software, Zenoss, at LANL.

  10. Exploiting Data Similarity to Reduce Memory Footprints

    SciTech Connect (OSTI)

    Biswas, S; de Supinski, B R; Schulz, M; Franklin, D; Sherwood, T; Chong, F T

    2011-01-28

    Memory size has long limited large-scale applications on high-performance computing (HPC) systems. Since compute nodes frequently do not have swap space, physical memory often limits problem sizes. Increasing core counts per chip and power density constraints, which limit the number of DIMMs per node, have exacerbated this problem. Further, DRAM constitutes a significant portion of overall HPC system cost. Therefore, instead of adding more DRAM to the nodes, mechanisms to manage memory usage more efficiently - preferably transparently - could increase effective DRAM capacity and thus the benefit of multicore nodes for HPC systems. MPI application processes often exhibit significant data similarity. These data regions occupy multiple physical locations across the individual rank processes within a multicore node and thus offer a potential savings in memory capacity. These regions, primarily residing in heap, are dynamic, which makes them difficult to manage statically. Our novel memory allocation library, SBLLmalloc, automatically identifies identical memory blocks and merges them into a single copy. SBLLmalloc does not require application or OS changes since we implement it as a user-level library. Overall, we demonstrate that SBLLmalloc reduces the memory footprint of a range of MPI applications by 32.03% on average and up to 60.87%. Further, SBLLmalloc supports problem sizes for IRS over 21.36% larger than using standard memory management techniques, thus significantly increasing effective system size. Similarly, SBLLmalloc requires 43.75% fewer nodes than standard memory management techniques to solve an AMG problem.

  11. Shape memory response of ni2mnga and nimncoin magnetic shape memory alloys under compression 

    E-Print Network [OSTI]

    Brewer, Andrew Lee

    2009-05-15

    In this study, the shape memory response of Ni2MnGa and NiMnCoIn magnetic shape memory alloys was observed under compressive stresses. Ni2MnGa is a magnetic shape memory alloy (MSMA) that has been shown to exhibit fully ...

  12. Integration of Non-volatile Memory into Storage Hierarchy 

    E-Print Network [OSTI]

    Qiu, Sheng

    2013-12-04

    In this dissertation, we present novel approaches for integrating non-volatile memory devices into storage hierarchy of a computer system. There are several types of non- volatile memory devices, such as flash memory, Phase ...

  13. Grain constraint and size effects in shape memory alloy microwires

    E-Print Network [OSTI]

    Ueland, Stian Melhus

    2013-01-01

    Shape memory alloys exhibit interesting and useful properties, such as the shape memory effect and superelasticity. Among the many alloy families that have been shown to exhibit shape memory properties the ones based on ...

  14. Saving Energy This Memorial Day | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Saving Energy This Memorial Day Saving Energy This Memorial Day May 19, 2014 - 4:07pm Addthis Be energy efficient while you spend time outside this Memorial Day. | Photo courtesy...

  15. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may

    E-Print Network [OSTI]

    Garfunkel, Eric

    and Developmental Biology Cellular and Molecular Pharmacology Biomedical Engineering Exposure Science and Assessment, the single worldwide repository for 3D protein structures. #12;Graduate School of Biomedical Sciences Typical and Development in May 2014 "Coordination of tRNA transcription with export at nuclear pore complexes in budding

  16. Design Space and Performance Analysis of the Hybrid Memory Cube The Hybrid Memory Cube is an emerging main memory

    E-Print Network [OSTI]

    Jacob, Bruce

    be operated at higher throughput and lower energy per bit compared to traditional DDRx memory. This technology's performance, we compare the execution of HMC, Buffer-on-Board, and quad channel DDR3-1600 main memory systems full-system execution time over an extremely aggressive quad channel DDR3-1600 system by a factor

  17. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    DOE Patents [OSTI]

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  18. Extra-Large Memory Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah Evan-5 BeamlineGE, Ford,Extra-Large Memory

  19. Memory-2014-salishan.key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on dark matter By SarahMODELINGMeetingsMembranesMemorial Day

  20. Building Green in Greensburg: Kiowa County Memorial Hospital...

    Energy Savers [EERE]

    Kiowa County Memorial Hospital Building Green in Greensburg: Kiowa County Memorial Hospital This poster highlights energy efficiency, renewable energy, and sustainable features of...

  1. LOW-POWER METHODOLOGY FOR FAULT TOLERANT NANOSCALE MEMORY DESIGN

    E-Print Network [OSTI]

    Kim, Seokjoong

    2012-01-01

    Outline . . . . . . . . . . . . . . . . . . . . . . . Low-Methodologies for Low-Power Memory . . . . . . . . . . . . .Scaling for SEU-Tolerance in Low-Power Memories 7.1 Soft-

  2. Y-12 historian assists in Lincoln Memorial University display...

    National Nuclear Security Administration (NNSA)

    assists in Lincoln Memorial University display design NNSA Blog Y-12 historian Ray Smith, left, joins Lincoln Memorial University board of trustees chairman Pete DeBusk in...

  3. NS201: Learning and Memory (8 Lectures)

    E-Print Network [OSTI]

    Murthy, Aditya

    and Argument Is it unique to humans ? #12;Birth of animal models and search for memory Karl Lashley Trained are not the same #12;The Standard Model and Memory Systems Squire and Zola (PNAS) #12;Priming What are the two Spontaneous Recovery: CR regains with mild presentation of US Renewal : (TBD under contextual conditioni

  4. Mechanisms underlying working memory for novel information

    E-Print Network [OSTI]

    Hasselmo, Michael

    Mechanisms underlying working memory for novel information Michael E. Hasselmo and Chantal E. Stern Cummington St, Boston, MA 02215, USA In this Opinion article we describe a theory that the brain mechanisms modeling indicates that mechanisms for maintaining novel information in working memory could differ from

  5. Designing asymmetric neural networks with associative memory

    SciTech Connect (OSTI)

    Zhao Hong [Department of Physics, Xiamen University, Xiamen 361005 (China)

    2004-12-01

    A strategy for designing asymmetric neural networks of associative memory with controllable degree of symmetry and controllable basins of attraction is presented. It is shown that the performance of the networks depends on the degree of the symmetry, and by adjusting the degree of the symmetry the spurious memories or unwanted attractors can be suppressed completely.

  6. MEMORY HIERARCHY DESIGN FOR STREAM A DISSERTATION

    E-Print Network [OSTI]

    Dally, William J.

    . Prior research has shown that stream processors provide an energy-efficient, programmable approachMEMORY HIERARCHY DESIGN FOR STREAM COMPUTING A DISSERTATION SUBMITTED TO THE DEPARTMENT of memory and bandwidth hierarchy utilization in stream processors. We first evaluate the appropriate

  7. Android Malware Analysis Based On Memory Forensics

    E-Print Network [OSTI]

    Levente, Buttyán

    Android Malware Analysis Based On Memory Forensics Andr´as Gazdag and Levente Butty´an Laboratory for the Android platform using a memory forensics approach. We explore the required modification of the Android gathered from the analysis steps we present a methodology of behaviour analysis of android applications

  8. Energy Splitting Theorems for Materials with Memory

    E-Print Network [OSTI]

    Antonino Favata; Paolo Podio-Guidugli; Giuseppe Tomassetti

    2009-07-30

    We extend to materials with fading memory and materials with internal variables a result previously established by one of us for materials with instantaneous memory: the additive decomposability of the total energy into an internal and a kinetic part, and a representation of the latter and the inertial forces in terms of one and the same mass tensor.

  9. Tier identification (TID) for tiered memory characteristics

    DOE Patents [OSTI]

    Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

    2014-03-25

    A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

  10. Memorial University of Newfoundland Indirect Costs Report

    E-Print Network [OSTI]

    deYoung, Brad

    Memorial University of Newfoundland Indirect Costs Report 2012-13 The grant provided through the Government of Canada Indirect Costs Program (ICP) is essential to Memorial's research success. Funding and impact can be found in the following section. Total 2013 Indirect Costs Grant: $4,318,814 Management

  11. Performing an allreduce operation using shared memory

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Dozsa, Gabor (Ardsley, NY); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2012-04-17

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  12. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J; Dozsa, Gabor; Ratterman, Joseph D; Smith, Brian E

    2014-06-10

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  13. Memory effects in turbulent transport

    E-Print Network [OSTI]

    Alexander Hubbard; Axel Brandenburg

    2009-11-13

    In the mean-field theory of magnetic fields, turbulent transport, i.e. the turbulent electromotive force, is described by a combination of the alpha effect and turbulent magnetic diffusion, which are usually assumed to be proportional respectively to the mean field and its spatial derivatives. For a passive scalar there is just turbulent diffusion, where the mean flux of concentration depends on the gradient of the mean concentration. However, these proportionalities are approximations that are valid only if the mean field or the mean concentration vary slowly in time. Examples are presented where turbulent transport possesses memory, i.e. where it depends crucially on the past history of the mean field. Such effects are captured by replacing turbulent transport coefficients with time integral kernels, resulting in transport coefficients that depend effectively on the frequency or the growth rate of the mean field itself. In this paper we perform numerical experiments to find the characteristic timescale (or memory length) of this effect as well as simple analytical models of the integral kernels in the case of passive scalar concentrations and kinematic dynamos. The integral kernels can then be used to find self-consistent growth or decay rates of the mean fields. In mean-field dynamos the growth rates and cycle periods based on steady state values of alpha effect and turbulent diffusivity can be quite different from the actual values.

  14. Supporting data for: "The Lifetime of Android API vulnerabilities:case study on the JavaScript-to-Java interface"

    E-Print Network [OSTI]

    Thomas, Daniel R.; Coudray, Thomas; Sutcliffe, Tom

    2015-05-26

    _norm(vulnerable, total_file, condition, prefix, installed, prob, vulnerability_discovered, data_collected): norm_file = '{prefix}_{condition}_{installed}_{prob}-norm.csv'.format( prefix=prefix, condition=condition, prob=prob, installed=installed) with open... (total_file) as f: total = count_total(f) norm = OrderedDict() averagable_values = [] for day, count in vulnerable.items(): normed_value = count / total[day] if day >= vulnerability_discovered and day = data_collected: averagable_values.append(normed_value) norm...

  15. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities

  16. Disaggregated Memory for Expansion and Sharing in Blade Servers

    E-Print Network [OSTI]

    Wenisch, Thomas F.

