National Library of Energy BETA

Sample records for owner local privacy

  1. Can historic neighborhoods compete? Analysis of and recommendations for local incentives for owner-occupied historic housing 

    E-Print Network [OSTI]

    Rowe, Rebecca Elizabeth

    2005-02-17

    -1 CAN HISTORIC NEIGHBORHOODS COMPETE? ANALYSIS OF AND RECOMMENDATIONS FOR LOCAL INCENTIVES FOR OWNER-OCCUPIED RESIDENTIAL STRUCTURES A Thesis by REBECCA ELIZABETH ROWE Submitted to the Office of Graduate Studies of Texas A&M University in partial... fulfillment of the requirements for the degree of MASTER OF SCIENCE December 2004 Major Subject: Architecture ii CAN HISTORIC NEIGHBORHOODS COMPETE? ANALYSIS OF AND RECOMMENDATIONS FOR LOCAL INCENTIVES FOR OWNER-OCCUPIED RESIDENTIAL STRUCTURES A Thesis...

  2. Privacy-preserving data mining 

    E-Print Network [OSTI]

    Zhang, Nan

    2009-05-15

    In the research of privacy-preserving data mining, we address issues related to extracting knowledge from large amounts of data without violating the privacy of the data owners. In this study, we first introduce an integrated baseline architecture...

  3. Lightweight and Privacy-Preserving Delegatable Proofs of Storage

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Lightweight and Privacy-Preserving Delegatable Proofs of Storage Jia Xu1 , Anjia Yang1,2 , Jianying of storage (POR or PDP) is a cryptographic tool, which enables data owner or third party auditor to audit integrity of data stored remotely in a cloud storage server, without keeping a local copy of data

  4. The Costs of Privacy in Local Energy Markets Erik Buchmann, Stephan Kessler, Patrick Jochem and Klemens Bohm

    E-Print Network [OSTI]

    Buchmann, Erik

    ] include the obligation to make the production and distribution of energy transparent. This includesThe Costs of Privacy in Local Energy Markets Erik Buchmann, Stephan Kessler, Patrick Jochem and Klemens B¨ohm Karlsruhe Institute of Technology (KIT) 76131 Karlsruhe, Germany Abstract-- Many renewable

  5. Information Privacy Statement Commitment to Privacy

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    ' privacy and actively seeks to preserve the privacy rights of those who share information with us. Your trust is important to us and we believe you have the right to know how information submitted1 Information Privacy Statement Commitment to Privacy The University of Florida values individuals

  6. Privacy Management Plan 1 Privacy Management Plan

    E-Print Network [OSTI]

    University of Technology, Sydney

    Privacy Management Plan 1 Privacy Management Plan Abstract The Privacy Management Plan outlines how Impact Assessment Tool (.docm) (staff only) Records Management Vice-Chancellor's Directive Handling Management Plan 2 Legislation Privacy and Personal Information Protection Act 1998 (NSW) (PPIPIA) Health

  7. Privacy Aware Learning John C. Duchi1

    E-Print Network [OSTI]

    Jordan, Michael I.

    of privacy the data preserves and the utility, measured by convergence rate, of any statistical estimator. 1 of Electrical Engineering and Computer Science, 2 Department of Statistics University of California, Berkeley. In this local privacy framework, we establish sharp upper and lower bounds on the convergence rates

  8. JOBAID-ORGANZIATION OWNER OVERVIEW

    Broader source: Energy.gov [DOE]

    The purpose of this job aid is to guide organization owners through the step-by-step process of available features within SuccessFactors Learning.

  9. Institutional owners and competitive rivalry 

    E-Print Network [OSTI]

    Connelly, Brian Lawrence

    2008-10-10

    stream_source_info Connelly.pdf.txt stream_content_type text/plain stream_size 200734 Content-Encoding UTF-8 stream_name Connelly.pdf.txt Content-Type text/plain; charset=UTF-8 INSTITUTIONAL OWNERS AND COMPETITIVE... Major Subject: Management INSTITUTIONAL OWNERS AND COMPETITIVE RIVALRY A Dissertation by BRIAN L. CONNELLY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree...

  10. CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records...

    Energy Savers [EERE]

    CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records Maria Levesque, Director Records & Privacy Management...

  11. Shifts in Privacy Concerns

    E-Print Network [OSTI]

    Tucker, Catherine Elizabeth

    This paper explores how digitization and the associated use of customer data have affected the evolution of consumer privacy concerns. We measure privacy concerns by reluctance to disclose income in an online marketing ...

  12. Website Privacy Notice Applicability

    E-Print Network [OSTI]

    in this privacy notice. Other units at the university may collect and use visitor information in different ways. Therefore, visitors to other university websites should review the privacy notices for the particular sites such changes will be consistent with our commitment to respecting visitor privacy, and will be clearly posted

  13. MAINE MULTIFAMILY BUILDING OWNERS TRUST IN EFFICIENCY | Department...

    Energy Savers [EERE]

    MAINE MULTIFAMILY BUILDING OWNERS TRUST IN EFFICIENCY MAINE MULTIFAMILY BUILDING OWNERS TRUST IN EFFICIENCY MAINE MULTIFAMILY BUILDING OWNERS TRUST IN EFFICIENCY Nearly 70% of...

  14. Commercial Building Tenant Energy Usage Aggregation and Privacy

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.; Wang, Na

    2014-10-31

    A growing number of building owners are benchmarking their building energy use. This requires the building owner to acquire monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer energy use data (CEUD) as a way to give building owners whole-building energy usage data while protecting customer privacy. Meter profile aggregation adds a layer of protection that decreases the risk of revealing CEUD as the number of meters aggregated increases. The report statistically characterizes the similarity between individual energy usage patterns and whole-building totals at various levels of meter aggregation.

  15. Privacy Impact Assessment

    Office of Environmental Management (EM)

    No hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Date the assessment was completed. Departmental...

  16. Privacy notice of SLS Applicability

    E-Print Network [OSTI]

    Indiana University

    will be used only as outlined in this privacy notice. Other units at the university may collect and use visitor information in different ways. Therefore, visitors to other university web sites should review the privacy with our commitment to respecting visitor privacy, and will be clearly posted in a revised privacy notice

  17. Big Data Privacy Scenarios

    E-Print Network [OSTI]

    Bruce, Elizabeth

    2015-10-01

    This paper is the first in a series on privacy in Big Data. As an outgrowth of a series of workshops on the topic, the Big Data Privacy Working Group undertook a study of a series of use scenarios to highlight the challenges ...

  18. Local Option- Clean Energy Financing

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money through their local government to pay for energy improvements. The amount borrowed is typically...

  19. Commercial and Multifamily Building Tenant Energy Usage Aggregation and Privacy

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Wang, Na

    2014-11-17

    In a number of cities and states, building owners are required to disclose and/or benchmark their building energy use. This requires the building owner to possess monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer data as a way to give building owners the whole-building energy usage data while protecting customer privacy. However, no utilities or regulators appear to have conducted a concerted statistical, cybersecurity, and privacy analysis to justify the level of aggregation selected. Therefore, the Tennant Data Aggregation Task was established to help utilities address these issues and provide recommendations as well as a theoretical justification of the aggregation threshold. This study is focused on the use case of submitting data for ENERGY STAR Portfolio Manager (ESPM), but it also looks at other potential use cases for monthly energy consumption data.

  20. PROTECTION OF PRIVACY POLICY

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 PROTECTION OF PRIVACY POLICY University Policy No: GV0235 Classification: Governance Procedures for the Management of Personal Information University Information Security Classification other mechanism that produces records. 8.00 Surveillance Systems means an analog or digital video

  1. Privacy regulation and online advertising

    E-Print Network [OSTI]

    Goldfarb, Avi

    Advertisers use online customer data to target their marketing appeals. This has heightened consumers' privacy concerns, leading governments to pass laws designed to protect consumer privacy by restricting the use of data ...

  2. Governmental-Owner Power Imbalance and Privatization 

    E-Print Network [OSTI]

    Xu, Kehan

    2011-10-21

    relationships of SOEs and their governmental owners. Four panel databases of 206 pharmaceutical firms across eight years in China were combined to answer the research question of this dissertation: What is the role of power imbalance between different...

  3. PRIVACY, CITIES AND FINANCE

    E-Print Network [OSTI]

    Columbia University

    , Government and Academia April 1, 2015 LOW MEMORIAL LIBRARY, ROTUNDA COLUMBIA UNIVERSITY #12;#Data Science Institute, we have the honor of welcoming you today to our 2015 Symposium, Privacy, Cities and Finance in the Digital Age. The Data Science Institute is led by the Engineering School and involves

  4. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  5. Computational Differential Privacy Ilya Mironov1

    E-Print Network [OSTI]

    Vadhan, Salil

    require privacy guarantees to hold only against efficient--i.e., computationally- bounded--adversaries. We

  6. Department of Energy Privacy Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    The order establishes Departmental implementation of agency statutory and regulatory requirements for privacy, specifically those provided in the Privacy Act of 1974, as amended at Title 5 United States Code (U.S.C.) 552a, Section 208 of the E Government Act of 2002, and Office of Management and Budget directives. Cancels DOE N 206.5.

  7. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  8. Noiseless Database Privacy Raghav Bhaskar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Noiseless Database Privacy Raghav Bhaskar Microsoft Research India rbhaskar@microsoft.com Abhishek as a gold standard in the field of database privacy. While this notion has the benefit of providing concrete explore is to exploit the entropy already present in the database and substitute that in the place

  9. Information System Owner | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIAL TECHNICAL ASSISTANCE Supports theInformation ResourcesOwner

  10. Information System Owner (ISO) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation StandardsEnergyDepartmentOwner (ISO) Information

  11. Protecting Privacy Against Location-based Personal Identification

    E-Print Network [OSTI]

    Wang, Xiaoyang "Sean"

    machines, ...), services that provide localized news (e.g., weather forecasts, road constructions, etc to personally identify the house's owner since the mapping of such coordinates to home addresses is generally available and a simple look up in a phone book (or similar sources) can reveal the people who live there

  12. New Energy Department Team Established to Help Local Authorities...

    Energy Savers [EERE]

    need assistance from state and local officials in restoring power or securing supplies of gasoline following Hurricane Sandy. Station owners or operators can now call the...

  13. Property:Owners | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc Jump to:Newberg,Energy LLCALLETE Inc dEA EIS ReportNumberOfUnitsOwners Jump

  14. The Privacy Coach: Supporting customer privacy in the Internet of Things

    E-Print Network [OSTI]

    Broenink, Gerben; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the two, and informing the user of the outcome. In this paper we report on the architecture of the Privacy Coach, and show how it enables users to make informed privacy decisions in a user-friendly manner. We also spend considerable time to discuss lessons learnt and to describe future plans to further improve on the Privacy Coach concept.

  15. Noise Injection for Search Privacy Protection

    E-Print Network [OSTI]

    Ye, Shaozhi; Wu, S F; Pandey, Raju; Chen, Hao

    2009-01-01

    W. Gray, “On introducing noise into the bus-contention chan-R. Pandey, and H. Chen, “Noise injection for search privacyNoise Injection for Search Privacy Protection Shaozhi Ye,

  16. Family Educational Rights and Privacy Act (FERPA)

    E-Print Network [OSTI]

    Bordenstein, Seth

    Practices · Tools and Resources FERPA Overview #12;Family Educational Rights and Privacy Act of 1974 · FERPAFamily Educational Rights and Privacy Act (FERPA) An Overview Bart Quinet University Registrar Vanderbilt University #12;· Background · Key Concepts · Annual Notification · Education Records · Public vs

  17. Why Do Building Owners Invest in Bicycle-Oriented Design?

    E-Print Network [OSTI]

    Orrick, Phyllis; Trapenberg Frick, Karen; Ragland, David R

    2011-01-01

    Building Owners Invest in Bicycle-Oriented Design? Phyllisof California, Berkeley ISSUE Bicycle infrastructure designhas largely emphasized bicycle lanes and paths, with little

  18. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  19. Davison Health Center Notice of Privacy Practices

    E-Print Network [OSTI]

    Royer, Dana

    Davison Health Center Notice of Privacy Practices This notice describes how your medical. Davison Health Center must maintain the privacy of your personal health information and give you this notice that describes our legal duties and privacy practices concerning your personal health information

  20. East Tennessee State University Web Privacy Statement

    E-Print Network [OSTI]

    Karsai, Istvan

    East Tennessee State University Web Privacy Statement A Note to Children and Parents East Tennessee through a university Web site is handled. ETSU understands the importance of protecting the privacy of personal information, especially in today's electronic environment. This privacy policy covers the Web

  1. Privacy Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPress ReleasesPrincipalPrivacy &Privacy

  2. Local Option- Property Assessed Clean Energy Financing

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money from the local government to pay for energy improvements. The amount borrowed is typically repai...

  3. EMERGENCY INFORMATION State Privacy Notification

    E-Print Network [OSTI]

    Hernes, Peter J.

    April 2005 EMERGENCY INFORMATION State Privacy Notification The State of California Information Practices Act of 1977 (effective July 1, 1978) requires the University to provide the following information to individuals who are asked to supply information about themselves. The principal purpose for requesting

  4. Privacy in Quantum Communication Complexity

    E-Print Network [OSTI]

    Iordanis Kerenidis; Mathieu Laurière; François Le Gall; Mathys Rennela

    2014-09-30

    In two-party quantum communication complexity, Alice and Bob receive some classical inputs and wish to compute some function that depends on both these inputs, while minimizing the communication. This model has found numerous applications in many areas of computer science. One question that has received a lot of attention recently is whether it is possible to perform such protocols in a private way. We show that defining privacy for quantum protocols is not so straightforward and it depends on whether we assume that the registers where Alice and Bob receive their classical inputs are in fact classical registers (and hence unentangled with the rest of the protocol) or quantum registers (and hence can be entangled with the rest of the protocol or the environment). We provide new quantum protocols for the Inner Product function and for Private Information Retrieval, and show that the privacy assuming classical input registers can be exponentially smaller than the privacy assuming quantum input registers. We also argue that the right notion of privacy of a communication protocol is the one assuming classical input registers, since otherwise the players can deviate considerably from the protocol.

  5. Personal Privacy in Ubiquitous Computing Tools and System Support

    E-Print Network [OSTI]

    Personal Privacy in Ubiquitous Computing Tools and System Support Marc Langheinrich #12;Personal Privacy in Ubiquitous Computing 2 Ubiquitous Computing und Privacy Disappearing Computer Troubadour find their own ways of cheating" Inkompatibel mit Ubiquitous Computing Forschung ,,I think you can

  6. Citizen's Attitudes About Privacy: Results Citizen's Attitudes about Privacy While Accessing Government Websites

    E-Print Network [OSTI]

    Yang, Junfeng

    Citizen's Attitudes About Privacy: Results 1 Citizen's Attitudes about Privacy While Accessing 10027 March 3, 2003 Abstract This paper reports the results of an investigation on citizens' attitudes Private Portal that protects citizen's personally identifying information when accessing government

  7. Table HC1-5a. Housing Unit Characteristics by Type of Owner...

    Gasoline and Diesel Fuel Update (EIA)

    Unit Characteristics by Type of Owner-Occupied Housing Unit, Million U.S. Households, 2001 Housing Unit Characteristics RSE Column Factor: Total Owner- Occupied Units Type of...

  8. Guide to Combined Heat and Power Systems for Boiler Owners and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Combined Heat and Power Systems for Boiler Owners and Operators Guide to Combined Heat and Power Systems for Boiler Owners and Operators This guide presents useful information for...

  9. Department of Energy Data Access and Privacy Issues Related To...

    Energy Savers [EERE]

    Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies This...

  10. Public Roundtable- Data Access and Privacy Issues Related to...

    Energy Savers [EERE]

    Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

  11. Subjects of Privacy: Law, Sexuality and Violence in India

    E-Print Network [OSTI]

    Singh, Pawan

    2014-01-01

    of California, San Diego Subjects of Privacy: Law, Sexualityan entirely private subject. The underlying suggestion hereMoreover, once the subject of privacy is constituted through

  12. Questionnaire for Owners to Evaluate Contractors' Proficiency in BIM 

    E-Print Network [OSTI]

    Chae, Lee Seok

    2015-04-17

    (ROI). Seeing the benefits from using BIM, building owners have started requesting contractors to submit the building information models integrated with necessary information, which can be used later for facilities management. As construction...

  13. Owner/Operator Perspective on Reliability Customer Needs and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SERVICES AS RELIABLE AS THE SUN OwnerOperator Perspective on Reliability Customer Needs and Field Data Sandia National Laboratories Utility-Scale Grid-Tied PV Inverter Reliability...

  14. Consumers' Cognitive, Affective, and Behavioral Responses to an Invasion of Privacy: Essays on Understanding Consumer's Privacy Concerns 

    E-Print Network [OSTI]

    Srivastava, Mona

    2009-05-15

    This dissertation focuses on the discrepancy between consumers’ attitudes towards privacy and actual behavior. Although consumers increasingly protest against invasions of privacy, they routinely disclose more information ...

  15. Privacy Challenges for Wireless Medical Devices

    SciTech Connect (OSTI)

    Lagesse, Brent J [ORNL] [ORNL

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, we examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.

  16. Information Privacy Policy & Procedure Manual Health Information Privacy Forms: 1 Copyright 2003 -2013. University of Florida. All rights reserved. Version: 09/01/2013

    E-Print Network [OSTI]

    Sin, Peter

    of person whose Information Privacy rights may have been violated (if different from above): Relationship or organization) do you believe violated information privacy rights or committed another privacy violation believe your (or someone else's) information privacy rights were violated

  17. Health and Privacy: The Experience of a Regulator 

    E-Print Network [OSTI]

    Anderson, Ken

    Paper presented by Anderson for the Privacy Workshop, chaired by Edwards and held in September 2005.

  18. Email Clients as Decentralized Social Apps in Mr. Privacy

    E-Print Network [OSTI]

    Lam, Monica

    Email Clients as Decentralized Social Apps in Mr. Privacy Michael H. Fischer T. J. Purtell Monica S,tpurtell,lam}@cs.stanford.edu Abstract. This paper proposes Mr. Privacy, a social application frame- work built on top of email, that encourages open competition and pro- vides privacy for users. Applications built on Mr. Privacy are "social

  19. Privacy Impact Assessment Development and Membership Information

    E-Print Network [OSTI]

    Mathis, Wayne N.

    1 Privacy Impact Assessment Development and Membership Information I. System Identification 1. IT System Name: Development and Membership Information System (DMIS) 2. Mission Sponsor: Virginia Clark and membership. II. Privacy Assessment 1. What information is being (or will be) collected. The Development

  20. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Victoria, University of

    key privacy and security concepts specific to academic units; · Integrate the knowledge through/security questions; · External Review recommended wider education and training at the university #12;Why Are You Here principles · Proactive · Better practices #12;University's commitment Protection of Privacy Policy

  1. Privacy engineering for social networks

    E-Print Network [OSTI]

    Anderson, Jonathan

    2013-01-08

    of communication. 1.2 CONTRIBUTIONS The scenarios in the previous section provide windows into a complex socio- technical system. In this dissertation, I do not attempt to “solve” social prob- lems by pressing them into the mold of graph theory or other easily... change their users’ implicit privacy contract, pushing users into ever-less- private social interaction (§3.1.1). Services have a history of leaking users’ private information both to advertisers (§3.1.2) and to application developers (§3.1.3). OSN...

  2. WIPP - Privacy Act of 1974

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopmentat LENA|UpcomingVisit UsNews ThisPrivacy Act Quick Links

  3. Privacy Notice | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPress ReleasesPrincipalPrivacy

  4. Privacy-preserving Queries over Relational Databases

    E-Print Network [OSTI]

    Goldberg, Ian

    techniques, such as onion routers and mix networks, offer anonymizing protection for users' identities the query through Tor [12] to preserve the privacy of his or her network address. Nevertheless, the server

  5. PRIVACY IMPACT ASSESSMENT: OCIO HSPD-12 Physical

    Broader source: Energy.gov (indexed) [DOE]

    no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 27,2009 Office of...

  6. MAINTAINING PRIVACY IN RFID ENABLED ENVIRONMENTS

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    , whereabouts and habits concerns arise about the maintenance of privacy. People are afraid of being `scanned and applications beyond logistics. In fact, manufacturers, retailers and consumers can all take advantage

  7. Towards Privacy Preserving of Forensic DNA Databases 

    E-Print Network [OSTI]

    Liu, Sanmin

    2012-02-14

    Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user's query and the DNA database need to be extracted. However, unrelated profiles cannot be revealed to each other...

  8. Routing Through the Mist: Privacy Preserving Communication

    E-Print Network [OSTI]

    Kapadia, Apu

    Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments National Laboratories. Abstract Ubiquitous computing is poised to revolutionize the way we compute with services and other entities that wander within the ubiquitous computing environment. Keywords Ubiquitous

  9. Privacy: The Small and Large of It

    SciTech Connect (OSTI)

    NUSBAUM,ANNA W.

    1999-10-22

    The topic of Privacy is complex, multi-faceted, and often emotionally laden. This paper will cover the following topics, in an effort to further understanding of federal regulations and activities, the balancing act that necessarily occurs in business, and what role a records manager can play. The topics are: Definitions; The Privacy Act; ''Private'' companies; Potential areas of concern; Expectations; Corporate responsibilities; Case studies; and Records Manager's role.

  10. Table HC7-5a. Home Office Equipment by Type of Owner-Occupied...

    Gasoline and Diesel Fuel Update (EIA)

    5a. Home Office Equipment by Type of Owner-Occupied Housing Unit, Million U.S. Households, 2001 Home Office Equipment RSE Column Factor: Total Owner- Occupied Units Type of...

  11. ContextProbe : exploring mobile privacy in context

    E-Print Network [OSTI]

    Shih, Fuming

    2015-01-01

    My research investigates the following question: What factors affect people's privacy preferences for disclosing data that is collected about them when interacting with mobile applications? Research about information privacy ...

  12. DOE Convenes Multi-stakeholder Process to Address Privacy for...

    Energy Savers [EERE]

    DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by...

  13. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access, and University policy and procedures regarding use, privacy and confidentiality of information. University data University (University) functions that are: a) stored on University information systems, b) maintained

  14. The World Summit on the Information Society - Privacy not found 

    E-Print Network [OSTI]

    Jørgensen, Rikke Frank; Bendrath, Ralf

    Paper presented by Joergensen and Bendarth for the Privacy Workshop, chaired by Edwards held in September 2005.

