Sample records for owner local privacy

  1. Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation

    E-Print Network [OSTI]

    Jordan, Michael I.

    . Jordan1,2 Martin J. Wainwright1,2 1 Department of Electrical Engineering and Computer Science 2Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation John C. Duchi1 Michael I Department of Statistics University of California, Berkeley {jduchi

  2. Privacy

    Broader source: Energy.gov [DOE]

    Welcome to the homepage of the Department of Energy, Privacy Office. Our mission is to assure the effective implementation of the Department of Energy Privacy Program. We’ve developed this section...

  3. Privacy-preserving data mining

    E-Print Network [OSTI]

    Zhang, Nan

    2009-05-15T23:59:59.000Z

    In the research of privacy-preserving data mining, we address issues related to extracting knowledge from large amounts of data without violating the privacy of the data owners. In this study, we first introduce an integrated baseline architecture...

  4. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  5. Protecting Privacy 

    E-Print Network [OSTI]

    MacQueen, Hector L

    2004-01-01T23:59:59.000Z

    The article discusses the impact of Article 8 of the European Court of Human Rights which recognises a right to privacy. This is contrasted against extensions to the law concerning breach of confidence.

  6. Privacy Act of 1974; Publication of Compilation of Privacy Act...

    Office of Environmental Management (EM)

    Privacy Act of 1974; Publication of Compilation of Privacy Act Systems of Records Privacy Act of 1974; Publication of Compilation of Privacy Act Systems of Records Privacy Act of...

  7. Business Owners: Prepare for Utility Disruptions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Utility Disruptions Business Owners: Prepare for Utility Disruptions Business Owners: Prepare for Utility Disruptions Have a plan in place in case a natural disaster or other...

  8. Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases Archive PublicationsEconomyPrivacy

  9. DEPARTMENT OF ENERGY Privacy Awareness Training | Department...

    Energy Savers [EERE]

    DEPARTMENT OF ENERGY Privacy Awareness Training DEPARTMENT OF ENERGY Privacy Awareness Training DEPARTMENT OF ENERGY Privacy Awareness Training DEPARTMENT OF ENERGY Privacy...

  10. Owners of nuclear power plants

    SciTech Connect (OSTI)

    Hudson, C.R.; White, V.S.

    1996-11-01T23:59:59.000Z

    Commercial nuclear power plants in this country can be owned by a number of separate entities, each with varying ownership proportions. Each of these owners may, in turn, have a parent/subsidiary relationship to other companies. In addition, the operator of the plant may be a different entity as well. This report provides a compilation on the owners/operators for all commercial power reactors in the United States. While the utility industry is currently experiencing changes in organizational structure which may affect nuclear plant ownership, the data in this report is current as of July 1996. The report is divided into sections representing different aspects of nuclear plant ownership.

  11. Commercial Building Tenant Energy Usage Aggregation and Privacy

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.; Wang, Na

    2014-10-31T23:59:59.000Z

    A growing number of building owners are benchmarking their building energy use. This requires the building owner to acquire monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer energy use data (CEUD) as a way to give building owners whole-building energy usage data while protecting customer privacy. Meter profile aggregation adds a layer of protection that decreases the risk of revealing CEUD as the number of meters aggregated increases. The report statistically characterizes the similarity between individual energy usage patterns and whole-building totals at various levels of meter aggregation.

  12. Privacy notice Applicability

    E-Print Network [OSTI]

    Zhou, Yaoqi

    to other university web sites should review the privacy notices for the particular sites they visit. IUPUI Health Services is not responsible for the content of other web sites or for the privacy practices of web notice. Collection and Use Passive/Automatic Collection When you view pages on our site, the web server

  13. Corporate Law's Current-Owner Bias

    E-Print Network [OSTI]

    Fried, Jesse M.

    2005-01-01T23:59:59.000Z

    Owner Bias in Corporate Governance Jesse Fried * Boalt Hallmy conclusion that corporate governance arrangements choseninterventions in corporate governance through the securities

  14. Corporate Law's Current-Owner Bias

    E-Print Network [OSTI]

    Fried, Jesse M.

    2006-01-01T23:59:59.000Z

    Owner Bias in Corporate Governance Jesse Fried * Boalt Hallmy conclusion that corporate governance arrangements choseninterventions in corporate governance through the securities

  15. Privacy Amplification in the Isolated Qubits Model

    E-Print Network [OSTI]

    Yi-Kai Liu

    2015-02-11T23:59:59.000Z

    Isolated qubits are a special class of quantum devices, which can be used to implement tamper-resistant cryptographic hardware such as one-time memories (OTM's). Unfortunately, these OTM constructions leak some information, and standard methods for privacy amplification cannot be applied here, because the adversary has advance knowledge of the hash function that the honest parties will use. In this paper we show a stronger form of privacy amplification that solves this problem, using a fixed hash function that is secure against all possible adversaries in the isolated qubits model. This allows us to construct single-bit OTM's which only leak an exponentially small amount of information. We then study a natural generalization of the isolated qubits model, where the adversary is allowed to perform a polynomially-bounded number of entangling gates, in addition to unbounded local operations and classical communication (LOCC). We show that our technique for privacy amplification is also secure in this setting.

  16. Andrew Marvell and Privacy 

    E-Print Network [OSTI]

    McDonald, Keith A

    2007-01-01T23:59:59.000Z

    of the development of the private in the seventeenth-century, I suggest three fronts by which Marvell interacts with privacy in different ways at different stages of his career: the dilemma of publishing in his early career; commentary on Cromwell’s switch from...

  17. Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data

    SciTech Connect (OSTI)

    Groat, Michael [University of New Mexico, Albuquerque; Forrest, Stephanie [University of New Mexico, Albuquerque; Horey, James L [ORNL; Edwards, Benjamin [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln

    2012-01-01T23:59:59.000Z

    Participatory sensing applications rely on individuals to share local and personal data with others to produce aggregated models and knowledge. In this setting, privacy is an important consideration, and lack of privacy could discourage widespread adoption of many exciting applications. We present a privacy-preserving participatory sensing scheme for multidimensional data which uses negative surveys. Multidimensional data, such as vectors of attributes that include location and environment fields, pose a particular challenge for privacy protection and are common in participatory sensing applications. When reporting data in a negative survey, an individual participant randomly selects a value from the set complement of the sensed data value, once for each dimension, and returns the negative values to a central collection server. Using algorithms described in this paper, the server can reconstruct the probability density functions of the original distributions of sensed values, without knowing the participants actual data. As a consequence, complicated encryption and key management schemes are avoided, conserving energy. We study trade-offs between accuracy and privacy, and their relationships to the number of dimensions, categories, and participants. We introduce dimensional adjustment, a method that reduces the magnification of error associated with earlier work. Two simulation scenarios illustrate how the approach can protect the privacy of a participant's multidimensional data while allowing useful population information to be aggregated.

  18. Smart Meter Privacy: A Utility-Privacy Framework

    E-Print Network [OSTI]

    Rajagopalan, S Raj; Mohajer, Soheil; Poor, H Vincent

    2011-01-01T23:59:59.000Z

    End-user privacy in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far have been tied to specific technologies such as batteries or assumptions on data usage. Existing solutions have also not quantified the loss of benefit (utility) that results from any such privacy-preserving approach. Using tools from information theory, a new framework is presented that abstracts both the privacy and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem with minimal assumptions that is tractable. Specifically for a stationary Gaussian Markov model of the electricity load, it is shown that the optimal utility-and-privacy preserving solution requires filtering out frequency components that are low in power, and this approach appears to encompass most of the proposed privacy approaches.

  19. Community Resilience: Workshops on Private Sector and Property Owner Requirements for Recovery and Restoration from a Diasaster

    SciTech Connect (OSTI)

    Judd, Kathleen S.; Stein, Steven L.; Lesperance, Ann M.

    2008-12-22T23:59:59.000Z

    This report summarizes the results of a proejct sponsored by DTRA to 1) Assess the readiness of private-sector businesses, building owners, and service providers to restore property and recover operations in the aftermath of a wide-area dispersal of anthrax; and 2) Understand what private property owners and businesses "want and need" from federal, state, and local government to support recovery and restoration from such an incident.

  20. Tips For Residential Heating Oil Tank Owners

    E-Print Network [OSTI]

    Maroncelli, Mark

    · · · · · · · · · · · · · · · · · · · · · · Tips For Residential Heating Oil Tank Owners Source: DEP Fact Sheet Residential heating oil tanks are used to store fuel for furnaces or boilers to heat

  1. Gaussian operations and privacy

    SciTech Connect (OSTI)

    Navascues, Miguel; Acin, Antonio [ICFO-Institut de Ciencies Fotoniques, Jordi Girona 29, Edifici Nexus II, E-08034 Barcelona (Spain)

    2005-07-15T23:59:59.000Z

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.

  2. Freedom of Information Act (FOIA) and Privacy Act Requests |...

    Energy Savers [EERE]

    Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information...

  3. Department of Energy Privacy Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    The order establishes Departmental implementation of agency statutory and regulatory requirements for privacy, specifically those provided in the Privacy Act of 1974, as amended at Title 5 United States Code (U.S.C.) 552a, Section 208 of the E Government Act of 2002, and Office of Management and Budget directives. Cancels DOE N 206.5.

  4. Computational Differential Privacy Ilya Mironov1

    E-Print Network [OSTI]

    Vadhan, Salil

    require privacy guarantees to hold only against efficient--i.e., computationally- bounded--adversaries. We

  5. Governmental-Owner Power Imbalance and Privatization

    E-Print Network [OSTI]

    Xu, Kehan

    2011-10-21T23:59:59.000Z

    fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Laszlo Tihanyi Committee Members, Michael Hitt Lorraine Eden Allan (Haipeng) Chen Head of Department, Murray Barrick August 2010... Major Subject: Management iii ABSTRACT Governmental-Owner Power Imbalance and Privatization. (August 2010) Kehan Xu, B.S., China Criminal Police College; M.B.A., University of Miami Chair of Advisory Committee: Dr. Laszlo Tihanyi...

  6. Privacy | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServices » Guidance » Privacy

  7. Property:Owner | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with form History Facebook icon Twitter iconNumOfPlants Jump to:Tool/KeywordOwner

  8. DOE/NNSA Facility Management Contracts Facility Owner Contractor

    Broader source: Energy.gov (indexed) [DOE]

    NNSA Facility Management Contracts Facility Owner Contractor Award Date End Date OptionsAward Term Ultimate Potential Expiration Date Contract FY Competed Parent Companies LLC...

  9. Rights and Duties of Mines and Mine Owners, General (Missouri)

    Broader source: Energy.gov [DOE]

    This legislation addresses general operational guidelines for mine owners regarding public notices, fees, land and mineral ownership, requirements for mining in certain municipalities, and mining...

  10. Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey

    E-Print Network [OSTI]

    Kaiser, Gail E.

    Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey is part of a research project survey #12;0% 100% Yes Unsure No Yes Unsure No Social Networks and Online Privacy Concerns Survey

  11. East Tennessee State University Web Privacy Statement

    E-Print Network [OSTI]

    Karsai, Istvan

    East Tennessee State University Web Privacy Statement A Note to Children and Parents East Tennessee through a university Web site is handled. ETSU understands the importance of protecting the privacy of personal information, especially in today's electronic environment. This privacy policy covers the Web

  12. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  13. "Table HC3.5 Space Heating Usage Indicators by Owner-Occupied...

    U.S. Energy Information Administration (EIA) Indexed Site

    5 Space Heating Usage Indicators by Owner-Occupied Housing Unit, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing...

  14. Guide to Combined Heat and Power Systems for Boiler Owners and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Combined Heat and Power Systems for Boiler Owners and Operators, July 2004 Guide to Combined Heat and Power Systems for Boiler Owners and Operators, July 2004 Many owners and...

  15. Local Option- Residential Sustainable Energy Program

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money from the local government to pay for energy improvements. The amount borrowed is typically repai...

  16. Local Option- Commercial PACE Financing (Utah)

    Broader source: Energy.gov [DOE]

    Senate Bill 221 of 2013 authorizes local governments to adopt Commercial* Property Assessed Clean Energy (C-PACE) financing programs. C-PACE allows property owners to finance energy efficiency and...

  17. MAINE MULTIFAMILY BUILDING OWNERS TRUST IN EFFICIENCY | Department...

    Broader source: Energy.gov (indexed) [DOE]

    MAINE MULTIFAMILY BUILDING OWNERS TRUST IN EFFICIENCY Nearly 70% of households in Maine rely on fuel oil as their primary energy source for home heating, more than any other state....

  18. Owner/contractor work structure process with integrated alignment framework

    E-Print Network [OSTI]

    Sullivan, George Ray

    1996-01-01T23:59:59.000Z

    capital program expenditures , and to improve operational efficiency. For their capital projects, owners want the highest quality project, as fast as possible, at the lowest possible cost, with no harm to workers or the environment. To accomplish this...

  19. The Impact of Energy Information Upon Small Business Owners

    E-Print Network [OSTI]

    Franklin, Casey Gail

    2014-05-31T23:59:59.000Z

    . Findings indicated that although each participant expressed an interest in conserving energy, none were regularly engaging with their electricity consumption information through the online monitor. Business owners did not find the monitor useful because...

  20. Citizen's Attitudes About Privacy: Results Citizen's Attitudes about Privacy While Accessing Government Websites

    E-Print Network [OSTI]

    Yang, Junfeng

    Citizen's Attitudes About Privacy: Results 1 Citizen's Attitudes about Privacy While Accessing 10027 March 3, 2003 Abstract This paper reports the results of an investigation on citizens' attitudes Private Portal that protects citizen's personally identifying information when accessing government

  1. NBP RFI: Data Access, Third Party Use, and Privacy- Comments...

    Energy Savers [EERE]

    Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC Oncor...

  2. Short Paper: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure

    E-Print Network [OSTI]

    Politécnica de Madrid, Universidad

    Short Paper: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure Emiliano De Cristofaro-secure guarantees. In this paper, we introduce PEPSI: Privacy- Enhanced Participatory Sensing Infrastructure. We

  3. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  4. PRIVACY AND SECURITY OF PERSONAL INFORMATION

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

  5. Privacy in the Cloud Computing Era

    E-Print Network [OSTI]

    Narasayya, Vivek

    Privacy in the Cloud Computing Era A Microsoft Perspective November 2009 #12;The information information presented after the date of publication. This white paper is for informational purposes only. Microsoft Corp. · One Microsoft Way · Redmond, WA 98052-6399 · USA #12;Contents Cloud Computing and Privacy

  6. UNIVERSITY OF TECHNOLOGY, SYDNEY PRIVACY MANAGEMENT PLAN

    E-Print Network [OSTI]

    University of Technology, Sydney

    1 UNIVERSITY OF TECHNOLOGY, SYDNEY PRIVACY MANAGEMENT PLAN Title: A Management Plan to comply a Privacy Management Plan in operation by the effective date. A Plan is a statement of how the agency storage (such as paper files) but also electronic records, video recordings, biometric information

  7. CONTRIBUTED Privacy-AwareDesignPrinciples

    E-Print Network [OSTI]

    Wicker, Stephen

    CONTRIBUTED P A P E R Privacy-AwareDesignPrinciples for Information Networks In this paper a negative impact on both the individual and society, and the public's perception of engi- neered systems/demand response case study to illustrate the impact of the proposed design rules that protect individual privacy

  8. Email Clients as Decentralized Social Apps in Mr. Privacy

    E-Print Network [OSTI]

    Pratt, Vaughan

    Email Clients as Decentralized Social Apps in Mr. Privacy Michael H. Fischer T. J. Purtell Monica S,tpurtell,lam}@cs.stanford.edu Abstract. This paper proposes Mr. Privacy, a social application frame- work built on top of email, that encourages open competition and pro- vides privacy for users. Applications built on Mr. Privacy are "social

  9. Employee Statement of Understanding Privacy of Student Records

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    "Privacy of Student Records" on the Registrar's web site. The security of student records, whether physical

  10. Balancing Privacy and Utility in Cross-Company Defect Prediction

    E-Print Network [OSTI]

    Menzies, Tim

    difficult due to the business sensitivity associated with the data. Because of this sensitivity, data owners

  11. Privacy Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases Archive PublicationsEconomyPrivacy Notice We

  12. Privacy Notice | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases Archive PublicationsEconomyPrivacy Notice

  13. WIPP - Privacy Act of 1974

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSiteEureka Analytics andWFRNewsWindPrivacy Act

  14. Design Team:Owners Team: Solaris Group, LLC

    E-Print Network [OSTI]

    Solaris Port of Benton NORTH #12;Climate and Design Maximize East/West Solar Orientation · Reduce ThermalDesign Team:Owners Team: Solaris Group, LLC a management company TRI-CITIES RESEARCH DISTRICT Prevailing Winds for Passive Site Cooling · Deter Winter Gusts · Protection via Walkway Screens and Canopies

  15. COMMUNITY RESILIENCE: WORKSHOPS ON PRIVATE SECTOR AND PROPERTY OWNER

    E-Print Network [OSTI]

    STATES DEPARTMENT OF ENERGY under Contract DE-AC05-76RL01830 #12;Acknowledgments The authors would like to acknowledge and thank the businesses, building owners, service providers, and representatives who participated .....................................................................................3 4.1 Workshop with Private Sector Businesses on August 12

  16. Searching for Privacy in a Mixed Jurisdiction 

    E-Print Network [OSTI]

    MacQueen, Hector L

    2006-01-01T23:59:59.000Z

    The article examines the individual’s right to privacy, with particular reference to its protection against actors other than the State. The English model is provided by the Common Law on breach of confidence; the Civilian ...

  17. Privacy & Security Notice | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy...

  18. Towards Privacy Preserving of Forensic DNA Databases

    E-Print Network [OSTI]

    Liu, Sanmin

    2012-02-14T23:59:59.000Z

    Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user's query and the DNA database need to be extracted. However, unrelated profiles cannot be revealed to each other...

  19. How life insurance can benefit the business owner

    SciTech Connect (OSTI)

    Byles, B.

    1993-02-01T23:59:59.000Z

    There are many situations when life insurance can fill the financial needs of business owners. Three of the most common needs are business continuation/value conservation (buy-sell agreement), asset conservation upon death or disability of a key employee (replace the value of a key employee upon death or disability), and the reward and retention of selected employees (bonus or deferred compensation). Let's take a closer look to see why life insurance makes sense in these three areas.

  20. DOE Convenes Multi-stakeholder Process to Address Privacy for...

    Energy Savers [EERE]

    DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by...

  1. Consumers' Cognitive, Affective, and Behavioral Responses to an Invasion of Privacy: Essays on Understanding Consumer's Privacy Concerns 

    E-Print Network [OSTI]

    Srivastava, Mona

    2009-05-15T23:59:59.000Z

    This dissertation focuses on the discrepancy between consumers’ attitudes towards privacy and actual behavior. Although consumers increasingly protest against invasions of privacy, they routinely disclose more information than their disclosure...

  2. Consumers' Cognitive, Affective, and Behavioral Responses to an Invasion of Privacy: Essays on Understanding Consumer's Privacy Concerns

    E-Print Network [OSTI]

    Srivastava, Mona

    2009-05-15T23:59:59.000Z

    This dissertation focuses on the discrepancy between consumers’ attitudes towards privacy and actual behavior. Although consumers increasingly protest against invasions of privacy, they routinely disclose more information than their disclosure...

  3. 3702 IEEE SENSORS JOURNAL, VOL. 13, NO. 10, OCTOBER 2013 EPS: An Efficient and Privacy-Preserving Service

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    , health care, and government services. In smart community, residents manage their home appliances to coop smart homes in a local residential region and formed upon the agreement of participating home owners of Things (IoT). Smart homes are essential components of smart community, where communication devices

  4. Building Energy Asset Score: Building Owners | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof Energy Future ofHydronicBuildingDepartment ofCodesBuilding Owners

  5. The Genetic Privacy Act and commentary

    SciTech Connect (OSTI)

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28T23:59:59.000Z

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. Therefore, to effectively protect genetic privacy unauthorized collection and analysis of individually identifiable DNA must be prohibited. As a result, the premise of the Act is that no stranger should have or control identifiable DNA samples or genetic information about an individual unless that individual specifically authorizes the collection of DNA samples for the purpose of genetic analysis, authorized the creation of that private information, and has access to and control over the dissemination of that information.

  6. Guide to Combined Heat and Power Systems for Boiler Owners and...

    Broader source: Energy.gov (indexed) [DOE]

    the Department of Energy to improve steam system performance. Guide to Combined Heat and Power Systems for Boiler Owners and Operators (July 2004) More Documents & Publications...

  7. Privacy-Preserving Smart Metering Alfredo Rial

    E-Print Network [OSTI]

    Bernstein, Phil

    Privacy-Preserving Smart Metering Alfredo Rial K.U.Leuven, ESAT/COSIC & IBBT Leuven, Belgium General Terms Security Keywords Billing, Smart metering, Cryptographic Protocol, Verifiable Computing 1 of smart meter data for more accurate forecasting, Permission to make digital or hard copies of all or part

  8. Privacy Impact Assessment Chandra Digest Request

    E-Print Network [OSTI]

    Mathis, Wayne N.

    Privacy Impact Assessment Chandra Digest Request I. System Identification 1. IT System Name: Chandra EPO Digest (http://chandra.harvard.edu/chronicle/news_priv.html) 2. IT System Sponsor: Van Mc digest. 4. With whom the information will be shared. #12;Only the providers of the material (certain CXC

  9. Privacy Impact Assessment (PIA) I. System Identification

    E-Print Network [OSTI]

    Mathis, Wayne N.

    Privacy Impact Assessment (PIA) I. System Identification 1. IT System Name: NPM Current Public editing done at the time of entry. 2. Why the information is being collected. The NPM Education Department of the current permanent NPM Education Department staff only. The file resides on a server and access

  10. Privacy Impact Assessment (PIA) I. System Identification

    E-Print Network [OSTI]

    Mathis, Wayne N.

    Privacy Impact Assessment (PIA) I. System Identification 1. IT System Name: NPM Public Program is being collected. The NPM Education Department manages numerous volunteers. A spreadsheet is required is shared with members of the current permanent NPM Education Department staff only. The file resides

  11. Location Privacy and the Personal Distributed Environment

    E-Print Network [OSTI]

    Atkinson, Robert C

    Location Privacy and the Personal Distributed Environment Robert C Atkinson, Swee Keow Goo, James-- The Personal Distributed Environment is a new concept being developed within the Mobile VCE Core 3 research, wherever their location: ubiquitous access. Devices are co-ordinated by Device Management Entities (DMEs

  12. NBP RFI: Data Access, Third Party Use and Privacy- Comments of...

    Energy Savers [EERE]

    Use and Privacy- Comments of Baltimore Gas & Electric Company NBP RFI: Data Access, Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company Comments from...

  13. Data Privacy and the Smart Grid: A Voluntary Code of Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    In addition, in February 2012, the White House released the report, Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting...

  14. LM Records Handling System-Freedom of Information/Privacy Act...

    Broader source: Energy.gov (indexed) [DOE]

    Freedom of InformationPrivacy Act, Office of Legacy management LM Records Handling System-Freedom of InformationPrivacy Act, Office of Legacy management More Documents &...

  15. A rhetorical analysis of the right to privacy

    E-Print Network [OSTI]

    Spatz, George Reynolds

    1999-01-01T23:59:59.000Z

    that there is not a constitutional provision that recognizes privacy. Taking a textualist approach, Justice Black claims to be "compelled to admit that government has a right to invade it [privacy] unless prohibited by some specific constitutional provision. . . I... to privacy as established in Griswold holds promise as a coherent model for evaluating the constitutionality of statutes that potentially infringe upon minority civil liberties. In this chapter, I will first situate a Burkeian approach to constitutional...

  16. Public Roundtable- Data Access and Privacy Issues Related to...

    Broader source: Energy.gov (indexed) [DOE]

    to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies More Documents & Publications Testimony Public Meeting Transcript:...

  17. Freedom of Information Act/Privacy Act Requests | National Nuclear...

    National Nuclear Security Administration (NNSA)

    ActPrivacy Act Requests | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  18. The Genetic Privacy Act and commentary

    SciTech Connect (OSTI)

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28T23:59:59.000Z

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. The DNA molecule holds an extensive amount of currently indecipherable information. The major goal of the Human Genome Project is to decipher this code so that the information it contains is accessible. The privacy question is, accessible to whom? The highly personal nature of the information contained in DNA can be illustrated by thinking of DNA as containing an individual`s {open_quotes}future diary.{close_quotes} A diary is perhaps the most personal and private document a person can create. It contains a person`s innermost thoughts and perceptions, and is usually hidden and locked to assure its secrecy. Diaries describe the past. The information in one`s genetic code can be thought of as a coded probabilistic future diary because it describes an important part of a unique and personal future. This document presents an introduction to the proposal for federal legislation `the Genetic Privacy Act`; a copy of the proposed act; and comment.

  19. Medical information and the right to privacy

    SciTech Connect (OSTI)

    Drell, D. [ed.

    1994-06-01T23:59:59.000Z

    This report is a compilation of submitted abstracts of papers presented at the DOE-supported workshop on medical information and the right to privacy held at the National Academy of Sciences in Washington, DC, on June 9 and 10, 1994. The aim of this meeting is to provide a forum to discuss the legal, ethical and practical issues related to the computerization and use of medical data, as well as the potential impact the use of these data may have on an individual`s privacy. Topical areas include an overview of the Federal and legal requirements to collect medical data, historical experiences with worker screening programs, currently available medical surveillance technologies (both biomedical and computer technologies) and their limitations. In addition, an-depth assessment of the needs and interests of a wide spectrum of parties as they relate to the use of medical data from both a legal and privacy perspective is provided. The needs of the individual, the public (e.g., blood and tissue banks), private enterprises (e.g., industry and insurance carriers), and the government (e.g., FBI) are discussed. Finally, the practical and legal issues relating to the use of computers to carry, store and transmit this information are also examined. The abstracts are presented in the intended order of presentation as indicated in the agenda for the meeting.