    1 Disaggregated Memory for Expansion and Sharing in Blade Servers Kevin Lim*, Jichuan Chang-memory co-location on a single system and details the design of a new general-purpose architectural building block--a memory blade--that allows memory to be "disaggregated" across a system ensemble. This remote

  17. Galen Sasaki EE 361 University of Hawaii 1 Memory technologies

    E-Print Network [OSTI]

    Sasaki, Galen H.

    Galen Sasaki EE 361 University of Hawaii 1 Memory · Memory technologies · Memory hierarchy ­ Cache basics ­ Cache variations ­ Virtual memory · Synchronization Galen Sasaki EE 361 University of Hawaii 2 cell ­ Faster DRAM, e.g. synchronous DRAM #12;Galen Sasaki EE 361 University of Hawaii 3 ROM · Random

  18. Memory Power Management via Dynamic Voltage/Frequency Scaling

    E-Print Network [OSTI]

    Mutlu, Onur

    *Dual 4-core Intel Xeon®, 48GB DDR3 (12 DIMMs), SPEC CPU2006, all cores active. Measured AC power, analytically modeled memory power. #12;Existing Solution: Memory Sleep States? n Most memory energy for SPEC CPU2006 #12;Memory Power can be Scaled Down n DDR can operate at multiple frequencies à

  19. Pseudo Functional Path Delay Test through Embedded Memories 

    E-Print Network [OSTI]

    Gao, Yukun

    2015-04-29

    On-chip memory arrays are widely used in systems-on-chip. Prior research has shown that timing critical paths often go through these memories. Embedded memories are typically tested using memory built-in self-test and macro test. However...

  20. Memory search and the neural representation of context

    E-Print Network [OSTI]

    Polyn, Sean

    the most important behavioral observation in memory search is the finding that recent events are remembered

  1. 11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-are-vulnerable-to-slackers/#comment-8042

    E-Print Network [OSTI]

    West, Stuart

    11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers « Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-NonCommercial- ShareAlike 2.5 License. Carnivals #12;11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers

  2. Non-volatile memory for checkpoint storage

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.; Coteus, Paul W.; Gara, Alan; Heidelberger, Philip; Jeanson, Mark J.; Kopcsay, Gerard V.; Ohmacht, Martin; Takken, Todd E.

    2014-07-22

    A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, the non-volatile memory is a pluggable flash memory card.

  3. Securing non-volatile memory regions

    DOE Patents [OSTI]

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    2013-08-20

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  4. Low Latency Messages on Distributed Memory Multiprocessors

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rosing, Matt; Saltz, Joel

    1995-01-01

    This article describes many of the issues in developing an efficient interface for communication on distributed memory machines. Although the hardware component of message latency is less than 1 ws on many distributed memory machines, the software latency associated with sending and receiving typed messages is on the order of 50 ?s. The reason for this imbalance is that the software interface does not match the hardware. By changing the interface to match the hardware more closely, applications with fine grained communication can be put on these machines. This article describes several tests performed and many of the issues involvedmore »in supporting low latency messages on distributed memory machines.« less

  5. Direct access inter-process shared memory

    DOE Patents [OSTI]

    Brightwell, Ronald B; Pedretti, Kevin; Hudson, Trammell B

    2013-10-22

    A technique for directly sharing physical memory between processes executing on processor cores is described. The technique includes loading a plurality of processes into the physical memory for execution on a corresponding plurality of processor cores sharing the physical memory. An address space is mapped to each of the processes by populating a first entry in a top level virtual address table for each of the processes. The address space of each of the processes is cross-mapped into each of the processes by populating one or more subsequent entries of the top level virtual address table with the first entry in the top level virtual address table from other processes.

  6. Electoral Corruption in Developing Democracies

    E-Print Network [OSTI]

    Cantu, Francisco

    Results . . . . . 5.2 Venezuela . . . . . . . . .5.2.1Results for each Forensic Analysis in Mexico, Venezuela andelections in Venezuela. . . . . . . . . . . . . . . . . . .

  7. The Cambridge Car Memory Test: A task matched in format to the Cambridge Face Memory Test, with norms, reliability,

    E-Print Network [OSTI]

    Duchaine, Bradley C.

    The Cambridge Car Memory Test: A task matched in format to the Cambridge Face Memory Test a prosopagnosic shows a face-specific or object- general deficit). Here, we present such a task. Our Cambridge Car higher than the mean for females. We demonstrate independence between face memory and car memory

  8. Space applications of shape memory alloys 

    E-Print Network [OSTI]

    Godard, Olivier Jean

    2002-01-01

    This work presents an investigation of two new possible space applications of shape memory alloys. The first application uses these alloys as active devices to optimally reorient solar panels in space. The thermal issues related to the actuation...

  9. An optical simulation of shared memory

    SciTech Connect (OSTI)

    Goldberg, L.A.; Matias, Y.; Rao, S.

    1994-06-01

    We present a work-optimal randomized algorithm for simulating a shared memory machine (PRAM) on an optical communication parallel computer (OCPC). The OCPC model is motivated by the potential of optical communication for parallel computation. The memory of an OCPC is divided into modules, one module per processor. Each memory module only services a request on a timestep if it receives exactly one memory request. Our algorithm simulates each step of an n lg lg n-processor EREW PRAM on an n-processor OCPC in O(lg lg n) expected delay. (The probability that the delay is longer than this is at most n{sup {minus}{alpha}} for any constant {alpha}). The best previous simulation, due to Valiant, required {Theta}(lg n) expected delay.

  10. An autoassociative model of recovery in memory 

    E-Print Network [OSTI]

    Cohen, Andrew L

    1996-01-01

    A model of memory is presented. The model is a neural system which utilizes an autoassociator trained via the Buhmann learning rule. Context plays a central role in the storage and recovery of stored items. Context is ...

  11. Commercialization of germanium based nanocrystal memory

    E-Print Network [OSTI]

    Seow, Kian Chiew

    2007-01-01

    This thesis explores the commercialization of germanium-based nanocrystal memories. Demand for smaller and faster electronics and embedded systems supports the development of high-density, low-power non-volatile electronic ...

  12. Hypergraph Partitioning for Automatic Memory Hierarchy Management

    SciTech Connect (OSTI)

    Krishnamoorthy, Sriram; Catalyurek, Umit; Nieplocha, Jarek; Rountev, Atanas; Sadayappan, Ponnuswamy

    2007-11-15

    The paper presents present a mechanism for automatic management of the memory hierarchy, including secondary storage, in the context of a global address space parallel programming framework. The programmer specifies the parallelism and locality in the computation. The scheduling of the computation into stages, together with the movement of the associated data between secondary storage and global memory, and between global memory and local memory, is automatically managed by the framework. A novel formulation of hypergraph partitioning is used to model the optimization problem of minimizing disk I/O by improving locality of access. Experimental evaluation of the proposed approach using a sub-computation from the quantum chemistry domain shows a reduction in the disk I/O cost by upto a factor of 11, and a reduction in turnaround time by upto 97%, as compared to alternatives used in state-of-the-art quantum chemistry codes.

  13. Size Effects in Ferromagnetic Shape Memory Alloys 

    E-Print Network [OSTI]

    Ozdemir, Nevin

    2012-07-16

    The utilization of ferromagnetic shape memory alloys (FSMAs) in small scale devices has attracted considerable attention within the last decade. However, the lack of sufficient studies on their reversible shape change ...

  14. Allegories of Modernity, Geographies of Memory 

    E-Print Network [OSTI]

    Jeon, Seenhwa

    2012-10-19

    with local and national history as alternative history lessons and challenges the Idea of Progress by revisiting sites of traumatic memory. Midnight's Children constructs counter-stories of Post-Independence India as multiple alternatives to one official...

  15. Memorial University Counselling Centre Professional Psychology

    E-Print Network [OSTI]

    Oyet, Alwell

    1 Memorial University Counselling Centre Doctoral Professional Psychology Residency Programme 2013-2014 Accredited by the Canadian Psychological Association www of Counseling Services (IACS) www.iacsinc.org Participating Member: Canadian Council of Professional Psychology

  16. Directoryless shared memory coherence using execution migration

    E-Print Network [OSTI]

    Lis, Mieszko

    We introduce the concept of deadlock-free migration-based coherent shared memory to the NUCA family of architectures. Migration-based architectures move threads among cores to guarantee sequential semantics in large ...

  17. Orthopaedic applications of ferromagnetic shape memory alloys

    E-Print Network [OSTI]

    Guo, Weimin, M. Eng. Massachusetts Institute of Technology

    2008-01-01

    Ferromagnetic shape memory alloys (FSMAs) are a new class of magnetic field-actuated active materials with no current commercial applications. By applying a magnetic field of around 0.4 T, they can exert a stress of ...

  18. Characterizing Flash Memory: Anomalies, Observations, and Applications

    E-Print Network [OSTI]

    Siegel, Paul H.

    these characteris- tics. Flash manufacturers provide conservative guidelines about these metrics, and this lack characteris- tics. To be successful, we must understand the trade-offs between flash memory's performance

  19. Housing memory: architecture, materiality and time 

    E-Print Network [OSTI]

    Spanou, Sofia-Irini

    2008-01-01

    , and cognition – and their intricate relationships with material culture, especially architecture, landscapes, practical action and social life, the aim is to suggest a theoretical and methodological framework within which to explore how memory of the past...

  20. Thermomechanical modeling of a shape memory polymer 

    E-Print Network [OSTI]

    Ghosh, Pritha B.

    2009-05-15

    The aim of this work is to demonstrate a Helmholtz potential based approach for the development of the constitutive equations for a shape memory polymer undergoing a thermomechanical cycle. The approach is motivated by the use of a simple spring...

  1. Computing and Informatics, Vol. , , 113, V 2011-May-18 VULNERABILITY ASSESSMENT ENHANCEMENT

    E-Print Network [OSTI]

    Miller, Barton P.

    systems usually do not undergo a thorough vulnerability assessment during their life cycle or after de FOR MIDDLEWARE FOR COMPUTING AND INFORMATICS Jairo Serrano, Elisa Heymann, Eduardo Cesar Computer Architecture that is insufficiently addressed in most ex- isting grid and cloud projects, even SCADA systems. Such projects use

  2. Climate change vulnerability of forest biodiversity: climate and competition tracking of demographic rates

    E-Print Network [OSTI]

    Teskey, Robert O.

    al., 2002; Thomas et al., 2004; Jetz et al., 2007). Some experts argue that responses will depend insight regarding vulnerability to any one (Streng et al., 1989; Elliott & Baker, 2004; Iba´n~ez et al., 2006; Yang et al., 2006; Canham & Thomas, 2010). CIS are further complicated by the fact that current

  3. On the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design

    E-Print Network [OSTI]

    Hopper, Nicholas J.

