Powered by Deep Web Technologies
Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

2

Configuring Networks and Devices with Simple Network Management Protocol (SNMP)  

Science Conference Proceedings (OSTI)

This document is written for readers interested in the Internet Standard Management Framework and its protocol, the Simple Network Management Protocol (SNMP). In particular, it offers guidance in the effective use of SNMP for configuration management. ...

M. MacFaden; D. Partain; J. Saperia; W. Tackabury

2003-04-01T23:59:59.000Z

3

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

4

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and JBOSS. Addthis Related Articles V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering...

5

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

6

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

7

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager (NCM) database CVE-2012-4614. Impact: A remote user can connect to the target database. A local user can obtain passwords. Solution: The vendor has issued a fix (9.1)....

8

Network sensitivity to geographical configuration  

E-Print Network (OSTI)

Gravitational wave astronomy will require the coordinated analysis of data from the global network of gravitational wave observatories. Questions of how to optimally configure the global network arise in this context. We have elsewhere proposed a formalism which is employed here to compare different configurations of the network, using both the coincident network analysis method and the coherent network analysis method. We have constructed a network model to compute a figure-of-merit based on the detection rate for a population of standard-candle binary inspirals. We find that this measure of network quality is very sensitive to the geographic location of component detectors under a coincident network analysis, but comparatively insensitive under a coherent network analysis.

Antony C Searle; Susan M Scott; David E McClelland

2001-10-10T23:59:59.000Z

9

Semantic Web-Based Management of Routing Configurations  

Science Conference Proceedings (OSTI)

Today, network operators typically reason about network behaviour by observing the effects of a particular configuration in operation. This configuration process typically involves logging configuration changes and rolling back to a previous version ... Keywords: BGP, Conflict detection, Network management, Policy languages, Routing policy, Semantic web

Félix J. García Clemente; Jose M. Alcaraz Calero; Jorge Bernal Bernabé; Juan Manuel Marín Pérez; Gregorio Martínez Pérez; Antonio F. Gómez Skarmeta

2011-06-01T23:59:59.000Z

10

Sensor network configuration under physical attacks  

Science Conference Proceedings (OSTI)

Sensor networks will typically operate in hostile environments, where they are susceptible to physical attacks resulting in physical node destructions. In this paper, we study impacts of physical attacks on network configuration w.r.t. lifetime. While ... Keywords: deployment, network configuration, network lifetime, physical attacks, physical node destruction, sensor networks

Xun Wang; Wenjun Gu; Kurt Schosek; Sriram Chellappan; Dong Xuan

2009-04-01T23:59:59.000Z

11

CRAD, Configuration Management - Oak Ridge National Laboratory...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Management - Oak Ridge National Laboratory High Flux Isotope Reactor Contractor ORR CRAD, Configuration Management - Oak Ridge National Laboratory High Flux Isotope...

12

CRAD, Configuration Management - Oak Ridge National Laboratory...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Management - Oak Ridge National Laboratory High Flux Isotope Reactor CRAD, Configuration Management - Oak Ridge National Laboratory High Flux Isotope Reactor February...

13

Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network  

Science Conference Proceedings (OSTI)

A Dynamic Host Configuration Protocol (DHCP) server is a well-known server deployed at a network to manage Internet Protocol (IP) addresses temporarily rentable to hosts in the network. Besides, a DHCP server provides hosts with important network information ... Keywords: AHCM, ARP, Autoconfiguration, Automatic host configuration, DHCP, Free IP address

Tzu-Chi Huang; Kuo-Chih Chu

2011-11-01T23:59:59.000Z

14

Tank waste remediation system configuration management plan  

SciTech Connect

The configuration management program for the Tank Waste Remediation System (TWRS) Project Mission supports management of the project baseline by providing the mechanisms to identify, document, and control the functional and physical characteristics of the products. This document is one of the tools used to develop and control the mission and work. It is an integrated approach for control of technical, cost, schedule, and administrative information necessary to manage the configurations for the TWRS Project Mission. Configuration management focuses on five principal activities: configuration management system management, configuration identification, configuration status accounting, change control, and configuration management assessments. TWRS Project personnel must execute work in a controlled fashion. Work must be performed by verbatim use of authorized and released technical information and documentation. Application of configuration management will be consistently applied across all TWRS Project activities and assessed accordingly. The Project Hanford Management Contract (PHMC) configuration management requirements are prescribed in HNF-MP-013, Configuration Management Plan (FDH 1997a). This TWRS Configuration Management Plan (CMP) implements those requirements and supersedes the Tank Waste Remediation System Configuration Management Program Plan described in Vann, 1996. HNF-SD-WM-CM-014, Tank Waste Remediation System Configuration Management Implementation Plan (Vann, 1997) will be revised to implement the requirements of this plan. This plan provides the responsibilities, actions and tools necessary to implement the requirements as defined in the above referenced documents.

Vann, J.M.

1998-01-08T23:59:59.000Z

15

The evolution of network configuration: a tale of two campuses  

Science Conference Proceedings (OSTI)

Studying network configuration evolution can improve our understanding of the evolving complexity of networks and can be helpful in making network configuration less error-prone. Unfortunately, the nature of changes that operators make to network configuration ... Keywords: longitudinal analysis, network configuration, network evolution

Hyojoon Kim; Theophilus Benson; Aditya Akella; Nick Feamster

2011-11-01T23:59:59.000Z

16

DOCS System Configuration Management Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOCS System Configuration Management Plan DOCS System Configuration Management Plan The DOCS Systems Configuration Management Plan (SCMP), from an actual DOE systems engineering...

17

Configuration Management Plan for K Basins  

SciTech Connect

This plan describes a configuration management program for K Basins that establishes the systems, processes, and responsibilities necessary for implementation. The K Basins configuration management plan provides the methodology to establish, upgrade, reconstitute, and maintain the technical consistency among the requirements, physical configuration, and documentation. The technical consistency afforded by this plan ensures accurate technical information necessary to achieve the mission objectives that provide for the safe, economic, and environmentally sound management of K Basins and the stored material. The configuration management program architecture presented in this plan is based on the functional model established in the DOE Standard, DOE-STD-1073-93, {open_quotes}Guide for Operational Configuration Management Program{close_quotes}.

Weir, W.R.; Laney, T.

1995-01-27T23:59:59.000Z

18

EIA - Natural Gas Pipeline Network - Network Configuration & System Design  

U.S. Energy Information Administration (EIA) Indexed Site

Network Configuration & System Design Network Configuration & System Design About U.S. Natural Gas Pipelines - Transporting Natural Gas based on data through 2007/2008 with selected updates Network Configuration and System Design Overview | Transmission/Storage | Design Criteria | Importance of Storage| Overall Pipeline System Configuration Overview A principal requirement of the natural gas transmission system is that it be capable of meeting the peak demand of its shippers who have contracts for firm service. To meet this requirement, the facilities developed by the natural gas transmission industry are a combination of transmission pipelines to bring the gas to the market areas and of underground natural gas storage sites and liquefied natural gas (LNG) peaking facilities located in the market areas.

19

Tank Waste Remediation Systems (TWRS) Configuration Management Implementation Plan  

SciTech Connect

The Tank Waste Configuration Management (TWRS) Configuration Management Implementation Plan descibes the execution of the configuration management (CM) that the contractor uses to manage and integrate its programmatic and functional operations to perform work.

WEIR, W.R.

2000-12-18T23:59:59.000Z

20

Buried waste integrated demonstration configuration management plan  

SciTech Connect

This document defines plans for the configuration management requirements for the Buried Waste Integrated Demonstration (BWID) Program. Since BWID is managed programmatically by the Waste Technology Development Department (WTDD), WTDD Program Directive (PD) 1.5 (Document Preparation, Review, Approval, Publication, Management and Change Control) is to be followed for all internal EG&G Idaho, Inc., BWID programmatic documentation. BWID documentation generated by organizations external to EG&G Idaho is not covered by this revision of the Configuration Management Plan (CMP), but will be addressed in subsequent revisions.

Cannon, P.G.

1992-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Buried waste integrated demonstration configuration management plan  

SciTech Connect

This document defines plans for the configuration management requirements for the Buried Waste Integrated Demonstration (BWID) Program. Since BWID is managed programmatically by the Waste Technology Development Department (WTDD), WTDD Program Directive (PD) 1.5 (Document Preparation, Review, Approval, Publication, Management and Change Control) is to be followed for all internal EG G Idaho, Inc., BWID programmatic documentation. BWID documentation generated by organizations external to EG G Idaho is not covered by this revision of the Configuration Management Plan (CMP), but will be addressed in subsequent revisions.

Cannon, P.G.

1992-02-01T23:59:59.000Z

22

Software Configuration Management (SCM) A Practical Guide | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Software Configuration Management (SCM) A Practical Guide Software Configuration Management (SCM) A Practical Guide Software Configuration Management (SCM) A Practical Guide This document provides a practical guide for integrating software configuration management disciplines into the management of software engineering projects. Software configuration management is the process of identifying and defining the software configuration items in a system, controlling the release and change of these items throughout the system lifecycle, recording and reporting the status of configuration items and change requests, and verifying the completeness and correctness of configuration items Software Configuration Management (SCM) A Practical Guide More Documents & Publications NMMSS Software Quality Assurance Plan SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Software Configuration

23

Self-Configuration for Wireless Local Area Networks  

Science Conference Proceedings (OSTI)

This paper concentrates on self-configuration in wireless local area networks (WLANs). As the growth of the stringent demand of heterogeneity and re-configurability in future wireless networks, the initial configuration is getting more and more complex, ... Keywords: Analytic hierarchy process, Grey relational analysis, Neighboring AP discovery, Self-configuration

Zhiyong Feng; Qixun Zhang; Dian Fan; Litao Liang; Ping Zhang

2010-03-01T23:59:59.000Z

24

HUSEC: A heuristic self configuration model for wireless sensor networks  

Science Conference Proceedings (OSTI)

The Network State Beacons (NSB) exchange rate is the critical parameter in monitoring the dynamic state of any self-configuring ad hoc sensor network. Along with the network state and the overhead control traffic, it determines both the time and nature ... Keywords: Beacon exchange rate, Self-configuration, Wireless ad hoc sensor networks

Mudasser Iqbal; Iqbal Gondal; Laurence S. Dooley

2007-05-01T23:59:59.000Z

25

Surveillance Guide - CMS 3.1 Configuration Management Implementation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONFIGURATION MANAGEMENT IMPLEMENTATION CONFIGURATION MANAGEMENT IMPLEMENTATION 1.0 Objective The objective of this surveillance is to verify implementation of configuration management requirements. These surveillance activities provide a basis for evaluating the effectiveness of the contractor's program for implementation and control of configuration management and for establishing compliance with DOE requirements. References 2.1 DOE 430.1, Life Cycle Project Management 2.2 DOE-STD-1073-93, Guide for Operational Configuration Management 3.0 Requirements Implemented This surveillance is conducted to implement requirements of the Functions, Responsiblities and Authorities Manual (FRAM), Section 2, Configuration Management, FRAM #s 3 and 4. These requirements are

26

A case study in configuration management tool deployment  

Science Conference Proceedings (OSTI)

While configuration management systems are generally regarded as useful, their deployment process is not well understood or documented. In this paper, we present a case study in configuration management tool deployment. We describe the motivating factors ...

Narayan Desai; Rick Bradshaw; Scott Matott; Sandra Bittner; Susan Coghlan; Rémy Evard; Cory Lueninghoener; Ti Leggett; John-Paul Navarro; Gene Rackow; Craig Stacey; Tisha Stacey

2005-12-01T23:59:59.000Z

27

System and Network Management  

Science Conference Proceedings (OSTI)

This document covers Systems and Network Management Requirements and is the first deliverable in a joint EPRI and Utility User Project to develop Network Management capability for Electric Utility Automation Systems (UAS) using international communication standards such as IEC 61850. The management of substation automation systems is critical since tools are now based, for the most part, on proprietary hardware and software. In modern state-of-the art substations, traditional network management has ...

2012-12-20T23:59:59.000Z

28

HotSpot Software Configuration Management Plan  

SciTech Connect

This Software Configuration Management Plan (SCMP) describes the software configuration management procedures used to ensure that the HotSpot dispersion model meets the requirements of its user base, which includes: (1) Users of the PC version of HotSpot for consequence assessment, hazard assessment and safety analysis calculations; and (2) Users of the NARAC Web and iClient software tools, which allow users to run HotSpot for consequence assessment modeling These users and sponsors of the HotSpot software and the organizations they represent constitute the intended audience for this document. This plan is intended to meet Critical Recommendations 1 and 3 from the Software Evaluation of HotSpot and DOE Safety Software Toolbox Recommendation for inclusion of HotSpot in the Department of Energy (DOE) Safety Software Toolbox. HotSpot software is maintained for the Department of Energy Office of Emergency Operations by the National Atmospheric Release Advisory Center (NARAC) at Lawrence Livermore National Laboratory (LLNL). An overview of HotSpot and NARAC are provided.

Walker, H; Homann, S G

2009-03-12T23:59:59.000Z

29

Configuration Management Plan for the Tank Farm Contractor  

Science Conference Proceedings (OSTI)

The Configuration Management Plan for the Tank Farm Contractor describes configuration management the contractor uses to manage and integrate its technical baseline with the programmatic and functional operations to perform work. The Configuration Management Plan for the Tank Farm Contractor supports the management of the project baseline by providing the mechanisms to identify, document, and control the technical characteristics of the products, processes, and structures, systems, and components (SSC). This plan is one of the tools used to identify and provide controls for the technical baseline of the Tank Farm Contractor (TFC). The configuration management plan is listed in the management process documents for TFC as depicted in Attachment 1, TFC Document Structure. The configuration management plan is an integrated approach for control of technical, schedule, cost, and administrative processes necessary to manage the mission of the TFC. Configuration management encompasses the five functional elements of: (1) configuration management administration, (2) configuration identification, (3) configuration status accounting, (4) change control, and (5 ) configuration management assessments.

WEIR, W.R.

2000-04-21T23:59:59.000Z

30

CRAD, Configuration Management - Los Alamos National Laboratory Weapons  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Management - Los Alamos National Laboratory Configuration Management - Los Alamos National Laboratory Weapons Facility CRAD, Configuration Management - Los Alamos National Laboratory Weapons Facility April 2004 A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) used for an assessment of the Configuration Management program at the Los Alamos National Laboratory, Weapons Facility. CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs. CRAD, Configuration Management - Los Alamos National Laboratory Weapons Facility More Documents & Publications CRAD, Configuration Management - Los Alamos National Laboratory TA 55 SST

31

Research on IPv6 address configuration for wireless sensor networks  

Science Conference Proceedings (OSTI)

The paper proposes an IPv6 address configuration scheme for wireless sensor networks. In the scheme, one wireless sensor network is divided into multiple clusters and the scheme creates the IPv6 address formats for the cluster heads and the cluster members ...

Xiaonan Wang; Demin Gao

2010-11-01T23:59:59.000Z

32

T-596: 0-Day Windows Network Interception Configuration Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: 0-Day Windows Network Interception Configuration 6: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. reference LINKS: InfoSec Institute - SLAAC Attack Cisco Threat Comparison and Best-Practice White Paper IMPACT ASSESSMENT: High

33

SAPHIRE 8 Software Configuration Management Plan  

Science Conference Proceedings (OSTI)

The INL software developers use version control for both the formally released SAPHIRE versions, as well as for source code. For each formal release of the software, the developers perform an acceptance test: the software must pass a suite of automated tests prior to official release. Each official release of SAPHIRE is assigned a unique version identifier. The release is bundled into a standard installation package for easy and consistent set-up by individual users. Included in the release is a list of bug fixes and new features for the current release, as well as a history of those items for past releases. Each formal release of SAPHIRE will have passed an acceptance test. In addition to assignment of a unique version identifier for an official software release, each source code file is kept in a controlled library. Source code is a collection of all the computer instructions written by developers to create the finished product. The library is kept on a server, where back-ups are regularly made. This document describes the configuration management approach used as part of the SAPHIRE development.

Curtis Smith

2010-01-01T23:59:59.000Z

34

Review of Electrical System Configuration Management and Design...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent Review of Electrical System Configuration Management and Design Change Control at the Savannah River Site, Waste Solidification Building Project July 2011 Office of...

35

CRAD, Configuration Management - Los Alamos National Laboratory TA 55 SST  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Management - Los Alamos National Laboratory TA Configuration Management - Los Alamos National Laboratory TA 55 SST Facility CRAD, Configuration Management - Los Alamos National Laboratory TA 55 SST Facility June 2005 A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) used for an assessment of the Configuration Management program at the Los Alamos National Laboratory, TA 55 SST Facility. CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs. CRAD, Configuration Management - Los Alamos National Laboratory TA 55 SST Facility More Documents & Publications CRAD, Emergency Management - Los Alamos National Laboratory TA 55 SST

36

CRAD, Configuration Management - Oak Ridge National Laboratory High Flux  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Management - Oak Ridge National Laboratory High Configuration Management - Oak Ridge National Laboratory High Flux Isotope Reactor CRAD, Configuration Management - Oak Ridge National Laboratory High Flux Isotope Reactor February 2007 A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) used for a February 2007 assessment of the Configuration Management Program in preparation for restart of the Oak Ridge National Laboratory, High Flux Isotope Reactor. CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs. CRAD, Configuration Management - Oak Ridge National Laboratory High Flux Isotope Reactor More Documents & Publications

37

Negotiating Boundaries. Configuration Management in Software DevelopmentTeams  

Science Conference Proceedings (OSTI)

Using case-study material from three small software development teams, this paper analyses the regionalisation of ’design spaces‘. Its main purpose is to understand problems and practices of cooperative work in such spaces. ’Configuration management‘ ... Keywords: Articulation work, CSCW, Configuration Management (CM), Empirical studies

Hilda Tellio?lu; Ina Wagner

1997-12-01T23:59:59.000Z

38

Path-coupled Signaling for Dynamic Metering Configuration in IP-based Networks  

E-Print Network (OSTI)

Path-coupled Signaling for Dynamic Metering Configuration in IP-based Networks Falko Dressler1,klenk,fessi,carle}@informatik.uni-tuebingen.de 3 Siemens Communications, Berlin, Germany cornelia.kappler@siemens.com Abstract Metering of the metering entities is based on centralized management systems. These systems usually have no knowledge about

Carle, Georg

39

Methodology for Fire Configuration Risk Management  

Science Conference Proceedings (OSTI)

This report presents a methodology for performing bounding fire risk assessments at nuclear power plants (NPPs) for on-line equipment configurations. The methodology is designed to support risk assessments prior to performing maintenance, as required by 10CFR50.65 Section (a)(4), the Maintenance Rule. Risk assessments are typically performed for internal events using probabilistic risk assessments (PRAs). However, fire probabilistic risk assessments (FPRAs) are often not available or their use for this p...

2005-12-20T23:59:59.000Z

40

Adaptive resource configuration for Cloud infrastructure management  

Science Conference Proceedings (OSTI)

To guarantee the vision of Cloud Computing QoS goals between the Cloud provider and the customer have to be dynamically met. This so-called Service Level Agreement (SLA) enactment should involve little human-based interaction in order to guarantee the ... Keywords: Autonomic Computing, Case-Based Reasoning, Cloud Computing, Knowledge management, Resource management, Rule-based system

Michael Maurer; Ivona Brandic; Rizos Sakellariou

2013-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

CRAD, Configuration Management Assessment Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Management Assessment Plan Configuration Management Assessment Plan CRAD, Configuration Management Assessment Plan Performance Objective: The objective of this assessment is to determine whether a Configuration Management Program (CM) is in place which allows for the availability and retrievability of accurate information, improves response to design and operational decisions, enhances worker safety, increases facility safety and reliability, increases efficiency of work efforts, and helps maintain integrity of interfacing orders. Criteria: The CM program supports DOE program implementation through the following: It provides the mechanisms for identifying, cataloging, and maintaining the design requirements and design basis (established to satisfy DOE O 420.1 Facility Safety). It carries forward the technical baseline established in the design

42

Configuration management program plan for Hanford site systems engineering  

SciTech Connect

This plan establishes the integrated configuration management program for the evolving technical baseline developed through the systems engineering process. This configuration management program aligns with the criteria identified in the DOE Standard, DOE-STD-1073-93. Included are specific requirements for control of the systems engineering RDD-100 database, and electronic data incorporated in the database that establishes the Hanford site technical baseline.

Hoffman, A.G.

1994-11-14T23:59:59.000Z

43

Managing ERP configuration variants: an experience report  

Science Conference Proceedings (OSTI)

The concepts of Software Product Line Engineering (SPLE) have been adapted and applied to enterprise IT systems, in particular the ERP systems of a production company. Based on a 2-layer feature model for the domain of the company's business processes, ... Keywords: IT management, enterprise resource planning, experience report, software product line engineering

Andrea Leitner; Christian Kreiner

2010-10-01T23:59:59.000Z

44

CRAD, Configuration Management - Oak Ridge National Laboratory High Flux  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oak Ridge National Laboratory High Oak Ridge National Laboratory High Flux Isotope Reactor Contractor ORR CRAD, Configuration Management - Oak Ridge National Laboratory High Flux Isotope Reactor Contractor ORR February 2007, A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) used for a February 2007 assessment of the Configuration Managment Program portion of an Operational Readiness Review of the Oak Ridge National Laboratory, High Flux Isotope Reactor. CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs. CRAD, Configuration Management - Oak Ridge National Laboratory High Flux

45

Software configuration management plan for the Hanford site technical database  

Science Conference Proceedings (OSTI)

The Hanford Site Technical Database (HSTD) is used as the repository/source for the technical requirements baseline and programmatic data input via the Hanford Site and major Hanford Project Systems Engineering (SE) activities. The Hanford Site SE effort has created an integrated technical baseline for the Hanford Site that supports SE processes at the Site and project levels which is captured in the HSTD. The HSTD has been implemented in Ascent Logic Corporation (ALC) Commercial Off-The-Shelf (COTS) package referred to as the Requirements Driven Design (RDD) software. This Software Configuration Management Plan (SCMP) provides a process and means to control and manage software upgrades to the HSTD system.

GRAVES, N.J.

1999-05-10T23:59:59.000Z

46

The placement-configuration problem for intrusion detection nodes in wireless sensor networks  

Science Conference Proceedings (OSTI)

The deployment and configuration of a distributed network intrusion detection system (NIDS) in a large Wireless Sensor Network (WSN) is an enormous challenge. A reduced number of devices equipped with detection capabilities have to be placed on strategic ...

Juan E. Tapiador, John A. Clark

2013-10-01T23:59:59.000Z

47

A Software Configuration Management System for the Maintenance of Nuclear Power Plant Simulators  

Science Conference Proceedings (OSTI)

This paper reports on the KSG experiencies to introduce a configuration management system for the maintenance of nuclear power plant simulator software. After a discussion on the KSG specific requirements on a computer based software configuration management ...

Burkhard Holl

1997-03-01T23:59:59.000Z

48

Mac configuration management at the Los Alamos National Laboratory  

SciTech Connect

The Los Alamos National Laboratory (LANL) had a need for central configuration management of non-Windows computers. LANL has three to five thousand Macs and an equal number of Linux based systems. The primary goal was to be able to inventory all non-windows systems and patch Mc OS X systems. LANL examined a number of commercial and open source solutions and ultimately selected Puppet. This paper will discuss why we chose Puppet, how we implemented it, and some lessons we learned along the way.

Marcus, Allan B [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

49

Configuration Management Plan for Tank Farm Restoration and Safe Operations Project W-314  

Science Conference Proceedings (OSTI)

The Configuration Management Plan for Project W-314 describes the systems, processes and procedures for implementation of applicable configuration management practices described in HNF-0842, Volume 111, Section 3.1, ''Configuration Management Implementation''. This plan is tailored specifically for use by Project W-314.

MCGREW, D.L.

2000-04-19T23:59:59.000Z

50

Configuration Data Management (CDM) on a Shoestring Identifying and Utilizing an Existing Configuration and Data Management Infrastructure  

Science Conference Proceedings (OSTI)

The spreading need for and use of configuration and data management (CDM) standards has highlighted a number of challenges to the companies that need to implement those standards. For companies and organizations that are new to CDM or have limited CDM capabilities, one of the major dilemmas faced is identifying how and where to start. In many cases there is a need to contend with a legacy of poorly identified items and information and an immature or non-existent CDM infrastructure (processes, procedures, people, and information systems). To the company management and CDM professional this poses a seemingly insurmountable task of putting in place a CDM infrastructure that provides the needed benefits while keeping within an acceptable cost and schedule. This paper deals with initially establishing the CDM infrastructure using the tools that a company already has available. The paper identifies features of common software applications that can be used to implement CDM principles.

VANN, J.M.

2000-09-25T23:59:59.000Z

51

Evaluating the Potential of Commercial GIS for Accelerator Configuration Management  

SciTech Connect

The Geographic Information System (GIS) is a tool used by industries needing to track information about spatially distributed assets. A water utility, for example, must know not only the precise location of each pipe and pump, but also the respective pressure rating and flow rate of each. In many ways, an accelerator such as CEBAF (Continuous Electron Beam Accelerator Facility) can be viewed as an ''electron utility''. Whereas the water utility uses pipes and pumps, the ''electron utility'' uses magnets and RF cavities. At Jefferson lab we are exploring the possibility of implementing ESRI's ArcGIS as the framework for building an all-encompassing accelerator configuration database that integrates location, configuration, maintenance, and connectivity details of all hardware and software. The possibilities of doing so are intriguing. From the GIS, software such as the model server could always extract the most-up-to-date layout information maintained by the Survey & Alignment for lattice modeling. The Mechanical Engineering department could use ArcGIS tools to generate CAD drawings of machine segments from the same database. Ultimately, the greatest benefit of the GIS implementation could be to liberate operators and engineers from the limitations of the current system-by-system view of machine configuration and allow a more integrated regional approach. The commercial GIS package provides a rich set of tools for database-connectivity, versioning, distributed editing, importing and exporting, and graphical analysis and querying, and therefore obviates the need for much custom development. However, formidable challenges to implementation exist and these challenges are not only technical and manpower issues, but also organizational ones. The GIS approach would crosscut organizational boundaries and require departments, which heretofore have had free reign to manage their own data, to cede some control and agree to a centralized framework.

T.L. Larrieu; Y.R. Roblin; K. White; R. Slominski

2005-10-10T23:59:59.000Z

52

Evaluating the Potential of Commercial GIS for Accelerator Configuration Management  

SciTech Connect

The Geographic Information System (GIS) is a tool used by industries needing to track information about spatially distributed assets. A water utility, for example, must know not only the precise location of each pipe and pump, but also the respective pressure rating and flow rate of each. In many ways, an accelerator such as CEBAF (Continuous Electron Beam Accelerator Facility) can be viewed as an ''electron utility''. Whereas the water utility uses pipes and pumps, the ''electron utility'' uses magnets and RF cavities. At Jefferson lab we are exploring the possibility of implementing ESRI's ArcGIS as the framework for building an all-encompassing accelerator configuration database that integrates location, configuration, maintenance, and connectivity details of all hardware and software. The possibilities of doing so are intriguing. From the GIS, software such as the model server could always extract the most-up-to-date layout information maintained by the Survey & Alignment for lattice modeling. The Mechanical Engineering department could use ArcGIS tools to generate CAD drawings of machine segments from the same database. Ultimately, the greatest benefit of the GIS implementation could be to liberate operators and engineers from the limitations of the current system-by-system view of machine configuration and allow a more integrated regional approach. The commercial GIS package provides a rich set of tools for database-connectivity, versioning, distributed editing, importing and exporting, and graphical analysis and querying, and therefore obviates the need for much custom development. However, formidable challenges to implementation exist and these challenges are not only technical and manpower issues, but also organizational ones. The GIS approach would crosscut organizational boundaries and require departments, which heretofore have had free reign to manage their own data, to cede some control and agree to a centralized framework.

T.L. Larrieu; Y.R. Roblin; K. White; R. Slominski

2005-10-10T23:59:59.000Z

53

Impact of software engineering research on the practice of software configuration management  

Science Conference Proceedings (OSTI)

Software Configuration Management (SCM) is an important discipline in professional software development and maintenance. The importance of SCM has increased as programs have become larger, more long lasting, and more mission and life critical. This article ... Keywords: Versioning, data model, process support, research impact, software configuration management, software engineering, workspace management

Jacky Estublier; David Leblang; André van der Hoek; Reidar Conradi; Geoffrey Clemm; Walter Tichy; Darcy Wiborg-Weber

2005-10-01T23:59:59.000Z

54

T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Novell ZENworks Configuration Management novell-tftp.exe 2: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow February 22, 2011 - 7:00am Addthis PROBLEM: Novell ZENworks Buffer Overflow in TFTPD. PLATFORM: Novell ZENworks Configuration Management 10.x, Novell ZENworks Configuration Management 11.x ABSTRACT: A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

55

Survey on the Use of Configuration Risk and Safety Management Tools at Nuclear Power Plants  

Science Conference Proceedings (OSTI)

A joint project of Electricite de France (EDF) and EPRI, this project analyzed use of configuration safety and risk management tools at nuclear power plants.

1998-09-24T23:59:59.000Z

56

CMS 3.1 Configuration Management Implementation, 10/13/98  

Energy.gov (U.S. Department of Energy (DOE))

The objective of this surveillance is to verify implementation of configuration management requirements.  These surveillance activities provide a basis for evaluating the effectiveness of the...

57

Energy research network management workshop  

Science Conference Proceedings (OSTI)

This report contains presentations on computer network management. The list of presentations are: ESNET Steering Committee; Site Access Coordinator Group; Magnetic Fusion Energy; HEPNET Review Committee; High Energy Physics Technical Coordinating Committee; Energy Research DECnet Working Group; A Research and Development Strategy for High Performance Computing; Compare Functionality of DECNET, MFENET, TCP/IP; Video Movie Making Using The LBL/MFE Experimental Link; Research in Distributed Computing over Long Haul Networks; Performance Improvements and Transport Protocols; HRC Report; Panel Discussion: ESNET Management Issues; NMFECC Operations Summary; Large Systems Overview File Storage and POSIX Interface; User Support Services; Overview of the MFENET II; and Access to Supercomputers at FSU Hardware, Software Status, and Remote Access.

Not Available

1988-06-01T23:59:59.000Z

58

Risk and Work Configuration Management as a Function of Integrated Safety Management  

Science Conference Proceedings (OSTI)

National Security Technologies, LLC (NSTec), has established a work management program and corresponding electronic Facilities and Operations Management Information System (e-FOM) to implement Integrated Safety Management (ISM). The management of work scopes, the identification of hazards, and the establishment of implementing controls are reviewed and approved through electronic signatures. Through the execution of the program and the implementation of the electronic system, NSTec staff work within controls and utilize feedback and improvement process. The Integrated Work Control Manual further implements the five functions of ISM at the Activity level. By adding the Risk and Work Configuration Management program, NSTec establishes risk acceptance (business and physical) for liabilities within the performance direction and work management processes. Requirements, roles, and responsibilities are specifically identified in the program while e-FOM provides the interface and establishes the flowdown from the Safety Chain to work and facilities management processes to company work-related directives, and finally to Subject Matter Expert concurrence. The Program establishes, within the defined management structure, management levels for risk identification, risk mitigation (controls), and risk acceptance (business and physical) within the Safety Chain of Responsibility. The Program also implements Integrated Safeguards and Security Management within the NSTec Safety Chain of Responsibility. Once all information has been entered into e-FOM, approved, and captured as data, the information becomes searchable and sortable by hazard, location, organization, mitigating controls, etc.

Lana Buehrer, Michele Kelly, Fran Lemieux, Fred Williams

2007-11-30T23:59:59.000Z

59

A Framework for the Treatment of External Events in Configuration Risk Management: 2004 Configuration of Risk Management Forum Resea rch Task  

Science Conference Proceedings (OSTI)

To comply with paragraph (a)(4) of the Maintenance Rule (10 CFR 50.65), U.S. nuclear plants consider the potential impacts of external events as part of the overall requirement to assess configuration-specific risk. This report, one result of efforts to develop practical, cost-effective tools to support this process, presents an overall framework for consideration of external events in configuration risk management (CRM).

2005-03-14T23:59:59.000Z

60

A Logic Block Enabling Logic Configuration by Non-Experts in Sensor Networks  

E-Print Network (OSTI)

Recent years have seen the evolution of networks of tiny low power computing blocks, known as sensor networks. In one class of sensor networks a non-expert user, who has little or no experience with electronics or programming, is required to select, connect and/or configure one or more blocks such that the blocks compute a particular Boolean logic function of sensor values. We describe a series of experiments showing that non-expert users have much difficulty with a block based on Boolean logic truth tables, and that a logic block having a sentence-like structure with some configurable switches yields a better success rate. We also show that adding color to a truth table improves results over a traditional truth table. Author Keywords Sensor networks, Boolean logic, embedded computing

Susan Cotterell; Frank Vahid

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Cell outage management in LTE networks  

Science Conference Proceedings (OSTI)

Cell outage management is a functionality aiming to automatically detect and mitigate outages that occur in radio networks due to unexpected failures. We envisage that future radio networks autonomously detect an outage based on measurements, from e.g., ...