  20. MEMORANDUM OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling CorpNewCF INDUSTRIES,L? .-IGY DATE---I TO:

  1. OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN .METALS~ c3 Alexander9412,l . . ;

  2. OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN .METALS~ c3 Alexander9412,l . .

  3. OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN .METALS~ c3 Alexander9412,l .

  4. OWNER(S) Past:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN .METALS~ c3 Alexander9412,l

  5. SUBJECT: OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3u ;;;:: A' 3

  6. Optimal Privacy-Preserving Energy Management for Smart Meters

    E-Print Network [OSTI]

    Reisslein, Martin

    Optimal Privacy-Preserving Energy Management for Smart Meters Lei Yang, Xu Chen, Junshan Zhang Abstract--Smart meters, designed for information collection and system monitoring in smart grid, report a tradeoff between the smart meter data privacy and the electricity bill. In general, a major challenge

  7. Achieving Differential Privacy of Data Disclosure in the Smart Grid

    E-Print Network [OSTI]

    Wang, Yu

    -grained usage data collection. For example, smart metering data could reveal highly accurate real-time home. Index Terms--Smart Grid, Smart Meter, Privacy, Differential Privacy, Data Disclosure I. INTRODUCTION With the rapid development of the advanced meter infras- tructure (AMI) [1] as part of a move to smart grids

  8. Privacy Preserving Smart Metering System Based Retail Level Electricity Market

    E-Print Network [OSTI]

    Franchetti, Franz

    1 Privacy Preserving Smart Metering System Based Retail Level Electricity Market Cory Thoma, Tao Cui, Student Member, IEEE, Franz Franchetti, Member, IEEE Abstract--Smart metering systems multi-party compu- tation (SMC) based privacy preserving smart metering system. Using the proposed SMC

  9. Secure Multiparty Computation Based Privacy Preserving Smart Metering System

    E-Print Network [OSTI]

    Franchetti, Franz

    Secure Multiparty Computation Based Privacy Preserving Smart Metering System Cory Thoma Information Ave. Pittsburgh, PA 15213 Email: {tcui,franzf}@ece.cmu.edu Abstract--Smart metering systems provide privacy preserving protocol for smart meter based load management. Using SMC and a proper designed

  10. Analyzing Facebook Privacy Settings: User Expectations vs. Reality

    E-Print Network [OSTI]

    Gummadi, Krishna P.

    Analyzing Facebook Privacy Settings: User Expectations vs. Reality Yabing Liu Northeastern of personal data has emerged as a popular ac- tivity over online social networking sites like Facebook privacy. We de- ploy a survey, implemented as a Facebook application, to 200 Facebook users recruited via

  11. The Unsolvable Privacy Problem and its Implications for Security Technologies

    E-Print Network [OSTI]

    Minnesota, University of

    Discrimination Price discrimination is the charging of varying prices when there are no cost jus- tifications argues that there are strong incentives for decreasing privacy, rooted in the economic benefits of price discrimination. As a result, the privacy problem is unsolvable. The conflict between incentives to price

  12. Evaluating User Privacy in Bitcoin Elli Androulaki1

    E-Print Network [OSTI]

    Evaluating User Privacy in Bitcoin Elli Androulaki1 , Ghassan O. Karame2 , Marc Roeschlin1 , Tobias.karame@neclab.eu Abstract. Bitcoin is quickly emerging as a popular digital payment system. How- ever, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all

  13. The Unsolvable Privacy Problem and its Implications for Security Technologies

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    argues that there are strong incentives for decreasing privacy, rooted in the economic benefits of price incentives to price discriminate, as is well established in the economics literature. Railroads were discrimination. As a result, the privacy problem is unsolvable. The conflict between incentives to price

  14. Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records

    E-Print Network [OSTI]

    Lauter, Kristin

    .S. President Barack Obama signed into law the American Recovery and Reinvestment Act of 2009, which containedPatient Controlled Encryption: Ensuring Privacy of Electronic Medical Records Josh Benaloh, Melissa,melissac,horvitz,klauter}@microsoft.com ABSTRACT We explore the challenge of preserving patients' privacy in electronic health record systems. We

  15. Navigating Computer Science Research Through Waves of Privacy Concerns

    E-Print Network [OSTI]

    Navigating Computer Science Research Through Waves of Privacy Concerns: Discussions among Computer as Computer Science Technical Report CMU-CS-03-165 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213-3890 Abstract Computer Science research and practice are raising growing privacy

  16. Electronic Vehicle Identification: Industry Standards, Performance, and Privacy Issues

    E-Print Network [OSTI]

    Texas at Austin, University of

    0-5217-P2 Electronic Vehicle Identification: Industry Standards, Performance, and Privacy Issues Authors: Dr. Khali Persad Dr. C. Michael Walton Shahriyar Hussain Project 0-5217: Vehicle/License Plate. Privacy concerns regarding collection and use of data on vehicle movements are examined in the context

  17. Temporal Privacy in Wireless Sensor Networks: Theory and Practice

    E-Print Network [OSTI]

    Xu, Wenyuan

    with knowledge of the network deployment, routing algorithms, and the base-station (data sink) location can infer that effectively manages these tradeoffs. Finally, we evaluate our privacy enhancement strategies using simulations, Measurement, Performance, Theory Additional Key Words and Phrases: Sensor networks, privacy, security

  18. Maintaining Trajectory Privacy in Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    based and analytical performance evaluations for the proposed scheme. The results show that a network, the location privacy of the collectors of mobile companies is a security concern. Drastically, the networkMaintaining Trajectory Privacy in Mobile Wireless Sensor Networks Osman Kiraz Sabanci University

  19. The Role of Signal Processing in meeting Cyber-Security and Privacy Challenges

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 The Role of Signal Processing in meeting Cyber-Security and Privacy Challenges Lalitha Sankar Spaces Image Classification/ Location Privacy Modify Control Messages Security Privacy Fig. 1. Illustration of several classes of cyber-security and privacy threats in networks and distributed data systems

  20. Context is everything Sociality and privacy in online Social Network Sites

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Context is everything Sociality and privacy in online Social Network Sites Context is everything Sociality and privacy in online Social Network Sites Ronald LeenesRonald Leenes TILT ­ Tilburg Institute.e.leenes@tilburguniversity.nl Abstract. Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy

  1. Connecting Distributed Energy Resources to the Grid: Their Benefits to the DER Owner etc.

    SciTech Connect (OSTI)

    Poore, WP

    2003-07-09T23:59:59.000Z

    The vision of the Distributed Energy Research Program (DER) program of the U.S. Department of Energy (DOE) is that the United States will have the cleanest and most efficient and reliable energy system in the world by maximizing the use of affordable distributed energy resources. Electricity consumers will be able to choose from a diverse number of efficient, cost-effective, and environmentally friendly distributed energy options and easily connect them into the nation's energy infrastructure while providing benefits to their owners and other stakeholders. The long-term goal of this vision is that DER will achieve a 20% share of new electric capacity additions in the United States by 2010, thereby helping to make the nation's electric power generation and delivery system more efficient, reliable, secure, clean, economical, and diverse in terms of fuel use (oil, natural gas, solar, hydroelectric, etc.) and prime mover resource (solar, wind, gas turbines, etc.). Near- and mid-term goals are to develop new technologies for implementing and operating DER and address barriers associated with DER usage and then to reduce costs and emissions and improve the efficiency and reliability of DER. Numerous strategies for meeting these goals have been developed into a research, development, and demonstration (RD&D) program that supports generation and delivery systems architecture, including modeling and simulation tools. The benefits associated with DER installations are often significant and numerous. They almost always provide tangible economic benefits, such as energy savings or transmission and distribution upgrade deferrals, as well as intangible benefits, such as power quality improvements that lengthen maintenance or repair intervals for power equipment. Also, the benefits routinely are dispersed among end users, utilities, and the public. For instance, an end user may use the DER to reduce their peak demand and save money due to lower demand charges. Reduced end user peak demand, in turn, may lower a distribution system peak load such that upgrades are deferred or avoided. This could benefit other consumers by providing them with higher reliability and power quality as well as avoiding their cost share of a distribution system upgrade. In this example, the costs of the DER may be born by the end user, but that user reaps only a share of the benefits. This report, the first product of a study to quantify the value of DER, documents initial project efforts to develop an assessment methodology. The focus of currently available site-specific DER assessment techniques are typically limited to two parties, the owner/user and the local utility. Rarely are the impacts on other stakeholders, including interconnected distribution utilities, transmission system operators, generating system operators, other local utility customers, local and regional industry and business, various levels of government, and the environment considered. The goal of this assessment is to quantify benefits and cost savings that accrue broadly across a region, recognizing that DER installations may have local, regional, or national benefits.

  2. Database Aids Building Owners and Operators in Energy-Efficiency...

    Energy Savers [EERE]

    to identify the best efficiency investment opportunities and limits the ability of public-sector actors to design and implement programs that are tailored to local market...

  3. An Internet survey of private pond owners and managers in Texas

    E-Print Network [OSTI]

    Schonrock, April Elizabeth

    2005-11-01T23:59:59.000Z

    pond owners got the information they used to deal with pond management problems. A secondary emphasis of the project was to examine the potential presented by the Internet for use in this type of information gathering and distribution for Texas...

  4. DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference

    Broader source: Energy.gov [DOE]

    More than 150 energy sector leaders—including nearly 100 asset owners and operators—gathered at the 2009 EnergySec Annual Summit in Seattle, WA, on Sept. 23-24, where researchers from the...

  5. Privacy and Security Notice | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases Archive PublicationsEconomyPrivacySecurity

  6. Privacy Policy | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News, informationPriority Firm Exchange . . .Privacy

  7. UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar Revised: 10/03/13 UCSC Policy of the student. #12;UCSC Policy on Privacy of Student Records: A Quick Reference Office of the Registrar UCSC

  8. How (Not) to Protect Genomic Data Privacy in a Distributed Network: Using Trail Re-identification to Evaluate and Design Privacy Protection Systems

    E-Print Network [OSTI]

    1 How (Not) to Protect Genomic Data Privacy in a Distributed Network: Using Trail Re-specific genomic data into clinical practice and research raises serious privacy concerns. Various systems have being disclosed, they lack formal proofs. In this paper, we study the erosion of privacy when genomic

  9. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  10. Constant-Round Privacy Preserving Multiset Union Jeongdae Hong1

    E-Print Network [OSTI]

    information about patients with sparse disease, while hospitals or patients want to protect their privacy Cheon mix-net. Still, since the shuffling protocol by KS also relays an intermediate shuffling result

  11. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved GUIDELINE TITLE: Information Security Incident Response GUIDELINE PURPOSE: The purpose of information security incident response is to: mitigate the effects caused by such an incident

  12. approximate privacy foundations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    12;Microsoe in 2011 12;Techniques for LocaKon Privacy 12;Stealth Stealth Ability to be at a loca(on without anyone knowing you Zhang, Rui 16 Managing...

  13. REVIEW OF TRANSAMERICA DELAVAL INC. DIESEL GENERATOR OWNERS' GROUP ENGINE REQUALIFICATION PROGRAM

    SciTech Connect (OSTI)

    Berlinger, C. H.

    1985-12-01T23:59:59.000Z

    In December 1983, 13 nuclear utilities that own TDI diesel generators formally established an Owners• Group to address concerns regarding the reliability and operability of these engines. The Owners' Group program for engine requalification consisted of four major elements: 1) resolution of known problems with potentially generic implications, 2) a design review and quality revalidation (DR/QR) effort aimed at identifying and correcting potential problems with the important engine components, 3) expanded engine testing and inspection, and 4) enhanced engine maintenance and surveillance (M/S) to maintain the qualification of the diesel engines for the lifetime of the nuclear plants that they service. In providing technical support to NRC, the PNL project staff, assisted by a number of diesel engine consultants, focused on the four major elements of the Owners' Group engine requalification program, addressing both generic and plant-specific areas.

  14. Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S2

    E-Print Network [OSTI]

    Boult, Terrance E.

    ? One solution to this privacy/security conundrum is to use privacy-enhanced template protection(PETP significant security prob- lems [23, 18]. Some PETP techniques such as revocable biotokens [4] and fuzzy

  15. A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society

    E-Print Network [OSTI]

    A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and SocietyHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies

  16. Configurable Dynamic Privacy for Pervasive Sensor Networks Nan-Wei Gong

    E-Print Network [OSTI]

    1 Configurable Dynamic Privacy for Pervasive Sensor Networks by Nan-Wei Gong Submitted Privacy for Pervasive Sensor Networks by Nan-Wei Gong Submitted to the Program in Media Arts and Sciences

  17. Take it or Leave it: Running a Survey when Privacy Comes at a Cost

    E-Print Network [OSTI]

    Ligett, Katrina

    Take it or Leave it: Running a Survey when Privacy Comes at a Cost Katrina Ligett1 and Aaron Roth2 as a function of their privacy loss. Nevertheless, they would be willing to participate in the survey in this set- ting, when costs for privacy loss may be correlated with private types, if individuals value

  18. Privacy Risks and Countermeasures in Publishing and Mining Social Network Data

    E-Print Network [OSTI]

    Liu, Ling

    Privacy Risks and Countermeasures in Publishing and Mining Social Network Data Chiemi Watanabe--As interests in sharing and mining social network data continue to grow, we see a growing demand for privacy preserving social network data publishing. In this paper, we discuss privacy risks in publishing social

  19. Accountable Privacy Mike Burmester 1 , Yvo Desmedt 1 , Rebecca N. Wright 2 , and Alec Yasinsac 1

    E-Print Network [OSTI]

    Wright, Rebecca N.

    entities committed which actions, while privacy seeks to hide this information. In this paper, we discuss not even agree on what privacy is. Loosely speaking, privacy is the ability to control private information purposes makes personal data an increas- ingly attractive target for potential criminals. Governments

  20. AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing Safwan Mahmud Khan their computation results are ultimately delivered. To provide this data ownership privacy, the cloud's distributed-anonymity; authentication; cloud computing; in- formation security; privacy; Tor I. INTRODUCTION Revolutionary advances

  1. A unique program for horse business owners Tuesdays, February 5 -March 19 (seven weeks)

    E-Print Network [OSTI]

    Goodman, Robert M.

    A unique program for horse business owners Tuesdays, February 5 - March 19 (seven weeks) 6:00pm ­ 9 budgeting plan by the end of the seven-week course. The course is offered by Dr. Carey Williams, Equine@njaes.rutgers.edu, 848-932-3229 $70.00 per person Dinner and Companion workbook included. Equine Business Planning Course

  2. Tour of Entergy's Nuclear Power Plant in River Bend Owner: Entergy Gulf States Inc.

    E-Print Network [OSTI]

    Ervin, Elizabeth K.

    Tour of Entergy's Nuclear Power Plant in River Bend Owner: Entergy Gulf States Inc. Reactor Type a nuclear power plant. Plant was Entergy, a Boiling Water Reactor (BWR) type. Built in the 80's, it has of the veteran plant workers. The presentation gave the nuclear plant engineering basics and built

  3. WORKING PAPER N 2013 11 The Grey Paradox: How Oil Owners Can Benefit

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , Fossil Fuels, GlobalWarming, Non-renewable Resources, OPEC PARIS-JOURDAN SCIENCES ECONOMIQUES 48, BD, Fossil Fuels, Global Warming, Non-renewable Resources, OPEC. JEL Classication: H21, H23, Q31, Q38, Q41, Q of fossil-fuel owners de- pends on the characteristics of their fossil fuels (recoverable reserves

  4. Guide to Combined Heat and Power Systems for Boiler Owners and Operators

    SciTech Connect (OSTI)

    Oland, CB

    2004-08-19T23:59:59.000Z

    Combined heat and power (CHP) or cogeneration is the sequential production of two forms of useful energy from a single fuel source. In most CHP applications, chemical energy in fuel is converted to both mechanical and thermal energy. The mechanical energy is generally used to generate electricity, while the thermal energy or heat is used to produce steam, hot water, or hot air. Depending on the application, CHP is referred to by various names including Building Cooling, Heating, and Power (BCHP); Cooling, Heating, and Power for Buildings (CHPB); Combined Cooling, Heating, and Power (CCHP); Integrated Energy Systems (IES), or Distributed Energy Resources (DER). The principal technical advantage of a CHP system is its ability to extract more useful energy from fuel compared to traditional energy systems such as conventional power plants that only generate electricity and industrial boiler systems that only produce steam or hot water for process applications. By using fuel energy for both power and heat production, CHP systems can be very energy efficient and have the potential to produce electricity below the price charged by the local power provider. Another important incentive for applying cogeneration technology is to reduce or eliminate dependency on the electrical grid. For some industrial processes, the consequences of losing power for even a short period of time are unacceptable. The primary objective of the guide is to present information needed to evaluate the viability of cogeneration for new or existing industrial, commercial, and institutional (ICI) boiler installations and to make informed CHP equipment selection decisions. Information presented is meant to help boiler owners and operators understand the potential benefits derived from implementing a CHP project and recognize opportunities for successful application of cogeneration technology. Topics covered in the guide follow: (1) an overview of cogeneration technology with discussions about benefits of applying cogeneration technology and barriers to implementing cogeneration technology; (2) applicable federal regulations and permitting issues; (3) descriptions of prime movers commonly used in CHP applications, including discussions about design characteristics, heat-recovery options and equipment, fuels and emissions, efficiency, maintenance, availability, and capital cost; (4) electrical generators and electrical interconnection equipment; (5) cooling and dehumidification equipment; (6) thermodynamic cycle options and configurations; (7) steps for evaluating the technical and economic feasibility of applying cogeneration technology; and (8) information sources.

  5. g:\\fpdc\\contracts unit\\consultant selection and agreement forms\\consultant agreements\\owner consultant agreement final pdc.doc Page 1 of 24

    E-Print Network [OSTI]

    Dyer, Bill

    \\owner consultant agreement final pdc.doc Page 1 of 24 MONTANA STATE UNIVERSITY PLANNING, DESIGN & CONSTRUCTION 6TH forms\\consultant agreements\\owner consultant agreement final pdc.doc Page 2 of 24 TABLE OF CONTENTS PART\\consultant selection and agreement forms\\consultant agreements\\owner consultant agreement final pdc.doc Page 3 of 24 1

  6. On mental privacy: the having of mental states

    E-Print Network [OSTI]

    Dembitzer, Simon David

    1998-01-01T23:59:59.000Z

    , according to Churchland, wishes to defend. This modalized version of the argument, as Churchland presents it (1992, pp. 59-60), says: (MEC) (1) My mental states are knowable by me by introspection. 24 (2) My brain states are not knowable by me...1) and (EC2), and begs the question in (MEC). My claim is that these charges are a result of Churchland's mischaracterization of Nagel's notion of privacy. The characterizations of privacy in (EC1), (EC2), and (MEC) are not Nagel...

  7. Absentee herd owners and part-time pastoralists: the political economy of resource use in northern Kenya

    SciTech Connect (OSTI)

    Little, P.D.

    1985-06-01T23:59:59.000Z

    The prevalence of absentee herd ownership in Africa's pastoral areas is increasing. Its presence has important implications both for local resource management systems and for research programs that address pastoral ecology and related topics. This paper examines patterns of absentee herd ownership in the Baringo District of northern Kenya. This region has been the source of much debate regarding herder ''mismanagement'' of range lands. Three categories of absentee herd owners are discussed in the paper: (1) ranchers, (2) livestock traders, and (3) townsmen. It is suggested that the blame for some of the apparent resource mismanagement in the region may lie more with actors in these categories than with the pastoralists themselves. Data collected during an 18-month period in 1980-1981 on pastoral ecology, grazing patterns, and tenure institutions are presented in support of the argument. The paper concludes with a comparative analysis of contemporary resource management strategies in pastoral Africa, emphasizing that: (1) the Baringo case is not an isolated anomaly, and (2) a new orientation toward pastoral studies is warranted.

  8. Federal offshore oil and gas lease bonus bid rejections: viewpoints of bidders and owners

    SciTech Connect (OSTI)

    Lohrenz, J.; Dougherty, E.L.

    1983-03-01T23:59:59.000Z

    The Federal Government currently estimates values of leases offered in offshore oil and gas sales. After sales, the estimates are compared with highest bonus bids to decide whether to issue a lease or not. Over the past decade the Government has opted via this process not to issue leases on approximately one out of seven leases receiving bonus bids. The Government avows this assures fair market value is received. The authors believe this avowal is hogwash. The authors support this belief with logical argument, quantitative analysis, and statistical study. They conclude that by following the current policy, the Federal Government acting as agent for all of us, the collected people and owners of the lands in question, is acting to the detriment of the account they should serve. Alternative policies are proposed which both increase the efficiency of bringing offshore oil and gas resources to use and decrease the expense the Government burdens the owners with.

  9. The effect of landownership change among small woodland owners on timber availability in East Texas

    E-Print Network [OSTI]

    Gehlhausen, Randy Joe

    1976-01-01T23:59:59.000Z

    Forest Ownership Past Management Practices Past Harvesting H1. story Futu e Nanagement Intentions Future Harvesting Plans Statistical Analysis of Landowner Ccaracteristics Restrictions 18 20 22 22 25 25 25 29 29 29 33 33 33 36 39 48... of respondents according to future plans to consult foresters 51 24. Distribution of respondents according to future plans to participate in assistance programs 53 25, Willingness to sell timber among owners of less than 100 acres of 56 forest 26. Summary...

  10. Privacy-friendly Energy-metering via Homomorphic Encryption

    E-Print Network [OSTI]

    Jacobs, Bart

    Privacy-friendly Energy-metering via Homomorphic Encryption Flavio D. Garcia and Bart Jacobs and consumption is one of the goals. Accurate usage data is important for such a better match. So-called smart by the utility sector. For instance, in April 2009 the Senate in the Netherlands has refused to pass a bill

  11. Housing & Residence Life Freedom of Information and Protection of Privacy

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Housing & Residence Life Freedom of Information and Protection of Privacy Housing and Residence an Yes No Provide Housing account information necessary to allow them to make housing related payments on my behalf. Yes No Provide details of other Yes No Receive information to complete my Housing

  12. Privacy for the Stock Market Giovanni Di Crescenzo

    E-Print Network [OSTI]

    Chen, Yiling

    clients who intend to purchase or sell shares of a particular stock, and a server, taking carePrivacy for the Stock Market Giovanni Di Crescenzo Telcordia Technologies Inc. 445 South Street Stock Market op- erations, such as buying or selling shares of a certain stock, in a private way, which

  13. Lightweight Privacy-Preserving Peer-to-Peer Data Integration

    E-Print Network [OSTI]

    the translation should not be revealed to other peers. PPP [7], is the first protocol proposed to support privacy-preserving querying in PDMS. However, PPP suf- fers from several shortcomings. First, PPP does not satisfy be fixed by adopting another cryp- tographic technique called oblivious transfer. Second, PPP adopts

  14. The Post Anachronism: The Temporal Dimension of Facebook Privacy

    E-Print Network [OSTI]

    Reiter, Michael

    The Post Anachronism: The Temporal Dimension of Facebook Privacy Lujo Bauer , Lorrie Faith Cranor the audience and emphasis of Facebook posts change over time. In a 63-participant longitudinal study, par- ticipants gave their audience and emphasis preferences for up to ten of their Facebook posts in the week

  15. Privacy Engineering Objectives and Risk Model-Discussion Deck

    E-Print Network [OSTI]

    , Regulation, FIPPs, etc.) Risk Requirements System Evaluation SeptemberWorkshop #12;Privacy Engineering of self-determination, loss of trust, discrimination and economic loss by providing predictability. · Economic Loss: Economic loss can include direct financial losses as the result of identity theft, as well

  16. Achieving Full Security in Privacy-Preserving Data Marina Blanton

    E-Print Network [OSTI]

    Blanton, Marina

    [23]. · In k-means (SRoS), and Secure Comparison of Sum- mations (SCoS) ­ would lead to privacy-preserving data mining) ratio of summations, and (iii) comparison of summations. In all of the above cases, the sums

  17. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved POLICY TITLE: Information Technology Security Policy POLICY PURPOSE: The purpose of this Information Technology Security Policy is to ensure and describe the steps necessary to secure information

  18. Privacy-Preserving Public Auditing for Secure Cloud Storage

    E-Print Network [OSTI]

    . First of all, although the infrastructures under the cloud are much more powerful and reli- able than should bring in no new vulnerabilities towards user data privacy, and introduce no additional online, and Kui Ren are with the Department of Electrical and Computer Engineering, Illinois Institute

  19. Navigating Computer Science Research Through Waves of Privacy Concerns

    E-Print Network [OSTI]

    Navigating Computer Science Research Through Waves of Privacy Concerns: Discussions among Computer as Institute for Software Research International Technical Report CMU-ISRI-03-102 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213-3890 Abstract Computer Science research and practice

  20. Navigating Computer Science Research Through Waves of Privacy Concerns

    E-Print Network [OSTI]

    1 Navigating Computer Science Research Through Waves of Privacy Concerns: Discussions among appears as Computer Science Technical Report CMU­CS­03­165 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213­3890 Abstract Computer Science research and practice are raising growing

  1. NOTICE OF PRIVACY PRACTICES FOR PURDUE UNIVERSITY HEALTH PLANS

    E-Print Network [OSTI]

    Ginzel, Matthew

    court order. Alcohol and drug abuse treatment information is also subject to special protections under purposes: For treatment. The Purdue Health Plans may assist your health care providers to deter it carefully. If you have any questions about this Notice, please contact: Privacy Officer Purdue University

  2. Reconciling Utility with Privacy in Genomics Mathias Humbert Erman Ayday

    E-Print Network [OSTI]

    Thévenaz, Jacques

    Reconciling Utility with Privacy in Genomics Mathias Humbert Erman Ayday Jean-Pierre Hubaux.telenti@chuv.ch ABSTRACT Direct-to-consumer genetics makes it possible for everyone to obtain their genome sequences. In order to contribute to medical research, a growing number of people publish their genomic data

  3. Privacy-Preserving Naive Bayesian Classification Zhijun Zhan

    E-Print Network [OSTI]

    Technology & Engineering University of Ottawa, Canada email: stan@site.uottawa.ca ABSTRACT Privacy information to the database and render the database useless, or a com- pany could send a lot of made attacks could all render the database useless. If the communication is really anonymous, it is difficult

  4. Challenges in Security and Privacy for Mobile Edge-Clouds

    E-Print Network [OSTI]

    of mobile personal devices such as smartphones and tablets today, with their growing com- putational and privacy of users' mobile devices and their personal data on these devices presents a significant obstacle-3890 Abstract Mobile devices such as smartphones and tablets are ubiquitous today, and many of them possess

  5. Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

    E-Print Network [OSTI]

    Fahmy, Sonia

    for a certain network. Previous attempts at developing security benchmarks include the 1998 and 1999 evaluation1 Balancing Privacy and Fidelity in Packet Traces for Security Evaluation Sonia Fahmy and Christine.com Abstract Security mechanisms, such as firewalls and intrusion detection systems, protect networks

  6. Design-Build and CM at Risk- comparative analysis for owner decision making based on case studies and project surveys

    E-Print Network [OSTI]

    Park, Soon Rock

    2012-07-16T23:59:59.000Z

    Currently, many researchers and stakeholders believe that effective delivery systems for construction projects are key to improving project quality and value in the construction industry. Therefore, it is important that owners use the best project...