  15. Achieving Differential Privacy of Data Disclosure in the Smart Grid

    E-Print Network [OSTI]

    Li, Xiang-Yang

    Achieving Differential Privacy of Data Disclosure in the Smart Grid Jing Zhao Taeho Jung Yu Wang-- The smart grid introduces new privacy implications to individuals and their family due to the fine of the proposed method over existing BLH methods. Index Terms--Smart Grid, Smart Meter, Privacy, Differential

  16. Secure Multiparty Computation for Privacy-Preserving Data Mining

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Multiparty Computation for Privacy-Preserving Data Mining Yehuda Lindell Benny Pinkas May 6 and discuss their relevance to the field of privacy-preserving data mining. In addition to re- viewing to privacy-preserving data mining. Finally, we discuss the relationship between secure multiparty computation

  17. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Lee, Dongwon

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  18. Information Privacy Policy & Procedure Manual Health Information Privacy Forms: 1 Copyright 2003 -2013. University of Florida. All rights reserved. Version: 09/01/2013

    E-Print Network [OSTI]

    Sin, Peter

    Information Privacy Policy & Procedure Manual Health Information Privacy Forms: 1 ©Copyright 2003 - 2013. University of Florida. All rights reserved. Version: 09/01/2013 ACUSE de Recibo MRN

  19. The Genetic Privacy Act and commentary

    SciTech Connect (OSTI)

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. Therefore, to effectively protect genetic privacy unauthorized collection and analysis of individually identifiable DNA must be prohibited. As a result, the premise of the Act is that no stranger should have or control identifiable DNA samples or genetic information about an individual unless that individual specifically authorizes the collection of DNA samples for the purpose of genetic analysis, authorized the creation of that private information, and has access to and control over the dissemination of that information.

  20. PrivacyInformer : an automated privacy description generator for the MIT App Inventor

    E-Print Network [OSTI]

    Miao, Daniela Yidan

    2014-01-01

    With the advent of "smart" mobile phones and ubiquitous mobile applications, the pace at which people generate, access, and acquire data has accelerated significantly. In this thesis, we first examine how privacy issues ...

  1. 3702 IEEE SENSORS JOURNAL, VOL. 13, NO. 10, OCTOBER 2013 EPS: An Efficient and Privacy-Preserving Service

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    , health care, and government services. In smart community, residents manage their home appliances to coop smart homes in a local residential region and formed upon the agreement of participating home owners of Things (IoT). Smart homes are essential components of smart community, where communication devices

  2. Records, OIA, Privacy and Copyright obligations

    E-Print Network [OSTI]

    Hickman, Mark

    hacked to make news · Records of business/emails are discoverable under the OIA or Privacy Act · Once. · Requirement to create and maintain records ­ full and accurate, in accordance with normal, prudent business are records of business transactions #12;OIA Requests · Come frequently throughout the university · 20 working

  3. Privacy Preserving Business Process Matching Dilian Gurov

    E-Print Network [OSTI]

    Gurov, Dilian

    Privacy Preserving Business Process Matching Dilian Gurov KTH Royal Institute of Technology E-mail: dilian@kth.se Peeter Laud Cybernetica E-mail: peeter.laud@cyber.ee Roberto Guanciale KTH Royal Institute these properties. The value of business processes is steadily increasing, and enterprises may even use the patent

  4. 2014 Gaurav Lahoti PRIVACY-PRESERVING

    E-Print Network [OSTI]

    this concern. This ap- proach calculates tax by monitoring vehicle road usage through GPS and odometer data© 2014 Gaurav Lahoti #12;PRIVACY-PRESERVING VEHICLE MILES TRAVELED (PPVMT) TAX BY GAURAV LAHOTI, Illinois Adviser: Professor Carl A. Gunter #12;Abstract Motor fuel taxes form a great part of the total

  5. POLICIES & PROCEDURES Privacy of Personal Information

    E-Print Network [OSTI]

    Cohen, Randy W.

    POLICIES & PROCEDURES Privacy of Personal Information Policy 500-8025 Revision Date: 11 of information in its custody. This includes the physical security of the equipment where information is processed and maintained, and the preservation of information in case of intentional, accidental, or natural

  6. Information Access and Privacy Protection Office

    E-Print Network [OSTI]

    deYoung, Brad

    Information Access and Privacy Protection Office I A P P Guidelines for Using Personal Information in Email and Faxes Memorial University employees are required to protect personal information (defined personal information ­ your own or someone else's. Email and faxes, in particular, pose challenges

  7. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  8. Health Insurance Privacy Policy 2.15

    E-Print Network [OSTI]

    Howat, Ian M.

    Health Insurance Privacy Policy 2.15 Office of Human Resources Applies to: Faculty, staff protected health information about members in its health benefit plans. Federal Health Insurance Portability by the health benefit programs and grant members certain rights with respect to their information. To protect

  9. Adnostic: Privacy Preserving Targeted Advertising Vincent Toubiana

    E-Print Network [OSTI]

    Nissenbaum, Helen

    across web sites in order to infer user interests and preferences. These interests and preferences that OBA and privacy are inherently in conflict. In this paper we propose a practical architectureSense service will begin targeting ads based on the user's browsing behavior [4]. In the next section we survey

  10. Security and Privacy Protection in Wireless

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    31 Security and Privacy Protection in Wireless Sensor Networks 31.1 Introduction 31.2 Unique applications of wireless sensor networks (WSNs). The list of potential applications that require protection Mechanisms WSNs share several important properties with traditional wireless networks, most notably

  11. NBP RFI: Data Access, Third Party Use and Privacy- Comments of...

    Energy Savers [EERE]

    Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities Telecom Council hereby...

  12. LM Records Handling System-Freedom of Information/Privacy Act...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Freedom of InformationPrivacy Act, Office of Legacy management LM Records Handling System-Freedom of InformationPrivacy Act, Office of Legacy management LM Records Handling...

  13. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing

    E-Print Network [OSTI]

    2009-01-01

    implications for ubiquitous computing. CoDesign, 2(1), 3-15.Design for privacy in ubiquitous computing environments. Inconsent: privacy in ubiquitous computing (Ubicomp). In

  14. Local Option- Local Improvement Districts

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessme...

  15. NBP RFI: Data Access, Third Party Use, and Privacy- Comments...

    Energy Savers [EERE]

    & Publications Comments of Oncor Electric Delivery Company LLC Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies NBP RFI: Data Access,...

  16. Data Privacy by Design: Digital Infrastructures for Clinical Collaborations

    E-Print Network [OSTI]

    Sinnott, R.O.

    Sinnott,R.O. Ajayi,O. Stell,A.J. International Conference on Security and Privacy, Orlando, USA, July 2009.

  17. Achieving Participatory Privacy Regulation: Guidelines for CENS Urban Sensing

    E-Print Network [OSTI]

    Shilton, Katie; Burke, Jeffrey A; Estrin, D; Hansen, Mark; Srivastava, Mani B.

    2008-01-01

    Socio-Technical Ubiquitous Computing Systems (GeorgiaImplications for Ubiquitous Computing." CoDesign 2.1 (2006):for Privacy in Ubiquitous Computing Environments." Third

  18. PRIVACY IMPACT ASSESSMENT: Visitor Dosimeter Badge Tracking

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuilding energy codes have a PRIVACY IMPACT ASSESSMENT: Visitor

  19. Medical information and the right to privacy

    SciTech Connect (OSTI)

    Drell, D.

    1994-06-01

    This report is a compilation of submitted abstracts of papers presented at the DOE-supported workshop on medical information and the right to privacy held at the National Academy of Sciences in Washington, DC, on June 9 and 10, 1994. The aim of this meeting is to provide a forum to discuss the legal, ethical and practical issues related to the computerization and use of medical data, as well as the potential impact the use of these data may have on an individual`s privacy. Topical areas include an overview of the Federal and legal requirements to collect medical data, historical experiences with worker screening programs, currently available medical surveillance technologies (both biomedical and computer technologies) and their limitations. In addition, an-depth assessment of the needs and interests of a wide spectrum of parties as they relate to the use of medical data from both a legal and privacy perspective is provided. The needs of the individual, the public (e.g., blood and tissue banks), private enterprises (e.g., industry and insurance carriers), and the government (e.g., FBI) are discussed. Finally, the practical and legal issues relating to the use of computers to carry, store and transmit this information are also examined. The abstracts are presented in the intended order of presentation as indicated in the agenda for the meeting.

  20. The Genetic Privacy Act and commentary

    SciTech Connect (OSTI)

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. The DNA molecule holds an extensive amount of currently indecipherable information. The major goal of the Human Genome Project is to decipher this code so that the information it contains is accessible. The privacy question is, accessible to whom? The highly personal nature of the information contained in DNA can be illustrated by thinking of DNA as containing an individual`s {open_quotes}future diary.{close_quotes} A diary is perhaps the most personal and private document a person can create. It contains a person`s innermost thoughts and perceptions, and is usually hidden and locked to assure its secrecy. Diaries describe the past. The information in one`s genetic code can be thought of as a coded probabilistic future diary because it describes an important part of a unique and personal future. This document presents an introduction to the proposal for federal legislation `the Genetic Privacy Act`; a copy of the proposed act; and comment.

  1. MEMORANDUM OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and MyersHr. Anthony V. Andolina:I.) ,' .I TO:

  2. OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700 GJO-2003-411-TAC GJO-PIN~$ .,2, 1990 TO:l . .

  3. OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700 GJO-2003-411-TAC GJO-PIN~$ .,2, 1990 TO:l .

  4. OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700 GJO-2003-411-TAC GJO-PIN~$ .,2, 1990 TO:l

  5. OWNER(S) Past:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700 GJO-2003-411-TAC GJO-PIN~$ .,2, 1990

  6. SUBJECT: OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700 GJO-2003-411-TACe -'SIhBCL:kJriitedHEHORANDUH

  7. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing

    E-Print Network [OSTI]

    Madiraju, Praveen

    Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing Scott Lederer disclosed through a ubiquitous computing system. We found that privacy preferences varied by inquirer more privacy in ubiquitous computing. Keywords Ubiquitous Computing, Privacy, Social and Legal Issues

  8. Privacy Management at UC Information and Records Management

    E-Print Network [OSTI]

    Hickman, Mark

    or criminal records. See a full list of the types of information collected about individuals at UC in SectionPrivacy. Privacy Management at UC Information and Records Management (IRM) www Records Management 3 1. Introduction Information that staff or contractors create and collect at UC needs

  9. Optimal Privacy-Preserving Energy Management for Smart Meters

    E-Print Network [OSTI]

    Zhang, Junshan

    Optimal Privacy-Preserving Energy Management for Smart Meters Lei Yang, Xu Chen, Junshan Zhang, Smart Grid, Data Privacy, Load Monitor, Cost Saving, Battery I. INTRODUCTION A. Motivation Smart meters, and H. Vincent Poor School of Electrical, Computer and Energy Engineering, Arizona State University

  10. Anti-discrimination Analysis Using Privacy Attack Strategies

    E-Print Network [OSTI]

    Ruggieri, Salvatore

    Anti-discrimination Analysis Using Privacy Attack Strategies Salvatore Ruggieri1 , Sara Hajian2 and Technology, Saudi Arabia Abstract. Social discrimination discovery from data is an important task to identify deploy privacy at- tack strategies as tools for discrimination discovery under hard assump- tions which

  11. Cryptography Challenges for Computational Privacy in Public Clouds

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptography Challenges for Computational Privacy in Public Clouds Sashank Dara Cisco Systems security but its readiness for this new generational shift of computing platform i.e. Cloud Computing into the underpinnings of Computational Privacy and lead to better solutions. I. INTRODUCTION Cloud computing came out

  12. Privacy-Preserving Public Auditing for Secure Cloud Storage

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Student Member, IEEE burden to user. In this paper, we propose a secure cloud storage system supporting privacy for data integrity. Examples of outages and security breaches of noteworthy cloud services appear from time

  13. PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF

    E-Print Network [OSTI]

    Mullins, Dyche

    PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF The Family Educational Rights and Privacy Act (FERPA) and UC policy restrict the disclosure of information from student records. Presume that all student information is confidential, and do not disclose information without a student

  14. Middleware for Pervasive Spaces: Balancing Privacy and Utility

    E-Print Network [OSTI]

    Venkatasubramanian, Nalini

    Middleware for Pervasive Spaces: Balancing Privacy and Utility Daniel Massaguer, Bijit Hore the utility of the information ex- posed and ensure that this information does not violate users' privacy. In order to resolve these conflicts, we propose a framework grounded in utility theory where users

  15. Privacy Preserving Smart Metering System Based Retail Level Electricity Market

    E-Print Network [OSTI]

    Franchetti, Franz

    1 Privacy Preserving Smart Metering System Based Retail Level Electricity Market Cory Thoma, Tao technologies which includes load management and retail level electricity market support. Index Terms as the various market functionalities also pose great risks to customer privacy. In this work we propose a secure

  16. Enhancing Location Privacy for Electric Vehicles (at the right time)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhancing Location Privacy for Electric Vehicles (at the right time) Joseph K. Liu1 , Man Ho Au2 University of Wollongong, Australia {aau, wsusilo}@uow.edu.au Abstract. An electric vehicle is a promising of electric vehicles at the right time, by proposing an anonymous payment system with privacy protection

  17. When do Data Mining Results Violate Privacy? Murat Kantarcioglu

    E-Print Network [OSTI]

    Jin, Jiashun

    When do Data Mining Results Violate Privacy? Murat Kantarcioglu Purdue University Computer Sciences Privacy-preserving data mining has concentrated on obtain- ing valid results when the input data. Categories and Subject Descriptors H.2.8 [Database Management]: Database Applications-- Data mining; H.2

  18. Literature Survey on Privacy Preserving Mechanisms for Data Publishing

    E-Print Network [OSTI]

    , to be leveraged as fuel for innovation [24]. Studies have shown that Open Data, in general, has big economic valueLiterature Survey on Privacy Preserving Mechanisms for Data Publishing November 1, 2013 Andrei Manta #12;#12;Literature Survey on Privacy Preserving Mechanisms for Data Publishing Literature Survey

  19. PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF

    E-Print Network [OSTI]

    Martin, Gail

    PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF The Family Educational Rights and Privacy Act (FERPA) and UC policy restrict the disclosure of information from student records, allow students to opt out, create a private blog, or consider using the Collaborative Learning

  20. Analyzing Facebook Privacy Settings: User Expectations vs. Reality

    E-Print Network [OSTI]

    Gummadi, Krishna P.

    Analyzing Facebook Privacy Settings: User Expectations vs. Reality Yabing Liu Northeastern of personal data has emerged as a popular ac- tivity over online social networking sites like Facebook- tween the desired and actual privacy settings, quantifying the magnitude of the problem of managing

  1. Beyond Access Control: Managing Online Privacy via Exposure

    E-Print Network [OSTI]

    Gummadi, Krishna P.

    information from who actually does, because it ignores the difficulty of finding information. Third, access privacy. We list a few here; this list is by no means exhaustive: 1. When Facebook introduced the News to requiring the user to visit the friends' pages-- users objected strongly and accused Facebook of privacy

  2. Privacy Design Strategies (extended abstract) Jaap-Henk Hoepman1

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    implementation, but low when starting the project. Nu- merous privacy enhancing technologies (PETs) exists classification of privacy design patterns and the underlying pri- vacy enhancing technologies. We therefore development process. In other words starting when the initial concepts and ideas for a new system are drafted

  3. CANE: A Controlled Application Environment for Privacy Protection in ITS

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    --Many of the applications proposed for intelligent transportation systems (ITS) need to process and communicate detailed transportation systems (ITS), information and communication technologies are added to traffic systems in order, the application of privacy-by-design requires novel privacy-enhancing tech- nologies (PETs) that help to fulfill

  4. Privacy Design Strategies (extended abstract) # JaapHenk Hoepman 1

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    implementation, but low when starting the project. Nu­ merous privacy enhancing technologies (PETs) exists classification of privacy design patterns and the underlying pri­ vacy enhancing technologies. We therefore development process. In other words starting when the initial concepts and ideas for a new system are drafted

  5. The Unsolvable Privacy Problem and its Implications for Security Technologies

    E-Print Network [OSTI]

    Minnesota, University of

    Discrimination Price discrimination is the charging of varying prices when there are no cost jus- tifications argues that there are strong incentives for decreasing privacy, rooted in the economic benefits of price discrimination. As a result, the privacy problem is unsolvable. The conflict between incentives to price

  6. Notification of Rights Under (Family Educational Rights and Privacy Act)

    E-Print Network [OSTI]

    Selmic, Sandra

    Notification of Rights Under FERPA (Family Educational Rights and Privacy Act) for Post Secondary Institutions Page 102 #12;The Family Educational Rights and Privacy Act (FERPA) affords students certain rights); a person or company with whom the University has contracted (such as an attorney, auditor, or collection

  7. Privacy & Security Notice | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPress ReleasesPrincipalPrivacy &

  8. Sandia National Laboratories: Privacy and Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygenLaboratoryInnovationEmployeeNewsPublications AnnualPrivacy and

  9. Making a Privacy Act Request - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion toMSDS on theMaitrayeeEnergyMaking a Privacy Act

  10. Privacy Policy | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . .Privacy

  11. DOE Privacy Program Brochure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:IAbout Us »Buildings DOEDOE FCalculationDOE09Privacy

  12. Fact #794: August 26, 2013 How Much Does an Average Vehicle Owner...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Each Year? Fact 794: August 26, 2013 How Much Does an Average Vehicle Owner Pay in Fuel Taxes Each Year? According to the Federal Highway Administration, the average fuel economy...

  13. Owner's Interference in Reverse Auction Bidding to Skew a Free Market 

    E-Print Network [OSTI]

    Chaudhari, Sushil V.

    2010-07-14

    controversial bidding system. No previous research has been undertaken by the Texas A&M University Reverse Auction Bidding study group into potential owner interference with the bidding system for a reverse auction. Six bidders were asked to participate...

  14. DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference

    Broader source: Energy.gov [DOE]

    More than 150 energy sector leaders—including nearly 100 asset owners and operators—gathered at the 2009 EnergySec Annual Summit in Seattle, WA, on Sept. 23-24, where researchers from the...

  15. Privacy, Security, & Legal Disclaimer Notice - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPressthis site » Privacy PrivacyPrivacy,

  16. Family Educational Rights and Privacy Act (FERPA) The Family Educational Rights and Privacy Act (FERPA) requires UNCW to release detailed information to

    E-Print Network [OSTI]

    Olszewski Jr., Edward A.

    Family Educational Rights and Privacy Act (FERPA) The Family Educational Rights and Privacy Act (FERPA) requires UNCW to release detailed information to the student only. Students may, however, voluntarily waive their privacy rights to the person(s) identified in the statement below. By completing

  17. UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar Revised: 10/03/13 UCSC Policy of the student. #12;UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC

  18. How (Not) to Protect Genomic Data Privacy in a Distributed Network: Using Trail Re-identification to Evaluate and Design Privacy Protection Systems

    E-Print Network [OSTI]

    1 How (Not) to Protect Genomic Data Privacy in a Distributed Network: Using Trail Re-specific genomic data into clinical practice and research raises serious privacy concerns. Various systems have being disclosed, they lack formal proofs. In this paper, we study the erosion of privacy when genomic

  19. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  20. A Theory of Utility and Privacy of Data Sources Lalitha Sankar, S. Raj Rajagopalan , H. Vincent Poor

    E-Print Network [OSTI]

    Sankar, Lalitha

    A Theory of Utility and Privacy of Data Sources Lalitha Sankar, S. Raj Rajagopalan , H. Vincent) while still providing measurable benefit (utility) to multiple legitimate information consumers. Rate sources, developing application independent utility and privacy metrics, quantifying utility- privacy

  1. Freedom of Information Act (FOIA) and Privacy Act Requests |...

    Broader source: Energy.gov (indexed) [DOE]

    ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or obtaining access to records under...

  2. Ajami : spaces between the street and the privacy of home

    E-Print Network [OSTI]

    Havilio, Noa, 1975-

    2003-01-01

    The thesis investigates, by research and design, spaces which are located between the street and the privacy of home, focusing on the case-study of Ajami; a mixed Palestinian-Israeli and Jewish-Israeli neighborhood in ...

  3. Privacy-preserving Queries over Relational Databases Femi Olumofin

    E-Print Network [OSTI]

    Goldberg, Ian

    . While today's most developed and deployed privacy tech- niques, such as onion routers and mix networks' queries. For the front running example, the user could tunnel the query through Tor [17] to preserve

  4. Privacy Preserving Business Process Fusion Roberto Guanciale(B)

    E-Print Network [OSTI]

    Gurov, Dilian

    Privacy Preserving Business Process Fusion Roberto Guanciale(B) and Dilian Gurov KTH Royal of business processes is widely recognized, and many enterprises have started to use the patent mechanism

  5. Transparent Accountable Data Mining: New Strategies for Privacy Protection

    E-Print Network [OSTI]

    Weitzner, Daniel J.

    2006-01-27

    Attempts to address issues of personal privacy in a world of computerized databases and information networks -- from security technology to data protection regulation to Fourth Amendment law jurisprudence -- typically ...

  6. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    SciTech Connect (OSTI)

    Rothstein, M.A.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  7. Efficiency and Privacy Tradeoffs in Mechanism Design University of Toronto

    E-Print Network [OSTI]

    Sandholm, Tuomas W.

    Efficiency and Privacy Tradeoffs in Mechanism Design Xin Sui University of Toronto Department that reach socially efficient decisions with minimal information revelation. This can reduce agent communica explored the tradeoff between communi- cation cost and efficiency, and more recently, communication

  8. U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST

    Energy Savers [EERE]

    identifying data that would help locate the record (e.g., maiden name, occupational license number, time and place of employment, etc.): To verify my identity for Privacy Act...

  9. 2015 Privacy Awareness Course (PAC) Annual Training | Department...

    Broader source: Energy.gov (indexed) [DOE]

    28, 2015 6:00AM to 9:00PM MDT Course Title: 2015 Privacy Awareness Course (PAC) Annual Training (COURSE 2015PACAICCv2) Completion Date: September 28, 2015 Audience: Mandatory...

  10. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access technology security incident. A standard Universitywide approach to information security is important the Information Technology Services Office has completed its investigation and authorizes such activity. 3

  11. Electronic Vehicle Identification: Industry Standards, Performance, and Privacy Issues

    E-Print Network [OSTI]

    Texas at Austin, University of

    0-5217-P2 Electronic Vehicle Identification: Industry Standards, Performance, and Privacy Issues Administration and the Texas Department of Transportation. Abstract: In this research product, industry standards functions. Keywords: Tolling, electronic vehicle identification, DSRC, standards, performance, electronic

  12. Privacy Preservation Technologies in Internet of Things

    E-Print Network [OSTI]

    Sen, Jaydip

    2010-01-01

    Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

  13. Uniting Legislation with RFID Privacy-Enhancing Technologies Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum

    E-Print Network [OSTI]

    Tanenbaum, Andrew S.

    response by modulating the request signal using one or more subcarrier frequencies. These RFID tags can do. Keywords: Radio frequency identification, security, privacy, data protection legislation, privacy- enhancing technologies. 1 Introduction Radio Frequency Identification (RFID) technology faces security

  14. Data Privacy and the Smart Grid: A Voluntary Code of Conduct...

    Energy Savers [EERE]

    Data Privacy and the Smart Grid: A Voluntary Code of Conduct - Notice of Public Comment: Federal Register Notice, Volume 79, No. 177, September 12, 2014 Data Privacy and the Smart...

  15. Topic 7 : Smart Grid Privacy and Security 1Networking and Distributed Systems

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    Topic 7 : Smart Grid Privacy and Security 1Networking and Distributed Systems Department Tech UniversityCommunications and Control in Smart Grid 2 · Smart Meter Privacy · Concerns · Possible Solutions · Smart Grid Security · Load Altering Attacks · False Data Injection Attacks · Impact

  16. A Regulator's Privacy Guide to Third-Party Data Access for Energy...

    Broader source: Energy.gov (indexed) [DOE]

    Third Party Use, and Privacy FR Doc. 2010-11127 July 12, 2010 Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies Comments by the...