    , the Tor network consists of roughly 2000 "Onion Routers" that voluntarily relay traffic between who can observe a Tor client's network connections and even control some Onion Routers shouldOn the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design Jon

  4. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    EXaMINE - Experimentation of a Monitoring and Control System for Managing Vulnerabilities). The general objective of the project is to design, prototype and test novel monitor- ing systems supporting-border energy trade. A system with unlimited ca- pacity of interconnection between State, Regional or even Zonal

  5. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  6. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    strength and injuries of human beings with nuclear power plant models used in probabilistic safetyVulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which

  7. American Journal of Botany 89(12): 19161924. 2002. THE VULNERABILITY TO FREEZING-INDUCED XYLEM

    E-Print Network [OSTI]

    Pockman, William T.

    1916 American Journal of Botany 89(12): 1916­1924. 2002. THE VULNERABILITY TO FREEZING, Albuquerque, New Mexico 87131-1091 USA The temperature dependence of freezing-induced xylem cavitation- rated the previously observed relationship between minimum freezing temperature and embolism. The area

  8. How a butterfly's wing can bring down Goliath / Chaos theories calculate the vulnerability of megasystems

    E-Print Network [OSTI]

    and computer expert Vickie Lynch have been computer-modeling the vulnerability of electrical grids for several ever-larger power networks to transmit electricity, experts said Thursday. When a system becomes super-power failures. "The whole grid is very strongly coupled, and when you do something in one point

  9. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  10. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  11. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak 

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  12. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    that the population of a city grows, new problems arise, which include scarcity of resources, pollution, and traffic [1]. However, bigger cities generate new kinds of problems, such as scarcity of resources, pollutionDetection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz

  13. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

  14. Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage Drop

    E-Print Network [OSTI]

    Najm, Farid N.

    Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage voltage drops on the power grid that can affect circuit timing. We propose a statistical analysis supply voltage to circuit devices is referred to as the power grid. The consequences of power grid

  15. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  16. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  17. Software mitigations to hedge AES against cachebased software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache­based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat­ forms, software side channels have become a subject of interest. Recent publications discussed cache­based software side channel

  18. Software mitigations to hedge AES against cache-based software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat- forms, software side channels have become a subject of interest. Recent publications discussed cache-based software side channel

  19. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    are built with traditional metrics of complexity, code churn, and fault history. We have performed to the code [17]. Hence, complexity metrics and code churn metrics have been used for fault prediction [5, 17 fault prediction metrics ­ complexity, code churn, and fault history metrics for vulnerability

  20. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  1. A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES

    E-Print Network [OSTI]

    Gilbes, Fernando

    A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES Juan of a disaster. Unfortunately, that is not the case for Puerto Rican coastal cities when it comes to tsunamis. Over 55% of all cities in Puerto Rico have territories in tsunami evacuation zones (TEZ); nevertheless

  2. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L; Sexton, James C

    2013-10-22

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  3. Associative memory in phasing neuron networks

    SciTech Connect (OSTI)

    Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

    2014-01-01

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  4. An electromagnetic analog of gravitational wave memory

    E-Print Network [OSTI]

    Lydia Bieri; David Garfinkle

    2013-09-10

    We present an electromagnetic analog of gravitational wave memory. That is, we consider what change has occurred to a detector of electromagnetic radiation after the wave has passed. Rather than a distortion in the detector, as occurs in the gravitational wave case, we find a residual velocity (a "kick") to the charges in the detector. In analogy with the two types of gravitational wave memory ("ordinary" and "nonlinear") we find two types of electromagnetic kick.

  5. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L.; Sexton, James C.

    2013-01-22

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  6. Aggressive children's memory for attachment relevant information 

    E-Print Network [OSTI]

    Collie, Claire Futamase

    2004-09-30

    MEMORY FOR ATTACHMENT RELEVANT INFORMATION A Dissertation by CLAIRE FUTAMASE COLLIE Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR... OF PHILOSOPHY May 2004 Major Subject: Psychology AGGRESSIVE CHILDREN?S MEMORY FOR ATTACHMENT RELEVANT INFORMATION A Dissertation by CLAIRE FUTAMASE COLLIE Submitted to Texas A&M University in partial...

  7. Gravitational wave memory in de Sitter spacetime

    E-Print Network [OSTI]

    Bieri, Lydia; Yau, Shing-Tung

    2015-01-01

    We examine gravitational wave memory in the case where sources and detector are in an expanding cosmology. For simplicity, we treat the case where the cosmology is de Sitter spacetime, and discuss the possibility of generalizing our results to the case of a more realistic cosmology. We find results very similar to those of gravitational wave memory in an asymptotically flat spacetime, but with the magnitude of the effect multiplied by a redshift factor.

  8. Post polymerization cure shape memory polymers

    DOE Patents [OSTI]

    Wilson, Thomas S; Hearon, Michael Keith; Bearinger, Jane P

    2014-11-11

    This invention relates to chemical polymer compositions, methods of synthesis, and fabrication methods for devices regarding polymers capable of displaying shape memory behavior (SMPs) and which can first be polymerized to a linear or branched polymeric structure, having thermoplastic properties, subsequently processed into a device through processes typical of polymer melts, solutions, and dispersions and then crossed linked to a shape memory thermoset polymer retaining the processed shape.

  9. Functional Genomics of Brain Aging and Alzheimer’s Disease: Focus on Selective Neuronal Vulnerability

    E-Print Network [OSTI]

    Wang, Xinkun; Michaelis, Mary L.; Michaelis, Elias K.

    2010-10-21

    Pivotal brain functions, such as neurotransmission, cognition, and memory, decline with advancing age and, especially, in neurodegenerative conditions associated with aging, such as Alzheimer’s disease (AD). Yet, deterioration in structure...

  10. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  11. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  12. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  13. BRIDGING THE GAP BETWEEN BRAIN AND BEHAVIOR: COGNITIVE AND NEURAL MECHANISMS OF EPISODIC MEMORY

    E-Print Network [OSTI]

    Fortin, Norbert J.

    memory. Key words: episodic memory, hippocampus, recollection, associations, odor discrimination, digging of cognitive neuroscience. Aristotle (1931) contended that ``other ani- mals (as well as man) have memory, but

  14. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2009-09-22

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  15. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2012-05-29

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  16. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R; Maitland, Duncan J

    2014-04-01

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  17. Space-Memory-Memory Architecture for Clos-Network Packet Switches

    E-Print Network [OSTI]

    Hamdi, Mounir

    resequencing buffers. As a result, the SMM architecture can achieve very high performance, and is readily implemented using current technology. I. INTRODUCTION The Clos network architecture [1] was first proposedSpace-Memory-Memory Architecture for Clos-Network Packet Switches Xin Li, Zhen Zhou and Mounir

  18. This article was downloaded by:[Yale University Sterling Memorial Library] [Yale University Sterling Memorial Library

    E-Print Network [OSTI]

    Richardson, Andrew D.

    , formulae and drug doses should be independently verified with primary sources. The publisher shallThis article was downloaded by:[Yale University Sterling Memorial Library] [Yale University Sterling Memorial Library] On: 11 May 2007 Access Details: [subscription number 769486266] Publisher

  19. Low-temperature coherence properties of Z_2 quantum memory

    E-Print Network [OSTI]

    Tomoyuki Morimae

    2010-01-08

    We investigate low-temperature coherence properties of the Z_2 quantum memory which is capable of storing the information of a single logical qubit. We show that the memory has superposition of macroscopically distinct states for some values of a control parameter and at sufficiently low temperature, and that the code states of this memory have no instability except for the inevitable one. However, we also see that the coherence power of this memory is limited by space and time. We also briefly discuss the RVB memory, which is an improvement of the Z_2 quantum memory, and the relations of our results to the obscured symmetry breaking in statistical physics.

  20. Emotional Arsoual and Modulation of Multiple Memory Systems: Effects of Unconditioned and Conditioned Stressors 

    E-Print Network [OSTI]

    Leong, Kah-Chung

    2014-09-18

    importantly, the different types of memory are mediated by different neuroanatomical regions. Two primary memory systems are the hippocampus-dependent cognitive memory system and the dorsolateral striatum-dependent habit memory system. Interestingly...

  1. Field effect memory alloy heat engine

    SciTech Connect (OSTI)

    Johnson, A.D.; Kirkpatrick, P.F.

    1981-08-04

    A heat engine employing a memory alloy and a force field such as gravity for converting heat energy into mechanical work is disclosed. Field effect elements are mounted on the distal ends of flexible spokes which in turn are mounted about a hub to form a rotating wheel. The memory alloy is in the form of a helix disposed about the circumference of the wheel and interconnecting the ends of adjacent spoke pairs. Heat is transferred to segments of the memory alloy on one side of the wheel so that the segments deform toward their memory shape and deflect the associated spokes toward each other. Heat is transferred away from the memory alloy segments on the opposite side so that the segments deform toward their trained shape and permit the spokes to flex apart. The concentration of field effect elements on the first side of the wheel is greater than the concentration on the other side so that the resultant force created by a remote field acts as a torque for rotating the wheel.

  2. The Aesthetics of Remembering 9/11: Towards a Transnational Typology of Memorials

    E-Print Network [OSTI]

    Gessner, Ingrid

    2015-01-01

    Memorial (Fort Carson) Connecticut Alexander R. SteinmanNursery School (Easton) Connecticut’s 9/11 Living Memorial (

  3. The Aesthetics of Remembering 9/11: Towards a Transnational Typology of Memorials

    E-Print Network [OSTI]

    Gessner, Ingrid

    2015-01-01

    Run Park The National 9/11 Pentagon Memorial Florida Friendship Park 9/11 Memorial (Redington Beach) Indian River

  4. Exploring vulnerability and interdependency of UK infrastructure using key-linkages analysis

    E-Print Network [OSTI]

    Kelly, Scott; Tyler, Peter; Crawford-Brown, Douglas

    2015-07-27

    ) Waste (£5.8 bn) Water (£29.5 bn) Grand Total (£467 bn) Public Public/Private Private 3 Figure 1: Future source of funding for different infrastructure categories in the UK 60 Source: UK National infrastructure pipeline (2013) 61... Scientist 2012). With increasing risks from extreme weather events caused by the 65 onset of climate change and a concentration of populations now living in vulnerable 66 coastal cities, river deltas and along earth quake fault-lines, the risks of damage...