  7. Office of the CISO, February 2011 Information Security and Privacy Risk Advisory

    E-Print Network [OSTI]

    Queitsch, Christine

    Office of the CISO, February 2011 Information Security and Privacy Risk Advisory Phishing Phishing's trust in traditional landline communication. The Office of the Chief Information Security Officer (CISO

  8. Id: pdpbody.tex 13 20121024 18:11:35Z jhh Privacy Design Strategies

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    ://en.wikipedia.org/wiki/ Systems_development_life­cycle #12; 2 In this paper we define the notion of a privacy de­ sign strategy

  9. NBP RFI: Data Access, Third Party Use and Privacy- Comments of...

    Energy Savers [EERE]

    comments in response to the Department of Energy (DOE) request for information on data access, third party use, and privacy. In summary, UTC submits that the innovative...

  10. Data Privacy and the Smart Grid: A Voluntary Code of Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    announcing the availability of a draft Voluntary Code of Conduct (VCC), which addresses data privacy surrounding smart grid technologies, for public comment. The primary goal of...

  11. Privacy and identifiability in clinical research, personalized medicine, and public health surveillance

    E-Print Network [OSTI]

    Cassa, Christopher A

    2008-01-01T23:59:59.000Z

    Electronic transmission of protected health information has become pervasive in research, clinical, and public health investigations, posing substantial risk to patient privacy. From clinical genetic screenings to publication ...

  12. The economic effects of elevated and depressed freeways on adjacent property owners

    E-Print Network [OSTI]

    Scurry, Floyd David

    1995-01-01T23:59:59.000Z

    ABSTRACT The Economic EfFects of Elevated and Depressed Freeways on The Adjacent Property Owners. (May 1995) Floyd David Sentry, B. S. , Texas AkM University Chair of Advisory Committee: Dr. Daniel B. Fambro An econonuc assessment of a comnunity... 322, 095 283, 680 283, 680 260, 040 3, 327, 330 $5, 005, 770 Net Effect of Highway on Property Values $4, 275 139, 635 185, 310 262, 145 254, 800 271, 680 257, 840 3, 327, 330 $4, 703, 095 23 The resale of homes at all levels showed...

  13. br Owner br Facility br Type br Capacity br MW br Commercial br Online

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin: EnergyWyandanch,Eaga SolarZolo Technologies IncusgbcblackOwner

  14. Can historic neighborhoods compete? Analysis of and recommendations for local incentives for owner-occupied historic housing 

    E-Print Network [OSTI]

    Rowe, Rebecca Elizabeth

    2005-02-17T23:59:59.000Z

    , or to consider purchasing, an older home versus a new home in a builder community. The responses of the prospective homebuyers? survey indicates that there is a good deal of interest in older homes among prospective homebuyers. A program to assist them should...

  15. Can historic neighborhoods compete? Analysis of and recommendations for local incentives for owner-occupied historic housing

    E-Print Network [OSTI]

    Rowe, Rebecca Elizabeth

    2005-02-17T23:59:59.000Z

    have been surveyed to discover what programs are being utilized and which might be successful in Texas cities. Also surveyed were prospective homebuyers to determine what incentives and maintenance assistance could induce them to purchase...

  16. Plug-in privacy for Smart Metering billing

    E-Print Network [OSTI]

    Jawurek, Marek; Kerschbaum, Florian

    2010-01-01T23:59:59.000Z

    Smart Metering is a concept that allows to collect fine-grained consumption profiles from customers by replacing traditional electricity meters with Smart Meters in customers' households. The recorded consumption profile is the basis for the calculation of time-dependent tariffs but also allows deduction of the inhabitant's personal schedules and habits. The current reporting of such consumption profiles only protects this data from 3rd parties but falls short to protect the customer's privacy from illegitimate abuse by the supplier itself. We propose a privacy-preserving profile reporting protocol that enables billing for time-dependent tariffs without disclosing the actual data of the consumption profile to the supplier. Our approach relies on a zero-knowledge proof based on Pedersen Commitments performed by a plug-in privacy component that is put into the communication link between Smart Meter and supplier's back-end systems and requires no change to Smart Meter hardware and only little change to the softw...

  17. Solar PV Project Financing: Regulatory and Legislative Challenges for Third-Party PPA System Owners

    SciTech Connect (OSTI)

    Kollins, K.; Speer, B.; Cory, K.

    2009-11-01T23:59:59.000Z

    Residential and commercial end users of electricity who want to generate electricity using on-site solar photovoltaic (PV) systems face challenging initial and O&M costs. The third-party ownership power purchase agreement (PPA) finance model addresses these and other challenges. It allows developers to build and own PV systems on customers? properties and sell power back to customers. However, third-party electricity sales commonly face five regulatory challenges. The first three challenges involve legislative or regulatory definitions of electric utilities, power generation equipment, and providers of electric services. These definitions may compel third-party owners of solar PV systems to comply with regulations that may be cost prohibitive. Third-party owners face an additional challenge if they may not net meter, a practice that provides significant financial incentive to owning solar PV systems. Finally, municipalities and cooperatives worry about the regulatory implications of allowing an entity to sell electricity within their service territories. This paper summarizes these challenges, when they occur, and how they have been addressed in five states. This paper also presents alternative to the third-party ownership PPA finance model, including solar leases, contractual intermediaries, standardized contract language, federal investment tax credits, clean renewable energy bonds, and waived monopoly powers.

  18. A Privacy Preservation Model for Facebook-Style Social Network Systems

    E-Print Network [OSTI]

    A Privacy Preservation Model for Facebook-Style Social Network Systems Philip W. L. Fong1 , Mohd network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is dis- tinctly different from such existing access control

  19. Trustees of the University of Pennsylvania Top 10 Facebook Privacy Settings

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    © Trustees of the University of Pennsylvania Top 10 Facebook Privacy Settings This document describes important settings on Facebook to help you protect your privacy. Bear in mind that Facebook is a powerful interactive tool with significant and often complicated sharing capabilities. Also, Facebook often

  20. A Privacy Preservation Model for Facebook-like Social Network Systems

    E-Print Network [OSTI]

    Regina, University of

    A Privacy Preservation Model for Facebook-like Social Network Systems Philip W. L. Fong, Mohd Anwar-0-7731-0659 (print) ISBN 978-0-7731-0660 (online) #12;A Privacy Preservation Model for Facebook-Like Social Network growth in the popularity of social network systems, with Facebook being an archetypical example. Due

  1. A Privacy-Aware Architecture For Demand Response Systems Stephen Wicker, Robert Thomas

    E-Print Network [OSTI]

    Wicker, Stephen

    A Privacy-Aware Architecture For Demand Response Systems Stephen Wicker, Robert Thomas School architectures that realize the benefits of demand response without requiring that AMI data be centrally this problem by applying privacy-aware design practices to the development of demand response architectures

  2. Topic 7 : Smart Grid Privacy and Security 1Networking and Distributed Systems

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    to manage their load / bills. · Energy Detective®, Google Power meter®, ... #12;Smart Meter Privacy Concerns Grid 8 · Each appliance has a "signature": Power Usage to Personal Activity Mapping #12;Smart Meter have their own signature. · Laptop computers have their own signature #12;Smart Meter Privacy Concerns

  3. Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts

    E-Print Network [OSTI]

    Queitsch, Christine

    Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts Page 1 of 16 Document Name: Information Security and Privacy Laws Version #: vF Created By: Ann Nagel, Associate Chief Information Security Officer Date Created: June 2, 2009 Updated By: Melissa Albin-Wurzer, Education

  4. Multiagent meeting scheduling with preferences: efficiency, privacy loss, and solution quality

    E-Print Network [OSTI]

    Rossi, Francesca

    Multi­agent meeting scheduling with preferences: efficiency, privacy loss, and solution quality M as possible. Thus privacy loss is another important aspect of such systems. Fi­ nally, an obvious crucial, and then by running experiments to capture the interesting and useful trade­offs among these three aspects

  5. Revoke Privacy of Directory Information Directory Information at Western Michigan University includes the following: student's name,

    E-Print Network [OSTI]

    de Doncker, Elise

    Revoke Privacy of Directory Information Directory Information at Western Michigan University Michigan University to release all information considered Directory Information until I notify the Office. This is to certify that I wish to remove my name from the privacy list at Western Michigan University. I understand

  6. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data

    E-Print Network [OSTI]

    Zhang, Richard "Hao"

    A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data, more and more social network data has been made publicly available and analyzed in one way or another. Privacy preserving pub- lishing of social network data becomes a more and more important concern

  7. Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar, Ying Xu

    E-Print Network [OSTI]

    Pratt, Vaughan

    Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar, Ying Xu.stanford.edu Abstract-- We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the typical social network

  8. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data

    E-Print Network [OSTI]

    Pei, Jian

    A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data.0 applications, more and more social network data has been made publicly available and analyzed in one way or another. Privacy pre- serving publishing of social network data becomes a more and more important concern

  9. Who do you trust? Information Sharing, Privacy Concerns and Trust in an online Social Network

    E-Print Network [OSTI]

    Islam, M. Saif

    Who do you trust? Information Sharing, Privacy Concerns and Trust in an online Social Network of a popular social network site, Facebook, which measured perceptions of trust, privacy concerns, differences between online and offline social networking and between usage of the site by gender. We find

  10. Approximately Optimal Auctions for Selling Privacy when Costs are Correlated with Data

    E-Print Network [OSTI]

    Fiat, Amos

    Approximately Optimal Auctions for Selling Privacy when Costs are Correlated with Data LISA K may suffer a cost when their data are used in which case they should be compensated. The analyst and sensitive data may be correlated, it is important to protect the privacy of both data and cost. We model

  11. Introduction to SCRIPT-ed Special Edition on Privacy and Technology 

    E-Print Network [OSTI]

    Edwards, Lilian

    2006-01-01T23:59:59.000Z

    Introduction to a special edition of SCRIPT-ed online journal focussing on the regulation of privacy, in light of new and changing technologies. The edition discusses privacy as a human right, or as a commodity, and presents articles from invited...

  12. PRIVACY POLICY AND PROCEDURES Policy #: 2100.2 LSU Health Sciences Center New Orleans Page: 1

    E-Print Network [OSTI]

    PRIVACY POLICY AND PROCEDURES Policy #: 2100.2 LSU Health Sciences Center New Orleans Page: 1 Date Effective: April 14, 2003 Patient Information Policy Privacy Official and Complaint Contact SCOPE: All, are referred to in this policy as LSUHSC-NO. PURPOSE: To establish the requirements and guidelines for each

  13. Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing

    E-Print Network [OSTI]

    Hou, Y. Thomas

    Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing Ning Cao, Zhenyu, Chicago, IL 60616 Email: {cong, kren}@ece.iit.edu Abstract-- In the emerging cloud computing paradigm of privacy-preserving query over encrypted graph-structured data in cloud computing (PPGQ), and establish

  14. Zero-knowledge Test of Vector Equivalence and Granulation of User Data with Privacy

    E-Print Network [OSTI]

    Canny, John

    Zero-knowledge Test of Vector Equivalence and Granulation of User Data with Privacy Yitao Duan architecture and practical protocols for user data validation and vector addition based computation. It turned, in a privacy-preserving manner. They can also be of independent interest for other fields such as data mining

  15. Object-Video Streams for Preserving Privacy in Video Surveillance Faisal Z. Qureshi

    E-Print Network [OSTI]

    Qureshi, Faisal Z.

    Object-Video Streams for Preserving Privacy in Video Surveillance Faisal Z. Qureshi Faculty--This paper presents a framework for preserving privacy in video surveillance. Raw video is decomposed into a background and one or more object-video streams. Object- video streams can be combined to render the scene

  16. Matrix Decomposition-Based Data Distortion Techniques for Privacy Preservation in Data Mining

    E-Print Network [OSTI]

    Zhang, Jun

    . The second is to modify the data mining algorithms so that they allow data mining operations on distributedMatrix Decomposition-Based Data Distortion Techniques for Privacy Preservation in Data Mining Jun-Based Data Distortion Techniques for Privacy Preservation in Data Mining Jun Zhang and Jie Wang, University

  17. Audit of joint owner costing and billing practices, Naval Petroleum Reserve No. 1, Elk Hills, California

    SciTech Connect (OSTI)

    Richards, J.R.

    1986-01-13T23:59:59.000Z

    The review showed a need for the Department to revise and strengthen cash management and cost allocation procedures and practices for jointly shared Reserve operating costs funded by the Government. The procedures and practices in effect for processing Joint Owner costs, billings and collections do not permit the Government to receive full advantage of the time value of money paid in behalf of Chevron or provide for the full sharing of all costs incurred by the Government to absorb unnecessary interest and operating costs since assuming responsibility for funding Reserve operations in October 1975. It is estimated that the Department would benefit by over $3 million per year if our recommendations in these areas are fully implemented.

  18. Local Option- Commercial PACE Financing

    Broader source: Energy.gov [DOE]

    In June 2012, Connecticut passed legislation enabling Commercial Property Assessed Clean Energy financing (C-PACE), targeting commercial, industrial and multifamily property owners.  C-PACE is a ...

  19. DEPARTMENT OF ENERGY Privacy Awareness Training | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsNovember 13, 2014Contributing DataDepartment of EnergyC2M2D TablePrivacy

  20. Elements of a Federal Privacy Program | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sure you want toworldPowerHome | DocumentsElements of a Federal Privacy

  1. Smart Grid Privacy Workshop Summary Report (January 2012) | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment of Energy Ready, Set,BuildingsDepartmentEnergy Privacy

  2. Privacy Act | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) Mapping the Impact ofHome Pacific NorthwestHomePrivacy Act

  3. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse(Expired) | DepartmentINL E-IDROCCUPATIONAL * PRIVACY IMPACT

  4. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse(Expired) | DepartmentINL E-IDROCCUPATIONAL * PRIVACY

  5. Privacy, Security, & Legal Disclaimer Notice - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServices » Guidance » PrivacyAbout

  6. Local government and demand-side bidding

    SciTech Connect (OSTI)

    Vine, E.

    1990-12-01T23:59:59.000Z

    As part of Lawrence Berkeley Laboratory's (LBL) technical assistance to the Sustainable City Project, the issue of DSM bidding was examined as a possible option for local government. The recent interest and activity in DSM bidding around the country presents an opportunity for local government. Potential benefits for local government include increased installation of energy efficiency measures in municipal facilities and in the community, economic development, an additional source of revenue to help pay for municipal programs (including additional conservation efforts), and an enhanced local image. Local government will most likely participate in DSM bidding as a customer or as a client of an energy service company (ESCO). The exact role will depend on local government's response to key issues associated with DSM bidding, such as performance guarantees, quality assurance procedures (measuring savings and providing financial security), and the administrative burden. In addition, local government will have to weigh the advantages and disadvantages of working with an ESCO. While local government has not yet participated in DSM bidding, local government is in a unique position to take advantage of energy efficiency opportunities as owner-operators of municipal facilities which consume significant amounts of energy, planners and regulators of new development, and general providers of services and assistance to their communities. Furthermore, local governments have lower risks (in terms of program success) than small businesses, and local governments' credibility and experience in dealing with customers may reduce high transaction costs associated with DSM bidding. Despite these advantages, local governments should take a cautious approach in participating in DSM bidding processes, and should carefully examine other strategies for promoting energy efficiency (including participation in conventional utility programs) prior to participating in DSM bidding.

  7. Pet owners have the responsibility to care for the well being of their animals. Your ability to

    E-Print Network [OSTI]

    Pet owners have the responsibility to care for the well being of their animals. Your ability to care for an animal can help determine what kind of animal you select as a pet. Out-of-Town Emergency Pamphlet, "Emergency Preparedness for Your Pets," 2003. Veterinarians in Your County or City Name

  8. Multifaceted Value Profiles of Forest Owner Categories in South Sweden: The River Helge a Catchment as a Case Study

    E-Print Network [OSTI]

    Vermont, University of

    -industrial forest land owners and municipalities included all value categories, the forest companies focused on wood including non-timber forest products as well as ecological, social, and cultural dimensions at multiple goods (e.g., timber and fish) can readily be converted into market goods. In contrast, many

  9. Channels and sources used to gather equine-related information by college-age horse owners and enthusiasts 

    E-Print Network [OSTI]

    Sullivan, Erin Alene

    2009-05-15T23:59:59.000Z

    This thesis identifies the equine-related topics that are important to Texas college-age horse owners and enthusiasts and the channels/sources they use to get equine-related information. Little research has focused on this group to determine...

  10. Group Member Names: ________________________________________________ Scenario: You are the owner of a potato plant in Idaho. You have recently won a contract

    E-Print Network [OSTI]

    Provancher, William

    : ________________________________________________ ________________________________________________ ________________________________________________ Scenario: You are the owner of a potato plant in Idaho. You have recently won a contract to supply McDonald's with potatoes. McDonald's requires their suppliers to precut and freeze the potatoes before shipping to their distributing center. Your potato plant does not currently have a process for precutting and freezing potatoes

  11. Local Transportation

    E-Print Network [OSTI]

    Local Transportation. Transportation from the Airport to Hotel. There are two types of taxi companies that operate at the airport: special and regular taxis (

  12. Large-scale Wireless Local-area Network Measurement and Privacy Analysis

    E-Print Network [OSTI]

    colleagues: Bennet Vance, Chris McDonald, Yong Sheng, Jihwang Yeo, Phil Fazio, Andrew Campbell, Mike Locasto

  13. Commercial Building Tenant Energy Usage Data Aggregation and Privacy: Technical Appendix

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.

    2014-11-12T23:59:59.000Z

    This technical appendix accompanies report PNNL–23786 “Commercial Building Tenant Energy Usage Data Aggregation and Privacy”. The objective is to provide background information on the methods utilized in the statistical analysis of the aggregation thresholds.

  14. InformationTheoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting

    E-Print Network [OSTI]

    Genčve, Université de

    challenges for the construction of practical codes. Alternatively, the order statistics approaches guarInformation­Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft and distinctive content description that allows to overcome fundamental sensitivity restrictions of classical

  15. Teaching in computer security and privacy The Computer Laboratory's undergraduate and masters programmes

    E-Print Network [OSTI]

    Crowcroft, Jon

    computing security · Economics of cybercrime · Economics of information security · Formal methods · Hardware security · Location and positioning systems · Malware analysis · Medical information security · MobileTeaching in computer security and privacy The Computer Laboratory's undergraduate and masters

  16. Patients are treated with respect, consideration and dignity. Patients are provided appropriate privacy.

    E-Print Network [OSTI]

    Moore, Paul A.

    · Patients are treated with respect, consideration and dignity. · Patients are provided appropriate privacy. · Patient disclosures and records are treated confidentially, and, except when required by law

  17. Privacy in context : the costs and benefits of a new deidentification method

    E-Print Network [OSTI]

    Trepetin, Stanley

    2006-01-01T23:59:59.000Z

    The American public continues to be concerned about medical privacy. Policy research continues to show people's demand for health organizations to protect patient-specific data. Health organizations need personally ...

  18. Invoke Privacy of Directory Information Directory Information at Western Michigan University includes the following: student's name,

    E-Print Network [OSTI]

    de Doncker, Elise

    Invoke Privacy of Directory Information Directory Information at Western Michigan University designated below will be held as confidential by Western Michigan University until I notify the Office Western Michigan University responsible for list/information already printed, published, or available

  19. GPU-based Parallel Computing Models and Implementations for Two-party Privacy-preserving Protocols

    E-Print Network [OSTI]

    Pu, Shi

    2013-11-25T23:59:59.000Z

    resources to handle the encryption-decryption operations. In this dissertation, we study optimal utilization of computing resources on the graphic processor unit (GPU) architecture for privacy-preserving protocols based on secure function evaluation (SFE...

  20. Towards a Privacy Management Framework for Distributed Cybersecurity in the New Data Ecology

    E-Print Network [OSTI]

    Breaux, Travis D.

    Towards a Privacy Management Framework for Distributed Cybersecurity in the New Data Ecology Travis--Cyber security increasingly depends on advance notice of emerging threats as individuals, groups or na- tions

  1. Privacy preservation and auditing for ubiquitous mobile sensing applications and services

    E-Print Network [OSTI]

    Sumter, George C. (George Cody)

    2012-01-01T23:59:59.000Z

    The recent proliferation of mobile phones, with their many associated sensors, has opened the door to an entirely new range of insights and applications with a host of accompanying privacy concerns. In this thesis, we ...

  2. Safety Evaluation Report related to Hydrogen Control Owners Group assessment of Mark 3 containments

    SciTech Connect (OSTI)

    Li, C.Y.; Kudrick, J.A.

    1990-10-01T23:59:59.000Z

    Title 10 of the Code of Federal Regulations (10 CFR), Section 50.44 Standards for Combustible Gas Control System in Light-Water-Cooled Power Reactors,'' requires that systems be provided to control hydrogen concentration in the containment atmosphere following an accident to ensure that containment integrity is maintained. The purpose of this report is to provide regulatory guidance to licensees with Mark III containments with regard to demonstrating compliance with 10 CFR 50.44, Section (c)(3)(vi) and (c)(3)(vii). In this report, the staff provides its evaluation of the generic methodology proposed by the Hydrogen Control Owners Group. This generic methodology is documented in Topical Report HGN-112-NP, Generic Hydrogen Control Information for BWR/6 Mark III Containments.'' In addition, the staff has recommended that the vulnerability to interruption of power to the hydrogen igniters be evaluated further on a plant-specific basis as part of the individual plant examination of the plants with Mark III containments. 10 figs., 1 tab.

  3. Introducing a one-year Master's degree to train privacy engineers The Master of Science in Information Technology--Privacy Engineering degree is a one-year graduate program for computer

    E-Print Network [OSTI]

    Murphy, Robert F.

    , software development, cyber security, human computer interaction, as well as business to incidents, and integrate privacy into the software engineering lifecycle phases; n

  4. Id: pdp-body.tex 13 2012-10-24 18:11:35Z jhh Privacy Design Strategies

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    ://en.wikipedia.org/wiki/ Systems_development_life-cycle #12;2 In this paper we define the notion of a privacy de- sign strategy

  5. Faced with rising fuel costs, building and home owners are looking for energy-efficient solutions. Improving the building envelope (roof or attic system, walls,

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    and envelope assemblies for use in new construction and retrofits. Patrick Hughes Director, Building better understanding of product performance by the entire construction materials industry. INNOVATIONSFaced with rising fuel costs, building and home owners are looking for energy- efficient solutions

  6. Text-Alternative Version: The L Prize-Winning LED A19 Replacement—What Commercial Building Owners/Operators Can Expect in 2012

    Broader source: Energy.gov [DOE]

    Below is the text-alternative version of the "The L Prize-Winning LED A19 Replacement—What Commercial Building Owners/Operators Can Expect in 2012" webcast, held January 18, 2012.

  7. Legislating the rights of private property owners: a review and analysis of actions in the 103rd and 104th Congresses

    E-Print Network [OSTI]

    Kerby, Hannah Elizabeth

    1995-01-01T23:59:59.000Z

    LEGISLATING THE RIGHTS OF PRIVATE PROPERTY OWNERS: A REVIEW AND ANALYSIS OF ACTIONS IN THE 103RD AND 104TH CONGRESSES A Professional Paper by Hannah Elizabeth Kerby Approved as to style and content by: hairman, Advisory Committee Committee... Member Committee Member August 1995 Record of Study LEGISLATING THE RIGHTS OF PRIVATE PROPERTY OWNERS: A REVIEW AND ANALYSIS OF ACTIONS IN THE 103RD AND 104TH CONGRESSES A PROFESSIONAL PAPER by Hannah Elizabeth Kerby Submitted to the College...

  8. UNLV Career Services Website Privacy Policy UNLV Career Services has created this privacy policy statement in order to demonstrate our respect for

    E-Print Network [OSTI]

    Cho, Hokwon

    does everything in its power to protect user information off-line. All of our users' information power to protect user information off-line. All of our users' information--not just the sensitive employees are kept up-to-date on our security and privacy practices. ! UNLV CareerLink: UNLV Career

  9. Distributed and Parallel Databases An Efficient Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data with

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    -Preserving Multi-Keyword Search over Encrypted Cloud Data with Ranking Article Type: SI: Secure and Privacy. Provided that the security and randomization parameters are appropriately chosen, both search terms security and privacy requirements that essentially disallow linking queries featuring identical search

  10. Geographic Privacy-aware Knowledge Discovery Fosca Giannotti2, Mirco Nanni2, Dino Pedreschi1, and Chiara Renso2

    E-Print Network [OSTI]

    Malerba, Donato

    , based on new privacy- preserving methods for extracting knowledge from large amounts of raw data ref in the advocated form of geographic knowledge a key driver, such as in transport, environment and risk management and sys- tems for knowledge discovery and delivery, based on new automated privacy-preserving methods

  11. Georgia Southern University Office of Career Services Eagle Career Net/NACElink Privacy and Use of Data Policy

    E-Print Network [OSTI]

    Hutcheon, James M.

    Georgia Southern University Office of Career Services Eagle Career Net/NACElink Privacy and Use of Data Policy Georgia Southern University Office of Career Services Eagle Career Net/NACElink Privacy and the NACElink Network to provide student with Eagle Career Net. Eagle Career Net is our online system

  12. Privacy-Preserving Cox Regression for Survival Analysis Shipeng Yu, Glenn Fung, Romer Rosales, Sriram Krishnan, R. Bharat Rao

    E-Print Network [OSTI]

    Rosales, Rómer E.

    , Theory, Performance Keywords Privacy-Preserving Data Mining, Survival Analysis, Cox Re- PermissionPrivacy-Preserving Cox Regression for Survival Analysis Shipeng Yu, Glenn Fung, Romer Rosales for survival prediction of non-small-cell lung cancer patients. These results are also confirmed us- ing

  13. Are owners' reports of their dogs’ ‘guilty look’ influenced by the dogs’ action and evidence of the misdeed?

    E-Print Network [OSTI]

    Ostoji?, Ljerka; Tkal?i?, Mladenka; Clayton, Nicola S.

    2015-01-03T23:59:59.000Z

    dogs’ greeting behaviours were not a Thus, our findings do not support th concurrent negative reaction by their © 2015 The Authors. Published bylocate /behavproc uenced by the dogs’ nija 4, 51000 Rijeka Croatia eeting behaviour after having performed a... dogs that have eaten the r whom the food was not replaced by the experimenter lude that their dog had performed the misdeed. ls and methods s ix owners and their dogs were tested in Croatia from 011 to January 2012 and from June to October 2013 (see...

  14. Local Universities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your HomeLatestCenter (LMI-EFRC)Department ofchampionshipLocal

  15. Local Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let usNucleartearing mode flows andPress)Local

  16. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management

    E-Print Network [OSTI]

    Tanenbaum, Andrew S.

    RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management Melanie R. Rieback, The Netherlands {melanie,crispo,ast}@cs.vu.nl Abstract. RFID tags are tiny, inexpensive, inductively powered com automatically tallies up her items and charges the total cost to her credit card. Nancy is not sure exactly how

  17. Challenges in Retaining Privacy in Smart Spaces Jimmy C. Chau and T.D.C. Little

    E-Print Network [OSTI]

    Little, Thomas

    individuals in an office building in which the infrastructure ("smart spaces") provides services to identifyChallenges in Retaining Privacy in Smart Spaces Jimmy C. Chau and T.D.C. Little Department, ubiquitous networking, and other in- door automation infrastructure enable buildings to operate more

  18. Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems

    E-Print Network [OSTI]

    Xu, Wenyuan

    gruteser@winlab.rutgers.edu ABSTRACT Research on smart meters has shown that fine-grained en- ergy usage data poses privacy risks since it allows inferences about activities inside the home. While smart meter-1-4503-1651-4/12/10 ...$15.00. 1. INTRODUCTION Much attention has been devoted to smart meters, as they play a central role

  19. SMART METER PRIVACY USING A RECHARGEABLE BATTERY: MINIMIZING THE RATE OF INFORMATION LEAKAGE

    E-Print Network [OSTI]

    Khisti, Ashish

    SMART METER PRIVACY USING A RECHARGEABLE BATTERY: MINIMIZING THE RATE OF INFORMATION LEAKAGE David. INTRODUCTION Deployments of smart electricity meters to residential homes con- tinue unabated around the world resources. Smart meters are essential to coordinate the desired charging and discharg- ing of the batteries

  20. Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers

    E-Print Network [OSTI]

    Shenoy, Prashant

    Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina Microsoft Research Cambridge Abstract. Smart meters that track fine-grained electricity usage and implement smart meter deployment is that fine-grained usage data indirectly reveals detailed information about

  1. A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds

    E-Print Network [OSTI]

    Qiao, Daji

    information, etc.) have been centralized into the cloud, cloud computing is facing great privacy and security information retrieval (PIR) in an information theoretical setting and the compu- tational PIR by restricting the database to perform only polynomial-time computations. Fully implementing the PIR notion is, however

  2. PRISM Privacy-Preserving Search in MapReduce Erik-Oliver Blass1

    E-Print Network [OSTI]

    encrypted keyword search or Private Information Retrieval (PIR), fall short of meeting real-world cloud re of parallel instances of PIR on small datasets. Each PIR instance on a small dataset is efficiently solved of cloud computing unfortunately come with a high cost in terms of new security and privacy exposures

  3. Tax Policy Litmus Tests: Enforceability, Privacy, and Efficiency Jon M. Peha1

    E-Print Network [OSTI]

    Peha, Jon M.

    Tax Policy Litmus Tests: Enforceability, Privacy, and Efficiency Jon M. Peha1 Professor of electrical engineering & public policy, Carnegie Mellon University, and Independent Consultant Testimony and public policy at Carnegie Mellon University, and an independent consultant, but today I am representing

  4. Competitive Privacy in the Smart Grid: An Information-theoretic Approach

    E-Print Network [OSTI]

    Sankar, Lalitha; Tandon, Ravi; Poor, H Vincent

    2011-01-01T23:59:59.000Z

    Advances in sensing and communication capabilities as well as power industry deregulation are driving the need for distributed state estimation in the smart grid at the level of the regional transmission organizations (RTOs). This leads to a new competitive privacy problem amongst the RTOs since there is a tension between sharing data to ensure network reliability (utility/benefit to all RTOs) and withholding data for profitability and privacy reasons. The resulting tradeoff between utility, quantified via fidelity of its state estimate at each RTO, and privacy, quantified via the leakage of the state of one RTO at other RTOs, is captured precisely using a lossy source coding problem formulation for a two RTO network. For a two-RTO model, it is shown that the set of all feasible utility-privacy pairs can be achieved via a single round of communication when each RTO communicates taking into account the correlation between the measured data at both RTOs. The lossy source coding problem and solution developed he...

  5. On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients

    E-Print Network [OSTI]

    On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients Arthur Gervais , Ghassan Lightweight Bitcoin clients are gaining increasing adoption among Bitcoin users, owing to their reduced as they are only required to download and verify a part of the block chain--thus supporting the usage of Bitcoin

  6. Supervisory Control Strategies for Enhancing System Security and Privacy Christoforos N. Hadjicostis

    E-Print Network [OSTI]

    Hadjicostis, Christoforos

    cyber-infrastructures (ranging from defense and banking to health care and power distribution sys- temsSupervisory Control Strategies for Enhancing System Security and Privacy Christoforos N. Hadjicostis Abstract-- Enhancing the security and reliability of auto- mated systems that control vital

  7. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 EPPA: An Efficient and Privacy-Preserving

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    generation plants to customers) and demand-driven response. Smart grid combines traditional grid-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Member, IEEE, Xiaohui Liang, Student. In this paper, we propose an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid

  8. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 EPPDR: An Efficient Privacy-Preserving

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    privacy-preserving demand aggregation and efficient response. In addition, an adaptive key evolution-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid Hongwei Li, Member, IEEE, Xiaodong Lin response can maintain supply-demand balance and reduce users' electricity bills. Furthermore, it is also

  9. ITL BULLETIN FOR MAY 2013 ITL PUBLISHES SECURITY AND PRIVACY CONTROLS FOR FEDERAL AGENCIES

    E-Print Network [OSTI]

    The selection and implementation of security and privacy controls for information systems and organizations systems and organizations. Controls are also designed to satisfy a set of defined security requirements for federal information systems and organizations. It describes a process for selecting controls to protect

  10. PRIVACY PRESERVING DISTRIBUTED BEAMFORMING BASED ON HOMOMORPHIC Richard C. Hendriks and Zekeriya Erkin

    E-Print Network [OSTI]

    shown a growing interest in dis- tributed noise reduction for speech enhancement in wireless acoustic be at risk. One risk that underlies such distributed speech enhancement systems is the risk of eavesdropping-trusted third parties. Index Terms-- Distributed speech enhancement, encryp- tion, privacy. 1. INTRODUCTION

  11. Supporting Network Formation through Mining under Privacy Constraints Florian Skopik, Daniel Schall, Schahram Dustdar

    E-Print Network [OSTI]

    Dustdar, Schahram

    , group formation, privacy issues, service-centric collaborations I. INTRODUCTION Small and medium-sized and small companies come together and form virtual communities to compete with global players of service-oriented architectures (SOA), interactions between partners have become observable. Monitoring col

  12. Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done?

    E-Print Network [OSTI]

    Sandhu, Ravi

    founded 1993 Information security Information assurance What is New Information assurance Mission and Communications Security (CCS) Conference founded 1993 Information assurance What is New Information assurancePlenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu

  13. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10T23:59:59.000Z

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  14. A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias Schunter

    E-Print Network [OSTI]

    Backes, Michael

    A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias proposed by IBM. The basic definition is refinement, i.e., the question whether fulfilling one policy been #12;102 Michael Backes, Birgit Pfitzmann, and Matthias Schunter collected has to govern the use

  15. Privacy-enhanced social network routing in opportunistic networks Iain Parris, Greg Bigwood and Tristan Henderson

    E-Print Network [OSTI]

    Henderson, Tristan

    Privacy-enhanced social network routing in opportunistic networks Iain Parris, Greg Bigwood. Forwarding messages in such a network often involves the use of social network routing-- sending messages via nodes in the sender or recipient's social network. Simple social network routing, however, may broadcast

  16. Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing

    E-Print Network [OSTI]

    Hou, Y. Thomas

    Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing Wenhai Sun, Wenjing Lou, Y computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud@mail.xidian.edu.cn S. Jajodia et al. (eds.), Secure Cloud Computing, DOI 10.1007/978-1-4614-9278-8__9, © Springer

  17. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing

    E-Print Network [OSTI]

    On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing Marten van Dijk of computing resources. Clients' lack of direct resource control in the cloud prompts con- cern about de- manded by common cloud computing services, even with such pow- erful tools as FHE. We formally

  18. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

    E-Print Network [OSTI]

    Hou, Y. Thomas

    Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Cong Wang, Qian large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging efficient. I. INTRODUCTION Cloud Computing has been envisioned as the next- generation architecture

  19. A Language for Automatically Enforcing Privacy Policies Jean Yang Kuat Yessenov Armando Solar-Lezama

    E-Print Network [OSTI]

    A Language for Automatically Enforcing Privacy Policies Jean Yang Kuat Yessenov Armando Solar for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring views are allowed based on the output context. The system is respon- sible for automatically ensuring

  20. PCB: Physically Changeable Bit for Preserving Privacy in Low-End RFID Tags

    E-Print Network [OSTI]

    Zou, Cliff C.

    of consumers, e.g., "smart" home appliances that can automatically check and alert users of food-frequency identification (RFID) tags in consumer market. To tackle this privacy issue, a simple and ef- fective approach-end RFID tags in consumer market, where each tag is supposed to be 5 cents or less, it is very hard to use

  1. TRANSACTIONS ON DATA PRIVACY 3 (2010) 149175 Efficient Anonymizations with Enhanced

    E-Print Network [OSTI]

    Goldberger, Jacob

    TRANSACTIONS ON DATA PRIVACY 3 (2010) 149­175 Efficient Anonymizations with Enhanced Utility Jacob and the generalized public data. We, bearing in mind that a primary goal in releasing the anonymized database for data, Dec. 6, 2009. 149 #12;150 Jacob Goldberger, Tamir Tassa is k-anonymization. The method of k

  2. A Privacy-Aware Access Control Model for Distributed Network Monitoring1 Eugenia I. Papagiannakopouloua,

    E-Print Network [OSTI]

    Boyer, Edmond

    , Iakovos S. Venierisa , Fr´ed´eric Cuppensb , Nora Cuppens-Boulahiab aSchool of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece bInstitut TELECOM, TELECOM Bretagne, CS the danger of business losses due to privacy violations; this includes the risk of reputation damage, as well

  3. A Privacy Preserving Scalable Architecture For Collaborative Event Correlation Hani Qusa, Roberto Baldoni, Roberto Beraldi

    E-Print Network [OSTI]

    Roma "La Sapienza", Universitŕ di

    . For example, organizations that suffer from distributed denial of service (DDoS) attack [2], know" Universit`a degli Studi di Roma, Via Ariosto 25 - 00185 Roma, Italy {qusa,baldoni,beraldi}@dis.uniroma1.it the organizations in near real-time, while preserving the privacy of sensitive data items even in the case

  4. Hot Works Procedures and Protocols Last Updated: 2/14/2014 Owner: Safety and Risk Management Director Page 1 of 6

    E-Print Network [OSTI]

    Dyer, Bill

    Hot Works Procedures and Protocols Last Updated: 2/14/2014 Owner: Safety and Risk Management Management Director Page 2 of 6 start and stop times, and location of work. The Office of Work Control and Risk Management reserves the right to inspect all Hot Works areas, and revoke authorizations

  5. Faced with rising fuel costs, building and home owners are looking for energy-efficient solutions. Improving the building envelope (roof or attic system, walls,

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    and envelope assemblies for use in new construction and retrofits. Patrick Hughes Director, Building materials industry. INNOVATIONS IN BUILDINGS Contact ORNL 2012-G00695/tcc Ensuring Affordable, EfficientFaced with rising fuel costs, building and home owners are looking for energy- efficient solutions

  6. KUALI TIPS FOR CAPITAL ASSETS NEW OBJECT CODES: These are based upon the Funding Source Code. Owner Field shows Title now.

    E-Print Network [OSTI]

    KUALI TIPS FOR CAPITAL ASSETS NEW OBJECT CODES: These are based upon the Funding Source Code. Owner Field shows Title now. Decal # Historical Sub Code New Object Code Description Comments OBJECT CODES: To determine which Object Code you should use, you will need to look up the Account Fund

  7. KUALI TIPS FOR CAPITAL ASSETS NEW OBJECT CODES: These are based upon Funding Source vs. Title. Owner Field shows Title now.

    E-Print Network [OSTI]

    KUALI TIPS FOR CAPITAL ASSETS NEW OBJECT CODES: These are based upon Funding Source vs. Title. Owner Field shows Title now. Decal # Historical Sub Code New Object Code Description 3 8210 8210 CSU) and 8247 (Federal Loaned) are Property Use Only. HOW TO USE THE NEW OBJECT CODES: To determine which Object

  8. The Guaranteed Maximum Price proposal is developed at the phase specified in the Agreement Between Owner and Construction Manager, usually at 50% Construction Documents.

    E-Print Network [OSTI]

    Sura, Philip

    Owner and Construction Manager, usually at 50% Construction Documents. The GMP proposal should be bound general summary of scope of work, alternates, etc.) Tab 2 List of documents (project manual(s), drawings summary of the work, the construction manager's fee (as identified in Paragraph 7.2 of the Agreement) must

  9. Quantum Locality?

    SciTech Connect (OSTI)

    Stapp, Henry

    2011-11-10T23:59:59.000Z

    Robert Griffiths has recently addressed, within the framework of a ‘consistent quantum theory’ (CQT) that he has developed, the issue of whether, as is often claimed, quantum mechanics entails a need for faster-than-light transfers of information over long distances. He argues, on the basis of his examination of certain arguments that claim to demonstrate the existence of such nonlocal influences, that such influences do not exist. However, his examination was restricted mainly to hidden-variable-based arguments that include in their premises some essentially classical-physics-type assumptions that are fundamentally incompatible with the precepts of quantum physics. One cannot logically prove properties of a system by attributing to the system properties alien to that system. Hence Griffiths’ rejection of hidden-variable-based proofs is logically warranted. Griffiths mentions the existence of a certain alternative proof that does not involve hidden variables, and that uses only macroscopically described observable properties. He notes that he had examined in his book proofs of this general kind, and concluded that they provide no evidence for nonlocal influences. But he did not examine the particular proof that he cites. An examination of that particular proof by the method specified by his ‘consistent quantum theory’ shows that the cited proof is valid within that restrictive framework. This necessary existence, within the ‘consistent’ framework, of long range essentially instantaneous influences refutes the claim made by Griffiths that his ‘consistent’ framework is superior to the orthodox quantum theory of von Neumann because it does not entail instantaneous influences. An added section responds to Griffiths’ reply, which cites a litany of ambiguities that seem to restrict, devastatingly, the scope of his CQT formalism, apparently to buttress his claim that my use of that formalism to validate the nonlocality theorem is flawed. But the vagaries that he cites do not upset the proof in question. It is show here in detail why the precise statement of this theorem justifies the specified application of CQT. It is also shown, in response to his challenge, why a putative proof of locality that he has proposed is not valid.

  10. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-05-01T23:59:59.000Z

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  11. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

    E-Print Network [OSTI]

    Blundo, Carlo; Gasti, Paolo

    2011-01-01T23:59:59.000Z

    This paper presents the first practical construction for privacy-preserving evaluation of sample set similarity, based on the well-known Jaccard index measure. In this problem, two mutually distrustful entities determine how similar their sets are, without disclosing their content to each other. We propose two efficient protocols: the first securely computes the Jaccard index of two sets; the second approximates it using MinHash techniques, at a significantly lower cost and with same privacy guarantees. This building block is attractive in many relevant applications, including document similarity, biometric authentication, multimedia file retrieval, and genetic tests. We demonstrate, both analytically and experimentally, that our constructions -- while not bounded to any specific application -- are appreciably more efficient than prior specialized techniques.

  12. Locally Led Conservation The Local Work Group

    E-Print Network [OSTI]

    Grants ­ Conservation Stewardship Program ­ Environmental Quality Incentive Program ­ Farm & Ranch Lands1 Locally Led Conservation & The Local Work Group Mark Habiger NRCS #12;2 What Is "Locally Led Conservation"? · Community Stakeholders ­ 1. Assessing their natural resource conservation needs ­ 2. Setting

  13. The B and W Owners Group program for microstructural characterization and radiation embrittlement modelling of Linde 80 reactor vessel welds

    SciTech Connect (OSTI)

    Pavinich, W.A. [Grove Engineering, Knoxville, TN (United States); Harbison, L.S. [B and W Nuclear Technologies, Lynchburg, VA (United States)

    1996-12-31T23:59:59.000Z

    The Babcock and Wilcox Owners Group (B and WOG) is embrittlement of Linde 80 reactor vessel welds from a micro-mechanical viewpoint. Previous work that focused on characterizing the large microstructural features indicated that a large portion of the bulk copper content is in precipitate/inclusion/carbide form. This result indicates that copper in solid solution is considerably less than the bulk composition. Field-ion microscope atom probe investigations on unirradiated weld metals with bulk copper contents ranging from 0.22 to 0.38 wt%, also indicate significant amount of copper are tied up in precipitate/inclusion/carbide form. This results is significant since the bulk copper content (which includes both copper in solid solution and copper contained in precipitates, inclusions, and carbides) is used in Regulatory Guide 1.99, Revision 2 to determine radiation damage. This paper reviews these results. Existing radiation embrittlement models superpose the changes in yield strength due to defect clusters and copper-rich precipitates induced by neutron irradiation. Low-copper Linde 80 welds display little or no increase in the 41 joule (30 ft-lb) transition temperature as a result of neutron irradiation which indicates that precipitation is the dominant component of radiation embrittlement for Linde 80 welds. Future work will include further microstructural characterizations of Linde 80 reactor vessel welds and applying the existing radiation embrittlement models to Linde 80 welds. This paper describes the detailed plans for future work.

  14. The Costs of Privacy in Local Energy Markets Erik Buchmann, Stephan Kessler, Patrick Jochem and Klemens Bohm

    E-Print Network [OSTI]

    Buchmann, Erik

    of small combined heat and power units, biogas plants and photovoltaic installations, and electricity

  15. Debra N. Thompson, PhD, RN, NEA-BC Debra N. Thompson, PhD, RN, NEA-BC, owner and principal of Debra N. Thompson, LLC holds an

    E-Print Network [OSTI]

    Sibille, Etienne

    Debra N. Thompson, PhD, RN, NEA-BC Biosketch Debra N. Thompson, PhD, RN, NEA-BC, owner and principal of Debra N. Thompson, LLC holds an Adjunct Faculty appointment as an Assistant Professor

  16. Local Option- Municipal Sustainable Energy Programs

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment...

  17. Local Option- Property Assessed Clean Energy

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment...

  18. Privacy Impact Assessment | OSTI, US Dept of Energy, Office of Scientific

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News, informationPriority Firm Exchange . . . .Privacy

  19. Reliability Standards Owner

    Broader source: Energy.gov [DOE]

    This position is located in the Internal Operations and Asset Management group of Planning and Asset Management (TP). A successful candidate in this position will serve as the Reliability Standards...

  20. Privacy Sensitive Monitoring With a Mix of IR Sensors and Cameras Abhishek Rajgarhia, Fred Stann, {rajgarhi, fstann@usc.edu},

    E-Print Network [OSTI]

    Heidemann, John

    · reliable image transfer over low-speed sensor network in a security/monitoring application for a building are equipped with cameras and PIR sensors. For privacy reasons, cameras are not deployed in private areas, however, they are considered acceptable for the entrance. Private areas have only PIR sensors, able

  1. Exploiting Context Data Fidelity for Enhanced Privacy and Energy Angela B. Dalton, Carla S. Ellis, and Abhijit Vijay

    E-Print Network [OSTI]

    Ellis, Carla

    Off Project uses low-power sensors as tools in the service of OS-based energy manage- ment for mobile for energy ef- ficiency and privacy assurance in context-aware, #12;ubiquitous systems. We use the term and user context as it affects energy management of the display, capturing the direct dependency

  2. Payment and Privacy: A Key for the Development of NFC Mobile Jean Claude Paills, Chrystel Gaber, Vincent Alimi, Marc Pasquet

    E-Print Network [OSTI]

    technology in the mobiles phones (NFC). Given the characteristics of the mobile phone market, this trend mobile network technology such as GSM/UMTS). Mobile will become the "Swiss army knife for day to day Mobile Phone a Swiss Knife? Often, contactless technology is considered to be more sensitive to privacy

  3. In Second International Workshop on Security and Privacy in Cloud Computing, Minneapolis, MN. 24 June 2011. Private Editing Using Untrusted Cloud Services

    E-Print Network [OSTI]

    Evans, David

    In Second International Workshop on Security and Privacy in Cloud Computing, Minneapolis, MN. 24 of Virginia MightBeEvil.com Abstract--We present a general methodology for protecting the confidentiality

  4. ConstantRound Privacy Preserving Multiset Union Jeongdae Hong 1 , Jung Woo Kim 1 , Jihye Kim 2 , Kunsoo Park 1 , and Jung Hee Cheon 2

    E-Print Network [OSTI]

    information about patients with sparse disease, while hospitals or patients want to protect their privacy Cheon mix­net. Still, since the shu#ing protocol by KS also relays an intermediate shu#ing result

  5. Local Incentives (Massachusetts)

    Broader source: Energy.gov [DOE]

    The Massachusetts Office of Business Development helps companies to identify communities interested in offering locally-negotiated incentives, such as Tax Increment Financing (TIF), Special Tax...

  6. State and Local Incentives

    Broader source: Energy.gov [DOE]

    To help you make energy efficiency improvements in your commercial building, your state and/or local community might offer incentives or have special programs.

  7. Local regulation of immigration

    E-Print Network [OSTI]

    Appleby, Clare A.

    2009-01-01T23:59:59.000Z

    Kristina M. 2007. “Local Illegal Immigration Relief ActPennsylvania. 2006. “Illegal Alien Immigration Relief Act. ”The Bill of Rights Protects Illegal Aliens” In Immigration

  8. Privacy Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News, informationPriority Firm Exchange . . . . . . . .

  9. Privacy Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News, informationPriority Firm Exchange . . .

  10. Privacy Resources

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible forPortsmouth/Paducah47,193.70 Hg Mercury 35 Br Bromine 43 cPoints of Contact

  11. Local Public Finance

    E-Print Network [OSTI]

    Quigley, John M.

    2008-01-01T23:59:59.000Z

    1959. The Theory of Public Finance. New York: McGraw-Hill.T. 2003. School finance, spatial income segregation, and theJohn M. "local public finance." The New Palgrave Dictionary

  12. Local Public Finance

    E-Print Network [OSTI]

    Quigley, John M.

    2008-01-01T23:59:59.000Z

    24. How to cite this article Quigley, John M. "local publicEW P ALGRAVE ) By John M. Quigley May 2008 These papers arelocal public finance John M. Quigley From The New Palgrave

  13. Local Public Finance

    E-Print Network [OSTI]

    Quigley, John M.

    2008-01-01T23:59:59.000Z

    cite this article Quigley, John M. "local public finance."HE N EW P ALGRAVE ) By John M. Quigley May 2008 These paperslocal public finance John M. Quigley From The New Palgrave

  14. Local entropy generation analysis

    SciTech Connect (OSTI)

    Drost, M.K.; White, M.D.

    1991-02-01T23:59:59.000Z

    Second law analysis techniques have been widely used to evaluate the sources of irreversibility in components and systems of components but the evaluation of local sources of irreversibility in thermal processes has received little attention. While analytical procedures for evaluating local entropy generation have been developed, applications have been limited to fluid flows with analytical solutions for the velocity and temperature fields. The analysis of local entropy generation can be used to evaluate more complicated flows by including entropy generation calculations in a computational fluid dynamics (CFD) code. The research documented in this report consists of incorporating local entropy generation calculations in an existing CFD code and then using the code to evaluate the distribution of thermodynamic losses in two applications: an impinging jet and a magnetic heat pump. 22 refs., 13 figs., 9 tabs.

  15. WEST VIRGINIA UNIVERSITY is the owner of all rights, title and interest in and to the following Indicia, which includes trademarks, service marks, trade names, designs, logos, seals and symbols.

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    APPENDIX B WEST VIRGINIA UNIVERSITY is the owner of all rights, title and interest: The marks of West Virginia University of are controlled under a licensing program administered Licensing Company. Yes No Restrictions WEST VIRGINIA UNIVERSITY® MOUNTAINEERS® · University seal permitted

  16. BOWLING GREEN STATE UNIVERSITY is the owner of all rights, title and interest in and to the following Indicia, which includes trademarks, service marks, trade names, designs, logos, seals and symbols.

    E-Print Network [OSTI]

    Moore, Paul A.

    APPENDIX B BOWLING GREEN STATE UNIVERSITY is the owner of all rights, title and interest 1126 BLACK WHITE RA TBD RA 2273 BLACK WHITE NOTE: The marks of Bowling Green State University University ® Bowling Green ® Bowling Green Falcons ® Bowling Green State University Falcons ® BGSU ® BGSU

  17. *Intel and the Intel logo are registered trademarks of Intel Corporation. Other brands and names are the property of their respective owners The Concurrent Collections (CnC) Parallel Programming

    E-Print Network [OSTI]

    Hazelwood, Kim

    *Intel and the Intel logo are registered trademarks of Intel Corporation. Other brands and names of their respective owners *Intel and the Intel logo are registered trademarks of Intel Corporation. Other brands *Intel and the Intel logo are registered trademarks of Intel Corporation. Other brands and names

  18. Orleans Local Coastal Program (Louisiana)

    Broader source: Energy.gov [DOE]

    The Local Coastal Programs Section provides technical assistance, guidance, and management to parishes in the development, approval, and implementation of local coastal programs (LCP). Once an LCP...

  19. Construction Local engineering.

    E-Print Network [OSTI]

    Construction Structures Geotech Local engineering. World-class engineers. World-class results. Constructed Facilities Division tti.tamu.edu #12;Expertise & Equipment ExpErtisE & EquipmEnt Created in 2005. The Texas Transportation Institute's (TTI's) Constructed Facilities Division represents a collaboration

  20. Local Safety Committee Engineering

    E-Print Network [OSTI]

    Saskatchewan, University of

    Minutes Local Safety Committee Name of Committee Engineering Worksite Mailing Address & Postal Code. Ventilation fume hoods V. Bendig and FMD report that an uninterrupted power supply will be attached to the ventilation control panel the week of Dec. 9. Action: T. Zintel and L. Harder will conduct a test the first

  1. Local microwave background radiation

    E-Print Network [OSTI]

    Domingos Soares

    2014-11-13T23:59:59.000Z

    An inquiry on a possible local origin for the Microwave Background Radiation is made. Thermal MBR photons are contained in a system called {\\it magnetic bottle} which is due to Earth magnetic field and solar wind particles, mostly electrons. Observational tests are anticipated.

  2. Lithium Local Pseudopotential Using

    E-Print Network [OSTI]

    Petta, Jason

    Lithium Local Pseudopotential Using DFT Sergio Orozco Student Advisor: Chen Huang Faculty Mentor Lithium LPS Test Lithium LPS #12;Density Functional Theory (DFT) Successful quantum mechanical approach (1979) #12;Building LPS for Lithium Create a LPS using NLPS density for Lithium Test LPS by comparing

  3. Solar and Wind Easements and Local Option Rights Laws

    Broader source: Energy.gov [DOE]

    Nebraska's solar and wind easement provisions allow property owners to create binding solar and wind easements for the purpose of protecting and maintaining proper access to sunlight and wind. ...