M. Amirijoo; L. Jorguseski; T. Kürner; R. Litjens; M. Neuland; L. C. Schmelz; U. Türke

2009-09-01T23:59:59.000Z

62

Los Alamos hybrid environment: an integrated development/configuration management system  

SciTech Connect

I present the details of a hybrid configuration management system that utilizes a commercial configuration management tool (Softool's Change and Configuration Control environment) to monitor and control the development of mission-critical software systems at the Los Alamos Weapons Neutron Research Facility. The hybrid system combines features of the VMS host operating system and elements of the tool environment to integrate a flexible development environment with a very powerful automated configuration management system. The features of this system are presented with particular emphasis on the benefits of the hybrid approach. The complementary nature of the constituent environments is described. Special attention is given the issues of operational tradeoffs, personnel interaction and utilization, management visibility and overall system performance. It is shown that by employing a special interface data structure, the hybrid environment supports a much higher level of automation (of both development and configuration management activities) than is realizable in either environment individually. Examples are provided to illustrate the extent to which development activities and all phases of configuration management can be automated under this system. It is shown that in the process of providing a rigorous configuration management environment, the system remains virtually transparent to software development personnel and actually enhances the programmer's capabilities.

Cort, G.

1984-01-01T23:59:59.000Z

63

Configuration Management Assessment Plan - Developed By NNSA/Nevada Site Office Independent Oversight Division  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Management Configuration Management Assessment Plan NNSA/Nevada Site Office Independent Oversight Division Performance Objective: The objective of this assessment is to determine whether a Configuration Management Program (CM) is in place which allows for the availability and retrievability of accurate information, improves response to design and operational decisions, enhances worker safety, increases facility safety and reliability, increases efficiency of work efforts, and helps maintain integrity of interfacing orders. Criteria: The CM program supports DOE program implementation through the following: It provides the mechanisms for identifying, cataloging, and maintaining the design requirements and design basis (established to satisfy DOE O 420.1 Facility Safety).

64

TIPSTER Text Phase II Configuration Management Plan Version1.2p 3June1996  

E-Print Network (OSTI)

for TIPSTER Configuration Management Phase I of the TIPSTER Text Program, including the Text Retrieval be reused in many applications on many platforms, is the purpose of the TIPSTER Text Phase II Program/CM configuration organizations for TIPSTER II. It also describes the CM roles and responsibilities of other program

65

DOE Order Self Study Modules - DOE STD 1073-2003, Configuration Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73-2003 73-2003 CONFIGURATION MANAGEMENT DOE -STD-1073-2003 Familiar Level August 2011 1 DOE-STD-1073-2003 CONFIGURATION MANAGEMENT FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources, you will be able to answer the following questions: 1. What is the purpose of DOE-STD-1073-2003? 2. What are the objectives of configuration management? 3. To what type of DOE facility does DOE-STD-1073-2003 apply? 4. What is the first set of structures, systems, and components (SSCs) that must be included in a configuration management program? 5. What is a work control process? 6. What is the objective of change control? 7. What are three elements that a technical review is designed to verify? 8. What three elements should be included in a design basis review?

66

Configuration and Setting Management for Protection and Control Devices and Systems  

Science Conference Proceedings (OSTI)

The EPRI roadmap reports forecast that as protection equipment and systems continuously evolve in the more feature-rich and sophisticated direction, management of the configuration and setting is becoming more critical in future. In 2011 EPRI Protection and Control (P&C) survey, configuration and setting management for protection and control systems remain one of the most pressing challenges for member utilities.To handle the growing complexity of today’s P&C asset ...

2012-12-14T23:59:59.000Z

67

Configuration and Setting Management for Protection and Control Devices and Systems  

Science Conference Proceedings (OSTI)

The EPRI roadmap reports [6] [7] forecast that as protection equipment and systems continuously evolve in the more feature-rich and sophisticated direction, management of the configuration and setting is becoming more critical in future. In 2011 EPRI Protection and Control (P&C) survey, it was confirmed that configuration and setting management for protection and control devices and systems was one of the most pressing challenges from members.To handle the ...

2013-12-20T23:59:59.000Z

68

Guideline on Configuration Management for Digital Instrumentation and Control Equipment and Systems  

Science Conference Proceedings (OSTI)

Configuration Management (CM) is an integrated management process that addresses the definition and documentation of design requirements, controls changes, and maintains the documentation of the as-built facility configuration throughout the entire life cycle for plant structures, systems, components, software, and hardware. CM methods that address all of these elements are well established for traditional hardware-based instrumentation and control (IC) systems. However, industry experience has indicated...

2011-11-08T23:59:59.000Z

69

Power management in energy harvesting sensor networks  

Science Conference Proceedings (OSTI)

Power management is an important concern in sensor networks, because a tethered energy infrastructure is usually not available and an obvious concern is to use the available battery energy efficiently. However, in some of the sensor networking applications, ... Keywords: Adaptive duty cycling, Heliomote, energy neutrality, lifetime, power management

Aman Kansal; Jason Hsu; Sadaf Zahedi; Mani B. Srivastava

2007-09-01T23:59:59.000Z

70

Operational concepts for the Environmental Restoration and Waste Management Configuration Study  

Science Conference Proceedings (OSTI)

DOE has initiated a planning process in anticipation of upgrading all DOE waste management operations and facilities. The EM Configuration Study examines four areas: (1) planning considerations, (2) system configuration, (3) operational concepts, and (4) resource assessments. Each area is addressed by a different team. Objective of the Operational Concepts Team 3 study is to investigate, identify, define, and evaluate alternative ways to manage DOE waste management facilities, while taking into consideration the information gathered by the other EM Configuration teams. This report provides information and criteria for evaluating the relative effectiveness and efficiency of various organizational alternatives that can be used to operate and manage DOE waste facilities. Intent of this report is not to select one best management alternative but rather to provide recommendations, conclusions, and background information from which decisions will be made at a future date.

NONE

1990-12-01T23:59:59.000Z

71

Saltwell PIC Skid Programmable Logic Controller (PLC) Software Configuration Management Plan  

Science Conference Proceedings (OSTI)

This document provides the procedures and guidelines necessary for computer software configuration management activities during the operation and maintenance phases of the Saltwell PIC Skids as required by LMH-PRO-309, Rev. 0, Computer Software Quality Assurance, Section 2.6, Software Configuration Management. The software configuration management plan (SCMP) integrates technical and administrative controls to establish and maintain technical consistency among requirements, physical configuration, and documentation for the Saltwell PIC Skid Programmable Logic Controller (PLC) software during the Hanford application, operations and maintenance. This SCMP establishes the Saltwell PIC Skid PLC Software Baseline, status changes to that baseline, and ensures that software meets design and operational requirements and is tested in accordance with their design basis.

KOCH, M.R.

1999-11-16T23:59:59.000Z

72

Saltwell Leak Detector Station Programmable Logic Controller (PLC) Software Configuration Management Plan (SCMP)  

Science Conference Proceedings (OSTI)

This document provides the procedures and guidelines necessary for computer software configuration management activities during the operation and maintenance phases of the Saltwell Leak Detector Stations as required by HNF-PRO-309, Rev. 1, Computer Software Quality Assurance, Section 2.4, Software Configuration Management. The software configuration management plan (SCMP) integrates technical and administrative controls to establish and maintain technical consistency among requirements, physical configuration, and documentation for the Saltwell Leak Detector Station Programmable Logic Controller (PLC) software during the Hanford application, operations and maintenance. This SCMP establishes the Saltwell Leak Detector Station PLC Software Baseline, status changes to that baseline, and ensures that software meets design and operational requirements and is tested in accordance with their design basis.

WHITE, K.A.

2000-11-28T23:59:59.000Z

73

The Use of a Hopfield Neural Network in Solving the Mobility Management Problem  

Science Conference Proceedings (OSTI)

This work presents a new approach to solve the location management problem by using the location areas approach. Hopfield Neural Network is used in this work to find the optimal configuration of location areas in a mobile network. Toward this end, the ...

Javid Taheri; Albert Y. Zomaya

2004-07-01T23:59:59.000Z

74

Tcl/Tk, Tkined, and Network Management  

E-Print Network (OSTI)

ing with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission. Request permissions from Jerrid Hamann, at jhamann@cs.tamu.edu. iv Abstract The importance of network management has increased over the last decade as present networks have become critical for the success of many organizations. Network management software is designed to cope with problems from the size and complexity and heterogeneity of today's multi-protocol networks. My semester project for the Department of Engineering Technology, Telecommunications division, was to investigate Schonwalder and Langendorfer's Tcl research, learn their network management tools, including Tkined and Scotty, and customize this tool for monitoring equipment within the Department of Engineering Technology and the Department of Computer Science network. My goals for this project included: ffl Tcl/Tk Learn the Tcl language and the Tk Toolkit ffl Tkined Lea...

Jerrid Hamann; Submitted To Dr. Pierre Catala; The Tk Toolkit

1996-01-01T23:59:59.000Z

75

Ontology-Based Network Management: Study Cases and Lessons Learned  

Science Conference Proceedings (OSTI)

Ontology based network management has recently evolved from a theoretical proposal to a more mature technology. As such, it is now being applied in many research projects in a number of different network management and security scenarios. This application ... Keywords: Autonomic management, Lessons learned, Network monitoring, Network security, OWL, Ontology-based network management, SWRL, Study case

Jorge E. López De Vergara; Antonio Guerrero; Víctor A. Villagrá; Julio Berrocal

2009-09-01T23:59:59.000Z

76

Robust Controls for Network Revenue Management  

Science Conference Proceedings (OSTI)

Revenue management models traditionally assume that future demand is unknown but can be described by a stochastic process or a probability distribution. Demand is, however, often difficult to characterize, especially in new or nonstationary markets. ... Keywords: network, regret, revenue management, robust optimization, yield management

Georgia Perakis; Guillaume Roels

2010-01-01T23:59:59.000Z

77

Topology management in ad hoc networks  

Science Conference Proceedings (OSTI)

The efficiency of a communication network depends not only on its control protocols, but also on its topology. We propose a distributed topology management algorithm that constructs and maintains a backbone topology based on a minimal dominating set ... Keywords: ad hoc networks, connected dominating set, minimum dominating set

Lichun Bao; J. J. Garcia-Luna-Aceves

2003-06-01T23:59:59.000Z

78

Operational concepts and implementation strategies for the design configuration management process.  

SciTech Connect

This report describes operational concepts and implementation strategies for the Design Configuration Management Process (DCMP). It presents a process-based systems engineering model for the successful configuration management of the products generated during the operation of the design organization as a business entity. The DCMP model focuses on Pro/E and associated activities and information. It can serve as the framework for interconnecting all essential aspects of the product design business. A design operation scenario offers a sense of how to do business at a time when DCMP is second nature within the design organization.

Trauth, Sharon Lee

2007-05-01T23:59:59.000Z

79

Stream traffic management over an ATM passive optical network  

Science Conference Proceedings (OSTI)

Keywords: ATM traffic management, fibre-in-the-loop, passive optical network (PON), service disciplines

Maurice Gagnaire; Sašo Stojanovski

2000-05-01T23:59:59.000Z

80

Information Model for Policy-Based Network Security Management  

Science Conference Proceedings (OSTI)

Policy Based Network Management (PBNM) for network security has been paid much attention as a solution to consistent and unified management of security systems including IDS (Intrusion Detection System) and Firewall. In this paper, we define NSPIM (Network ...

Sook-Yeon Kim; Myung-Eun Kim; Kiyoung Kim; Jongsoo Jang

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

DOE-STD-1073-93-Pt. 1; DOE Standard Guide for Operational Configuration Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 CHAPTER 2 IMPLEMENTATION GUIDANCE FOR OPERATIONAL CONFIGURATION MANAGEMENT This guidance is appropriate for high-hazard facilities expected to operate for an extended period. Since DOE facilities vary in hazard level and circumstances of operation, a graded approach to implementation should be adopted. 2.1 PROGRAM MANAGEMENT ELEMENT The program management element of a configuration management (CM) program coordinates program development and implementation and ensures overall program effectiveness. This element leads the development of the other CM program elements. Development of an effective CM program should be initiated promptly, where needed, to address known issues, to improve compliance with various DOE Orders, and to produce the benefits of improved safety, reduced errors, and increased efficiency.

82

Advanced Nuclear Technology: Impact of EPRI Pre-Operational and Operational Configuration Management Report (1022684) on the Nuclear Industry  

Science Conference Proceedings (OSTI)

EPRI Technical Report 1022684, Elements of Pre-Operational and Operational Configuration Management for a New Nuclear Facility, was developed by an EPRI Advanced Nuclear Technology (ANT) technical advisory group whose mission was to develop guidance for establishing a comprehensive configuration management (CM) program for the unique challenges of a new nuclear facility. The program elements developed for the pre-operation phase would then be in place to manage the configuration for the ...

2013-03-20T23:59:59.000Z

83

Proposal of service management system for multimedia network environment  

Science Conference Proceedings (OSTI)

In a multimedia network environment, the network connection is required to support real-time data transmission and flexible architecture. IEEE 1394, a high performance serial bus that guarantees real-time streaming and supports Plug & Play, would be ... Keywords: IEEE 1394, multimedia network, network configuration, plug & play, service discovery

Atsunobu Takagi; Takahiro Koita; Kenya Sato

2007-03-01T23:59:59.000Z

84

Management of electric vehicle battery charging in distribution networks.  

E-Print Network (OSTI)

??This thesis investigated the management of electric vehicle battery charging in distribution networks. Different electric vehicle fleet sizes and network locations were considered. The energy… (more)

Grau, Iñaki

2012-01-01T23:59:59.000Z

85

DOE-STD-1073-2003; DOE Technical Stadnard Configuration Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT SENSITIVE DOE-STD-1073-2003 October 2003 DOE STANDARD Configuration Management U.S. Department of Energy AREA CMAN Washington, D.C. 20585 DISTRIBUTION STATEMENT: Approved for public release; further dissemination unlimited. DOE-STD-1073-2003 Configuration Management This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax (301) 903-9823 or on the web at http://tis.eh.doe.gov/techstds/. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000.

86

Computer software configuration management plan for 200 East/West Liquid Effluent Facilities  

Science Conference Proceedings (OSTI)

This computer software management configuration plan covers the control of the software for the monitor and control system that operates the Effluent Treatment Facility and its associated truck load in station and some key aspects of the Liquid Effluent Retention Facility that stores condensate to be processed. Also controlled is the Treated Effluent Disposal System`s pumping stations and monitors waste generator flows in this system as well as the Phase Two Effluent Collection System.

Graf, F.A. Jr.

1995-02-27T23:59:59.000Z

87

Network-Driven Demand Side Management Website | Open Energy Informatio...  

Open Energy Info (EERE)

Side Management Website Jump to: navigation, search Name Network-Driven Demand Side Management Website Abstract This task of the International Energy Agency is a broad,...

88

PKM: a pairwise key management scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive ... Keywords: key distribution, key management, security, sensor networks

F. An; X. Cheng; J. M. Rivera; J. Li; Z. Cheng

2005-08-01T23:59:59.000Z

89

Configuration management plan for waste tank farms and the 242-A evaporator of tank waste remediation system  

SciTech Connect

The configuration management architecture presented in this Configuration Management Plan is based on the functional model established by DOE-STD-1073-93, ``Guide for Operational Configuration Management Program.`` The DOE Standard defines the configuration management program by the five basic program elements of ``program management,`` ``design requirements,`` ``document control,`` ``change control,`` and ``assessments,`` and the two adjunct recovery programs of ``design reconstitution,`` and ``material condition and aging management.`` The CM model of five elements and two adjunct programs strengthen the necessary technical and administrative control to establish and maintain a consistent technical relationship among the requirements, physical configuration, and documentation. Although the DOE Standard was originally developed for the operational phase of nuclear facilities, this plan has the flexibility to be adapted and applied to all life-cycle phases of both nuclear and non-nuclear facilities. The configuration management criteria presented in this plan endorses the DOE Standard and has been tailored specifically to address the technical relationship of requirements, physical configuration, and documentation during the full life cycle of the Waste Tank Farms and 242-A Evaporator of Tank Waste Remediation System.

Laney, T.

1994-08-30T23:59:59.000Z

90

Software solutions manage the definition, operation, maintenance and configuration control of the National Ignition Facility  

Science Conference Proceedings (OSTI)

The National Ignition Facility (NIF) is the world's largest laser composed of millions of individual parts brought together to form one massive assembly. Maintaining control of the physical definition, status and configuration of this structure is a monumental undertaking yet critical to the validity of the shot experiment data and the safe operation of the facility. The NIF business application suite of software provides the means to effectively manage the definition, build, operation, maintenance and configuration control of all components of the National Ignition Facility. State of the art Computer Aided Design software applications are used to generate a virtual model and assemblies. Engineering bills of material are controlled through the Enterprise Configuration Management System. This data structure is passed to the Enterprise Resource Planning system to create a manufacturing bill of material. Specific parts are serialized then tracked along their entire lifecycle providing visibility to the location and status of optical, target and diagnostic components that are key to assessing pre-shot machine readiness. Nearly forty thousand items requiring preventive, reactive and calibration maintenance are tracked through the System Maintenance & Reliability Tracking application to ensure proper operation. Radiological tracking applications ensure proper stewardship of radiological and hazardous materials and help provide a safe working environment for NIF personnel.

Dobson, D; Churby, A; Krieger, E; Maloy, D; White, K

2011-07-25T23:59:59.000Z

91

Wireless Sensors and Networks for Advanced Energy Management  

SciTech Connect

Numerous national studies and working groups have identified low-cost, very low-power wireless sensors and networks as a critical enabling technology for increasing energy efficiency, reducing waste, and optimizing processes. Research areas for developing such sensor and network platforms include microsensor arrays, ultra-low power electronics and signal conditioning, data/control transceivers, and robust wireless networks. A review of some of the research in the following areas will be discussed: (1) Low-cost, flexible multi-sensor array platforms (CO{sub 2}, NO{sub x}, CO, humidity, NH{sub 3}, O{sub 2}, occupancy, etc.) that enable energy and emission reductions in applications such as buildings and manufacturing; (2) Modeling investments (energy usage and savings to drive capital investment decisions) and estimated uptime improvements through pervasive gathering of equipment and process health data and its effects on energy; (3) Robust, self-configuring wireless sensor networks for energy management; and (4) Quality-of-service for secure and reliable data transmission from widely distributed sensors. Wireless communications is poised to support technical innovations in the industrial community, with widespread use of wireless sensors forecasted to improve manufacturing production and energy efficiency and reduce emissions. Progress being made in wireless system components, as described in this paper, is helping bring these projected improvements to reality.

Hardy, J.E.

2005-05-06T23:59:59.000Z

92

Energy Management in Wireless Sensor Network Operations  

E-Print Network (OSTI)

In this dissertation, we develop and analyze effective energy management policies for wireless sensor networks in emerging applications. Existing methods in this area have primarily focused on energy conservation through the use of various communication techniques. However, in most applications of wireless sensor networks, savings in energy come at the expense of several performance parameters. Therefore it is necessary to manage energy consumption while being conscious of its effects on performance. In most cases, such energy-performance issues are specific to the nature of the application. Our research has been motivated by new techniques and applications where efficient energy-performance trade-off decisions are required. We primarily study the following trade-off cases: energy and node replacement costs (Case I), energy and delay (Case II), and energy and availability (Case III). We consider these trade-off situations separately in three distinct problem scenarios. In the first problem (Case I), we consider minimizing energy and node replacement costs in underwater wireless sensor networks for seismic monitoring application. In this case, we introduce mixed-integer programming (MIP) formulations based on a combined routing and node replacement policy approach and develop effective policies for large problem instances where our MIP models are intractable. In the second problem (Case II), we develop a Markov decision process (MDP) model to manage energy-delay trade-off in network coding which is a new energy-saving technique for wireless networks. Here we derive properties of the optimal policy and develop in- sights into other simple policies that are later shown to be efficient in particular situations. In the third problem (Case III), we consider an autonomous energy harvesting sensor network where nodes are turned off from time to time to operate in an “energy-neutral” manner. In this case, we use stochastic fluid-flow analysis to evaluate and analyze the availability of the sensor nodes under effective energy management policies. In each of the above problem cases, we develop analytical formulations, and derive and/or analyze policies that effectively manage the considered energy-performance trade-off. Overall, our analyses and solution methods make new contributions to both operations research and communication networking literature.

Mohapatra, Arupa Kumar

2013-08-01T23:59:59.000Z

93

Treated Effluent Disposal Facility (TEDF) Operator Training Station (OTS) System Configuration Management Plan  

Science Conference Proceedings (OSTI)

The Treated Effluent Disposal Facility Operator Training Station (TEDF OTS) is a computer based training tool designed to aid plant operations and engineering staff in familiarizing themselves with the TEDF Central Control System (CCS). It consists of PC compatible computers and a Programmable Logic Controller (PLC) designed to emulate the responses of various plant components connected to or under the control of the CCS. The system trains operators by simulating the normal operation but also has the ability to force failures of different equipment allowing the operator to react and observe the events. The paper describes organization, responsibilities, system configuration management activities, software, and action plans for fully utilizing the simulation program.

Carter, R.L. Jr.

1994-06-01T23:59:59.000Z

94

No. 7 Signaling Network Configuration for Interworking Between B-ISDN and N-ISDN  

Science Conference Proceedings (OSTI)

Abstract: No.7 Signaling is used to transfer signaling and control information between network nodes in ISDN, Intelligent Network and Mobile Network. It is also used ATM-based B-ISDN signaling network. In the beginning of B-ISDN, broadband network services ...

Hwa-Suk Kim; Yun-Young An; Woo-Seop Rhee

1998-01-01T23:59:59.000Z

95

DOE-STD-1073-93-Pt. 1; DOE Standard Guide for Operational Configuration Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3-93-Pt.2 3-93-Pt.2 November 1993 DOE STANDARD GUIDE FOR OPERATIONAL CONFIGURATION MANAGEMENT PROGRAM Including the Adjunct Programs of Design Reconstitution and Material Condition and Aging Management PART ll U.S. Department of Energy AREA CMAN Washington, D.C. 20585 DISTRIBUTION STATEMENT A: Approved for public release; distribution Is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (615) 576-8401. Available to the public from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal Rd., Springfield, VA 22161. Order No. DE94005408 i CONTENTS FOREWORD .

96

Power management in energy harvesting sensor networks  

E-Print Network (OSTI)

Power management is an important concern in sensor networks, because a tethered energy infrastructure is not available and an obvious concern is to use the available battery energy efficiently. However, in some of the sensor networking applications, an additional facility is available to ameliorate the energy problem: harvesting energy from the environment. Certain considerations in using an energy harvesting source are fundamentally different from that in using a battery because, rather than a limit on the maximum energy, it has a limit on the maximum rate at which the energy can be used. Further, the harvested energy availability typically varies with time in a nondeterministic manner. While a deterministic metric such as residual battery suffices to characterize the energy availability in the case of batteries, a more sophisticated characterization may be required for a harvesting source. Another issue that becomes important in networked systems with multiple harvesting nodes is that different nodes may have different harvesting opportunity. In a distributed application, the same end-user performance may be achieved using different workload allocations, and resultant energy consumptions, at multiple nodes. In this case it is important to align the workload allocation with the energy availability at the harvesting nodes. We consider the above issues in power management for energy harvesting sensor networks. We develop abstractions to characterize the complex time varying nature of such sources with analytically tractable models and use them to address key design issues. We also develop distributed methods to efficiently use harvested energy and test these both in simulation and experimentally on an energy harvesting sensor network, prototyped for this work.

Aman Kansal; Jason Hsu; Sadaf Zahedi; Mani B Srivastava

2006-01-01T23:59:59.000Z

97

Creating a strategic plan for configuration management using computer aided software engineering (CASE) tools  

SciTech Connect

This paper provides guidance in the definition, documentation, measurement, enhancement of processes, and validation of a strategic plan for configuration management (CM). The approach and methodology used in establishing a strategic plan is the same for any enterprise, including the Department of Energy (DOE), commercial nuclear plants, the Department of Defense (DOD), or large industrial complexes. The principles and techniques presented are used world wide by some of the largest corporations. The authors used industry knowledge and the areas of their current employment to illustrate and provide examples. Developing a strategic configuration and information management plan for DOE Idaho Field Office (DOE-ID) facilities is discussed in this paper. A good knowledge of CM principles is the key to successful strategic planning. This paper will describe and define CM elements, and discuss how CM integrates the facility`s physical configuration, design basis, and documentation. The strategic plan does not need the support of a computer aided software engineering (CASE) tool. However, the use of the CASE tool provides a methodology for consistency in approach, graphics, and database capability combined to form an encyclopedia and a method of presentation that is easily understood and aids the process of reengineering. CASE tools have much more capability than those stated above. Some examples are supporting a joint application development group (JAD) to prepare a software functional specification document and, if necessary, provide the capability to automatically generate software application code. This paper briefly discusses characteristics and capabilities of two CASE tools that use different methodologies to generate similar deliverables.

Smith, P.R.; Sarfaty, R.

1993-05-01T23:59:59.000Z

98

A study on SDH/OTN integrated network management method  

Science Conference Proceedings (OSTI)

An efficient management method for the Optical Transport Network (OTN) and Synchronous Digital Hierarchy (SDH) integrated network is described. We propose layer boundary section by focusing on the connection terminal point function on the OTN layer and, ... Keywords: OTN, SDH, integrated management, overlay-network

Kei Karato; Shun Yamamoto; Tomoyoshi Kataoka; Yukihide Yana; Yuzo Fujita

2009-09-01T23:59:59.000Z

99

Hybrid trust and reputation management for sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sensor networks need to be lightweight in terms of computational and communication ... Keywords: Reputation management, Sensor networks, Trust establishment

Efthimia Aivaloglou; Stefanos Gritzalis

2010-07-01T23:59:59.000Z

100

Service and Network Management Interworking in Future Wireless Systems  

Science Conference Proceedings (OSTI)

The need for seamless communications in future wireless networks imposes the development of distributed management systems, in which we can distinguish between different business entities, the Service and Network Providers. Such a highly dynamic environment ...

V. Tountopoulos; Vera Stavroulaki; Panagiotis Demestichas; Nikolas Mitrou; Michael E. Theologou

2002-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

102

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

103

Solar Energy Collection and Management for Networked Infomechanical Systems (NIMS)  

E-Print Network (OSTI)

Networked Sensing Solar Energy Collection and Management forProposed Solution: Solar Energy Harvesting Why is Solarbeing recharged • Solar energy harvesting and storage allow

2003-01-01T23:59:59.000Z

104

A Trustworthy Mobile Agent Infrastructure for Network Management  

E-Print Network (OSTI)

Koliousis,A.K. Sventek,J.S. The Tenth IFIP/IEEE International Symposium on Integrated Network Management 2007 (IM'07) pp 383-390 IEEE

Koliousis, A.K.

105

Evaluating The Performance Of Mobile Agents In Network Management  

E-Print Network (OSTI)

Currently, most network management systems are centralized and therefore, they can not scale when the size or the complexity of the network increases. This paper aims to investigate mobile agent scalability in network management, in order to nd when mobile agents improve the management efficiency. We compare mobile agent performance with SNMP one in several simulations. Results show that the mobile agent performs better when the number of managed network elements ranges between two bounds and that the mobile agent is less sensitive to changes on a general topology.

Marcelo Gonçalves Rubinstein; Otto Carlos Muniz Bandeira Duarte; Marcelo Gon#alves Rubinstein; Otto Carlos Muniz B; Eira Duarte

1999-01-01T23:59:59.000Z

106

Module Configuration  

SciTech Connect

A stand alone battery module including: (a) a mechanical configuration; (b) a thermal management configuration; (c) an electrical connection configuration; and (d) an electronics configuration. Such a module is fully interchangeable in a battery pack assembly, mechanically, from the thermal management point of view, and electrically. With the same hardware, the module can accommodate different cell sizes and, therefore, can easily have different capacities. The module structure is designed to accommodate the electronics monitoring, protection, and printed wiring assembly boards (PWAs), as well as to allow airflow through the module. A plurality of modules may easily be connected together to form a battery pack. The parts of the module are designed to facilitate their manufacture and assembly.

Oweis, Salah (Ellicott City, MD); D' Ussel, Louis (Bordeaux, FR); Chagnon, Guy (Cockeysville, MD); Zuhowski, Michael (Annapolis, MD); Sack, Tim (Cockeysville, MD); Laucournet, Gaullume (Paris, FR); Jackson, Edward J. (Taneytown, MD)

2002-06-04T23:59:59.000Z

107

Large engineering project risk management using a Bayesian belief network  

Science Conference Proceedings (OSTI)

This paper presents a scheme for large engineering project risk management using a Bayesian belief network and applies it to the Korean shipbuilding industry. Twenty-six different risks were deduced from expert interviews and a literature review. A survey ... Keywords: Bayesian belief network, Risk management in large engineering projects, Shipbuilding industry

Eunchang Lee; Yongtae Park; Jong Gye Shin

2009-04-01T23:59:59.000Z

108

Using Hy+ for network management and distributed debugging  

Science Conference Proceedings (OSTI)

A network manager managing a computer network or a programmer attempting to understand and debug a distributed program both must deal with large volumes of data. Visualization is widely believed to help in these and similar tasks. We contend that visualization ...

Mariano P. Consens; Masum Z. Hasan; Alberto O. Mendelzon

1993-10-01T23:59:59.000Z

109

A modular middleware for high-level dynamic network management  

Science Conference Proceedings (OSTI)

In addition to the control and supervision of components and connections, network management middlewares are required to enhance reliability and efficiency of distributed systems. In this paper, we describe a modular and distributed middleware architecture ... Keywords: ant algorithms, intelligent middleware, network management, swarm intelligence

Amos Brocco; Béat Hirsbrunner; Michèle Courant

2007-03-01T23:59:59.000Z

110

A privilege management system for a secure network  

Science Conference Proceedings (OSTI)

Modern research projects may involve dozens of geographically distributed collaborators who access distributed information, applications workstations and devices. We are developing an architecture and methods for distributed, decentralized privilege ... Keywords: CEBAF, Chinese Institute of High Energy Physics, Continuous Electron Beam Accelerator Facility, DICCE project, Distributed Informatics Computing and Collaborative Environments project, ESnet, Internet, Old Dominion University, US Department of Energy's Energy Science Network, World Wide Web based interfaces, X-windows, authentication, authorisation, authorization, computer network management, design, distributed computing environment networks, distributed information, implementation, network interfaces, privilege management system, secure network

K. J. Maly; A. Gupta; B. Kvande; I. B. Levinstein; R. Mukkamala; M. Olson; R. Whitney; R. Chambers

1996-06-01T23:59:59.000Z

111

Power Management in Disruption Tolerant Networks .  

E-Print Network (OSTI)

??Disruption Tolerant Networks (DTNs) are mobile wireless networks that are designed to work in highly-challenged environments where the density of nodes is insufficient to support… (more)

Jun, Hyewon

2007-01-01T23:59:59.000Z

112

Free-space-optical mobile ad hoc networks: Auto-configurable building blocks  

Science Conference Proceedings (OSTI)

Existence of line of sight (LOS) and alignment between the communicating antennas is one of the key requirements for free-space-optical (FSO) communication. To ensure uninterrupted data flow, auto-aligning transmitter and receiver modules are necessary. ... Keywords: Angular diversity, Auto-configurable, Free space optical communication

Murat Yuksel; Jayasri Akella; Shivkumar Kalyanaraman; Partha Dutta

2009-04-01T23:59:59.000Z

113

CAVEMAN: Configuration And VErsion MANagement. User`s guide, v2.1.2  

SciTech Connect

The mission of the CAVEMAN project is to provide the tools for large code systems so that those who work on them can perform source control and configuration control on UNIX-based file servers, rather than the LC Crays. An outside product called cvs has been chosen as the underlying source control system. The initials stand for {open_quotes}Concurrent Versions System{close_quotes}. It is a freeware program that runs on most UNIX stations. To quote from the cvs man page: {open_quotes}cvs is a front end to the rcs revision control system which extends the notion of revision control from a collection of files in a single directory to a hierarchical collection of directories consisting of revision controlled files. These directories and files can be combined together to form a software release. cvs provides the functions necessary to manage these software releases and to control the concurrent editing of source files among multiple software developers.{close_quotes} While cvs may be run directly, there are several tasks in the LLNL environment that it seemed either safer or easier to automate. CAVEMAN provides the needed functionality, generally in the form of wrappers to cvs.

Dyer, K.M.

1993-03-12T23:59:59.000Z

114

Definitions of Managed Objects for Synchronous Optical Network (SONET) Linear Automatic Protection Switching (APS) Architectures  

Science Conference Proceedings (OSTI)

This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets. In particular, it defines objects for managing networks using Synchronous Optical Network (SONET) linear Automatic ...

J. Kuhfeld; J. Johnson; M. Thatcher

2003-03-01T23:59:59.000Z

115

Airblue : a highly-configurable FPGA-based platform for wireless network research  

E-Print Network (OSTI)

Over the past few years, researchers have developed many cross-layer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols require both high-speed simulations and ...

Ng, Man Cheuk, 1980-

2011-01-01T23:59:59.000Z

116

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let...

117

Light Water Reactor Sustainability Program Technical Basis Guide Describing How to Perform Safety Margin Configuration Risk Management  

SciTech Connect

The INL has carried out a demonstration of the RISMC approach for the purpose of configuration risk management. We have shown how improved accuracy and realism can be achieved by simulating changes in risk – as a function of different configurations – in order to determine safety margins as the plant is modified. We described the various technical issues that play a role in these configuration-based calculations with the intent that future applications can take advantage of the analysis benefits while avoiding some of the technical pitfalls that are found for these types of calculations. Specific recommendations have been provided on a variety of topics aimed at improving the safety margin analysis and strengthening the technical basis behind the analysis process.