  5. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  6. U-117: Potential security vulnerability has been identified with certain HP

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple Vulnerabilities

  7. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURLDepartment

  8. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerabilityLogin|

  9. Hydrodynamical random walker with chemotactic memory

    E-Print Network [OSTI]

    H. Mohammady; B. Esckandariun; A. Najafi

    2014-10-01

    A three-dimensional hydrodynamical model for a micro random walker is combined with the idea of chemotactic signaling network of E. coli. Diffusion exponents, orientational correlation functions and their dependence on the geometrical and dynamical parameters of the system are analyzed numerically. Because of the chemotactic memory, the walker shows superdiffusing displacements in all directions with the largest diffusion exponent for a direction along the food gradient. Mean square displacements and orientational correlation functions show that the chemotactic memory washes out all the signatures due to the geometrical asymmetry of the walker and statistical properties are asymmetric only with respect to the direction of food gradient. For different values of the memory time, the Chemotactic index (CI) is also calculated.

  10. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, W.L.; Vanheusden, K.J.R.; Fleetwood, D.M.; Devine, R.A.B.

    1998-11-03

    An electrically written memory element is disclosed utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element. 19 figs.

  11. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    1998-01-01

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  12. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    2000-01-01

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  13. Characterization of Shape Memory Alloys Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    1 Characterization of Shape Memory Alloys Using Artificial Neural Networks Jim Henrickson, Kenton ­ Generate Training Data ­ Train Artificial Neural Network Results Conclusion Characterization of Shape Characterization of Shape Memory Alloys Using Artificial Neural Networks Jim Henrickson, Kenton Kirkpatrick, Dr

  14. Object Co-location and Memory Reuse for Java Programs

    E-Print Network [OSTI]

    Lau, Francis C.M.

    : Memory allocator, garbage collector, mutator, Java, object co- location, memory reuse ACM Reference of a runtime system becomes increasingly signif- icant [Sun Microsystems 2003]. Our second goal is to find

  15. OpenRAM: An Open-Source Memory Compiler

    E-Print Network [OSTI]

    Butera, Jeffrey Thomas

    2013-01-01

    3 Software Implementation Main CompilerAn Open-Source Memory Compiler by Jeffrey T. Butera InAn Open-Source Memory Compiler A thesis submitted in partial

  16. Reversible neural inactivation reveals hippocampal particin several memory processesipation 

    E-Print Network [OSTI]

    Riedel, G; Micheau, J; Lam, A G M; Roloff, E.v.L.; Martin, Stephen J; Bridge, H; de Hoz, L; Poeschel, B; McCulloch, J; Morris, Richard G M

    Studies of patients and animals with brain lesions have implicated the hippocampal formation in spatial, declarative/relational and episodic types of memory. These and other types of memory consist of a series of ...

  17. Estimating memory locality for virtual machines on NUMA systems

    E-Print Network [OSTI]

    Milouchev, Alexandre (Alexandre M.)

    2013-01-01

    The multicore revolution sparked another, similar movement towards scalable memory architectures. With most machines nowadays exhibiting non-uniform memory access (NUMA) properties, software and operating systems have seen ...

  18. Fast in-memory storage systems : two aspects

    E-Print Network [OSTI]

    Mao, Yandong

    2014-01-01

    This dissertation addresses two challenges relating to in-memory storage systems. The first challenge is storing and retrieving data at a rate close to the capabilities of the underlying memory system, particularly in the ...

  19. Storage Systems for Non-volatile Memory Devices 

    E-Print Network [OSTI]

    Wu, Xiaojian

    2011-10-21

    This dissertation presents novel approaches to the use of non-volatile memory devices in building storage systems. There are many types of non-volatile memory devices, and they usually have better performance than regular magnetic hard disks...

  20. Intellectual property strategy : analysis of the flash memory industry

    E-Print Network [OSTI]

    Ogura, Tomoko H

    2006-01-01

    This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

  1. Method for refreshing a non-volatile memory

    DOE Patents [OSTI]

    Riekels, James E. (New Hope, MN); Schlesinger, Samuel (Aventura, FL)

    2008-11-04

    A non-volatile memory and a method of refreshing a memory are described. The method includes allowing an external system to control refreshing operations within the memory. The memory may generate a refresh request signal and transmit the refresh request signal to the external system. When the external system finds an available time to process the refresh request, the external system acknowledges the refresh request and transmits a refresh acknowledge signal to the memory. The memory may also comprise a page register for reading and rewriting a data state back to the memory. The page register may comprise latches in lieu of supplemental non-volatile storage elements, thereby conserving real estate within the memory.

  2. Molecular and quantum dot floating gate non-volatile memories

    E-Print Network [OSTI]

    Abdu, Hassen

    2008-01-01

    Conventional Flash memory devices face a scaling issue that will impede memory scaling beyond the 50nm node: a reliability issue involving the tunneling oxide thickness and charge retention. A possible solution is to replace ...

  3. Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture

    E-Print Network [OSTI]

    Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture Raphael compatible. Keywords: transactional memory, game theory, multicore architecture, concurrency, contention management, mechanism design, human factors 1. Introduction In traditional single core architecture

  4. Good Programming in Transactional Memory Game Theory Meets Multicore Architecture

    E-Print Network [OSTI]

    Good Programming in Transactional Memory Game Theory Meets Multicore Architecture Raphael Eidenbenz compatible. Key words: transactional memory, game theory, multicore architecture, concur- rency, contention management, mechanism design, human factors. 1 Introduction In traditional single core architecture

  5. Curating Memory: 9/11 Commemoration and Foucault's Archive 

    E-Print Network [OSTI]

    Rowe, Sara 1988-

    2012-08-17

    This study of commemoration of 9/11 on the 10th anniversary is performed at the intersection of public memory and rhetorical studies. Examining the role of the individual within public memory, this study furthers both ...

  6. Structural Thermomechanical Models for Shape Memory Alloy Components 

    E-Print Network [OSTI]

    Rao, Ashwin

    2014-04-18

    Thermally responsive shape memory alloys (SMA) demonstrate interesting properties like shape memory effect (SME) and superelasticity (SE). SMA components in the form of wires, springs and beams typically exhibit complex, nonlinear hysteretic...

  7. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore »to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  8. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  9. Paging memory from random access memory to backing storage in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

    2013-05-21

    Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

  10. DIRECTIONS FOR MEMORY HIERARCHIES AND THEIR COMPONENTS: RESEARCH AND DEVELOPMENT

    E-Print Network [OSTI]

    Smith, Alan Jay

    2011-01-01

    system should perhaps be subsumed into the overall management of the unified memory hierarchy on which the data base

  11. PHASE FIELD EQUATIONS WITH MEMORY: THE HYPERBOLIC CASE

    E-Print Network [OSTI]

    Rotstein, Horacio G.

    , memory effects, mean curvature flow, crystalline algorithms AMS subject classifications. 80A22, 74D10, 45

  12. Vulnerability in Holstein-Friesian dairy cows : risk factors for culling and effect of temperament on oestrus 

    E-Print Network [OSTI]

    Chiumia, Daniel

    2011-11-25

    The general aims of the work were to determine the factors associated with vulnerability in Holstein- Friesian dairy cows in two scenarios: A) culling and B) the effect of temperament on days to first recorded oestrus ...

  13. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  14. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  15. Shape memory behavior of ultrafine grained NiTi and TiNiPd shape memory alloys 

    E-Print Network [OSTI]

    Kockar, Benat

    2009-05-15

    The cyclic instability in shape memory characteristics of NiTi-based shape memory alloys (SMAs), such as transformation temperatures, transformation and irrecoverable strains and transformation hysteresis upon thermal and ...

  16. MPI+OPENMP IMPLEMENTATION OF MEMORY-SAVING PARALLEL PIC APPLICATIONS ON HIERARCHICAL DISTRIBUTED-SHARED MEMORY

    E-Print Network [OSTI]

    Vlad, Gregorio

    MPI+OPENMP IMPLEMENTATION OF MEMORY-SAVING PARALLEL PIC APPLICATIONS ON HIERARCHICAL DISTRIBUTED for the development of memory- saving parallel Particle-in-cell simulation codes, targeted to hierarchical distributed

  17. The nature of the working memory system underlying language processing and its relationship to the long-term memory system

    E-Print Network [OSTI]

    Fedorenko, Evelina Georgievna

    2007-01-01

    This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

  18. Energy Efficient Proactive Thermal Management in Memory Subsystem

    E-Print Network [OSTI]

    Simunic, Tajana

    Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

  19. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

    1997-01-01

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

  20. FAST SEARCH IN MAIN MEMORY DATABASES Anastasia Analyti & Sakti Pramanik *

    E-Print Network [OSTI]

    Analyti, Anastasia

    FAST SEARCH IN MAIN MEMORY DATABASES ABSTRACT Anastasia Analyti & Sakti Pramanik * Computer Science and analyze high performance hash based search methods for main memory databasea. We define optimal search in main memory databases as the search that requires at most one key comparison to locate a record

  1. Conjunctive Selection Conditions in Main Memory Kenneth A. Ross

    E-Print Network [OSTI]

    Ross, Kenneth A.

    Conjunctive Selection Conditions in Main Memory Kenneth A. Ross Columbia University kar of records. With large main memories available cheaply, systems may choose to keep the data entirely in main in main memory needs to take into account the architectural characteristics of modern processors, just

  2. An implementation of SISAL for distributed-memory architectures

    SciTech Connect (OSTI)

    Beard, P.C.

    1995-06-01

    This thesis describes a new implementation of the implicitly parallel functional programming language SISAL, for massively parallel processor supercomputers. The Optimizing SISAL Compiler (OSC), developed at Lawrence Livermore National Laboratory, was originally designed for shared-memory multiprocessor machines and has been adapted to distributed-memory architectures. OSC has been relatively portable between shared-memory architectures, because they are architecturally similar, and OSC generates portable C code. However, distributed-memory architectures are not standardized -- each has a different programming model. Distributed-memory SISAL depends on a layer of software that provides a portable, distributed, shared-memory abstraction. This layer is provided by Split-C, a dialect of the C programming language developed at U.C. Berkeley, which has demonstrated good performance on distributed-memory architectures. Split-C provides important capabilities for good performance: support for program-specific distributed data structures, and split-phase memory operations. Distributed data structures help achieve good memory locality, while split-phase memory operations help tolerate the longer communication latencies inherent in distributed-memory architectures. The distributed-memory SISAL compiler and run-time system takes advantage of these capabilities. The results of these efforts is a compiler that runs identically on the Thinking Machines Connection Machine (CM-5), and the Meiko Computing Surface (CS-2).