  4. Monotonic Local Decay Estimates

    E-Print Network [OSTI]

    Avy Soffer

    2011-10-29T23:59:59.000Z

    For the Hamiltonian operator H = -{\\Delta}+V(x) of the Schr\\"odinger Equation with a repulsive potential, the problem of local decay is considered. It is analyzed by a direct method, based on a new, L^2 bounded, propagation observable. The resulting decay estimate, is in certain cases monotonic in time, with no "Quantum Corrections". This method is then applied to some examples in one and higher dimensions. In particular the case of the Wave Equation on a Schwarzschild manifold is redone: Local decay, stronger than the known ones are proved (minimal loss of angular derivatives and lower order of radial derivatives of initial data). The method developed here can be an alternative in some cases to the Morawetz type estimates, with L^2-multipliers replacing the first order operators. It provides an alternative to Mourre's method, by including thresholds and high energies.

  5. Enhanced local tomography

    DOE Patents [OSTI]

    Katsevich, Alexander J. (Los Alamos, NM); Ramm, Alexander G. (Manhattan, KS)

    1996-01-01T23:59:59.000Z

    Local tomography is enhanced to determine the location and value of a discontinuity between a first internal density of an object and a second density of a region within the object. A beam of radiation is directed in a predetermined pattern through the region of the object containing the discontinuity. Relative attenuation data of the beam is determined within the predetermined pattern having a first data component that includes attenuation data through the region. In a first method for evaluating the value of the discontinuity, the relative attenuation data is inputted to a local tomography function .function..sub..LAMBDA. to define the location S of the density discontinuity. The asymptotic behavior of .function..sub..LAMBDA. is determined in a neighborhood of S, and the value for the discontinuity is estimated from the asymptotic behavior of .function..sub..LAMBDA.. In a second method for evaluating the value of the discontinuity, a gradient value for a mollified local tomography function .gradient..function..sub..LAMBDA..epsilon. (x.sub.ij) is determined along the discontinuity; and the value of the jump of the density across the discontinuity curve (or surface) S is estimated from the gradient values.

  6. Local Field Topology behind Light Localization and Metamaterial Topological Transitions

    E-Print Network [OSTI]

    Tong, Jonathan K.

    We revisit the mechanisms governing the sub-wavelength spatial localization of light in surface plasmon polariton (SPP) modes by investigating both local and global features in optical powerflow at SPP frequencies. Close ...

  7. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, and Viktor Prasanna

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    Grids that use large scale smart meter deployments at power consumers for bi-directional realtime, the growth of third party Smart Grid applications for consumers, such as Google PowerMeter1 and MicrosoftAn Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Yogesh

  8. Copyright 2012 -Copyright Information, Privacy Statement, and Terms of Use American Society of Agronomy | Crop Science Society of America | Soil Science Society of America

    E-Print Network [OSTI]

    Sparks, Donald L.

    © Copyright 2012 - Copyright Information, Privacy Statement, and Terms of Use American Society of Agronomy | Crop Science Society of America | Soil Science Society of America 5585 Guilford Road | Madison Browse by Section/Division of Interest Author Index Share | 86-4 The Role of Critical Zone Science

  9. Copyright 2012 -Copyright Information, Privacy Statement, and Terms of Use American Society of Agronomy | Crop Science Society of America | Soil Science Society of America

    E-Print Network [OSTI]

    Sparks, Donald L.

    © Copyright 2012 - Copyright Information, Privacy Statement, and Terms of Use American Society of Agronomy | Crop Science Society of America | Soil Science Society of America 5585 Guilford Road | Madison & Environmental Quality See more from this Session: Future Frontiers in Soil Science Monday, October 22, 2012: 1

  10. CS 535 -Wireless Network Security This is a 3-credit course that focuses on security and privacy issues in wireless networks and

    E-Print Network [OSTI]

    Levi, Albert

    CS 535 - Wireless Network Security Fall 2013 This is a 3-credit course that focuses on security and privacy issues in wireless networks and systems. Generally the security of MAC and especially upper layers information for this course (see below) several sub areas of wireless network security, in this course we

  11. Local Water Quality Districts (Montana)

    Broader source: Energy.gov [DOE]

    This statute provides for the creation of local water quality districts to prevent and mitigate ground and surface water contamination. Each local water quality district may develop and implement a...

  12. Termination Detection of Local Computations

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Termination Detection of Local Computations Emmanuel Godard1 , Yves M´etivier2 and Gerard Tel3 1 is glob- ally finished. This paper investigates the problem of the detection of the termination of local computations. We define four types of termination detection: no detection, detection of the local termination

  13. A Guidebook for Low-Carbon Development at the Local Level

    E-Print Network [OSTI]

    Zhou, Nan

    2012-01-01T23:59:59.000Z

    Description As an economic incentive to invest in moreand subsidies, economic incentives for efficient technology$2.9 billion in economic incentives for building owners and

  14. Identification of Owner’s Project Value Interests

    E-Print Network [OSTI]

    Gunby, Molly Gaynell

    2011-02-22T23:59:59.000Z

    and to aid the engineering and/or construction (E&C) provider in identifying an 4 appropriate value interest response strategy. The efforts of the CII study provided the value interest, project characteristic, and survey data required to complete... execution and delivery. Berman (2006) developed the Speed2Value? Road Map, a comprehensive process designed to help organizations focus on and achieve the strategic value of a project. The process is broad enough to be used in any industry and provides...

  15. TO: FILE MEMORANDUM SUBJECT: ALTERNATE OWNER(S)

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3uj: ;;I : T'ncZl'FILESUBJECT:

  16. Uncertainty Principle Respects Locality

    E-Print Network [OSTI]

    Dongsheng Wang

    2015-04-19T23:59:59.000Z

    The notion of nonlocality implicitly implies there might be some kind of spooky action at a distance in nature, however, the validity of quantum mechanics has been well tested up to now. In this work it is argued that the notion of nonlocality is physically improper, the basic principle of locality in nature is well respected by quantum mechanics, namely, the uncertainty principle. We show that the quantum bound on the Clauser, Horne, Shimony, and Holt (CHSH) inequality can be recovered from the uncertainty relation in a multipartite setting. We further argue that the super-quantum correlation demonstrated by the nonlocal box is not physically comparable with the quantum one. The origin of the quantum structure of nature still remains to be explained, some post-quantum theory which is more complete in some sense than quantum mechanics is possible and might not necessarily be a hidden variable theory.

  17. Dispute Resolution Process Utility Owner

    E-Print Network [OSTI]

    Minnesota, University of

    State One Call (GSOC) for "Design Call" Provide "as-builts", marked plans or field locates MnDOT Utility? Underground Utility? Contact Minnesota Office of Pipeline Safety Minnesota Office of Pipeline Safety Step 1 - Utility Identification for Construction Investigate and take appropriate action up to and including

  18. Institutional owners and competitive rivalry

    E-Print Network [OSTI]

    Connelly, Brian Lawrence

    2008-10-10T23:59:59.000Z

    factors that make firms increasingly aware of competitive behavior (e.g., TMT heterogeneity and This dissertation follows the style of the Academy of Management Journal. 2 multimarket competition) and increasingly capable of initiating...

  19. Local quantum ergodic conjecture

    E-Print Network [OSTI]

    E. Zambrano; W. P. Karel Zapfe; Alfredo M. Ozorio de Almeida

    2015-02-11T23:59:59.000Z

    The Quantum Ergodic Conjecture equates the Wigner function for a typical eigenstate of a classically chaotic Hamiltonian with a delta-function on the energy shell. This ensures the evaluation of classical ergodic expectations of simple observables, in agreement with Shnirelman's theorem, but this putative Wigner function violates several important requirements. Consequently, we transfer the conjecture to the Fourier transform of the Wigner function, that is, the chord function. We show that all the relevant consequences of the usual conjecture require only information contained within a small (Planck) volume around the origin of the phase space of chords: translations in ordinary phase space. Loci of complete orthogonality between a given eigenstate and its nearby translation are quite elusive for the Wigner function, but our local conjecture stipulates that their pattern should be universal for ergodic eigenstates of the same Hamiltonian lying within a classically narrow energy range. Our findings are supported by numerical evidence in a Hamiltonian exhibiting soft chaos. Heavily scarred eigenstates are remarkable counter-examples of the ergodic universal pattern.

  20. Performing a local barrier operation

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

    2014-03-04T23:59:59.000Z

    Performing a local barrier operation with parallel tasks executing on a compute node including, for each task: retrieving a present value of a counter; calculating, in dependence upon the present value of the counter and a total number of tasks performing the local barrier operation, a base value of the counter, the base value representing the counter's value prior to any task joining the local barrier; calculating, in dependence upon the base value and the total number of tasks performing the local barrier operation, a target value, the target value representing the counter's value when all tasks have joined the local barrier; joining the local barrier, including atomically incrementing the value of the counter; and repetitively, until the present value of the counter is no less than the target value of the counter: retrieving the present value of the counter and determining whether the present value equals the target value.

  1. Performing a local barrier operation

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

    2014-03-04T23:59:59.000Z

    Performing a local barrier operation with parallel tasks executing on a compute node including, for each task: retrieving a present value of a counter; calculating, in dependence upon the present value of the counter and a total number of tasks performing the local barrier operation, a base value, the base value representing the counter's value prior to any task joining the local barrier; calculating, in dependence upon the base value and the total number of tasks performing the local barrier operation, a target value of the counter, the target value representing the counter's value when all tasks have joined the local barrier; joining the local barrier, including atomically incrementing the value of the counter; and repetitively, until the present value of the counter is no less than the target value of the counter: retrieving the present value of the counter and determining whether the present value equals the target value.

  2. The Hidden Landscape of Localization

    E-Print Network [OSTI]

    Filoche, Marcel

    2011-01-01T23:59:59.000Z

    Wave localization occurs in all types of vibrating systems, in acoustics, mechanics, optics, or quantum physics. It arises either in systems of irregular geometry (weak localization) or in disordered systems (Anderson localization). We present here a general theory that explains how the system geometry and the wave operator interplay to give rise to a "landscape" that splits the system into weakly coupled subregions, and how these regions shape the spatial distribution of the vibrational eigenmodes. This theory holds in any dimension, for any domain shape, and for all operators deriving from an energy form. It encompasses both weak and Anderson localizations in the same mathematical frame and shows, in particular, that Anderson localization can be understood as a special case of weak localization in a very rough landscape.

  3. The Hidden Landscape of Localization

    E-Print Network [OSTI]

    Marcel Filoche; Svitlana Mayboroda

    2011-07-02T23:59:59.000Z

    Wave localization occurs in all types of vibrating systems, in acoustics, mechanics, optics, or quantum physics. It arises either in systems of irregular geometry (weak localization) or in disordered systems (Anderson localization). We present here a general theory that explains how the system geometry and the wave operator interplay to give rise to a "landscape" that splits the system into weakly coupled subregions, and how these regions shape the spatial distribution of the vibrational eigenmodes. This theory holds in any dimension, for any domain shape, and for all operators deriving from an energy form. It encompasses both weak and Anderson localizations in the same mathematical frame and shows, in particular, that Anderson localization can be understood as a special case of weak localization in a very rough landscape.

  4. Local Government Revenue Bonds (Montana)

    Broader source: Energy.gov [DOE]

    Limited obligation local government bonds ("special revenue bonds") may be issued for qualified electric energy generation facilities, including those powered by renewables. These bonds generally...

  5. Archiving Data from New Survey Technologies: Lessons Learned on Enabling Research with High-Precision Data While Preserving Participant Privacy: Preprint

    SciTech Connect (OSTI)

    Gonder, J.; Burton, E.; Murakami, E.

    2014-11-01T23:59:59.000Z

    During the past 15 years, increasing numbers of organizations and planning agencies have begun collecting high-resolution Global Positioning System (GPS) travel data. Despite the significant effort and expense to collect it, privacy concerns often lead to underutilization of the data. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory, with support from the U.S. Department of Transportation and U.S. Department of Energy, established the Transportation Secure Data Center (TSDC). Lessons drawn from best-practice examples from other data centers have helped shape the structure and operating procedures for the TSDC, which functions under the philosophy of first and foremost preserving privacy, but doing so in a way that balances security with accessibility and usability of the data for legitimate research. This paper provides details about the TSDC approach toward achieving these goals, which has included creating a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using a variety of tools and reference information. This paper also describes lessons learned from operating the TSDC with respect to improvements in GPS data handling, processing, and user support, along with plans for continual enhancements to better support the needs of both data providers and users and to thus advance the research value derived from such valuable data.

  6. J.T. and Margaret Talkington Margaret and J.T. Talkington were well-known as the founders and owners of Margaret's, a

    E-Print Network [OSTI]

    Rock, Chris

    Margaret, a University of Texas graduate, and J.T., a Texas A&M graduate, did not grow up in West Texas, but the community as well. Texas Tech University was only 23 years old when Margaret's opened its doors. Although or attend Texas Tech, they were committed to local development, helping Texas Tech provide positive

  7. LOCAL GOVERNMENT EMERGENCY PLANNING HANDBOOK

    E-Print Network [OSTI]

    management system and communications plan consistent with existing state and federal energy emergencyCALIFORNIA ENERGY COMMISSION LOCAL GOVERNMENT EMERGENCY PLANNING HANDBOOK April 2004 PUBLICATION and authorities, and to integrate their management and communications systems with both the California Energy

  8. Efficiency of Local Search Johann Hurink

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    Efficiency of Local Search Johann Hurink University of Twente BETA Mini Cour Efficiency of Local Search #12;Overview of the Talk · Efficiency of local search · Scheduling problems ­ Definition for P|| wjCj BETA Mini Cour Efficiency of Local Search #12;Efficiency of Local Search -1- Basic

  9. Anytime Replanning Using Local Subplan Replacement

    E-Print Network [OSTI]

    Ferrer, Gabriel J.

    Anytime Replanning Using Local Subplan Replacement A Dissertation Presented to the faculty how local subplan replacement can be utilized to implement an anytime planning system that devises new plans to accommodate plan failures. Local subplan replacement consists of selecting subsequences

  10. Furthering Your Local Governments' Energy Efficiency Goals: Getting Support from Local Leaders

    Broader source: Energy.gov [DOE]

    Power Point presentation from the Furthering your Local Governments Energy Efficiency Goals part 1 Getting Support From Local Leaders webcast.

  11. Local non-equilibrium thermodynamics

    E-Print Network [OSTI]

    Jinwoo, Lee

    2015-01-01T23:59:59.000Z

    Local Shannon entropy lies at the heart of modern thermodynamics, with much discussion of trajectory-dependent entropy production. When taken at both boundaries of a process in phase space, it reproduces the second law of thermodynamics over a finite time interval for small scale systems. However, given that entropy is an ensemble property, it has never been clear how one can assign such a quantity locally. Given such a fundamental omission in our knowledge, we construct a new ensemble composed of trajectories reaching an individual microstate, and show that locally defined entropy, information, and free energy are properties of the ensemble, or trajectory-independent true thermodynamic potentials. We find that the Boltzmann-Gibbs distribution and Landauer's principle can be generalized naturally as properties of the ensemble, and that trajectory-free state functions of the ensemble govern the exact mechanism of non-equilibrium relaxation.

  12. Local non-equilibrium thermodynamics

    E-Print Network [OSTI]

    Lee Jinwoo; Hajime Tanaka

    2015-01-16T23:59:59.000Z

    Local Shannon entropy lies at the heart of modern thermodynamics, with much discussion of trajectory-dependent entropy production. When taken at both boundaries of a process in phase space, it reproduces the second law of thermodynamics over a finite time interval for small scale systems. However, given that entropy is an ensemble property, it has never been clear how one can assign such a quantity locally. Given such a fundamental omission in our knowledge, we construct a new ensemble composed of trajectories reaching an individual microstate, and show that locally defined entropy, information, and free energy are properties of the ensemble, or trajectory-independent true thermodynamic potentials. We find that the Boltzmann-Gibbs distribution and Landauer's principle can be generalized naturally as properties of the ensemble, and that trajectory-free state functions of the ensemble govern the exact mechanism of non-equilibrium relaxation.

  13. Land Use Regulation with Durable Capital

    E-Print Network [OSTI]

    Quigley, John M.; Swoboda, Aaron

    2009-01-01T23:59:59.000Z

    Manhattan so expensive? Regulation and the rise of housingmotive for restrictive regulation by local home owners.the impacts of these regulations vary across owner- occupied

  14. Localization via Automorphisms of the CARs. Local gauge invariance

    E-Print Network [OSTI]

    Hendrik Grundling; Karl-Hermann Neeb

    2010-01-07T23:59:59.000Z

    The classical matter fields are sections of a vector bundle E with base manifold M. The space L^2(E) of square integrable matter fields w.r.t. a locally Lebesgue measure on M, has an important module action of C_b^\\infty(M) on it. This module action defines restriction maps and encodes the local structure of the classical fields. For the quantum context, we show that this module action defines an automorphism group on the algebra A, of the canonical anticommutation relations on L^2(E), with which we can perform the analogous localization. That is, the net structure of the CAR, A, w.r.t. appropriate subsets of M can be obtained simply from the invariance algebras of appropriate subgroups. We also identify the quantum analogues of restriction maps. As a corollary, we prove a well-known "folk theorem," that the algebra A contains only trivial gauge invariant observables w.r.t. a local gauge group acting on E.

  15. Local

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let usNucleartearing mode flows and the

  16. Local

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let usNucleartearing mode flows and theplasma

  17. Local

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let usNucleartearing mode flows and

  18. Fractal Superconductivity near Localization Threshold

    E-Print Network [OSTI]

    Fominov, Yakov

    Fractal Superconductivity near Localization Threshold Mikhail Feigel'man Landau Institute, Moscow-electron states are extended but fractal and populate small fraction of the whole volume How BCS theory should be modified to account for eigenstates fractality ? #12;Mean-Field Eq. for Tc #12;#12;3D Anderson model: = 0

  19. Kampung Capacity Local Solutions for

    E-Print Network [OSTI]

    Kammen, Daniel M.

    utility customers. Using a hybrid energy resource optimization framework, we explore optimal configurationKampung Capacity Local Solutions for Sustainable Rural Energy in the Baram River Basin, Sarawak Energy Laboratory (RAEL) & Energy and Resources Group and Goldman School of Public Policy Release Date

  20. Understanding Localized-Scanning Worms Zesheng Chen

    E-Print Network [OSTI]

    Ji, Chuanyi

    Understanding Localized-Scanning Worms Zesheng Chen School of Electrical & Computer Engineering Email: jic@ece.gatech.edu Abstract-- Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search

  1. Hardy's non-locality and generalized non-local theory

    E-Print Network [OSTI]

    Sujit K. Choudhary; Sibasish Ghosh; Guruprasad Kar; Samir Kunkri; Ramij Rahaman; Anirban Roy

    2011-10-31T23:59:59.000Z

    Hardy's non-locality theorem for multiple two-level systems is explored in the context of generalized nonlocal theory. We find nonlocal but non-signaling probabilities, providing Hardy's nonlocal argument, which are higher than those in Quantum Mechanics. Maximum probability of success of Hardy's argument is obtained for three two-level systems in quantum as well as in a more generalized theory. Interestingly, the maximum in the nonlocal generalized theory for both the cases turns out to be same.

  2. Local Option- Contractual Assessments for Renewable Energy and/or Energy Efficiency

    Broader source: Energy.gov [DOE]

    Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment...

  3. Localization in active incommensurate arrays

    E-Print Network [OSTI]

    T. V. Laptyeva; S. V. Denisov; G. V. Osipov; M. V. Ivanchenko

    2014-12-01T23:59:59.000Z

    In a dissipationless linear lattice, spatial disorder or incommensurate modulation induce localization of the lattice eigenstates and block spreading of wave packets. Additionally, incommensurate arrays allow for the metal-insulator transition at a finite modulation amplitude already in one dimension. The addition of nonlinearity to the lattice Hamiltonian causes interaction between the eigenstates, which results in a slow packet spreading. We go beyond the dissipationless limit and consider nonlinear quasi-periodic arrays that are subjected to the dissipative losses and energy pumping. We find that there is a finite excitation of oscillations threshold in both metallic and insulating regimes. Moreover, excitation in the metallic and weakly insulating regime displays features of the second order phase transition to global oscillations, in contrast to disordered arrays. The Anderson attractor regime is recovered only in the limit of strong localization. The identified transition, and the further onset of chaos and synchronization can be potentially realized with polariton condensates lattices and cavity-QED arrays.

  4. The Local Dimension of Energy

    E-Print Network [OSTI]

    Kelly, Scott

    2011-01-31T23:59:59.000Z

     and international experience, several bespoke energy strategies are identified  that have significant potential to contribute to local energy demand reduction and lower  CO2 emissions  in  the UK. The  strategies  identified  include, Combined Heat and Power  with  District  Heating  (CHP?DH),  Energy  from  Waste  Facilities  (Ef... Energy, Decentralised Energy, Energy Service Company (ESCo), CHP, District Heating JEL Classification Contact sjk64@cama.c.uk Publication January 2011 Financial Support 4CMR, Cambridge Econometrics, Cambridge Trusts 1 The...

  5. Local Cloning of Entangled Qubits

    E-Print Network [OSTI]

    Sujit K. Choudhary; Samir Kunkri; Ramij Rahaman; Anirban Roy

    2007-07-06T23:59:59.000Z

    We discuss the exact cloning of orthogonal but entangled qubits under local operations and classical communication. The amount of entanglement necessary in blank copy is obtained for various cases. Surprisingly this amount is more than 1 ebit for certain set of two nonmaximal but equally entangled states of two qubits system. To clone any three two qubits Bell states at least log2 3 ebit is necessary.

  6. 3/6/13 NetflixSpilled Your BrokebackMountain Secret, Lawsuit Claims | Threat Level | Wired.com www.wired.com/threatlevel/2009/12/netflix-privacy-lawsuit 1/13

    E-Print Network [OSTI]

    Sandhu, Ravi

    3/6/13 NetflixSpilled Your BrokebackMountain Secret, Lawsuit Claims | Threat Level | Wired.com wwwTweet 18 0 Netflix Spilled Your Brokeback Mountain Secret, Lawsuit Claims By Ryan Singel 12.17.09 4:29 PM on Thursday, alleging that Netflix violated fair-trade laws and a federal privacy law protecting video rental

  7. Anderson localization on a simplex

    E-Print Network [OSTI]

    A. Ossipov

    2013-02-08T23:59:59.000Z

    We derive a field-theoretical representation for the moments of the eigenstates in the generalized Anderson model. The representation is exact and can be used for the Anderson model with generic non-random hopping elements in any dimensions. We apply this method to the simplex model, for which the hopping amplitude between any two lattice sites is the same, and find that the eigenstates are localized at any strength of disorder. Our analytical predictions are in excellent agreement with the results of numerical simulations.

  8. Targeting Illegal Immigration: Local Ordinate Action

    E-Print Network [OSTI]

    Gunn, Emily; Moffitt, Jessica; Montemayor, Victoria; Riedel, Sarah; Smith, Bart; Weizel, Daniel

    2008-01-01T23:59:59.000Z

    2006 and 2008. The small number is surprising, given the recent media coverage on the topic. For these 21 localities, we studied several demographic and economic characteristics for each locality over time to try to ascertain factors that may...

  9. Sensor network localization based on natural phenomena

    E-Print Network [OSTI]

    Kim, Daniel Sang

    2006-01-01T23:59:59.000Z

    Autonomous localization is crucial for many sensor network applications. The goal of this thesis is to develop a distributed localization algorithm for the PLUG indoor sensor network by analyzing sound and light sensory ...

  10. Local Option- Solar Sales Tax Exemption

    Broader source: Energy.gov [DOE]

    The exemption does not apply to solar pool heating or other recreational applications. The laws also permit local governments (municipalities and counties) to grant an exemption from local sales...

  11. "Furthering Your Local Governments' Energy Efficiency Goals-- Part 1- Getting Support From Local Leaders "

    Broader source: Energy.gov [DOE]

    DOE’s technical assistance program webcast on furthering your local government’s energy efficiency goals. This is part one, gaining support from local leaders.

  12. Spotlight on Rutland County, Vermont: How Local Ties Lead to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rutland County, Vermont: How Local Ties Lead to Local Wins Spotlight on Rutland County, Vermont: How Local Ties Lead to Local Wins Spotlight on Rutland County, Vermont: How Local...

  13. NOvA Experiment - The Local Community

    ScienceCinema (OSTI)

    Deb Wieber

    2010-01-08T23:59:59.000Z

    Local proprietors Steve and Deb Wieber discuss the impact of the NOvA experiment on their community.

  14. NOvA Experiment - The Local Community

    SciTech Connect (OSTI)

    Deb Wieber

    2009-05-14T23:59:59.000Z

    Local proprietors Steve and Deb Wieber discuss the impact of the NOvA experiment on their community.

  15. Cosmological perturbations on local systems

    E-Print Network [OSTI]

    Gregory S. Adkins; Jordan McDonnell; Richard N. Fell

    2006-12-22T23:59:59.000Z

    We study the effect of cosmological expansion on orbits--galactic, planetary, or atomic--subject to an inverse-square force law. We obtain the laws of motion for gravitational or electrical interactions from general relativity--in particular, we find the gravitational field of a mass distribution in an expanding universe by applying perturbation theory to the Robertson-Walker metric. Cosmological expansion induces an ($\\ddot a/a) \\vec r$ force where $a(t)$ is the cosmological scale factor. In a locally Newtonian framework, we show that the $(\\ddot a/a) \\vec r$ term represents the effect of a continuous distribution of cosmological material in Hubble flow, and that the total force on an object, due to the cosmological material plus the matter perturbation, can be represented as the negative gradient of a gravitational potential whose source is the material actually present. We also consider the effect on local dynamics of the cosmological constant. We calculate the perihelion precession of elliptical orbits due to the cosmological constant induced force, and work out a generalized virial relation applicable to gravitationally bound clusters.

  16. DISTRIBUTED EVENT LOCALIZATION AND TRACKING ALGORITHM (DELTA)

    E-Print Network [OSTI]

    Braun, Torsten

    in a distributed event localization and tracking algorithm (DELTA). DELTA is extended with energy-efficient network management, event classification functionality and an energy based source localization. The energy;#12;Abstract Different approaches to do event detection, tracking, localization and classification have been

  17. UNCORRECTEDPROOF 2 Positioning using local maps q

    E-Print Network [OSTI]

    Ruml, Wheeler

    Positioning using Local 11 Maps (PLM). Given a path between a starting node and a remote node we wish absolute coordinates. We instantiate the PLM framework using the previously pro- 15 posed MDS Local 57 Maps (PLM). The method estimates node loca- 58 tions based on local maps, i.e., positions

  18. An evaluation of the B&W Owners Group BAW-10182 topical report: Justification for increasing the engineered safety features actuation system on-line test intervals. Technical evaluation report

    SciTech Connect (OSTI)

    Smith, C.L.; Hansen, J.L.