Curtis Smith; James Knudsen; Bentley Harwood

2013-08-01T23:59:59.000Z

118

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

119

SENDROM: sensor networks for disaster relief operations management  

Science Conference Proceedings (OSTI)

SENDROM is a new sensor network architecture to manage the rescue operations after large scale disasters. This architecture mainly consists of sensor nodes deployed prior to a disaster and central nodes that can query sensor nodes. Central nodes are ... Keywords: data dissemination, disaster relief operations, sesnor networks, task dissemination

Erdal Cayirci; Tolga Coplu

2007-06-01T23:59:59.000Z

120

Similarity management in phonebookcentric social networks  

E-Print Network (OSTI)

In the past years many social network implementations have come to existence. There is not one network but many, and the user-base of these networks is different. Connecting the users of the separate networks is currently unsolved and seducing new users to existing systems becomes harder and harder as the users are not willing to join too many systems and build up their contact base from scratch each time. In this paper we propose a solution for the problem of finding existing contacts in a new system. An implementation of the described algorithm is also illustrated. Utilizing the algorithm in existing or new social networks can efficiently reduce the time needed for the users to find their friends in a newly joined network. 1.

Péter Ekler; Zoltán Ivánfi; Kristóf Aczél

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Network partitioning and self-sizing methods for QoS management with autonomic characteristics  

Science Conference Proceedings (OSTI)

The increasing complexity, heterogeneity and unpredictability of networks make the task of managing these systems highly complex. The autonomic computing paradigm brings innovative solutions to the network management area with new adaptable and "clever" ... Keywords: LSPs, MPLS, autonomic computing, bandwidth allocation, computational complexity, network management, network partitioning, quality of service, self-sizing networks

Romildo Martins Da Silva Bezerra; Joberto Sérgio Barbosa Martins

2009-09-01T23:59:59.000Z

122

Mapping and configuration methods for multi-use-case networks on chips  

E-Print Network (OSTI)

To provide a scalable communication infrastructure for Systems on Chips (SoCs), Networks on Chips (NoCs), a communication centric design paradigm is needed. To be cost effective, SoCs are often programmable and integrate several different applications or use-cases on to the same chip. For the SoC platform to support the different use-cases, the NoC architecture should satisfy the performance constraints of each individual use-case. In this work we motivate the need to consider multiple use-cases during the NoC design process. We present a method to efficiently map the applications on to the NoC architecture, satisfying the design constraints of each individual use-case. We also present novel ways to dynamically reconfigure the network across the different use-cases and explore the possibility of integrating Dynamic Voltage and Frequency Scaling (DVS/DFS) techniques with the use-case centric NoC design methodology. We validate the performance of the design methodology on several SoC applications. The dynamic reconfiguration of the NoC integrated with DVS/DFS schemes results in large power savings for the resulting NoC systems.

Srinivasan Murali

2006-01-01T23:59:59.000Z

123

Study of location management for next generation personal communication networks  

Science Conference Proceedings (OSTI)

The main target of location management is to maintain location of users while minimizing the system operation. The process consists of location update, paging, and database consideration. The location update and paging manages the user-network interaction ... Keywords: centralized database (CDB), distributed database (DDB), location area scheme, location update, timer-based update strategy, velocity paging (VP)

Teerapat Sanguankotchakorn; Panuvit Wibullanon

2005-03-01T23:59:59.000Z

124

PRESTO: feedback-driven data management in sensor networks  

Science Conference Proceedings (OSTI)

This paper presents PRESTO, a novel two-tier sensor data management architecture comprising proxies and sensors that cooperate with one another for acquiring data and processing queries. PRESTO proxies construct time-series models of observed trends ... Keywords: data management, model-driven push, sensor networks, time-series models

Ming Li; Deepak Ganesan; Prashant Shenoy

2009-08-01T23:59:59.000Z

125

A generic architecture for autonomic service and network management  

Science Conference Proceedings (OSTI)

As the Internet evolves into an all-IP communication infrastructure, a key issue to consider is that of creating and managing IP-based services with efficient resource utilization in a scalable, flexible, and automatic way. In this paper, we present ... Keywords: Autonomic service management, Bandwidth sharing, DiffServ/MPLS networks, Quality of service, Service level agreement

Yu Cheng; Ramy Farha; Myung Sup Kim; Alberto Leon-Garcia; James Won-Ki Hong

2006-11-01T23:59:59.000Z

126

Agent-based policy-enabled network management architecture for mobile ad hoc networks  

Science Conference Proceedings (OSTI)

We describe in this paper a novel design of a network management architecture that incorporates both agent and policy technologies. The conceptual model, main components, and various transports employed in this architecture are discussed. We believe ...

Ritu Chadha; Cho-Yu Jason Chiang; Mike Little; Sunil Samtani

2003-10-01T23:59:59.000Z

127

A File Location, Replication, and Distribution System for Network Information to Aid Network Management  

E-Print Network (OSTI)

This thesis demonstrates and evaluates the design, architecture, and implementation of a file location, replication, and distribution system built with the objective of managing information in an Internet network. The ...

Cheng, Tiffany

2010-09-22T23:59:59.000Z

128

A file location, replication, and distribution system for network information to aid network management  

E-Print Network (OSTI)

This thesis demonstrates and evaluates the design, architecture, and implementation of a file location, replication, and distribution system built with the objective of managing information in an Internet network. The ...

Cheng, Tiffany (Tiffany R.)

2010-01-01T23:59:59.000Z

129

Network Management and Performance Monitoring at SLAC  

E-Print Network (OSTI)

Subjectively, the ultimate measurers of system performance are the users and their perceptions of the performance of their networked applications. The performance of a system is affected by the physical network plant (routers, bridges, hubs, etc.) as well as by every "computer " and peripheral device that is attached to it, and the software running on the computers and devices. Performance monitoring of a network must therefore include computer systems and services monitoring and well as monitoring of the physical network plant. This paper will describe how this challenge has been tackled at SLAC, and how, via the World Wide Web 1,2 , this information is made available for quick perusal by concerned personnel and users. INTRODUCTION The ultimate measure of system performance is the perception of the users. The users' perception is generally based on the response time to various commands they enter at their keyboards. This maybe any command from a print command, the submission of a l...

Logg And; C. A. Logg; R. L. A. Cottrell

1995-01-01T23:59:59.000Z

130

Revenue Management in a Dynamic Network Environment  

E-Print Network (OSTI)

. Typical applications include sequential reservations for an airline network, hotel, or car rental service an airline (hotel, car rental) net- work composed of l legs (pairs of consecutive days for hotels, car : Rj is the fare category of class j, which utilizes aij units of resource (leg) i. In this way, 0041

Bertsimas, Dimitris

131

CONGESTION MANAGEMENT ALLOCATION IN MULTIPLE TRANSACTION NETWORKS  

E-Print Network (OSTI)

the nondiscriminatory transmission charges for each transaction's usage of the network. We illustrate the workings in the rapid disintegration of the well-entrenched vertically integrated structure of the electric industry of transactions. In the new competitive electricity market environment, the transmission system takes on a common

Gross, George

132

KALwEN: a new practical and interoperable key management scheme for body sensor networks  

Science Conference Proceedings (OSTI)

Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made. ... Keywords: body area networks, body sensor networks, healthcare, key management, security

Yee Wei Law; Giorgi Moniava; Zheng Gong; Pieter Hartel; Marimuthu Palaniswami

2011-11-01T23:59:59.000Z

133

Basic Tradeoffs for Energy Management in Rechargeable Sensor Networks  

E-Print Network (OSTI)

As many sensor network applications require deployment in remote and hard-to-reach areas, it is critical to ensure that such networks are capable of operating unattended for long durations. Consequently, the concept of using nodes with energy replenishment capabilities has been gaining popularity. However, new techniques and protocols must be developed to maximize the performance of sensor networks with energy replenishment. Here, we analyze limits of the performance of sensor nodes with limited energy, being replenished at a variable rate. We provide a simple localized energy management scheme that achieves a performance close to that with an unlimited energy source, and at the same time keeps the probability of complete battery discharge low. Based on the insights developed, we address the problem of energy management for energy-replenishing nodes with finite battery and finite data buffer capacities. To this end, we give an energy management scheme that achieves the optimal utility asymptotically while kee...

Srivastava, Rahul

2010-01-01T23:59:59.000Z

134

Belgium east loop active network management (Smart Grid Project) | Open  

Open Energy Info (EERE)

Belgium east loop active network management (Smart Grid Project) Belgium east loop active network management (Smart Grid Project) Jump to: navigation, search Project Name Belgium east loop active network management Country Belgium Coordinates 50.148746°, 4.086914° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.148746,"lon":4.086914,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

135

A Re-Engineering, Methodology for CooperativeManagement of Enterprise Networks  

Science Conference Proceedings (OSTI)

With the increasing implementation by networked mission-critical applications, an enterprise network is becoming the lifeline of an organization. Massive investments are being made in the modernization of enterprise networks of diverse service organizations, ... Keywords: CSCW, ENTERPRISE NETWORKS, MANAGEMENT PROCESSES, NETWORK AND SYSTEMS MANAGEMENT, REENGINEERING

Pradeep Ray; Michael Fry; Bhumip Khasnabish

1999-03-01T23:59:59.000Z

136

An expert system for temporal planning with an application to runway configuration management  

E-Print Network (OSTI)

This thesis describes an expert system to aid in the management of operations in complex qualitative domains characterized by multiple parallel activities with time-critical relationships. An extension to "standard" temporal ...

Hazelton, Lyman R.

1991-01-01T23:59:59.000Z

137

The Use of Context-Aware Policies and Ontologies to Facilitate Business-Aware Network Management  

Science Conference Proceedings (OSTI)

The purpose of autonomic networking is to manage the business and technical complexity of networked components and systems. However, existing network management data has no link to business concepts. This makes it very difficult to ensure that services ... Keywords: Context, Ontology-based management, Policy management, Semantic reasoning

John Strassner; Sven Meer; Declan O'Sullivan; Simon Dobson

2009-09-01T23:59:59.000Z

138

Configuration Management: A Critical Analysis of Applications Using the 8-Step Problem Solving Method L.L. Fletcher, PhD, SIDC, Advanced Space Operations School, Colorado Springs, CO, USA.  

E-Print Network (OSTI)

life" (MIL-HDBK-61A, 2001, p. 3-4). The de facto configuration management process of the operational, configuration information needed to manage products and product information effectively" (MIL-HDBK-61A, 2001, p, Military Handbook: Configuration Management Guidance, MIL-HDBK-61A (SE), Washington DC, 2001. Biography

Johnson, Chris

139

Network and System Management for Reliability and Cyber Security  

Science Conference Proceedings (OSTI)

The evolving control of the electric power grid is increasingly dependent on information technology and telecommunication infrastructures, which, like the grid itself, must be managed in a holistic way to ensure reliability and security. The management of this information infrastructure requires connectivity and analytics to support both information technology (IT) and operational technology (OT) assets in a unified manner.This project utilized a telecommunications modeled network ...

2012-11-28T23:59:59.000Z

140

Power flow management of microgrid networks using model predictive control  

Science Conference Proceedings (OSTI)

In this paper, we present a power flow management method for a network of cooperating microgrids within the context of a smart grid by formulating the problem in a model predictive control framework. In order to reliably and economically provide the ... Keywords: Microgrid, Model predictive control, Renewable energy sources, Smart grid, Storage devices

A. Hooshmand; H. A. Malki; J. Mohammadpour

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Social Networking for Emergency Management and Public Safety  

SciTech Connect

On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

2010-08-31T23:59:59.000Z

142

Network Security Management for Transmission Systems  

Science Conference Proceedings (OSTI)

The electric power grid is increasingly dependent on information technology and telecommunication infrastructures.   While great benefits will result from this influx of technology, a holistic and granular awareness of all elements of the information infrastructure supporting a control subsystem will be critical to ensure long term reliability and security. The management of this information infrastructure requires connectivity and analytics to support both IT and OT assets in a unified ...

2012-12-31T23:59:59.000Z

143

Open problems in network-aware data management in exa-scale computing and terabit networking era  

Science Conference Proceedings (OSTI)

Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, ... Keywords: data-intensive, distributed computing, high-bandwidth networks, network-aware tools, resource provisioning

Mehmet Balman; Surendra Byna

2011-11-01T23:59:59.000Z

144

Computer software configuration management plan for the 241-AY and 241-AZ tank farm MICON automation system  

SciTech Connect

Software configuration items pertaining to the process control systems, of the ventilation systems of the tank farms, are identified and configuration controls are defined.

Teats, M.C.

1995-04-01T23:59:59.000Z

145

DOE-STD-1073-93-Pt. 1; DOE Standard Guide for Operational Configuration Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

85 85 CHAPTER 4 IMPLEMENTATION GUIDANCE FOR MATERIAL CONDITION AND AGING MANAGEMENT This guidance is appropriate for high-hazard facilities expected to operate for an extended period. Since DOE facilities vary in hazard level and circumstances of operation, a graded approach to implementation should be adopted. As shown in Figure 4-1, Material Condition and Aging Management (MCA) activities are developed and implemented in three distinct phases: a preliminary phase, a detailed or main phase, and an ongoing phase. The preliminary MCA phase includes activities necessary to estimate the facility remaining lifetime and to develop the MCA program plan. The detailed MCA phase builds on the preliminary estimate of facility remaining lifetime with more rigorous evaluations of aging degradation mechanisms

146

Knowledge-based mobility management for personal agents in the all-mobile network  

Science Conference Proceedings (OSTI)

The paper deals with mobility management in the all-mobile network where mobile and intelligent software agents represent the users in the network and support terminal, user and service mobility. A mobility management model, suitable for the agent's ...

Ignac Lovrek; Vjekoslav Sinkovic

2008-12-01T23:59:59.000Z

147

U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and...

148

DOE-STD-1073-93-Pt. 1; DOE Standard Guide for Operational Configuration Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61 61 CHAPTER 3 IMPLEMENTATION GUIDANCE FOR DESIGN RECONSTITUTION This guidance is appropriate for high-hazard facilities expected to operate for an extended period. Since DOE facilities vary in hazard level and circumstances of operation, a graded approach to implementation should be adopted. The implementation guidance is presented in the general sequence in which the design reconstitution (DR) adjunct program is expected to be developed and implemented. Figure 3-1 presents the top- level flowchart for the DR adjunct program. 3.1 PROGRAM PLANS AND PROCEDURES 3.1.1 DESIGN RECONSTITUTION PROGRAM PLAN The DR program plan should address the topics defined in program criterion 1.3.1.1.c. It should be prepared in accordance with direction set forth by the program management element of the CM

149

Edison Configuration  

NLE Websites -- All DOE Office Websites (Extended Search)

Configuration Configuration NERSC's newest supercomputer, named Edison after U.S. inventor and businessman Thomas Alva Edison, will have a peak performance of more than 2 petaflops...

150

A comprehensive solution to ATM network planning and bandwidth management using Genetic Algorithm  

Science Conference Proceedings (OSTI)

Wireless Asynchronous Transfer Mode (ATM) is fast becoming an option in the telecommunication area and consequently there is a renewed interest in developing broadband integrated service of digital network technologies namely ATM. In order to ... Keywords: ATM networks, ATM planning, GAs, asynchronous transfer mode, bandwidth management, genetic algorithms, network design, network planning, optimisation, passive optical networks, wireless ATM

Susmi Routray; Arun Mohan Sherry; B. V. R. Reddy

2008-03-01T23:59:59.000Z

151

Distributed data management in a minicomputer network: the SEEDIS experience  

Science Conference Proceedings (OSTI)

This paper describes distributed data management aspects of SEEDIS (Socio-Economic Environmental Demographic Information System). SEEDIS is an experimental system for the retrieval, analysis, and display of geographically linked data. SEEDIS operates on nine computers in a nationwide network. Users at any location select and retrieve all data in the same way, regardless of whether they are stored locally or at a remote location. The network implementation has been substantially modified during 1983. New enhancements include: local caching of data files to improve efficiency; linking to an automatic tape library (ATL) to make larger volumes of data accessible; node independence to facilitate automatic sharing of data among autonomous SEEDIS installations without the need for central control; improvements providing robust operation despite unreliable network connections; and automatic recording of all cache transactions for subsequent statistical analysis.

Merrill, D.; McCarthy, J.; Gey, F.; Holmes, H.

1982-10-07T23:59:59.000Z

152

Power management and power control in wireless networks  

E-Print Network (OSTI)

With the proliferation of portable computing platforms and small wireless devices, wireless networks have received more and more attention as a means for providing data communications among devices regardless of their physical locations. However, due to the slow advancement in battery technology, battery power continues to be a constrained resource in wireless networks and thus energy conservation remains to be an important issue. In this book chapter, we provide a taxonomy of power management and power control algorithms and protocols for wireless networks. We start with a description of energy consumption characteristics of wireless devices, and identify the power consumed in the wireless transmitters essentially consists of two parts: power consumed by the radio electronic and power consumed in the RF output. To save power, one can either turn off the radio electronic and put wireless devices into the power saving mode at appropriate times, or adjust the RF output power (and hence the wireless transmission range) subject to maintaining network connectivity and bi-directionality. The former techniques are termed as power management, while the latter power

Rong Zheng; Jennifer C. Hou; Ning Li

2004-01-01T23:59:59.000Z

153

Active Network Management (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

Management (Smart Grid Project) Management (Smart Grid Project) Jump to: navigation, search Project Name Active Network Management Country United Kingdom Coordinates 55.378052°, -3.435973° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":55.378052,"lon":-3.435973,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

154

CONFIGURATION MANAGEMENT (CM)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

is established and supported by training and procedures to maintain control over the design and modifications. (CORE REQUIREMENTS 1, 2, 5, 7, 8, 9, 10, and 13) Requirements: *...

155

Cielo Configuration management  

SciTech Connect

This talk will explain to our admins what steps were necessary to bring Cielo under Cfengine control and help understand the nature of the beast.

Grunau, Daryl [Los Alamos National Laboratory

2012-06-01T23:59:59.000Z

156

Review of Electrical System Configuration Management and Design Change Control at the Savannah River Site, Waste Solidification Building Project, July 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent Review of Independent Review of Electrical System Configuration Management and Design Change Control at the Savannah River Site, Waste Solidification Building Project July 2011 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose ......................................................................................................................................1 2.0 Scope .........................................................................................................................................1 3.0 Background ...............................................................................................................................2

157

Review of Electrical System Configuration Management and Design Change Control at the Savannah River Site, Waste Solidification Building Project, July 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

Independent Review of Independent Review of Electrical System Configuration Management and Design Change Control at the Savannah River Site, Waste Solidification Building Project July 2011 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose ......................................................................................................................................1 2.0 Scope .........................................................................................................................................1 3.0 Background ...............................................................................................................................2

158

An optimization framework for the energy management of carrier ethernet networks with Multiple Spanning Trees  

Science Conference Proceedings (OSTI)

We propose an energy management framework to optimize the energy consumption of networks using the Multiple Spanning Tree Protocol such as Carrier Grade Ethernet networks. The objective is to minimize the energy consumption of nodes and links while considering ... Keywords: Carrier Grade Ethernet, Green networking, Network design, Routing optimization, Spanning Trees, Traffic engineering

Antonio Capone; Daniele Corti; Luca Gianoli; Brunilde Sansó

2012-11-01T23:59:59.000Z

159

Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes  

E-Print Network (OSTI)

Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes Vinod Sharma at that time at the node. For such networks we develop efficient energy management policies. First for the largest possible data rate. Next we obtain energy management policies which minimize the mean delay

Sharma, Vinod

160

Quasi-parallel network applications in real-time distribution management system  

Science Conference Proceedings (OSTI)

In modern distribution management systems (DMSs), the real-time calculation of the network's state plays an important role for the operation of the network. High sophisticated algorithms for the estimation and calculation of the system's ...

Izudin Dzafic; Hans-Theo Neisius

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

U-229: HP Network Node Manager i Input Validation Flaw Permits...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network...

162

Traffic Management and Net Neutrality in Wireless Networks  

E-Print Network (OSTI)

with desired network operation in wireless networks than inwireless devices have a greater ability to negatively interfere with desired network operation

Jordan, Scott

2011-01-01T23:59:59.000Z

163

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager i Input Validation Hole Permits 4: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

164

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

165

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Cisco Prime Data Center Network Manager JBoss RMI Services 14: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands November 1, 2012 - 6:00am Addthis PROBLEM: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands PLATFORM: All Cisco Prime Data Center Network Manager releases prior to release 6.1(1), for both the Microsoft Windows and Linux platforms, are affected by this vulnerability. ABSTRACT: A vulnerability was reported in Cisco Prime Data Center Network Manager. REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20121031-dcnm SecurityTracker Alert ID: 1027712 CVE-2012-5417 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability exists because JBoss Application Server Remote Method

166

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

167

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

204: HP Network Node Manager i Input Validation Hole Permits 204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

168

70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Package  

Science Conference Proceedings (OSTI)

A comprehensive program of textbook, lab manual and software, this Microsoft Official Academic Course provides everything students need to build the knowledge and skills necessary to configure, manage, and troubleshoot a Microsoft Windows Server 2003 ...

Microsoft Official Academic Course

2010-02-01T23:59:59.000Z

169

Alternate configuration  

SciTech Connect

These vugraphs present some configurations for the Tiber tokamak. The presentation concludes that the number of components exposed to the plasma vacuum should be minimized. (JDH)

Lousteau, D.C.

1987-01-01T23:59:59.000Z

170

U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, 4: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information October 4, 2012 - 6:00am Addthis PROBLEM: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information PLATFORM: HP Network Node Manager I (NNMi) v9.20 for HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. reference LINKS: HP Security Bulletin: c03507708 SecurityTracker Alert ID: 1027605 Security Focus: 524302 CVE-2012-3267 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Network Node

171

Improving sensornet performance by separating system configuration from system logic  

Science Conference Proceedings (OSTI)

Many sensor network protocols are self-configuring, but independent self-configuration at different layers often results in suboptimal performance. We present Chi, a full-system configuration architecture that separates system logic from system configuration. ...

Niclas Finne; Joakim Eriksson; Nicolas Tsiftes; Adam Dunkels; Thiemo Voigt

2010-02-01T23:59:59.000Z

172

Broadcast routing in wireless sensor networks with dynamic power management and multi-coverage backbones  

Science Conference Proceedings (OSTI)

In a wireless sensor network (WSN), nodes are power constrained. As a consequence, protocols must be energy efficient to prolong the network lifetime while keeping some quality-of-service (QoS) requirements. In WSNs, most protocols resort to the broadcast ... Keywords: Battery capacity recovery, Battery model, Dynamic power management, Multi-coverage backbones, Topology control, Wireless sensor networks

Paulo Sérgio Sausen; Marco Aurélio Spohn; Angelo Perkusich

2010-03-01T23:59:59.000Z

173

A wireless sensor network design tool to support building energy management  

Science Conference Proceedings (OSTI)

The physical location of sensor nodes strongly influences the performance of the network from the perspective of accurate data sensing and reliable communication. Therefore deployment planning can be regarded as an essential stepping stone to producing ... Keywords: building management system, heterogeneous wireless network infrastructure, industry foundation classes, wireless sensor network design

Antony Guinard; Alan McGibney; Dirk Pesch

2009-11-01T23:59:59.000Z

174

A Clean Slate 4D Approach to Network Control and Management  

E-Print Network (OSTI)

A Clean Slate 4D Approach to Network Control and Management Albert Greenberg, Gisli Hjalmtysson on this crucially important and intellectually challenging area. Categories and Subject Descriptors C.2.1 [Network Architecture and Design]: Packet Switching Net- works; C.2.2 [Network Protocols]: Routing Protocols; C.2

Xie, Geoffrey

175

Wireless networking security: open issues in trust, management, interoperation and measurement  

Science Conference Proceedings (OSTI)

The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve security mechanisms. The design, development and evaluation of security techniques ... Keywords: interoperation, management, measurement, network security, open security, trust, wireless networks, wireless security

Joseph B. Evans; Weichao Wang; Benjamin J. Ewy

2006-09-01T23:59:59.000Z

176

Formal validation of automated policy refinement in the management of network security systems  

Science Conference Proceedings (OSTI)

Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy ... Keywords: Formal validation, Model-based management, Network security, Policy based management, Security policies

João Porto de Albuquerque; Heiko Krumm; Paulo Lício de Geus

2010-04-01T23:59:59.000Z

177

Security data extraction from IEC 61850 ACSI models for network and system management  

Science Conference Proceedings (OSTI)

The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and sabotage, ... Keywords: IEC 61850, IEC 62351, network and system management, power grid security, smart grid security

Chung-Hyo Kim; Moon-Seok Choi; Seong-Ho Ju; Yong-Hun Lim; Jong-Mock Baek

2011-08-01T23:59:59.000Z

178

Energy Management System for an Hybrid Electric Vehicle, Using Ultracapacitors and Neural Networks  

E-Print Network (OSTI)

Energy Management System for an Hybrid Electric Vehicle, Using Ultracapacitors and Neural Networks management system for hybrid electric vehicles (HEV), using neural networks (NN), was developed and tested, similar in shape and size to a Chevrolet S-10, which was converted to an electric vehicle

Rudnick, Hugh

179

Integrating service discovery with routing and session management for ad-hoc networks  

Science Conference Proceedings (OSTI)

In this paper, we propose GSR: a new routing and session management protocol for ad-hoc networks as an integral part of a service discovery infrastructure. Traditional approaches place routing at a layer below service discovery. While this distinction ... Keywords: Ad-hoc networks, Routing, Service discovery, Service-centric routing, Session management

Dipanjan Chakraborty; Anupam Joshi; Yelena Yesha

2006-03-01T23:59:59.000Z

180

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

182

Application of Artificial Neural Networks to Complex Groundwater Management Problems  

SciTech Connect

As water quantity and quality problems become increasingly severe, accurate prediction and effective management of scarcer water resources will become critical. In this paper, the successful application of artificial neural network (ANN) technology is described for three types of groundwater prediction and management problems. In the first example, an ANN was trained with simulation data from a physically based numerical model to predict head (groundwater elevation) at locations of interest under variable pumping and climate conditions. The ANN achieved a high degree of predictive accuracy, and its derived state-transition equations were embedded into a multiobjective optimization formulation and solved to generate a trade-off curve depicting water supply in relation to contamination risk. In the second and third examples, ANNs were developed with real-world hydrologic and climate data for different hydrogeologic environments. For the second problem, an ANN was developed using data collected for a 5-year, 8-month period to predict heads in a multilayered surficial and limestone aquifer system under variable pumping, state, and climate conditions. Using weekly stress periods, the ANN substantially outperformed a well-calibrated numerical flow model for the 71-day validation period, and provided insights into the effects of climate and pumping on water levels. For the third problem, an ANN was developed with data collected automatically over a 6-week period to predict hourly heads in 11 high-capacity public supply wells tapping a semiconfined bedrock aquifer and subject to large well-interference effects. Using hourly stress periods, the ANN accurately predicted heads for 24-hour periods in all public supply wells. These test cases demonstrate that the ANN technology can solve a variety of complex groundwater management problems and overcome many of the problems and limitations associated with traditional physically based flow models.

Coppola, Emery [NOAH LLC. (United States)], E-mail: noah.llc@mail.com; Poulton, Mary [University of Arizona, Department of Mining and Geological Engineering (United States); Charles, Emmanuel [U.S. Geological Survey (United States); Dustman, John [Summit EnviroSolutions (United States); Szidarovszky, Ferenc [University of Arizona, Department of Systems and Industrial Engineering (United States)

2003-12-15T23:59:59.000Z

183

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

184

UConnect Wireless Connection Windows 7 Configuration  

E-Print Network (OSTI)

UConnect Wireless Connection Windows 7 Configuration page 1 revised February, 2012 Configuring a UConnect Wireless Connection on Windows 7 1. Open the Network and Sharing Center a. Click the Windows icon screen, select Network and Sharing Center. #12;UConnect Wireless Connection Windows 7 Configuration page

Provancher, William

185

HTAR Client Configuration and Installation  

NLE Websites -- All DOE Office Websites (Extended Search)

Configuration and Installation Configuration and Installation HTAR Configuration and Installation HTAR is an archival utility similar to gnu-tar that allows for the archiving and extraction of local files into and out of HPSS. Configuration Instructions This distribution has default configuration settings which will work for most environments. If you want to use the default values (recommended) you can skip to the section labeled INSTALLATION INSTRUCTIONS. In certain environments, for example if your installation is on a machine which has more than one network interface, you may want to change some of these default settings. To help with this, an interactive Configure script is provided. To use it do $ ./Configure prior to installing. Configure will provide a description of the options

186

Wireless Sensor Network for Advanced Energy Management Solutions  

Science Conference Proceedings (OSTI)

Eaton has developed an advanced energy management solution that has been deployed to several Industries of the Future (IoF) sites. This demonstrated energy savings and reduced unscheduled downtime through an improved means for performing predictive diagnostics and energy efficiency estimation. Eaton has developed a suite of online, continuous, and inferential algorithms that utilize motor current signature analysis (MCSA) and motor power signature analysis (MPSA) techniques to detect and predict the health condition and energy usage condition of motors and their connect loads. Eaton has also developed a hardware and software platform that provided a means to develop and test these advanced algorithms in the field. Results from lab validation and field trials have demonstrated that the developed advanced algorithms are able to detect motor and load inefficiency and performance degradation. Eaton investigated the performance of Wireless Sensor Networks (WSN) within various industrial facilities to understand concerns about topology and environmental conditions that have precluded broad adoption by the industry to date. A Wireless Link Assessment System (WLAS), was used to validate wireless performance under a variety of conditions. Results demonstrated that wireless networks can provide adequate performance in most facilities when properly specified and deployed. Customers from various IoF expressed interest in applying wireless more broadly for selected applications, but continue to prefer utilizing existing, wired field bus networks for most sensor based applications that will tie into their existing Computerized Motor Maintenance Systems (CMMS). As a result, wireless technology was de-emphasized within the project, and a greater focus placed on energy efficiency/predictive diagnostics. Commercially available wireless networks were only utilized in field test sites to facilitate collection of motor wellness information, and no wireless sensor network products were developed under this project. As an outgrowth of this program, Eaton developed a patented energy-optimizing drive control technology that is complementary to a traditional variable frequency drives (VFD) to enable significant energy savings for motors with variable torque applications, such as fans, pumps, and compressors. This technology provides an estimated energy saving of 2%-10% depending on the loading condition, in addition to the savings obtained from a traditional VFD. The combination of a VFD with the enhanced energy-optimizing controls will provide significant energy savings (10% to 70% depending on the load and duty cycle) for motors that are presently connected with across the line starters. It will also provide a more favorable return on investment (ROI), thus encouraging industries to adopt VFDs for more motors within their facilities. The patented technology is based on nonintrusive algorithms that estimate the instantaneous operating efficiency and motor speed and provide active energy-optimizing control of a motor, using only existing voltage and current sensors. This technology is currently being commercialized by Eaton’s Industrial Controls Division in their next generation motor control products. Due to the common nonintrusive and inferential nature of various algorithms, this same product can also include motor and equipment condition monitoring features, providing the facility owner additional information to improve process uptime and the associated energy savings. Calculations estimated potential energy savings of 261,397GWh/Yr ($15.7B/yr), through retrofitting energy-optimizing VFDs into existing facilities, and incorporating the solution into building equipment sold by original equipment manufacturers (OEMs) and installed by mechanical and electrical contractors. Utilizing MCSA and MPSA for predictive maintenance (PM) of motors and connected equipment reduces process downtime cost and the cost of wasted energy associated with shutting down and restarting the processes. Estimated savings vary depending on the industry segment and equi

Peter J. Theisen; Bin Lu, Charles J. Luebke

2009-09-23T23:59:59.000Z

187

Edison Configuration  

NLE Websites -- All DOE Office Websites (Extended Search)

Configuration Configuration Configuration NERSC's newest supercomputer, named Edison after U.S. inventor and businessman Thomas Alva Edison, will have a peak performance of more than 2 petaflops (PF, or 1015 floating point operations per second) when fully installed in 2013. The integrated storage system will have more than 6 petabytes (PB) of storage with a peak I/O bandwidth of 140 gigabytes (GB) per second. The product is known as a Cray XC30 (internal name "Cascade"), and the NERSC acquistion project is known as "NERSC 7." Edison will be installed in two phases. Phase I Installation: 4Q 2012 Early User Access: Started in February 2013. All users were enabled March 2, 2013. System Overview Cray Cascade supercomputer 664 computes nodes with 64 GB memory per node

188

Franklin Configuration  

NLE Websites -- All DOE Office Websites (Extended Search)

Configuration Configuration Franklin Configuration Franklin is a Cray XT4 with a peak performance of 352 TFlops, 38,288 processor cores, 78 TB of memory, and 436 TB of scratch disk space. Franklin was ranked as the world's eighth most powerful supercomputer in November 2008, and was No. 26 on the November 2010 Top 500 List. Quad CoreAMDOpteronprocessor Compute Nodes Franklin has 9,572 compute nodes, each with a quad-core AMD 'Budapest' 2.3 GHz processor. Read More » Login Nodes Franklin has 10 internal login nodes and 1 external login node. Read More » Files systems The Franklin system has 4 different file systems mounted which provide different levels of disk storage, I/O performance and file permanence. There are two Lustre file systems each with a peak performance of 17

189

Edison Configuration  

NLE Websites -- All DOE Office Websites (Extended Search)

Configuration Configuration Configuration NERSC's newest supercomputer, named Edison after U.S. inventor and businessman Thomas Alva Edison, has a peak performance of 2.39 petaflops/sec, 124,608 compute cores for running scientific applications, 332 Terabytes of memory, and 7.5 Petabytes of online disk storage with a peak I/O bandwidth of 168 gigabytes (GB) per second. The product is known as a Cray XC30 (internal name "Cascade"), and the NERSC acquistion project is known as "NERSC 7." System Overview Cray XC30 supercomputer Peak performance 2.39 petaflops/sec Sustained application performance on NERSC SSP codes: 258 Tflop/s (vs. 144 Tflop/s for Hopper) 5,192 computes nodes, 124,608 cores in total Cray Aries high-speed interconnect with Dragon Flay topoplogy (0.25 μs to 3.7 μs MPI latency, ~8GB/sec MPI bandwidth)

190

Carver Configuration  

NLE Websites -- All DOE Office Websites (Extended Search)

Configuration Configuration Configuration Overview Carver, a liquid-cooled IBM iDataPlex system, has 1202 compute nodes (9,984 processor cores). This represents a theoretical peak performance of 106.5 Teraflops/sec. Note that the above node count includes hardware that is dedicated to various strategic projects and experimental testbeds (e.g., Hadoop). As such, not all 1202 nodes will be available to all users at all times. All nodes are interconnected by 4X QDR InfiniBand technology, providing 32 Gb/s of point-to-point bandwidth for high-performance message passing and I/O. Compute Nodes 1,120 nodes each have two quad-core Intel Xeon X5550 ("Nehalem") 2.67 GHz processors (eight cores/node); 80 nodes each have two six-core Intel Xeon X5650 ("Westmere") 2.67 GHz processors (12 cores/node). 960 of the

191

MANAGING THE NATIONAL ROAD NETWORK MAINTENANCE IN SPAIN Vctor Gmez Fras  

E-Print Network (OSTI)

, then to establish a maintenance policy. Finally, the Management System calculates a maintenance plan, detailingMANAGING THE NATIONAL ROAD NETWORK MAINTENANCE IN SPAIN Víctor Gómez Frías GETINSA (Spain), vgomez technical, economic and administrative management models. The Subdirectorate of Maintenance and Operation

Paris-Sud XI, Université de

192

Maximum Availability Architecture Oracle Best Practices For High AvailabilityOracle White Paper—Configuring Oracle Management Agent to Manage Oracle Fail Safe  

E-Print Network (OSTI)

Setting up Oracle Management Agent and Oracle Fail Safe.............. 3 Step 1: Install a Management Agent on each cluster node............ 3

Executive Overview; Introduction Oracle; Fail Safe

2010-01-01T23:59:59.000Z

193

Joint energy management and resource allocation in rechargeable sensor networks  

Science Conference Proceedings (OSTI)

Energy harvesting sensor platforms have opened up a new dimension to the design of network protocols. In order to sustain the network operation, the energy consumption rate cannot be higher than the energy harvesting rate, otherwise, sensor nodes will ...

Ren-Shiou Liu; Prasun Sinha; Can Emre Koksal

2010-03-01T23:59:59.000Z

194

Mobile identity management system in heterogeneous wireless networks  

Science Conference Proceedings (OSTI)

Heterogeneous wireless networks increasingly encroach on our lives. Various technologies and mobile applications more often than usual are now used by mobile users. Intensive development of mobile networks not only sets new standards for radio, but increasingly ...

?Ukasz Kucharzewski; Zbigniew Kotulski

2011-01-01T23:59:59.000Z

195

Wireless mesh network security: A traffic engineering management approach  

Science Conference Proceedings (OSTI)

The wireless mesh network (WMN) is an emerging multihop, heterogeneous, easily scalable and low cost network. The architecture of the WMN is a connectionless-oriented, mobile and dynamic traffic of routed packets. The mesh infrastructure environment ... Keywords: IPSec, MPLS, Security, Traffic engineering, VPN, Wireless mesh networks

Okechukwu E. Muogilim; Kok-Keong Loo; Richard Comley

2011-03-01T23:59:59.000Z

196

Independent Verification and Validation Of SAPHIRE 8 Software Configuration Management Plan Project Number: N6423 U.S. Nuclear Regulatory Commission  

Science Conference Proceedings (OSTI)

The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE configuration management is to assess the activities that results in the process of identifying and defining the baselines associated with the SAPHIRE software product; controlling the changes to baselines and release of baselines throughout the life cycle; recording and reporting the status of baselines and the proposed and actual changes to the baselines; and verifying the correctness and completeness of baselines.. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production.

Kent Norris

2009-10-01T23:59:59.000Z

197

Independent Verification and Validation Of SAPHIRE 8 Software Configuration Management Plan Project Number: N6423 U.S. Nuclear Regulatory Commission  

SciTech Connect

The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE configuration management is to assess the activities that results in the process of identifying and defining the baselines associated with the SAPHIRE software product; controlling the changes to baselines and release of baselines throughout the life cycle; recording and reporting the status of baselines and the proposed and actual changes to the baselines; and verifying the correctness and completeness of baselines.. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production.

Kent Norris

2010-02-01T23:59:59.000Z

198

Capacity control in network revenue management : clustering and risk-aversion  

E-Print Network (OSTI)

Network revenue management is the practice of using optimal decision policies to increase revenues by controlling limited quantities of multiple resources' availability and prices over finite time. It is widely practiced ...

Park, Joongwoo Brian

2010-01-01T23:59:59.000Z

199

Intercell radio resource management through network coordination for IMT-advanced systems  

Science Conference Proceedings (OSTI)

In IMT-Advanced systems, a cross-layer approach coupling network coordination and radio resource managements enables mitigation of intercell interference and throughput improvement of cell-edge users. To facilitate coordination among base stations, we ...

Young-June Choi; Narayan Prasad; Sampath Rangarajan

2010-02-01T23:59:59.000Z

200

Distributed Management of High-Layer Protocols and Network Services through a Programmable Agent-Based Architecture  

Science Conference Proceedings (OSTI)

This paper proposes an architecture for distributed management of upper layer protocols and network services called Trace. Based on the IETF Script MIB, the architecture provides mechanisms for the delegation of management tasks to mid-level managers, ...

Luciano Paschoal Gaspary; Luis Felipe Balbinot; Roberto Storch; Fabricio Wendt; Liane M. Rockenbach Tarouco

2001-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Energy estimator for weather forecasts dynamic power management of wireless sensor networks  

Science Conference Proceedings (OSTI)

Emerging Wireless Sensor Networks (WSN) consist of spatially distributed autonomous sensors. Although an embedded battery has limited autonomy, most WSNs outperform this drawback by harvesting ambient energy from the environment. Nevertheless, this external ... Keywords: design tools, dynamic power management, weather forecasts, wireless sensor networks

Nicolas Ferry; Sylvain Ducloyer; Nathalie Julien; Dominique Jutel

2011-09-01T23:59:59.000Z

202

DevoFlow: scaling flow management for high-performance networks  

Science Conference Proceedings (OSTI)

OpenFlow is a great concept, but its original design imposes excessive overheads. It can simplify network and traffic management in enterprise and data center environments, because it enables flow-level control over Ethernet switching and provides global ... Keywords: data center, flow-based networking, switch design

Andrew R. Curtis; Jeffrey C. Mogul; Jean Tourrilhes; Praveen Yalagandula; Puneet Sharma; Sujata Banerjee

2011-08-01T23:59:59.000Z

203

Condition based management of gas turbine engine using neural networks.  

E-Print Network (OSTI)

??This research work is focused on the development of the hybrid neural network model to asses the gas turbine’s compressor health. Effects of various gas… (more)

Muthukumar, Krishnan.

2008-01-01T23:59:59.000Z

204

A decision maker for transport protocol configuration  

Science Conference Proceedings (OSTI)

This paper proposes an approach, called Protocol Configuration Decision Maker, for TCP to dynamically adapt to a network environment. The proposed mechanism monitors the network condition with parameters like loss rate. Then it consults a knowledge ...

Jae-Hyun Hwang; Jin-Hee Choi; Chuck Yoo

2006-05-01T23:59:59.000Z

205

Thermal Modeling, Characterization and Management of On-chip Networks  

E-Print Network (OSTI)

Due to the wire delay constraints in deep submicron technology and increasing demand for on-chip bandwidth, networks are becoming the pervasive interconnect fabric to connect processing elements on chip. With ever-increasing power density and cooling costs, the thermal impact of onchip networks needs to be urgently addressed.

Li Shang; Li-shiuan Peh; Amit Kumar; Niraj K. Jha

2004-01-01T23:59:59.000Z

206

Energy packet networks: adaptive energy management for the cloud  

Science Conference Proceedings (OSTI)

In the presence of limitations in the availability of energy for data centres, especially in dense urban areas, a novel system that we call an Energy Packet Network is discussed as a means to provide energy on demand to Cloud Computing servers. ... Keywords: cloud computing, energy packet networks, energy provisioning on demand, smart grid

Erol Gelenbe

2012-04-01T23:59:59.000Z

207

Evaluating I/O aware network management for scientific workflows on networked clouds  

Science Conference Proceedings (OSTI)

This paper presents a performance evaluation of scientific workflows on networked cloud systems with particular emphasis on evaluating the effect of provisioned network bandwidth on application I/O performance. The experiments were run on ExoGENI, a ... Keywords: I/O performance, networked clouds, performance evaluation, performance monitoring, scientific workflows

Anirban Mandal, Paul Ruth, Ilya Baldin, Yufeng Xin, Claris Castillo, Mats Rynge, Ewa Deelman

2013-11-01T23:59:59.000Z

208

How Evolving Network Access and Network Management Technologies are Redefining the Competitive Wireless Markets  

Science Conference Proceedings (OSTI)

This paper examines some of the key problems users encounter when accessing current generation wireless networks. Using a case study of a hypothetical user, the authors explore the emerging services and the new broadband wireless network technologies ... Keywords: Autonomic Communications, Broadband Wireless Access Technologies, Cognitive Wireless Networks, Short and Long-Term Service Contracts, Two-Sided Markets, User-Centric Services

Fernando Beltrán; Jairo A. Gutiérrez; José Luis Melús

2011-07-01T23:59:59.000Z

209

A flexible building management framework based on wireless sensor and actuator networks  

Science Conference Proceedings (OSTI)

Future buildings will be constantly monitored and managed through intelligent systems that allow having information about the building health, keeping a good comfort level for the building inhabitants and optimizing the energy spent. Despite many WSN ... Keywords: Building management systems, Domain-specific framework, Sensor programming, Wireless sensor and actuator networks

G. Fortino; A. Guerrieri; G. M. P. O'Hare; A. Ruzzelli

2012-11-01T23:59:59.000Z

210

Building a Flexible Energy Management System with LonWorks Control Network  

Science Conference Proceedings (OSTI)

To effectively improve the efficiency of energy supply, quantification is required to determine its significance in our daily lives. Building an energy management system to monitor and acquire information such as energy supply and environmental factors ... Keywords: LonWorks, Control network, Energy management system, Database

Ching-Biau Tzeng; Tzuu-Shaang Wey; Sheng-Hsiung Ma

2008-11-01T23:59:59.000Z

211

Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks  

Science Conference Proceedings (OSTI)

Energy consumption is one of the most important parameters for evaluation of a scheme proposed for WSNs because of their resource constraint nature. Comprehensive comparative analysis of proposed reputation-based trust management schemes of WSNs from ... Keywords: reputation, sensor networks, trust evaluation, trust management

Riaz Ahmed Shaikh; Young-Koo Lee; Sungyoung Lee

2009-02-01T23:59:59.000Z

212

Hybrid Electric Vehicle Power Management Solutions Based on Isolated and Non-Isolated Configurations of MMCCC Converter  

Science Conference Proceedings (OSTI)

This paper presents the various configurations of a multilevel modular capacitor-clamped converter (MMCCC), and it reveals many useful and new formations of the original MMCCC for transferring power in either an isolated or nonisolated manner. The various features of the original MMCCC circuit are best suited for a multibus system in future plug-in hybrid or fuel-cell-powered vehicles' drive train. The original MMCCC is capable of bidirectional power transfer using multilevel modular structure with capacitor-clamped topology. It has a nonisolated structure, and it offers very high efficiency even at partial loads. This circuit was modified to integrate single or multiple high-frequency transformers by using the intermediate voltage nodes of the converter. On the other hand, a special formation of the MMCCC can exhibit dc outputs offering limited isolation without using any isolation transformer. This modified version can produce a high conversion ratio from a limited number of components and has several useful applications in providing power to multiple low-voltage loads in a hybrid or electric automobile. This paper will investigate the origin of generating ac outputs from the MMCCC and shows how the transformer-free version can be modified to create limited isolation from the circuit. In addition, this paper will compare various modified forms of the MMCCC topology with existing dc-dc converter circuits from compactness and component utilization perspectives.

Khan, Faisal H [ORNL; Tolbert, Leon M [ORNL; Webb, William E [Oak Ridge National Laboratory (ORNL)

2009-01-01T23:59:59.000Z

213

Using VMware VCenter lab manager in undergraduate education for system administration and network security  

Science Conference Proceedings (OSTI)

We have developed and managed a virtual laboratory environment by deploying the VMware vCenter Lab Manager and the VMware vSphere vCenter on a load-balanced cluster of eight ESX 3.5 servers and a storage area network of 10.8 Tera bytes. This system has ... Keywords: education, hands-on, lab manager, laboratory experiments, system administration, virtualization

Xinli Wang; Guy C. Hembroff; Rick Yedica

2010-10-01T23:59:59.000Z

214

A Trustworthy Mobile Agent Infrastructure for Network Management  

E-Print Network (OSTI)

Koliousis,A. Sventek,J.S. Proceedings of the IFIP/IEEE Symposium on Integrated Management, Munich, Germany, May 2007

Koliousis, A.; Sventek, J.S.

215

User Centric Policy Management in Online Social Networks  

Science Conference Proceedings (OSTI)

Online social networking sites are experiencing tremendous user growth with hundreds of millions of active users. As a result, there is a tremendous amount of user profile data online, e.g., name, birth date, etc. Protecting this data is a challenge. ...

Mohamed Shehab; Gorrell Cheek; Hakim Touati; Anna C. Squicciarini; Pau-Chen Cheng

2010-07-01T23:59:59.000Z

216

Resource management policies for fixed relays in cellular networks  

Science Conference Proceedings (OSTI)

Mobile stations in the cell boundary experience poor spectral efficiency due to the path loss and interference from adjacent cells. Therefore, satisfying QoS requirements of each MS at the cell boundary has been an important issue. To resolve this spectral ... Keywords: Cellular networks, Fixed relay, Path selection, Resource reuse, Spectral efficiency

Won-Hyoung Park; Saewoong Bahk

2009-03-01T23:59:59.000Z

217

How to configure a Windows 7 computer (that is NOT part of the UTMBUSERSM domain) to connect to the UTMBa wireless network  

E-Print Network (OSTI)

How to configure a Windows 7 computer (that is NOT part of the UTMBUSERSM domain) to connect on the "Security" tab 8. Click on "Settings" button in middle of window. Page 3 of 6 12/2/2011mhtml of the screen and then click "Configure" towards the bottom of the window. 10. Uncheck the box next

Wood, James B.

218

Forecasting for airline network revenue management : revenue and competitive impacts  

E-Print Network (OSTI)

Airline revenue management entails protecting enough seats for late-booking, high-fare passengers while still selling seats which would have otherwise gone empty at discounted fares to earlier-booking customers. In the ...

Zickus, Jeffrey S.

1998-01-01T23:59:59.000Z

219

Quantifying And Managing The Influence Of Maintenance Actions On The Survivability Of Mesh-Restorable Networks  

E-Print Network (OSTI)

of "roll to protection" in rings. The basic methods can be adapted for other maintenance models or models of the restoration process or adapted to handle multiple maintenance scenarios. The work is aimed at understanding and managing the effects of maintenance in a mesh-restorable network and ultimately providing new operational and design capabilities for future mesh-based network planning and operations systems. I. Motivation and Background One of the motivations for mesh-restorable networking is the greater capacity efficiency of mesh networks relative to ring-based transport networks. The capacity efficiency comes from the more direct routing of working paths, the need for less spare capacity for restoration, and the avoidance of "stranded capacity" effects in rings where one or more ring spans may exhaust while other spans of the ring have valuable but unusable remaining working capacity. Of course capacity efficiency is not the only consideration in a choice of n

Wayne D. Grover; Matthieu Clouqueur; Thuthuy Bach

2001-01-01T23:59:59.000Z

220

Managing Power Consumption in Networks on Chips Tajana Simunic  

E-Print Network (OSTI)

terminals [12,13] force the transition to a low power state as soon as a component becomes idle behavior. In addition to transitioning components into low-power states during idle times, power manager of transition from the idle state, through the other power states and then back into the idle state can

Simunic, Tajana

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Radiation detection and situation management by distributed sensor networks  

Science Conference Proceedings (OSTI)

Detection of radioactive materials in an urban environment usually requires large, portal-monitor-style radiation detectors. However, this may not be a practical solution in many transport scenarios. Alternatively, a distributed sensor network (DSN) could complement portal-style detection of radiological materials through the implementation of arrays of low cost, small heterogeneous sensors with the ability to detect the presence of radioactive materials in a moving vehicle over a specific region. In this paper, we report on the use of a heterogeneous, wireless, distributed sensor network for traffic monitoring in a field demonstration. Through wireless communications, the energy spectra from different radiation detectors are combined to improve the detection confidence. In addition, the DSN exploits other sensor technologies and algorithms to provide additional information about the vehicle, such as its speed, location, class (e.g. car, truck), and license plate number. The sensors are in-situ and data is processed in real-time at each node. Relevant information from each node is sent to a base station computer which is used to assess the movement of radioactive materials.

Jan, Frigo [Los Alamos National Laboratory; Mielke, Angela [Los Alamos National Laboratory; Cai, D Michael [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

222

An Empirical Analysis of Semantic Techniques Applied to a Network Management Classification Problem  

Science Conference Proceedings (OSTI)

Semantic technologies are increasingly being employed to integrate, relate and classify heterogeneous data from various problem domains. To date, however, little empirical analysis has been carried out to help identify the benefits and limitations of ... Keywords: OWL, SWRL, SPARQL, axioms, rules, queries, network performance management

Aidan Boran; Ivan Bedini; Christopher J. Matheus; Peter F. Patel-Schneider; Stefan Bischof

2012-12-01T23:59:59.000Z

223

A Cell Based Dynamic Spectrum Management Scheme with Interference Mitigation for Cognitive Networks  

Science Conference Proceedings (OSTI)

Future wireless systems are expected to be characterized by the coexistence of different radio access technologies (RATs) resulting in complex heterogeneous wireless environments. In parallel with this, the tremendous demand for spectrum has ... Keywords: Bargaining patience, Cognitive networks, Dynamic spectrum management, Game theory, Inter-system interference, Profit

Vanbien Le; Zhiyong Feng; Didier Bourse; Ping Zhang

2009-04-01T23:59:59.000Z

224

Energy Management in Wireless Sensor Networks with Energy-hungry Sensors  

E-Print Network (OSTI)

In recent years, the number of wireless sensor network deployments for real life applications has rapidly increased. Still, the energy problem remains one of the major barrier somehow preventing the complete exploitation of this technology. Sensor nodes are typically powered by batteries with a limited lifetime and, even when additional energy can be harvested from the external environment (e.g., through solar cells or piezo-electric mechanisms), it remains a limited resource to be consumed judiciously. Efficient energy management is thus a key requirement for a credible design of a wireless sensor network. Most energy management strategies proposed in the literature assume that data acquisition consumes significantly less energy than their transmission. Unfortunately, this assumption does not hold in a number of practical applications where the power consumption of the sensing activity may be comparable or even greater than that of the radio. In this context, effective energy management strategies should include policies for an efficient use of energy-hungry sensors, which become one of the main components affecting the network lifetime. In this paper, we survey the main approaches for efficient energy management in sensor networks with energy-hungry sensors.

Cesara Alippi; Mario Di Francesco; Manuel Roveri; Mario Di Francesco

2009-01-01T23:59:59.000Z

225

Dual home agent (DHA)-based location management scheme in integrated cellular-WLAN networks  

Science Conference Proceedings (OSTI)

For seamless integration of cellular and wireless local area network (WLAN) systems, we introduce a dual home agent (DHA)-based location management. The DHA maintains the location information both in the cellular and WLAN systems, and therefore unnecessary ... Keywords: Cellular-WLAN integration, Dual home agent (DHA), Mobile IP, Performance analysis

Sangheon Pack; Wonjun Lee

2008-12-01T23:59:59.000Z

226

A Self-Adaptive Spectrum Management Middleware for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

The vision of the Internet of Things, wherein everyday objects are embedded with smart wireless sensor devices, is making these sensor devices increasingly pervasive. As the density of their deployment in overlapping or adjacent areas increases, the ... Keywords: Mediaaccess control, Spectrum management, Wireless sensor networks

Robert Thompson; Gang Zhou; Lei Lu; Sudha Krishnamurthy; Hover Dong; Xin Qi; Yantao Li; Matthew Keally; Zhen Ren

2013-01-01T23:59:59.000Z

227

Novel optical-fiber network management system in central office using RFID and LED navigation technologies  

Science Conference Proceedings (OSTI)

Optical IP services such as FTTH have been growing rapidly, leading to an urgent need to manage the optical fiber network from the central office. We have developed an optical-fiber distribution facility called an IDM. However, the changing FTTH environment ... Keywords: FTTH, RFID, automatic navigation system, human error

Masaki Waki; Shigenori Uruno; Yoshitaka Enomoto; Yuji Azuma

2009-09-01T23:59:59.000Z

228

Energy Management Framework Designed for Autonomous Electric Vehicle with Sensor Networks Navigation  

Science Conference Proceedings (OSTI)

Cyber-physical systems (CPS) have emerged as a cutting edge technology for next-generation industrial applications, and are undergoing rapid development and inspiring numerous application domains. This article presents an innovative CPS application for ... Keywords: cyber-physical systems, wireless sensor networks, energy management, energy-efficient design, autonomous electric vehicle

Hui Suo, Jiafu Wan, Di Li, Caifeng Zou

2012-10-01T23:59:59.000Z

229

Network  

NLE Websites -- All DOE Office Websites (Extended Search)

network - launched in November 2012. The network was built in collaboration with Internet2, an advanced network, which connects the nation's research universities. Leveraging...

230

ICEbox: Toward easy-to-use home networking  

E-Print Network (OSTI)

Abstract. Home networking is becoming an essential part of everyday life. However, empirical studies and consumer reports indicate that the complexities of configuring and maintaining the home network impose a high barrier for most householders. In this paper, we explore the sources of the complexity of the home network, and describe a solution we have built to address this complexity. We have developed a prototype network appliance that acts as a centralized point of control for the home network, providing device provisioning and reprovisioning, security, discovery, and monitoring. Our solution provides a simple physical UI for network control, using pointing to introduce new devices onto the network, and a physical lock to secure network access. Results of our user studies indicate that users found this appliance both useful and usable as a network configuration and management tool. Keywords: Home networking, usability, user interface, and ICEbox. 1

Jeonghwa Yang; W. Keith Edwards

2007-01-01T23:59:59.000Z

231

The SysMES Framework: System Management for Networked Embedded Systems and Clusters  

E-Print Network (OSTI)

Automated system management for large distributed and heterogeneous environments is a common challenge in modern computer sciences. Desired properties of such a management system are, among others, a minimal dependency on human operators for problem recognition and solution, adaptability to increasing loads, fault tolerance and the flexibility to integrate new management resources at runtime. Existing tools address parts of these requirements however there is no single integrated framework which possesses all mentioned characteristics. SysMES was developed as an integrated framework for automated monitoring and management of networked devices. In order to achieve the requirements of scalability and fault tolerance, a fully distributed and decentralized architecture has been chosen. The framework comprises a monitoring module, a rule engine and an executive module for the execution of actions. A formal language has been defined which allows administrators to define complex spatial and temporal rule conditions ...

Lara Martinez, Camilo Ernesto

232

Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes  

E-Print Network (OSTI)

We study sensor networks with energy harvesting nodes. The generated energy at a node can be stored in a buffer. A sensor node periodically senses a random field and generates a packet. These packets are stored in a queue and transmitted using the energy available at that time at the node. For such networks we develop efficient energy management policies. First, for a single node, we obtain policies that are throughput optimal, i.e., the data queue stays stable for the largest possible data rate. Next we obtain energy management policies which minimize the mean delay in the queue. We also compare performance of several easily implementable suboptimal policies. A greedy policy is identified which, in low SNR regime, is throughput optimal and also minimizes mean delay. Next using the results for a single node, we develop efficient MAC policies.

Sharma, Vinod; Joseph, Vinay

2008-01-01T23:59:59.000Z

233

Program on Technology Innovation: Network Management Technology Applied to Power Plant Instrumentation, Control, and Maintenance  

Science Conference Proceedings (OSTI)

Generic solutions developed for the information technology and telecommunications (IT-Telco) fields can benefit power plants willing to modernize instrumentation and control (I&C) equipment and maintenance tasks to take advantage of the expanded functionality of new technologies. This report investigates the applicability of generic network management products to help streamline power plant I&C and maintenance practices. Because of the competitive pressures of a large and expanding marketplace, such gene...

2005-07-25T23:59:59.000Z

234

A network hierarchical feedback system for Taiwanese universities based on the integration of total quality management and innovation  

Science Conference Proceedings (OSTI)

An increasing number of Taiwanese universities are improving operational performance through innovation and total quality management (TQM). In addition, the National Quality Award (NQA), which is based on TQM, is now used to evaluate quality performance ... Keywords: Decision-making trial and evaluation laboratory (DEMATEL), Fuzzy analytical hierarchical process (FAHP), Fuzzy analytical network process (FANP), Gray relational analysis (GRA), Network hierarchical feedback system (NHFS)

Jui-Kuei Chen; I-Shuo Chen

2012-08-01T23:59:59.000Z

235

Emergence of collective action and environmental networking in relation to radioactive waste management  

SciTech Connect

This paper explores the relationship between the national environmental movement and nuclear technology in relation to a local emergent group. The historical development of nuclear technology in this conutry has followed a path leading to continued fear and mistrust of waste management by a portion of the population. At the forefront of opposition to nuclear technology are people and groups endorsing environmental values. Because of the antinuclear attitudes of environmentalists and the value orientation of appropriate technologists in the national environmental movement, it seems appropriate for local groups to call on these national groups for assistance regarding nuclear-related issues. A case study is used to illustrate how a local action group, once integrated into a national environmental network, can become an effective, legitimate participant in social change. The formation, emergence, mobilization, and networking of a local group opposed to a specific federal radioactive waste management plan is described based on organizational literature. However, inherent contradictions in defining the local versus national benefits plus inherent problems within the environmental movement could be acting to limit the effectiveness of such networks. 49 refs.

Williams, R.G.; Payne, B.A.

1985-01-01T23:59:59.000Z

236

VANS Role in the Advanced Network Infrastructure  

E-Print Network (OSTI)

network operations, maintenance, and management is becominggoing network management, maintenance, and modification. Innetwork monitoring management, and maintenance operations

Sprafkin, Jeffrey P.

1992-01-01T23:59:59.000Z

237

A Computational Approach to the Real Option Management of Network Contracts for Natural Gas Pipeline Transport Capacity  

Science Conference Proceedings (OSTI)

Commodity merchants use real option models to manage their operations. A central element of such a model is its underlying operating policy. We focus on network contracts for the transport capacity of natural gas pipelines, specific energy conversion ... Keywords: Monte Carlo simulation, capacity valuation, commodity and energy conversion assets, energy-related operations, heuristics, math programming, natural gas pipelines, operations management practice, operations management/finance interface, petroleum/natural gas industries, real options, sensitivities, spread options

Nicola Secomandi; Mulan X. Wang

2012-07-01T23:59:59.000Z

238

Harnessing Smart Sensor Technology for Industrial Energy Efficiency- Making Process-Specific Efficiency Projects Cost Effective with a Broadly Configurable, Network-Enabled Monitoring Tool  

E-Print Network (OSTI)

To improve monitoring technology often re-quired by industrial energy efficiency projects, we have developed a set of power and process monitoring tools based on the IEEE 1451.2 smart sensor interface standard. These tools enable a wide-range of industrial facilities to monitor electricity use and identify opportunities for savings. Our efforts have focused on creating an 'off-the-shelf' monitoring solution that can be configured for a wide range of sensors to monitor machine and process parameters in conjunction with electrical power usage. Using these tools, we have identified energy savings opportunities for several manufacturing processes by monitoring and analyzing real-time, process-related information in conjunction with electric power consumption data. Specifically, we have found that some energy savings opportunities are only apparent after combining synchronously-collected, machine and process information with power-use profiles. In this paper we discuss examples of applying this approach to various manufacturing processes from different product sectors.

Wiczer, J. J.; Wiczer, M. B.

2011-01-01T23:59:59.000Z

239

How to Cheat at Configuring VmWare ESX Server  

Science Conference Proceedings (OSTI)

This book will detail the default and custom installation of VMware's ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration ... Keywords: NT, Networking, Operating Systems

David Rule

2007-12-01T23:59:59.000Z

240

Configuring VRF Support  

E-Print Network (OSTI)

Virtual Route Forwarding (VRF) divides a physical router into multiple logical routers, each having its own set of interfaces and routing and forwarding tables. VRF support in voice networks can be used to split Cisco Unified Communications Manager Express (Cisco Unified CME) into multiple virtual systems for SIP and SCCP endpoints and TAPI-based client applications and softphones on your PC. Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the “Feature Information for VRF Support ” section on page 1569. Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to

unknown authors

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Best signal quality in cellular networks: asymptotic properties and applications to mobility management in small cell networks  

Science Conference Proceedings (OSTI)

The quickly increasing data traffic and the user demand for a full coverage of mobile services anywhere and anytime are leading mobile networking into a future of small cell networks. However, due to the high-density and randomness of small cell networks, ...

Van Minh Nguyen; François Baccelli; Laurent Thomas; Chung Shue Chen

2010-01-01T23:59:59.000Z

242

Health Insurance Portability and Accountability Act-Compliant Ocular Telehealth Network for the Remote Diagnosis and Management of Diabetic Retinopathy  

SciTech Connect

In this article, we present the design and implementation of a regional ocular telehealth network for remote assessment and management of diabetic retinopathy (DR), including the design requirements, network topology, protocol design, system work flow, graphics user interfaces, and performance evaluation. The Telemedical Retinal Image Analysis and Diagnosis Network is a computer-aided, image analysis telehealth paradigm for the diagnosis of DR and other retinal diseases using fundus images acquired from primary care end users delivering care to underserved patient populations in the mid-South and southeastern United States.

Li, Yaquin [University of Tennessee, Knoxville (UTK); Karnowski, Thomas Paul [ORNL; Tobin Jr, Kenneth William [ORNL; Giancardo, Luca [ORNL; Garg, Seema [University of North Carolina; Fox, Karen [Delta Health Alliance; Chaum, Edward [University of Tennessee, Knoxville (UTK)

2011-01-01T23:59:59.000Z

243

ASGrid: autonomic management of hybrid sensor grid systems and applications  

Science Conference Proceedings (OSTI)

In this paper, we propose an autonomic management framework (ASGrid) to address the requirements of emerging large-scale applications in hybrid grid and sensor network systems. To the best of our knowledge, we are the first who proposed the ... Keywords: P2P, WSNs, autonomic computing, autonomic management, autonomic sensor grid, data aggregation, grid computing, hybrid distributed systems, key management, network security, peer computing, peer-to-, self-configuration, self-optimisation, self-protection, task scheduling, trust management, wireless sensor networks

Xiaolin Li; Xinxin Liu; Han Zhao; Huanyu Zhao; Nanyan Jiang; Manish Parashar

2009-11-01T23:59:59.000Z

244

Graceful network state migrations  

Science Conference Proceedings (OSTI)

A significant fraction of network events (such as topology or route changes) and the resulting performance degradation stem from premeditated network management and operational tasks. This paper introduces a general class of Graceful Network State Migration ... Keywords: communication system operations and management, computer network management, network maintenance, network upgrade

Saqib Raza; Yuanbo Zhu; Chen-Nee Chuah

2011-08-01T23:59:59.000Z

245

Electrical Power Savings in Pump and Compressor Networks via Load Management  

E-Print Network (OSTI)

Large industrial plants commonly use multiple parallel units in pump and compressor networks for improved reliability. Sometimes, installed equipment capacity can far exceed actual requirements. This excess capacity can be translated into energy cost savings through “optimum load management”. A key decision parameter in determining the operating policy is the Trigger Point at which to switch from N units to N+1, and vice versa. The Trigger Point is defined as the actual flow rate at which the switching is made to the “ideal” (generally maximum) flow rate at which the switching should be made. At the plant under study, the implicit Trigger Point was generally found to be around 85%, probably because this made it easy to have a smooth transition during the switching operation. A number of pumping and compression networks were analyzed to determine what the potential savings would be if this trigger point were increased to 90 or 95%. The savings potential was found to range from 0 to 23%, with an average of 4.4%. Our study demonstrated that by tightening up operating policies to make sure that the minimum number of machines is being run, significant cost savings are possible with zero capital investment, and negligible sacrifice in operating flexibility or reliability. This paper describes the methodology used, as well as representative results from our study.

Kumana, J. D.; Aseeri, A. S.

2005-01-01T23:59:59.000Z

246

A Practical System for Centralized Network Control  

E-Print Network (OSTI)

Views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of Microsoft, NSF, or the U.S. government. Keywords: Centralized Network Control, Clean-slate Network Design, Network Dissemination Plane, IP networking is a spectacular success, catalyzing the diffusion of data networking across academic institutions, governments, businesses, and homes worldwide. Yet, despite the fundamental importance of this infrastructure, today’s networks are surprisingly fragile and increasingly difficult to configure, control, and maintain. As our dependence on data networking grows, so do the risks of security breaches, large-scale outages, and service disruptions. We believe that the root of these problems lies in the complexity of the control and management planes— the software and protocols coordinating network elements—and particularly the way the decision logic and the distributed-systems issues are inexorably intertwined. The research community advocates a complete refactoring of the functionality and proposes a new architecture which they call “4D, ” after the architecture’s four planes: decision, dissemination, discovery, and data. The 4D architecture pulls decision-making logic out of the network elements to create a logically centralized decision plane, where network-level objectives and policies are specified and enforced by direct configuration of state on individual network elements.

Hong Yan; David Andersen; Srinivasan Seshan; David A. Maltz

2010-01-01T23:59:59.000Z

247

PROCEEDINGS OF FOURTH BERKELEY CONFERENCE ON DISTRIBUTED DATA MANAGEMENT AND COMPUTER NETWORKS.  

E-Print Network (OSTI)

packet switching for local computer networks. Comm. of theaddressing capabilities for computer networks. Proe. IEEE,InternatIonal Conference on,Computer CommunIcatIon, August

Hall, Dennis

2011-01-01T23:59:59.000Z

248

Energy and task management in energy harvesting wireless sensor networks for structural health monitoring  

E-Print Network (OSTI)

Chapter 4. System Energy and Task Management . . 1. Systemof the energy and task management used on systems, a WSNChapter 4 System Energy and Task Management In contrast to

Steck, Jamie Bradley

2009-01-01T23:59:59.000Z

249

Firewall Configuration Errors Revisited  

E-Print Network (OSTI)

The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general that survey indicated that corporate firewalls were often enforcing poorly written rule-sets, containing many mistakes. The goal of this work is to revisit the first survey. The current study is much larger. Moreover, for the first time, the study includes configurations from two major vendors. The study also introduce a novel "Firewall Complexity" (FC) measure, that applies to both types of firewalls. The findings of the current study indeed validate the 2004 study's main observations: firewalls are (still) poorly configured, and a rule-set's complexity is (still) positively correlated with the number of detected risk items. Thus we can conclude that, for well-configured firewalls, ``small is (still) beautiful''. However, unlike the 2004 study, we see no significant indication that later software versions have fewer errors (for both vendors).

Wool, Avishai

2009-01-01T23:59:59.000Z

250

PROCEEDINGS OF THE THIRD BERKELEY WORKSHOP ON DISTRIBUTED DATA MANAGEMENT AND COMPUTER NETWORKS  

E-Print Network (OSTI)

machine of the CYCLADES Computer network", IFIP Congress,End Encryption in Secure Computer Networks". USAF ElectronicTechn. Rpt. CCA-77-09, Computer Corp. of America, (Dec.

Authors, Various

2011-01-01T23:59:59.000Z

251

Energy and task management in energy harvesting wireless sensor networks for structural health monitoring  

E-Print Network (OSTI)

1. Energy Harvesting . . . . . . . . .2. Task Scheduling in Energy Harvesting WSNs 3. DataSensor Networks . . 2. Energy Harvesting . . . . . . . . 3.

Steck, Jamie Bradley

2009-01-01T23:59:59.000Z

252

PDSF Hardware Configuration  

NLE Websites -- All DOE Office Websites (Extended Search)

Configuration Configuration Hardware Configuration Interactive (login) Nodes This page describes the interactive (login) nodes at PDSF. Read More » Compute Nodes Information about the PDSF compute (batch) nodes. Read More » Data Transfer Nodes This page describes the grid and data transfer nodes at PDSF. Read More » Eliza File Systems The eliza file systems at PDSF are used for bulk file storage. Read More » Other File Systems This page describes home directories, scratch space, /common and NGF. Read More » Specific Group Hardware This page describes the extra hardware used by the various scientific groups that use PDSF. Read More » PDSF at a Glance Interactive Nodes 4 pdsf.nersc.gov pdsf[1-4].nersc.gov Compute Nodes 232 2632 Cores GPFS Filesystems 835TB Eliza[1-18] Local Disk

253

A Power Benchmarking Framework for Network Devices  

E-Print Network (OSTI)

Abstract. Energy efficiency is becoming increasingly important in the operation of networking infrastructure, especially in enterprise and data center networks. Researchers have proposed several strategies for energy management of networking devices. However, we need a comprehensive characterization of power consumption by a variety of switches and routers to accurately quantify the savings from the various power savings schemes. In this paper, we first describe the hurdles in network power instrumentation and present a power measurement study of a variety of networking gear such as hubs, edge switches, core switches, routers and wireless access points in both stand-alone mode and a production data center. We build and describe a benchmarking suite that will allow users to measure and compare the power consumed for a large set of common configurations at any switch or router of their choice. We also propose a network energy proportionality index, which is an easily measurable metric, to compare power consumption behaviors of multiple devices.

Priya Mahadevan; Puneet Sharma; Sujata Banerjee

2009-01-01T23:59:59.000Z

254

Electronically configured battery pack  

DOE Green Energy (OSTI)

Battery packs for portable equipment must sometimes accommodate conflicting requirements to meet application needs. An electronically configurable battery pack was developed to support two highly different operating modes, one requiring very low power consumption at a low voltage and the other requiring high power consumption at a higher voltage. The configurable battery pack optimizes the lifetime and performance of the system by making the best use of all available energy thus enabling the system to meet its goals of operation, volume, and lifetime. This paper describes the cell chemistry chosen, the battery pack electronics, and tradeoffs made during the evolution of its design.

Kemper, D.

1997-03-01T23:59:59.000Z

255

Trends in Energy Management Technology: BCS Integration Technologies - Open Communications Networking  

E-Print Network (OSTI)

223. Trends in Energy Management Technology CBE/UC BerkeleyTrends in Energy Management Technology CBE/UC Berkeley FEMP/p. 6. Trends in Energy Management Technology CBE/UC Berkeley

Webster, Tom

2002-01-01T23:59:59.000Z

256

Node-level Energy Management for Sensor Networks in the Presence of Multiple Applications  

E-Print Network (OSTI)

some policy P . The energy management system proposed here,in [4]. In our energy management system there are threein section 3.2, our energy management system measures the

Athanassios Boulis; Mani Srivastava

2004-01-01T23:59:59.000Z

257

An integrated framework for warehouse management using wireless sensor networks and decision support systems  

Science Conference Proceedings (OSTI)

Storage Warehouse managers face diverse challenges in operating and managing a warehouse. Problems range from capacity-planning and inventory management of stored goods, loss or damage of stored goods due to weather changes, pest infestation and improper ...

Punit Ahluwalia; Anand Ramachandran

2011-12-01T23:59:59.000Z

258

Node-level Energy Management for Sensor Networks in the Presence of Multiple Applications  

E-Print Network (OSTI)

that solves the energy management problem at the node levelpredominately in energy saving problems. The energy sourcefor two sub-problems of our energy managing mechanism in

Athanassios Boulis; Mani Srivastava

2004-01-01T23:59:59.000Z

259

A strategy for the management of energy losses in a local electricity distribution network.  

E-Print Network (OSTI)

??This dissertation contains a strategy to minimize the non-technical electrical energy losses in an electrical distribution network. In order to develop the strategy, a model… (more)

Fourie, Johannes Wilhelmus

2006-01-01T23:59:59.000Z

260

CEMA: Comfort Control and Energy Management Algorithms for Use in Residential Spaces Through Wireless Sensor Networks .  

E-Print Network (OSTI)

??In recent years, many strides have been achieved in the area of Wireless Sensor Networks (WSNs), which is leading to constant innovations in the types… (more)

Henry, Rami F.Z.

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Towards a task oriented method for accessing network based services  

Science Conference Proceedings (OSTI)

Today's networked users are required to configure a number of different network settings on their computer in order to access specific network based services. For example, these users need to know whether to enable a Virtual Private Network (VPN) tunnel ... Keywords: borderless networks, flyout, identity based networking, network access, network security, networking, user credentials, user interface, virtual private network

Nils Pedersen; Paul Clark; Martine Freiberger

2010-11-01T23:59:59.000Z

262

Self-configuring localization systems: Design and Experimental Evaluation  

Science Conference Proceedings (OSTI)

Embedded networked sensors promise to revolutionize the way we interact with our physical environment and require scalable, ad hoc deployable and energy-efficient node localization/positioning.This paper describes the motivation, design, implementation, ... Keywords: Location, localization, self-configuration, sensor networks

Nirupama Bulusu; John Heidemann; Deborah Estrin; Tommy Tran

2004-02-01T23:59:59.000Z

263

Managing vendor relations: a case study of two HPC network issues  

Science Conference Proceedings (OSTI)

High performance computing requires fast networks to move large amounts of data between compute nodes and disk storage. For a variety of reasons, however, the fast speeds achieved by bleeding edge network technology tend to come along with a higher risk ...

Loren Jan Wilson

2010-11-01T23:59:59.000Z

264

AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks  

Science Conference Proceedings (OSTI)

Among the leading reference implementations of the Software Defined Networking (SDN) paradigm is the OpenFlow framework, which decouples the control plane into a centralized application. In this paper, we consider two aspects of OpenFlow that pose security ... Keywords: control plane saturation attack, openflow, security and resilience, software-defined network (sdn)

Seungwon Shin, Vinod Yegneswaran, Phillip Porras, Guofei Gu

2013-11-01T23:59:59.000Z

265

Radio access network power management considering radio over fiber technique for 4G mobile system  

Science Conference Proceedings (OSTI)

Radio over fiber technique was suggested as excelent candidates for 4G radio access network considering large number mobile users. With higher number of base stations, a microwave link presents more disadvantages across base stations in relation to power ... Keywords: 4G mobile system, fiber dispersion, power manaegment, radio access network, radio over fiber

Jalal J. Hamad Ameen; Widad Ismail; Sevia M. Idrus

2011-03-01T23:59:59.000Z

266

Review of Electrical System Configuration Management, Safety...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Determination of Setpoints for Nuclear Safety Related Instrumentation AC68798A Sheet 71, RTD Data Sheet AC68798A Sheet 72, RTD Data Sheet E-E4-F-9740, Annunciator Wiring...

267

Bayesian Belief Network (BBN)-based advisory system development for steam generator replacement project management  

E-Print Network (OSTI)

The growing need for improved project management technique points to the usefulness of a knowledge-base advisory system to help project managers understand current and future project status and optimize decisions based ...

Kim, Dohyoung, 1970-

2002-01-01T23:59:59.000Z

268

Use of environmental sensors and sensor networks to develop water and salinity budgets for seasonal wetland real-time water quality management  

Science Conference Proceedings (OSTI)

Management of river salt loads in a complex and highly regulated river basin such as the San Joaquin River Basin of California presents significant challenges for current Information Technology. Computer-based numerical models are used as a means of ... Keywords: Environmental decision support, Forecasting, Salt management, Sensor networks, Sensors, Water quality

Nigel W. T. Quinn; Ricardo Ortega; Patrick J. A. Rahilly; Caleb W. Royer

2010-09-01T23:59:59.000Z

269

Review: The impact of agricultural activities on water quality: A case for collaborative catchment-scale management using integrated wireless sensor networks  

Science Conference Proceedings (OSTI)

The challenge of improving water quality is a growing global concern, typified by the European Commission Water Framework Directive and the United States Clean Water Act. The main drivers of poor water quality are economics, poor water management, agricultural ... Keywords: Agricultural activities, Catchment, Collaborative, Water quality monitoring and management, Wireless sensor networks

Huma Zia, Nick R. Harris, Geoff V. Merrett, Mark Rivers, Neil Coles

2013-08-01T23:59:59.000Z

270

DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle  

Science Conference Proceedings (OSTI)

In this paper, we present a buffer management scheme called Dynamic Resource Allocation (DRA) that provides TCP traffic control guarantees to VCs carrying multiple dynamic discard thresholds (Multiple Dynamic Thresholds-MDT) over a wireless CDMA ATM ... Keywords: Buffer management, CDMA, Dynamic resource management, Large deviation principle, QoS, Wireless ATM

M. S. Obaidat; C. Ben Ahmed; N. Boudriga

2003-05-01T23:59:59.000Z

271

Managing data for evaluating trust in unstructured peer-to-peer networks  

Science Conference Proceedings (OSTI)

Managing data is a problem of particular importance in trust model of peer-to-peer environments where one frequently encounters unknown agents. Existing methods for data management, which are based on DHT or Random Selection, can not apply well in the ... Keywords: managing data, peer-to-peer, reputation, trust

Zhitang Li; Huaiqing Lin; Chuiwei Lu; Yejiang Zhang

2008-05-01T23:59:59.000Z

272

An Intercommunication Home Energy Management System with Appliance Recognition in Home Network  

Science Conference Proceedings (OSTI)

In present days there are wide varieties of household electric appliances along with different power consumption habits of consumers, making identifying electric appliances without presetting difficulty. This paper introduces smart appliance management ... Keywords: appliance recognition, home energy management, smart appliance management system

Ying-Xun Lai; Joel José Rodrigues; Yueh-Min Huang; Hong-Gang Wang; Chin-Feng Lai

2012-02-01T23:59:59.000Z

273

Strategic management for large engineering projects : the stakeholder value network approach  

E-Print Network (OSTI)

A critical element of the challenges and opportunities for today's large engineering projects are associated with the multi-type and networked relationships between these projects and their various stakeholders. This ...

Feng, Wen, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

274

Tank Waste Information Network System (TWINS) FY 2001 Data Management Plan  

SciTech Connect

The mission of Tank Waste Information Network System (TWINS) is to provide system users with quality tank data and information when needed, in the form needed and at a reasonable cost.

ADAMS, M.R.

2000-06-12T23:59:59.000Z

275

Creating and Managing a High Performance Knowledge-Sharing Network: The Toyota Case  

E-Print Network (OSTI)

This study offers a detailed case study of how Toyota facilitates interorganizational knowledge transfers among within its production network. In particular, we identiify and examine six key institutionalized knowledge ...

Dyer, Jeffrey

2002-07-10T23:59:59.000Z

276

Making Science Useful to Decision Makers: Climate Forecasts, Water Management, and Knowledge Networks  

Science Conference Proceedings (OSTI)

Moving from climate science to adaptive action is an immense challenge, especially in highly institutionalized sectors such as water resources. Knowledge networks are valuable strategies to put climate information to use. They overcome barriers ...

David L. Feldman; Helen M. Ingram

2009-10-01T23:59:59.000Z

277

Managing time, part 2  

Science Conference Proceedings (OSTI)

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Peter J. Denning; Ritu Raj

2011-09-01T23:59:59.000Z

278

Radio Planning of Energy-Aware Cellular Networks  

E-Print Network (OSTI)

Nov 3, 2010 ... Keywords: green networking, wireless, network design, coverage, network management, energy saving. Category 1: Applications -- OR and ...

279

Energy and task management in energy harvesting wireless sensor networks for structural health monitoring  

E-Print Network (OSTI)

Formulation of the Energy Constraint Problem ILP Formulationde?nes the energy and task management problem for a wirelesssolutions to the energy and time constraint problems are too

Steck, Jamie Bradley

2009-01-01T23:59:59.000Z

280

Management of building energy consumption and energy supply network on campus scale.  

E-Print Network (OSTI)

??Building portfolio management on campus and metropolitan scale involves decisions about energy retrofits, energy resource pooling, and investments in shared energy systems, such as district… (more)

Lee, Sang Hoon

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Power converter connection configuration  

DOE Patents (OSTI)

EMI shielding is provided for power electronics circuits and the like via a direct-mount reference plane support and shielding structure. The thermal support may receive one or more power electronic circuits. The support may aid in removing heat from the circuits through fluid circulating through the support. The support forms a shield from both external EMI/RFI and from interference generated by operation of the power electronic circuits. Features may be provided to permit and enhance connection of the circuitry to external circuitry, such as improved terminal configurations. Modular units may be assembled that may be coupled to electronic circuitry via plug-in arrangements or through interface with a backplane or similar mounting and interconnecting structures.

Beihoff, Bruce C. (Wauwatosa, WI); Kehl, Dennis L. (Milwaukee, WI); Gettelfinger, Lee A. (Brown Deer, WI); Kaishian, Steven C. (Milwaukee, WI); Phillips, Mark G. (Brookfield, WI); Radosevich, Lawrence D. (Muskego, WI)

2008-11-11T23:59:59.000Z

282

Proceedings of the sixth Berkeley workshop on distributed data management and computer networks  

SciTech Connect

A distributed data base management system allows data to be stored at multiple locations and to be accessed as a single unified data base. In this workshop, seventeen papers were presented which have been prepared separately for the energy data base. These items deal with data transfer, protocols and management. (GHT)

Various Authors

1982-01-01T23:59:59.000Z

283

Community response grids: E-government, social networks, and effective emergency management  

Science Conference Proceedings (OSTI)

This paper explores the concept of developing community response grids (CRGs) for community emergency response and the policy implications of such a system. CRGs make use of the Internet and mobile communication devices, allowing residents and responders ... Keywords: Community response grid, E-government, Emergency response, Mobile communications, Public policy, Social networks

Paul T. Jaeger; Ben Shneiderman; Kenneth R. Fleischmann; Jennifer Preece; Yan Qu; Philip Fei Wu

2007-11-01T23:59:59.000Z

284

Managing fast mobility in wireless multi-hop networks with LISP  

Science Conference Proceedings (OSTI)

The Locator/ID Separation Protocol (LISP) has been developped in recent years in order to solve the scalability issues the current Internet Architecture is facing. Differently from the current addressing system, where end-systems' identifier and location ... Keywords: LISP, mobility, wireless multi-hop networks

Marc F. Almirall; Luigi Iannone; Ruben Merz

2011-09-01T23:59:59.000Z

285

Performance Evaluation of Dynamic and Static Bandwidth Management Methods for ATM Networks  

E-Print Network (OSTI)

and Information Sciences Laboratory Department of Electrical Engineering and Computer Science University of Kansas bandwidth calculations it is possible to monitor current or predicted network usage. Users characteristics such as delay, loss, and throughput. The user may get better QoS (higher throughput, lower loss

Kansas, University of

286

QoS management in trunk-and-branch switched Ethernet networks  

Science Conference Proceedings (OSTI)

A likely architecture for the future broadband access network will consist of a trunk-and-branch topology, with very high bandwidth trunks (e.g., 1-10 Gb/s), connected to high-bandwidth drops (or branches) to homes and businesses. A multihop switched ...

K. Rege; S. Dravida; S. Nanda; S. Narayan; J. Strombosky; M. Tandon; D. Gupta

2002-12-01T23:59:59.000Z

287

Using a Wireless Sensors Network in the Sustainable Management of African Palm Oil Solid Waste  

Science Conference Proceedings (OSTI)

All human activities have an impact in the environment in which we live. Nowadays, the industrial gases emission is considered as one of the main causes for worsening greenhouse effect. The African Palm agro industry in Ecuador is no stranger to this ... Keywords: compost, production science, solid waste, wireless sensors network, wireless communication technologies

Mauro Jimenez, Alejandra Jimenez, Pablo Lozada, Santiago Jimenez, Cristhy Jimenez

2013-04-01T23:59:59.000Z

288

An examination of electronic file transfer between host and microcomputers for the AMPMODNET/AIMNET (Army Material Plan Modernization Network/Acquisition Information Management Network) classified network environment  

Science Conference Proceedings (OSTI)

This report presents the results of investigation and testing conducted by Oak Ridge National Laboratory (ORNL) for the Project Manager -- Acquisition Information Management (PM-AIM), and the United States Army Materiel Command Headquarters (HQ-AMC). It concerns the establishment of file transfer capabilities on the Army Materiel Plan Modernization (AMPMOD) classified computer system. The discussion provides a general context for micro-to-mainframe connectivity and focuses specifically upon two possible solutions for file transfer capabilities. The second section of this report contains a statement of the problem to be examined, a brief description of the institutional setting of the investigation, and a concise declaration of purpose. The third section lays a conceptual foundation for micro-to-mainframe connectivity and provides a more detailed description of the AMPMOD computing environment. It gives emphasis to the generalized International Business Machines, Inc. (IBM) standard of connectivity because of the predominance of this vendor in the AMPMOD computing environment. The fourth section discusses two test cases as possible solutions for file transfer. The first solution used is the IBM 3270 Control Program telecommunications and terminal emulation software. A version of this software was available on all the IBM Tempest Personal Computer 3s. The second solution used is Distributed Office Support System host electronic mail software with Personal Services/Personal Computer microcomputer e-mail software running with IBM 3270 Workstation Program for terminal emulation. Test conditions and results are presented for both test cases. The fifth section provides a summary of findings for the two possible solutions tested for AMPMOD file transfer. The report concludes with observations on current AMPMOD understanding of file transfer and includes recommendations for future consideration by the sponsor.

Hake, K.A.

1990-11-01T23:59:59.000Z

289

The interphase power controller: A new concept for managing power flow within AC networks  

SciTech Connect

The paper presents a new concept for controlling the flow of power within AC networks. The application is based on the series connection of impedances between different phases of the two (synchronous) subnetworks to be interconnected, hence its name: the Interphase Power Controller (IPC). The IPC acts as a current source with the following characteristics: the power flow is nearly constant (within 10%) for a wide range ([+-]25[degree]) of angle between the two subnetworks; there is no significant short-circuit contribution from one network to the other; severe contingencies on one side of the IPC have negligible impact on the voltage of the other side; no harmonics are generated (because there is no control action). Other operating conditions (reduced power, reactive power generation or absorption) are possible by switching impedance components. In all cases, the IPC comprises only conventional elements (transformer, capacitors, reactors, and circuit breakers).

Brochu, J.; Pelletier, P.; Beauregard, F.; Morin, G. (Citeq, Varennes, Quebec (Canada))

1994-04-01T23:59:59.000Z

290

Substation Configuration Reliability 1 Reliability of Substation Configurations  

E-Print Network (OSTI)

-Repairable Components," Power Learn Electric Power Engineering Education, Module PE.PAS.U15.5, 2005. #12;SubstationSubstation Configuration Reliability 1 Reliability of Substation Configurations Daniel Nack, Iowa substation, it still contains what could be described as weak points or points of failure that would lead

McCalley, James D.

291

Radio resource management for a mobile network with TD-CDMA  

Science Conference Proceedings (OSTI)

In the paper, we proposed a resource allocation method employing maximal compatible cliques to make use of channel bandwidth as efficiently as possible in a TD-CDMA system. Furthermore, the strength of beacon signals was also measured to decide whether ... Keywords: Hand-off, Maximal clique, Radio resource management, Resource reservation, TD-CDMA

Yin-Fu Huang; Tsung-Yi Chiu

2006-12-01T23:59:59.000Z

292

Power management of plug-in hybrid electric vehicles using neural network based trip modeling  

Science Conference Proceedings (OSTI)

The plug-in hybrid electric vehicles (PHEV), utilizing more battery power, has become a next-generation HEV with great promise of higher fuel economy. Global optimization charge-depletion power management would be desirable. This has so far been hampered ...

Qiuming Gong; Yaoyu Li; Zhongren Peng

2009-06-01T23:59:59.000Z

293

A comprehensive MIPv6 based mobility management simulation engine for the next generation network  

Science Conference Proceedings (OSTI)

Mobility management is one of the core requirements of the IPv6 based NGN to provide seamless handover services to mobile entities. In this regard, IETF has proposed protocols like Mobile IPv6 (MIPv6), Fast MIPv6 (FMIPv6) and Hierarchical MIPv6 (HMIPv6) ... Keywords: C++ discrete event simulation, CARD, FMIPv6, HMIPv6, MIPv6, OMNeT++, protocol simulation

Faqir Zarrar Yousaf; Christian Müller; Christian Wietfeld

2010-03-01T23:59:59.000Z

294

Demo Abstract: ThermoSense: Thermal Array Sensor Networks in Building Management  

E-Print Network (OSTI)

, and ventilation (HVAC) systems have two different points of control; temperature and ventila- Permission to make this occupancy information can be integrated with a real building management system in order to control of time in order to ensure the room can reach the appropriate tem- perature. A prediction model can

Cerpa, Alberto E.

295

A Dynamic Information Manager for Networked Monitoring of Large Power Systems  

Science Conference Proceedings (OSTI)

The Wide Area Measurement Systems (WAMS) project, a broad-based, multi-phase effort, has been focused on enhancing the reliability of interconnected power systems. This report documents the third phase of that effort, which addresses the management of the data and information that WAMS-related technologies provide.

1999-05-18T23:59:59.000Z

296

Subject bibliography of the PMA205 (Program Manager Air 205) Network Technical Library at Oak Ridge National Laboratory  

Science Conference Proceedings (OSTI)

The PMA205 (Program Manager Air 205) Network Technical Library at the Oak Ridge National Laboratory (ORNL) contains documents relating to US Department of Defense standards for computer-based training technology and training and American National Standards Institute international standards for user interfaces and Computer-Aided Acquisition and Logistic Support. The collection emphasizes supporting research in instructional system design, software engineering, user system interfaces, human factors engineering, and cognitive psychology as it differentiates between higher and lower cognitive tasking. The collection currently consists of about 670 documents of various types. These include military standards and specifications, reports, conference proceedings, dissertations, technical manuals, books, journal articles, and military instructions and directives. The documents have been added to the library as the result of literature searches and personal submission from team members. It is a selective collection and not a comprehensive one. A database, written in Procite/PC, contains the cataloged holdings of the library. Each record contains the bibliographic information and an abstract. The database provides access to information in the records by either full text searches using Boolean logic or individual field searching. One-word quick searches'' can be performed on the date, title, or author fields. The browsing capability for retrieved items is by full record or brief format. Search results can be read from the screen, printed to hard copy, or transferred to a disk file for later use. Disks containing the database and printed bibliographies are available to PMA205 network team members upon request.

Ayers, M.V.

1990-05-01T23:59:59.000Z

297

Recurrent Rotor-Router Configurations  

E-Print Network (OSTI)

We prove the existence of recurrent initial configurations for the rotor walk on many graphs, including Z^d, and planar graphs with locally finite embeddings. We also prove that recurrence and transience of rotor walks are invariant under changes in the starting vertex and finite changes in the initial configuration.

Angel, Omer

2011-01-01T23:59:59.000Z

298

Recurrent Rotor-Router Configurations  

E-Print Network (OSTI)

We prove the existence of recurrent initial configurations for the rotor walk on many graphs, including Z d, and planar graphs with locally finite embeddings. We also prove that recurrence and transience of rotor walks are invariant under changes in the starting vertex and finite changes in the initial configuration.

Omer Angel; Alexander E. Holroyd

2011-01-01T23:59:59.000Z

299

On the Design of Clean-Slate Network Control and  

E-Print Network (OSTI)

We provide a design of clean-slate control and management plane for data networks using the abstraction of 4D architecture, utilizing and extending 4D’s concept of a logically centralized Decision plane that is responsible for managing network-wide resources. In this paper, a scalable protocol and a dynamically adaptable algorithm for assigning Data plane devices to a physically distributed Decision plane are investigated, that enable a network to operate with minimal configuration and human intervention while providing optimal convergence and robustness against failures. Our work is especially relevant in the context of ISPs and large geographically dispersed enterprise networks. We also provide an extensive evaluation of our algorithm using real-world and artificially generated ISP topologies along with an experimental evaluation using ns-2 simulator. This research was sponsored by the NSF under ITR Award ANI-0426886. 1

Hammad Iqbal; Taieb Znati

2009-01-01T23:59:59.000Z

300

A virtual environment for network testing  

Science Conference Proceedings (OSTI)

The testing of network-based solutions demands a series of tedious tasks such as the deployment of the solution at different nodes and the configuration of different topologies. The manual execution of these tasks is very time consuming and a configurable ... Keywords: Re-configuration, Software testing, Virtual network

Wade A. Fagen; João W. Cangussu; Ram Dantu

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

A three-phase integrated model for product configuration change problems  

Science Conference Proceedings (OSTI)

Requirements of engineers or customers may result in product configuration change with product life cycle; effective management of product configuration can actually enhance productivity and customer satisfaction. This study aims to develop a three-phase ... Keywords: Fuzzy theory, Genetic algorithm, Product configuration change, Value engineering

H. S. Wang; Z. H. Che; M. J. Wang

2009-04-01T23:59:59.000Z

302

Configuration of Hopper, NERSC's Cray XE6 System  

NLE Websites -- All DOE Office Websites (Extended Search)

Configuration Configuration Configuration Hopper is NERSC's first peta-flop system, a Cray XE6, with a peak performance of 1.28 Petaflops/sec, 153,216 compute cores for running scientific applications, 217 Terabytes of memory, and 2 Petabytes of online disk storage. MC-proc.png Compute Nodes Hopper has 6,384 compute nodes made up of 2 twelve-core AMD 'MagnyCours'. Read More » login.jpg Login Nodes When you ssh to hopper.nersc.gov, you are connecting to a "login node." Read More » jaguar xt4 Interconnect A description of the custom Cray-designed network that Hopper uses for inter-node communication. Read More » xe6blade.png Support Nodes A description of other kinds of nodes included in Hopper for job launch, file systems, networking, and other services. Read More »

303

ASCE Avionic System Configuration Evaluation  

Science Conference Proceedings (OSTI)

ASCE - Avionic System Configuration Evaluation A novel approach to the problems associated with the development of total avionics systems design and evaluation is described. The ASCE framework provides a general, interactive aid for comparing and evaluating ...

Joe Clema; Stephen Zissos

1978-06-01T23:59:59.000Z

304

Configuring intelligent mediators using ontologies  

Science Conference Proceedings (OSTI)

This paper presents a new intelligent mediators configuration approach which exploits high expressive description logics to represent metadata, and reasoning tasks in order to build more flexible mediation systems. A user specifies a needs expression ...

Gennaro Bruno; Christine Collet; Genoveva Vargas-Solar

2006-03-01T23:59:59.000Z

305

Exhibit A: Modeling in Support of Two Unit Operating Configurations |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Modeling in Support of Two Unit Operating Configurations Modeling in Support of Two Unit Operating Configurations Exhibit A: Modeling in Support of Two Unit Operating Configurations Docket No. EO-05-01: Tables showing modeling of emissions from units of the Mirant Potomac Power Plant. Exhibit A: Modeling in Support of Two Unit Operating Configurations More Documents & Publications Comments on Emergency Order to Resume Limited Operation at the Potomac River Generating Station, Alexandria, VA from the Chesapeake Climate Action Network. Comments on Department of Energy's Emergency Order To Resume Limited Operation at Mirant's Potomac River Generating Station and Proposed Mirant Compliance Plan Answer of Potomac Electric Power Company and PJM lnterconnection, L.L.C. to the October 6, 2005 motion filed by the Virginia Department of

306

VOTING MACHINES: QUALITY AND CONFIGURATION ...  

Science Conference Proceedings (OSTI)

... service for ISO 9001, ISO 14001 (defining environmental management systems), as ... management file will be entered into the database for active ...

2010-09-27T23:59:59.000Z

307

Network Observability Transitions  

E-Print Network (OSTI)

In the modeling, monitoring, and control of complex networks, a fundamental problem concerns the comprehensive determination of the state of the system from limited measurements. Using power grids as example networks, we show that this problem leads to a new type of percolation transition, here termed a {\\it network observability transition}, which we solve analytically for the configuration model. We also demonstrate a dual role of the network's community structure, which both facilitates optimal measurement placement and renders the networks substantially more sensitive to `observability attacks'. Aside from their immediate implications for the development of smart grids, these results provide insights into decentralized biological, social, and technological networks.

Yang, Yang; Motter, Adilson E; 10.1103/PhysRevLett.109.258701

2013-01-01T23:59:59.000Z

308

Path selection in multi-layer networks  

Science Conference Proceedings (OSTI)

Multi-layer networks are computer networks where the configuration of the network can be changed dynamically at multiple layers. However, in practice, technologies at different layers may be incompatible to each other, which necessitates a careful choice ... Keywords: Multi-layer network, Network description, Path selection

Fernando Kuipers; Freek Dijkstra

2009-01-01T23:59:59.000Z

309

Configuration  

NLE Websites -- All DOE Office Websites (Extended Search)

the login nodes with ssh username@genepool.nersc.gov. The login nodes have 32 GB of RAM, have 2.3GHz processors and have 8 cores each. "gpint" Analysis Nodes Genepool also...

310

Configurations  

NLE Websites -- All DOE Office Websites (Extended Search)

difference between a loop in a structural template and its aligned (loop) region in the query sequence. e.g., MaxLoopSize 20 MaxSkipSeqSize (default 30): the maximum allowed...

311

Optimization models for ATM network planning  

Science Conference Proceedings (OSTI)

This article describes mathematical programming models that have been developed and employed to evaluate configuration strategies for metropolitan ATM telecommunication networks. The models determine the optimal placement of ATM switch hardware and fiber ... Keywords: ATM, network optimization, telecommunications

Dennis C. Dietz; Amie J. Elcan; Daphne E. Skipper

2003-04-01T23:59:59.000Z

312

The United States Government Configuration Baseline ...  

Science Conference Proceedings (OSTI)

... ITL). The United States Government Configuration Baseline (USGCB) - Windows Vista Firewall Content. Warning Notice. ...

2013-08-02T23:59:59.000Z

313

The United States Government Configuration Baseline ...  

Science Conference Proceedings (OSTI)

... Laboratory (ITL). The United States Government Configuration Baseline (USGCB) - Windows 7 Content. Warning Notice. Do ...

2013-08-02T23:59:59.000Z

314

A collaborative network middleware project by Lambda Station, TeraPaths, and Phoebus  

Science Conference Proceedings (OSTI)

The TeraPaths, Lambda Station, and Phoebus projects, funded by the US Department of Energy, have successfully developed network middleware services that establish on-demand and manage true end-to-end, Quality-of-Service (QoS) aware, virtual network paths across multiple administrative network domains, select network paths and gracefully reroute traffic over these dynamic paths, and streamline traffic between packet and circuit networks using transparent gateways. These services improve network QoS and performance for applications, playing a critical role in the effective use of emerging dynamic circuit network services. They provide interfaces to applications, such as dCache SRM, translate network service requests into network device configurations, and coordinate with each other to setup up end-to-end network paths. The End Site Control Plane Subsystem (ESCPS) builds upon the success of the three projects by combining their individual capabilities into the next generation of network middleware. ESCPS addresses challenges such as cross-domain control plane signalling and interoperability, authentication and authorization in a Grid environment, topology discovery, and dynamic status tracking. The new network middleware will take full advantage of the perfSONAR monitoring infrastructure and the Inter-Domain Control plane efforts and will be deployed and fully vetted in the Large Hadron Collider data movement environment.

Bobyshev, A.; /Fermilab; Bradley, S.; /Brookhaven; Crawford, M.; /Fermilab; DeMar, P.; /Fermilab; Katramatos, D.; /Brookhaven; Shroff, K.; /Brookhaven; Swany, M.; /Delaware U.; Yu, D.; /Brookhaven

2010-01-01T23:59:59.000Z

315

A framework for wireless sensor networks management for precision viticulture and agriculture based on IEEE 1451 standard  

Science Conference Proceedings (OSTI)

Precision viticulture (PV) and precision agriculture (PA) requires the acquisition and processing of a vast collection of data coming typically from large scale and heterogeneous sensor networks. Unfortunately, sensor integration is far from being simple ... Keywords: Gateway, IEEE 1451, IEEE 802.15.4, Precision agriculture, Precision viticulture, Wireless sensor networks

Miguel A. Fernandes, Samuel G. Matos, Emanuel Peres, Carlos R. Cunha, Juan A. LóPez, P. J. S. G. Ferreira, M. J. C. S. Reis, Raul Morais

2013-07-01T23:59:59.000Z

316

New Mexico State University Dial-up Configurations for Windows Vista  

E-Print Network (OSTI)

New Mexico State University Dial-up Configurations for Windows Vista To use NMSU campus dial-up on your Windows Vista computer, you will need a modem and these instructions to connect. You will also. From the Connect to a network window, click on Set up a connection or network from the bottom set

Castillo, Steven P.

317

Federal Computer Security Program Managers' Forum June ...  

Science Conference Proceedings (OSTI)

... Page 7. Google Google Apps Cloud Core Applications Available in Google ... 11 Page 12. Google Security Differentiators •Configuration management ...

2012-06-21T23:59:59.000Z

318

Networking RP @ DISI Fabrizio Granelli, Lab Coordinator  

E-Print Network (OSTI)

S and resource management Wireless mesh networks: WiFi, WiMax Cellular: transmission, protocols and network and management Distributed signaling Overlay to network mapping and cooperation Research Topics: Protocol Design-Layering Performance Improvement in Wireless Networks Congestion Control GRID & Overlay Networks Design of Wireless

Granelli, Fabrizio

319

Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling  

Science Conference Proceedings (OSTI)

As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical ...

Francis Minhthang Bui; Dimitrios Hatzinakos

2008-01-01T23:59:59.000Z

320

Resource management algorithms for real-time wireless sensor networks with applications in cyber-physical systems  

Science Conference Proceedings (OSTI)

Wireless Sensor Networks (WSN) are playing a key role in the efficient operation of Cyber Physical Systems (CPS). They provide cost efficient solutions to current and future CPS requirements such as real-time structural awareness, faster event localization, ...

Benazir Fateh / Manimaran Govindarasu

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Research on a Heat-supply Network Dispatching System Based on Geographical Information System (GIS)  

E-Print Network (OSTI)

In order to reduce heating systematic operation and maintenance expenses, aimed at the current standards of a heat-supply network based on GIS, combine with a national program of 'tenth-five-year-plan', the authors have developed a Heat-supply Network Dispatching System (HNDS). The system, based on Oracle database and Mapgis 6.5, compiles with Visual C++ software. With computer and communication techniques, the system dynamic inspects parameters and information of a heat-supply network, achieves real-time dispatching and automatic information management. Based on a relief map, the system combines data on inspection equipment with those of the heat-supply network, intuitively displays the state of inspected equipment and the heat-supply network. Using the models of forecast and analysis, the system is reasonably configured for each heat supply dispatch system. Results applied to demonstration projects prove that the system possesses characteristics of stability and security.

Zhou, Z.; Zou, P.; Tang, H.; Fang, X.; Wang, W.

2006-01-01T23:59:59.000Z

322

Tutorial T3 Traffic Engineering in IP/MPLS Networks  

E-Print Network (OSTI)

; Policing; Buffer management usec #12;Road Map · TE and QoS Management in IP (datagram) Networks: ­ Routing

Elwalid, Anwar

323

DIMENSIONING WDM OPTICAL NETWORKS WITH MINIMUM MSPP CONFIGURATION  

E-Print Network (OSTI)

optimizing the traffic grooming. The MSPP cost will be estimated through the number of transport blades bandwidth, but rather by the processing capability of electronic switches, routers, and multiplexers to minimize the amount of electronic multiplexing equipment. We present a study on the design of a Tabu Search

Houle, Alain C.

324

Outsourcing network functionality  

Science Conference Proceedings (OSTI)

This paper presents an architecture for adding functionality to networks via outsourcing. In this model, the enterprise network only forwards data; any additional processing is performed by external Feature Providers (FPs). FPs provide and manage ... Keywords: jingling, middleboxes, network services, outsourcing, sdn

Glen Gibb; Hongyi Zeng; Nick McKeown

2012-08-01T23:59:59.000Z

325

Security Configuration Checklists for IT Commercial Products  

Science Conference Proceedings (OSTI)

Security Configuration Checklists for Commercial IT Products. ... The use of checklists improves the consistency and predictability of system security. ...

2013-01-15T23:59:59.000Z

326

Generating Heuristics to Control Configuration Processes  

Science Conference Proceedings (OSTI)

Configuration is the process of composing a system from a set of components such that the system fulfills a set of desired demands. The configuration process relies on a particular component model, which is a useful abstraction of the domain and the ... Keywords: configuration, design, heuristic search, knowledge-based systems, preprocessing

Benno Stein

1999-03-01T23:59:59.000Z

327

Combining Mobile XMPP Entities and Cloud Services for Collaborative Post-Disaster Management in Hybrid Network Environments  

Science Conference Proceedings (OSTI)

Crises such as the Fukushima incident in Japan showed the demand for flexible and easy-to-use monitoring and communication systems to support post-disaster management (i.e. the organization of actions in the follow-up of disasters), especially when critical ... Keywords: XMPP, cloud services, collaboration, mDNS, post-disaster management

Ronny Klauck; Michael Kirsche

2013-04-01T23:59:59.000Z

328

Ad Hoc mobility management with uniform quorum systems  

Science Conference Proceedings (OSTI)

Keywords: Ad hoc network, balanced incomplete block design, data distribution, mobility management, quorum system, reconfigurable wireless network, uniform quorum system

Zygmunt J. Haas; Ben Liang

1999-04-01T23:59:59.000Z

329

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ’ ability to positively influence driver behaviour and also drivers ’ ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

330

Establishing talent management for company's succession planning through analytic network process: Application to an MNC semiconductor company in Taiwan  

Science Conference Proceedings (OSTI)

This study is to design a leadership development program for a company's succession planning which will be important for its future competition. A semiconductor assembly and testing multinational corporation (MNC) in Taiwan was selected for interviews ... Keywords: Analytic network process (ANP), High potential (HiPo), Leadership competencies, Succession planning

F. C. Hor; Liang-Chih Huang; Hsu-Shih Shih; Yen-Hua Lee; E. Stanley Lee

2010-08-01T23:59:59.000Z

331

Decision support methodology using rule-based reasoning coupled to non-parametric measurement for industrial wastewater network management  

Science Conference Proceedings (OSTI)

EU water framework directive [Directive 2000/60/EC of the European Parliament and of the Council of 23 October 2000 Establishing a Framework for Community Action in the Field of Water Policy, Official Journal L 327, 22/12/2000 p. 0001-0073] encourages ... Keywords: Decision support methodology (DSM), Industrial wastewater network, UV spectra, Variability, WWTP, Wastewater quality controls

E. Dupuit; M. F. Pouet; O. Thomas; J. Bourgois

2007-08-01T23:59:59.000Z

332

Trends in the development of communication networks: Cognitive networks  

Science Conference Proceedings (OSTI)

One of the main challenges already faced by communication networks is the efficient management of increasing complexity. The recently proposed concept of cognitive network appears as a candidate that can address this issue. In this paper, we survey the ... Keywords: Autonomic networks, Cognition loop, Cognitive networks, Cross-layer, Knowledge representation, Learning, OSI, Protocol stack, Reasoning, Self-aware

Carolina Fortuna; Mihael Mohorcic

2009-06-01T23:59:59.000Z

333

Wildfire Management and Forecasting Fire Potential: The Roles of Climate Information and Social Networks in the Southwest United States  

Science Conference Proceedings (OSTI)

Continuing progress in the fields of meteorology, climatology, and fire ecology has enabled more proactive and risk-tolerant wildland fire management practices in the United States. Recent institutional changes have also facilitated the ...

Gigi Owen; Jonathan D. McLeod; Crystal A. Kolden; Daniel B. Ferguson; Timothy J. Brown

2012-04-01T23:59:59.000Z

334

Windows 7 Configuration for UR_RC_InternalSecure Page 1 of 4 http://www.rochester.edu/it/wireless  

E-Print Network (OSTI)

Windows 7 Configuration for UR_RC_InternalSecure Page 1 of 4 http_RC_InternalSecure" wireless network Ensure that "Connect automatically" is checked Click Connect #12;Windows 7 are connecting to UR_RC_InternalSecure. #12;Windows 7 Configuration for UR_RC_InternalSecure Page 3

Portman, Douglas

335

Towards Security Auto-Configuration for Smart Appliances  

E-Print Network (OSTI)

Now that smart home appliances are easily plugged into smart home networks, the question of how to simplify security management, especially of access rights, for such appliances arises. The problem is aggravated by the fact that home users cannot be considered as "skilled" administrators, but are instead often technology-unaware users.

Jean-marc Seigneur; Christian Damsgaard Jensen; Stephen Farrell; Elizabeth Gray; Yong Chen

2003-01-01T23:59:59.000Z

336

Network scheduling for data archiving applications in sensor networks  

Science Conference Proceedings (OSTI)

Since data archiving in sensor networks is a communication intensive application, a careful power management of communication is of critical importance for such networks. An example is FPS, an adaptive power scheduling algorithm that combines slotted ...

Yong Yao; S. M. Nazrul Alam; Johannes Gehrke; Sergio D. Servetto

2006-09-01T23:59:59.000Z

337

Management Solution  

E-Print Network (OSTI)

MEMO: Request for proposal for Computer-Aided Facilities and Maintenance Management application software; professional services; development services for interfaces to Financial Management and Human Resources systems; configuration, test, train, maintenance and support services to implement and maintain a CAFM Solution for the California Administrative Office of the Courts, the Trial Courts, the Appellate Courts and the Judicial Council, known as “The AOC Group.” You are invited to review and respond to the attached Request for Proposal (“RFP”):

Rfp Number Isdcafm

2004-01-01T23:59:59.000Z

338

Small Business Network List | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Network List Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy...

339

ACDN: active content distribution network  

Science Conference Proceedings (OSTI)

A novel dynamic and active CDN architecture based on active network (ACDN) is proposed. The programmable character of active network makes it easier and quicker to configure new replica servers as well as deploy new policies on demand. A genetic algorithm ...

Yan Chen; Zeng-zhi Li; Zhi-gang Liao

2005-03-01T23:59:59.000Z

340

Sensing and modeling human networks  

E-Print Network (OSTI)

Knowledge of how groups of people interact is important in many disciplines, e.g. organizational behavior, social network analysis, knowledge management and ubiquitous computing. Existing studies of social network interactions ...

Choudhury, Tanzeem Khalid, 1975-

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Management Information Systems (MIS) Sample Occupations  

E-Print Network (OSTI)

Support Specialist Computer and Information Systems Manager Computer Training Specialist Consultant Data Recruiter Knowledge Manager Logistics Manager Management Analysis MIS Director/Specialist Network Securities & Exchange Commission Website Design Companies Wholesale & Retail Companies Operations Manager

Ronquist, Fredrik

342

Definition: Electrical Profiling Configurations | Open Energy Information  

Open Energy Info (EERE)

Profiling Configurations Profiling Configurations Jump to: navigation, search Dictionary.png Electrical Profiling Configurations Electrical profiling is a DC resistivity survey which aims to trace lateral variations in the apparent resistivity structure of the subsurface. Traditionally, electrical profiling provides qualitative information of relative apparent resistivity values in order to detect anomalous geological features.[1] Also Known As Electrical mapping References ↑ http://www.amazon.com/Principles-Electric-Borehole-Geophysics-Geochemistry/dp/0444529942 Ret LikeLike UnlikeLike You like this.Sign Up to see what your friends like. rieved from "http://en.openei.org/w/index.php?title=Definition:Electrical_Profiling_Configurations&oldid=596184" Category: Definitions

343

Configuring Workstations for use with the PARS II System | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuring Workstations for use with the PARS II System Configuring Workstations for use with the PARS II System ConfiguringWorkstationsforusewiththePARSIISystem0.pdf...

344

Configuring Workstations for use with the PARS II System | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuring Workstations for use with the PARS II System Configuring Workstations for use with the PARS II System ConfiguringWorkstationsforusewiththePARSIISystem2013071...

345

Network Connections  

NLE Websites -- All DOE Office Websites (Extended Search)

Connecting to NERSC Using X Windows Connecting to NERSC with NX Transferring Data Network Performance Queues and Scheduling Job Logs & Analytics Training & Tutorials Software Accounts & Allocations Policies Data Analytics & Visualization Data Management Policies Science Gateways User Surveys NERSC Users Group User Announcements Help Operations for: Passwords & Off-Hours Status 1-800-66-NERSC, option 1 or 510-486-6821 Account Support https://nim.nersc.gov accounts@nersc.gov 1-800-66-NERSC, option 2 or 510-486-8612 Consulting http://help.nersc.gov consult@nersc.gov 1-800-66-NERSC, option 3 or 510-486-8611 Home » For Users » Network Connections Network Connections NERSC's resources can be accessed using SSH and related tools, grid tools, and via the web. This section explains how to connect to NERSC

346

uRbAn: A Multipath Routing based Architecture with Energy and Mobility Management for Quality of Service Support in Mobile Ad hoc Networks  

E-Print Network (OSTI)

Designing a wireless node that supports quality of service (QoS) in a mobile ad hoc network is a challenging task. In this paper, we propose an architecture of a wireless node that may be used to form a mobile ad hoc network that supports QoS. We discuss the core functionalities required for such a node and how those functionalities can be incorporated. A feature of our architecture is that the node has the ability to utilize multiple paths, if available, for the provision of QoS. However, in the absence of multiple paths it can utilize the resources provided by a single path between the source and the destination. We follow a modular approach where each module is expanded iteratively. We compare the features of our architecture with the existing architectures proposed in the literature. Our architecture has provisions of energy and mobility management and it can be customized to design a system-on-chip (SoC).

Abbas, Ash Mohammad

2011-01-01T23:59:59.000Z

347

Building programmable routing service for sensor networks  

Science Conference Proceedings (OSTI)

Current routing services for sensor networks are application-specific. They are pre-configured into nodes, and thus have difficulty in adapting to different applications and network conditions. This paper describes a framework to build programmable routing ... Keywords: Energy saving, Parameterization, Programmable, Routing, Sensor networks

Yu He; Cauligi S. Raghavendra

2005-04-01T23:59:59.000Z

348

Intelligent Management of the Power Grid: An Anticipatory, Multi-Agent, High Performance Computing Approach: EPRI/DoD Complex Intera ctive Networks/Systems Initiative: Second Annual Report  

Science Conference Proceedings (OSTI)

This report details the second-year research accomplishments for one of six research consortia established under the Complex Interactive Networks/Systems Initiative. This particular document details an anticipatory, multi-agent, high performance computing approach for intelligent management of the power grid.

2001-06-21T23:59:59.000Z

349

Incentive Pricing in Multi-Class Communication Networks  

Science Conference Proceedings (OSTI)

We consider a communication network that offers multi-class services to multiple types of traffic. Users choose service classes so as to optimize their own performance. The network associates with each traffic type a nominal service class. Optimal prices ... Keywords: Network pricing, multi-class networks, network control, network design and management, game theory, broadband networking

Ariel Orda; Nahum Shimkin

1997-04-01T23:59:59.000Z

350

Actes JFPC 2006 CSP dynamiques en configuration  

E-Print Network (OSTI)

Actes JFPC 2006 CSP dynamiques en configuration Article Jeune Chercheur JFPC'06 Thomas van'Albi-Carmaux, Route de Teillet, 81013 Albi Cedex 09 {vanouden, gaborit, aldanond, vareille}@enstimac.fr Résumé Les CSP, la configuration fait ressortir des besoins qui peuvent difficilement être traités par des CSP clas

Paris-Sud XI, Université de

351

Automated modeling of modular robotic configurations  

Science Conference Proceedings (OSTI)

This research presents an automated method to build kinematic and dynamic models for assembling modular components of modular robotic systems. By comparison with other approaches, the proposed method is applicable to any robotic configuration with serial, ... Keywords: Automatic modeling, Computer-aided design, Configuration design, Finite element method, Modular architecture, Modular robotic system, Reconfigurable robot

Z. M. Bi; W. A. Gruver; W. J. Zhang; S. Y. T. Lang

2006-12-01T23:59:59.000Z

352

Configurable multi-perspective business process models  

Science Conference Proceedings (OSTI)

A configurable process model provides a consolidated view of a family of business processes. It promotes the reuse of proven practices by providing analysts with a generic modeling artifact from which to derive individual process models. Unfortunately, ... Keywords: Business process, Configurable process model, EPC

Marcello La Rosa; Marlon Dumas; Arthur H. M. ter Hofstede; Jan Mendling

2011-04-01T23:59:59.000Z

353

ESF AS-BUILT CONFIGURATION  

Science Conference Proceedings (OSTI)

The calculations contained in this document were developed by the ''Mining Group of the Design & Engineering Organization'' and are intended solely for the use of the ''Design & Engineering Organization'' in its work regarding the subsurface repository. Yucca Mountain Project personnel from the ''Mining Group'' should be consulted before use of the calculations for purposes other than those stated herein or use by individuals other than authorized personnel in the ''Design & Engineering Organization''. The purpose of this calculation is to provide design inputs that can be used to develop an as-built drawing of the Exploratory Studies Facility (ESF) for the planning and development of the subsurface repository. This document includes subsurface as-built surveys, recommendation to complete as-built surveys, and Management and Operating Contractor (M&O) Subsurface Design Drawings as inputs. This calculation is used to provide data and information for an as-built ESF subsurface drawing and is not used in the development of results or conclusions, therefore all inputs are considered as indirect.

NA

2005-03-17T23:59:59.000Z

354

Configuration Of Wärtsilä Diesel Power Plant's Fuel System  

E-Print Network (OSTI)

The trend in modern production is to produce more tailored products with less design effort. Automation of design process is a modern way to increase effectiveness of the order/delivery process. This paper describes a methodology for configuration design of one-of-a-kind products. This methodology has been implemented with the cooperation of knowledge-based engineering software, an object-oriented database management system and, a CAD system. The methodology has been applied to two industrial test cases. This paper describes the application of the methodology in the configuration of diesel power plants' fuel systems. The experiences gained from the test cases show that knowledge automation can be realized with the efficient co-operation of the different tools. INHALTSANGABE Der Trend in der modernen Fertigung ist, mehr maßgeschneiderte Produkte mit weniger Design Aufwand herzustellen. Die Automatisierung des Konstruktionsprozesses ist ein modernes Mittel, die Effektivität des Bestell- ...

Anne Aaltonen; Pasi Paasiala; Kari Tanskanen; M. Sc; M. Sc; M. Sc; Asko Riitahuhta

1995-01-01T23:59:59.000Z

355

A directory service for configuring high-performance distributed computations  

Science Conference Proceedings (OSTI)

High-performance execution in distributed computing environments often requires careful selection and configuration not only of computers, networks, and other resources but also of the protocols and algorithms used by applications. Selection and configuration in turn require access to accurate, up-to-date information on the structure and state of available resources. Unfortunately, no standard mechanism exists for organizing or accessing such information. Consequently, different tools and applications adopt ad hoc mechanisms, or they compromise their portability and performance by using default configurations. We propose a Metacomputing Directory Service that provides efficient and scalable access to diverse, dynamic, and distributed information about resource structure and state. We define an extensible data model to represent required information and present a scalable, high-performance, distributed implementation. The data representation and application programming interface are adopted from the Lightweight Directory Access Protocol; the data model and implementation are new. We use the Globus distributed computing toolkit to illustrate how this directory service enables the development of more flexible and efficient distributed computing services and applications.

Fitzgerald, S.; Kesselman, C. [Univ. of Southern California, Marina del Rey, CA (United States). Information Sciences Institute; Foster, I. [Argonne National Lab., IL (United States)] [and others

1997-08-01T23:59:59.000Z

356

Building Information Modeling - A Minimum Mathematical Configuration  

E-Print Network (OSTI)

In the current context, the standardization of building construction is not limited to a specific country or to a specific building code. Trade globalization has emphasized the need for standardization in the process of exchange of design information, whether it is in the form of drawings or documents. Building Information Modeling is the latest transformational technology that supports interactive development of design information for buildings. No single Building Information Modeling software package is used in the Architecture Engineering Construction and Facilities Management industries, which is strength as new ideas develop, but a hindrance as the new ideas flow at a different pace into the various programs. The standards divergence of various software results in a limited ability to exchange data between and within projects, especially one sees the difficulty in moving data from one program to another. The Document eXchange File format represents an early attempt to standardize the exchange of drawing information by Autodesk. However, the data was limited to geometric data required for the production of plotted drawings. Metadata in a Building Information Model provides a method to add information to the basic geometric configuration provided in a Document eXchange File. Building Information Model programs use data structures to define smart objects that encapsulate building data in a searchable and robust format. Due to the complexity of building designs eXtensible Markup Language schemas of three dimensional models are often large files that can contain considerable amounts of superfluous information. The aim of this research is to exclude all the superfluous information from the design information and determine the absolute minimum information required to execute the construction of a project. A plain concrete beam element was used as the case study for this research. The results show that a minimal information schema can be developed for a simple building element. Further research is required on more complex elements.

Bhandare, Ruchika

2012-08-01T23:59:59.000Z

357

A virtual ad hoc network testbed  

Science Conference Proceedings (OSTI)

Testing of applications for ad hoc networks poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in a testbed that ... Keywords: MANETs, SITL, VAN, emulation, hybrid testbed, mobile ad hoc networks, mobile networks, network management, shadow nodes, simulation, software-in-, the-loop, virtual ad hoc networks, virtual machines, virtual networks, virtualisation

Alex Poylisher; Constantin Serban; John Lee; Tai-Chuan Lu; Ritu Chadha; Cho-Yu Jason Chiang; Robert Orlando; Kimberly Jakubowski

2010-07-01T23:59:59.000Z

358

Surveillance Guide - CMS 3.3 Verification of System Configuration and Operations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VERIFICATION OF SYSTEM CONFIGURATION AND OPERATIONS VERIFICATION OF SYSTEM CONFIGURATION AND OPERATIONS 1.0 Objective The objective of this surveillance is for the Facility Representative to verify that the facility's configuration and operations are consistent with facility design basis documentation. These surveillance activities provide a basis for evaluating the effectiveness of the contractor's program for implementing design basis requirements and for ensuring compliance with DOE requirements. 2.0 References 2.1 DOE 4700.1, Project Management System 2.2 DOE 5480.19, Conduct of Operations Requirements for DOE Facilities 2.3 DOE 5480.23, Safety Analysis Reports 2.4 DOE-STD-1073-93, Guide for Operational Configuration Management 3.0 Requirements Implemented This surveillance is conducted to implement requirements CM-0009

359

Self modelling knowledge networks  

Science Conference Proceedings (OSTI)

What the scope of knowledge management (KM) is concerned, the focus of attention is shifting towards inter-organisational aspects resulting in new requirements for the KM process. This paper introduces the concept of self modelling knowledge networks ...

Volker Derballa; Antonia Albani

2005-10-01T23:59:59.000Z

360

BER Science Network Requirements  

E-Print Network (OSTI)

ESnet (Networking) Bert de Jong, PNNL (EMSL/HPC) KerstinKleese van Dam, PNNL (Data Management) Miron Livny,ORNL (ARM) Chris Oehmen, PNNL (Bioinformatics/ScalaBLAST)

Dart, Eli

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

BES Science Network Requirements  

E-Print Network (OSTI)

September 22 and 23, 2010 ESnet Energy Sciences NetworkMD — September 22 and 23, 2010 ESnet is funded by the USASCR). Vince Dattoria is the ESnet Program Manager. ESnet is

Dart, Eli

2011-01-01T23:59:59.000Z

362

Vertical Electrical Sounding Configurations | Open Energy Information  

Open Energy Info (EERE)

Vertical Electrical Sounding Configurations Vertical Electrical Sounding Configurations Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Vertical Electrical Sounding Configurations Details Activities (0) Areas (0) Regions (0) NEPA(0) Exploration Technique Information Exploration Group: Geophysical Techniques Exploration Sub Group: Electrical Techniques Parent Exploration Technique: Direct-Current Resistivity Survey Information Provided by Technique Lithology: Rock composition, mineral and clay content Stratigraphic/Structural: Detection of permeable pathways, fracture zones, faults Hydrological: Resistivity influenced by porosity, grain size distribution, permeability, fluid saturation, fluid type and phase state of the pore water Thermal: Resistivity influenced by temperature

363

Electrical Profiling Configurations | Open Energy Information  

Open Energy Info (EERE)

Electrical Profiling Configurations Electrical Profiling Configurations Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Electrical Profiling Configurations Details Activities (0) Areas (0) Regions (0) NEPA(0) Exploration Technique Information Exploration Group: Geophysical Techniques Exploration Sub Group: Electrical Techniques Parent Exploration Technique: Direct-Current Resistivity Survey Information Provided by Technique Lithology: Rock composition, mineral and clay content Stratigraphic/Structural: Detection of permeable pathways, fracture zones, faults Hydrological: Resistivity influenced by porosity, grain size distribution, permeability, fluid saturation, fluid type and phase state of the pore water Thermal: Resistivity influenced by temperature

364

Mitigating multi-path fading in a mobile mesh network  

Science Conference Proceedings (OSTI)

By using robots as routers, a team of networked robots can provide a communication substrate to establish a wireless mesh network. The mobile mesh network can autonomously optimize its configuration, increasing performance. One of the main sources of ... Keywords: Complex environments, Distributed optimization, Experimental and prototype results, Mobile and wireless ad-hoc networks, Multi-path fading

Marcos A. M. Vieira, Matthew E. Taylor, Prateek Tandon, Manish Jain, Ramesh Govindan, Gaurav S. Sukhatme, Milind Tambe

2013-06-01T23:59:59.000Z

365

Network Cabling Handbook  

Science Conference Proceedings (OSTI)

From the Publisher:This is a one-stop guide to both copper and fiber network cabling. Contains detailed coverage of monitoring software,connectivity troubleshooting,and management techniques. Master the art of wiring your network Plan,design,and build ...

Chris Clark

2001-11-01T23:59:59.000Z

366

User guide to power management for PCs and monitors  

SciTech Connect

Power management of personal computers (PCs) and monitors has the potential to save significant amounts of electricity as well as deliver other economic and environmental benefits. The Environmental Protection Agency`s ENERGY STAR{reg_sign} program has transformed the PC market so that equipment capable of power management is now widely available. However, previous studies have found that many Energy Star compliant computer systems are not accomplishing energy savings. The principal reasons for this are systems not being enabled for power management or a circumstance that prevents power management from operating. This guide is intended to provide information to computer support workers to increase the portion of systems that successfully power manage. The guide introduces power management concepts and the variety of benefits that power management can bring. It then explains how the parts of a computer system work together to enter and leave power management states. Several common computer system types are addressed, as well as the complications that networks bring to power management. Detailed instructions for checking and configuring several system types are provided, along with trouble shooting advice. The guide concludes with a discussion of how to purchase Energy Star compliant systems and future directions for power management of PCs and related equipment.

Nordman, B.; Piette, M.A.; Kinney, K.; Webber, C. [Lawrence Berkeley National Lab., CA (United States). Environmental Energy Technologies Div.

1997-01-01T23:59:59.000Z

367

LambdaStation: Exploiting Advance Networks In Data Intensive High Energy Physics Applications  

SciTech Connect

Lambda Station software implements selective, dynamic, secure path control between local storage & analysis facilities, and high bandwidth, wide-area networks (WANs). It is intended to facilitate use of desirable, alternate wide area network paths which may only be intermittently available, or subject to policies that restrict usage to specified traffic. Lambda Station clients gain awareness of potential alternate network paths via Clarens-based web services, including path characteristics such as bandwidth and availability. If alternate path setup is requested and granted, Lambda Station will configure the local network infrastructure to properly forward designated data flows via the alternate path. A fully functional implementation of Lambda Station, capable of dynamic alternate WAN path setup and teardown, has been successfully developed. A limited Lambda Station-awareness capability within the Storage Resource Manager (SRM) product has been developed. Lambda Station has been successfully tested in a number of venues, including Super Computing 2008. LambdaStation software, developed by the Fermilab team, enables dynamic allocation of alternate network paths for high impact traffic and to forward designated flows across LAN. It negotiates with reservation and provisioning systems of WAN control planes, be it based on SONET channels, demand tunnels, or dynamic circuit networks. It creates End-To-End circuit between single hosts, computer farms or networks with predictable performance characteristics, preserving QoS if supported in LAN and WAN and tied security policy allowing only specific traffic to be forwarded or received through created path. Lambda Station project also explores Network Awareness capabilities.

Harvey B. Newman

2009-09-11T23:59:59.000Z

368

Property:Mooring Configuration | Open Energy Information  

Open Energy Info (EERE)

Mooring Configuration Mooring Configuration Jump to: navigation, search Property Name Mooring Configuration Property Type Text Pages using the property "Mooring Configuration" Showing 25 pages using this property. (previous 25) (next 25) M MHK Technologies/Aegir Dynamo + Gravity base with tension leg platform MHK Technologies/AirWEC + Single point slack moored MHK Technologies/Aquantis + Proprietary MHK Technologies/Atlantis AN 150 + mono pylon MHK Technologies/Atlantis AR 1000 + Site specific design mono pylon or gravity base structure The AR 1000 deployed at EMEC makes use of a GBS foundation MHK Technologies/Atlantis AS 400 + N A MHK Technologies/C Plane + Tethered MHK Technologies/CETO Wave Energy Technology + Anchored MHK Technologies/Centipod + Proprietary MHK Technologies/Current Electric Generator + The anchors for the Current Electric Generator will be made from concrete and will be a gravity base

369

Definition: Vertical Electrical Sounding Configurations | Open Energy  

Open Energy Info (EERE)

Sounding Configurations Sounding Configurations Jump to: navigation, search Dictionary.png Vertical Electrical Sounding Configurations A vertical electrical sounding (VES) is a DC resistivity survey which provides information regarding the change in apparent resistivity with depth. A quantitative interpretation of the results from VES measurements enable determination of the parameters for the geoelectric section.[1] Also Known As VES; Schlumberger Sounding References ↑ http://www.nga.com/Flyers_PDF/NGA_DC_Resistivity.pdf http://www.amazon.com/Principles-Electric-Borehole-Geophysics-Geochemistry/dp/0444529942 Ret LikeLike UnlikeLike You like this.Sign Up to see what your friends like. rieved from "http://en.openei.org/w/index.php?title=Definition:Vertical_Electrical_Sounding_Configurations&oldid=596183

370

Enabling decentralised management through federation  

Science Conference Proceedings (OSTI)

Cross-domain management is an increasingly important concern in network management and such management capability is a key-enabler of many emerging computing environments. This paper analyses the requirements for management systems that aim to support ... Keywords: Federation, Management, Policy-based management, Semantics, Telecommunications

Kevin Feeney; Rob Brennan; John Keeney; Hendrik Thomas; Dave Lewis; Aidan Boran; Declan O'Sullivan

2010-11-01T23:59:59.000Z

371

Clear channel assessment in wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks are a rising commodity that demonstrate merit in the research domain due to their versatile nature. While powerful and feature-laden, these systems also require careful configuration for optimal packet transmission. This experiment ...

J. Collin Engstrom; Chase Gray

2008-03-01T23:59:59.000Z

372

Stochastic hub and spoke networks  

E-Print Network (OSTI)

life to the early Roman water management and road network systems to modern day transportation systems and social networks such as Facebook and Twitter. The topic of this PhD thesis is an in-depth research study on a specific type of network system...

Hult, Edward Eric

2011-10-11T23:59:59.000Z

373

A delta configured auxiliary resonant snubber inverter  

SciTech Connect

A delta ({Delta}) configured auxiliary resonant snubber inverter is developed to overcome the voltage floating problem in a wye (Y) configured resonant snubber inverter. The proposed inverter is to connect auxiliary resonant branches between phase outputs to avoid a floating point voltage which may cause over-voltage failure of the auxiliary switches. Each auxiliary branch consists of a resonant inductor and a reverse blocking auxiliary switch. Instead of using an anti-paralleled diode to allow resonant current to flow in the reverse direction, as in the Y-configured version, the resonant branch in the {Delta}-configured version must block the negative voltage, typically done by a series diode. This paper shows single-phase and three-phase versions of {Delta}-configured resonant snubber inverters and describes in detail the operating principle of a single-phase version. The extended three-phase version is proposed with non-adjacent state space vector modulation. For hardware implementation, a single-phase 1-kW unit and a three-phase 100-kW unit were built to prove the concept. Experimental results show the superiority of the proposed topology.

Lai, J.S.; Young, R.W.; Ott, G.W. Jr.; McKeever, J.W. [Oak Ridge National Lab., TN (United States). Engineering Technology Div.; Peng, F.Z. [Univ. of Tennessee, Knoxville, TN (United States)]|[Oak Ridge National Lab., TN (United States)

1995-09-01T23:59:59.000Z

374

Bayesian networks  

E-Print Network (OSTI)

g causal independence in Bayesian network inference. Journalworld ap- plications of Bayesian networks. Communications ofJensen. An Introduction to Bayesian Networks. Springer, New

Judea Pearl

2011-01-01T23:59:59.000Z

375

PARS II Configuration Update - Trusted Publisher  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Update - Trusted Publisher Configuration Update - Trusted Publisher As of July 15, 2013, all reports within SSS Reports will require a new Trusted Publisher to be accepted in order for reports to present correctly and as intended. The new Trusted Publisher certificate has been issued to the US Department of Energy by Entrust Code Signing Certification Authority - L1D and is valid until 4/22/2016. Depending upon the security settings within your domain for your workstation, administrative rights may be required to accept the new Trusted Publisher. If required, please contact your local IT Helpdesk for assistance. The original Trusted Publisher certificate, Dekker Ltd., may remain within your configuration settings. Acceptance of the new Trusted Publisher in no way affects any current reporting requirements.

376

A configuration system for the ATLAS trigger  

E-Print Network (OSTI)

will be exposed to proton-proton collisions from beams crossing at 40 MHz that have to be reduced to the few 100 Hz allowed by the storage systems. A three-level trigger system has been designed to achieve this goal. We describe the configuration system under construction for the ATLAS trigger chain. It provides the trigger system with all the parameters required for decision taking and to record its history. The same system configures the event reconstruction, Monte Carlo simulation and data analysis, and provides tools for accessing and manipulating the configuration data in all contexts. THE ATLAS TRIGGER The LHC proton bunches will cross at a frequency of approximately 40 MHz. The rate of events that can be committed to permanent storage in normal data taking is only

unknown authors

2006-01-01T23:59:59.000Z

377

WebTrafMon: Web-based Internet/Intranet network traffic monitoring and analysis system  

Science Conference Proceedings (OSTI)

As enterprise computing environments become more network-oriented, the importance of network traffic monitoring and analysis intensifies. Most existing traffic monitoring and analysis tools focus on measuring the traffic loads of individual network segments. ... Keywords: Enterprise network management, Network traffic monitoring and analysis, Traffic management, Traffic type and source analysis, Web-based management

J. W. -K Hong; S.-S Kwon; J.-Y Kim

1999-09-01T23:59:59.000Z

378

Definitions of Managed Objects for the Ethernet WAN Interface Sublayer  

Science Conference Proceedings (OSTI)

This document defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP based internets. In particular, it defines objects for managing the Ethernet Wide Area Network (WAN) Interface Sublayer (WIS).

C. M. Heard

2003-09-01T23:59:59.000Z

379

An architecture for context aware management  

Science Conference Proceedings (OSTI)

Military networks are subject to frequent changes due to hostile activities, movement of forces, weather conditions, terrain, etc. In order to function optimally, the network nodes must be able to rapidly adapt to the changes in the environment. Traditionally, ... Keywords: ad hoc network, context aware management, core ad hoc network, policy management

Catharina Candolin; Hannu H. Kari

2003-10-01T23:59:59.000Z

380

A GAP package for computation with coherent configurations  

Science Conference Proceedings (OSTI)

We present a GAP package for computing with Schurian coherent configurations and their representations. Keywords: GAP, GRAPE, association scheme, centralizer ring, coherent configuration, permutation group, sage, semidefinite programming

Dmitrii V. Pasechnik; Keshav Kini

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

The fundamentals of configuration in face perception and discrimination  

E-Print Network (OSTI)

THE DISSERTATION The Fundamentals of Configuration in FaceCALIFORNIA, SAN DIEGO The Fundamentals of Configuration inorganization of a face are fundamental to daily human

Pallett, Pamela Mitchell

2008-01-01T23:59:59.000Z

382

Academic and research network of Slovenia  

Science Conference Proceedings (OSTI)

The Academic and Research Network of Slovenia (ARNES) was founded by the Government of Slovenia in 1992 as an agency to develop, operate and manage a computer network for education and research. This article describes the development of the network, ... Keywords: Internet, Research and educational networks

Avgust Jauk; Marko Bona?; Igor Ozimek; Gorazd Kandus

2003-03-01T23:59:59.000Z

383

Efficient XML usage within wireless sensor networks  

Science Conference Proceedings (OSTI)

Integrating wireless sensor networks in heterogeneous networks is a complex task. A reason is the absence of a standardized data exchange format that is supported in all participating sub networks. XML has evolved to the de facto standard data exchange ... Keywords: XML, database management, programming language, wireless sensor networks

Nils Hoeller; Christoph Reinke; Jana Neumann; Sven Groppe; Daniel Boeckmann; Volker Linnemann

2008-11-01T23:59:59.000Z

384

A survey of system configuration tools  

Science Conference Proceedings (OSTI)

We believe that informed choices are better choices. When you adopt a system configuration tool, it implies a significant investment in time and/or money. Before making such an investment, you want to pick the right tool for your environment. Therefore, ...

Thomas Delaet; Wouter Joosen; Bart Vanbrabant

2010-11-01T23:59:59.000Z

385

Film bonded fuel cell interface configuration  

DOE Patents (OSTI)

An improved interface configuration for use between adjacent elements of a fuel cell stack. The interface is impervious to gas and liquid and provides resistance to corrosion by the electrolyte of the fuel cell. A multi-layer arrangement for the interface provides bridging electrical contact with a hot-pressed resin filling the void space.

Kaufman, Arthur (West Orange, NJ); Terry, Peter L. (Chatham, NJ)

1985-01-01T23:59:59.000Z

386

Configuration structures, event structures and Petri nets  

Science Conference Proceedings (OSTI)

In this paper the correspondence between safe Petri nets and event structures, due to Nielsen, Plotkin and Winskel, is extended to arbitrary nets without self-loops, under the collective token interpretation. To this end we propose a more general form ... Keywords: Concurrency, Configuration structures, Event structures, Petri nets, Propositional logic

R. J. van Glabbeek; G. D. Plotkin

2009-09-01T23:59:59.000Z

387

Construction processes configuration using process patterns  

Science Conference Proceedings (OSTI)

Process modeling is used in construction to support various simulation tasks. A major problem is that due to the one-of-a-kind character of construction projects a lot of work is needed each time to manually develop a project overall process schedule. ... Keywords: Ontology, Process configuration, Process modeling, Process pattern, Rules

A. Benevolenskiy; K. Roos; P. Katranuschkov; R. J. Scherer

2012-10-01T23:59:59.000Z

388

Join the ENERGY STAR Small Business Network | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Join the ENERGY STAR Small Business Network Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new...

389

Study on Advanced Visualization Tools In Network Monitoring Platform  

Science Conference Proceedings (OSTI)

Visualization tools have emerged as a critical component, especially in medical, education, engineering, military and environmental management. These fields have applied the visualization techniques to improve decision making and organization management ... Keywords: data visualization, network traffic visualization, network monitoring

Doris Wong Hooi Ten; Selvakumar Manickam; Sureswaran Ramadass; Hussein A. Al Bazar

2009-11-01T23:59:59.000Z

390

Friendster and publicly articulated social networking  

Science Conference Proceedings (OSTI)

This paper presents ethnographic fieldwork on Friendster, an online dating site utilizing social networks to encourage friend-of-friend connections. I discuss how Friendster applies social theory, how users react to the site, and the tensions ... Keywords: Friendster, configuring users, identity, social networks

danah michele boyd

2004-04-01T23:59:59.000Z

391

Absorptive capacity configurations in supply chains: gearing for partner-enabled market knowledge creation  

Science Conference Proceedings (OSTI)

The need for continual value innovation is driving supply chains to evolve from a pure transactional focus to leveraging interorganizational partner ships for sharing information and, ultimately, market knowledge creation. Supply chain partners are (1) ... Keywords: absorptive capacity, configuration approaches, interorganizational information systems, knowledge management, process modularity, rich information, supply chain

Arvind Malhotra; Sanjay Gosain; Omar Sawy

2005-03-01T23:59:59.000Z

392

Path inference in data center networks  

Science Conference Proceedings (OSTI)

Path inference is the ability to determine the sequence of devices traversed by a packet within an IP network. This is a fundamental building block for several network and service management applications such as troubleshooting, planning, and ...

Kyriaki Levanti, Vijay Gopalakrishnan, Hyong S. Kim, Seungjoon Lee, Emmanuil Mavrogiorgis, Aman Shaikh

2012-10-01T23:59:59.000Z

393

Power Control in Wireless Cellular Networks  

Science Conference Proceedings (OSTI)

Transmit power in wireless cellular networks is a key degree of freedom in the management of interference, energy, and connectivity. Power control in both the uplink and downlink of a cellular network has been extensively studied, especially over the ...

Mung Chiang; Prashanth Hande; Tian Lan; Chee Wei Tan

2008-04-01T23:59:59.000Z

394

What's new: finding significant differences in network data streams  

Science Conference Proceedings (OSTI)

Monitoring and analyzing network traffic usage patterns is vital for managing IP Networks. An important problem is to provide network managers with information about changes in traffic, informing them about "what's new." Specifically, we focus on the ... Keywords: change detection, data streams, deltoids, network data analysis

Graham Cormode; S. Muthukrishnan

2005-12-01T23:59:59.000Z

395

Configuring Client PCs for use with Project Assessment and Reporting System(PARS II)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4/2011 4/2011 Page 1 of 4 1 PROCEDURES 1.1 Introduction Most users will be comfortable with contacting their IT Helpdesk for completing the instructions below. However, if you have Admin rights on your workstation, and are comfortable with making configuration changes to it, you may follow these directions yourself. 1.2 Installation of ActiveX Control WINDOWS XP 1. Log onto the workstation to be configured using an ID/Password that can perform administrative functions on that workstation (e.g. Install software, add Active-X controls). Note that administrative access is only required for initial workstation configuration, not ongoing operation of the PARS II application. 2. Check hardware, software and network requirements as identified in section 2 below. Less than

396

Definition and evaluation of product configurator development strategies  

Science Conference Proceedings (OSTI)

Product configurators represent one of the most successful applications of artificial intelligence principles. Product configurators are a subtype of software-based expert systems with a focus on the creation of product specifications. The use of product ... Keywords: Expert systems, Knowledge acquisition, Knowledge engineering, Product configuration, Product configurator

Anders Haug; Lars Hvam; Niels Henrik Mortensen

2012-06-01T23:59:59.000Z

397

Network Communication as a Service-Oriented Capability  

Science Conference Proceedings (OSTI)

In widely distributed systems generally, and in science-oriented Grids in particular, software, CPU time, storage, etc., are treated as"services" -- they can be allocated and used with service guarantees that allows them to be integrated into systems that perform complex tasks. Network communication is currently not a service -- it is provided, in general, as a"best effort" capability with no guarantees and only statistical predictability. In order for Grids (and most types of systems with widely distributed components) to be successful in performing the sustained, complex tasks of large-scale science -- e.g., the multi-disciplinary simulation of next generation climate modeling and management and analysis of the petabytes of data that will come from the next generation of scientific instrument (which is very soon for the LHC at CERN) -- networks must provide communication capability that is service-oriented: That is it must be configurable, schedulable, predictable, and reliable. In order to accomplish this, the research and education network community is undertaking a strategy that involves changes in network architecture to support multiple classes of service; development and deployment of service-oriented communication services, and; monitoring and reporting in a form that is directly useful to the application-oriented system so that it may adapt to communications failures. In this paper we describe ESnet's approach to each of these -- an approach that is part of an international community effort to have intra-distributed system communication be based on a service-oriented capability.

Johnston, William; Johnston, William; Metzger, Joe; Collins, Michael; Burrescia, Joseph; Dart, Eli; Gagliardi, Jim; Guok, Chin; Oberman, Kevin; O'Conner, Mike

2008-01-08T23:59:59.000Z

398

Congestion management in electricity networks  

E-Print Network (OSTI)

 are accepted and their payments. Nodal pricing or locational  marginal pricing (LMP) is used in Argentina, Chile, Ireland, New Zealand, Russia, Singapore,  in several US states (e.g. California, New England, New York, PJM and Texas), and Poland is on  the  way  to  implement  it  as  well.  This  design  acknowledges...

Holmberg, Pärr; Lazarczyk, Ewa

2012-04-25T23:59:59.000Z

399

Lighting system with thermal management system  

DOE Patents (OSTI)

Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

Arik, Mehmet; Weaver, Stanton; Stecher, Thomas; Seeley, Charles; Kuenzler, Glenn; Wolfe, Jr., Charles; Utturkar, Yogen; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

2013-05-07T23:59:59.000Z

400

Intention Recognition via Causal Bayes Networks Plus Plan Generation  

Science Conference Proceedings (OSTI)

In this paper, we describe a novel approach to tackle intention recognition, by combining dynamically configurable and situation-sensitive Causal Bayes Networks plus plan generation techniques. Given some situation, such networks enable recognizing agent ... Keywords: ASCP, Causal Bayes Networks, Intention recognition, Logic Programming, P-log, Plan generation

Luís Moniz Pereira; Han The Anh

2009-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Configuration Change Proposal Form | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

and Office Management Areas. Green-DNS-Form09.doc More Documents & Publications Cyber Security Procurement Language for Control Systems Version 1.8 OPC Security Whitepaper...

402

Urban Network Practices  

Science Conference Proceedings (OSTI)

This report describes the findings of an underground distribution practices immersion conducted by the Electric Power Research Institute (EPRI) with National Grid. This immersion was conducted as part of a multiyear effort by EPRI to identify noteworthy practices in managing urban network systems. National Grid's U.S. operations, headquartered in Waltham, Massachusetts, serves customers through secondary network systems in multiple cities in New York and New England. This report profiles the practices (p...

2012-02-16T23:59:59.000Z

403

Achieving True Video-on-Demand Service in Multi-Hop WiMax Mesh Networks  

E-Print Network (OSTI)

Mesh Network Configuration (MSH-NCFG) messages. Each MSH-NCFG message contains a Network Descriptor by listening to MSH-NCFG messages. From all the possible neighboring nodes that advertise MSH-NCFG messages

Hua, Kien A.

404

BladeCenter chassis management  

Science Conference Proceedings (OSTI)

The IBM eServerTM BladeCenter® system allows compute, network, and storage components to operate under a common chassis management scheme. It offers a new approach to solving many systems management issues surrounding the integration ...

T. Brey; B. E. Bigelow; J. E. Bolan; H. Cheselka; Z. Dayar; J. M. Franke; D. E. Johnson; R. N. Kantesaria; E. J. Klodnicki; S. Kochar; S. M. Lardinois; C. A. Morrell; M. S. Rollins; R. R. Wolford; D. R. Woodham

2005-11-01T23:59:59.000Z

405

BER Science Network Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Network Network Requirements Report of the Biological and Environmental Research Network Requirements Workshop Conducted July 26 and 27, 2007 BER Science Network Requirements Workshop Biological and Environmental Research Program Office, DOE Office of Science Energy Sciences Network Bethesda, MD - July 26 and 27, 2007 ESnet is funded by the US Dept. of Energy, Office of Science, Advanced Scientific Computing Research (ASCR) program. Dan Hitchcock is the ESnet Program Manager. ESnet is operated by Lawrence Berkeley National Laboratory, which is operated by the University of California for the US Department of Energy under contract DE-AC02-05CH11231. This work was supported by the Directors of the Office of Science, Office of Advanced Scientific Computing Research, Facilities Division, and the Office of Biological &

406

Disposal configuration options for future uses of greater confinement disposal at the Nevada Test Site  

Science Conference Proceedings (OSTI)

The US Department of Energy (DOE) is responsible for disposing of a variety of radioactive and mixed wastes, some of which are considered special-case waste because they do not currently have a clear disposal option. The DOE`s Nevada Field Office contracted with Sandia National Laboratories to investigate the possibility of disposing of some of this special-case waste at the Nevada Test Site (NTS). As part of this investigation, a review of a near-surface and subsurface disposal options that was performed to develop alternative disposal configurations for special-case waste disposal at the NTS. The criteria for the review included (1) configurations appropriate for disposal at the NTS; (2) configurations for disposal of waste at least 100 ft below the ground surface; (3) configurations for which equipment and technology currently exist; and (4) configurations that meet the special requirements imposed by the nature of special-case waste. Four options for subsurface disposal of special-case waste are proposed: mined consolidated rock, mined alluvium, deep pits or trenches, and deep boreholes. Six different methods for near-surface disposal are also presented: earth-covered tumuli, above-grade concrete structures, trenches, below-grade concrete structures, shallow boreholes, and hydrofracture. Greater confinement disposal (GCD) in boreholes at least 100 ft deep, similar to that currently practiced at the GCD facility at the Area 5 Radioactive Waste Management Site at the NTS, was retained as the option that met the criteria for the review. Four borehole disposal configurations are proposed with engineered barriers that range from the native alluvium to a combination of gravel and concrete. The configurations identified will be used for system analysis that will be performed to determine the disposal configurations and wastes that may be suitable candidates for disposal of special-case wastes at the NTS.

Price, L. [Science Applications International Corp., Albuquerque, NM (United States)

1994-09-01T23:59:59.000Z

407

ENAVis: enterprise network activities visualization  

Science Conference Proceedings (OSTI)

With the prevalence of multi-user environments, it has become an increasingly challenging task to precisely identify who is doing what on an enterprise network. Current management systems that rely on inferring user identity and application usage via ...

Qi Liao; Andrew Blaich; Aaron Striegel; Douglas Thain

2008-11-01T23:59:59.000Z

408

Category:Vertical Electrical Sounding Configurations | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Category Edit History Facebook icon Twitter icon » Category:Vertical Electrical Sounding Configurations Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Geothermalpower.jpg Looking for the Vertical Electrical Sounding Configurations page? For detailed information on Vertical Electrical Sounding Configurations as exploration techniques, click here. Category:Vertical Electrical Sounding Configurations Add.png Add a new Vertical Electrical Sounding Configurations Technique Pages in category "Vertical Electrical Sounding Configurations" The following 2 pages are in this category, out of 2 total.

409

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

410

CS 535- Wireless Network Security  

E-Print Network (OSTI)

This is a 3-credit course that focuses on security and privacy issues in wireless networks and systems. Generally the security of MAC and especially upper layers are considered in this class. This course is not intended to cover cryptography in detail, but an overview of cryptography will be given at the beginning of the course so that the students who do not know cryptography would have sufficient information to understand the rest of the course. Although the catalogue information for this course (see below) several sub areas of wireless network security, in this course we will focus on ad hoc and sensor network security. Catalogue Data: This course covers security and privacy issues in wireless networks and systems, such as cellular networks, wireless LANs, wireless PANs, mobile ad hoc networks, vehicular networks, satellite networks, wireless mesh networks, sensor networks and RFID systems. Security problems of MAC and especially upper layers will be emphasized. Attacks and proposed solutions at several layers, authentication, key distribution and key management, secure routing, selfish and malicious behaviors, and secure group communication are analyzed for applicable wireless network types. A short overview of cryptography and wireless networking principles will be given at the beginning of the course. Prerequisite: Formally there is no prerequisite for this course, but students are expected to come with undergrad level computer networks background. Moreover, computer-programming expertise is necessary. Instructor: Schedule:

Albert Levi

2008-01-01T23:59:59.000Z

411

Anatomy of neck configuration in fission decay  

E-Print Network (OSTI)

The anatomy of neck configuration in the fission decay of Uranium and Thorium isotopes is investigated in a microscopic study using Relativistic mean field theory. The study includes $^{236}U$ and $^{232}Th$ in the valley of stability and exotic neutron rich isotopes $^{250}U$, $^{256}U$, $^{260}U$, $^{240}Th$, $^{250}Th$, $^{256}Th$ likely to play important role in the r-process nucleosynthesis in stellar evolution. Following the static fission path, the neck configurations are generated and their composition in terms of the number of neutrons and protons are obtained showing the progressive rise in the neutron component with the increase of mass number. Strong correlation between the neutron multiplicity in the fission decay and the number of neutrons in the neck is seen. The maximum neutron-proton ratio is about 5 for $^{260}$U and $^{256}$Th suggestive of the break down of liquid-drop picture and inhibition of the fission decay in still heavier isotopes. Neck as precursor of a new mode of fission decay like multi-fragmentation fission may also be inferred from this study.

S. K. Patra; R. K. Choudhury; L. Satpathy

2010-05-10T23:59:59.000Z

412

Microsoft Word - Configuring Workstations for use with the PARS II System.V3.0.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30/2010 30/2010 1 PROCEDURES 1.1 Introduction Most users will be comfortable with contacting their IT Helpdesk for completing the instructions below. However, If you have Admin rights on your workstation, and are comfortable with making configuration changes to it, you may follow these directions yourself. 1.2 Installation of Dekker, Ltd. ActiveX Control 1. Log onto the workstation to be configured using an ID/Password that can perform administrative functions on the workstation being configured (e.g. Install software, add Active-X controls). Note that administrative access is only required for initial workstation configuration, not ongoing operation of the PARS II application on the workstation. 2. Check hardware, software and network requirements as identified in section 2 below.

413

Definitions of Extension Managed Objects for Asymmetric Digital Subscriber Lines  

Science Conference Proceedings (OSTI)

This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes additional managed objects used for managing Asymmetric Digital Subscriber Line (ADSL) ...

F. Ly; G. Bathrick

2002-12-01T23:59:59.000Z

414

Model Uncertainty and the Management of a System of Infrastructure Facilities  

E-Print Network (OSTI)

Management of a System of Infrastructure Facilities KennethAbstract The network-level infrastructure management problemS. (1993) Optimal Infrastructure Management Decisions Under

Kuhn, Kenneth D.; Madanat, Samer M.

2005-01-01T23:59:59.000Z

415

Fluid Mechanics, Drag Reduction and Advanced Configuration Aeronautics  

Science Conference Proceedings (OSTI)

Paper discusses Advanced Aircraft configurational approaches, across the speed range, which are either enabled, or greatly enhanced, by clever Flow Control. Configurations considered include Channel Wings with circulation control for VTOL [but non-hovering] ...

Bushnell Dennis M.

2000-12-01T23:59:59.000Z

416

Policy-driven routing management using CIM  

Science Conference Proceedings (OSTI)

Policy-based network management is intended to provide a system-wide and unified view of the network and its services and applications. This includes the combined management of network services as different as security, QoS or routing. However, while ...

Félix J. García Clemente; Jesús D. Jiménez Re; Gregorio Martínez Pérez; Antonio F. Gómez Skarmeta

2005-09-01T23:59:59.000Z

417

Illuminac: simultaneous naming and configuration for workspace lighting control  

Science Conference Proceedings (OSTI)

We explore natural and calm interfaces for configuring ubiquitous computing environments. A natural interface should enable the user to name a desired configuration and have the system enact that configuration. Users should be able to use familiar names ... Keywords: environment control, natural speech interfaces, non-negative matrix factorization

Ana Ramírez Chang; John Canny

2009-02-01T23:59:59.000Z

418

A Radically Configurable Six-State Compound  

SciTech Connect

Most organic radicals possess short lifetimes and quickly undergo dimerization or oxidation. Here, we report on the synthesis by radical templation of a class of air- and water-stable organic radicals, trapped within a homo[2]catenane composed of two rigid and fixed cyclobis(paraquat-p-phenylene) rings. The highly energetic octacationic homo[2]catenane, which is capable of accepting up to eight electrons, can be configured reversibly, both chemically and electrochemically, between each one of six experimentally accessible redox states (0, 2+, 4+, 6+, 7+, and 8+) from within the total of nine states evaluated by quantum mechanical methods. All six of the observable redox states have been identified by electrochemical techniques, three (4+, 6+, and 7+) have been characterized by x-ray crystallography, four (4+, 6+, 7+, and 8+) by electron paramagnetic resonance spectroscopy, one (7+) by superconducting quantum interference device magnetometry, and one (8+) by nuclear magnetic resonance spectroscopy.

Barnes, J.C.; Fahrenbach, Albert C.; Cao, Dennis; Dyar, Scott M.; Frasconi, M.; Giesener, M. A.; Benítez, D.; Tkatchouk, E.; Li, H.; Stern, Charlotte L.; Sarjeant, Amy A.; Hartlieb, K.J.; Liu, Z.; Carmieli, Raanan; Botros, Y.Y.; Wasielewski, M. R.; Goddard III, W.A.; Stoddart, J. Fraser

2013-01-01T23:59:59.000Z

419

Generator configuration for solid oxide fuel cells  

DOE Patents (OSTI)

Disclosed are improvements in a solid oxide fuel cell generator 1 having a multiplicity of electrically connected solid oxide fuel cells 2, where a fuel gas is passed over one side of said cells and an oxygen-containing gas is passed over the other side of said cells resulting in the generation of heat and electricity. The improvements comprise arranging the cells in the configuration of a circle, a spiral, or folded rows within a cylindrical generator, and modifying the flow rate, oxygen concentration, and/or temperature of the oxygen-containing gases that flow to those cells that are at the periphery of the generator relative to those cells that are at the center of the generator. In these ways, a more uniform temperature is obtained throughout the generator.

Reichner, Philip (Plum Boro, PA)

1989-01-01T23:59:59.000Z

420

1-Safe Algorithms for Symmetric Site Configurations  

E-Print Network (OSTI)

In order to provide database availability in the presence of node and site failures, traditional 1-safe algorithms disallow primary and hot standby replicas to be located at the same site. This means that the failure of a single primary node must be handled like a failure of the entire primary site. Furthermore, this excludes symmetric site configurations, where the primary replicas are located at the site closest to the accessing clients. In this paper, we present three novel 1-safe algorithms that allow the above restrictions to be removed. The relative performance of these and the traditional algorithms are evaluated by means of simulation studies. Our main conclusion is that the restrictions of the traditional algorithms can be removed without significantly increasing the processing overhead, during normal operation. From an evaluation based on performance, availability, and transaction durability, the novel dependency tracking algorithm provides the best overall solution. 1 Intro...

Rune Humborstad; Maitrayi Sabaratnam; Svein-olaf Hvasshovd; Ystein Torbjrnsen

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Rapid Modeling of Power Electronics Thermal Management Technologies: Preprint  

DOE Green Energy (OSTI)

Describes a method of rapidly evaluating trade-offs associated with alternative packaging configurations and thermal management technologies for power electronics packaging.

Bennion, K.; Kelly, K.

2009-08-01T23:59:59.000Z

422

On the classification and management of Virtual Organisation Breeding Environments  

Science Conference Proceedings (OSTI)

Wide variety of domains and applications have identified the need for collaboration among heterogeneous, autonomous and geographically disperse organisations. Virtual Organisations (VOs) represent a main form of network for goal-oriented ... Keywords: VBE challenges, VBE competency management, VBE management, VBE trust management, breeding environments, collaboration, collaborative networks, information management, information technology, technology management, virtual organisations

Hamideh Afsarmanesh; Luis M. Camarinha-Matos

2009-04-01T23:59:59.000Z

423

Guidelines for System Security and Information System Management  

Science Conference Proceedings (OSTI)

This document provides a concise set of guidelines and best practices for performing risk assessment, security management, and system management within utility automation networks.

2008-06-09T23:59:59.000Z

424

Spatial Networks  

E-Print Network (OSTI)

Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. Transportation and mobility networks, Internet, mobile phone networks, power grids, social and contact networks, neural networks, are all examples where space is relevant and where topology alone does not contain all the information. Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields ranging from urbanism to epidemiology. An important consequence of space on networks is that there is a cost associated to the length of edges which in turn has dramatic effects on the topological structure of these networks. We will expose thoroughly the current state of our understanding of how the spatial constraints affect the structure and properties of these networks. We will review the most recent empirical observations and the most important models of spatial networks. We will also discuss various processes which take place on these spa...

Barthelemy, Marc

2010-01-01T23:59:59.000Z

425

A survey of trust in social networks  

Science Conference Proceedings (OSTI)

Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great ... Keywords: Trust management, social networks, social trust, trust models

Wanita Sherchan, Surya Nepal, Cecile Paris

2013-08-01T23:59:59.000Z

426

Active time scheduling for rechargeable sensor networks  

Science Conference Proceedings (OSTI)

Recent progress in energy harvesting technologies made it possible to build sensor networks with rechargeable nodes which target an indefinitely long operation. In these networks, the goal of energy management is to allocate the available energy such ... Keywords: Energy harvesting, Rechargeable, Sensor network

Volodymyr Pryyma; Damla Turgut; Ladislau Bölöni

2010-03-01T23:59:59.000Z

427

Matching network for RF plasma source  

DOE Patents (OSTI)

A compact matching network couples an RF power supply to an RF antenna in a plasma generator. The simple and compact impedance matching network matches the plasma load to the impedance of a coaxial transmission line and the output impedance of an RF amplifier at radio frequencies. The matching network is formed of a resonantly tuned circuit formed of a variable capacitor and an inductor in a series resonance configuration, and a ferrite core transformer coupled to the resonantly tuned circuit. This matching network is compact enough to fit in existing compact focused ion beam systems.

Pickard, Daniel S. (Palo Alto, CA); Leung, Ka-Ngo (Hercules, CA)

2007-11-20T23:59:59.000Z

428

Bulk Data Movement for Climate Dataset: Efficient Data Transfer Management with Dynamic Transfer Adjustment  

Science Conference Proceedings (OSTI)

Many scientific applications and experiments, such as high energy and nuclear physics, astrophysics, climate observation and modeling, combustion, nano-scale material sciences, and computational biology, generate extreme volumes of data with a large number of files. These data sources are distributed among national and international data repositories, and are shared by large numbers of geographically distributed scientists. A large portion of data is frequently accessed, and a large volume of data is moved from one place to another for analysis and storage. One challenging issue in such efforts is the limited network capacity for moving large datasets to explore and manage. The Bulk Data Mover (BDM), a data transfer management tool in the Earth System Grid (ESG) community, has been managing the massive dataset transfers efficiently with the pre-configured transfer properties in the environment where the network bandwidth is limited. Dynamic transfer adjustment was studied to enhance the BDM to handle significant end-to-end performance changes in the dynamic network environment as well as to control the data transfers for the desired transfer performance. We describe the results from the BDM transfer management for the climate datasets. We also describe the transfer estimation model and results from the dynamic transfer adjustment.

Sim, Alexander; Balman, Mehmet; Williams, Dean; Shoshani, Arie; Natarajan, Vijaya

2010-07-16T23:59:59.000Z

429

ESNET (Energy Sciences Network)  

Science Conference Proceedings (OSTI)

This document describes the Energy Sciences Network (ESNET) project which was undertaken by the Scientific Computing Staff during fiscal year (FY) 1986 at the direction of the Director, Office of Energy Research (ER). This document serves as the program plan for the ESNET project and is the result of the effort of the cross program Energy Sciences Network Steering Committee. The ESNET Steering Committee has been charged to codify the overall ER computer network requirements, to document and set priorities for computer networking requirements including performance objectives. Further, this committee has been asked to identify future ESNET functional characteristics, to identify research and development needs for the ESNET, to establish ESNET performance objectives and to define the intrastructure necessary to manage and operate the ESNET facilities.

Not Available

1987-06-01T23:59:59.000Z

430

96 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 12, NO. 1, JANUARY 2004 Managing Power Consumption in Networks on Chips  

E-Print Network (OSTI)

low-power state transitions. Any changes of network wakeup and sleep request arrival rates are tracked, and chooses when to transition the core into one of the available low-power states when the core is idle by transitioning to a low-power state. Our measurements indicate that the distribution of workload idle times has

431

Analysis of 2002 and 2003 Warm-Season Precipitation from the North American Monsoon Experiment Event Rain Gauge Network  

Science Conference Proceedings (OSTI)

Analyses of rainfall characteristics and their linkage to physiographic features are made from the North American monsoon experiment (NAME) Event Rain Gauge Network (NERN) in northwest Mexico. The findings are based on the network configuration ...

David J. Gochis; Alejandro Jimenez; Christopher J. Watts; Jaime Garatuza-Payan; W. James Shuttleworth

2004-12-01T23:59:59.000Z

432

Friends Troubleshooting Network: Towards  

E-Print Network (OSTI)

Content sharing is a popular usage of peerto -peer systems for its inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-to-peer systems to tackle a new problem: automatic misconfiguration troubleshooting. In this setting, machine configurations from the peers are "shared" to diagnose the misconfigurations on a sick machine. A key challenge for such a troubleshooting system is privacy preservation. To this end, we construct Friends Troubleshooting Network (FTN), a peer-to-peer overlay network, where the links between peer machines reflect the friendship of their owners. To preserve privacy, we use historyless and futureless random-walk in the FTN, during which search along with parameter aggregation are carried out for the purpose of troubleshooting. Many of our techniques can be applied to other application scenarios that require privacy-preserving distributed computing and information aggregation. We have also identified a number of open challenges that remain to be addressed.