  3. Evaluating Memory Energy Efficiency in Parallel I/O Workloads

    E-Print Network [OSTI]

    Zhu, Yifeng

    Evaluating Memory Energy Efficiency in Parallel I/O Workloads Jianhui Yue,Yifeng Zhu , Zhao Cai the ever- widening gap between disk and processor speeds, memory energy efficiency becomes an increasingly management policies heavily influence the overall memory energy efficiency. In partic- ular, under the same

  4. Shape Memory Assisted Self-Healing Coating Xiaofan Luo

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape Memory Assisted Self-Healing Coating Xiaofan Luo and Patrick T. Mather* Department and characterization of new shape memory assisted self- healing (SMASH) coatings. The coatings feature a phase in a shape memory epoxy matrix. Mechanical damage to the coating can be self-healed via heating, which

  5. Phoenix++: Modular MapReduce for Shared-Memory Systems

    E-Print Network [OSTI]

    Kozyrakis, Christos

    Phoenix++: Modular MapReduce for Shared-Memory Systems Justin Talbot, Richard M. Yoo, and Christos This paper describes our rewrite of Phoenix, a MapReduce framework for shared-memory CMPs and SMPs. Despite successfully demonstrating the applicability of a MapReduce- style pipeline to shared-memory machines, Phoenix

  6. Guide wire extension for shape memory polymer occlusion removal devices

    SciTech Connect (OSTI)

    Maitland, Duncan J.; Small, IV, Ward; Hartman, Jonathan

    2009-11-03

    A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

  7. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, G.S.; Grafe, V.G.

    1997-10-07

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a ``fire`` signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor. 11 figs.

  8. Chronic administration of corticosterone impairs spatial reference memory before spatial working memory in rats

    E-Print Network [OSTI]

    Anderson, Brenda

    of glucocorticoids occur in numerous disorders, such as anorexia nervosa (Seed, Dixon, McCluskey, & Young, 2000) and CushingÕs syndrome (Starkman et al., 1992, 1999), as well as memory deficits in anorexia nervosa (Seed et

  9. Martensite Strain Memory in the Shape Memory Alloy Nickel-Titanium Under Mechanical Cycling

    E-Print Network [OSTI]

    Daly, Samantha

    that largely stabilize during the first loading cycle. Keywords Shape memory alloy. Nickel-Titanium . Nitinol in the recovery of mechanically-induced strains as large as 8% in Nickel-Titanium (Nitinol), a nearly equi- atomic

  10. ANTHROPOLOGY HISTORY AND MEMORY Anthropology Professors

    E-Print Network [OSTI]

    Watkins, Joseph C.

    ANTHROPOLOGY HISTORY AND MEMORY Anthropology Professors Ana Alonzo Maribel Alvarez TJ Ferguson of the Southwest ANTH 417A (MENAS) North African Societies: History, Culture and Politics ANTH 418 Southwest Land, Culture and History ANTH 475A (MAS) The Education of Latinas/Latinos Click here to search for course

  11. Enhancing Compiler Techniques for Memory Energy Optimizations

    E-Print Network [OSTI]

    that the best performance opti- mizations do not necessarily generate the best energy behavior in mem- ory. WeEnhancing Compiler Techniques for Memory Energy Optimizations Joseph Zambreno1 , Mahmut Taylan frequencies steadily rise in modern microprocessors, energy consumption is quickly joining perfor- mance

  12. Rewritable Memory by Controllable Nanopatterning of DNA

    E-Print Network [OSTI]

    Pierce, Niles A.

    ABSTRACT Fabricating a nanostructure capable of reversibly patterning molecules is a fundamental goal within nanotechnology, underlying diverse processes such as information storage, scaffold functioning of the device as rewritable memory. The bit state of each address is controlled by specific DNA

  13. MEMORY SYSTEM DESIGN FOR BUS BASED MULTIPROCESSORS

    E-Print Network [OSTI]

    Sohi, Guri S.

    -cost microprocessors have led to the construction of small- to medium-scale shared memory multipro- cessors the operating environment of the multiprocessor. Two major operating environments - throughput-oriented and speedup-oriented, are considered in this thesis. 1.2. Operating Environment of Multiprocessors 1

  14. MEMORY SYSTEM DESIGN FOR BUS BASED MULTIPROCESSORS

    E-Print Network [OSTI]

    Sohi, Guri S.

    ­cost microprocessors have led to the construction of small­ to medium­scale shared memory multipro­ cessors the operating environment of the multiprocessor. Two major operating environments ­ throughput­oriented and speedup­oriented, are considered in this thesis. 1.2. Operating Environment of Multiprocessors 1

  15. Benchmarking the Memory Hierarchy of Modern GPUs

    E-Print Network [OSTI]

    Chu, Xiaowen

    GPUs Generation Tesla Fermi Kepler Device GeForce GTX 280 GeForce GTX 560 Ti GeForce GTX 780 Compute access efficiency [11­16]. The memory hierarchies are different from those of earlier generations. Our contributions are summarized as follows: #12;Table 1. Comparison of NVIDIA Tesla, Fermi and Kepler

  16. Protist Web Alert Memories of Times Past

    E-Print Network [OSTI]

    Simpson, Larry

    Protist Web Alert Memories of Times Past The Euglenoid Project (http that the Euglenoids have always fascinated me and so did this site. Micro*scope Astrobiology Institute Web Site from reviewed this site in a previous Web Alert, but it has been revised and updated and so is worth another

  17. Entanglement preserving memory for quantum microwave

    E-Print Network [OSTI]

    Vallette, Bruno

    -in entanglement generation Flurin et al., PRL 2013 #12;memory cavity itinerant wave packet Entanglement Entanglement generation #12;itinerant wave packet Entanglement Retrieval Retrieval #12;Entanglement Retrieval) @ Saclay, France Zhu et al. Nature (2011) @ Atsugi, Japan High Q cavity Yin et al. PRL (2013) @ Santa

  18. Memory Space Representation Heterogeneous Network Process Migration

    E-Print Network [OSTI]

    Sun, Xian-He

    Memory Space Representation for Heterogeneous Network Process Migration Kasidit Chanchio Xian@bit.csc.lsu.edu http://www.csc.lsu.edu/~scs/ Abstract A major difficulty of heterogeneous process migration is how and effective for heterogeneous network process migration. 1. Introduction As network computing becomes

  19. TEXAS MEMORIAL MUSEUM Speleological Monographs, Number 7

    E-Print Network [OSTI]

    Suarez, Andrew V.

    TEXAS MEMORIAL MUSEUM Speleological Monographs, Number 7 Studies on the CAVE AND ENDOGEAN FAUNA Science Research Laboratory Museum of Texas Tech University, 3301 4th Street Lubbock, Texas 79409 U.S.A. Email: james.cokendolpher@ttu.edu and James R. Reddell Texas Natural Science Center The University

  20. Weather Report Translation using a Translation Memory

    E-Print Network [OSTI]

    Langlais, Philippe

    Weather Report Translation using a Translation Memory Thomas Leplus, Philippe Langlais and Guy to French weather report translation system. This system, which has been in operation for more than 20 years approach based on the analysis of hundreds of thousands of weather reports. We show that it is possible

  1. SEMANTIC MEMORY University of Western Ontario

    E-Print Network [OSTI]

    Jones, Michael

    . Reisberg (Ed.). The Oxford Handbook of Cognitive Psychology Ken McRae Department of Psychology Social Science Centre University of Western Ontario London, ON, Canada N6A 5C2 Email: kenm@uwo.ca Phone: (519;Semantic Memory 2 1. INTRODUCTION Concepts and meaning are fundamental components of nearly all aspects

  2. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  3. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilitiesApple has

  4. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department ofMultiple

  5. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergy

  6. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilitiesService | Department

  7. Quantum Error Correction for Quantum Memories

    E-Print Network [OSTI]

    Barbara M. Terhal

    2015-04-10

    Active quantum error correction using qubit stabilizer codes has emerged as a promising, but experimentally challenging, engineering program for building a universal quantum computer. In this review we consider the formalism of qubit stabilizer and subsystem stabilizer codes and their possible use in protecting quantum information in a quantum memory. We review the theory of fault-tolerance and quantum error-correction, discuss examples of various codes and code constructions, the general quantum error correction conditions, the noise threshold, the special role played by Clifford gates and the route towards fault-tolerant universal quantum computation. The second part of the review is focused on providing an overview of quantum error correction using two-dimensional (topological) codes, in particular the surface code architecture. We discuss the complexity of decoding and the notion of passive or self-correcting quantum memories. The review does not focus on a particular technology but discusses topics that will be relevant for various quantum technologies.

  8. Memory in Nonlinear Ionization of Transparent Solids

    SciTech Connect (OSTI)

    Rajeev, P. P.; Simova, E.; Hnatovsky, C.; Taylor, R. S.; Rayner, D. M.; Corkum, P. B.; Gertsvolf, M.; Bhardwaj, V. R.

    2006-12-22

    We demonstrate a shot-to-shot reduction in the threshold laser intensity for ionization of bulk glasses illuminated by intense femtosecond pulses. For SiO{sub 2} the threshold change serves as positive feedback reenforcing the process that produced it. This constitutes a memory in nonlinear ionization of the material. The threshold change saturates with the number of pulses incident at a given spot. Irrespective of the pulse energy, the magnitude of the saturated threshold change is constant ({approx}20%). However, the number of shots required to reach saturation does depend on the pulse energy. Recognition of a memory in ionization is vital to understand multishot optical or electrical breakdown phenomena in dielectrics.

  9. LAVA/CIS Version 2. 0: A software system for vulnerability and risk assessment

    SciTech Connect (OSTI)

    Smith, S.T.