    1993-09-01T23:59:59.000Z

    This Technical Evaluation Report provides an evaluation of the Babcock and Wilcox Owners Group (B&WOG) Technical Specifications Committee Topical Report BAW-10182, entitled, ``Justification for Increasing Engineered Safety Features Actuation System (ESFAS) On-Line Test Intervals.`` This evaluation was performed by the Idaho National Engineering Laboratory in support of the Nuclear Regulatory Commission. The BAW-10182 report presents justification for the extension of on-line test intervals from the existing one-month interval to a three-month interval for the ESFAS system. In the BAW-10182 report, the B&WOG stated that ``{hor_ellipsis}the B&WOG proposes to increase the ESFAS test interval from one to three months and concludes that the effect on plant risk is insignificant.`` The proposed extension was based upon risk-based [i.e., probabilistic risk assessment (PRA)] methods such as reliability block diagrams, uncertainty analyses, and time-dependent system availability analyses. This use of PRA methods requires a detailed evaluation to determine whether the chosen methods and their application are valid in the context of the proposed test interval extension. The results of the evaluation agreed that the effect on plant risk is small if the ESFAS test interval is extended to three months for the ESFAS designs that were evaluated.

  19. Centralized Analysis of Local Data, With Dollars and Lives on the Line: Lessons From The Home Radon Experience

    SciTech Connect (OSTI)

    Price, PhillipN.; Gelman, Andrew

    2014-11-24T23:59:59.000Z

    In this chapter we elucidate four main themes. The first is that modern data analyses, including "Big Data" analyses, often rely on data from different sources, which can present challenges in constructing statistical models that can make effective use of all of the data. The second theme is that although data analysis is usually centralized, frequently the final outcome is to provide information or allow decision-making for individuals. Third, data analyses often have multiple uses by design: the outcomes of the analysis are intended to be used by more than one person or group, for more than one purpose. Finally, issues of privacy and confidentiality can cause problems in more subtle ways than are usually considered; we will illustrate this point by discussing a case in which there is substantial and effective political opposition to simply acknowledging the geographic distribution of a health hazard. A researcher analyzes some data and learns something important. What happens next? What does it take for the results to make a difference in people's lives? In this chapter we tell a story - a true story - about a statistical analysis that should have changed government policy, but didn't. The project was a research success that did not make its way into policy, and we think it provides some useful insights into the interplay between locally-collected data, statistical analysis, and individual decision making.

  20. Under Utilization of Local Anesthetics in Infant Lumbar Punctures

    E-Print Network [OSTI]

    Gorchynski, Julie; Everett, Worth; Prebil, Linda

    2008-01-01T23:59:59.000Z

    Ochoa LF. Role of local anesthesia during lumbar puncturesnot routinely received local anesthesia prior to LP. Studyreceived local procedural anesthesia by emergency medicine

  1. State and Local Energy Assurance Planning | Department of Energy

    Office of Environmental Management (EM)

    State and Local Energy Assurance Planning State and Local Energy Assurance Planning OE works closely with State and local governments on energy assurance issues. The office...

  2. State and Local Code Implementation: Southwest Region - 2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Local Code Implementation: Southeast Region - 2014 BTO Peer Review State and Local Code Implementation: State Energy Officials - 2014 BTO Peer Review State and Local Code...

  3. A Quantum Lovasz Local Lemma

    E-Print Network [OSTI]

    Andris Ambainis; Julia Kempe; Or Sattath

    2009-11-09T23:59:59.000Z

    The Lovasz Local Lemma (LLL) is a powerful tool in probability theory to show the existence of combinatorial objects meeting a prescribed collection of "weakly dependent" criteria. We show that the LLL extends to a much more general geometric setting, where events are replaced with subspaces and probability is replaced with relative dimension, which allows to lower bound the dimension of the intersection of vector spaces under certain independence conditions. Our result immediately applies to the k-QSAT problem: For instance we show that any collection of rank 1 projectors with the property that each qubit appears in at most $2^k/(e \\cdot k)$ of them, has a joint satisfiable state. We then apply our results to the recently studied model of random k-QSAT. Recent works have shown that the satisfiable region extends up to a density of 1 in the large k limit, where the density is the ratio of projectors to qubits. Using a hybrid approach building on work by Laumann et al. we greatly extend the known satisfiable region for random k-QSAT to a density of $\\Omega(2^k/k^2)$. Since our tool allows us to show the existence of joint satisfying states without the need to construct them, we are able to penetrate into regions where the satisfying states are conjectured to be entangled, avoiding the need to construct them, which has limited previous approaches to product states.

  4. Local Varying-Alpha Theories

    E-Print Network [OSTI]

    John D. Barrow; Joao Magueijo

    2015-01-30T23:59:59.000Z

    In a recent paper we demonstrated how the simplest model for varying alpha may be interpreted as the effect of a dielectric material, generalized to be consistent with Lorentz invariance. Unlike normal dielectrics, such a medium cannot change the speed of light, and its dynamics obey a Klein-Gordon equation. This work immediately suggests an extension of the standard theory, even if we require compliance with Lorentz invariance. Instead of a wave equation, the dynamics may satisfy a local algebraic relation involving the permittivity and the properties of the electromagnetic field, in analogy with more conventional dielectric (but still preserving Lorentz invariance). We develop the formalism for such theories and investigate some phenomenological implications. The problem of the divergence of the classical self-energy can be solved, or at least softened, in this framework. Some interesting new cosmological solutions for the very early universe are found, including the possibility of a bounce, inflation and expansion with a loitering phase, all of which are induced by early variations in alpha.

  5. MULTISCALE ANALYSIS IMPLIES STRONG DYNAMICAL LOCALIZATION

    E-Print Network [OSTI]

    Stollmann, P.

    localized region), E n k� \\Lambda 1 j(H(!))� \\Lambda 2 k o Ÿ kjk1 \\Delta dist(\\Lambda 1 ; \\Lambda 2 ) \\Gamma

  6. Localized domain patterns in complex polymers

    E-Print Network [OSTI]

    Localized domain patterns in complex polymers abstract. Block copolymers are macromolecules that can form variety of microstructures as a result of incomplete

  7. Convolution type operators on locally compact groups

    E-Print Network [OSTI]

    Shtein--~erg, Convolution Type Operators on Locally Compact Groups [in Russian],. Manuscript Deposited in the All-Union Institute of Scientific and Technical ...

  8. LANSCE | Lujan Center | Highlights | Local iron displacements...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fe4 plaquettes, correlates with local displacements of the Fe atoms as determined from neutron pair-distribution function analysis of the same data. The spins align...

  9. Model Wind Ordinance for Local Governments

    Broader source: Energy.gov [DOE]

    In 2006, Pennsylvania developed a model local ordinance for wind energy facilities through a collaborative effort involving several state departments and stakeholder groups. The purpose of the...

  10. Local Option- Property Tax Exemption for Solar

    Broader source: Energy.gov [DOE]

    Virginia allows any county, city or town to exempt or partially exempt solar energy equipment or recycling equipment from local property taxes. Residential, commercial or industrial property is...

  11. Shear strain localization in elastodynamic rupture simulations

    E-Print Network [OSTI]

    Daub, Eric G; Carlson, Jean M

    2008-01-01T23:59:59.000Z

    We study strain localization as an enhanced velocity weakening mechanism on earthquake faults. Fault friction is modeled using Shear Transformation Zone (STZ) Theory, a microscopic physical model for non-affine rearrangements in granular fault gouge. STZ Theory is implemented in spring slider and dynamic rupture models of faults. We compare dynamic shear localization to deformation that is uniform throughout the gouge layer, and find that localized slip enhances the velocity weakening of the gouge. Localized elastodynamic ruptures have larger stress drops and higher peak slip rates than ruptures with homogeneous strain.

  12. Privacy | Department of Energy

    Office of Legacy Management (LM)

    Stanford Nitrogen Group Lab Breakthroughs ARPA-E Energy Innovation Summit Electric Power Electric Power Home Smart Grid Storage Energy Sources Energy Sources Home Fossil...

  13. Privacy Impact Assessment

    Broader source: Energy.gov (indexed) [DOE]

    scan) Tools, processes, types of information is scanned for, and frequency of the scanning. Threshold Questions 1. Does system contain (collect andor maintain), or plan to...

  14. PRIVACY OF HEALTH INFORMATION

    E-Print Network [OSTI]

    and civil fraud and abuse regulations. Finally, HIPAA was intended to streamline the health care system through the adoption of consistent standards for transmitting uniform electronic health care data between providers of health care services (e.g. MCW) and payers (e.g. Medicare). In order to adopt transmission

  15. Correcting Privacy Act Records

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi Site Office (FSO)Corporate Culture

  16. Privacy Impact Assessment

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR - T enAmountCammieReserveSecretary JohannsMay

  17. PRIVACY IMPACT ASSESSMENT: Office

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse(Expired) | DepartmentINL E-IDROCCUPATIONAL

  18. PRIVACY IMPACT ASSESSMENT: Office

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse(Expired) | DepartmentINL E-IDROCCUPATIONALOffice of

  19. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Astrophysics OneOutreach EffortsSearch Welcome

  20. Privacy | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases Archive

  1. PNNL: Security & Privacy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomass and4/26/11:Tel.:162 PreparedExpert Showcase

  2. Candidate Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced. C o w l i t z C o . C l a r8.05 CalendarINT'L. S

  3. WIPP Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSiteEureka AnalyticsLargeHome Page Directional

  4. ARM - Privacy and Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Become a User RecoveryARMParticipants About

  5. LOCAL FOURIER TRANSFORMS AND RIGIDITY FOR D-MODULES

    E-Print Network [OSTI]

    Bloch, Spencer

    LOCAL FOURIER TRANSFORMS AND RIGIDITY FOR D. Local Fourier transforms, analogous to the `-adic local Fourier transforms [14], are constructed infinitesimal rigidity condition is satisfied. As in [12], the argument uses local Fourier transforms

  6. LOCALIZED AURORA BEYOND THE AURORAL OVAL

    E-Print Network [OSTI]

    California at Berkeley, University of

    LOCALIZED AURORA BEYOND THE AURORAL OVAL Harald U. Frey1 Received 3 June 2005; revised 8 September 2006; accepted 10 October 2006; published 2 March 2007. [1] Aurora is the result of the interaction, there are localized regions of aurora that are unrelated to the ovals and exhibit different morphological, spatial

  7. Local Export Spillovers in France Pamina Koenig

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Local Export Spillovers in France Pamina Koenig Florian Mayneris Sandra Poncet§ Abstract This paper investigates the presence of local export spillovers on both the extensive (the decision to start exporting) and the intensive (the export volume) margins of trade, using data on French individual export flows, at the product

  8. Optimal Robot Localization in Trees Rudolf Fleischer

    E-Print Network [OSTI]

    Fleischer, Rudolf

    Optimal Robot Localization in Trees Rudolf Fleischer Department of Computer Science, The Hong Kong of localization, that is, of a robot finding its position on a map, is an important task for autonomous mobile robots. It has appli­ cations in numerous areas of robotics ranging from aerial photography to autonomous

  9. Local symmetries of non-expanding horizons

    E-Print Network [OSTI]

    Rudranil Basu; Ayan Chatterjee; Amit Ghosh

    2010-04-21T23:59:59.000Z

    Local symmetries of a non-expanding horizon has been investigated in the 1st order formulation of gravity. When applied to a spherically symmetric isolated horizon only a U(1) subgroup of the Lorentz group survives as residual local symmetry that one can make use of in constructing an effective theory on the horizon.

  10. Natural geometric representation for electron local observables

    SciTech Connect (OSTI)

    Minogin, V.G., E-mail: minogin@isan.troitsk.ru

    2014-03-15T23:59:59.000Z

    An existence of the quartic identities for the electron local observables that define orthogonality relations for the 3D quantities quadratic in the electron observables is found. It is shown that the joint solution of the quartic and bilinear identities for the electron observables defines a unique natural representation of the observables. In the natural representation the vector type electron local observables have well-defined fixed positions with respect to a local 3D orthogonal reference frame. It is shown that the natural representation of the electron local observables can be defined in six different forms depending on a choice of the orthogonal unit vectors. The natural representation is used to determine the functional dependence of the electron wave functions on the local observables valid for any shape of the electron wave packet. -- Highlights: •Quartic identities that define the orthogonality relations for the electron local observables are found. •Joint solution of quartic and bilinear identities defines a unique natural representation of the electron local observables. •Functional dependence of the electron wave functions on the electron local observables is determined.

  11. Local Transition Functions of Quantum Turing Machines

    E-Print Network [OSTI]

    Masanao Ozawa; Harumichi Nishimura

    2000-12-26T23:59:59.000Z

    Foundations of the notion of quantum Turing machines are investigated. According to Deutsch's formulation, the time evolution of a quantum Turing machine is to be determined by the local transition function. In this paper, the local transition functions are characterized for fully general quantum Turing machines, including multi-tape quantum Turing machines, extending the results due to Bernstein and Vazirani.

  12. DAMAGE LOCALIZATION USING LOAD VECTORS Dionisio Bernal

    E-Print Network [OSTI]

    Bernal, Dionisio

    DAMAGE LOCALIZATION USING LOAD VECTORS Dionisio Bernal Associate Professor Department of Civil: A technique to localize damage in structures that can be treated as linear in the pre and post-damage state is presented. Central to the approach is the computation of a set of vectors, designated as Damage Locating

  13. Structural Damage Detection and Localization Using NETSHM

    E-Print Network [OSTI]

    Gnawali, Omprakash

    Structural Damage Detection and Localization Using NETSHM Krishna Chintalapudi, Jeongyeup Paek and localize damage in large civil structures. Structural engineers often implement and test SHM algorithms the intricacies of wireless networking, or the details of sensor data acquisition. We have implemented a damage

  14. Local Connections: Designing Technologies for Discovery and

    E-Print Network [OSTI]

    of great historical importance as the basis for our heritage, missing the rich narratives of socialOpenUniversity|j.vanderlinden@open.ac.uk Anne Adams TheOpenUniversity|a.adams@open.ac.uk Historical artifacts, places, char- acters, and stories with local heritage were developed and evaluated with local groups. The goal of the project was to enhance

  15. Climate Change Adaptation for Local Government

    E-Print Network [OSTI]

    Pedersen, Tom

    Climate Change Adaptation for Local Government A Resource Guide June 2011 Jenny Fraser, Adaptation to Climate Change Team, Simon Fraser University #12;Page 1 of 26 Climate Change Adaptation for Local: RESOURCES THAT SUPPORT CLIMATE CHANGE ASSESSMENT 3. Past and Future Climate Change and Its Impacts 4

  16. Locally Accessible Information and Distillation of Entanglement

    E-Print Network [OSTI]

    Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

    2004-03-18T23:59:59.000Z

    A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  17. Furthering Your Local Governments' Energy Efficiency Goals-- Part 1- Getting Support From Local Leaders

    Broader source: Energy.gov [DOE]

    An overview of some of the best practices for gaining support for energy efficiency projects from your local leaders , key data points and other items of interest that local leaders might look for when approached about supporting energy efficiency projects..

  18. Localities and their natural gas : stories of problem diffusion, state preemption, and local government capacity

    E-Print Network [OSTI]

    Agatstein, Jessica C

    2013-01-01T23:59:59.000Z

    The rapid rise of oil and gas production in the United States poses a new set of policy challenges for local governments. Striving to balance the goals of encouraging economic growth and mitigating its side effects, local ...

  19. Global-local Structural Optimization Using Response Surfaces of Local Optimization Margins

    E-Print Network [OSTI]

    Neumaier, Arnold

    1 Global-local Structural Optimization Using Response Surfaces of Local Optimization Margins Boyang optimization problems. First, a large number of component optimizations for maximization of margins are performed. Response surface approximations (RSA) for maximum margins of component optimization

  20. Electron localization in solid acetonitrile.

    SciTech Connect (OSTI)

    Shkrob, I. A.; Takeda, K.; Williams, F.; Chemistry; Univ. of Tennessee

    2002-10-03T23:59:59.000Z

    Electron localization in the bulk condensed phases of acetonitrile differs drastically from the corresponding processes that take place in water and aliphatic alcohols. In particular, electron capture following the ionization of liquid and solid acetonitrile yields well-defined radical anions in place of the largely structureless solvated and trapped electrons characteristic of irradiated solutions and rigid glasses. This is remarkable given the many similarities that exist not only between the intrinsic properties of these individual solvent molecules, such as polarity, but also in their cooperative capacity to function as solvents. Here, with the aid of detailed experimental and computational studies, we examine on a fundamental level what gives rise to such a sharp contrast in the behavior of these alkyl cyanides as compared to water and alcohols. EPR and optical spectra, and ab initio calculations on the radical anions are used together with diffraction data for the crystal structures to demonstrate that electron attachment to nitrile molecules in the crystalline state results in a significant bending of the linear CCN moiety. Moreover, in the formation of the dimer anions, which only takes place in certain crystalline phases, it is determined that the intermolecular bonding occurs between the cyanide carbons in an antiparallel arrangement. A staggered structure for the dimer anion in {alpha}-acetonitrile is then suggested, in which there is a nearly coplanar arrangement with the two bent CCN fragments. The resulting structure accounts for the observed EPR parameters, the position of the UV-vis absorption band, and the trends observed in the vibronic progressions for the four H/D isotopomers. The dimer radical anion in a-acetonitrile retains the same orientation and symmetry as that of the preexisting neutral {l_brace}CH{sub 3}CN{r_brace}{sub 2} pairs in this crystal despite the resulting changes in molecular geometry and in the translational coordinates for the cyanide carbons as the two acetonitrile molecules come together. We suggest that dimer anions of nitriles can form only in the phases where such 'antiparallel' pairs occur, including liquid systems; otherwise, the electron remains attached to a single molecule, as in {beta}-acetonitrile. Because electron capture by water or alcohol molecules in the condensed phase appears to require larger molecular clusters, the contrast between the behavior of these solvents and acetonitrile is attributable to the relative ease with which acetonitrile molecules in the crystal or solvent can undergo valence-electron attachment via their accessible low-lying {pi}* orbitals.

  1. Local Basis Expansions for MEG Source Localization. Partha P. Mitra1

    E-Print Network [OSTI]

    , but are not identical to, spherical harmonics. Components of the transformed sensor measure- ments which correspond density power. The latter is particularly useful for localization of spontaneous activity. Below we first of the LBEX technique is to transform a global basis set into a local basis set for a given local region

  2. Governmental-Owner Power Imbalance and Privatization 

    E-Print Network [OSTI]

    Xu, Kehan

    2011-10-21T23:59:59.000Z

    natural research context to examine the function of capital markets, the impact of national institutional settings, and the differences between partial privatization and initial public offerings. Very little research, however, has examined the determinants...

  3. Well Owner's Guide To Water Supply

    E-Print Network [OSTI]

    Fay, Noah

    the quantity and quality of aquifer water resources in our state. · Common contaminants found in Arizona Highlands Region ...................................18 3. Water Quality Common Minerals Found in Water .....................22 Contaminants in Water........................................23 Drinking Water Guidelines

  4. Project: Draper Hall Renovation Owner: Berea College

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    source · Clerestory windows in classrooms for daylighting and passive solar heating · Occupancy sensors Architects, partnering with Steed Hammond Paul, designed and Messer Construction implemented the ecological in Architectural Design. · 52,000 ft.2 / 3 stories with carillon tower · Preservation of original slate roofing

  5. SharePoint 2007 For Site Owners

    E-Print Network [OSTI]

    Siddharthan, Advaith

    -sites ...........................................................................................7 3.2 Create new items, e.g. a list, library, discussion board, survey or web page ............8 4Point, we have created a standard template for all projects ­ the Team Site. This collaborative environment (Announcements) Resources List If the standard Team Site template doesn't meet all your requirements, we can

  6. An Owner's Guide to Smoothed Particle Hydrodynamics

    E-Print Network [OSTI]

    T. J. Martin; F. R. Pearce; P. A. Thomas

    1993-10-13T23:59:59.000Z

    We present a practical guide to Smoothed Particle Hydrodynamics (\\SPH) and its application to astrophysical problems. Although remarkably robust, \\SPH\\ must be used with care if the results are to be meaningful since the accuracy of \\SPH\\ is sensitive to the arrangement of the particles and the form of the smoothing kernel. In particular, the initial conditions for any \\SPH\\ simulation must consist of particles in dynamic equilibrium. We describe some of the numerical difficulties that may be encountered when using \\SPH, and how these may be overcome. Through our experience in using \\SPH\\ code to model convective stars, galaxy clusters and large scale structure problems we have developed many diagnostic tests. We give these here as an aid to rapid identification of errors, together with a list of basic prerequisites for the most efficient implementation of \\SPH.

  7. Scott Roseman: Owner, New Leaf Community Markets

    E-Print Network [OSTI]

    Reti, Irene H.

    2010-01-01T23:59:59.000Z

    worked for the Alternative Energy Co-op, an organizationdoing an internship in alternative energy systems. After theat what was called the Alternative Energy Co-op, which was a

  8. Vision of a Multi Properties Owner

    E-Print Network [OSTI]

    Bouilleaud

    2004-01-01T23:59:59.000Z

    % business, 40% leisure THE IBIS ROOMTHE IBIS ROOM 5,75 m 2,85 m THE SOFITEL ROOMTHE SOFITEL ROOM 8 m 4 m IBIS & BMSIBIS & BMS NO ?Ibis does not install BMS because :?Guest room thermostats must be simple and cheap?The size of the hotel is medium-often thermostat :?The guest doest not see it?It does not save substantial energyYES for general services & back of house :?Gives better comfort :-temperature in meeting rooms, restaurants etc...

  9. Energy Performance and Home Owner Behavior

    E-Print Network [OSTI]

    Dong, B.

    2013-01-01T23:59:59.000Z

    ME 4343 HVAC Design The Impact of Occupancy Behavior Patterns On the Energy Consumption in Low-income Residential Buildings Bing Dong1, Yifei Duan1, Rui Liu2, Taeg Nishimoto2 1 Building Performance and Diagnostics Group, Mechanical Engineering..., the University of Texas, San Antonio, TX, USA 2 College of Architecture, the University of Texas, San Antonio, TX, USA ESL-KT-13-12-04 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 Introduction • Large gaps between...

  10. Scott Roseman: Owner, New Leaf Community Markets

    E-Print Network [OSTI]

    Reti, Irene H.

    2010-01-01T23:59:59.000Z

    an organization devoted to renewable energy technologies. Itwas dedicated to the renewable energy movement. But during

  11. DOE Facility Management Contracts Facility Owner Contractor

    Office of Environmental Management (EM)

    Palmer 630-252-2127 Oak Ridge Environmental Management EM Bechtel Jacobs Co LLC 12181997 12312011 12312011 Environmental Mgmt 1998 http:www.oakridge.doe.govexternal...

  12. DOE Facility Management Contracts Facility Owner Contractor

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy, OAPM |TRU Waste Cleanup at1450.5B OMB3.2 DOE F580.1 DOE

  13. DOE Facility Management Contracts Facility Owner Contractor

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy, OAPM |TRU Waste Cleanup at1450.5B OMB3.2 DOE F580.1 DOEUniv. Of

  14. DOE Facility Management Contracts Facility Owner Contractor

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy, OAPM |TRU Waste Cleanup at1450.5B OMB3.2 DOE F580.1 DOEUniv.

  15. Property:Owners | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with form History Facebook icon Twitter iconNumOfPlants Jump

  16. Information System Owner | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe RankingReform

  17. Local complex singularity exponents for isolated singularities

    E-Print Network [OSTI]

    Hou, Zuoliang, 1977-

    2004-01-01T23:59:59.000Z

    In this thesis, I studied the stability of local complex'singularity exponents (lcse) for holomorphic functions whose zero sets have only isolated singularities. For a given holomorphic function f defined on a neighborhood ...

  18. Anderson localization of partially incoherent light

    SciTech Connect (OSTI)

    Capeta, D.; Radic, J.; Buljan, H. [Department of Physics, University of Zagreb, PP 332, 10000 Zagreb (Croatia); Szameit, A.; Segev, M. [Physics Department and Solid State Institute, Technion, Haifa 32000 (Israel)

    2011-07-15T23:59:59.000Z

    We study Anderson localization and propagation of partially spatially incoherent wavepackets in linear disordered potentials, motivated by the insight that interference phenomena resulting from multiple scattering are affected by the coherence of the waves. We find that localization is delayed by incoherence: the more incoherent the waves are, the longer they diffusively spread while propagating in the medium. However, if all the eigenmodes of the system are exponentially localized (as in one- and two-dimensional disordered systems), any partially incoherent wavepacket eventually exhibits localization with exponentially decaying tails, after sufficiently long propagation distances. Interestingly, we find that the asymptotic behavior of the incoherent beam is similar to that of a single instantaneous coherent realization of the beam.

  19. Guidance for Local Wind Energy Ordinances

    Broader source: Energy.gov [DOE]

    Note: The documents described in this summary were designed to provide guidance to local governments that wish to develop their own siting rules for wind turbines. While they were developed under...

  20. Localized Helioseismic Constraints on Solar Structure

    E-Print Network [OSTI]

    John N. Bahcall; Sarbani Basu; Pawan Kumar

    1997-06-13T23:59:59.000Z

    Localized differences between the real sun and standard solar models are shown to be small. The sound speeds of the real and the standard model suns typically differ by less than 0.3% in the solar core.

  1. Solar Easements & Local Option Solar Rights Laws

    Broader source: Energy.gov [DOE]

    The New York General City, Town, and Village codes also allow local zoning districts to make regulations regarding solar access that provide for "the accommodation of solar energy systems and...

  2. The Complexity of the Local Hamiltonian Problem

    E-Print Network [OSTI]

    Julia Kempe; Alexei Kitaev; Oded Regev

    2005-10-02T23:59:59.000Z

    The k-local Hamiltonian problem is a natural complete problem for the complexity class QMA, the quantum analog of NP. It is similar in spirit to MAX-k-SAT, which is NP-complete for k<=2. It was known that the problem is QMA-complete for any k <= 3. On the other hand 1-local Hamiltonian is in P, and hence not believed to be QMA-complete. The complexity of the 2-local Hamiltonian problem has long been outstanding. Here we settle the question and show that it is QMA-complete. We provide two independent proofs; our first proof uses only elementary linear algebra. Our second proof uses a powerful technique for analyzing the sum of two Hamiltonians; this technique is based on perturbation theory and we believe that it might prove useful elsewhere. Using our techniques we also show that adiabatic computation with two-local interactions on qubits is equivalent to standard quantum computation.