  17. A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society

    E-Print Network [OSTI]

    A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and SocietyHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies

  18. Configurable Dynamic Privacy for Pervasive Sensor Networks Nan-Wei Gong

    E-Print Network [OSTI]

    1 Configurable Dynamic Privacy for Pervasive Sensor Networks by Nan-Wei Gong Submitted Privacy for Pervasive Sensor Networks by Nan-Wei Gong Submitted to the Program in Media Arts and Sciences

  19. AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing Safwan Mahmud Khan their computation results are ultimately delivered. To provide this data ownership privacy, the cloud's distributed-anonymity; authentication; cloud computing; in- formation security; privacy; Tor I. INTRODUCTION Revolutionary advances

  20. Security and Privacy Issues of Fog Computing: Shanhe Yi, Zhengrui Qin, and Qun Li

    E-Print Network [OSTI]

    Li, Qun

    in a brief manner. Keywords: Fog computing, cloud/mobile computing, security, privacy 1 Introduction-trivial extension of cloud, some security and privacy issues in the context of cloud computing [35], can be foreseenT), and originated from cloud computing, security and privacy issues of cloud are inherited in fog computing. While

  1. A li i f W l iA li i f W l iApplication of Wavelets inApplication of Wavelets in PrivacyPrivacy--preserving Data Miningpreserving Data MiningPrivacyPrivacy preserving Data Miningpreserving Data Mining

    E-Print Network [OSTI]

    Zhang, Jun

    Privacy--preserving Data Miningpreserving Data MiningPrivacyPrivacy preserving Data Miningpreserving Data Mining Jun Zhang in Data Mining AnalysisChallenges in Data Mining Analysis I d i i li i d iIn data mining applications, etc #12;Collaborative Data Mining AnalysisCollaborative Data Mining AnalysisCollaborative Data Mining

  2. Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing

    E-Print Network [OSTI]

    Connelly, Kay

    Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing Ashraf Khalil Computer@cs.indiana.edu INTRODUCTION With the increasing popularity of ubiquitous computing and context-aware services, the privacy of ubiquitous computing [1-4]. Most research on privacy in general and on ubiquitous computing in particular

  3. igger's Mirth is a collective farm located in Burlington, VT. The 5 owners farm 18 acres of

    E-Print Network [OSTI]

    New Hampshire, University of

    the Winooski River. Digger's Mirth has farmed on this land since it began in 1992. S'ra DeSantis is one of the 5 owners and managers, and has farmed with Digger's Mirth since 2000. Production Digger's Mirth means that all 5 owners make production and marketing decisions together, and divide all income evenly

  4. From Consumers to Owners: Using Meta-Design Environments to Motivate Changes in Energy

    E-Print Network [OSTI]

    Fischer, Gerhard

    From Consumers to Owners: Using Meta-Design Environments to Motivate Changes in Energy Consumption setting, and tailored information are useful in motivating people to change their energy behavior [5 for these requirements are currently created with smart grids (http://www.oe.energy.gov/smartgrid.htm), the software

  5. AIM: A Home-Owner Usable Energy Calculator for Existing Residential Homes 

    E-Print Network [OSTI]

    Marshall, K.; Moss, M.; Malhotra, M.; Liu, B.; Culp, C.; Haberl, J.; Herbert, C.

    2009-01-01

    An energy efficiency metric for residential homes was developed to provide home-owners, realtors and builders a method to rate the energy efficiency of an existing house. To accomplish this, a web-based calculator was developed, which is based...

  6. The consumer's guide to earth sheltered housing: A step-by-step workbook for prospective owners

    SciTech Connect (OSTI)

    Rollwagen, M.

    1985-01-01

    Earth sheltered homes have captured the imagination of many homeowners seeking the cost and energy savings features they offer. This book provides the discussion of the advantages and disadvantages of such homes and includes illustrations showing interiors and exteriors with advise to owners on dealine with architects and contractors.

  7. Guide to Combined Heat and Power Systems for Boiler Owners and Operators

    SciTech Connect (OSTI)

    Oland, CB

    2004-08-19

    Combined heat and power (CHP) or cogeneration is the sequential production of two forms of useful energy from a single fuel source. In most CHP applications, chemical energy in fuel is converted to both mechanical and thermal energy. The mechanical energy is generally used to generate electricity, while the thermal energy or heat is used to produce steam, hot water, or hot air. Depending on the application, CHP is referred to by various names including Building Cooling, Heating, and Power (BCHP); Cooling, Heating, and Power for Buildings (CHPB); Combined Cooling, Heating, and Power (CCHP); Integrated Energy Systems (IES), or Distributed Energy Resources (DER). The principal technical advantage of a CHP system is its ability to extract more useful energy from fuel compared to traditional energy systems such as conventional power plants that only generate electricity and industrial boiler systems that only produce steam or hot water for process applications. By using fuel energy for both power and heat production, CHP systems can be very energy efficient and have the potential to produce electricity below the price charged by the local power provider. Another important incentive for applying cogeneration technology is to reduce or eliminate dependency on the electrical grid. For some industrial processes, the consequences of losing power for even a short period of time are unacceptable. The primary objective of the guide is to present information needed to evaluate the viability of cogeneration for new or existing industrial, commercial, and institutional (ICI) boiler installations and to make informed CHP equipment selection decisions. Information presented is meant to help boiler owners and operators understand the potential benefits derived from implementing a CHP project and recognize opportunities for successful application of cogeneration technology. Topics covered in the guide follow: (1) an overview of cogeneration technology with discussions about benefits of applying cogeneration technology and barriers to implementing cogeneration technology; (2) applicable federal regulations and permitting issues; (3) descriptions of prime movers commonly used in CHP applications, including discussions about design characteristics, heat-recovery options and equipment, fuels and emissions, efficiency, maintenance, availability, and capital cost; (4) electrical generators and electrical interconnection equipment; (5) cooling and dehumidification equipment; (6) thermodynamic cycle options and configurations; (7) steps for evaluating the technical and economic feasibility of applying cogeneration technology; and (8) information sources.

  8. NOAA Privacy Impact Assessment Guidance Revised 5/8/2014

    E-Print Network [OSTI]

    Assessment (PIA), IT system, records PURPOSE AND SCOPE A PIA is a process for determining the risks to ensure the privacy of personal information in electronic records (specific citation for Section 208 is 44. The Trade Secrets Act (18 USC 1905) provides criminal penalties for the theft of trade secrets and other

  9. Reconciling Utility with Privacy in Genomics Mathias Humbert Erman Ayday

    E-Print Network [OSTI]

    Thévenaz, Jacques

    Reconciling Utility with Privacy in Genomics Mathias Humbert Erman Ayday Jean-Pierre Hubaux.telenti@chuv.ch ABSTRACT Direct-to-consumer genetics makes it possible for everyone to obtain their genome sequences. In order to contribute to medical research, a growing number of people publish their genomic data

  10. Privacy Enhanced Fraud Resistant Road Pricing (extended abstract)

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    for the current road tax. The announcement of the Dutch authorities stirred a large public debate which stillPrivacy Enhanced Fraud Resistant Road Pricing (extended abstract) Jaap-Henk Hoepman1,2 , George, University of Groningen, the Netherlands g.b.huitema@rug.nl Abstract. A naive implementation of a road

  11. Privacy Impact Assessment (PIA) NMAH Collections Information System

    E-Print Network [OSTI]

    Mathis, Wayne N.

    Privacy Impact Assessment (PIA) NMAH Collections Information System I. System Identification 1. IT System Name: MIMSY XG Collections Information System (CIS) 2. IT System Sponsor: National Museum Museum of American History (NMAH) Collection Information System (CIS) uses the MIMSY XG database

  12. Data Privacy and Data Security Introduction to Data Mining

    E-Print Network [OSTI]

    Zhang, Jun

    Data Privacy and Data Security Chapter 1 Introduction to Data Mining Jun Zhang January 13, 2011 © Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 #12;Why Mine Data? Commercial Viewpoint ) © Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 2 Customer Relationship Management) #12;Why

  13. A Practical Application of Differential Privacy to Personalized Online Advertising

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Practical Application of Differential Privacy to Personalized Online Advertising Yehuda Lindell@cs.biu.ac.il,omrier@gmail.com Abstract Online advertising plays an important role in supporting many Internet services. Person- alized online advertising offers marketers a way to direct ads at very specific audiences. The vast body

  14. Targeted Advertising on the Handset: Privacy and Security Challenges

    E-Print Network [OSTI]

    Henderson, Tristan

    Targeted Advertising on the Handset: Privacy and Security Challenges Hamed Haddadi, Pan Hui, Tristan Henderson and Ian Brown Abstract Online advertising is currently a rich source of revenue for many for personalised and localised advertising. A key benefit of using mobile phones is to take advantage

  15. Notice of Privacy Practices Your Information. Your Rights. Our Responsibilities.

    E-Print Network [OSTI]

    Pittendrigh, Barry

    Notice of Privacy Practices Your Information. Your Rights. Our Responsibilities. This notice to this information. Please review it carefully. Your Rights You have the right to: · Get a copy of your paper requests · Respond to lawsuits and legal actions Your Rights When it comes to your health information, you

  16. Privacy-Preserving Friend Search over Online Social Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    characterizing one's social position and significantly impact one's daily life. Over online social networks (OSNsPrivacy-Preserving Friend Search over Online Social Networks Huang Lin , Sherman S. M. Chow Tong University Abstract--Friendships or social contacts represent an impor- tant attribute

  17. Towards Everyday Privacy for Ubiquitous Computing Scott Lederer1

    E-Print Network [OSTI]

    Mankoff, Jennifer

    with the right people at the right level of detail in ubiquitous computing environments. In this paper, weTowards Everyday Privacy for Ubiquitous Computing Scott Lederer1 , Jason I. Hong1 , Xiaodong Jiang1 , Anind K. Dey1,2 , James A. Landay3,4 , JenniferMankoff1 1 Department of Computer Science, University

  18. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    .ics.utsa.edu Institute for Cyber Security The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu Institute for Cyber Security 1 The Data and Application Security But not securable by academically taught cyber security not studied as a success story missing technologies highly

  19. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    for Cyber Security Executive Director and Endowed Chair March 29, 2012 ravi.sandhu@utsa.edu www and Privacy (DASPY) Challenge . Ravi Sandhu Institute for Cyber Security 1 and Endowed Chair March 29, 2012 growing But not securable by academically taught cyber security not studied as a success story The ATM

  20. The Optimal Mechanism in Differential Privacy: Multidimensional Setting

    E-Print Network [OSTI]

    Viswanath, Pramod

    1 The Optimal Mechanism in Differential Privacy: Multidimensional Setting Quan Geng, and Pramod Email: {geng5, pramodv}@illinois.edu Abstract We derive the optimal -differentially private mechanism multidimensional staircase-shaped probability density function. Compared with the Laplacian mechanism, we show

  1. Maintaining Trajectory Privacy in Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    properties. The users of this network are oil companies with their own mobile collectors. Since packets and read the contexts of them. The mote-level assumption is fair enough since otherwise analytically no defense system can maintain the privacy of mobile sink node. With this assumption, attacks

  2. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved POLICY TITLE: Information Technology Security Policy POLICY PURPOSE: The purpose of this Information Technology Security Policy is to ensure and describe the steps necessary to secure information

  3. Housing & Residence Life Freedom of Information and Protection of Privacy

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Housing & Residence Life Freedom of Information and Protection of Privacy Housing and Residence an Yes No Provide Housing account information necessary to allow them to make housing related payments on my behalf. Yes No Provide details of other Yes No Receive information to complete my Housing

  4. Privacy in encrypted content distribution using private broadcast encryption

    E-Print Network [OSTI]

    Waters, Brent

    @cs.stanford.edu Dan Boneh dabo@cs.stanford.edu Brent Waters bwaters@cs.stanford.edu Abstract In many contentPrivacy in encrypted content distribution using private broadcast encryption Adam Barth abarth distribution systems it is important to both restrict access of content to au- thorized users and to protect

  5. The Post Anachronism: The Temporal Dimension of Facebook Privacy

    E-Print Network [OSTI]

    Bauer, Lujo

    The Post Anachronism: The Temporal Dimension of Facebook Privacy Lujo Bauer , Lorrie Faith Cranor the audience and emphasis of Facebook posts change over time. In a 63-participant longitudinal study, par- ticipants gave their audience and emphasis preferences for up to ten of their Facebook posts in the week

  6. Collateral damage of Facebook Apps: an enhanced privacy scoring model

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Collateral damage of Facebook Apps: an enhanced privacy scoring model Iraklis Symeonidis1 , Filipe relationships on Facebook often entails in- formation sharing which is based on the social trust and implicit con- tract between users and their friends. In this context, Facebook of- fers applications (Apps

  7. Framework for Security and Privacy in Automotive Telematics

    E-Print Network [OSTI]

    Gruteser, Marco

    Framework for Security and Privacy in Automotive Telematics Sastry Duri, Marco Gruteser, Xuan Liu Skyline Drive Hawthorne, New York 10532 ABSTRACT Automotive telematics may be defined as the information of data to obtain remote services. In order for automotive telematics to grow to its full potential

  8. Enhancing Privacy and Preserving Accuracy of a Distributed Collaborative Filtering

    E-Print Network [OSTI]

    Ricci, Francesco

    ) is a powerful technique for generating personalized predictions. CF systems are typically based on a central profiles combined with data modification techniques may mitigate some privacy issues. Results University of Haifa, Israel slavax@cs.haifa.ac.il Yaniv Eytani University of Illinois at Urbana

  9. Enhancing Privacy while Preserving the Accuracy of Collaborative Filtering

    E-Print Network [OSTI]

    Ricci, Francesco

    of user profiles combined with data perturbation techniques mitigates the privacy issues. Experi- ments that perturbation techniques did not considerably reduce the accuracy of the generated predictions. This paper. Collaborative Filtering (CF) is considered a powerful technique for generating personalized recommendations

  10. CS689: Privacy and Security in Data Analysis

    E-Print Network [OSTI]

    Zhang, Jun

    Instructor: Jun Zhang. E-mail: jzhang@cs.uky.edu. Tel: 257­3892. Office: Marksbury 321. Office Hours: MW: 9 is released to public or is subject to computer-based analysis, such as data mining. Prerequisites: Two 500 on Privacy Preserving Data Mining. Topical outline (tentative): · Brief introduction to data mining

  11. Data Distortion for Privacy Protection in a Terrorist Analysis System

    E-Print Network [OSTI]

    Zhang, Jun

    in security-related data mining applications, such as in data mining- based terrorist analysis systems. We in preserving privacy as well as maintaining utility of the datasets. 1 Introduction The use of data mining's Terrorism Information Awareness Program led to the defunding of DARPA's Information Awareness Office. Thus

  12. Obligations with deadlines and maintained interdictions in privacy regulation frameworks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , research has first fo- cused on the so-called Privacy-Enhancing Technologies (PETs), the technical means existing Internet-oriented PETs with respect to their aims (identity management, IP anonymization...) [6 (user information, user consent, data update and retractation, process justification, data retention

  13. The Role of the Owners Rep for Energy Performance and Control 

    E-Print Network [OSTI]

    Bernstein, R.

    2012-01-01

    and automation strategy. He has over 30 years experience in industrial, commercial and residential automation and controls technologies. RBCG provides building automation standards, specification development support, educational program development... of the Owners Rep for Energy Performance and Control Ron Bernstein President Chief Ambassador RBCG, LLC LonMark International ICEBO 2012 Manchester, UK ESL-IC-12-10-46a Proceedings of the Twelfth International Conference for Enhanced Building...

  14. Design-Build and CM at Risk- comparative analysis for owner decision making based on case studies and project surveys 

    E-Print Network [OSTI]

    Park, Soon Rock

    2012-07-16

    Currently, many researchers and stakeholders believe that effective delivery systems for construction projects are key to improving project quality and value in the construction industry. Therefore, it is important that owners use the best project...

  15. Fact #856 January 19, 2015 Plug-in and Hybrid Cars Receive High Scores for Owner Satisfaction

    Broader source: Energy.gov [DOE]

    The annual owner-satisfaction survey from Consumer Reports in 2014 covered 350,000 vehicles from one to three years old. They asked subscribers if they would purchase the same vehicle again knowing...

  16. Privacy and identifiability in clinical research, personalized medicine, and public health surveillance

    E-Print Network [OSTI]

    Cassa, Christopher A

    2008-01-01

    Electronic transmission of protected health information has become pervasive in research, clinical, and public health investigations, posing substantial risk to patient privacy. From clinical genetic screenings to publication ...

  17. Protecting Privacy of Shared Epidemiologic Data without Compromising Analysis Potential

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Cologne, John; Grant, Eric J.; Nakashima, Eiji; Chen, Yun; Funamoto, Sachiyo; Katayama, Hiroaki

    2012-01-01

    Objective . Ensuring privacy of research subjects when epidemiologic data are shared with outside collaborators involves masking (modifying) the data, but overmasking can compromise utility (analysis potential). Methods of statistical disclosure control for protecting privacy may be impractical for individual researchers involved in small-scale collaborations. Methods . We investigated a simple approach based on measures of disclosure risk and analytical utility that are straightforward for epidemiologic researchers to derive. The method is illustrated using data from the Japanese Atomic-bomb Survivor population. Results . Masking by modest rounding did not adequately enhance security but rounding to remove several digits ofmore »relative accuracy effectively reduced the risk of identification without substantially reducing utility. Grouping or adding random noise led to noticeable bias. Conclusions . When sharing epidemiologic data, it is recommended that masking be performed using rounding. Specific treatment should be determined separately in individual situations after consideration of the disclosure risks and analysis needs. « less

  18. Privacy Impact Assessment Template and Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report Appendices | Department ofPrioritization ToolPrivacy Impact

  19. br Owner br Facility br Type br Capacity br MW br Commercial br Online

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEtGeorgia:Illinois:WizardYates County,Zena,architecture Homeblack outOwner br

  20. Resources for Pet, Poultry and Livestock Owners Affected by Natural Disasters 

    E-Print Network [OSTI]

    Faries Jr., Floron C.

    2008-09-02

    of Agriculture can help producers locate hay for sale and pastures for lease. Call 877-429- 1998, or go to www.agr.state.tx.us and check the ?Links/Resources? sec- tion. Resources for Pet, Poultry and Livestock Owners Affected by Natural Disasters Livestock... stream_source_info pdf_2228.pdf.txt stream_content_type text/plain stream_size 3611 Content-Encoding ISO-8859-1 stream_name pdf_2228.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ER-022 9-08 Floron C. Faries, Jr...

  1. Privacy Principles for Sharing Cyber Security Data Gina Fisk, Calvin Ardi, Neale Pickett, John Heidemann, Mike Fisk, Christos Papadopoulos

    E-Print Network [OSTI]

    Heidemann, John

    Privacy Principles for Sharing Cyber Security Data Gina Fisk, Calvin Ardi, Neale Pickett, John@colostate.edu Abstract--Sharing cyber security data across organizational boundaries brings both privacy risks for sharing cyber security information must consider privacy issues as they exchange and analyzed information

  2. Why Do Privacy-Enhancement Mechanisms Fail, After All? A Survey of Both the User and the Provider Perspective

    E-Print Network [OSTI]

    Buchmann, Erik

    provider and user: Legal regulations, and privacy enhancement technologies (PET). International data implement information collection and forwarding processes that are not transparent to the user. This even for future privacy-enhancement technologies. 1. INTRODUCTION Currently, the Internet challenges the privacy

  3. Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts

    E-Print Network [OSTI]

    Queitsch, Christine

    Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts Page 1 of 16 Document Name: Information Security and Privacy Laws Version #: vF Created By: Ann Nagel, Associate Chief Information Security Officer Date Created: June 2, 2009 Updated By: Melissa Albin-Wurzer, Education

  4. Kennedy Krieger Institute is committed to the privacy and confidentiality of your medical

    E-Print Network [OSTI]

    Pevsner, Jonathan

    Kennedy Krieger Institute is committed to the privacy and confidentiality of your medical, or by contacting the Kennedy Krieger Institute Privacy Officer as explained at the end of this notice. It also have. The revised notice will be available online at kennedykrieger.org. Kennedy Krieger's Notice

  5. A Roadmap For Comprehensive Online Privacy Policy Annie I. Antn (*), Elisa Bertino (**), Ninghui Li (**), Ting Yu

    E-Print Network [OSTI]

    Yu, Ting

    framework that covers the entire privacy policy life-cycle is needed. This life-cycle includes enterprise that supports the privacy policy life-cycle. We identify the relevant technological and non-technical components required to support this life-cycle, showing the relationships between these components. The framework

  6. Building a Secure and Privacy-Preserving Smart Grid Cornell University

    E-Print Network [OSTI]

    Jelasity, Márk

    in the electrical power grid promise to create a more efficient, cost-effective, and adaptable smart grid. HoweverBuilding a Secure and Privacy-Preserving Smart Grid Ken Birman Cornell University Márk Jelasity, naive implementations of smart grid data collection could jeopardize the privacy of consumers

  7. UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid Xiaohui Liang, Student for smart grid in a community environment, which enables the electricity price to correspond-preserving manner. Index Terms--Smart grid; dynamic price; privacy preserva- tion; community-specific I

  8. Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage"

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud security in cloud computing" proposed by Wang et al. is insecure and their second work "privacy- preserving public auditing for secure cloud the storage" is inefficient. Thus, they offered a secure and efficient

  9. Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done?

    E-Print Network [OSTI]

    Sandhu, Ravi

    Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu-Leading Research with Real Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done Cloud Computing: Dependability Security What is Not New Security Guess who wins?! © Ravi Sandhu World

  10. Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage

    E-Print Network [OSTI]

    for sensitive data over cloud storage. However, users desire better security and are ready to pay for services storage systems. General Terms Human Factors, Security, Privacy. Keywords Cloud Storage, Social FactorsHome is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage Iulia Ion , Niharika

  11. Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy Wang Shao privacy and is secure in the random oracle model. Keywords: Cloud Computing, Cloud Storage, Public University of Posts and Telecommunications, Nanjing 210046, China; 2 Network and Data Security Key Laboratory

  12. Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?

    E-Print Network [OSTI]

    Sankar, Lalitha

    Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information? Lalitha unequivocally how safe private data can be (privacy) while still providing useful benefit (utility) to multiple such a framework which includes the following: modeling of data sources, developing application independent utility

  13. Introduction to SCRIPT-ed Special Edition on Privacy and Technology 

    E-Print Network [OSTI]

    Edwards, Lilian

    2006-01-01

    Introduction to a special edition of SCRIPT-ed online journal focussing on the regulation of privacy, in light of new and changing technologies. The edition discusses privacy as a human right, or as a commodity, and presents articles from invited...