    1990-01-01

    LAVA (the Los Alamos Vulnerability/Risk Assessment system) is an original systematic approach to risk assessment developed at the Los Alamos National Laboratory. It is an alternative to existing quantitative methods, providing an approach that is both objective and subjective, and producing results that are both quantitative and qualitative. LAVA was developed as a tool to help satisfy federal requirements for periodic vulnerability and risk assessments of a variety of systems and to satisfy the resulting need for an inexpensive, reusable, automated risk assessment tool firmly rooted in science. LAVA is a three-part systematic approach to risk assessment that can be used to model a variety of application systems such as computer security systems, communications security systems, information security systems, and others. The first part of LAVA is the mathematical model based on classical risk assessment, hierarchical multilevel system theory, decision theory, fuzzy possibility theory, expert system theory, utility theory, and cognitive science. The second part is the implementation of the mathematical risk model as a general software engine executed on a large class of personal computers. The third part is the application data sets written for a specific application system. The user of a LAVA application is not required to have knowledge of formal risk assessment techniques. All the technical expertise and specialized knowledge are built into the software engine and the application system itself. 36 refs., 5 figs.

  10. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  11. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  12. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  13. Scaling of Seismic Memory with Earthquake Size

    E-Print Network [OSTI]

    Zheng, Zeyu; Tenenbaum, Joel; Podobnik, Boris; Stanley, H Eugene

    2011-01-01

    It has been observed that the earthquake events possess short-term memory, i.e. that events occurring in a particular location are dependent on the short history of that location. We conduct an analysis to see whether real-time earthquake data also possess long-term memory and, if so, whether such autocorrelations depend on the size of earthquakes within close spatiotemporal proximity. We analyze the seismic waveform database recorded by 64 stations in Japan, including the 2011 "Great East Japan Earthquake", one of the five most powerful earthquakes ever recorded which resulted in a tsunami and devastating nuclear accidents. We explore the question of seismic memory through use of mean conditional intervals and detrended fluctuation analysis (DFA). We find that the waveform sign series show long-range power-law anticorrelations while the interval series show long-range power-law correlations. We find size-dependence in earthquake auto-correlations---as earthquake size increases, both of these correlation beha...

  14. High-speed quantum memory with thermal motion of atoms

    E-Print Network [OSTI]

    K. Tikhonov; T. Golubeva; Yu. Golubev

    2015-02-26

    We discuss the influence of atomic thermal motion on the efficiency of multimode quantum memory in two configurations: over the free expand of atoms cooled beforehand in a magneto-optical trap, and over complete mixing of atoms in a closed cell at room temperature. We consider the high-speed quantum memory, and assume that writing and retrieval are short enough, and the displacements of atoms during these stages are negligibly small. At the same time we take in account thermal motion during the storage time, which, as well known, must be much longer than durations of all the other memory processes for successful application of memory cell in communication and computation. We will analyze this influence in terms of eigenmodes of the full memory cycle and show that distortion of the eigenmodes, caused by thermal motion, leads to the efficiency reduction. We will demonstrate, that in the multimode memory this interconnection has complicated character.

  15. A prototype functional language implementation for hierarchical-memory architectures

    SciTech Connect (OSTI)

    Wolski, R.; Feo, J.; Cann, D.

    1991-06-05

    The first implementation of Sisal was designed for general shared-memory architectures. Since then, we have optimized the system for vector and coherent-cache multiprocessors. Coherent-cache systems can be thought of as simple, two-level hierarchical memory systems, where the memory hierarchy is managed by the hardware. The compiler and run-time system for such an architecture needs to maintain data locality so that the processor caches are used as much as possible. In this paper, we extend the coherent-cache implementation to include explicit compiler and run-time control for medium-grain and coarse-grain hierarchical-memory architectures. We implemented the extended system on the BBN Butterfly using interleaved shared memory exclusively for the purposes of data sharing and exploiting the per-processor local memories. We give preliminary performance results for this extended system. 10 refs., 7 figs.

  16. Near-field NanoThermoMechanical memory

    SciTech Connect (OSTI)

    Elzouka, Mahmoud; Ndao, Sidy

    2014-12-15

    In this letter, we introduce the concept of NanoThermoMechanical Memory. Unlike electronic memory, a NanoThermoMechanical memory device uses heat instead of electricity to record, store, and recover data. Memory function is achieved through the coupling of near-field thermal radiation and thermal expansion resulting in negative differential thermal resistance and thermal latching. Here, we demonstrate theoretically via numerical modeling the concept of near-field thermal radiation enabled negative differential thermal resistance that achieves bistable states. Design and implementation of a practical silicon based NanoThermoMechanical memory device are proposed along with a study of its dynamic response under write/read cycles. With more than 50% of the world's energy losses being in the form of heat along with the ever increasing need to develop computer technologies which can operate in harsh environments (e.g., very high temperatures), NanoThermoMechanical memory and logic devices may hold the answer.

  17. On admissible memory kernels for random unitary qubit evolution

    E-Print Network [OSTI]

    Filip A. Wudarski; Pawe? Nale?yty; Gniewomir Sarbicki; Dariusz Chru?ci?ski

    2015-04-12

    We analyze random unitary evolution of the qubit within memory kernel approach. We provide su?cient conditions which guarantee that the corresponding memory kernel generates physically legitimate quantum evolution. Interestingly, we are able to recover several well known examples and generate new classes of nontrivial qubit evolution. Surprisingly, it turns out that quantum evolution with memory kernel generated by our approach gives rise to vanishing non-Markovianity measure based on the distinguishability of quantum states.

  18. Lifetime of topological quantum memories in thermal environment

    E-Print Network [OSTI]

    Abbas Al-Shimary; James R. Wootton; Jiannis K. Pachos

    2012-09-13

    Here we investigate the effect lattice geometry has on the lifetime of two-dimensional topological quantum memories. Initially, we introduce various lattice patterns and show how the error-tolerance against bit-flips and phase-flips depends on the structure of the underlying lattice. Subsequently, we investigate the dependence of the lifetime of the quantum memory on the structure of the underlying lattice when it is subject to a finite temperature. Importantly, we provide a simple effective formula for the lifetime of the memory in terms of the average degree of the lattice. Finally, we propose optimal geometries for the Josephson junction implementation of topological quantum memories.

  19. Controlling the Actuation Rate of Low Density Shape Memory Polymer...

    Office of Scientific and Technical Information (OSTI)

    Controlling the Actuation Rate of Low Density Shape Memory Polymer Foams in Water Citation Details In-Document Search Title: Controlling the Actuation Rate of Low Density Shape...

  20. Miniscule Mirrored Cavities Connect Quantum Memories | U.S. DOE...

    Office of Science (SC) Website

    Miniscule Mirrored Cavities Connect Quantum Memories Basic Energy Sciences (BES) BES Home About Research Facilities Science Highlights Benefits of BES Funding Opportunities Basic...

  1. Total Recall: Detailing Nitinol's Shape-Memory Behavior | The...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    developed. Despite its industrial popularity, the underlying physics and atomistic mechanics of Nitinol have remained unclear for over 50 years. Shape-memory alloys can remember...

  2. Departure and return : abandonment, memorial and aging in Japan

    E-Print Network [OSTI]

    Danely, Jason Allen

    2008-01-01

    The four major memorial holidays (Obon, Spring Equinox ???, Autumn Equinox ??? and New Years ???) are important daysand Spring and Autumn equinox (Ohigan). Obon ?? Obon is an

  3. Memory Effects and Transport Coefficients for Non-Newtonian Fluids

    E-Print Network [OSTI]

    T. Kodama; T. Koide

    2008-12-22

    We discuss the roles of viscosity in relativistic fluid dynamics from the point of view of memory effects. Depending on the type of quantity to which the memory effect is applied, different terms appear in higher order corrections. We show that when the memory effect applies on the extensive quantities, the hydrodynamic equations of motion become non-singular. We further discuss the question of memory effect in the derivation of transport coefficients from a microscopic theory. We generalize the application of the Green-Kubo-Nakano (GKN) to calculate transport coefficients in the framework of projection operator formalism, and derive the general formula when the fluid is non-Newtonian.

  4. Consent Order, Battelle Memorial Institute - WCO-2014-01 | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued to Battelle Memorial Institute for deficiencies associated with the Chronic Beryllium Disease Prevention Program at DOE's Pacific Northwest National Laboratory. On...

  5. Development of Superelastic Effects in Ferrous Shape Memory Alloy

    E-Print Network [OSTI]

    Olson, Scott Michael

    SME: Shape memory effect Nitinol: Nickel-titanium shapelearned in optimizing Nitinol. To develop the properties ofbe recovered. Currently, Nitinol, an alloy made of nickel

  6. Neuromorphic, Digital and Quantum Computation with Memory Circuit Elements

    E-Print Network [OSTI]

    Yuriy V. Pershin; Massimiliano Di Ventra

    2011-09-28

    Memory effects are ubiquitous in nature and the class of memory circuit elements - which includes memristors, memcapacitors and meminductors - shows great potential to understand and simulate the associated fundamental physical processes. Here, we show that such elements can also be used in electronic schemes mimicking biologically-inspired computer architectures, performing digital logic and arithmetic operations, and can expand the capabilities of certain quantum computation schemes. In particular, we will discuss few examples where the concept of memory elements is relevant to the realization of associative memory in neuronal circuits, spike-timing-dependent plasticity of synapses, digital and field-programmable quantum computing.

  7. Memory Hierarchy Hardware-Software Co-design in Embedded Systems

    E-Print Network [OSTI]

    Ge, Zhiguo

    The memory hierarchy is the main bottleneck in modern computer systems as the gap between the speed of the processor and the memory continues to grow larger. The situation in embedded systems is even worse. The memory ...

  8. The maturational course of sequential memory and its relation to the development of frontal lobe functioning 

    E-Print Network [OSTI]

    Romine, Cassandra Burns

    2005-11-01

    processes by enhancing the organization of to-be-remembered information. Among the specific memory systems presumed to be based on anterior cerebral structures is the temporal organization of memory. An essential component of memory that involves temporal...

  9. Episodic future thinking and episodic counterfactual thinking: Intersections between memory and decisions

    E-Print Network [OSTI]

    Szpunar, Karl K.