Privacy-Preserving Automatic Troubleshooting; Helen J. Wang; Yih-chun Hu; Chun Yuan; Zheng Zhang; Yi-min Wang; U. C. Berkeley

2004-01-01T23:59:59.000Z

433

Configuration Studies and Recommendations for the ILC DampingRings  

Science Conference Proceedings (OSTI)

We describe the results of studies comparing different options for the baseline configuration of the ILC damping rings. The principal configuration decisions apply to the circumference, beam energy, lattice type, and technology options for key components, including the injection/extraction kickers and the damping wigglers. To arrive at our recommended configuration, we performed detailed studies of a range of lattices representing a variety of different configuration options; these lattices are described in Chapter 2. The results of the various studies are reported in chapters covering issues of beam dynamics, technical subsystems, costs, and commissioning, reliability and upgrade ability. Our detailed recommendations for the baseline configuration are given in Chapter 7, where we also outline further research and development that is needed before a machine using our recommended configuration can be built and operated successfully. In the same chapter, we suggest possible alternatives to the baseline configuration.

Wolski, Andrzej; Gao, Jie; Guiducci, Susanna

2006-02-04T23:59:59.000Z

434

Computer Networking Group | Stanford Synchrotron Radiation Lightsource  

NLE Websites -- All DOE Office Websites (Extended Search)

Networking Group Networking Group Do you need help? For assistance please submit a CNG Help Request ticket. CNG Logo Chris Ramirez SSRL Computer and Networking Group Manager (650) 926-2901 | email Jerry Camuso SSRL Computer and Networking (650) 926-2994 | email Networking Support The Networking group provides connectivity and communications services for SSRL. The services provided by the Networking Support Group include: Local Area Network support for cable and wireless connectivity. Installation and maintenance of network printers and queues. Telephony installations and support. Printing Support The Networking group provides printer maintenance and support for SSRL Beamline Printers and plotters. The following models are supported: HP - Designjet large format plotters HP - Color and B/W Laserjet, Inkjet, Deskjet, Officejet

435

Process Synthesis and Optimization of Biorefinery Configurations  

E-Print Network (OSTI)

The objective of this research was to develop novel and applicable methodologies to solve systematically problems along a roadmap of constructing a globally optimum biorefinery design. The roadmap consists of the following problems: (1) synthesis of conceptual biorefinery pathways from given feedstocks and products, (2) screening of the synthesized pathways to identify the most economic pathways, (3) development of a flexible biorefinery configuration, and (4) techno-economic analysis of a detailed biorefinery design. In the synthesis problem, a systems-based "forward-backward" approach was developed. It involves forward synthesis of biomass to possible intermediates and reverse synthesis starting with desired products and identifying necessary species and pathways leading to them. Then, two activities are performed to generate complete biorefinery pathways: matching (if one of the species synthesized in the forward step is also generated by the reverse step) or interception (a task is determined to take a forward-generated species with a reverse-generated species by identifying a known process or by using reaction pathway synthesis to link to two species.) In the screening problem, the Bellman's Principle of Optimality was applied to decompose the optimization problem into sub-problems in which an optimal policy of available technologies was determined for every conversion step. Subsequently, either a linear programming formulation or dynamic programming algorithm was used to determine the optimal pathways. In the configuration design problem, a new class of design problems with flexibility was proposed to build the most profitable plants that operate only when economic efficiency is favored. A new formulation approach with proposed constraints called disjunctive operation mode was also developed to solve the design problems. In the techno-economic analysis for a detailed design of biorefinery, the process producing hydrocarbon fuels from lignocellulose via the carboxylate platform was studied. This analysis employed many state-of-the-art chemical engineering fundamentals and used extensive sources of published data and advanced computing resources to yield reliable conclusions to the analysis. Case studies of alcohol-producing pathways from lignocellulosic biomass were discussed to demonstrate the merits of the proposed approaches in the former three problems. The process was extended to produce hydrocarbon fuels in the last problem.

Pham, Viet

2011-08-01T23:59:59.000Z

436

Global Facility Network Design with Transshipment and Responsive Pricing  

Science Conference Proceedings (OSTI)

This paper considers the facility network design problem for a global firm that sells to two markets: the domestic market and a foreign market. Although the firm has to invest in capital-intensive production facilities and produce outputs in the face ... Keywords: global facility network, global operations management, newsvendor network, operations strategy, responsive pricing, supply chain management, transshipment

Lingxiu Dong; Panos Kouvelis; Ping Su

2010-04-01T23:59:59.000Z

437

A Moving Target Environment for Computer Configurations Using Genetic Algorithms  

Science Conference Proceedings (OSTI)

Moving Target (MT) environments for computer systems provide security through diversity by changing various system properties that are explicitly defined in the computer configuration. Temporal diversity can be achieved by making periodic configuration changes; however in an infrastructure of multiple similarly purposed computers diversity must also be spatial, ensuring multiple computers do not simultaneously share the same configuration and potential vulnerabilities. Given the number of possible changes and their potential interdependencies discovering computer configurations that are secure, functional, and diverse is challenging. This paper describes how a Genetic Algorithm (GA) can be employed to find temporally and spatially diverse secure computer configurations. In the proposed approach a computer configuration is modeled as a chromosome, where an individual configuration setting is a trait or allele. The GA operates by combining multiple chromosomes (configurations) which are tested for feasibility and ranked based on performance which will be measured as resistance to attack. The result of successive iterations of the GA are secure configurations that are diverse due to the crossover and mutation processes. Simulations results will demonstrate this approach can provide at MT environment for a large infrastructure of similarly purposed computers by discovering temporally and spatially diverse secure configurations.

Crouse, Michael; Fulp, Errin W.

2011-10-31T23:59:59.000Z

438

Bayesian Networks  

E-Print Network (OSTI)

season. do X X X X Thus, Bayesian networks are particularly1990 G.F. Cooper and E. Herskovits. A Bayesian method forcon- structing Bayesian belief networks from databases.

Judea Pearl

2011-01-01T23:59:59.000Z

439

Downhole drilling network using burst modulation techniques  

DOE Patents (OSTI)

A downhole drilling system is disclosed in one aspect of the present invention as including a drill string and a transmission line integrated into the drill string. Multiple network nodes are installed at selected intervals along the drill string and are adapted to communicate with one another through the transmission line. In order to efficiently allocate the available bandwidth, the network nodes are configured to use any of numerous burst modulation techniques to transmit data.

Hall; David R. (Provo, UT), Fox; Joe (Spanish Fork, UT)

2007-04-03T23:59:59.000Z

440

802.16 mesh networking  

E-Print Network (OSTI)

We present an overview of the 802.16 mesh protocol with a specific focus on the networking aspects of the protocol. We first review the 802.16 mesh Time Division Multiple Access (TDMA) technology, including state of the art research on scheduling algorithms required by the technology. We then propose an addressing assignment for the 802.16 mesh networks that allows the network layer to take advantage of Qualityof-Service (QoS) provided by the 802.16 mesh protocol. Our addressing scheme allows network layer management of QoS at the edge of the network, thus allowing for simplicity in design of mesh routers. We also overview the security infrastructure of 802.16 mesh networks and their flaws. We propose an end-to-end security scheme that simplifies the design of 802.16 mesh routers. 1

Petar Djukic; Shahrokh Valaee

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Groupware architecture for R&D managers  

Science Conference Proceedings (OSTI)

The business environment is changing at an accelerated pace. Contemporary business systems are becoming more knowledge intensive. Consequently, progressive organisations are collaborating with others in order to develop the linkages they require to access ... Keywords: D, D management, Ireland, R&, case study analysis, collaboration, communication, cooperation, groupware architecture, innovation management, networked R&, networks, product innovation, product portfolio management, research and development, virtual organisations, web-enabled networks

Kathryn Cormican; David O'Sullivan

2004-11-01T23:59:59.000Z

442

Plug-In Hybrid Electric Vehicles - PHEV Modeling - Powertrain Configuration  

NLE Websites -- All DOE Office Websites (Extended Search)

Impact of Powertrain Configuration on Fuel Efficiency To evaluate the fuel efficiency potential of plug-in hybrid electric vehicles, it is necessary to compare the advantages and drawbacks of several powertrain configurations, ranging from power split to parallel and series. PSAT offers the unique ability to simulate and compare hundreds of powertrain configurations. The goal of the effort is to define the most promising configurations depending on the particular usage. Component sizes, fuel efficiency and cost will be used to make appropriate decisions. The configurations currently being considered include, but are not limited to: Pre-transmission parallel HEV Post-transmission parallel HEV Power split HEV (including THS II and GM 2 Mode) Series The figure below shows an example comparison of three powertrain configurations (parallel, series and power split).

443

Category:Electrical Profiling Configurations | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Category Edit History Facebook icon Twitter icon » Category:Electrical Profiling Configurations Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Geothermalpower.jpg Looking for the Electrical Profiling Configurations page? For detailed information on Electrical Profiling Configurations as exploration techniques, click here. Category:Electrical Profiling Configurations Add.png Add a new Electrical Profiling Configurations Technique Pages in category "Electrical Profiling Configurations" The following 3 pages are in this category, out of 3 total. D DC Resistivity Survey (Dipole-Dipole Array) DC Resistivity Survey (Mise-Á-La-Masse)

444

Wireless Networking  

Science Conference Proceedings (OSTI)

Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous "WiFi" networks in coffee-shops and airports, to the emerging WiMAX wireless ... Keywords: Networking

Anurag Kumar; D. Manjunath; Joy Kuri

2008-03-01T23:59:59.000Z

445

Open transport switch: a software defined networking architecture for transport networks  

Science Conference Proceedings (OSTI)

There have been a lot of proposals to unify the control and management of packet and circuit networks but none have been deployed widely. In this paper, we propose a simple programmable architecture that abstracts a core transport node into a programmable ... Keywords: optical networks, otn, sdn, transport networks, virtualization

Abhinava Sadasivarao, Sharfuddin Syed, Ping Pan, Chris Liou, Andrew Lake, Chin Guok, Inder Monga

2013-08-01T23:59:59.000Z

446

Flexible management of smart homes  

Science Conference Proceedings (OSTI)

An approach is presented for flexible management of smart homes, covering both home automation and telecare. The aim is to allow end users to manage their homes without requiring detailed technical knowledge or programming ability. This is achieved at ... Keywords: Component framework, goal refinement, home automation, open services gateway initiative, policy-based management, sensor network, telecare

Kenneth J. Turner

2011-04-01T23:59:59.000Z

447

Battery Choices for Different Plug-in HEV Configurations (Presentation)  

DOE Green Energy (OSTI)

Presents battery choices for different plug-in hybrid electric vehicle (HEV) configurations to reduce cost and to improve performance and life.

Pesaran, A.

2006-07-12T23:59:59.000Z

448

Comprehensive Greenhouse Gas Management at PPPL  

NLE Websites -- All DOE Office Websites (Extended Search)

Comprehensive Greenhouse Gas Management at PPPL Sustainability Assistance Network Conference Call December 20, 2012 Robert Sheneman, PG Deputy Head Environment, Safety, Health &...

449

Building Technologies Office: Automated Home Energy Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Area Network Trends SmartGridCity(tm) Integration with Home Controls Automated HomeEnergy Management Automated Monitoring, Control, Diagnostics, Optimization and Soft Repair...

450

Electronic Records Management Software Applications Design Criteria...  

NLE Websites -- All DOE Office Websites (Extended Search)

Management 2007-08, DOE-STD-4001-2000 Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010) Audit Report: IG-0829...

451

Intrusion detection of sinkhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by ...

Ioannis Krontiris; Tassos Dimitriou; Thanassis Giannetsos; Marios Mpasoukos

2007-07-01T23:59:59.000Z

452

Risk Management Tool Attributes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- Tools & SMEs - Tools & SMEs Outline for Breakout Session TOOLS 1. Types of Tools a. Risk Management - Database & Reports, risk register, risk forms, risk tracking & monitoring, basis of estimate, action item tracking, historical record of risks & changes, configuration control, enterprise-wide, metrics, risk performance index, risk checklist, graphical display, management reporting (various levels), risk communications b. Risk Analysis i. Cost, ii. budgets, funding, cash-flow analysis, iii. Schedule iv. tailoring categories v. Integrated Cost & Schedule vi. Project phase analysis; organization ownership & joint planning c. Risk Knowledge and Lessons Learned Database i. Enterprise-wide ii. Job/owner-specific iii. Workshops - project specific, risk management,

453

Energy-efficient connected-coverage in wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper addresses the target coverage problem inWireless Sensor Networks (WSNs). Communication and sensing consume energy, therefore, efficient power management can extend network lifetime. In this paper, we consider a large number of sensors ...

Ionut Cardei; Mihaela Cardei

2008-05-01T23:59:59.000Z

454

Modeling train movements through complex rail networks  

Science Conference Proceedings (OSTI)

Trains operating in densely populated metropolitan areas typically encounter complex trackage configurations. To make optimal use of the available rail capacity, some portions of the rail network may consist of single-track lines while other locations ... Keywords: Trains, deadlock, dispatching, modeling

Quan Lu; Maged Dessouky; Robert C. Leachman

2004-01-01T23:59:59.000Z

455

Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor  

NLE Websites -- All DOE Office Websites (Extended Search)

Wireless Sensor Networks for Data Centers to someone by E-mail Wireless Sensor Networks for Data Centers to someone by E-mail Share Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Facebook Tweet about Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Twitter Bookmark Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Google Bookmark Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Delicious Rank Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Digg Find More places to share Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on

456

Flexible network wireless transceiver and flexible network telemetry transceiver  

DOE Patents (OSTI)

A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

Brown, Kenneth D. (Grain Valley, MO)

2008-08-05T23:59:59.000Z

457

An effective customization procedure with configurable standard models  

Science Conference Proceedings (OSTI)

In electronic catalogs, commodities such as computers and electronic equipment are specified as standard models although a variety of possible alternative specifications can exist as a combination of selected options; therefore, customized configurations ... Keywords: Case-based reasoning, Comparison shopping, Configuration, Constraint satisfaction problem, Customization

Hyun Jung Lee; Jae Kyu Lee

2005-11-01T23:59:59.000Z

458

A Recurrent Rotor-Router Configuration in Z^3  

E-Print Network (OSTI)

Rotor Router models were first introduced by James Propp in 2002. A recurrent Rotor configuration is the one in which every state is visited infinitely often. In this project we investigated whether there is a recurrent Rotor configuration in Z^d (d>2).

A, Tulasi Ram Reddy

2010-01-01T23:59:59.000Z

459

Application for testing control configurations of binary distillation columns  

Science Conference Proceedings (OSTI)

The paper addresses the problem of testing various control configurations for binary distillation columns. Analyzing from plantwide control point of view the place of distillation column within the plant, the result will be the best control configuration. ... Keywords: composition control, distillation columns, dynamic simulations, plantwide control

Sanda Mihalache; Marian Popescu

2007-08-01T23:59:59.000Z

460

Automated Configuration of Algorithms for Solving Hard Computational Problems  

E-Print Network (OSTI)

Automated Configuration of Algorithms for Solving Hard Computational Problems by Frank Hutter Dipl-performing algorithms for many hard problems are highly parameterized. Selecting the best heuristics and tuning studies the automation of this important part of algorithm design: the configuration of discrete algorithm

Hutter, Frank

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Urban Network Practices  

Science Conference Proceedings (OSTI)

This report describes the findings of an underground distribution practices immersion conducted by the Electric Power Research Institute (EPRI) with Duke Energy Ohio. This immersion was conducted as part of a multiyear effort by EPRI to identify noteworthy practices in managing urban network systems. More specifically, this report profiles the practices (people, processes, and technology) in place at Duke Energy Ohio, a company serving the Cincinnati, Ohio, metropolitan area. In addition, this report hig...

2011-03-31T23:59:59.000Z

462

Urban Network System Practices  

Science Conference Proceedings (OSTI)

This report describes the results of Phase I of a multi-year effort to identify noteworthy practices in managing urban network systems. The report profiles the practices (people, processes, and technology) in place at two host utilities: Seattle City Light (SCL), a small (375,000 customers) municipal utility, and Consolidated Edison (Con Edison), a large (3.2 million customers) investor-owned utility. The results illustrate the similarities and differences between the two utilities, describe the challeng...

2008-07-23T23:59:59.000Z

463

Urban Network Systems Practices  

Science Conference Proceedings (OSTI)

This report describes the findings of an underground distribution practices immersion conducted by the Electric Power Research Institute (EPRI) with CenterPoint Energy (CenterPoint). This immersion was conducted as part of a multiyear effort by EPRI to identify noteworthy practices in managing urban network systems. The report profiles the practices (that is, people, processes, and technology) in place at CenterPoint, a company serving the Houston, Texas, metropolitan area. This report is one of a serie...

2010-12-02T23:59:59.000Z

464

Analysis of a variable speed vapor compression system using artificial neural networks  

Science Conference Proceedings (OSTI)

An artificial neural network (ANN) is a mathematical model that is inspired by the operation of biological neural networks. However, this is typically considered a computational model. An ANN can easily adapt to multiple situations and extract information ... Keywords: Artificial neural network, Energetic performance, Hidden neurons, Mapping configuration, Simulated annealing, Vapor compression system

J. M. Belman-Flores; S. E. Ledesma; M. G. Garcia; J. Ruiz; J. L. RodríGuez-MuñOz

2013-09-01T23:59:59.000Z

465

ARM: Surface Radiation Measurement Quality Control testing, including climatologically configurable limits  

DOE Data Explorer (OSTI)

Surface Radiation Measurement Quality Control testing, including climatologically configurable limits

Gary Hodges; Tom Stoffel; Mark Kutchenreiter; Bev Kay; Aron Habte; Michael Ritsche; Victor Morris; Mary Anderberg

466

On fitting planetary systems in counter-revolving configurations  

E-Print Network (OSTI)

In Gayon & Bois (2008) and Gayon etal (2009), (i) we studied the theoretical feasibility and efficiency of retrograde mean motion resonances (i.e. two planets are both in orbital resonance and in counter-revolving configuration), (ii) we showed that retrograde resonances can generate interesting mechanisms of stability, and (iii) we obtained a dynamical fit involving a counter-revolving configuration that is consistent with the observations of the HD73526 planetary system. In the present paper, we present and analyze data reductions assuming counter-revolving configurations for eight compact multi-planetary systems detected through the radial velocity method. In each case, we select the best fit leading to a dynamically stable solution. The resulting data reductions obtained in rms and chi values for counter-revolving configurations are of the same order, and sometimes slightly better, than for prograde configurations. In the end, these fits tend to show that, over the eight studied multi-planetary system...

Gayon-Markt, Julie

2009-01-01T23:59:59.000Z

467

Multiple crossbar network: A switched high-speed local network  

SciTech Connect

The Multiple Crossbar Network (MCN) is a prototype High-Speed Local Network at the Los Alamos National Laboratory. It will interconnect supercomputers, network servers and workstations from various commercial vendors. The MCN can also serve as a backbone for message traffic between local area networks. The MCN is a switched local network of switching nodes called Cross-Point Stars (CPs). Hosts and CPs are connected by 800-Mbit/s (100-Mbyte/s) point-to-point ANSI High-Speed Channels. CPs include RISC-based network protocol processors called Crossbar Interfaces and a switching core called the Crossbar Switch. Protocols include physical, data link, intranet, and network access functionality. Various internet and transport protocols are intended to run above the MCN protocol suite. A network management and simple naming service is also included within the Los Alamos Network Architecture. Immediate applications include visualization. The MCN is intended to also serve as a framework for multicomputer applications. 36 refs., 10 figs.

Hoebelheinrich, R.; Thomsen, R.

1989-01-01T23:59:59.000Z

468

Urban Network Practices: Ameren Missouri  

Science Conference Proceedings (OSTI)

This report describes the findings of an underground distribution practices immersion conducted by the Electric Power Research Institute (EPRI) with Ameren Missouri. This immersion was conducted as part of a multiyear effort by EPRI to identify noteworthy practices in managing urban network systems. More specifically, this report profiles the practices (people, processes, and technology) in place at Ameren Missouri, a St. Louis, Missouri, based utility serving customers through secondary network ...

2012-08-20T23:59:59.000Z

469

DOE Sustainability Assistance Network (SAN) Notes Thursday, February...  

NLE Websites -- All DOE Office Websites (Extended Search)

Page 1 of 2 DOE Sustainability Assistance Network (SAN) Notes Thursday, February 21, 2013 1. Oak Ridge National Laboratory Water Resource Management Dan OConnor, ORNL Implementing...

470

Using Neural Networks in the Maintenance and Operations REcommender...  

NLE Websites -- All DOE Office Websites (Extended Search)

using Neural Networks. By integrating the information from Computerized Maintenance Management Systems (CMMS) and Energy Managementand Control System(EMCS), MORE can analyze and...

471

The use of mobile agents for clustering in mobile ad hoc networks  

Science Conference Proceedings (OSTI)

A mobile ad hoc network is a dynamic mobile wireless network that can be formed without the need for any pre-existing wired or wireless infrastructure. One of the main challenges in an ad hoc network is the design of robust routing algorithms that adapt ... Keywords: ad hoc networks, algorithms, clustering, design, management, mobile agents, routing, wireless networks

Mieso K. Denko

2003-09-01T23:59:59.000Z

472

SUTIL - Network selection based on utility function and integer linear programming  

Science Conference Proceedings (OSTI)

This work presents SUTIL, a mechanism for network selection in the context of next generation networks (NGN). SUTIL selection mechanism prioritizes networks with higher relevance to the application and lower energy consumption and it enables full and ... Keywords: Integer linear programming, Mobility management, Network selection, Seamless connectivity, Utility function, Wireless networks

Luci Pirmez; Jaime C. Carvalho, Jr.; Flávia C. Delicato; Fábio Protti; Luiz F. R. C. Carmo; Paulo F. Pires; Marcos Pirmez

2010-09-01T23:59:59.000Z

473

Chronic disease management: a business intelligence perspective  

Science Conference Proceedings (OSTI)

Chronic disease management is one of the main areas in healthcare that Health Knowledge Management (HKM) can provide beneficial outcomes. Information Communication Technology (ICT) enabled Chronic disease management network (cdmNet) delivers comprehensive ... Keywords: business intelligence, chronic disease management, data mining

Leelani Kumari Wickramasinghe, Damminda Alahakoon, Michael Georgeff, Peter Schattner, Daswin De Silva, Oshadi Alahakoon, Akuh Adaji, Kay Jones, Am Leon Piterman

2011-01-01T23:59:59.000Z

474

A new stepwise project management method  

Science Conference Proceedings (OSTI)

A Stepwise Project Management Method (SPMM) is developed to resolve the Project Management (PM) issues. The template of a new stepwise PM method is derived from a Project Management, Inc. (PMI) 19-Step PM method. The 19 Steps ... Keywords: acceptance test procedure, predecessor networks, resource analysis method, results tracking, statement of work, stepwise project management, task assignment, very small aperture terminal, work breakdown structure

Keh-Ming Lu

2006-06-01T23:59:59.000Z

475

Network Hopes  

Science Conference Proceedings (OSTI)

In this work, the authors examine four cases of municipalities that have attempted to create municipal-sponsored wireless broadband networks. In each of these cases, one of the reasons given for establishing the network was to engage the citizens in ... Keywords: civic engagement, municipalities, social capital, wireless broadband Internet

Andrea H. Tapia; Julio Angel Ortiz

2010-02-01T23:59:59.000Z

476

Network Simulation  

SciTech Connect

A detailed introduction to the design, implementation and use of network simulation tools is presented. The requirements and issues faced in the design of simulators for wired and wireless networks are discussed. Abstractions such as packet- and fluid-level network models are covered. Several existing simulations are given as examples, with details and rationales regarding design decisions presented. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the scale and performance of a simulation environment. Finally, a case study of two simulation tools is presented that have been developed using distributed simulation techniques. This text is essential to any student, researcher or network architect desiring a detailed understanding of how network simulation tools are designed, implemented, and used.

Fujimoto, Richard [ORNL; Perumalla, Kalyan S [ORNL; Riley, George F. [Georgia Institute of Technology

2006-01-01T23:59:59.000Z

477

Delegating Network Security with More Information  

E-Print Network (OSTI)

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

478

Security Event and Log Management Service  

E-Print Network (OSTI)

Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management IBM Global Technology Services December 2007 #12;Executive Summary The economics of network security have changed. The high cost and complexity inherent in the use

479

Special test configurations and $K$-stability of Fano varieties  

E-Print Network (OSTI)

Let $X$ be a Fano manifold. For any given test configuration $(\\mX, \\mL)$ of $(X, -rK_X)$, we modify it by first taking the log canonical modification and then using the minimal model program (MMP) with scaling. We show that the Donaldson-Futaki invariant is always non-increasing along the process. If $\\rho(X)=1$, then the end product is a test configuration with the central fibre being an irreducible normal $\\mathbb{Q}$-Fano variety. This implies that, when $X$ is Fano with $\\rho(X)=1$, to test $K$-(semi)stability, we only need to test on the special test configurations. We also show by a counter-example that the `right' definition of $K$-(poly)stability should only involve normal test configurations.

Li, Chi

2011-01-01T23:59:59.000Z

480

High temperature solid electrolyte fuel cell configurations and interconnections  

DOE Patents (OSTI)

High temperature fuel cell configurations and interconnections are made including annular cells having a solid electrolyte sandwiched between thin film electrodes. The cells are electrically interconnected along an elongated axial outer surface.

Isenberg, Arnold O. (Forest Hills, PA)

1984-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network configuration manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Configuring Client PCs for use with Project Assessment and Reporting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to it, you may follow these directions yourself. 1.2 Installation of ActiveX Control WINDOWS XP 1. Log onto the workstation to be configured using an IDPassword that can perform...

482

The simol modeling language for simulation and (re-)configuration  

Science Conference Proceedings (OSTI)

From automotive and up to telecommunication industry, configuration and simulation are used for solving complex problems connected to the ever growing number of components, which have to work together. To assist these needs, many tools are nowadays available. ...

Iulia Nica; Franz Wotawa

2012-01-01T23:59:59.000Z

483

Constrained Density-Functional Theory--Configuration Interaction  

E-Print Network (OSTI)

In this thesis, I implemented a method for performing electronic structure calculations, "Constrained Density Functional Theory-- Configuration Interaction" (CDFT-CI), which builds upon the computational strengths of Density ...

Kaduk, Benjamin James

2012-01-01T23:59:59.000Z

484

A Highly Configurable Vortex Initialization Method for Tropical Cyclones  

Science Conference Proceedings (OSTI)

A highly configurable vortex initialization methodology has been constructed in order to permit manipulation of the initial vortex structure in numerical models of tropical cyclones. By using distinct specifications of the flow in the boundary ...

Eric D. Rappin; David S. Nolan; Sharanya J. Majumdar

2013-10-01T23:59:59.000Z

485

A Highly Configurable Vortex Initialization Method for Tropical Cyclones  

Science Conference Proceedings (OSTI)

A highly configurable vortex initialization methodology has been constructed in order to permit manipulation of the initial vortex structure in numerical models of tropical cyclones. By using distinct specifications of the flow in the boundary ...

Eric D. Rappin; David S. Nolan; Sharanya J. Majumdar

486

Towards Autonomic Communication Mechanisms for Service Composability Management  

Science Conference Proceedings (OSTI)

The Autonomic Communication Forum dedicates itself to leverage innovative mechanisms in order to provide new levels of integrated autonomicity to a future self-managed networks and network elements. Current trends in networking technologies are applying ... Keywords: Autonomic Communication, Service Composability Management

Thomas Magedanz; José A. Lozano; Florian Schreiner; Fabricio Gouveia; Juan M. González

2008-03-01T23:59:59.000Z

487

A DYNAMICALLY CONFIGURABLE ENVIRONMENT FOR HIGH Performance Computing  

E-Print Network (OSTI)

Current tools available for high performance computing require that all the computing nodes used in a parallel execution be known in advance: the execution environment must know where the different "chunks" of programs will be executed, and each computer involved in the execution must be properly configured. In this paper, we describe how the ) environment may be used to dynamically locate available computers to perform such computations and how these computers are dynamically configured.

Nabil Abdennadher; Gilbert Babin; Peter Kropf; Gilbert Babin Ý; Peter Kropf Þ; Pierre Kuonen

2000-01-01T23:59:59.000Z

488

The Quantum Configuration Space of Loop Quantum Cosmology  

E-Print Network (OSTI)

The article gives an account of several aspects of the space known as the Bohr compactification of the line, featuring as the quantum configuration space in loop quantum cosmology, as well as of the corresponding configuration space realization of the so-called polymer representation. Analogies with loop quantum gravity are explored, providing an introduction to (part of) the mathematical structure of loop quantum gravity, in a technically simpler context.

J. M. Velhinho

2007-04-18T23:59:59.000Z

489

Network-aware data movement advisor  

Science Conference Proceedings (OSTI)

Next-generation eScience applications often generate large amounts of simulation or experimental data that must be shared and managed by collaborative organizations. Advanced networking technologies and services have been rapidly developed and deployed ... Keywords: data transfer, high-performance network

Patrick Brown; Mengxia Zhu; Qishi Wu; Xukang Lu

2011-11-01T23:59:59.000Z

490

Solar Buildings Research Network A brief overview  

E-Print Network (OSTI)

Solar Buildings Research Network A brief overview Andreas Athienitis, Scientific Director Meli Stylianou, Network Manager #12;VISION Development of the solar-optimized building as an integrated advanced not mean complex; it brings together "low-tech" passive solar technologies that appear simple but generally

Wu, Bin

491

Fault reconnaissance agent for sensor networks  

Science Conference Proceedings (OSTI)

One of the key prerequisite for a scalable, effective and efficient sensor network is the utilization of low-cost, low-overhead and high-resilient fault-inference techniques. To this end, we propose an intelligent agent system with a problem solving ... Keywords: Management, expectation maximization algorithm, intelligent agents, wireless sensor networks

Elhadi M. Shakshuki; Xinyu Xing; Tarek R. Sheltami

2010-08-01T23:59:59.000Z

492

Wireless sensor networks and human comfort index  

Science Conference Proceedings (OSTI)

Conventional wireless home automation networks (WHANs) incorporate embedded wireless sensors and actuators that monitors and control home living environment. WHAN's primary goal is to maintain user comfort and efficient home management. Conventional ... Keywords: Ambient intelligence, Fuzzy logic, Human comfort, Wireless sensor network

Mohd Izani Rawi, Adnan Al-Anbuky

2013-06-01T23:59:59.000Z

493

An Android application for Meter Terminal Management using Bluetooth Serial Port Profile.  

E-Print Network (OSTI)

?? When maintaining and configuring systems for Automatic Meter Reading (AMR) it is important to have access to powerful tools for on-site management of the… (more)

Nelson, Henrik

2013-01-01T23:59:59.000Z

494

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Manager Database Authentication Bypass Vulnerability V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

495

Demystifying Configuration Challenges and Trade-Offs in Network-based ISP Services  

E-Print Network (OSTI)

their platforms virtualizable (e.g., through frameworks such as VRF [2, 3]) to ease creation of interesting new

Akella, Aditya

496

Network analysis of technical and organizational configurations : using an alignment approach to enhance product development performance  

E-Print Network (OSTI)

In an attempt to improve their Product Development Processes (PDPs), many companies make considerable investments to have available cutting-edge technology such as virtual tools. While some companies have increased their ...

Diaz Garcia, J. Adrian

2009-01-01T23:59:59.000Z

497

Social Networks Applied  

Science Conference Proceedings (OSTI)

Social networks have interesting properties. Building computational models of these networks can help us understand and exploit them. This issue's essays examine applications of these networks' properties. Keywords: social networks, ontology, Semantic Web, network topology, friend of a friend

Steffen Staab; Pedro Domingos; Peter Mika; Jennifer Golbeck; Li Ding; Tim Finin; Anupam Joshi; Andrzej Nowak; Robin R. Vallacher

2005-01-01T23:59:59.000Z

498

Appendix 8 - iManage Change Management Standards  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appendix 8 iManage Change Management Standards Department of Energy Deliverable ID: PM1001 Version number: 1.0 Draft/Final as of: 7/23/2012 Printed on: 27 Jul 2012 Author: Michael Preis Michael.Preis@hq.doe.gov (301)903-3812 Owner: Lajos Grof-Tisza, iManage Program Manager Status of Document Draft Delivered Accepted Program Name: Department of Energy iManage Program Project ID: iManage Configuration Management Plan Program Mgr: Lajos Grof-Tisza Doc ID: PM1001 Draft ii Document information Document source This document is maintained as an online document. Contact the author for the latest version. Revision history Version number Date Summary of changes Revised By 1.00 26 Feb 2007 Initial Version Michael Preis Approvals

499

Comparison of Ultrasonic Examination Detection Capabilities of Safe-end Joint Configuration to Other Reactor Coolant Loop Joint Configurations  

Science Conference Proceedings (OSTI)

The purpose of this document is to compare the ultrasonic examination detection capabilities of the RPV outlet nozzle-to-safe end-to-cast pipe joint configuration to other reactor coolant loop (RCL) cast stainless steel (CSS) configurations. The comparison presented is based on results obtained from the 1988 Wolf Creek and 1993 Northeast/Yankee Atomic CSS workshops. Both workshops utilized CSS specimens from the Westinghouse Owners Group (WOG) set as well as other specimens.

1998-02-03T23:59:59.000Z

500

Optimization of refinery hydrogen network  

Science Conference Proceedings (OSTI)

Tighter environmental regulations and more heavy-end upgrading in the petroleum industry lead to increased demand for hydrogen in oil refineries. In this paper, the method proposed to optimize the refinery hydrogen network is based upon mathematical ... Keywords: hydrogen management, optimization, refinery, superstructure

Yunqiang Jiao; Hongye Su

2010-09-01T23:59:59.000Z