  14. ACADEMIC INFORMATION / COLLEGE POLICIES FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA)

    E-Print Network [OSTI]

    Sun, Yi

    ACADEMIC INFORMATION / COLLEGE POLICIES FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA) Pursuant, as Amended, you have the right to withhold the disclosure of the "Directory Information" listed below. Please to the Family Educational Rights and Privacy Act (FERPA) and the Board of Trustees of The City University of New

  15. September 24, 2012 Annual Notification of Student Privacy Rights under FERPA and Notice of Public Information

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    September 24, 2012 Annual Notification of Student Privacy Rights under FERPA and Notice of Public Information Dear Sammy Slug: The Office of the Registrar would like to take this opportunity to give you a brief summary of your rights under the Family Educational Rights and Privacy Act (FERPA), the federal

  16. Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM (Extended Abstract a client to securely outsource his private data to the cloud while at the same time to delegate to a third party the right to run certain algorithms on his data. The mechanism is privacy-preserving, meaning

  17. Using Time-of-Flight Measurements for Privacy-Preserving Tracking in a Smart Room

    E-Print Network [OSTI]

    Radke, Rich

    for human assistance, or even detect anomalies in occupant behavior (e.g., alerting staff if an occupant-of-flight images are severely downsampled to preserve the privacy of the occupants and simulate future applications-of-flight, smart room, pose recognition, visual tracking, privacy preservation, occupancy detection I. INTRODUCTION

  18. Efficient, Context-Aware Privacy Leakage Confinement for Android Applications without Firmware Modding

    E-Print Network [OSTI]

    Yin, Heng

    Efficient, Context-Aware Privacy Leakage Confinement for Android Applications without Firmware of EECS Syracuse University Syracuse, USA heyin@syr.edu ABSTRACT As Android has become the most prevalent operating system in mo- bile devices, privacy concerns in the Android platform are increas- ing. A mechanism

  19. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    IccTA: Detecting Inter-Component Privacy Leaks in Android Apps Li Li, Alexandre Bartel, Tegawend if those are in different components. Since Android applications may leak private data carelessly or maliciously, we propose IccTA, a static taint analyzer to detect privacy leaks among components in Android

  20. Liberty Alliance Project: Version: 1.0 Liberty ID-WSF Security and Privacy

    E-Print Network [OSTI]

    Landau, Susan

    Liberty Alliance Project: Version: 1.0 Liberty ID-WSF Security and Privacy OverviewVersion: 1-idwsf-security-privacy-overview-v1.0.pdf Liberty Alliance Project 1 #12;Liberty Alliance Project: Version: 1.0 Liberty ID Alliance. Permission is hereby granted to11 use the document solely for the purpose of implementing

  1. PRIVACY POLICY AND PROCEDURES Policy #: 2100.2 LSU Health Sciences Center New Orleans Page: 1

    E-Print Network [OSTI]

    PRIVACY POLICY AND PROCEDURES Policy #: 2100.2 LSU Health Sciences Center New Orleans Page: 1 Date Effective: April 14, 2003 Patient Information Policy Privacy Official and Complaint Contact SCOPE: All, are referred to in this policy as LSUHSC-NO. PURPOSE: To establish the requirements and guidelines for each

  2. Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies Emil called Policy-Enhanced Private Set Intersection (PPSI), allowing two parties to share information while enforcing the de- sired privacy policies. Our constructions require minimal additional overhead over

  3. Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms Kan Yang, Xiaohua Jia-preserving data publish- subscribe service for cloud-based platforms. Specifically, we first formulate the problem of privacy-preserving data publish- subscribe service by refining its security requirements on cloud- based

  4. Trustees of the University of Pennsylvania Top 10 Facebook Privacy Settings

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    © Trustees of the University of Pennsylvania Top 10 Facebook Privacy Settings This document describes important settings on Facebook to help you protect your privacy. Bear in mind that Facebook is a powerful interactive tool with significant and often complicated sharing capabilities. Also, Facebook often

  5. A Privacy Preservation Model for Facebook-Style Social Network Systems

    E-Print Network [OSTI]

    A Privacy Preservation Model for Facebook-Style Social Network Systems Philip W. L. Fong1 , Mohd network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is dis- tinctly different from such existing access control

  6. A Privacy Preservation Model for Facebook-like Social Network Systems

    E-Print Network [OSTI]

    Regina, University of

    A Privacy Preservation Model for Facebook-like Social Network Systems Philip W. L. Fong, Mohd Anwar-0-7731-0659 (print) ISBN 978-0-7731-0660 (online) #12;A Privacy Preservation Model for Facebook-Like Social Network growth in the popularity of social network systems, with Facebook being an archetypical example. Due

  7. Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais, Hubert Ritzdorf, Mario potential privacy risks that are difficult to foresee. In this paper we study the impact that the prices a small set of low-priced product prices from the consumers' purchase histories, an adversary can de

  8. Solar PV Project Financing: Regulatory and Legislative Challenges for Third-Party PPA System Owners

    SciTech Connect (OSTI)

    Kollins, K.; Speer, B.; Cory, K.

    2009-11-01

    Residential and commercial end users of electricity who want to generate electricity using on-site solar photovoltaic (PV) systems face challenging initial and O&M costs. The third-party ownership power purchase agreement (PPA) finance model addresses these and other challenges. It allows developers to build and own PV systems on customers? properties and sell power back to customers. However, third-party electricity sales commonly face five regulatory challenges. The first three challenges involve legislative or regulatory definitions of electric utilities, power generation equipment, and providers of electric services. These definitions may compel third-party owners of solar PV systems to comply with regulations that may be cost prohibitive. Third-party owners face an additional challenge if they may not net meter, a practice that provides significant financial incentive to owning solar PV systems. Finally, municipalities and cooperatives worry about the regulatory implications of allowing an entity to sell electricity within their service territories. This paper summarizes these challenges, when they occur, and how they have been addressed in five states. This paper also presents alternative to the third-party ownership PPA finance model, including solar leases, contractual intermediaries, standardized contract language, federal investment tax credits, clean renewable energy bonds, and waived monopoly powers.

  9. AUTHORIZATION TO RELEASE FINANCIAL INFORMATION The Family Educational Rights and Privacy Act (FERPA) of 1974 is designed to protect the privacy of a student's

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    AUTHORIZATION TO RELEASE FINANCIAL INFORMATION The Family Educational Rights and Privacy Act (FERPA include financial aid, scholarship and billing/account information, and will not be released without to release confidential information to designated person(s). Student Name

  10. Bicycle Infrastructure that Extends beyond the Door: examining investments in bicycle-oriented design through a qualitative survey of commercial building owners and tenants

    E-Print Network [OSTI]

    Orrick, Phyllis; Frick, Karen; Ragland, David R

    2011-01-01

    package of sustainable design elements. In addition tosources for BOD design elements, requiring owners tobest practices of BOD design elements. This would be useful

  11. Privacy Act Officers Contact List | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . . . .Privacy

  12. Privacy Act | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . .Privacy Act

  13. U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 Timeline ofTurkey Near-Zero ZoneInsulation » PRIVACY

  14. Audit of joint owner costing and billing practices, Naval Petroleum Reserve No. 1, Elk Hills, California

    SciTech Connect (OSTI)

    Richards, J.R.

    1986-01-13

    The review showed a need for the Department to revise and strengthen cash management and cost allocation procedures and practices for jointly shared Reserve operating costs funded by the Government. The procedures and practices in effect for processing Joint Owner costs, billings and collections do not permit the Government to receive full advantage of the time value of money paid in behalf of Chevron or provide for the full sharing of all costs incurred by the Government to absorb unnecessary interest and operating costs since assuming responsibility for funding Reserve operations in October 1975. It is estimated that the Department would benefit by over $3 million per year if our recommendations in these areas are fully implemented.

  15. TECHNICAL SYSTEM ADMINISTRATION POLICY PAGE 2 of 2 Every system must have a designated system owner who is a full-time UNLV employee and is

    E-Print Network [OSTI]

    Walker, Lawrence R.

    #12;TECHNICAL SYSTEM ADMINISTRATION POLICY PAGE 2 of 2 POLICY Every system must have a designated administrators must know who the system owner is and must ensure that the security and access requirements, or transmits. Technical Administrators - Individuals who manage the system as the system owner or on behalf

  16. Channels and sources used to gather equine-related information by college-age horse owners and enthusiasts 

    E-Print Network [OSTI]

    Sullivan, Erin Alene

    2009-05-15

    This thesis identifies the equine-related topics that are important to Texas college-age horse owners and enthusiasts and the channels/sources they use to get equine-related information. Little research has focused on this group to determine...

  17. Teaching in computer security and privacy The Computer Laboratory's undergraduate and masters programmes

    E-Print Network [OSTI]

    Crowcroft, Jon

    computing security · Economics of cybercrime · Economics of information security · Formal methods · Hardware security · Location and positioning systems · Malware analysis · Medical information security · MobileTeaching in computer security and privacy The Computer Laboratory's undergraduate and masters

  18. Privacy in context : the costs and benefits of a new deidentification method

    E-Print Network [OSTI]

    Trepetin, Stanley

    2006-01-01

    The American public continues to be concerned about medical privacy. Policy research continues to show people's demand for health organizations to protect patient-specific data. Health organizations need personally ...

  19. Data Privacy and the Smart Grid: A Voluntary Code of Conduct...

    Energy Savers [EERE]

    (VCC) - Draft for Public Comment (September 2014) Data Privacy and the Smart Grid: A Voluntary Code of Conduct (VCC) - Draft for Public Comment (September 2014) In January 2012, OE...

  20. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    SciTech Connect (OSTI)

    Rothstein, M.A.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  1. A Regulator’s Privacy Guide to Third-Party Data Access for Energy Efficiency

    SciTech Connect (OSTI)

    Customer Information and Behavior Working Group

    2012-12-20

    Summarizes approaches taken by states on privacy and security issues related to third-party access to customer data and provides guidance on policy options for providing access to customer data.

  2. Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries.pettai@ut.ee, peeter.laud@cyber.ee Abstract We describe an automatic analysis to check secure multiparty computation

  3. Commercial Building Tenant Energy Usage Data Aggregation and Privacy: Technical Appendix

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.

    2014-11-12

    This technical appendix accompanies report PNNL–23786 “Commercial Building Tenant Energy Usage Data Aggregation and Privacy”. The objective is to provide background information on the methods utilized in the statistical analysis of the aggregation thresholds.

  4. Privacy preservation and auditing for ubiquitous mobile sensing applications and services

    E-Print Network [OSTI]

    Sumter, George C. (George Cody)

    2012-01-01

    The recent proliferation of mobile phones, with their many associated sensors, has opened the door to an entirely new range of insights and applications with a host of accompanying privacy concerns. In this thesis, we ...

  5. Safety Evaluation Report related to Hydrogen Control Owners Group assessment of Mark 3 containments

    SciTech Connect (OSTI)

    Li, C.Y.; Kudrick, J.A.

    1990-10-01

    Title 10 of the Code of Federal Regulations (10 CFR), Section 50.44 Standards for Combustible Gas Control System in Light-Water-Cooled Power Reactors,'' requires that systems be provided to control hydrogen concentration in the containment atmosphere following an accident to ensure that containment integrity is maintained. The purpose of this report is to provide regulatory guidance to licensees with Mark III containments with regard to demonstrating compliance with 10 CFR 50.44, Section (c)(3)(vi) and (c)(3)(vii). In this report, the staff provides its evaluation of the generic methodology proposed by the Hydrogen Control Owners Group. This generic methodology is documented in Topical Report HGN-112-NP, Generic Hydrogen Control Information for BWR/6 Mark III Containments.'' In addition, the staff has recommended that the vulnerability to interruption of power to the hydrogen igniters be evaluated further on a plant-specific basis as part of the individual plant examination of the plants with Mark III containments. 10 figs., 1 tab.

  6. Local Universities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCenter (LMI-EFRC) ProximityCenterLeeincreasesLocal

  7. Local Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E CChinaC L S C OLocal Information Local

  8. Are owners' reports of their dogs’ ‘guilty look’ influenced by the dogs’ action and evidence of the misdeed?

    E-Print Network [OSTI]

    Ostoji?, Ljerka; Tkal?i?, Mladenka; Clayton, Nicola S.

    2015-01-03

    Thus, our findings do not support th concurrent negative reaction by their © 2015 The Authors. Published bylocate /behavproc uenced by the dogs’ nija 4, 51000 Rijeka Croatia eeting behaviour after having performed a misdeed indicates ence suggests... whom the food was not replaced by the experimenter lude that their dog had performed the misdeed. ls and methods s ix owners and their dogs were tested in Croatia from 011 to January 2012 and from June to October 2013 (see partici which month curren...

  9. Local Option- Special Improvement Districts

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment...

  10. Local Option- Municipal Energy Districts

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment...

  11. Text-Alternative Version: The L Prize-Winning LED A19 Replacement—What Commercial Building Owners/Operators Can Expect in 2012

    Broader source: Energy.gov [DOE]

    Below is the text-alternative version of the "The L Prize-Winning LED A19 Replacement—What Commercial Building Owners/Operators Can Expect in 2012" webcast, held January 18, 2012.

  12. 29.01.03.M1.17 Information Resources Privacy Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    for university information resources. Reason The University has the right to examine information on information29.01.03.M1.17 Information Resources ­ Privacy Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.17 Information Resources ­ Privacy Approved July 18, 2005 Revised December 4, 2009 Revised August

  13. CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap Levente Buttyan Mark Felegyhazi Boldizsar Bencsath

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap Levente Butty´an M´ark F and user privacy. This paper shows a research roadmap of the CrySyS Lab from its inception in 2003 until Internet. The objective of this paper is to define a research roadmap to realize this goal. II. WHERE WE

  14. 3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University

    E-Print Network [OSTI]

    Keil, David M.

    3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University CSCI 135 Information Technology and Society 3. Security and privacy 1. Crime, law protections David Keil Information Technology and Society 5/13 1 Readings: Baase, Chapters 2 and 5 David Keil

  15. Geographic Privacy-aware Knowledge Discovery Fosca Giannotti2, Mirco Nanni2, Dino Pedreschi1, and Chiara Renso2

    E-Print Network [OSTI]

    Malerba, Donato

    , based on new privacy- preserving methods for extracting knowledge from large amounts of raw data ref in the advocated form of geographic knowledge a key driver, such as in transport, environment and risk management and sys- tems for knowledge discovery and delivery, based on new automated privacy-preserving methods

  16. Quantum Locality?

    SciTech Connect (OSTI)

    Stapp, Henry

    2011-11-10

    Robert Griffiths has recently addressed, within the framework of a ‘consistent quantum theory’ (CQT) that he has developed, the issue of whether, as is often claimed, quantum mechanics entails a need for faster-than-light transfers of information over long distances. He argues, on the basis of his examination of certain arguments that claim to demonstrate the existence of such nonlocal influences, that such influences do not exist. However, his examination was restricted mainly to hidden-variable-based arguments that include in their premises some essentially classical-physics-type assumptions that are fundamentally incompatible with the precepts of quantum physics. One cannot logically prove properties of a system by attributing to the system properties alien to that system. Hence Griffiths’ rejection of hidden-variable-based proofs is logically warranted. Griffiths mentions the existence of a certain alternative proof that does not involve hidden variables, and that uses only macroscopically described observable properties. He notes that he had examined in his book proofs of this general kind, and concluded that they provide no evidence for nonlocal influences. But he did not examine the particular proof that he cites. An examination of that particular proof by the method specified by his ‘consistent quantum theory’ shows that the cited proof is valid within that restrictive framework. This necessary existence, within the ‘consistent’ framework, of long range essentially instantaneous influences refutes the claim made by Griffiths that his ‘consistent’ framework is superior to the orthodox quantum theory of von Neumann because it does not entail instantaneous influences. An added section responds to Griffiths’ reply, which cites a litany of ambiguities that seem to restrict, devastatingly, the scope of his CQT formalism, apparently to buttress his claim that my use of that formalism to validate the nonlocality theorem is flawed. But the vagaries that he cites do not upset the proof in question. It is show here in detail why the precise statement of this theorem justifies the specified application of CQT. It is also shown, in response to his challenge, why a putative proof of locality that he has proposed is not valid.

  17. Westinghouse Owners Group Risk-Informed Regulation Efforts: Options 2 and 3

    SciTech Connect (OSTI)

    Brown, Jason A.; Osterrieder, Robert A.; Lutz, Robert J. [Westinghouse Electric Company LLC (United States); Dingler, Maurice [Wolf Creek Nuclear Operating Company, Burlington, KS (United States); Ward, Lewis A. [Southern Nuclear Company (United States)

    2002-07-01

    The U.S. Nuclear Regulatory Commission (NRC) has initiated efforts to incorporate risk-informed methods to redefine the scope of the existing 10 CFR 50 regulations (Option 2) and to change the technical requirements of the regulations (Option 3). The overall objectives of these efforts are to enhance plant safety, provide a framework for risk-informed regulations, add flexibility to plant operations, and reduce regulatory burden. The Westinghouse Owners Group (WOG) has a variety of active programs in the risk-informed area, including a program in the Option 2 and Option 3 areas. These two programs will be summarized including the benefits and the technical approach. The purpose of Option 2 is to make changes to the overall scope of structures, systems and components (SSCs) covered by 10 CFR 50 requiring special treatment by formulating new risk-informed safety classification categories that are linked to current definitions of safety-related and important-to-safety. This initiative would permit possible changes to the current special treatment requirements based on risk insights. The Nuclear Energy Institute (NEI) has developed an Option 2 implementation guideline (NEI 00-04 Draft Revision B). The WOG has initiated a program to validate the NEI guideline and to provide an initial cost-benefit assessment of the revised categorization and treatment under Option 2 via trial application to two systems at both Surry Unit 1 and Wolf Creek. The WOG Option 2 program includes consideration of all of the components in the selected systems, regardless of whether or not they are modeled in the respective plant probabilistic risk assessment (PRA) studies. As a result, quantitative risk measures are not available for many of the components being considered. In this case, the WOG program will provide valuable input to the NEI guideline. Additionally, the WOG program extends the use of both of the dominant methodologies for risk-informed ISI (RI-ISI) to address repair and replacement activities of pressure-retaining items per Code Cases under development within ASME. Therefore, feedback is provided on the consideration of passive components for extending both the WOG and Electric Power Research Institute (EPRI) RI-ISI methodologies for piping to all pressure-retaining items. In the Option 3 area, the WOG Large Break Loss-of-Coolant Accident (LBLOCA) Redefinition program is a risk-informed approach to improve select regulations (10 CFR 50.46, Appendix A, and Appendix K) such that the plant licensing basis is focused on LOCA break sizes up to a new maximum size. The new maximum break size will replace the existing requirement to consider break sizes up to and including double ended breaks of the largest primary system piping. Plants will retain the capability to mitigate a break of the largest primary system piping as evaluated using realistic success criteria and assumptions. The WOG is also providing input to the development of a risk-informed 10 CFR 50.44 based on insights from the WOG Severe Accident Management Guidance and plant-specific PRA studies. (authors)

  18. Multi-node Coordinated Jamming for Location Privacy Protection

    E-Print Network [OSTI]

    Gruteser, Marco

    precisely locate the target nodes. Although basic anti-localization techniques based on power control's localization systems. However, such a jamming technique has the problem of interfering with the communication such interference problems, those techniques generally induce co- ordination problems or require encryption

  19. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  20. Distributed controller design for a class of sparse singular systems with privacy constraints

    E-Print Network [OSTI]

    Hirche, Sandra

    is the desire to ensure privacy of subsystems. This gives motivation for the presented distributed controller is the presence of algebraic conservation constraints, for example in terms of energy or mass flow. Therefore subsystem or to some centralized entity. In the power system, for example, the intro- duction of smart

  1. Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns

    E-Print Network [OSTI]

    Hengartner, Urs

    , most browsers allow user to delete cookies, and a privacy-conscious user might choose to do so after mode offered by most modern browsers, effectively blocking some information from being sent out. Recent protection for Internet users has been identified as a major problem in modern web browsers. Despite poten

  2. A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias Schunter

    E-Print Network [OSTI]

    Backes, Michael

    A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias proposed by IBM. The basic definition is refinement, i.e., the question whether fulfilling one policy been #12;102 Michael Backes, Birgit Pfitzmann, and Matthias Schunter collected has to govern the use

  3. Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond Scott E. Coull Red of communication among consumers around the world. Apple iMessage, for example, handles over 2 bil- lion message evaluation focuses on Apple iMessage, the attacks are completely generic and we show how they can be applied

  4. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 EPPA: An Efficient and Privacy-Preserving

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    generation plants to customers) and demand-driven response. Smart grid combines traditional grid-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Member, IEEE, Xiaohui Liang, Student. In this paper, we propose an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid

  5. SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment

    E-Print Network [OSTI]

    Madiraju, Praveen

    discovery process lightweight and secure. In this paper we present details of the trust and risk models. We of devices running in a pervasive computing environment [10]. The resource discovery process demands modelsSSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing

  6. Onions for Sale: Putting Privacy on the Market Aaron Johnson, Rob Jansen, and Paul Syverson

    E-Print Network [OSTI]

    Johnson, Aaron

    Overview Onion routing, and in particular the Tor network, is tech- nically well-designed to provideD RA FT Onions for Sale: Putting Privacy on the Market Aaron Johnson, Rob Jansen, and Paul Syverson source of trust. Proposed Solution We propose that Tor supports the optional purchase of its services

  7. A Privacy-Aware Architecture For Demand Response Systems Stephen Wicker, Robert Thomas

    E-Print Network [OSTI]

    Wicker, Stephen

    A Privacy-Aware Architecture For Demand Response Systems Stephen Wicker, Robert Thomas School architectures that realize the benefits of demand response without requiring that AMI data be centrally-based demand response efforts in the face of public outcry. We also show that Trusted Platform Modules can

  8. Supporting Network Formation through Mining under Privacy Constraints Florian Skopik, Daniel Schall, Schahram Dustdar

    E-Print Network [OSTI]

    Dustdar, Schahram

    , group formation, privacy issues, service-centric collaborations I. INTRODUCTION Small and medium-sized and small companies come together and form virtual communities to compete with global players of service-oriented architectures (SOA), interactions between partners have become observable. Monitoring col

  9. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing Marten van Dijk of computing resources. Clients' lack of direct resource control in the cloud prompts con- cern about de- manded by common cloud computing services, even with such pow- erful tools as FHE. We formally

  10. Competitive Privacy in the Smart Grid: An Information-theoretic Approach

    E-Print Network [OSTI]

    Sankar, Lalitha; Tandon, Ravi; Poor, H Vincent

    2011-01-01

    Advances in sensing and communication capabilities as well as power industry deregulation are driving the need for distributed state estimation in the smart grid at the level of the regional transmission organizations (RTOs). This leads to a new competitive privacy problem amongst the RTOs since there is a tension between sharing data to ensure network reliability (utility/benefit to all RTOs) and withholding data for profitability and privacy reasons. The resulting tradeoff between utility, quantified via fidelity of its state estimate at each RTO, and privacy, quantified via the leakage of the state of one RTO at other RTOs, is captured precisely using a lossy source coding problem formulation for a two RTO network. For a two-RTO model, it is shown that the set of all feasible utility-privacy pairs can be achieved via a single round of communication when each RTO communicates taking into account the correlation between the measured data at both RTOs. The lossy source coding problem and solution developed he...