    Episodic future thinking and episodic counterfactual thinking: Intersections between memory: Available online xxxx Keywords: Episodic memory Episodic future thinking Episodic counterfactual thinking into the relationship between memory and decision making. One line of research concerns episodic future thinking, which

  10. The Aesthetics of Remembering 9/11: Towards a Transnational Typology of Memorials

    E-Print Network [OSTI]

    Gessner, Ingrid

    2015-01-01

    s 9/11 Memorial Dedication. ” Jewish Press, November 25,ground” at the memorial’s dedication ceremony. 13 WhileNews equally stress the dedication to his job and his family

  11. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  12. Thermal Analysis of the Vulnerability of the Spacesuit Battery Design to Short-Circuit Conditions (Presentation)

    SciTech Connect (OSTI)

    Kim, G. H.; Chaney, L.; Smith, K.; Pesaran, A.; Darcy, E.

    2010-04-22

    NREL researchers created a mathematical model of a full 16p-5s spacesuit battery for NASA that captures electrical/thermal behavior during shorts to assess the vulnerability of the battery to pack-internal (cell-external) shorts. They found that relocating the short from battery pack-external (experimental validation) to pack-internal (modeling study) causes substantial additional heating of cells, which can lead to cell thermal runaway. All three layers of the bank-to-bank separator must fail for the pack-internal short scenario to occur. This finding emphasizes the imperative of battery pack assembly cleanliness. The design is tolerant to pack-internal shorts when stored at 0% state of charge.

  13. Performance gains in memory have traditionally been obtained by increasing memory bus widths and speeds. The

    E-Print Network [OSTI]

    Jacob, Bruce

    channels have supported up to 8 DIMMs of memory, some types of DDR channels support only 4 DIMMs, DDR2 channels have but 2 DIMMs, and DDR3 channels are expected to support only a single DIMM. In addition modules is identical to that seen in DDR2 or DDR3 systems, which we shall refer to as DDRx systems

  14. Oil Price Trackers Inspired by Immune Memory

    E-Print Network [OSTI]

    Wilson, WIlliam; Aickelin, Uwe

    2010-01-01

    We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

  15. Localized quantum walks as secured quantum memory

    E-Print Network [OSTI]

    C. M. Chandrashekar; Th. Busch

    2015-04-21

    We show that a quantum walk process can be used to construct and secure quantum memory. More precisely, we show that a localized quantum walk with temporal disorder can be engineered to store the information of a single, unknown qubit on a compact position space and faithfully recover it on demand. Since the localization occurss with a finite spread in position space, the stored information of the qubit will be naturally secured from the simple eavesdropper. Our protocol can be adopted to any quantum system for which experimental control over quantum walk dynamics can be achieved.

  16. Shape memory alloy seals for geothermal applications

    SciTech Connect (OSTI)

    Friske, Warren H.; Schwartzbart, Harry

    1982-10-08

    Rockwell International's Energy Systems Group, under contract to Brookhaven National Laboratory, has completed a 2-year program to develop a novel temperature-actuated seal concept for geothermal applications. This seal concept uses the unique properties of a shape memory alloy (Nitinol) to perform the sealing function. The several advantages of the concept are discussed in the paper. Demonstration tests of both face and shaft seals have shown that leaktight seals are feasible. Supporting materials studies have included corrosion tests in geothermal fluids, elevated temperature tensile tests, experimental electroplating and metallographic evaluations of microstructures.

  17. Memorial Day Message | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on dark matter By SarahMODELINGMeetingsMembranesMemorial Day Message

  18. New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one

    E-Print Network [OSTI]

    Gilbes, Fernando

    New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one contaminant at a level of concern for human contaminants in groundwater. Regional summaries of where and why groundwater is vulnerable to contamination now

  19. Levels of interaction between episodic and semantic memory: an electrophysiological and computational investigation. 

    E-Print Network [OSTI]

    Greve, Andrea

    2007-01-01

    There is compelling evidence that memory is supported by multiple, functionally independent subsystems that distinguish declarative from non-declarative memories (Tulving, 1972). The declarative subsystems, episodic and ...

  20. Memory in microbes: quantifying history-Dependent behavior in a bacterium.

    E-Print Network [OSTI]

    Wolf, Denise M.

    2010-01-01

    Memory in Microbes: Quantifying History-Dependent Behaviorboth the persistence of memory in microbes and the amount ofan evolutionary advantage in microbes as well. For instance,

  1. Memory in Microbes: Quantifying History-Dependent Behavior in a Bacterium

    E-Print Network [OSTI]

    Wolf, Denise M.

    2009-01-01

    Memory in Microbes: Quantifying History-Dependent Behaviorboth the persistence of memory in microbes and the amount ofan evolutionary advantage in microbes as well. For instance,

  2. A signal-detection-based investigation into the nature of recognition memory

    E-Print Network [OSTI]

    Mickes, Laura Beth

    2010-01-01

    memory. Memory & Cognition, Speer, N. K. , & Curran, T. (Eichenbaum, 2008; Speer & Curran, 2007; Turriziani, Fadda,unitized familiarity (cf. Speer & Curran, 2007). While this

  3. Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation (DGT): Proposal of a Spatial

    E-Print Network [OSTI]

    Boyer, Edmond

    Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation.garbolino@mines-paristech.fr Each year millions of tons of Dangerous Goods are transported between France and Italy using especially for the territory Dangerous Goods Transportation (DGT) is a crucial activity that participates to the development

  4. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  5. ORIGINAL PAPER Prevention of cerebral ischemia-induced memory deficits

    E-Print Network [OSTI]

    memory impairment produced pharmacologically or genetically. Comparably, much less is known about4 activity in the hippocam- pus. Memory was examined using Morris water-maze and step-through passive avoidance tests in rats subjected to global cerebral ischemia with or without repeated treatment

  6. Research Report Semantic and perceptual effects on recognition memory

    E-Print Network [OSTI]

    Curran, Tim

    al., 1999; Hunt and Elliot, 1980; Nairne, 2002; Reder et al., 2002). Although the perceptual match between study and test may not always lead to better memory (Hunt and Elliot, 1980; Nairne, 2002 that perceptual match affects recognition memory when items are distinctive (Hunt and Elliot, 1980; Reder et al

  7. External Memory Controller for Virtex II Pro Blagomir Donchev

    E-Print Network [OSTI]

    An implementation of an On Chip Memory (OCM) based Dual Data Rate external memory controller (OCM2DDR) for Virtex II Pro is described. The proposed OCM2DDR controller comprises Data Side OCM (DSOCM) bus interface module, read and write control logic, halt read module and Xilinx DDR controller IP core. The presented design

  8. Boosting FMAX of Processor Pipelines using Intentional Memory Clock Skew

    E-Print Network [OSTI]

    Lemieux, Guy

    Boosting FMAX of Processor Pipelines using Intentional Memory Clock Skew Alexander Brant 1 , Ameer--FPGAs are increasingly being used to implement many new applications, including pipelined processor designs. Designers often employ memories to communicate and pass data between these pipeline stages. However, one

  9. Familiarity in source memory Matthew V. Mollison n

    E-Print Network [OSTI]

    Curran, Tim

    Familiarity in source memory Matthew V. Mollison n , Tim Curran University of Colorado, Boulder-process recognition memory system (for reviews, see Curran, Tepe, & Piatt, 2006, Chap. 18; Eichenbaum, Yonelinas, & Ranganath, 2007; Parks & Yonelinas, 2007; Rugg & Curran, 2007; Skinner & Fernandes, 2007; Vilberg & Rugg

  10. A Scratchpad Memory Allocation Scheme for Dataflow Shamik Bandyopadhyay

    E-Print Network [OSTI]

    @eecs.berkeley.edu Edward A. Lee EECS, UC Berkeley eal@eecs.berkeley.edu August 25, 2008 Abstract Scratchpad memories energy consumption. However, program code and data must be explicitly moved in the memory hierarchy for scratchpads are low power and energy consumption, and a higher degree of predictability in program execution

  11. An Integrated Approach to Reducing Power Dissipation in Memory Hierarchies

    E-Print Network [OSTI]

    , and then propose on-chip memory module buffers, called Energy-Saver Buffers (ESB), which reside in- between the L2-delay product, Energy-Saver Buffers (ESB), integrated approach, power, RDRAM 1. INTRODUCTION One of the major costs associated with reactivating memory modules from a low- power state by introducing Energy-Saver

  12. CADS: Core-Aware Dynamic Scheduler for Multicore Memory Controllers

    E-Print Network [OSTI]

    Sun, Xian-He

    Xian-He Sun Department of Computer Science Illinois Institute of Technology, Chicago, IL 60616, USA {eolmedo, sbyna, sun}@iit.edu Abstract Memory controller scheduling is crucial in multicore processors the computing power these processors offer. However, current multicore processors are using traditional memory

  13. "To the immortal name and memory of George Washington"

    E-Print Network [OSTI]

    US Army Corps of Engineers

    "To the immortal name and memory of George Washington" The United States Army Corps of Engineers and the Construction of the Washington Monument Louis Torres #12;THE COVER Washington Monument and Surroundings, North and memory of George Washington" The United States Army Corps of Engineers and the Construction

  14. Thread Row Buffers: Improving Memory Performance Isolation and Throughput

    E-Print Network [OSTI]

    Tullsen, Dean M.

    and energy efficiency. Furthermore, concurrent execution of applications also has shown the needThread Row Buffers: Improving Memory Performance Isolation and Throughput in Multiprogrammed of performance isolation among threads in the memory controller to enforce a quality of service in virtualized

  15. Silicon optical nanocrystal memory R. J. Walters,a)

    E-Print Network [OSTI]

    Atwater, Harry

    Silicon optical nanocrystal memory R. J. Walters,a) P. G. Kik, J. D. Casperson, and H. A. Atwater (Received 19 January 2004; accepted 22 July 2004) We describe the operation of a silicon optical nanocrystal memory device. The programmed logic state of the device is read optically by the detection of high or low

  16. The Future of Memory: Remembering, Imagining, and the Brain

    E-Print Network [OSTI]

    Szpunar, Karl K.

    Neuron Review The Future of Memory: Remembering, Imagining, and the Brain Daniel L. Schacter,1 increase in research examining the role of memory in imagination and future thinking. This work has revealed striking similarities between remembering the past and imagining or simulating the future

  17. Simultaneous temperature and flux controllability for heat equations with memory

    E-Print Network [OSTI]

    Ceragioli, Francesca

    Simultaneous temperature and flux controllability for heat equations with memory S. Avdonin Torino -- Italy, luciano.pandolfi@polito.it June 14, 2010 Abstract It is known that, in the case of heat equation with memory, tem- perature can be controlled to an arbitrary square integrable target provided

  18. Word learning, phonological short-term memory, phonotactic probability and

    E-Print Network [OSTI]

    Gupta, Prahlad

    Word learning, phonological short-term memory, phonotactic probability and long-term memory of Iowa, Iowa City, IA 52242, USA Word learning is studied in a multitude of ways, and it is often for thinking about various types of studies of word learning. We then review a number of themes that in recent

  19. On the practical efficiency of shape memory engines

    SciTech Connect (OSTI)

    Mc Comick, P.G.