  3. Fiscal stimulus through state and local governments

    E-Print Network [OSTI]

    Feiveson, Laura (Laura Judith)

    2012-01-01T23:59:59.000Z

    State and local governments in the United States make up more than half of total government consumption and investment and almost 90 percent of total government employment. Despite these facts, the debates surrounding ...

  4. Interferometric hydrofracture microseism localization using neighboring fracture

    E-Print Network [OSTI]

    Poliannikov, Oleg V.

    2011-05-19T23:59:59.000Z

    Hydraulic fracturing is the process of injecting high-pressure fluids into a reservoir to induce fractures and thus improve reservoir productivity. Microseismic event localization is used to locate created fractures. ...

  5. Interferometric hydrofracture microseism localization using neighboring fracture

    E-Print Network [OSTI]

    Poliannikov, Oleg V.

    Hydraulic fracturing is the process of injecting high-pressure fluids into a reservoir to induce fractures and thus improve reservoir productivity. Microseismic event localization is used to locate created fractures. ...

  6. Local Option Municipal Economic Development Act (Nebraska)

    Broader source: Energy.gov [DOE]

    This act gives local governments the option to provide direct and indirect assistance to business enterprises in their communities, whether for expansion of existing operations, the creation of new...

  7. Agenda: State, Local and Tribal Issues

    Broader source: Energy.gov [DOE]

    Many of the primary authorities and governance structures that exist for states, localities and tribes related to electricity infrastructure have been in place for decades. What can be learned from...

  8. Local Solid Waste Disposal Act (Illinois)

    Broader source: Energy.gov [DOE]

    It is the purpose of this Act and the policy of this State to protect the public health and welfare and the quality of the environment by providing local governments with the ability to properly...

  9. Locally-smeared operator product expansions

    SciTech Connect (OSTI)

    Monahan, Christopher; Orginos, Kostantinos

    2014-12-01T23:59:59.000Z

    We propose a "locally-smeared Operator Product Expansion" (sOPE) to decompose non-local operators in terms of a basis of locally-smeared operators. The sOPE formally connects nonperturbative matrix elements of smeared degrees of freedom, determined numerically using the gradient flow, to non-local operators in the continuum. The nonperturbative matrix elements do not suffer from power-divergent mixing on the lattice, provided the smearing scale is kept fixed in the continuum limit. The presence of this smearing scale prevents a simple connection to the standard operator product expansion and therefore requires the construction of a two-scale formalism. We demonstrate the feasibility of our approach using the example of real scalar field theory.

  10. A Library for Locally Weighted Projection Regression 

    E-Print Network [OSTI]

    Klanke, Stefan; Vijayakumar, Sethu; Schaal, Stefan

    2008-01-01T23:59:59.000Z

    In this paper we introduce an improved implementation of locally weighted projection regression (LWPR), a supervised learning algorithm that is capable of handling high-dimensional input data. As the key features, our ...

  11. Cooperative localization for autonomous underwater vehicles

    E-Print Network [OSTI]

    Bahr, Alexander

    2009-01-01T23:59:59.000Z

    Self-localization of an underwater vehicle is particularly challenging due to the absence of Global Positioning System (GPS) reception or features at known positions that could otherwise have been used for position ...

  12. Local Option- County Energy District Authority

    Broader source: Energy.gov [DOE]

    Oklahoma enacted S.B. 102, effective November 2011, to make PACE loans junior and inferior to other liens. This law should allow local governments to adopt PACE programs that are within the accep...

  13. Developmental Plasticity Links Local Adaptation and Evolutionary

    E-Print Network [OSTI]

    Badyaev, Alex

    Developmental Plasticity Links Local Adaptation and Evolutionary Diversification in Foraging, University of Arizona, Tucson, Arizona Developmental plasticity is thought to reconcile the constraining role morphology into adulthood, providing an opportunity to directly examine the links between plasticity of bone

  14. EERE's State & Local Energy Data Tool

    SciTech Connect (OSTI)

    Shambarger, Erick; DeCesaro, Jennifer

    2014-06-23T23:59:59.000Z

    EERE's State and Local Energy Data (SLED) Tool provides basic energy market information that can help state and local governments plan and implement clean energy projects, including electricity generation; fuel sources and costs; applicable policies, regulations, and financial incentives; and renewable energy resource potential. Watch this video to learn more about the tool and hear testimonials from real users about the benefits of using this tool.

  15. EERE's State & Local Energy Data Tool

    ScienceCinema (OSTI)

    Shambarger, Erick; DeCesaro, Jennifer

    2014-06-26T23:59:59.000Z

    EERE's State and Local Energy Data (SLED) Tool provides basic energy market information that can help state and local governments plan and implement clean energy projects, including electricity generation; fuel sources and costs; applicable policies, regulations, and financial incentives; and renewable energy resource potential. Watch this video to learn more about the tool and hear testimonials from real users about the benefits of using this tool.

  16. LIGHTWEIGHT PEOPLE COUNTING AND LOCALIZING IN INDOOR SPACES USING CAMERA SENSOR NODES

    E-Print Network [OSTI]

    Teixeira, Thiago

    a sen- sor network deployed inside a house are processed together with building map information to recognize the activities of the house inhabitants. The locations of people in time and space during more precise information than Passive Infrared Sensors (PIR) but more lightweight and privacy

  17. CUSTODY/OWNERSHIP DICHOTOMIES IN THE U.S. PETROLEUM SUPPLY SYSTEM

    E-Print Network [OSTI]

    Cahn, David F.

    2013-01-01T23:59:59.000Z

    Terminals Bulk Plants Parcel Owners Local Distribution Shipments Subsidiaries, Brokers, Jobbers C1;) N c? 5 Gasoline

  18. Reforming Local Government in Broome County 1 Center for Local Government College of Community & Public Affairs Binghamton University

    E-Print Network [OSTI]

    Suzuki, Masatsugu

    #12;Reforming Local Government in Broome County 1 Center for Local Government ­ College on committee findings and issued recommendations in each area studied. Reforming Local Government in Broome;Reforming Local Government in Broome County 2 Center for Local Government ­ College of Community & Public

  19. Oklahoma Local Development and Enterprise Zone Incentive Leverage Act (Oklahoma)

    Broader source: Energy.gov [DOE]

    The Oklahoma Local Development and Enterprise Zone Incentive Leverage Act provides funding for local units of government to match local tax revenue dedicated to support a project located in an...

  20. Localized edge states and homoclinic snaking in plane Couette flow

    E-Print Network [OSTI]

    Doedel, Eusebius

    -dimension =1) Skufca, Yorke & Eckhardt PRL 2006; Schneider, Eckhardt & Yorke PRL 2007; Schneider et al. PRE channels Schneider, Gibson & Burke, PRL, 2010 Bifurcation diagram: Localized traveling waves Localized-Stokes dynamics Schneider, Gibson & Burke, PRL, 2010 #12;Localized `cousins'

  1. V.3K(1)-Local Homotopy Theory, Iwasawa Theory

    E-Print Network [OSTI]

    V.3K(1)-Local Homotopy Theory, Iwasawa Theory and Algebraic K-Theory Stephen A. Mitchell* 3.3 K(1)-local Homotopy Theory............................................................. 965 -Adic K-Theory ................................................................. 968 K(1)-Localization

  2. Local purity distillation with bounded classical communication

    E-Print Network [OSTI]

    Hari Krovi; Igor Devetak

    2007-05-28T23:59:59.000Z

    Local pure states are an important resource for quantum computing. The problem of distilling local pure states from mixed ones can be cast in an information theoretic paradigm. The bipartite version of this problem where local purity must be distilled from an arbitrary quantum state shared between two parties, Alice and Bob, is closely related to the problem of separating quantum and classical correlations in the state and in particular, to a measure of classical correlations called the one-way distillable common randomness. In Phys. Rev. A 71, 062303 (2005), the optimal rate of local purity distillation is derived when many copies of a bipartite quantum state are shared between Alice and Bob, and the parties are allowed unlimited use of a unidirectional dephasing channel. In the present paper, we extend this result to the setting in which the use of the channel is bounded. We demonstrate that in the case of a classical-quantum system, the expression for the local purity distilled is efficiently computable and provide examples with their tradeoff curves.

  3. Converting online algorithms to local computation algorithms

    E-Print Network [OSTI]

    Mansour, Yishay; Vardi, Shai; Xie, Ning

    2012-01-01T23:59:59.000Z

    We propose a general method for converting online algorithms to local computation algorithms by selecting a random permutation of the input, and simulating running the online algorithm. We bound the number of steps of the algorithm using a query tree, which models the dependencies between queries. We improve previous analyses of query trees on graphs of bounded degree, and extend the analysis to the cases where the degrees are distributed binomially, and to a special case of bipartite graphs. Using this method, we give a local computation algorithm for maximal matching in graphs of bounded degree, which runs in time and space O(log^3 n). We also show how to convert a large family of load balancing algorithms (related to balls and bins problems) to local computation algorithms. This gives several local load balancing algorithms which achieve the same approximation ratios as the online algorithms, but run in O(log n) time and space. Finally, we modify existing local computation algorithms for hypergraph 2-color...

  4. Correlations In n-local Scenario

    E-Print Network [OSTI]

    Kaushiki Mukherjee; Biswajit Paul; Debasis Sarkar

    2015-03-05T23:59:59.000Z

    Recently Bell-type inequalities were introduced in Phys. Rev. A \\textbf{85}, 032119 (2012) to analyze the correlations emerging in an entanglement swapping scenario characterized by independence of the two sources shared between three parties. The corresponding scenario was referred to as \\textit{bilocal} scenario. Here, we derive Bell-type inequalities in $n+1$ party scenario, i.e., in $n$-local scenario. Considering the two different cases with several number of inputs and outputs, we derive local and $n$-local bounds. The $n$-local inequality studied for two cases are proved to be tight. Replacing the sources by maximally entangled states for two binary inputs and two binary outputs and also for the fixed input and four outputs, we observe quantum violations of $n$-local bounds. But the resistance offered to noise cannot be increased as compared to the bilocal scenario. Thus increasing the number of parties in a linear fashion in source independent scenario does not contribute in lowering down the requirements of revealing quantumness in a network in contrast to the star configuration (Phys. Rev. A \\textbf{90}, 062109 (2014)) of $n+1$ parties.

  5. Interactive local search for multiple-criteria scheduling

    E-Print Network [OSTI]

    Li, Shijun

    1998-01-01T23:59:59.000Z

    , then the local search procedure is termed probabilistic (e. g. , simulated annealing). Probabilistic local search aims at avoiding that the search process gets trapped in local optima. The local search solution space can be viewed as a graph G = (V... solution and may be trapped in poor local optima. Second, they require large, though deterministic, computational effort. One very promising way of cutting down computational time is by using parallelism (Verhoeven and Aarts, 1995). Unfortunately, local...

  6. anexiales experiencia local: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mosaics are constructed and used to localize a mobile robot operating in the modeled environment. Straightforward techniques from vision-based localization and mosaicking are used...

  7. adenocarcinomes pancreatiques localement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mosaics are constructed and used to localize a mobile robot operating in the modeled environment. Straightforward techniques from vision-based localization and mosaicking are used...

  8. ampullectomy experiencia local: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mosaics are constructed and used to localize a mobile robot operating in the modeled environment. Straightforward techniques from vision-based localization and mosaicking are used...

  9. Energy Department Awards $5 Million to Spur Local Clean Energy...

    Broader source: Energy.gov (indexed) [DOE]

    5 Million to Spur Local Clean Energy Development, Energy Savings Energy Department Awards 5 Million to Spur Local Clean Energy Development, Energy Savings October 14, 2014 -...

  10. Local Soot Loading Distribution in Cordierite Diesel Particulate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Local Soot Loading Distribution in Cordierite Diesel Particulate Filters by Dynamic Neutron Radiography Local Soot Loading Distribution in Cordierite Diesel Particulate Filters by...

  11. Measuring Up: How to Track and Evaluate Local Sustainability Projects

    Office of Energy Efficiency and Renewable Energy (EERE)

    Join this EPA Local Climate and Energy webinar to learn how to measure and evaluate the results of local climate, energy, and sustainability projects.

  12. U.S. Environmental Protection Agency State and Local Climate...

    Open Energy Info (EERE)

    for clean energy jobs, greenhouse gas accounting protocols, local strategy guides, case studies, Webcasts, Podcasts, building energy efficiency for local governments, and...

  13. Local Energy Alliance Program Adds Green Appraisal Capabilities...

    Energy Savers [EERE]

    Local Energy Alliance Program Adds Green Appraisal Capabilities to its Energy Efficiency Services Local Energy Alliance Program Adds Green Appraisal Capabilities to its Energy...

  14. albicans interactions localization: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from a local polarizability model MIT - DSpace Summary: A local approximation for dynamic polarizability leads to a nonlocal functional for the long-range dispersion...

  15. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send...

    Broader source: Energy.gov (indexed) [DOE]

    Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM:...

  16. Evidence for Localization of Reaction Upon Reduction of Carbon...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Localization of Reaction Upon Reduction of Carbon Tetrachloride by Granular Iron. Evidence for Localization of Reaction Upon Reduction of Carbon Tetrachloride by Granular Iron....

  17. Obama Administration Announces Additional $13,969,700 for Local...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Additional 13,969,700 for Local Energy Efficiency Improvements in Alaska Obama Administration Announces Additional 13,969,700 for Local Energy Efficiency Improvements in Alaska...

  18. Solar Powering Your Community: A Guide for Local Governments...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A Guide for Local Governments (Book), Energy Efficiency & Renewable Energy (EERE) Solar Powering Your Community: A Guide for Local Governments (Book), Energy Efficiency &...

  19. New Energy Department Team Established to Help Local Authorities...

    Energy Savers [EERE]

    to Help Local Authorities Get Gas Stations Impacted by Hurricane Sandy Back Online New Energy Department Team Established to Help Local Authorities Get Gas Stations Impacted by...

  20. Mahowald and Thompson determined the ?-adic ?-localizations of ...

    E-Print Network [OSTI]

    1910-61-20T23:59:59.000Z

    In [21], Mahowald and Thompson determined the ?-adic ?-localizations of the odd spheres at an arbitrary prime ?, expressing these localizations as homotopy

  1. Obama Administration Announces Additional $11,072,300 for Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    13,167,500 for Local Energy Efficiency Improvements in South Dakota Obama Administration Announces Additional 33,977,000 for Local Energy Efficiency Improvements in Puerto Rico...

  2. Obama Administration Announces Additional $33,977,000 for Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3,977,000 for Local Energy Efficiency Improvements in Puerto Rico Obama Administration Announces Additional 33,977,000 for Local Energy Efficiency Improvements in Puerto Rico...

  3. State and Local Code Implementation: South-central Region - 2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2014 BTO Peer Review State and Local Code Implementation: Northeast Region - 2014 BTO Peer Review State and Local Code Implementation: State Energy Officials - 2014 BTO Peer Review...

  4. Cellu-WHAT?-sic: Communicating the Biofuels Message to Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cellu-WHAT?-sic: Communicating the Biofuels Message to Local Stakeholders Cellu-WHAT?-sic: Communicating the Biofuels Message to Local Stakeholders Breakout Session 3D-Building...

  5. Phonon localization drives nanoregions in a relaxor ferroelectric...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    localization drives nanoregions in a relaxor ferroelectric April 11, 2014 This inelastic neutron scattering spectrum shows the localizing modes (LMs) between the transverse optic...

  6. Local Leaders: Respond to Natural Gas Disruptions | Department...

    Office of Environmental Management (EM)

    Natural Gas Disruptions Local Leaders: Respond to Natural Gas Disruptions Local Leaders: Respond to Natural Gas Disruptions Because natural gas is distributed through underground...

  7. U-094: EMC Documentum Content Server Lets Local Administrative...

    Broader source: Energy.gov (indexed) [DOE]

    4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated...

  8. Spotlight on Rutland County, Vermont: How Local Ties Lead to...

    Energy Savers [EERE]

    Rutland County, Vermont: How Local Ties Lead to Local Wins Driving Demand The Better Buildings Neighborhood Program is part of the national Better Buildings Initiative led by the...

  9. The thermodynamics of general and local anesthesia

    E-Print Network [OSTI]

    Graesboll, Kaare; Heimburg, Thomas

    2014-01-01T23:59:59.000Z

    General anesthetics are known to cause depression of the freezing point of transitions in biomembranes. This is a consequence of ideal mixing of the anesthetic drugs in the membrane fluid phase and exclusion from the solid phase. Such a generic law provides physical justification of the famous Meyer-Overton rule. We show here that general anesthetics, barbiturates and local anesthetics all display the same effect on melting transitions. Their effect is reversed by hydrostatic pressure. Thus, the thermodynamic behavior of local anesthetics is very similar to that of general anesthetics. We present a detailed thermodynamic analysis of heat capacity profiles of membranes in the presence of anesthetics. This analysis is able to describe experimentally observed calorimetric profiles and permits prediction of the anesthetic features of arbitrary molecules. In addition, we discuss the thermodynamic origin of the cutoff-effect of long-chain alcohols and the additivity of the effect of general and local anesthetics.

  10. Topology on locally finite metric spaces

    E-Print Network [OSTI]

    Capraro, Valerio

    2011-01-01T23:59:59.000Z

    The necessity of a theory of General Topology and, most of all, of Algebraic Topology on locally finite metric spaces comes from many areas of research in both Applied and Pure Mathematics: Molecular Biology, Mathematical Chemistry, Computer Science, Topological Graph Theory and Metric Geometry. In this paper we propose the basic notions of such a theory and some applications: we replace the classical notions of continuous function, homeomorphism and homotopic equivalence with the notions of NPP-function, NPP-local-isomorphism and NPP-homotopy (NPP stands for Nearest Point Preserving); we also introduce the notion of NPP-isomorphism. We construct three invariants under NPP-isomorphisms and, in particular, we define the fundamental group of a locally finite metric space. As first applications, we propose the following: motivated by the longstanding question whether there is a purely metric condition which extends the notion of amenability of a group to any metric space, we propose the property SN (Small Neighb...

  11. Secure positioning and non-local correlations

    E-Print Network [OSTI]

    Muhammad Nadeem

    2015-03-31T23:59:59.000Z

    Recently, the problem of secure position-verification has been extensively analyzed in a formal notion where distant verifiers send encrypted challenge along with the decryption information to the prover. However, currently it is known that all the existing position-verification scheme are insecure and secure positioning is impossible. We propose here a different notion for position-verification where distant verifiers determine the actions of the prover through non-local correlations generated by local measurements at the provers site. The proposed scheme guarantees secure positioning even if the verifiers do not have any pre-shared data with the prover, position is the only credential of the prover. Our proposed scheme is secure in general and evades known quantum attacks based on instantaneous non-local computations in particular. The scheme enables verifiers to identify dishonest provers with very high probability , where n is the number of entangled pairs used.

  12. An emerging architecture of local experimentalist governance in China : a study of local innovations in Baoding, 1992-2012

    E-Print Network [OSTI]

    Shin, Kyoung Mun

    2014-01-01T23:59:59.000Z

    What are the conditions under which local actors are more likely to carry out policy innovations that produce environmental or social benefits in local China? Previous studies on "Chinese experimentalism" suggest that local ...

  13. Graphene Nanoribbon in Sharply Localized Magnetic Fields

    E-Print Network [OSTI]

    Abdulaziz D. Alhaidari; Hocine Bahlouli; Abderrahim El Mouhafid; Ahmed Jellal

    2013-03-20T23:59:59.000Z

    We study the effect of a sharply localized magnetic field on the electron transport in a strip (ribbon) of graphene sheet, which allows to give results for the transmission and reflection probability through magnetic barriers. The magnetic field is taken as a single and double delta type localized functions, which are treated later as the zero width limit of gaussian fields. For both field configurations, we evaluate analytically and numerically their transmission and reflection coefficients. The possibility of spacial confinement due to the inhomogeneous field configuration is also investigated.

  14. Localized quantum walks as secured quantum memory

    E-Print Network [OSTI]

    C. M. Chandrashekar; Th. Busch

    2015-04-21T23:59:59.000Z

    We show that a quantum walk process can be used to construct and secure quantum memory. More precisely, we show that a localized quantum walk with temporal disorder can be engineered to store the information of a single, unknown qubit on a compact position space and faithfully recover it on demand. Since the localization occurss with a finite spread in position space, the stored information of the qubit will be naturally secured from the simple eavesdropper. Our protocol can be adopted to any quantum system for which experimental control over quantum walk dynamics can be achieved.

  15. Local composition models for lattice mixtures

    SciTech Connect (OSTI)

    Wu, D.W.; Cui, Y.; Donohue, M.D. [Johns Hopkins Univ., Baltimore, MD (United States). Dept. of Chemical Engineering] [Johns Hopkins Univ., Baltimore, MD (United States). Dept. of Chemical Engineering

    1998-08-01T23:59:59.000Z

    A detailed comparison is made of several local-composition lattice models. The models considered include several popular activity coefficient models: the Wilson equation, Guggenheim`s quasi-chemical theory (GQC), the nonrandom two-liquid theory (NRTL), and the universal quasi-chemical (UNIQUAC) theory. Also considered are three recently developed lattice models: the Born-Green-Yvon (BGY) model, the nonrandom surface fraction (NRSF) model, and the Aranovich-Donohue (AD) model. Similarities and differences in the assumptions regarding the local compositions are examined. Detailed comparisons are made for both symmetric and asymmetric monomer mixtures as well as for polymer/solvent mixtures with Monte Carlo simulations.

  16. Building Local Terrain Maps Using SpatioTemporal Classification for Semantic Robot Localization

    E-Print Network [OSTI]

    Zell, Andreas

    of the environment. We describe how to efficiently integrate the classification results of each time stepBuilding Local Terrain Maps Using Spatio­Temporal Classification for Semantic Robot Localization Stefan Laible1 and Andreas Zell1 Abstract-- The correct classification of the surrounding ter- rain

  17. Signal machines : localization of isolated accumulation Signal machines : localization of isolated

    E-Print Network [OSTI]

    Durand-Lose, JĂ©rĂ´me

    Signal machines : localization of isolated accumulation Signal machines : localization of isolated accumulation Jérôme Durand-Lose Laboratoire d'Informatique Fondamentale d'Orléans, Université d of isolated accumulation 1 Signal machines and isolated accumulations 2 Necessary conditions

  18. The Local Data Manager (LDM) The Unidata Local Data Manager (LDM) is a collection of

    E-Print Network [OSTI]

    and educators at no cost. This data consists primarily of GOES satellite imagery, radar imagery (level IIFact Sheet Data The Local Data Manager (LDM) The Unidata Local Data Manager (LDM) is a collection of cooperating programs that select, capture, manage, and distribute arbitrary data products. The system

  19. Atomically localized plasmon enhancement in monolayer graphene

    E-Print Network [OSTI]

    Pennycook, Steve

    Atomically localized plasmon enhancement in monolayer graphene Wu Zhou1,2 *, Jaekwang Lee1,2 , Jagjit Nanda2 , Sokrates T. Pantelides1,2 , Stephen J. Pennycook1,2 and Juan-Carlos Idrobo1,2 * Plasmons plas- mons in very small regions could have applications in optoelec- tronics8,9 , plasmonics10

  20. STAFF REPORT LOCALIZED HEALTH IMPACTS REPORT

    E-Print Network [OSTI]

    Program Under Solicitation PON 11604 Advanced Vehicle Technology Manufacturing CALIFORNIA ENERGY ­ Advanced Vehicle Technology Manufacturing (CEC6002012005) was posted July 25, 2012, and the 30day public a revised NOPA for additional projects proposed for funding under PON11604, and this Localized Health

  1. A Stability Index for Local Effectivity Functions

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Stability Index for Local Effectivity Functions Joseph Abdou October 9, 2009 Abstract We study - France; email: abdou@univ-paris1.fr 1 halshs-00389003,version1-14Oct2009 Author manuscript, published setting (see Abdou and Keiding (2003) for the general notion of effectiv- ity structure), we shall focus

  2. Bosnia and Herzegovina Local Level Institutions

    E-Print Network [OSTI]

    Boyer, Edmond

    Bosnia and Herzegovina Local Level Institutions and Social Capital Study Vol. 1 World Bank, ECSSD World Bank Work on Bosnia-Herzegovina 3 Study's Operational Definition of Social Capital 3 Specific Capital 17 B. Social Cleavages and Population Movements 18 Main Social Cleavages in Bosnia-Herzegovina 18

  3. HYDROGEN LOCAL VIBRATIONAL MODES IN COMPOUND SEMICONDUCTORS

    E-Print Network [OSTI]

    McCluskey, Matthew

    HYDROGEN LOCAL VIBRATIONAL MODES IN COMPOUND SEMICONDUCTORS M.D. MCCLUSKEY* University) spectroscopy of hydrogen and deuterium in GaP, AlSb, ZnSe, and GaN has provided important information about the structures of dopant- hydrogen complexes and their interaction with the host lattice. In GaN:Mg, for example

  4. On local duality invariance in electromagnetism

    E-Print Network [OSTI]

    S. C. Tiwari

    2012-06-18T23:59:59.000Z

    Duality is one of the oldest known symmetries of Maxwell equations. In recent years the significance of duality symmetry has been recognized in superstrings and high energy physics and there has been a renewed interest on the question of local duality rotation invariance. In the present paper we re-visit global duality symmetry in the Maxwell action and delineate the ambiguous role of gauge invariance and time locality. We have recently demonstrated that local duality invariance in a Lorentz covariant form can be carried out in the Maxwell equations. In this paper it is shown that in the four-pseudo vector Lagrangian theory of Sudbery a local duality generalization can be naturally and unambiguously implemented and the Euler-Lagrange equations of motion are consistent with the generalized Maxwell field equations. It is pointed out that the extension of Noether theorem in full generality for a vector action is an important open problem in mathematical physics. Physical consequences of this theory for polarized light and topological insulators are also discussed.

  5. Analysis of Local Experts in Social Media

    E-Print Network [OSTI]

    Venkatesh, Sindhuja

    2014-12-15T23:59:59.000Z

    ,celebs,celebrity,celebrities,celebz food food, foods, foodie, foodies finance finance, finances politics politics, political, politica, politico, politicians, politician Table 3.3: Topics derived from tag names 18 3.2 Localness of Experts In this section, I begin my investigation...

  6. Kampung Capacity Local Solutions for Sustainable

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Kampung Capacity Local Solutions for Sustainable Rural Energy in the Baram River Basin, Sarawak and social opportunities of up to 1.5 billion people worldwide. As a critical case in point, most rural of service provision based on large-scale regional electrification. A range of different renewable energy

  7. Improvements of the local bosonic algorithm

    E-Print Network [OSTI]

    B. Jegerlehner

    1996-12-15T23:59:59.000Z

    We report on several improvements of the local bosonic algorithm proposed by M. Luescher. We find that preconditioning and over-relaxation works very well. A detailed comparison between the bosonic and the Kramers-algorithms shows comparable performance for the physical situation examined.

  8. Differerential Evolution methods based on local searches

    E-Print Network [OSTI]

    2012-12-12T23:59:59.000Z

    Dec 12, 2012 ... Coupling these techniques with DE and local optimization resulted in ... The strategy outlined in Algorithm 1 can be classified as DE/rand/1/bin. We ...... lowest energy structures of Lennard–Jones clusters containing up to 110.

  9. May 21, 2014 Local Agency Traffic

    E-Print Network [OSTI]

    Minnesota, University of

    Field Evaluation Traffic Data Collection Processes Study Is there better EQUIPMENT for collecting low Improvements Field Evaluation Traffic Data Collection Processes Study Is there better EQUIPMENT for collecting;Project Overview 2013-2014Local Agency Data Collection 5 · Tested traffic sensors in a low

  10. Dynamical Localization in the Paul Trap

    E-Print Network [OSTI]

    M. El Ghafar; P. Torma; V. Savichev; E. Mayr; A. Zeiler; W. P. Schleich

    1996-12-18T23:59:59.000Z

    We show that quantum localization occurs in the center-of-mass motion of an ion stored in a Paul trap and interacting with a standing laser field. The present experimental state of the art makes the observation of this phenomenon feasible.

  11. Locality hypothesis and the speed of light

    E-Print Network [OSTI]

    G. Longhi

    2006-10-11T23:59:59.000Z

    The locality hypothesis is generally considered necessary for the study of the kinematics of non-inertial systems in special relativity. In this paper we discuss this hypothesis, showing the necessity of an improvement, in order to get a more clear understanding of the various concepts involved, like coordinate velocity and standard velocity of light. Concrete examples are shown, where these concepts are discussed.

  12. Proton Hexality in Local Grand Unification

    E-Print Network [OSTI]

    Stefan Forste; Hans Peter Nilles; Saul Ramos-Sanchez; Patrick K. S. Vaudrevange

    2010-09-03T23:59:59.000Z

    Proton hexality is a discrete symmetry that avoids the problem of too fast proton decay in the supersymmetric extension of the standard model. Unfortunately it is inconsistent with conventional grand unification. We show that proton hexality can be incorporated in the scheme of "Local Grand Unification" discussed in the framework of model building in (heterotic) string theory.

  13. LOCAL LINEAR PID CONTROLLERS FOR NONLINEAR CONTROL

    E-Print Network [OSTI]

    Slatton, Clint

    1 LOCAL LINEAR PID CONTROLLERS FOR NONLINEAR CONTROL Jing Lan1, Jeongho Cho1, Deniz Erdogmus2, Jos}@cnel.ufl.edu, derdogmus@ieee.org, m.a.motter@larc.nasa.gov Abstract Nonlinear PID design is difficult if one approaches modeling approach with traditional linear PID controller design techniques to arrive at a principled

  14. EPA`s local governments reimbursement program

    SciTech Connect (OSTI)

    Zeller, E.; Ferguson, J. [Environmental Protection Agency, Washington, DC (United States). Emergency Response Division; Catalano, J.; Lally, R. [Booz Allen and Hamilton, Bethesda, MD (United States)

    1994-12-31T23:59:59.000Z

    Under the Superfund Amendments and Reauthorization Act (SARA), section 123 of the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA), Congress enacted the Local Governments Reimbursement (LGR) Program. The program`s goal is to provide financial relief to local governments that conduct emergency measures in response to releases or threats of releases of hazardous substances, pollutants, or contaminants. The intent of this program is to supply reimbursements of up to $25,000 per incident to the most deserving applicants, specifically local governments, for responses that exceed funds normally available for temporary emergency measures. These monies provide greatly needed support when potentially responsible party (PRP) searches and other cost recovery efforts fail. The standards and the approach for this program are set forth in 40 CFR Part 310, and are consistent with the overall policies and goals of the Superfund program. The maximum amount allocated to the reimbursement program is equal to 0.1 percent of the total amount appropriated for the Superfund, or approximately $1.7 million per year. A major focus of this program is to make known the availability of these funds for reimbursement to local governments in need of financial assistance. This paper highlights the features of this program, illustrates the types of incidents that have been awarded reimbursement, and describes common mistakes to be avoided when applying for reimbursement.

  15. EPA`s Local Governments Reimbursement Program

    SciTech Connect (OSTI)

    Zeller, E.; Ferguson, J. [Environmental Protection Agency, Washington, DC (United States). Emergency Response Division; Catalano, J.; Lally, R. [Booz Allen and Hamilton, McLean, VA (United States)

    1995-12-31T23:59:59.000Z

    Under the Superfund Amendments and Reauthorization Act (SARA), section 123 of the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA), Congress enacted the Local Governments Reimbursement (LGR) Program. The program`s goal is to provide financial relief to local governments that conduct emergency measures in response to releases or threats of releases of hazardous substances, pollutants, or contaminants. The intent of this program is to supply reimbursements of up to $25,000 per incident to the most deserving applicants, specifically local governments, for responses that exceed funds normally available for temporary emergency measures. These monies provide greatly needed support when potentially responsible party (PRP) searches and other cost-recovery efforts fail. The standards and the approach for this program are set forth in 40 CFR Part 310, and are consistent with the overall policies and goals of the Superfund program. The maximum amount allocated to the reimbursement program is equal to 0.1 percent of the total amount appropriated for the Superfund, or approximately $1.7 million per year. A major focus of this program is to make known the availability of these funds for reimbursement to local governments in need of financial assistance. This paper highlights the features of this program, illustrates the types of incidents that have been awarded reimbursement, and describes common mistakes to be avoided when applying for reimbursement.

  16. CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT

    E-Print Network [OSTI]

    CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT IN THE SAN FRANCISCO BAY AREA A White Paper from the California Energy Commission's California Climate Change Center JULY 2012 CEC Climate change will affect both sea level and the temporal and spatial distribution of runoff

  17. Rescheduling for Locality in Sparse Matrix Computations

    E-Print Network [OSTI]

    Strout, Michelle Mills

    . The Finite Element Method (FEM) is a numerical technique used in scien- ti#12;c applications such as Stress in order to improve the data locality in scienti#12;c applications such as Finite Element Analysis Analysis, Heat Transfer, and Fluid Flow. In FEM the physical domain being modeled is discretized

  18. Estimating Vehicle Miles Traveled on Local Roads

    E-Print Network [OSTI]

    Qian, Jiayu

    2013-11-07T23:59:59.000Z

    This research presents a new method to estimate the local road vehicle miles traveled (VMT) with the concept of betweenness centrality. Betweenness centrality is a measure of a node’s or link’s centrality on a network that has been applied popularly...

  19. Local gravitational physics of the Hubble expansion

    E-Print Network [OSTI]

    Sergei Kopeikin

    2015-01-21T23:59:59.000Z

    We study physical consequences of the Hubble expansion of FLRW manifold on measurement of space, time and light propagation in the local inertial frame. We analyse the solar system radar ranging and Doppler tracking experiments, and time synchronization. FLRW manifold is covered by global coordinates (t,y^i), where t is the cosmic time coinciding with the proper time of the Hubble observers. We introduce local inertial coordinates x^a=(x^0,x^i) in the vicinity of a world line of a Hubble observer with the help of a special conformal transformation. The local inertial metric is Minkowski flat and is materialized by the congruence of time-like geodesics of static observers being at rest with respect to the local spatial coordinates x^i. We consider geodesic motion of test particles and notice that the local coordinate time x^0=x^0(t) taken as a parameter along the world line of particle, is a function of the Hubble's observer time t. This function changes smoothly from x^0=t for a particle at rest (observer's clock), to x^0=t+1/2 Ht^2 for photons, where H is the Hubble constant. Thus, motion of a test particle is non-uniform when its world line is parametrized by time t. NASA JPL Orbit Determination Program presumes that motion of light (after the Shapiro delay is excluded) is uniform with respect to the time t but it does not comply with the non-uniform motion of light on cosmological manifold. For this reason, the motion of light in the solar system analysed with the Orbit Determination Program appears as having a systematic blue shift of frequency, of radio waves circulating in the Earth-spacecraft radio link. The magnitude of the anomalous blue shift of frequency is proportional to the Hubble constant H that may open an access to the measurement of this fundamental cosmological parameter in the solar system radiowave experiments.

  20. LOCAL FOURIER TRANSFORMS AND RIGIDITY FOR SPENCER BLOCH AND H

    E-Print Network [OSTI]

    Bloch, Spencer

    LOCAL FOURIER TRANSFORMS AND RIGIDITY FOR D-MODULES SPENCER BLOCH AND H #19; EL #18; ENE ESNAULT To Armand Borel, in memoriam Abstract. Local Fourier transforms, analogous to the `-adic local Fourier if a certain in#12;nitesimal rigidity condition is satis#12;ed. As in [12], the argument uses local Fourier

  1. Local rollback for fault-tolerance in parallel computing systems

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Yorktown Heights, NY); Chen, Dong (Yorktown Heights, NY); Gara, Alan (Yorktown Heights, NY); Giampapa, Mark E. (Yorktown Heights, NY); Heidelberger, Philip (Yorktown Heights, NY); Ohmacht, Martin (Yorktown Heights, NY); Steinmacher-Burow, Burkhard (Boeblingen, DE); Sugavanam, Krishnan (Yorktown Heights, NY)

    2012-01-24T23:59:59.000Z

    A control logic device performs a local rollback in a parallel super computing system. The super computing system includes at least one cache memory device. The control logic device determines a local rollback interval. The control logic device runs at least one instruction in the local rollback interval. The control logic device evaluates whether an unrecoverable condition occurs while running the at least one instruction during the local rollback interval. The control logic device checks whether an error occurs during the local rollback. The control logic device restarts the local rollback interval if the error occurs and the unrecoverable condition does not occur during the local rollback interval.

  2. TO: FILE GiR FROM: SUBJECT: I OWNER(S) Past: Current:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3uj: ;;I : T'ncZl' lO--23,TO:3 749

  3. Scuola sullo Sviluppo Locale School on Local Development Universit di Trento University of Trento

    E-Print Network [OSTI]

    . Organi di governo 5. Il Direttivo 6. Il Coordinatore della Scuola 7. Il Collegio dei Docenti 8 locale in un ampio contesto. #12;4 Art. 4 ­ ORGANI DI GOVERNO 1. L'organizzazione e il coordinamento

  4. Localized Surface Plasmons in Vibrating Graphene Nanodisks

    E-Print Network [OSTI]

    Wang, Weihua; Mortensen, N Asger; Christensen, Johan

    2015-01-01T23:59:59.000Z

    Localized surface plasmons are confined collective oscillations of electrons in metallic nanoparticles. When driven by light, the optical response is dictated by geometrical parameters and the dielectric environment and plasmons are therefore extremely important for sensing applications. Plasmons in graphene disks have the additional benefit to be highly tunable via electrical stimulation. Mechanical vibrations create structural deformations in ways where the excitation of localized surface plasmons can be strongly modulated. We show that the spectral shift in such a scenario is determined by a complex interplay between the symmetry and shape of the modal vibrations and the plasmonic mode pattern. Tuning confined modes of light in graphene via acoustic excitations, paves new avenues in shaping the sensitivity of plasmonic detectors, and in the enhancement of the interaction with optical emitters, such as molecules, for future nanophotonic devices.

  5. Spatially localized solutions of shear flows

    E-Print Network [OSTI]

    Gibson, J F

    2013-01-01T23:59:59.000Z

    We present several new spatially localized equilibrium and traveling-wave solutions of plane Couette and channel flows. The solutions exhibit strikingly concentrated regions of vorticity that are flanked on either side by high-speed streaks. For several traveling-wave solutions of channel flow, the concentrated vortex structures are confined to the near-wall region and form particularly isolated and elemental coherent structures in the near-wall region of shear flows. The solutions are constructed by a variety of methods: application of windowing functions to previously known spatially periodic solutions, continuation from plane Couette to channel flow conditions, and from initial guesses obtained from turbulent simulation data. We show how the symmetries of localized solutions derive from the symmetries of their periodic counterparts, analyze the exponential decay of their tails, examine the scale separation and scaling of their streamwise Fourier modes, and show that they develop critical layers for large R...

  6. Tensor gauge field localization in branes

    SciTech Connect (OSTI)

    Tahim, M. O. [Departamento de Fisica, Universidade Federal do Ceara, C.P. 6030, 60455-760 Fortaleza, Ceara (Brazil); Departamento de Ciencias da Natureza, Faculdade de Ciencias, Educacao e Letras do Sertao Central (FECLESC), Universidade Estadual do Ceara, 63900-000 Quixada, Ceara (Brazil); Cruz, W. T. [Departamento de Fisica, Universidade Federal do Ceara, C.P. 6030, 60455-760 Fortaleza, Ceara (Brazil); Centro Federal de Educacao Tecnologica do Ceara (CEFETCE), Unidade Descentralizada de Juazeiro do Norte, 63040-000 Juazeiro do Norte, Ceara (Brazil); Almeida, C. A. S. [Departamento de Fisica, Universidade Federal do Ceara, C.P. 6030, 60455-760 Fortaleza, Ceara (Brazil)

    2009-04-15T23:59:59.000Z

    In this work we study localization of a Kalb-Ramond tensorial gauge field on a membrane described by real scalar fields. The membrane is embedded in an AdS-type five-dimensional bulk space, which mimics a Randall-Sundrum scenario. First, we consider a membrane described by only a single real scalar field. In that scenario we find that there is no localized tensorial zero mode. When we take into account branes described by two real scalar fields with internal structures, we obtain again a nonlocalized zero mode for a Kalb-Ramond tensorial gauge field. After modifying our model of one single scalar field by coupling the dilaton to the Kalb-Ramond field, we find that this result is changed. Furthermore, we analyze Kaluza-Klein massive modes and resonance structures.

  7. State and Local Financial Relations in Texas.

    E-Print Network [OSTI]

    Bradshaw, H. C.

    1942-01-01T23:59:59.000Z

    by the various auditing firms. There are a number of units, however, which have prepared specifications showing exactly what was to be done by any auditor who might be em- ployed. The first State Auditor also prepared specifications for a detailed audit... of the problem. This bulletin outlines the State and local relations growing out of the general laws respecting budgeting, assessing and collecting taxes, account- ing, auditing, public reporting, and the management of debts. In addi- tion, contributions...

  8. Energy localization in two chaotically coupled systems

    E-Print Network [OSTI]

    Johan Gronqvist; Thomas Guhr

    2005-06-08T23:59:59.000Z

    We set up and analyze a random matrix model to study energy localization and its time behavior in two chaotically coupled systems. This investigation is prompted by a recent experimental and theoretical study of Weaver and Lobkis on coupled elastomechanical systems. Our random matrix model properly describes the main features of the findings by Weaver and Lobkis. Due to its general character, our model is also applicable to similar systems in other areas of physics -- for example, to chaotically coupled quantum dots.

  9. Anholonomy and Geometrical Localization in Dynamical Systems

    E-Print Network [OSTI]

    Radha Balakrishnan; Indubala Satija

    2003-03-31T23:59:59.000Z

    We characterize the geometrical and topological aspects of a dynamical system by associating a geometric phase with a phase space trajectory. Using the example of a nonlinear driven damped oscillator, we show that this phase is resilient to fluctuations, responds to all bifurcations in the system, and also finds new geometric transitions. Enriching the phase space description is a novel phenomenon of ``geometrical localization'' which manifests itself as a significant deviation from planar dynamics over a short time interval.

  10. Local semicircle law for random regular graphs

    E-Print Network [OSTI]

    Roland Bauerschmidt; Antti Knowles; Horng-Tzer Yau

    2015-05-26T23:59:59.000Z

    We consider random $d$-regular graphs on $N$ vertices, with degree $d$ at least $(\\log N)^4$. We prove that the Green's function of the adjacency matrix and the Stieltjes transform of its empirical spectral measure are well approximated by Wigner's semicircle law, down to the optimal scale given by the typical eigenvalue spacing (up to a logarithmic correction). Aside from well-known consequences for the local eigenvalue distribution, this result implies the complete delocalization of all eigenvectors.

  11. Local temperature for dynamical black holes

    E-Print Network [OSTI]

    Sean A. Hayward; R. Di Criscienzo; M. Nadalini; L. Vanzo; S. Zerbini

    2008-12-13T23:59:59.000Z

    A local Hawking temperature was recently derived for any future outer trapping horizon in spherical symmetry, using a Hamilton-Jacobi tunneling method, and is given by a dynamical surface gravity as defined geometrically. Descriptions are given of the operational meaning of the temperature, in terms of what observers measure, and its relation to the usual Hawking temperature for static black holes. Implications for the final fate of an evaporating black hole are discussed.

  12. Local asymptotic normality in quantum statistics

    E-Print Network [OSTI]

    Madalin Guta; Anna Jencova

    2007-05-24T23:59:59.000Z

    The theory of local asymptotic normality for quantum statistical experiments is developed in the spirit of the classical result from mathematical statistics due to Le Cam. Roughly speaking, local asymptotic normality means that the family varphi_{\\theta_{0}+ u/\\sqrt{n}}^{n} consisting of joint states of n identically prepared quantum systems approaches in a statistical sense a family of Gaussian state phi_{u} of an algebra of canonical commutation relations. The convergence holds for all "local parameters" u\\in R^{m} such that theta=theta_{0}+ u/sqrt{n} parametrizes a neighborhood of a fixed point theta_{0}\\in Theta\\subset R^{m}. In order to prove the result we define weak and strong convergence of quantum statistical experiments which extend to the asymptotic framework the notion of quantum sufficiency introduces by Petz. Along the way we introduce the concept of canonical state of a statistical experiment, and investigate the relation between the two notions of convergence. For reader's convenience and completeness we review the relevant results of the classical as well as the quantum theory.

  13. Subsystem codes with spatially local generators

    SciTech Connect (OSTI)

    Bravyi, Sergey [IBM T. J. Watson Research Center, Yorktown Heights, New York 10598 (United States)

    2011-01-15T23:59:59.000Z

    We study subsystem codes whose gauge group has local generators in two-dimensional (2D) geometry. It is shown that there exists a family of such codes defined on lattices of size LxL with the number of logical qubits k and the minimum distance d both proportional to L. The gauge group of these codes involves only two-qubit generators of type XX and ZZ coupling nearest-neighbor qubits (and some auxiliary one-qubit generators). Our proof is not constructive as it relies on a certain version of the Gilbert-Varshamov bound for classical codes. Along the way, we introduce and study properties of generalized Bacon-Shor codes that might be of independent interest. Secondly, we prove that any 2D subsystem [n,k,d] code with spatially local generators obeys upper bounds kd=O(n) and d{sup 2}=O(n). The analogous upper bound proved recently for 2D stabilizer codes is kd{sup 2}=O(n). Our results thus demonstrate that subsystem codes can be more powerful than stabilizer codes under the spatial locality constraint.

  14. Subsystem codes with spatially local generators

    E-Print Network [OSTI]

    Sergey Bravyi

    2010-08-05T23:59:59.000Z

    We study subsystem codes whose gauge group has local generators in the 2D geometry. It is shown that there exists a family of such codes defined on lattices of size LxL with the number of logical qubits k and the minimum distance d both proportional to L. The gauge group of these codes involves only two-qubit generators of type XX and ZZ coupling nearest neighbor qubits (and some auxiliary one-qubit generators). Our proof is not constructive as it relies on a certain version of the Gilbert-Varshamov bound for classical codes. Along the way we introduce and study properties of generalized Bacon-Shor codes which might be of independent interest. Secondly, we prove that any 2D subsystem [n,k,d] code with spatially local generators obeys upper bounds kd=O(n) and d^2=O(n). The analogous upper bound proved recently for 2D stabilizer codes is kd^2=O(n). Our results thus demonstrate that subsystem codes can be more powerful than stabilizer codes under the spatial locality constraint.

  15. Local Energy Landscape in a Simple Liquid

    E-Print Network [OSTI]

    Takuya Iwashita; Takeshi Egami

    2014-10-31T23:59:59.000Z

    It is difficult to relate the properties of liquids and glasses directly to their structure because of complexity in the structure which defies precise definition. The potential energy landscape (PEL) approach is a very insightful way to conceptualize the structure-property relationship in liquids and glasses, particularly on the effect of temperature and history. However, because of the highly multi-dimensional nature of the PEL it is hard to determine, or even visualize, the actual details of the energy landscape. In this article we introduce a modified concept of the local energy landscape (LEL) which is limited in phase space, and demonstrate its usefulness using molecular dynamics simulation on a simple liquid at high temperatures. The local energy landscape is given as a function of the local coordination number, the number of the nearest neighbor atoms. The excitations in the LEL corresponds to the so-called beta-relaxation process. The LEL offers a simple but useful starting point to discuss complex phenomena in liquids and glasses.

  16. Local Polarization Dynamics in Ferroelectric Materials

    SciTech Connect (OSTI)

    Kalinin, Sergei V [ORNL; Morozovska, A. N. [National Academy of Science of Ukraine, Kiev, Ukraine; Chen, L. Q. [Pennsylvania State University; Rodriguez, Brian J [ORNL

    2010-01-01T23:59:59.000Z

    Ferroelectrics and multiferroics have recently emerged as perspective materials for information technology and data storage applications. The combination of extremely narrow domain wall width and the capability to manipulate polarization by electric field opens the pathway towards ultrahigh (>10 TBit/in2) storage densities and small (sub-10 nm) feature sizes. The coupling between polarization and chemical and transport properties enables applications in ferroelectric lithography and electroresistive devices. The progress in these applications, as well as fundamental studies of polarization dynamics and the role of defects and disorder on domain nucleation and wall motion, requires the capability to probe these effects on the nanometer scale. In this review, we summarize recent progress in applications of Piezoresponse Force Microscopy (PFM) for imaging, manipulation, and spectroscopy of ferroelectric switching processes. We briefly introduce the principles and relevant instrumental aspects of PFM, with special emphasis on resolution and information limits. The local imaging studies of domain dynamics, including local switching and relaxation accessed through imaging experiments, and spectroscopic studies of polarization switching, are discussed in detail. Finally, we briefly review the recent progress on photochemical processes on ferroelectric surfaces, the role of surface adsorbates, and imaging and switching in liquids. Beyond classical applications, probing local bias-induced transition dynamics by PFM opens the pathway to studies of the influence of a single defect on electrochemical and solid state processes, thus providing model systems for batteries, fuel cells, and supercapacitor applications.

  17. Localized Domains of Disoriented Chiral Condensates

    E-Print Network [OSTI]

    B. K. Nandi; T. K. Nayak; B. Mohanty; D. P. Mahapatra; Y. P. Viyogi

    1999-03-12T23:59:59.000Z

    A new method to search for localized domains of disoriented chiral condensates (DCC) has been proposed by utilising the (eta-phi) phase space distributions of charged particles and photons. Using the discrete wavelet transformation (DWT) analysis technique, it has been found that the presence of DCC domains broadens the distribution of wavelet coefficients in comparison to that of normal events. Strength contours have been derived from the differences in rms deviations of these distributions by taking into account the size of DCC domains and the probability of DCC production in ultra-relativistic heavy ion collisions. This technique can be suitably adopted to experiments measuring multiplicities of charged particles and photons.

  18. Optimal generation of entanglement under local control

    E-Print Network [OSTI]

    Raffaele Romano; Alessio Del Fabbro

    2007-07-11T23:59:59.000Z

    We study the optimal generation of entanglement between two qubits subject to local unitary control. With the only assumptions of linear control and unitary dynamics, by means of a numerical protocol based on the variational approach (Pontryagin's Minimum Principle), we evaluate the optimal control strategy leading to the maximal achievable entanglement in an arbitrary interaction time, taking into account the energy cost associated to the controls. In our model we can arbitrarily choose the relative weight between a large entanglement and a small energy cost.

  19. Fermion localization on a split brane

    SciTech Connect (OSTI)

    Chumbes, A. E. R.; Vasquez, A. E. O.; Hott, M. B. [UNESP Univ Estadual Paulista - Campus de Guaratingueta - DFQ. Av. Dr. Ariberto Pereira Cunha, 333 12516-410 Guaratingueta SP Brasil (Brazil)

    2011-05-15T23:59:59.000Z

    In this work we analyze the localization of fermions on a brane embedded in five-dimensional, warped and nonwarped, space-time. In both cases we use the same nonlinear theoretical model with a nonpolynomial potential featuring a self-interacting scalar field whose minimum energy solution is a soliton (a kink) which can be continuously deformed into a two-kink. Thus a single brane splits into two branes. The behavior of spin 1/2 fermions wave functions on the split brane depends on the coupling of fermions to the scalar field and on the geometry of the space-time.

  20. Statistical density modification using local pattern matching

    SciTech Connect (OSTI)

    Terwilliger, Thomas C., E-mail: terwilliger@lanl.gov [Mail Stop M888, Los Alamos National Laboratory, Los Alamos, NM 87545 (United States)

    2003-10-01T23:59:59.000Z

    Statistical density modification can make use of local patterns of density found in protein structures to improve crystallographic phases. A method for improving crystallographic phases is presented that is based on the preferential occurrence of certain local patterns of electron density in macromolecular electron-density maps. The method focuses on the relationship between the value of electron density at a point in the map and the pattern of density surrounding this point. Patterns of density that can be superimposed by rotation about the central point are considered equivalent. Standard templates are created from experimental or model electron-density maps by clustering and averaging local patterns of electron density. The clustering is based on correlation coefficients after rotation to maximize the correlation. Experimental or model maps are also used to create histograms relating the value of electron density at the central point to the correlation coefficient of the density surrounding this point with each member of the set of standard patterns. These histograms are then used to estimate the electron density at each point in a new experimental electron-density map using the pattern of electron density at points surrounding that point and the correlation coefficient of this density to each of the set of standard templates, again after rotation to maximize the correlation. The method is strengthened by excluding any information from the point in question from both the templates and the local pattern of density in the calculation. A function based on the origin of the Patterson function is used to remove information about the electron density at the point in question from nearby electron density. This allows an estimation of the electron density at each point in a map, using only information from other points in the process. The resulting estimates of electron density are shown to have errors that are nearly independent of the errors in the original map using model data and templates calculated at a resolution of 2.6 Ĺ. Owing to this independence of errors, information from the new map can be combined in a simple fashion with information from the original map to create an improved map. An iterative phase-improvement process using this approach and other applications of the image-reconstruction method are described and applied to experimental data at resolutions ranging from 2.4 to 2.8 Ĺ.