  11. ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING bodies to accelerate the federal government's secure adoption of cloud computing. NIST's goal is to foster cloud computing systems and practices; support interoperability, portability, and security

  12. Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems

    E-Print Network [OSTI]

    Gruteser, Marco

    gruteser@winlab.rutgers.edu ABSTRACT Research on smart meters has shown that fine-grained en- ergy usage data poses privacy risks since it allows inferences about activities inside homes. While smart meter for remotely collecting us- age data from electricity, gas, and water meters. Yet to the best of our knowledge

  13. Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems

    E-Print Network [OSTI]

    Xu, Wenyuan

    gruteser@winlab.rutgers.edu ABSTRACT Research on smart meters has shown that fine-grained en- ergy usage data poses privacy risks since it allows inferences about activities inside the home. While smart meter for remotely collecting us- age data from electricity, gas, and water meters. Yet to the best of our knowledge

  14. Utility of Privacy Preservation for Health Data Publishing Lengdong Wu, Hua He, Osmar R. Zaane

    E-Print Network [OSTI]

    Zaiane, Osmar R.

    Utility of Privacy Preservation for Health Data Publishing Lengdong Wu, Hua He, Osmar R. Zaïane is putting in question the utility of the health data after severe anonymization. 1. Introduction Health, they also significantly hinder the data utility for research purposes. In this paper we investigate several

  15. Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images

    E-Print Network [OSTI]

    Roe, Paul

    Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images Chaw-Seng Woo1, and tampering can be de- tected using a fragile watermark. The embedded pa- tient data not only save storage embedding and the effectiveness of locating tampered regions. 1. Introduction As we move into the digital

  16. DataBank: An Economics Based Privacy Preserving System for Distributing Relevant Advertising and Content

    E-Print Network [OSTI]

    Lillibridge, Mark

    DataBank: An Economics Based Privacy Preserving System for Distributing Relevant Advertising, advertising, personalization, search A critical feature of successful new advertising models has been their reliance on knowledge of various types of personal user data in order to make advertisements relevant

  17. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  18. Privacy-Aware Mechanism Design KOBBI NISSIM, Ben-Gurion University

    E-Print Network [OSTI]

    Fiat, Amos

    Privacy-Aware Mechanism Design KOBBI NISSIM, Ben-Gurion University CLAUDIO ORLANDI, Bar-Ilan University RANN SMORODINSKY, Technion Mechanism design deals with distributed algorithms that are executed are not necessarily in alignment with the objective of the mechanism. Traditionally, mechanisms are designed

  19. A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid

    E-Print Network [OSTI]

    Fang, Yuguang "Michael"

    1 A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid Yanmin Gong to both grid operators and customers, exploiting the full potential of demand response. However to be attributable to individuals. However, this assumption does not hold in incentive-based demand response (IDR

  20. PRIVACY NOTICE At The Maksin Group, we value the trust our customers have placed in us.

    E-Print Network [OSTI]

    Wenderholm, Elaine

    personal information. ACCESS TO YOUR PERSONAL INFORMATION You have a right to request a copy of personal information. You have a right to have us amend your health information for as long as we maintain such information. You have a right to obtain a paper copy of this Privacy Notice. For any of the above requests

  1. A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece

    E-Print Network [OSTI]

    Ioannidis, Sotiris

    A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece Eleni Gessiou of AMKA in Greece in the future, along the lines of the Social Security Number in the US. 1. INTRODUCTION that is made publicly available (e.g., on the face of student ID cards at Universities [5]). Greece recently

  2. GEMSS: Privacy and security for a Medical Grid Jean A.M. Herveg1

    E-Print Network [OSTI]

    Middleton, Stuart E.

    GEMSS: Privacy and security for a Medical Grid Jean A.M. Herveg1 , Federico Crazzolara2 , Stuart E the GEMSS Grid middleware. The security technology employed is based on a public key infrastructure (PKI providers are sufficiently secure. 2. Keywords Grid, Legal, Medical, Personal Data, Security 3. Introduction

  3. Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C. Mitchell

    E-Print Network [OSTI]

    Mitchell, John C.

    Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C helen.nissenbaum@nyu.edu Abstract Contextual integrity is a conceptual framework for un- derstanding for expressing and reasoning about norms of transmission of personal information. In comparison with access

  4. July 1, 2006 -OHSU Ancillaries (Indirect Providers1 & Revisions to Oregon's Genetic Privacy Law

    E-Print Network [OSTI]

    Chapman, Michael S.

    July 1, 2006 - OHSU Ancillaries (Indirect Providers1 ) & Revisions to Oregon's Genetic Privacy Law Reports. OHSU Ancillaries (Indirect Providers) Who Receive Specimens or Health Information from non encryption that is kept separately from the specimen or information. Last Updated 6/27/2006 http://ozone.ohsu.edu/cc/gen/ancillary

  5. AndroidLeaks: Automatically Detecting Potential Privacy Leaks In Android Applications

    E-Print Network [OSTI]

    Chen, Hao

    AndroidLeaks: Automatically Detecting Potential Privacy Leaks In Android Applications on a Large of sensitive information, they may leak it carelessly or maliciously. Google's Android operating systemLeaks, a static analysis framework for automatically finding poten- tial leaks of sensitive information in Android

  6. Toward Standardization in Privacy-Preserving Data Mining Stanley R. M. Oliveira1,2

    E-Print Network [OSTI]

    Zaiane, Osmar R.

    Toward Standardization in Privacy-Preserving Data Mining Stanley R. M. Oliveira1,2 and Osmar R. Zaïane1 {oliveira | zaiane}@cs.ualberta.ca 1 Department of Computing Science University of Alberta techniques, the new generation in PPDM moves on toward standardization because it will certainly play

  7. Security and Privacy for Partial Order Time Sean W. Smith J.D. Tygar

    E-Print Network [OSTI]

    Tygar, Doug

    and privacy risks. Se- cure partial order clocks provide a general method to develop application protocols time service simpli es and clari es the This research was sponsored in part by the Advanced Re- search Projects Agency under contract number F19628-93-C- 0193, IBM, Motorola, the National Science Foundation

  8. Tax Policy Litmus Tests: Enforceability, Privacy, and Efficiency Jon M. Peha1

    E-Print Network [OSTI]

    Peha, Jon M.

    Tax Policy Litmus Tests: Enforceability, Privacy, and Efficiency Jon M. Peha1 Professor of electrical engineering & public policy, Carnegie Mellon University, and Independent Consultant Testimony and public policy at Carnegie Mellon University, and an independent consultant, but today I am representing

  9. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 EPPDR: An Efficient Privacy-Preserving

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    response can maintain supply-demand balance and reduce users' electricity bills. Furthermore, it is also indicates that EPPDR can achieve privacy-preservation of electricity demand, forward secrecy of users of electricity [2]. One appealing feature of smart grid is demand response (DR), which can assist users to use

  10. TITLE: HIPAA PRIVACY AND INFORMATION SECURITY TRAINING FOR COLUMBIA UNIVERSITY MEDICAL CENTER WORKFORCE

    E-Print Network [OSTI]

    Columbia University

    . The online training includes two modules. o HIPAA Privacy o Security Essentials Workforce members shall "Compliance") and select training module TC0019 (HIPAA: Health Insurance Portability and Accountability Act) is provided through the online training modules. It is the responsibility of each school to assure that all

  11. Challenges in Retaining Privacy in Smart Spaces Jimmy C. Chau and T.D.C. Little

    E-Print Network [OSTI]

    Little, Thomas

    individuals in an office building in which the infrastructure ("smart spaces") provides services to identifyChallenges in Retaining Privacy in Smart Spaces Jimmy C. Chau and T.D.C. Little Department, ubiquitous networking, and other in- door automation infrastructure enable buildings to operate more

  12. Detecting Social Cliques for Automated Privacy Control in Online Social Networks

    E-Print Network [OSTI]

    Kruegel, Christopher

    introduced privacy mechanisms (such as Facebook's friend lists) that enable users to expose a particular of sensitive data is exposed only to the members of a particular clique. Our evaluation on the Facebook typically cover a large fraction of the actual social cliques. I. INTRODUCTION Over the past few years

  13. Sherlock Holmes's Evil Twin: On The Impact of Global Inference for Online Privacy

    E-Print Network [OSTI]

    Sommer, Robin

    --can live on forever [10]. No wonder that the new generation of "social web services," such as Facebook]. Facebook's introduction of "Places" likewise drew significant criticism for its default settings, which]. It can be hard to separate hype from actual risk in such discus- sions. Still, online privacy research

  14. Facebook or Fakebook?: The effect of simulation on location privacy user studies

    E-Print Network [OSTI]

    Henderson, Tristan

    Facebook or Fakebook?: The effect of simulation on location privacy user studies Iain Parris, Fehmi users' actual pri- vacy behaviours and their responses to survey questions [1]. In an attempt to reduce-sharing behaviour in the online social network Facebook, we recruited 40 undergraduate students (17 male, 23 female

  15. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 11 Patient Privacy Policies Effective: April 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 11 Patient Privacy Policies Effective: April 2003 Section 11.2 Uses and Disclosures of Protected Health Information Revised: March 2013 OR ADMINISTRATIVE PROCEEDINGS Policy The Health Science Center may disclose protected health information without

  16. Resources for Local Policymakers

    SciTech Connect (OSTI)

    SEE Action

    2012-06-01

    Provides a summary of State and Local Energy Efficiency Action Network (SEE Action) information resources available to local policymakers, organized by topic.

  17. Investigating User Privacy in Android Ad Libraries Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson and Hao Chen

    E-Print Network [OSTI]

    Chen, Hao

    Erickson and Hao Chen University of California, Davis {rcstevens, cdgibler, jcrussell, jericks, chen information the app collects [39] and a more general "Consumer Privacy Bill of Rights" that is supposed

  18. When the Left Hand and the Right Hand Cooperate Without Informing their Owner

    E-Print Network [OSTI]

    Brian Dodson

    2006-05-08

    A specific instantiation of classical correlation from entangled quantum resources can be established at a distance through the use of local measurements without classical communication. It is thereby possible to, e.g., allow distant entities to randomly combine forces on a course of action which is an element of a predetermined set of possible actions. When this protocol is used, no one knows which action has been chosen. The protocol is intrinsically secure in the same sense as a one-time pad. The entities must have a shared entanglement resource, be able to measure that resource in a predetermined reference frame, and know what they must do to carry out all of the possible actions.

  19. Copyright 2014 -Copyright Information, Privacy Statement, and Terms of Use American Society of Agronomy | Crop Science Society of America | Soil Science Society of America

    E-Print Network [OSTI]

    Sparks, Donald L.

    © Copyright 2014 - Copyright Information, Privacy Statement, and Terms of Use American Society of Agronomy | Crop Science Society of America | Soil Science Society of America 5585 Guilford Road | Madison

  20. Hot Works Procedures and Protocols Last Updated: 2/14/2014 Owner: Safety and Risk Management Director Page 1 of 6

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    Hot Works Procedures and Protocols Last Updated: 2/14/2014 Owner: Safety and Risk Management Director Page 1 of 6 INTRODUCTION The Office of Safety and Risk Management (SRM) has developed, implemented will notify the Office of Safety and Risk Management whether or not a fire watch is required. The Office

  1. PRESOLICITATION Category: A. Owner: Department of Energy, Oak Ridge National Laboratory -UT Battelle LLC (DOE Contractor), Oak Ridge National Laboratory, Bethel

    E-Print Network [OSTI]

    Hively, Lee M.

    PRESOLICITATION Category: A. Owner: Department of Energy, Oak Ridge National Laboratory - UT Battelle LLC (DOE Contractor), Oak Ridge National Laboratory, Bethel Valley Road P.O. Box 2008, Oak Ridge-Battelle), the management and operating contractor for the United States Department of Energy's Oak Ridge National

  2. 50,000-Watt AM Stations IA | MB | MI | MN | NE | ND | ON | SD | WI | Station News | Owners | TV Captures | Links

    E-Print Network [OSTI]

    Allen, Gale

    that broadcast with a power of 50,000 Watts day and night. Some of these stations are what was once known50,000-Watt AM Stations IA | MB | MI | MN | NE | ND | ON | SD | WI | Station News | Owners | TV Captures | Links 50,000-Watt AM stations This list includes AM stations in the United States and Canada

  3. Faced with rising fuel costs, building and home owners are looking for energy-efficient solutions. Improving the building envelope (roof or attic system, walls,

    E-Print Network [OSTI]

    Pennycook, Steve

    Faced with rising fuel costs, building and home owners are looking for energy- efficient solutions penetration rates; validate models; and assist industry to develop new and more energy-efficient materials systems) resulting in affordable, moisture-durable products to increase energy efficiency. · ORNL

  4. Faced with rising fuel costs, building and home owners are looking for energy-efficient solutions. Improving the building envelope (roof or attic system, walls,

    E-Print Network [OSTI]

    Pennycook, Steve

    Faced with rising fuel costs, building and home owners are looking for energy- efficient solutions rates; validate models; and assist industry to develop new and more energy-efficient materials-durable products to increase energy efficiency. · ORNL established test facilities to measure essential property

  5. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

    E-Print Network [OSTI]

    Blundo, Carlo; Gasti, Paolo

    2011-01-01

    This paper presents the first practical construction for privacy-preserving evaluation of sample set similarity, based on the well-known Jaccard index measure. In this problem, two mutually distrustful entities determine how similar their sets are, without disclosing their content to each other. We propose two efficient protocols: the first securely computes the Jaccard index of two sets; the second approximates it using MinHash techniques, at a significantly lower cost and with same privacy guarantees. This building block is attractive in many relevant applications, including document similarity, biometric authentication, multimedia file retrieval, and genetic tests. We demonstrate, both analytically and experimentally, that our constructions -- while not bounded to any specific application -- are appreciably more efficient than prior specialized techniques.

  6. Privacy of Your Health Information This notice describes how medical information about you may be used and disclosed and how you

    E-Print Network [OSTI]

    Acton, Scott

    1 Privacy of Your Health Information This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review it carefully") is committed to protecting the privacy of your protected health information. Protected health information

  7. Local Option- Energy-Efficiency Improvement Loans

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment...

  8. Carsharing: A Guide for Local Planners

    E-Print Network [OSTI]

    Cohen, Adam P.; Shaheen, Susan; McKenzie, Ryan

    2008-01-01

    air quality, noise, and emissions. Former car owners changeEmissions Reduced by 168,000 Tons Per Year Thanks to Car-emission vehicles, including gasoline-electric hybrid cars,

  9. Local Option- Property Assessed Clean Energy Financing

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via property taxes, with...

  10. Overview of the State and Local Energy Efficiency Action Network

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Working Group plans for this year * New guidance documents were published - Energy Efficiency Program Impact Evaluation Guide - Guide for Regulators on Data Access and Privacy -...

  11. This journal is c the Owner Societies 2013 Phys. Chem. Chem. Phys. Cite this: DOI: 10.1039/c3cp44574g

    E-Print Network [OSTI]

    Marks, Laurence D.

    This journal is c the Owner Societies 2013 Phys. Chem. Chem. Phys. Cite this: DOI: 10.1039/c3cp 2012, Accepted 4th February 2013 DOI: 10.1039/c3cp44574g www.rsc.org/pccp PCCP PERSPECTIVE DownloadedbyNorthwesternUniversityon20February2013 Publishedon04February2013onhttp://pubs.rsc.org|doi:10.1039/C3CP44574G View Article

  12. The Culture of Surveillance Revisited: Total Information Awareness and the New Privacy Landscape

    E-Print Network [OSTI]

    Staples, William G.

    2005-04-01

    the likes of Jeff Bezos that a jack boot on the neck will raise the hackles of the public, but offer them great prices and free shipping and people will gladly hand over their “personal information.” Or as neo-liberal Nikolas Rose puts it, “To govern humans...-192 in Computers, Surveillance, and Privacy edited by David Lyon and Elia Zureik. Minneapolis: University of Minne- sota Press. Rose, Nikolas. 1999. Powers of Freedom: Reframing Political Thought. Cambridge, UK: Cambridge University Press. Shachtman, Noah. 2003...

  13. Privacy Impact Assessment | OSTI, US Dept of Energy, Office of Scientific

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . .Privacy

  14. Local Regression and Likelihood

    E-Print Network [OSTI]

    Masci, Frank

    Local Regression and Likelihood Clive Loader Springer #12;#12;#12;#12;#12;Preface This book, and the associated software, have grown out of the author's work in the field of local regression over the past- ods and in particular regression, for example at the level of Draper and Smith (1981). The theoretical

  15. Mobilizing Local Government Law for Low-Wage Workers

    E-Print Network [OSTI]

    Cummings, Scott L

    2009-01-01

    benefits agreement (?CBA?) responds to this enforcement gapdecision making. 92 The first CBA was negotiated by theapproval to negotiate a CBA with the owners of the Staples

  16. Geography of local configurations

    E-Print Network [OSTI]

    David Coupier

    2010-10-12

    A $d$-dimensional binary Markov random field on a lattice torus is considered. As the size $n$ of the lattice tends to infinity, potentials $a=a(n)$ and $b=b(n)$ depend on $n$. Precise bounds for the probability for local configurations to occur in a large ball are given. Under some conditions bearing on $a(n)$ and $b(n)$, the distance between copies of different local configurations is estimated according to their weights. Finally, a sufficient condition ensuring that a given local configuration occurs everywhere in the lattice is suggested.

  17. Family Privacy Protection Act Policy (Enacted Pursuant to S.C. Code Section 30-2-10 et. seq.)*

    E-Print Network [OSTI]

    Stuart, Steven J.

    foundations and entities and to provide goods and services to its students, parents, alumni and employees Educational and Right to Privacy Act (20 USC 1232g), as appropriate. 4. Campus Directory Information. The university has determined that publication of its annual campus telephone directory is a business necessity

  18. AIM Access Request Access to confidential student information is protected under the Family Educational Rights and Privacy Act (FERPA), and

    E-Print Network [OSTI]

    Hart, Gus

    of the options below and provide the required information to the right. Replace an existing employee who hasAIM Access Request Access to confidential student information is protected under the Family Educational Rights and Privacy Act (FERPA), and access should only be requested when there is a need to access

  19. PRIVACY AND CONFIDENTIALITY OF PATIENT INFORMATION The University of Connecticut School of Medicine (UConn SOM) and affiliated sites establish

    E-Print Network [OSTI]

    Page 148 ` PRIVACY AND CONFIDENTIALITY OF PATIENT INFORMATION The University of Connecticut School patient information that is protected from disclosure by both Connecticut and federal laws in all respects with both Connecticut and federal laws, such as HIPAA. For the UConn Health's full policy

  20. Location Privacy with Road network Mix-zones Balaji Palanisamy, Ling Liu, Kisung Lee, Aameek Singh and Yuzhe Tang

    E-Print Network [OSTI]

    Liu, Ling

    Location Privacy with Road network Mix-zones Balaji Palanisamy, Ling Liu, Kisung Lee, Aameek Singh attacks that make mix-zones on road networks vulnerable and illustrate a set of counter measures to make road network mix-zones attack resilient. Concretely, we categorize the vulnerabilities of road network

  1. Local Public Finance

    E-Print Network [OSTI]

    Quigley, John M.

    2008-01-01

    1959. The Theory of Public Finance. New York: McGraw-Hill.T. 2003. School finance, spatial income segregation, and theJohn M. "local public finance." The New Palgrave Dictionary

  2. In Second International Workshop on Security and Privacy in Cloud Computing, Minneapolis, MN. 24 June 2011. Private Editing Using Untrusted Cloud Services

    E-Print Network [OSTI]

    Evans, David

    In Second International Workshop on Security and Privacy in Cloud Computing, Minneapolis, MN. 24 of Virginia MightBeEvil.com Abstract--We present a general methodology for protecting the confidentiality

  3. NOTIFICATION OF STUDENT RIGHTS UNDER FERPA The Family Educational Rights and Privacy Act (FERPA) affords students certain rights with respect to their

    E-Print Network [OSTI]

    NOTIFICATION OF STUDENT RIGHTS UNDER FERPA The Family Educational Rights and Privacy Act (FERPA or company with whom the University has contracted as its agent to provide a service instead of using

  4. Local STAR Libraries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCenter (LMI-EFRC) ProximityCenterLeeincreasesLocal HighLocal

  5. Local Blog Get Listed

    E-Print Network [OSTI]

    Chiao, Jung-Chih

    Home· Local Blog· Get Listed· Popular Listings· More Directories· Advertise Here· Home » Arlington ... | directoryofarlingt... 1/9/2011http://www.directoryofarlington.com/blog/2011/01/ut ... | directoryofarlingt... 1/9/2011http://www.directoryofarlington.com/blog/2011/01/ut

  6. Lithium Local Pseudopotential Using

    E-Print Network [OSTI]

    Petta, Jason

    Lithium Local Pseudopotential Using DFT Sergio Orozco Student Advisor: Chen Huang Faculty Mentor Lithium LPS Test Lithium LPS #12;Density Functional Theory (DFT) Successful quantum mechanical approach (1979) #12;Building LPS for Lithium Create a LPS using NLPS density for Lithium Test LPS by comparing

  7. Supersymmetry and localization

    E-Print Network [OSTI]

    Albert Schwarz; Oleg Zaboronsky

    1995-11-15

    We study conditions under which an odd symmetry of the integrand leads to localization of the corresponding integral over a (super)manifold. We also show that in many cases these conditions guarantee exactness of the stationary phase approximation of such integrals.

  8. LEEDBuilding LocalGovernments

    E-Print Network [OSTI]

    Radcliffe, David

    their jurisdictions' green building programs. #12;1LEED Building Ordinances for Local Governments LEED Building are increasingly common. Most of these ordinances adopt the Leadership in Energy and Environmental Design (LEED) Green Rating System, promulgated by the U.S. Green Building Council (USGBC). The LEED rating system sets

  9. Local microwave background radiation

    E-Print Network [OSTI]

    Domingos Soares

    2014-11-13

    An inquiry on a possible local origin for the Microwave Background Radiation is made. Thermal MBR photons are contained in a system called {\\it magnetic bottle} which is due to Earth magnetic field and solar wind particles, mostly electrons. Observational tests are anticipated.

  10. NEW DIRECTIONS IN LOCAL HISTORY

    E-Print Network [OSTI]

    Banaji,. Murad

    NEW DIRECTIONS IN LOCAL HISTORY SINCE HOSKINS Edited by Christopher Dyer, Andrew Hopper, Evelyn Lord and Nigel Tringham New Directions in Local History since Hoskins Local history in Britain can of the publication of his Local History in England which was designed to help people researching the history

  11. Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPress

  12. Privacy Resources

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeedingProgramExemptions | National Nuclear SecurityRecords | Department

  13. Privacy Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . . . . . . .

  14. Privacy Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices inPrincipalFirm Exchange . . . . . .

  15. The Local Interstellar Medium

    E-Print Network [OSTI]

    Redfield, S

    2006-01-01

    The Local Interstellar Medium (LISM) is a unique environment that presents an opportunity to study general interstellar phenomena in great detail and in three dimensions. In particular, high resolution optical and ultraviolet spectroscopy have proven to be powerful tools for addressing fundamental questions concerning the physical conditions and three-dimensional (3D) morphology of this local material. After reviewing our current understanding of the structure of gas in the solar neighborhood, I will discuss the influence that the LISM can have on stellar and planetary systems, including LISM dust deposition onto planetary atmospheres and the modulation of galactic cosmic rays through the astrosphere - the balancing interface between the outward pressure of the magnetized stellar wind and the inward pressure of the surrounding interstellar medium. On Earth, galactic cosmic rays may play a role as contributors to ozone layer chemistry, planetary electrical discharge frequency, biological mutation rates, and cl...

  16. Medial Axis Local Planner: Local Planning for Medial Axis Roadmaps 

    E-Print Network [OSTI]

    Manavi, Kasra Mehron

    2012-07-16

    implemented this local planner and have tested it in 2D and 3D rigid body and 8D and 16D fixed base articulated linkage environments. We compare MALP with a straight-line local planner (SL), a typical local planer used in motion planning that interpolated...

  17. Bayesian locally weighted online learning 

    E-Print Network [OSTI]

    Edakunni, Narayanan U.

    2010-01-01

    Locally weighted regression is a non-parametric technique of regression that is capable of coping with non-stationarity of the input distribution. Online algorithms like Receptive FieldWeighted Regression and Locally ...

  18. Local Experts in Social Media 

    E-Print Network [OSTI]

    Bachani, Vandana

    2013-12-04

    The problem of finding topic experts on social networking sites has been a continued topic of research. This thesis addresses the problem of identifying local experts in social media systems like Twitter. Local experts are experts with a topical...

  19. The Local Interstellar Medium

    E-Print Network [OSTI]

    Seth Redfield

    2006-01-06

    The Local Interstellar Medium (LISM) is a unique environment that presents an opportunity to study general interstellar phenomena in great detail and in three dimensions. In particular, high resolution optical and ultraviolet spectroscopy have proven to be powerful tools for addressing fundamental questions concerning the physical conditions and three-dimensional (3D) morphology of this local material. After reviewing our current understanding of the structure of gas in the solar neighborhood, I will discuss the influence that the LISM can have on stellar and planetary systems, including LISM dust deposition onto planetary atmospheres and the modulation of galactic cosmic rays through the astrosphere - the balancing interface between the outward pressure of the magnetized stellar wind and the inward pressure of the surrounding interstellar medium. On Earth, galactic cosmic rays may play a role as contributors to ozone layer chemistry, planetary electrical discharge frequency, biological mutation rates, and climate. Since the LISM shares the same volume as practically all known extrasolar planets, the prototypical debris disks systems, and nearby low-mass star-formation sites, it will be important to understand the structures of the LISM and how they may influence planetary atmospheres.

  20. Local Option- Property Tax Exemption for Renewable Energy Systems

    Broader source: Energy.gov [DOE]

    Colorado enacted S.B. 07-145 in April 2007, authorizing counties and municipalities to offer property or sales tax rebates or credits to residential and commercial property owners who install...

  1. Performing a local barrier operation

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

    2014-03-04

    Performing a local barrier operation with parallel tasks executing on a compute node including, for each task: retrieving a present value of a counter; calculating, in dependence upon the present value of the counter and a total number of tasks performing the local barrier operation, a base value, the base value representing the counter's value prior to any task joining the local barrier; calculating, in dependence upon the base value and the total number of tasks performing the local barrier operation, a target value of the counter, the target value representing the counter's value when all tasks have joined the local barrier; joining the local barrier, including atomically incrementing the value of the counter; and repetitively, until the present value of the counter is no less than the target value of the counter: retrieving the present value of the counter and determining whether the present value equals the target value.

  2. Performing a local barrier operation

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

    2014-03-04

    Performing a local barrier operation with parallel tasks executing on a compute node including, for each task: retrieving a present value of a counter; calculating, in dependence upon the present value of the counter and a total number of tasks performing the local barrier operation, a base value of the counter, the base value representing the counter's value prior to any task joining the local barrier; calculating, in dependence upon the base value and the total number of tasks performing the local barrier operation, a target value, the target value representing the counter's value when all tasks have joined the local barrier; joining the local barrier, including atomically incrementing the value of the counter; and repetitively, until the present value of the counter is no less than the target value of the counter: retrieving the present value of the counter and determining whether the present value equals the target value.

  3. CS 535 -Wireless Network Security This is a 3-credit course that focuses on security and privacy issues in wireless networks and

    E-Print Network [OSTI]

    Levi, Albert

    CS 535 - Wireless Network Security Fall 2013 This is a 3-credit course that focuses on security and privacy issues in wireless networks and systems. Generally the security of MAC and especially upper layers information for this course (see below) several sub areas of wireless network security, in this course we

  4. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, and Viktor Prasanna

    E-Print Network [OSTI]

    Hwang, Kai

    An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Yogesh are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid

  5. Onsrud, H.J., J. Johnson, and X. Lopez, "Protecting Personal Privacy in Using Geographic Information Systems", Photogrammetric Engineering and Remote Sensing, 1994, LX(9), 1083-

    E-Print Network [OSTI]

    Onsrud, Harlan J.

    Personal Privacy in Using Geographic Information Systems Harlan J. Onsrud, Jeff P. Johnson and Xavier Lopez in such capabilities is being estimated in many billions of dollars. Geographic information systems Information Systems", Photogrammetric Engineering and Remote Sensing, 1994, LX(9), 1083- 1095 Protecting

  6. NOTICE OF PRIVACY PRACTICES FOR PROTECTED HEALTH INFORMATION THIS NOTICE DESCRIBES HOW INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS

    E-Print Network [OSTI]

    Kulp, Mark

    NOTICE OF PRIVACY PRACTICES FOR PROTECTED HEALTH INFORMATION THIS NOTICE DESCRIBES HOW INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW health information is kept private. It also requires us to give you this Notice which explains our legal

  7. AUTHORIZATION TO DISCLOSE AND USE INFORMATION FERPA, also known as the Buckley Amendment, is a federal law that gives students' some rights of privacy and dis-

    E-Print Network [OSTI]

    Alpay, S. Pamir

    AUTHORIZATION TO DISCLOSE AND USE INFORMATION FERPA, also known as the Buckley Amendment, is a federal law that gives students' some rights of privacy and dis- closure over the records and documents, the University may not disclose the information contained in student education records without a student

  8. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 381 RFID Security and Privacy: A Research Survey

    E-Print Network [OSTI]

    Xu, Wenyuan

    items. 2) Automation: Barcodes, being optically scanned, require line-of-sight contact with readers, counterfeiting, elec- tronic product code (EPC), privacy, radio frequency identification (RFID), security. I. INTRODUCTION RADIO FREQUENCY IDENTIFICATION (RFID) is a technology for automated identification of objects

  9. ANDERSON LOCALIZATION FOR TIME PERIODIC

    E-Print Network [OSTI]

    disorder, Anderson localization in Z d is stable un- der localized time-periodic perturbations by proving random Schrodinger operators at large disorder has been well known since the seminal work of Fr is approximated by the potential V . The equation governing the system is (1.5) i @ @t = (#1; + V ) on Z d #2

  10. Local Power in Quantum Mechanics

    E-Print Network [OSTI]

    Guillermo Albareda; Fabio Lorenzo Traversa; Xavier Oriols

    2015-11-12

    A general expression for the local power of a quantum system is derived. Defined as the time rate of change of the kinetic energy evaluated in a finite volume $\\Omega$ of the physical space, the local power exhibits contributions from both many-body classical and quantum correlations. Significantly, quantum correlations are manifested through the presence of non-local sources/sinks of power and through the action of local forces with no classical counterpart. The soundness of our results is proved along three limits of particular relevance: the closed-system limit ($\\Omega \\to \\infty$), the limit of non-interacting particles, and invoking classicality. Interestingly, we show that quantum fingerprints arise on the local power expression only when the volume $\\Omega$ is finite. Otherwise we recover a classical-like expression. This work could be of particular interest in the field of nanoelectronics, where the realization of a zero-power technology constitutes a long standing challenge.

  11. Local Termination: theory and practice

    E-Print Network [OSTI]

    Endrullis, Joerg; Waldmann, Johannes

    2010-01-01

    The characterisation of termination using well-founded monotone algebras has been a milestone on the way to automated termination techniques, of which we have seen an extensive development over the past years. Both the semantic characterisation and most known termination methods are concerned with global termination, uniformly of all the terms of a term rewriting system (TRS). In this paper we consider local termination, of specific sets of terms within a given TRS. The principal goal of this paper is generalising the semantic characterisation of global termination to local termination. This is made possible by admitting the well-founded monotone algebras to be partial. We also extend our approach to local relative termination. The interest in local termination naturally arises in program verification, where one is probably interested only in sensible inputs, or just wants to characterise the set of inputs for which a program terminates. Local termination will be also be of interest when dealing with a specif...

  12. Identification of Owner’s Project Value Interests 

    E-Print Network [OSTI]

    Gunby, Molly Gaynell

    2011-02-22

    the parameter estimates show specific project characteristics are significant in explaining the importance of individual value interests to a project. The model was developed through binary logistic regression of industry survey data, and validated... the applicability of individual value interests to a project. The methodology required to develop the mathematical model and test the hypothesis included the following activities: 1. Generation of data. In this step, the value interests and project...

  13. TO: FILE MEMORANDUM SUBJECT: ALTERNATE OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILEFR0t-k 5:

  14. Developing Scales to Evaluate Staff Perception of the Effects of the Physical Environment on Patient Comfort, Patient Safety, Patient Privacy, Family Integration With Patient Care, and Staff Working Conditions in Adult Intensive Care Units: A Pilot Study

    E-Print Network [OSTI]

    Rashid, Mahbub

    2007-07-01

    Studies suggest that the physical environment can be important for patient comfort, patient safety, patient privacy, family integration with patient care, and staff working condition in adult intensive care units (ICUs). In the absence of any...

  15. Termination Detection of Local Computations

    E-Print Network [OSTI]

    Godard, Emmanuel; Tel, Gerard

    2010-01-01

    Contrary to the sequential world, the processes involved in a distributed system do not necessarily know when a computation is globally finished. This paper investigates the problem of the detection of the termination of local computations. We define four types of termination detection: no detection, detection of the local termination, detection by a distributed observer, detection of the global termination. We give a complete characterisation (except in the local termination detection case where a partial one is given) for each of this termination detection and show that they define a strict hierarchy. These results emphasise the difference between computability of a distributed task and termination detection. Furthermore, these characterisations encompass all standard criteria that are usually formulated : topological restriction (tree, rings, or triangu- lated networks ...), topological knowledge (size, diameter ...), and local knowledge to distinguish nodes (identities, sense of direction). These re- sult...

  16. Owner/Agent Name: _________________________________________________ Address: __________________________________________________________

    E-Print Network [OSTI]

    Kopp, Artyom

    Express, Discover, Visa or MasterCard by filling out the attached form. 6. Label each tube with the same to avoid contamination of blood samples ­ do not open blood tubes. 8. Carefully wrap and package the tubes

  17. Non-Local Correlations and Interactive Games

    E-Print Network [OSTI]

    Preda, Daniel Ciprian

    2011-01-01

    non-local provers P NL such that the acceptance probabilitynon-local provers P i Q such that the acceptance probabilitythe same acceptance probability CHAPTER 4. GENERAL NON-LOCAL

  18. Localization via Automorphisms of the CARs. Local gauge invariance

    E-Print Network [OSTI]

    Hendrik Grundling; Karl-Hermann Neeb

    2010-01-07

    The classical matter fields are sections of a vector bundle E with base manifold M. The space L^2(E) of square integrable matter fields w.r.t. a locally Lebesgue measure on M, has an important module action of C_b^\\infty(M) on it. This module action defines restriction maps and encodes the local structure of the classical fields. For the quantum context, we show that this module action defines an automorphism group on the algebra A, of the canonical anticommutation relations on L^2(E), with which we can perform the analogous localization. That is, the net structure of the CAR, A, w.r.t. appropriate subsets of M can be obtained simply from the invariance algebras of appropriate subgroups. We also identify the quantum analogues of restriction maps. As a corollary, we prove a well-known "folk theorem," that the algebra A contains only trivial gauge invariant observables w.r.t. a local gauge group acting on E.

  19. algorithmic computation of local cohomology modules and the local

    E-Print Network [OSTI]

    Knowledge of local cohomology modules provides interesting in-. formation .... below). Most of the algorithmic ideas in this section appear already in .... mials of An, subject to m < m ... on which gi we pick amongst those whose initial term divides the initial ..... For purposes of reference we also list algorithms that compute the.

  20. Derived Hom-Tensor adjointness. Local duality.

    E-Print Network [OSTI]

    2009-02-22

    Feb 16, 2009 ... 1 Left-derived functors. Tensor and Tor. 2 Hom -Tensor adjunction. 3 Abstract local duality. 4 Concrete local duality. 5 Residues and duality for ...

  1. Local

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E CChinaC L S C O NLivingtearing mode

  2. Local

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E CChinaC L S C O NLivingtearing

  3. Local

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E CChinaC L S C O NLivingtearingparticle

  4. Furthering Your Local Governments' Energy Efficiency Goals: Getting Support from Local Leaders

    Broader source: Energy.gov [DOE]

    Power Point presentation from the Furthering your Local Governments Energy Efficiency Goals part 1 Getting Support From Local Leaders webcast.

  5. Kampung Capacity Local Solutions for

    E-Print Network [OSTI]

    Kammen, Daniel M.

    utility customers. Using a hybrid energy resource optimization framework, we explore optimal configuration to come from a mixture of locally managed small-scale hydroelectricity, biogas generators and accompanying of the Baram River Basin in Sarawak as the basin next scheduled for mega hydroelectricity development

  6. Archiving Data from New Survey Technologies: Lessons Learned on Enabling Research with High-Precision Data While Preserving Participant Privacy: Preprint

    SciTech Connect (OSTI)

    Gonder, J.; Burton, E.; Murakami, E.

    2014-11-01

    During the past 15 years, increasing numbers of organizations and planning agencies have begun collecting high-resolution Global Positioning System (GPS) travel data. Despite the significant effort and expense to collect it, privacy concerns often lead to underutilization of the data. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory, with support from the U.S. Department of Transportation and U.S. Department of Energy, established the Transportation Secure Data Center (TSDC). Lessons drawn from best-practice examples from other data centers have helped shape the structure and operating procedures for the TSDC, which functions under the philosophy of first and foremost preserving privacy, but doing so in a way that balances security with accessibility and usability of the data for legitimate research. This paper provides details about the TSDC approach toward achieving these goals, which has included creating a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using a variety of tools and reference information. This paper also describes lessons learned from operating the TSDC with respect to improvements in GPS data handling, processing, and user support, along with plans for continual enhancements to better support the needs of both data providers and users and to thus advance the research value derived from such valuable data.

  7. Local algorithms for graph partitioning and finding dense subgraphs

    E-Print Network [OSTI]

    Andersen, Reid

    2007-01-01

    ed local partitioning algorithm . . . . . . . . . . . .7 A Local Algorithm for Finding DenseComparison of local partitioning algorithms . . . . . . . .

  8. Quasi-local energy for cosmological models

    E-Print Network [OSTI]

    Chiang-Mei Chen; Jian-Liang Liu; James M. Nester

    2007-05-15

    First we briefly review our covariant Hamiltonian approach to quasi-local energy, noting that the Hamiltonian-boundary-term quasi-local energy expressions depend on the chosen boundary conditions and reference configuration. Then we present the quasi-local energy values resulting from the formalism applied to homogeneous Bianchi cosmologies. Finally we consider the quasi-local energies of the FRW cosmologies. Our results do not agree with certain widely accepted quasi-local criteria.

  9. The Local Dimension of Energy

    E-Print Network [OSTI]

    Kelly, Scott

    2011-01-31

     emissions  from  local  authority  owned  infrastructure  (excluding social housing energy consumption).    10 More  importantly,  additional  energy  savings  can  be  made  from  the  more  than  3.6  million homes in the UK classified as “social rented...  regional development agendas. In contrast, the USA has a  somewhat centralised political administration where power for the most part of the 20th  5 As measured by energy intensity in 2006 (gross inland consumption (GDP) / kg of oil equivalent) source: IEA...

  10. 1/7/2015 National Cyber Security Alliance Counts Down to Data Privacy Day on January 28 http://us1.campaignarchive2.com/?u=1cfc376f9f35e50eaea6eb1e0&id=6ddf204f80&e=fcb8632654 1/4

    E-Print Network [OSTI]

    Fernandez, Eduardo

    #12;1/7/2015 National Cyber Security Alliance Counts Down to Data Privacy Day on January 28 http is held on January 28th annually. National Cyber Security Alliance Counts Down to Data Privacy Day ­ The National Cyber Security Alliance (NCSA), the nation's leading nonprofit publicprivate partnership promoting

  11. Local Representation in the Context of Decentralization: Mayors, Citizens, and Local Governance in Latin America 

    E-Print Network [OSTI]

    Shockley, Bethany L

    2014-06-06

    aspects of local representation: government responsiveness and procedural inclusiveness. I examine local representation in the context of decentralization because local officials and citizens interact according to the set of decentralization policies...

  12. Improving locality with dynamic memory allocation 

    E-Print Network [OSTI]

    Jula, Alin Narcis

    2009-05-15

    . Hint Limitations . . . . . . . . . . . . . . . . . . 36 B. Allocators . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 1. TP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 a. Allocation & Deallocation . . . . . . . . . . . . . 41 b.... Pitfalls . . . . . . . . . . . . . . . . . . . . . . . . 62 4. Summary of TP, Defero and Medius . . . . . . . . . . 63 C. Design Challenges for Locality Improving Allocators . . . . 65 1. Speed Competes with Fragmentation . . . . . . . . . . 66 2. Locality...

  13. Sensor network localization based on natural phenomena

    E-Print Network [OSTI]

    Kim, Daniel Sang

    2006-01-01

    Autonomous localization is crucial for many sensor network applications. The goal of this thesis is to develop a distributed localization algorithm for the PLUG indoor sensor network by analyzing sound and light sensory ...

  14. Local Option- Solar Sales Tax Exemption

    Broader source: Energy.gov [DOE]

    The exemption does not apply to solar pool heating or other recreational applications. The laws also permit local governments (municipalities and counties) to grant an exemption from local sales...

  15. "Furthering Your Local Governments' Energy Efficiency Goals-- Part 1- Getting Support From Local Leaders "

    Broader source: Energy.gov [DOE]

    DOE’s technical assistance program webcast on furthering your local government’s energy efficiency goals. This is part one, gaining support from local leaders.

  16. NOvA Experiment - The Local Community

    ScienceCinema (OSTI)

    Deb Wieber

    2010-01-08

    Local proprietors Steve and Deb Wieber discuss the impact of the NOvA experiment on their community.

  17. Spotlight on Rutland County, Vermont: How Local Ties Lead to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rutland County, Vermont: How Local Ties Lead to Local Wins Spotlight on Rutland County, Vermont: How Local Ties Lead to Local Wins Spotlight on Rutland County, Vermont: How Local...

  18. Data-centric Transformations for Locality Enhancement

    E-Print Network [OSTI]

    Pingali, Keshav K.

    -centric transformations for locality enhancement. We present experimental results on the SGI Octane compar- ingData-centric Transformations for Locality Enhancement Induprakas Kodukula Keshav Pingali September community has developed locality-enhancing program transformations such as loop permutation and tiling

  19. Exploiting Locality of Churn for FIB Aggregation

    E-Print Network [OSTI]

    Schmid, Stefan

    Exploiting Locality of Churn for FIB Aggregation Nadi Sarrar Marcin Bienkowski Stefan Schmid Steve of London TU Berlin Technical Report: 2012-12 ISSN: 1436-9915 #12;Exploiting Locality of Churn for FIB effectively exploit the locality of FIB churn to keep low the number of updates to the aggregated FIB, as most

  20. Local Constructive Set Theory and Inductive Definitions

    E-Print Network [OSTI]

    Aczel, Peter

    Local Constructive Set Theory and Inductive Definitions Peter Aczel 1 Introduction Local Constructive Set Theory (LCST) is intended to be a local version of con- structive set theory (CST principles, is also acceptable in topos mathematics, the mathematics that can be carried out in an arbi

  1. California's Transition To Local Renewable Energy

    E-Print Network [OSTI]

    Kammen, Daniel M.

    California's Transition To Local Renewable Energy: 12,000 Megawatts By 2020 A Report on the Governor's Conference on Local Renewable Energy June 7, 2012 #12;This report was made possible. #12;California's Transition To Local Renewable Energy: 12,000 Megawatts By 2020 A Report

  2. environmental health The Local Board of Health

    E-Print Network [OSTI]

    environmental health The Local Board of Health Environmental Health Primer Second Edition #12;The Local Board of Health Environmental Health Primer Second Edition Author Carrie Hribar, MA Project Director ­ Public Health Policy National Association of Local Boards of Health Editor Mark Schultz, MEd

  3. Localization of quantum Bernoulli noises

    SciTech Connect (OSTI)

    Wang, Caishi; Zhang, Jihong [School of Mathematics and Statistics, Northwest Normal University, Lanzhou, Gansu 730070 (China)] [School of Mathematics and Statistics, Northwest Normal University, Lanzhou, Gansu 730070 (China)

    2013-10-15

    The family (?{sub k},?{sub k}{sup *}){sub k?0} of annihilation and creation operators acting on square integrable functionals of a Bernoulli process Z= (Z{sub k}){sub k?0} can be interpreted as quantum Bernoulli noises. In this note we consider the operator family (?{sub k},?{sub k}{sup *}){sub k?0}, where ?{sub k}=?{sub k}E{sub k} with E{sub k} being the conditional expectation (operator) given ?-field ?(Z{sub j}; 0 ?j?k). We show that ?{sub k} (resp. ?{sub k}{sup *}) is essentially a kind of localization of the annihilation operator ?{sub k} (resp. creation operator ?{sub k}{sup *}). We examine properties of the family (?{sub k},?{sub k}{sup *}){sub k?0} and prove, among other things, that ?{sub k} and ?{sub k}{sup *} satisfy a local canonical anti-communication relation and (?{sub k}{sup *}){sub k?0} forms a mutually orthogonal operator sequence although each ?{sub k} is not a projection operator. We find that the operator series ?{sub k=0}{sup ?}?{sub k}{sup *}X?{sub k} converges in the strong operator topology for each bounded operator X acting on square integrable functionals of Z. In particular we get an explicit sum of the operator series ?{sub k=0}{sup ?}?{sub k}{sup *}?{sub k}. A useful norm estimate on ?{sub k=0}{sup ?}?{sub k}{sup *}X?{sub k} is also obtained. Finally we show applications of our main results to quantum dynamical semigroups and quantum probability.

  4. Governance from Below in Bolivia: A Theory of Local Government with Two Empirical Tests

    E-Print Network [OSTI]

    Faguet, Jean-Paul

    2009-01-01

    CBN), Bolivia’s largest brewery. Municipal income is higherby the owner of the brewery and in many ways operated as thehuge. Even though Viacha’s brewery comprises a considerably

  5. Local Option- Contractual Assessments for Renewable Energy and/or Energy Efficiency

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment...

  6. Local Option- Renewable Energy Financing District/Solar Energy Improvement Special Assessments

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment...

  7. Dynamic Representations and Escaping Local Optima: Improving Genetic Algorithms and Local Search

    E-Print Network [OSTI]

    Whitley, Darrell

    'escape' local optima by accepting non- improving moves. Another possibility is to dynamically changeDynamic Representations and Escaping Local Optima: Improving Genetic Algorithms and Local Search University Fort Collins, CO 80523 e-mail: {laura,watsonj,whitley}@cs.colostate.edu Abstract Local search

  8. Spatial Risk Measures and their Local Specification: The Locally Law-Invariant Case

    E-Print Network [OSTI]

    Föllmer, Hans

    the position acceptable from the point of view of a supervising agency. Typically, such a local risk assessmentSpatial Risk Measures and their Local Specification: The Locally Law- Invariant Case by Hans F in Statistical Mechanics, we discuss the local specification of a global risk measure in terms of conditional

  9. 20022005 Xilinx, Inc. All rights reserved. XILINX, the Xilinx Logo, and other designated brands included herein are trademarks of Xilinx, Inc. PowerPC is a trademark of IBM, Inc. All other trademarks are the property of their respective owners. All speci

    E-Print Network [OSTI]

    Berns, Hans-Gerd

    included herein are trademarks of Xilinx, Inc. PowerPC is a trademark of IBM, Inc. All other trademarks of IBM, Inc. All other trademarks are the property of their respective owners. All specifications, Including - Up to twenty RocketIOTM or RocketIO X embedded Multi-Gigabit Transceivers (MGTs) - Up to two IBM

  10. Centralized Analysis of Local Data, With Dollars and Lives on the Line: Lessons From The Home Radon Experience

    SciTech Connect (OSTI)

    Price, PhillipN.; Gelman, Andrew

    2014-11-24

    In this chapter we elucidate four main themes. The first is that modern data analyses, including "Big Data" analyses, often rely on data from different sources, which can present challenges in constructing statistical models that can make effective use of all of the data. The second theme is that although data analysis is usually centralized, frequently the final outcome is to provide information or allow decision-making for individuals. Third, data analyses often have multiple uses by design: the outcomes of the analysis are intended to be used by more than one person or group, for more than one purpose. Finally, issues of privacy and confidentiality can cause problems in more subtle ways than are usually considered; we will illustrate this point by discussing a case in which there is substantial and effective political opposition to simply acknowledging the geographic distribution of a health hazard. A researcher analyzes some data and learns something important. What happens next? What does it take for the results to make a difference in people's lives? In this chapter we tell a story - a true story - about a statistical analysis that should have changed government policy, but didn't. The project was a research success that did not make its way into policy, and we think it provides some useful insights into the interplay between locally-collected data, statistical analysis, and individual decision making.

  11. Local Varying-Alpha Theories

    E-Print Network [OSTI]

    John D. Barrow; Joao Magueijo

    2015-01-30

    In a recent paper we demonstrated how the simplest model for varying alpha may be interpreted as the effect of a dielectric material, generalized to be consistent with Lorentz invariance. Unlike normal dielectrics, such a medium cannot change the speed of light, and its dynamics obey a Klein-Gordon equation. This work immediately suggests an extension of the standard theory, even if we require compliance with Lorentz invariance. Instead of a wave equation, the dynamics may satisfy a local algebraic relation involving the permittivity and the properties of the electromagnetic field, in analogy with more conventional dielectric (but still preserving Lorentz invariance). We develop the formalism for such theories and investigate some phenomenological implications. The problem of the divergence of the classical self-energy can be solved, or at least softened, in this framework. Some interesting new cosmological solutions for the very early universe are found, including the possibility of a bounce, inflation and expansion with a loitering phase, all of which are induced by early variations in alpha.

  12. State and Local Code Implementation: Southwest Region - 2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Local Code Implementation: Southeast Region - 2014 BTO Peer Review State and Local Code Implementation: State Energy Officials - 2014 BTO Peer Review State and Local Code...

  13. U.Commerce 6.0 | Bill+Payment 6.0.0 1997 -2012 TouchNet Information Systems, Inc. All rights reserved. | TouchNet Privacy Policy

    E-Print Network [OSTI]

    Hamburger, Peter

    U.Commerce 6.0 | Bill+Payment 6.0.0 ©1997 - 2012 TouchNet Information Systems, Inc. All rights, employers, etc.) the ability to access your account information. In compliance with the Family Educational Rights and Privacy Act of 1974 (FERPA), your student financial records may not be shared with a third

  14. It is the policy of Saint Michael's College, in accordance with the Family Educational Rights and Privacy Act (FERPA), to withhold disclosure of personally identifiable information from educational records except when the

    E-Print Network [OSTI]

    Weaver, Adam Lee

    It is the policy of Saint Michael's College, in accordance with the Family Educational Rights and Privacy Act (FERPA), to withhold disclosure of personally identifiable information from educational. There is information about FERPA on the college Website (at the Registrar's Office pages) and in the college catalogue

  15. Student records at The University of Utah are governed by the Family Educational Rights and Privacy Act (FERPA) and its implementing regulations. Under the Act, Directory Information relating to the student is considered to be public information unless th

    E-Print Network [OSTI]

    Tipple, Brett

    Student records at The University of Utah are governed by the Family Educational Rights and Privacy Act (FERPA) and its implementing regulations. Under the Act, Directory Information relating to the student is considered to be public information unless the student formally requests in writing

  16. Land Use Regulation with Durable Capital

    E-Print Network [OSTI]

    Quigley, John M.; Swoboda, Aaron

    2009-01-01

    Manhattan so expensive? Regulation and the rise of housingmotive for restrictive regulation by local home owners.the impacts of these regulations vary across owner- occupied

  17. Local Energy Velocity of Classical Fields

    E-Print Network [OSTI]

    I. V. Drozdov; A. A. Stahlhofen

    2007-04-19

    It is proposed to apply a recently developed concept of local wave velocities to the dynamical field characteristics, especially for the canonical field energy density. It is shown that local energy velocities can be derived from the lagrangian directly. The local velocities of zero- and first- order for energy propagation has been obtained for special cases of scalar and vector fields. Some important special cases of these results are discussed.

  18. Fully localized two-dimensional embedded solitons

    SciTech Connect (OSTI)

    Yang Jianke [Department of Mathematics and Statistics, University of Vermont, Burlington, Vermont 05401 (United States)

    2010-11-15

    We report the prediction of fully localized two-dimensional embedded solitons. These solitons are obtained in a quasi-one-dimensional waveguide array which is periodic along one spatial direction and localized along the orthogonal direction. Under appropriate nonlinearity, these solitons are found to exist inside the Bloch bands (continuous spectrum) of the waveguide and thus are embedded solitons. These embedded solitons are fully localized along both spatial directions. In addition, they are fully stable under perturbations.

  19. Model Wind Ordinance for Local Governments

    Office of Energy Efficiency and Renewable Energy (EERE)

    In 2006, Pennsylvania developed a model local ordinance for wind energy facilities through a collaborative effort involving several state departments and stakeholder groups. The purpose of the...

  20. ARITHMETIC QUANTUM CHAOS ON LOCALLY SYMMETRIC SPACES

    E-Print Network [OSTI]

    Silberman, Lior

    ARITHMETIC QUANTUM CHAOS ON LOCALLY SYMMETRIC SPACES LIOR SILBERMAN A DISSERTATION PRESENTED Lindenstrauss on the arithmetic quantum chaos problem on hyperbolic surfaces. We have also benefited from

  1. Communication vs. Performance in Source Localization

    E-Print Network [OSTI]

    Bandari, Roja; Pottie, Gregory

    2007-01-01

    localization. Cost of Wireless Communication Energy can be aConsiderable energy is used in wireless communication In aamount of energy is consumed through wireless communication.

  2. LECTURES ON LOCAL COHOMOLOGY AND DUALITY Contents ...

    E-Print Network [OSTI]

    2007-12-28

    Introduction. This is an expanded version of a series of lectures given during the Local. Cohomology workshop at CIMAT, Guanajuoto, Mexico, Nov. 29–Dec. 3,.

  3. Localized Induction Equation for Stretched Vortex Filament

    E-Print Network [OSTI]

    Kimiaki Konno; Hiroshi Kakuhata

    2006-03-02

    We study numerically the motion of the stretched vortex filaments by using the localized induction equation with the stretch and that without the stretch.

  4. Derived Hom-Tensor adjointness. Local duality.

    E-Print Network [OSTI]

    2009-02-07

    Lectures on Grothendieck Duality. II: Derived Hom-Tensor adjointness. Local duality. Joseph Lipman. February 16, 2009. Contents. 1 Left-derived functors.

  5. LOCAL FOURIER TRANSFORMS AND RIGIDITY FOR D-MODULES

    E-Print Network [OSTI]

    Bloch, Spencer

    LOCAL FOURIER TRANSFORMS AND RIGIDITY FOR D. Local Fourier transforms, analogous to the `-adic local Fourier transforms [14], are constructed infinitesimal rigidity condition is satisfied. As in [12], the argument uses local Fourier transforms

  6. LOCAL ORGANIC FOOD: THE SOCIAL IMPLICATIONS OF

    E-Print Network [OSTI]

    Bateman, Ian J.

    Sustainable production and consumption has risen up the political agenda over the last ten years, to becomeLOCAL ORGANIC FOOD: THE SOCIAL IMPLICATIONS OF SUSTAINABLE CONSUMPTION By Gill Seyfang CSERGE Working Paper EDM 04-09 #12;Local Organic Food: The Social Implications of Sustainable Consumption By Gill

  7. Localization of Classical Waves I: Acoustic Waves.

    E-Print Network [OSTI]

    Localization of Classical Waves I: Acoustic Waves. Alexander Figotin \\Lambda Department, 1997 Abstract We consider classical acoustic waves in a medium described by a position dependent mass the existence of localized waves, i.e., finite energy solutions of the acoustic equations with the property

  8. Biomass for energy and materials Local technologies -

    E-Print Network [OSTI]

    - holds Industry Agricult. Pretreatment of biomass and waste CO2 Gasification Combustion MicrobialBiomass for energy and materials Local technologies - in a global perspective Erik Steen Jensen Bioenergy and biomass Biosystems Department Risø National Laboratory Denmark #12;Biomass - a local resource

  9. Localization of fremions in rotating electromagnetic fields

    E-Print Network [OSTI]

    B. V. Gisin

    2015-06-15

    Parameters of localization are defined in the lab and rotating frame for solutions of the Dirac equation in the field of a traveling circularly polarized electromagnetic wave and constant magnetic field. The radius of localization is of the order of the electromagnetic wavelength and lesser.

  10. DAMAGE LOCALIZATION USING LOAD VECTORS Dionisio Bernal

    E-Print Network [OSTI]

    Bernal, Dionisio

    DAMAGE LOCALIZATION USING LOAD VECTORS Dionisio Bernal Associate Professor Department of Civil: A technique to localize damage in structures that can be treated as linear in the pre and post-damage state is presented. Central to the approach is the computation of a set of vectors, designated as Damage Locating

  11. Structural Damage Detection and Localization Using NETSHM

    E-Print Network [OSTI]

    Gnawali, Omprakash

    Structural Damage Detection and Localization Using NETSHM Krishna Chintalapudi, Jeongyeup Paek and localize damage in large civil structures. Structural engineers often implement and test SHM algorithms the intricacies of wireless networking, or the details of sensor data acquisition. We have implemented a damage

  12. Local Export Spillovers in France Pamina Koenig

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Local Export Spillovers in France Pamina Koenig Florian Mayneris Sandra Poncet§ Abstract This paper investigates the presence of local export spillovers on both the extensive (the decision to start exporting) and the intensive (the export volume) margins of trade, using data on French individual export flows, at the product

  13. Book Reviews Local Constraints vs. Economy

    E-Print Network [OSTI]

    Book Reviews Local Constraints vs. Economy David E. Johnson and Shalom Lappin (IBM Thomas J. Watson, the authors summarize the Chomsky 1995 version of global economy in Chapter 2. In Chapter 3, they discuss two versions of local economy, that proposed by Collins (1997) and the one developed by Yang (1997

  14. Contributed Paper Biodiversity Conservation in Local Planning

    E-Print Network [OSTI]

    Miller, James R.

    , urbanization, Washington Conservaci´on de la Biodiversidad en la Planificaci´on Local Resumen: Las pol biodiversidad en los Estados Unidos. Muchos planificadores y cient´ificos de la conservaci´on han hecho un´on de la biodiversidad a escalas locales. Pero, se conoce poco sobre la generalidad de estas pr

  15. Range-Free Localization Radu Stoleru1

    E-Print Network [OSTI]

    Stankovic, John A.

    in wireless sensor networks (WSN). WSN are formed by large numbers of densely deployed nodes enabled is the process of determining the coordinates of the sensor nodes in the WSN. Target localization is the process problem in WSN. Node localization is a complicated and important problem for wireless sensor networks (WSN

  16. Climate Change Adaptation for Local Government

    E-Print Network [OSTI]

    Pedersen, Tom

    Climate Change Adaptation for Local Government A Resource Guide June 2011 Jenny Fraser, Adaptation Specialist, Climate Action Secretariat, BC Ministry of Environment & Matthew Strand, Researcher, Adaptation to Climate Change Team, Simon Fraser University #12;Page 1 of 26 Climate Change Adaptation for Local

  17. Global-local Structural Optimization Using Response Surfaces of Local Optimization Margins

    E-Print Network [OSTI]

    Neumaier, Arnold

    1 Global-local Structural Optimization Using Response Surfaces of Local Optimization Margins Boyang optimization problems. First, a large number of component optimizations for maximization of margins are performed. Response surface approximations (RSA) for maximum margins of component optimization

  18. Localities and their natural gas : stories of problem diffusion, state preemption, and local government capacity

    E-Print Network [OSTI]

    Agatstein, Jessica C

    2013-01-01

    The rapid rise of oil and gas production in the United States poses a new set of policy challenges for local governments. Striving to balance the goals of encouraging economic growth and mitigating its side effects, local ...

  19. Furthering Your Local Governments' Energy Efficiency Goals-- Part 1- Getting Support From Local Leaders

    Broader source: Energy.gov [DOE]

    An overview of some of the best practices for gaining support for energy efficiency projects from your local leaders , key data points and other items of interest that local leaders might look for when approached about supporting energy efficiency projects..

  20. Local Option- County Energy District Authority

    Broader source: Energy.gov [DOE]

    Oklahoma enacted S.B. 102, effective November 2011, to make PACE loans junior and inferior to other liens. This law should allow local governments to adopt PACE programs that are within the accep...

  1. Essays on Banking and Local Credit Markets

    E-Print Network [OSTI]

    Nguyen, Hoai-Luu

    2015-01-01

    This thesis consists of three chapters on banking and local credit markets. The first chapter studies the relationship between bank-specific capital and credit access in a new setting: bank branch closings in markets where ...

  2. A Library for Locally Weighted Projection Regression 

    E-Print Network [OSTI]

    Klanke, Stefan; Vijayakumar, Sethu; Schaal, Stefan

    2008-01-01

    In this paper we introduce an improved implementation of locally weighted projection regression (LWPR), a supervised learning algorithm that is capable of handling high-dimensional input data. As the key features, our ...

  3. Agenda: State, Local and Tribal Issues

    Broader source: Energy.gov [DOE]

    Many of the primary authorities and governance structures that exist for states, localities and tribes related to electricity infrastructure have been in place for decades. What can be learned from...

  4. Developmental Plasticity Links Local Adaptation and Evolutionary

    E-Print Network [OSTI]

    Badyaev, Alex

    Developmental Plasticity Links Local Adaptation and Evolutionary Diversification in Foraging, University of Arizona, Tucson, Arizona Developmental plasticity is thought to reconcile the constraining role morphology into adulthood, providing an opportunity to directly examine the links between plasticity of bone

  5. Cooperative localization for autonomous underwater vehicles

    E-Print Network [OSTI]

    Bahr, Alexander

    2009-01-01

    Self-localization of an underwater vehicle is particularly challenging due to the absence of Global Positioning System (GPS) reception or features at known positions that could otherwise have been used for position ...

  6. Local community extraction in directed networks

    E-Print Network [OSTI]

    Ning, Xuemei; Zhang, Shihua

    2015-01-01

    Network is a simple but powerful representation of real-world complex systems. Network community analysis has become an invaluable tool to explore and reveal the internal organization of nodes. However, only a few methods were directly designed for community-detection in directed networks. In this article, we introduce the concept of local community structure in directed networks and provide a generic criterion to describe a local community with two properties. We further propose a stochastic optimization algorithm to rapidly detect a local community, which allows for uncovering the directional modular characteristics in directed networks. Numerical results show that the proposed method can resolve detailed local communities with directional information and provide more structural characteristics of directed networks than previous methods.

  7. Interferometric hydrofracture microseism localization using neighboring fracture

    E-Print Network [OSTI]

    Poliannikov, Oleg V.

    2011-05-19

    Hydraulic fracturing is the process of injecting high-pressure fluids into a reservoir to induce fractures and thus improve reservoir productivity. Microseismic event localization is used to locate created fractures. ...

  8. Locally-smeared operator product expansions

    SciTech Connect (OSTI)

    Monahan, Christopher; Orginos, Kostantinos

    2014-12-01

    We propose a "locally-smeared Operator Product Expansion" (sOPE) to decompose non-local operators in terms of a basis of locally-smeared operators. The sOPE formally connects nonperturbative matrix elements of smeared degrees of freedom, determined numerically using the gradient flow, to non-local operators in the continuum. The nonperturbative matrix elements do not suffer from power-divergent mixing on the lattice, provided the smearing scale is kept fixed in the continuum limit. The presence of this smearing scale prevents a simple connection to the standard operator product expansion and therefore requires the construction of a two-scale formalism. We demonstrate the feasibility of our approach using the example of real scalar field theory.

  9. Emerging local warming signals in observational data

    E-Print Network [OSTI]

    Mahlstein, Irina

    The global average temperature of the Earth has increased, but year-to-year variability in local climates impedes the identification of clear changes in observations and human experience. For a signal to become obvious in ...

  10. Force localization in contracting cell layers

    E-Print Network [OSTI]

    Carina M. Edwards; Ulrich S. Schwarz

    2012-01-13

    Epithelial cell layers on soft elastic substrates or pillar arrays are commonly used as model systems for investigating the role of force in tissue growth, maintenance and repair. Here we show analytically that the experimentally observed localization of traction forces to the periphery of the cell layers does not necessarily imply increased local cell activity, but follows naturally from the elastic problem of a finite-sized contractile layer coupled to an elastic foundation. For homogeneous contractility, the force localization is determined by one dimensionless parameter interpolating between linear and exponential force profiles for the extreme cases of very soft and very stiff substrates, respectively. If contractility is sufficiently increased at the periphery, outward directed displacements can occur at intermediate positions, although the edge itself still retracts. We also show that anisotropic extracellular stiffness leads to force localization in the stiffer direction, as observed experimentally.

  11. Interferometric hydrofracture microseism localization using neighboring fracture

    E-Print Network [OSTI]

    Poliannikov, Oleg V.

    Hydraulic fracturing is the process of injecting high-pressure fluids into a reservoir to induce fractures and thus improve reservoir productivity. Microseismic event localization is used to locate created fractures. ...

  12. Local Option- Rural Renewable Energy Development Zones

    Office of Energy Efficiency and Renewable Energy (EERE)

    Commercial renewable energy property in these zones are eligible for a 3 to 5 year local property tax exemption. Eligible property includes either wind, geothermal, solar, biomass, or other uncon...

  13. Internet Exchanges: Enabling Local Online Communities

    E-Print Network [OSTI]

    Mitchell, Keith

    Interconnect Principles Internet Exchange History Internet Exchange Models Internet Exchange Security Setting, Foundry #12;Internet Exchanges History #12;A decade+ of Internet Exchanges The London Internet ExchangeInternet Exchanges: Enabling Local Online Communities Keith Mitchell Chair, United Kingdom Network

  14. Anderson localization of partially incoherent light

    SciTech Connect (OSTI)

    Capeta, D.; Radic, J.; Buljan, H.; Szameit, A.; Segev, M.

    2011-07-15

    We study Anderson localization and propagation of partially spatially incoherent wavepackets in linear disordered potentials, motivated by the insight that interference phenomena resulting from multiple scattering are affected by the coherence of the waves. We find that localization is delayed by incoherence: the more incoherent the waves are, the longer they diffusively spread while propagating in the medium. However, if all the eigenmodes of the system are exponentially localized (as in one- and two-dimensional disordered systems), any partially incoherent wavepacket eventually exhibits localization with exponentially decaying tails, after sufficiently long propagation distances. Interestingly, we find that the asymptotic behavior of the incoherent beam is similar to that of a single instantaneous coherent realization of the beam.

  15. EERE's State & Local Energy Data Tool

    ScienceCinema (OSTI)

    Shambarger, Erick; DeCesaro, Jennifer

    2014-06-26

    EERE's State and Local Energy Data (SLED) Tool provides basic energy market information that can help state and local governments plan and implement clean energy projects, including electricity generation; fuel sources and costs; applicable policies, regulations, and financial incentives; and renewable energy resource potential. Watch this video to learn more about the tool and hear testimonials from real users about the benefits of using this tool.

  16. Entanglement quantification by local unitary operations

    SciTech Connect (OSTI)

    Monras, A.; Giampaolo, S. M.; Gualdi, G.; Illuminati, F.; Adesso, G.; Davies, G. B.

    2011-07-15

    Invariance under local unitary operations is a fundamental property that must be obeyed by every proper measure of quantum entanglement. However, this is not the only aspect of entanglement theory where local unitary operations play a relevant role. In the present work we show that the application of suitable local unitary operations defines a family of bipartite entanglement monotones, collectively referred to as ''mirror entanglement.'' They are constructed by first considering the (squared) Hilbert-Schmidt distance of the state from the set of states obtained by applying to it a given local unitary operator. To the action of each different local unitary operator there corresponds a different distance. We then minimize these distances over the sets of local unitary operations with different spectra, obtaining an entire family of different entanglement monotones. We show that these mirror-entanglement monotones are organized in a hierarchical structure, and we establish the conditions that need to be imposed on the spectrum of a local unitary operator for the associated mirror entanglement to be faithful, i.e., to vanish in and only in separable pure states. We analyze in detail the properties of one particularly relevant member of the family, the ''stellar mirror entanglement'' associated with the traceless local unitary operations with nondegenerate spectra and equispaced eigenvalues in the complex plane. This particular measure generalizes the original analysis of S. M. Giampaolo and F. Illuminati [Phys. Rev. A 76, 042301 (2007)], valid for qubits and qutrits. We prove that the stellar entanglement is a faithful bipartite entanglement monotone in any dimension and that it is bounded from below by a function proportional to the linear entropy and from above by the linear entropy itself, coinciding with it in two- and three-dimensional spaces.

  17. Targeting Illegal Immigration: Local Ordinate Action 

    E-Print Network [OSTI]

    Gunn, Emily; Moffitt, Jessica; Montemayor, Victoria; Riedel, Sarah; Smith, Bart; Weizel, Daniel

    2008-01-01

    to prevent unauthorized immigration. However, from 1990 to 2005, estimates of the unauthorized alien population in the United States have risen from 3.5 million to 11.5 million people, a 325 percent increase. A small number of localities have taken action... to unauthorized aliens, while others passed legislation targeting day labor centers, loitering, and government services. Consistent with findings made in other studies,1 at the time of our study we found that only approximately 100 localities have...

  18. EERE's State & Local Energy Data Tool

    SciTech Connect (OSTI)

    Shambarger, Erick; DeCesaro, Jennifer

    2014-06-23

    EERE's State and Local Energy Data (SLED) Tool provides basic energy market information that can help state and local governments plan and implement clean energy projects, including electricity generation; fuel sources and costs; applicable policies, regulations, and financial incentives; and renewable energy resource potential. Watch this video to learn more about the tool and hear testimonials from real users about the benefits of using this tool.

  19. p-ADIC ARAKELOV THEORY: LOCAL THEORY

    E-Print Network [OSTI]

    " on the completions above p. In this part of the paper we only deal with the local theory, i.e., above p. This really, on a complete curve over a p-adic #12;eld. The goal of the local theory is to describe an extension of this pairing, by giving a Green function G(P; Q) with certain desirable properties, in such a way that (1.1) DX

  20. States and Local Communities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data Center HomeVehicle ReplacementStates and Local Communities States and Local

  1. A preliminary version of this paper appeared in Theory of Cryptography Conference, TCC '05, Lecture Notes in Computer Science Vol. ???, Joe Kilian ed, Springer Verlag, 2005. This is the full version.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ­party computation to analyse e#cient algorithms for privacy preserving data­mining was proposed by Pinkas for storing and processing of data. If statistical analysis could be applied to such data when described above: the owners of data can, in e#ect, pool their data while ensuring that privacy is maintained

  2. Self-Surveillance Privacy

    E-Print Network [OSTI]

    Kang, Jerry; Shilton, Katie; Estrin, D; Burke, Jeffrey A; Hansen, Mark

    2011-01-01

    and released into the current information ecosystem.data within the information ecosystem. In other words, forreleased into the current information ecosystem. I. S ELF -S

  3. KnowPrivacy

    E-Print Network [OSTI]

    Gomez, Joshua; Pinnick, Travis; Soltani, Ashkan

    2009-01-01

    are embedded in a web page‘s HTML code, and are designed toweb bugs by matching certain lines of code in the HTML. For

  4. Candidate Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B LReports from the CloudGEGR-NOperatorsCan't We All

  5. Correcting Privacy Act Records

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAuditsClusterInformationContractCorporate Culture | National

  6. WIPP Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopmentat LENA|UpcomingVisit UsNewsNationalQualityCurrent

  7. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxideUser Careers/Research Team MorrisSearchDIII-D

  8. PRIVACY IMPACT ASSESSMENT: Office

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy AEnergyPresidential Permit authorizingAwardOccupational Safety & Health

  9. PRIVACY IMPACT ASSESSMENT: Office

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy AEnergyPresidential Permit authorizingAwardOccupational Safety &

  10. Privacy Impact Assessment

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy AEnergyPresidential PermitDAYSDepartment of EnergyAct (PAA)

  11. PNNL: Security & Privacy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access| Department ofStephen P rice Los ANot sure how to set the images

  12. ARM - Privacy and Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of rare Kaonforsupernovae2GatheringARMHistory andARMMissiongovDataPI

  13. Privacy | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data Center HomeVehicle Replacement U.S.Job&Energy DepartmentPastandthis

  14. Privacy | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data Center HomeVehicle Replacement U.S.Job&Energy

  15. LIGHTWEIGHT PEOPLE COUNTING AND LOCALIZING IN INDOOR SPACES USING CAMERA SENSOR NODES

    E-Print Network [OSTI]

    Teixeira, Thiago

    a sen- sor network deployed inside a house are processed together with building map information to recognize the activities of the house inhabitants. The locations of people in time and space during more precise information than Passive Infrared Sensors (PIR) but more lightweight and privacy

  16. Relative localization of point particle interactions

    E-Print Network [OSTI]

    José Ricardo Oliveira

    2011-10-25

    We review the main concepts of the recently introduced principle of relative locality and investigate some aspects of classical interactions between point particles from this new perspective. We start with a physical motivation and basic mathematical description of relative locality and review the treatment of a system of classical point particles in this framework. We then examine one of the unsolved problems of this picture, the apparent ambiguities in the definition of momentum constraints caused by a non-commutative and/or non-associative momentum addition rule. The gamma ray burst experiment is used as an illustration. Finally, we use the formalism of relative locality to reinterpret the well-known multiple point particle system coupled to 2+1 Einstein gravity, analyzing the geometry of its phase space and once again referring to the gamma ray burst problem as an example.

  17. Secure positioning and non-local correlations

    E-Print Network [OSTI]

    Muhammad Nadeem

    2015-03-31

    Recently, the problem of secure position-verification has been extensively analyzed in a formal notion where distant verifiers send encrypted challenge along with the decryption information to the prover. However, currently it is known that all the existing position-verification scheme are insecure and secure positioning is impossible. We propose here a different notion for position-verification where distant verifiers determine the actions of the prover through non-local correlations generated by local measurements at the provers site. The proposed scheme guarantees secure positioning even if the verifiers do not have any pre-shared data with the prover, position is the only credential of the prover. Our proposed scheme is secure in general and evades known quantum attacks based on instantaneous non-local computations in particular. The scheme enables verifiers to identify dishonest provers with very high probability , where n is the number of entangled pairs used.

  18. Local magnitudes of small contained explosions.

    SciTech Connect (OSTI)

    Chael, Eric Paul

    2009-12-01

    The relationship between explosive yield and seismic magnitude has been extensively studied for underground nuclear tests larger than about 1 kt. For monitoring smaller tests over local ranges (within 200 km), we need to know whether the available formulas can be extrapolated to much lower yields. Here, we review published information on amplitude decay with distance, and on the seismic magnitudes of industrial blasts and refraction explosions in the western U. S. Next we measure the magnitudes of some similar shots in the northeast. We find that local magnitudes ML of small, contained explosions are reasonably consistent with the magnitude-yield formulas developed for nuclear tests. These results are useful for estimating the detection performance of proposed local seismic networks.

  19. Does chaos assist localization or delocalization?

    SciTech Connect (OSTI)

    Tan, Jintao; Luo, Yunrong; Hai, Wenhua, E-mail: whhai2005@aliyun.com [Department of Physics and Key Laboratory of Low-dimensional Quantum Structures and Quantum Control of Ministry of Education, Hunan Normal University, Changsha 410081 (China); Lu, Gengbiao [Department of Physics and Electronic Science, Changsha University of Science and Technology, Changsha 410004 (China)

    2014-12-01

    We aim at a long-standing contradiction between chaos-assisted tunneling and chaos-related localization study quantum transport of a single particle held in an amplitude-modulated and tilted optical lattice. We find some near-resonant regions crossing chaotic and regular regions in the parameter space, and demonstrate that chaos can heighten velocity of delocalization in the chaos-resonance overlapping regions, while chaos may aid localization in the other chaotic regions. The degree of localization enhances with increasing the distance between parameter points and near-resonant regions. The results could be useful for experimentally manipulating chaos-assisted transport of single particles in optical or solid-state lattices.

  20. An eigensystem approach to Anderson localization

    E-Print Network [OSTI]

    Alexander Elgart; Abel Klein

    2015-09-28

    We introduce a new approach for proving localization (pure point spectrum with exponentially decaying eigenfunctions, dynamical localization) for the Anderson model at high disorder. In contrast to the usual strategy, we do not study finite volume Green's functions. Instead, we perform a multiscale analysis based on finite volume eigensystems (eigenvalues and eigenfunctions). Information about eigensystems at a given scale is used to derive information about eigensystems at larger scales. This eigensystem multiscale analysis treats all energies of the finite volume operator at the same time, establishing level spacing and localization of eigenfunctions in a fixed box with high probability. A new feature is the labeling of the eigenvalues and eigenfunctions by the sites of the box.

  1. Holographic Trace Anomaly and Local Renormalization Group

    E-Print Network [OSTI]

    Rajagopal, Srivatsan; Zhu, Yechao

    2015-01-01

    The Hamilton-Jacobi method in holography has produced important results both at a renormalization group (RG) fixed point and away from it. In this paper we use the Hamilton-Jacobi method to compute the holographic trace anomaly for four- and six-dimensional boundary conformal field theories (CFTs), assuming higher-derivative gravity and interactions of scalar fields in the bulk. The scalar field contributions to the anomaly appear in CFTs with exactly marginal operators. Moving away from the fixed point, we show that the Hamilton-Jacobi formalism provides a deep connection between the holographic and the local RG. We derive the local RG equation holographically, and verify explicitly that it satisfies Weyl consistency conditions stemming from the commutativity of Weyl scalings. We also consider massive scalar fields in the bulk corresponding to boundary relevant operators, and comment on their effects to the local RG equation.

  2. Holographic Trace Anomaly and Local Renormalization Group

    E-Print Network [OSTI]

    Srivatsan Rajagopal; Andreas Stergiou; Yechao Zhu

    2015-08-19

    The Hamilton-Jacobi method in holography has produced important results both at a renormalization group (RG) fixed point and away from it. In this paper we use the Hamilton-Jacobi method to compute the holographic trace anomaly for four- and six-dimensional boundary conformal field theories (CFTs), assuming higher-derivative gravity and interactions of scalar fields in the bulk. The scalar field contributions to the anomaly appear in CFTs with exactly marginal operators. Moving away from the fixed point, we show that the Hamilton-Jacobi formalism provides a deep connection between the holographic and the local RG. We derive the local RG equation holographically, and verify explicitly that it satisfies Weyl consistency conditions stemming from the commutativity of Weyl scalings. We also consider massive scalar fields in the bulk corresponding to boundary relevant operators, and comment on their effects to the local RG equation.

  3. Stabilization of the Vertical Mode in Tokamaks by Localized Nonaxisymm...

    Office of Scientific and Technical Information (OSTI)

    Mode in Tokamaks by Localized Nonaxisymmetric Fields Vertical instability of a tokamak plasma can be controlled by nonaxisymmetric magnetic fields localized near the plasma...

  4. Spatial localization of resistive drift wave structure in tokamak...

    Office of Scientific and Technical Information (OSTI)

    Spatial localization of resistive drift wave structure in tokamak edge plasmas with an embedded magnetic island Citation Details In-Document Search Title: Spatial localization of...

  5. Automating approximate Bayesian computation by local linear regression

    E-Print Network [OSTI]

    Thornton, Kevin R

    2009-01-01

    computation by local linear regression Kevin R Thorntonof ABC based on using a linear regression to approximate theimplements the local linear-regression approach to ABC. The

  6. Cellu-WHAT?-sic: Communicating the Biofuels Message to Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cellu-WHAT?-sic: Communicating the Biofuels Message to Local Stakeholders Cellu-WHAT?-sic: Communicating the Biofuels Message to Local Stakeholders Breakout Session 3D-Building...

  7. State and Local Energy Assurance Planning | Department of Energy

    Energy Savers [EERE]

    and local governments on energy assurance issues. The office develops products and tools to inform and educate State and local officials to support their energy emergency...

  8. How Much Do Local Regulations Matter? Exploring the Impact of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regulations Matter? Exploring the Impact of Permitting and Local Regulatory Processes on PV Prices in the United States How Much Do Local Regulations Matter? Exploring the Impact...

  9. Measuring Up: How to Track and Evaluate Local Sustainability Projects

    Office of Energy Efficiency and Renewable Energy (EERE)

    Join this EPA Local Climate and Energy webinar to learn how to measure and evaluate the results of local climate, energy, and sustainability projects.

  10. Phonon localization drives nanoregions in a relaxor ferroelectric...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    localization drives nanoregions in a relaxor ferroelectric April 11, 2014 This inelastic neutron scattering spectrum shows the localizing modes (LMs) between the transverse optic...

  11. Obama Administration Announces Additional $13,969,700 for Local...

    Office of Environmental Management (EM)

    Additional 13,969,700 for Local Energy Efficiency Improvements in Alaska Obama Administration Announces Additional 13,969,700 for Local Energy Efficiency Improvements in Alaska...

  12. Energy Department Awards $5 Million to Spur Local Clean Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Awards 5 Million to Spur Local Clean Energy Development, Energy Savings Energy Department Awards 5 Million to Spur Local Clean Energy Development, Energy Savings October 14, 2014...

  13. Energy Department Announces $13 Million to Strengthen Local Solar...

    Office of Environmental Management (EM)

    3 Million to Strengthen Local Solar Markets and Spur Solar Deployment Across the United States Energy Department Announces 13 Million to Strengthen Local Solar Markets and Spur...

  14. Local Soot Loading Distribution in Cordierite Diesel Particulate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Local Soot Loading Distribution in Cordierite Diesel Particulate Filters by Dynamic Neutron Radiography Local Soot Loading Distribution in Cordierite Diesel Particulate Filters by...

  15. Treatment of Locally Advanced Adenoid Cystic Carcinoma of the...

    Office of Scientific and Technical Information (OSTI)

    Treatment of Locally Advanced Adenoid Cystic Carcinoma of the Trachea With Neutron Radiotherapy Citation Details In-Document Search Title: Treatment of Locally Advanced Adenoid...

  16. Solar Powering Your Community: A Guide for Local Governments...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A Guide for Local Governments (Book), Energy Efficiency & Renewable Energy (EERE) Solar Powering Your Community: A Guide for Local Governments (Book), Energy Efficiency &...

  17. Locally Advanced Prostate Cancer: Three-Dimensional Magnetic...

    Office of Scientific and Technical Information (OSTI)

    Locally Advanced Prostate Cancer: Three-Dimensional Magnetic Resonance Spectroscopy to Monitor Prostate Response to Therapy Citation Details In-Document Search Title: Locally...

  18. Obama Administration Announces Additional $11,072,300 for Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1,072,300 for Local Energy Efficiency Improvements in Delaware Obama Administration Announces Additional 11,072,300 for Local Energy Efficiency Improvements in Delaware March 26,...

  19. Local Incentive-Based Policy for Vegetable-Agroforestry: alocally...

    Open Energy Info (EERE)

    Local Incentive-Based Policy for Vegetable-Agroforestry: a locally-appropriate adaptation and mitigation action (LAAMA) to climate change Jump to: navigation, search Tool Summary...

  20. State and Local Code Implementation: South-central Region - 2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2014 BTO Peer Review State and Local Code Implementation: Northeast Region - 2014 BTO Peer Review State and Local Code Implementation: State Energy Officials - 2014 BTO Peer Review...

  1. State and Local Code Implementation: Southwest Region - 2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Local Code Implementation: Southeast Region - 2014 BTO Peer Review State and Local Code Implementation: State Energy Officials - 2014 BTO Peer Review Green Codes and...

  2. How Much Do Local Regulations Matter? Exploring the Impact of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Matter? Exploring the Impact of Permitting and Local Regulatory Processes on PV Prices in the United States How Much Do Local Regulations Matter? Exploring the Impact of...

  3. Local content of bipartite qubit correlations

    SciTech Connect (OSTI)

    Branciard, Cyril; Gisin, Nicolas [Group of Applied Physics, University of Geneva, 1211 Geneva (Switzerland); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore, 117543 Singapore (Singapore)

    2010-02-15

    One of the last open problems concerning two qubits in a pure state is to find the exact local content of their correlation, in the sense of Elitzur, Popescu, and Rohrlich (EPR2) [A. C. Elitzur, S. Popescu, and D. Rohrlich, Phys. Lett. A162, 25 (1992)]. We propose an EPR2 decomposition that allows us to prove, for a wide range of states |{psi}({theta})>=cos{theta}|00>+sin{theta}|11>, that their local content is p{sub L}({theta})=cos2{theta}. We also share reflections on how to possibly extend this result to all two-qubit pure states.

  4. Localized quantum walks as secured quantum memory

    E-Print Network [OSTI]

    C. M. Chandrashekar; Th. Busch

    2015-04-21

    We show that a quantum walk process can be used to construct and secure quantum memory. More precisely, we show that a localized quantum walk with temporal disorder can be engineered to store the information of a single, unknown qubit on a compact position space and faithfully recover it on demand. Since the localization occurss with a finite spread in position space, the stored information of the qubit will be naturally secured from the simple eavesdropper. Our protocol can be adopted to any quantum system for which experimental control over quantum walk dynamics can be achieved.

  5. Graphene Nanoribbon in Sharply Localized Magnetic Fields

    E-Print Network [OSTI]

    Abdulaziz D. Alhaidari; Hocine Bahlouli; Abderrahim El Mouhafid; Ahmed Jellal

    2013-03-20

    We study the effect of a sharply localized magnetic field on the electron transport in a strip (ribbon) of graphene sheet, which allows to give results for the transmission and reflection probability through magnetic barriers. The magnetic field is taken as a single and double delta type localized functions, which are treated later as the zero width limit of gaussian fields. For both field configurations, we evaluate analytically and numerically their transmission and reflection coefficients. The possibility of spacial confinement due to the inhomogeneous field configuration is also investigated.

  6. How paper folds: bending with local constraints

    E-Print Network [OSTI]

    Jemal Guven; Martin Michael Mueller

    2007-12-06

    A variational framework is introduced to describe how a surface bends when it is subject to local constraints on its geometry. This framework is applied to describe the patterns of a folded sheet of paper. The unstretchability of paper implies a constraint on the surface metric; bending is penalized by an energy quadratic in mean curvature. The local Lagrange multipliers enforcing the constraint are identified with a conserved tangential stress that couples to the extrinsic curvature of the sheet. The framework is illustrated by examining the deformation of a flat sheet into a generalized cone.

  7. On Locality in Distributed Storage Systems

    E-Print Network [OSTI]

    Rawat, Ankit Singh

    2012-01-01

    This paper studies the design of codes for distributed storage systems (DSS) that enable local repair in the event of node failure. This paper presents locally repairable codes based on low degree multivariate polynomials. Its code construction mechanism extends work on Noisy Interpolating Set by Dvir et al. \\cite{dvir2011}. The paper presents two classes of codes that allow node repair to be performed by contacting 2 and 3 surviving nodes respectively. It further shows that both classes are good in terms of their rate and minimum distance, and allow their rate to be bartered for greater flexibility in the repair process.

  8. Cellular Automata with Symmetric Local Rules

    E-Print Network [OSTI]

    Vladimir V. Kornyak

    2006-09-18

    The cellular automata with local permutation invariance are considered. We show that in the two-state case the set of such automata coincides with the generalized Game of Life family. We count the number of equivalence classes of the rules under consideration with respect to permutations of states. This reduced number of rules can be efficiently generated in many practical cases by our C program. Since a cellular automaton is a combination of a local rule and a lattice, we consider also maximally symmetric two-dimensional lattices. In addition, we present the results of compatibility analysis of several rules from the Life family.

  9. DOE Facility Management Contracts Facility Owner Contractor

    Office of Environmental Management (EM)

    TRU Solutions 12142000 9302012 9302012 M&O 2001 http:www.wipp.energy.govlibraryfoiaM&OContractWTS%20Index.pdf David Garcia 575-234-7315 Art Welton 575-234-7461...

  10. SAFETY MANUAL Fishermen, Captains, and Owners

    E-Print Network [OSTI]

    ..... , ..... , ... , .. , .. , ... ,',." .... , ... ,.. 32 Storage batteries ....... , , .. , ..... , , ... , ... , , , , ... , , , , , , . , , , 33 Alarms

  11. DOE Facility Management Contracts Facility Owner Contractor

    Office of Environmental Management (EM)

    2000 9302012 9302012 M&O 2001 http:www.wipp.energy.govlibraryfoiaM&OContractWTS%20Index.pdf David Garcia 575-234-7315 Art Welton 575-234-7461 SLAC National Accelerator...

  12. An Owner's Guide to Smoothed Particle Hydrodynamics

    E-Print Network [OSTI]

    T. J. Martin; F. R. Pearce; P. A. Thomas

    1993-10-13

    We present a practical guide to Smoothed Particle Hydrodynamics (\\SPH) and its application to astrophysical problems. Although remarkably robust, \\SPH\\ must be used with care if the results are to be meaningful since the accuracy of \\SPH\\ is sensitive to the arrangement of the particles and the form of the smoothing kernel. In particular, the initial conditions for any \\SPH\\ simulation must consist of particles in dynamic equilibrium. We describe some of the numerical difficulties that may be encountered when using \\SPH, and how these may be overcome. Through our experience in using \\SPH\\ code to model convective stars, galaxy clusters and large scale structure problems we have developed many diagnostic tests. We give these here as an aid to rapid identification of errors, together with a list of basic prerequisites for the most efficient implementation of \\SPH.

  13. Scott Roseman: Owner, New Leaf Community Markets

    E-Print Network [OSTI]

    Reti, Irene H.

    2010-01-01

    an organization devoted to renewable energy technologies. Itwas dedicated to the renewable energy movement. But during

  14. Preparedness A Guide for Owners and Operators

    E-Print Network [OSTI]

    US Army Corps of Engineers

    #12; #12;Emergency Preparedness Guidelines for Levees i Preface Responsibility for flood risk flood damages and promoting sound flood risk management. The authority to determine how land is used governments. As emergency preparedness constitutes an important element of a comprehensive flood risk

  15. Energy Efficiency: Serving the Cooperative Consumer / Owner

    Broader source: Energy.gov [DOE]

    Slides presented in the "What’s Working in Residential Energy Efficiency Upgrade Programs Conference - Promising Approaches and Lessons Learned" on May 20, 2011 in Washington, D.C.

  16. Building Energy Asset Score: Building Owners

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy's Building Energy Asset Score is a national standardized tool for evaluating the physical and structural energy efficiency of commercial and multifamily residential buildings. The Asset Score generates a simple energy efficiency rating that enables comparison among buildings, and identifies opportunities for users to invest in energy efficiency upgrades. It is web-based and free to use.

  17. DOE Facility Management Contracts Facility Owner Contractor

    Broader source: Energy.gov (indexed) [DOE]

    periods 122015 Facility Mgmt 2009 http:www.hanford.govpage.cfmDOEORPContracts Marc McCusker 509-376-2760 Susan E. Bechtol 509-376-3388 Strategic Petroleum Reserve FE Dyn...

  18. Energy Performance and Home Owner Behavior 

    E-Print Network [OSTI]

    Dong, B.

    2013-01-01

    , USA 2 College of Architecture, the University of Texas, San Antonio, TX, USA ESL-KT-13-12-04 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 Introduction • Large gaps between measured performance and simulated... results Source: NBI report 2008 Energy Performance of LEED For New Construction Buildings ESL-KT-13-12-04 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 Introduction • Occupancy behavior (OB) has significant...

  19. Vision of a Multi Properties Owner 

    E-Print Network [OSTI]

    Bouilleaud

    2004-01-01

    engineering dptdo not have sufficient knowledge :?Santo Domingo : socket outlet for razor = 1 kW?Chicago : the cooling calculation software increases by 300 W the cooling load of each room without notice?Saint Petersburg : transformers are 3 times over...

  20. DOE Facility Management Contracts Facility Owner Contractor

    Energy Savers [EERE]

    Award Term Ultimate Potential Expiration Date Contract FY Competed Contract Document Internet Link Location DOE Site Procurement Director DOE Contracting Officer INEEL (AMWTP...