    1987-02-01

    An important potential application of the shape memory effect is for the conversion of low grade thermal energy into mechanical power. In view of the relatively low temperature differences involved, the conversion efficiency is of considerable practical as well as theoretical importance. The purpose of this work is to evaluate the effect of non-ideal behaviour on the efficiency of shape memory engines.

  20. Abstract--Throughout many generations of memory from DDR1 to DDR3, the internal memory architecture

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    Abstract-- Throughout many generations of memory from DDR1 to DDR3, the internal memory performance bottleneck for decades [1]. Throughout many generations of DRAM, from DDR1 to DDR3, internal exploit [3]. DRAM architecture is segmented into 4 or 8 banks (DDR2, DDR3 respectively), and each DRAM

  1. Towards neuro-memory-chip: Imprinting multiple memories in cultured neural networks

    SciTech Connect (OSTI)

    Baruchi, Itay; Ben-Jacob, Eshel [School of Physics and Astronomy, Raymond and Beverly Sackler Faculty of Exact Sciences, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2007-05-15

    We show that using local chemical stimulations it is possible to imprint persisting (days) multiple memories (collective modes of neuron firing) in the activity of cultured neural networks. Microdroplets of inhibitory antagonist are injected at a location selected based on real-time analysis of the recorded activity. The neurons at the stimulated locations turn into a focus for initiating synchronized bursting events (the collective modes) each with its own specific spatiotemporal pattern of neuron firing.

  2. Memory Constraints for Power-Law Series

    E-Print Network [OSTI]

    Guo, Fangjian; Zhao, Zhi-Dan; Zhou, Tao

    2015-01-01

    Many time series produced by complex systems are empirically found to follow power-law distributions with different exponents $\\alpha$. By permuting the independently drawn samples from a power-law distribution, we present non-trivial bounds on the memory (1st-order autocorrelation) as a function of $\\alpha$, which are markedly different from the ordinary $\\pm 1$ bounds for Gaussian or uniform distributions. When $1 3$, the upper bound remains +1 while the lower bound descends below 0. Theoretical bounds agree well with numerical simulations. Based on the ratings of MovieLens and posts in Twitter, we also find that empirical power-law distributed data produced by human activities conform to such constraints.

  3. Optically Loaded Semiconductor Quantum Memory Register

    E-Print Network [OSTI]

    Danny Kim; Andrey A. Kiselev; Richard S. Ross; Matthew T. Rakher; Cody Jones; Thaddeus D. Ladd

    2015-07-30

    We propose and analyze an optically loaded quantum memory exploiting capacitive coupling between self-assembled quantum dot molecules and electrically gated quantum dot molecules. The self-assembled dots are used for spin-photon entanglement, which is transferred to the gated dots for long-term storage or processing via a teleportation process heralded by single-photon detection. We illustrate a device architecture enabling this interaction and we outline its operation and fabrication. We provide self-consistent Poisson-Schroedinger simulations to establish the design viability and refine the design, and to estimate the physical coupling parameters and their sensitivities to dot placement. The device we propose generates heralded copies of an entangled state between a photonic qubit and a solid-state qubit with a rapid reset time upon failure. The resulting fast rate of entanglement generation is of high utility for heralded quantum networking scenarios involving lossy optical channels.

  4. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  5. Memory effects and active Brownian diffusion

    E-Print Network [OSTI]

    Ghosh, Pulak K; Marchegiani, Giampiero; Marchesoni, Fabio

    2015-01-01

    A self-propelled artificial microswimmer is often modeled as a ballistic Brownian particle moving with constant speed aligned along one of its axis, but changing direction due to random collisions with the environment. Similarly to thermal noise, its angular randomization is described as a memoryless stochastic process. Here, we speculate that finite-time correlations in the orientational dynamics can affect the swimmer's diffusivity. To this purpose we propose and solve two alternative models. In the first one we simply assume that the environmental fluctuations governing the swimmer's propulsion are exponentially correlated in time, whereas in the second one we account for possible damped fluctuations of the propulsion velocity around the swimmer's axis. The corresponding swimmer's diffusion constants are predicted to get, respectively, enhanced or suppressed upon increasing the model memory time. Possible consequences of this effect on the interpretation of the experimental data are discussed.

  6. Memory effects and active Brownian diffusion

    E-Print Network [OSTI]

    Pulak K. Ghosh; Yunyun Li; Giampiero Marchegiani; Fabio Marchesoni

    2015-11-19

    A self-propelled artificial microswimmer is often modeled as a ballistic Brownian particle moving with constant speed aligned along one of its axis, but changing direction due to random collisions with the environment. Similarly to thermal noise, its angular randomization is described as a memoryless stochastic process. Here, we speculate that finite-time correlations in the orientational dynamics can affect the swimmer's diffusivity. To this purpose we propose and solve two alternative models. In the first one we simply assume that the environmental fluctuations governing the swimmer's propulsion are exponentially correlated in time, whereas in the second one we account for possible damped fluctuations of the propulsion velocity around the swimmer's axis. The corresponding swimmer's diffusion constants are predicted to get, respectively, enhanced or suppressed upon increasing the model memory time. Possible consequences of this effect on the interpretation of the experimental data are discussed.

  7. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-07-27

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  8. Shape memory alloy seals for geothermal applications

    SciTech Connect (OSTI)

    Not Available

    1985-09-15

    A shape memory radial seal was fabricated with a ''U'' cross section. Upon heating the seal recovered its original ''V'' shape and produced a high pressure seal. The sealing pressure which can be developed is approximately 41 MPa (60,000 psi), well in excess of the pressure which can be produced in conventional elastomeric seals. The low modulus martensite can conform readily to the sealing surface, and upon recovery produce a seal capable of high pressure fluid or gas confinement. The corrosion resistance of nickel-titanium in a broad range of aggressive fluids has been well established and, as such, there is little doubt that, had time permitted, a geothermal pump of flange fluid tried would have been successful.

  9. Solid state engine using Nitinol memory alloy

    SciTech Connect (OSTI)

    Golestaneh, A.A.

    1981-12-01

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  10. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

    2011-02-15

    DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

  11. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, Ahmad A. (Bolingbrook, IL)

    1981-01-01

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  12. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, A.A.

    1980-01-21

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  13. Write-Once Read-Many-Times (WORM) Memory based on Zinc Oxide on Silicon

    E-Print Network [OSTI]

    Zhang, Qing

    2011-01-01

    has well developed growth technologies. 10 All those factsbeam epitaxial growth technology have shown excellent memory

  14. A Single-System Signal-Detection Theory of Repetition Priming and Recognition Memory

    E-Print Network [OSTI]

    Henson, Rik

    of unconscious memory: Merikle and Reingold (1991) revisited", in Journal of Experimental Psychology: Learning: Insights from a computational model" in Journal of Memory and Language, 55, 515-533. Chapters 5-6 are based in current memory research is that there are distinct implicit (unconscious) and explicit (conscious) memory

  15. Monitoring Data Structures using Hardware Transactional Memory Rutgers University DCS-TR-662, December 2009

    E-Print Network [OSTI]

    Ganapathy, Vinod

    in harware transactional memory (HTM) systems to addition- ally enforce programmer-specified consistency

  16. A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies

    E-Print Network [OSTI]

    Kindy, Diallo Abdoulaye

    2012-01-01

    In today's world, Web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions are done online with the aid of different Web applications. Though these applications are used by hundreds of people, in many cases the security level is weak, which makes them vulnerable to get compromised. In most of the scenarios, a user has to be identified before any communication is established with the backend database. An arbitrary user should not be allowed access to the system without proof of valid credentials. However, a crafted injection gives access to unauthorized users. This is mostly accomplished via SQL Injection input. In spite of the development of different approaches to prevent SQL injection, it still remains an alarming threat to Web applications. In this paper, we present a detailed ...

  17. Hardware support for collecting performance counters directly to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W.

    2012-09-25

    Hardware support for collecting performance counters directly to memory, in one aspect, may include a plurality of performance counters operable to collect one or more counts of one or more selected activities. A first storage element may be operable to store an address of a memory location. A second storage element may be operable to store a value indicating whether the hardware should begin copying. A state machine may be operable to detect the value in the second storage element and trigger hardware copying of data in selected one or more of the plurality of performance counters to the memory location whose address is stored in the first storage element.

  18. The combustion synthesis of Ni-Ti shape memory alloys

    SciTech Connect (OSTI)

    Moore, J.J.; Yi, H.C. (Colorado School of Mines, Golden (USA))

    1990-08-01

    Combustion synthesis of Ni-Ti-series shape-memory alloys yields both time and energy savings over conventional production methods. The solidified combustion synthesis process products have been cold-rolled into plates which exhibit the shape-memory effect, and it was noted that shape-memory transition temperatures may be tailored over a -78 to 460 C temperature range through the substitution of a third element for Ni; this element may be Pd or Fe. Accounts are given of the experimental combustion syntheses of Ni-Ti-Fe and Ti-Ni-Pd. 24 refs.

  19. An examination of content similarity within the memory of HPC applications.

    SciTech Connect (OSTI)

    Levy, Scott N. [University of New Mexico; Bridges, Patrick G. [University of New Mexico; Ferreira, Kurt Brian; Thompson, Aidan Patrick; Trott, Christian Robert

    2013-01-01

    Memory content similarity has been e ectively exploited for more than a decade to reduce memory consumption. By consolidating duplicate and similar pages in the address space of an application, we can reduce the amount of memory it consumes without negatively a ecting the application's perception of the memory resources available to it. In addition to memory de-duplication, there may be many other ways that we can exploit memory content similarity to improve system characteristics. In this paper, we examine the memory content similarity of several HPC applications. By characterizing the memory contents of these applications, we hope to provide a basis for ef- forts to e ectively exploit memory content similarity to improve system performance beyond memory deduplication. We show that several applications exhibit signi cant similarity and consider the source of the similarity.

  20. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai