Sample records for random access memory

  1. Paging memory from random access memory to backing storage in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

    2013-05-21T23:59:59.000Z

    Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

  2. HReRAM: A Hybrid Reconfigurable Resistive Random-Access Memory

    E-Print Network [OSTI]

    Liebling, Michael

    and memristive modes, enabling optimization for both endurance and energy consumption. Our simulation results validate that the proposed hybrid system achieves 1.5-7x reduction in energy consumption in comparisonHReRAM: A Hybrid Reconfigurable Resistive Random-Access Memory Miguel Angel Lastras

  3. A random access memory immune to single event upset using a T-Resistor

    DOE Patents [OSTI]

    Ochoa, A. Jr.

    1987-10-28T23:59:59.000Z

    In a random access memory cell, a resistance ''T'' decoupling network in each leg of the cell reduces random errors caused by the interaction of energetic ions with the semiconductor material forming the cell. The cell comprises two parallel legs each containing a series pair of complementary MOS transistors having a common gate connected to the node between the transistors of the opposite leg. The decoupling network in each leg is formed by a series pair of resistors between the transistors together with a third resistor interconnecting the junction between the pair of resistors and the gate of the transistor pair forming the opposite leg of the cell. 4 figs.

  4. Performance improvement of gadolinium oxide resistive random access memory treated by hydrogen plasma immersion ion implantation

    SciTech Connect (OSTI)

    Wang, Jer-Chyi, E-mail: jcwang@mail.cgu.edu.tw; Hsu, Chih-Hsien; Ye, Yu-Ren [Department of Electronic Engineering, Chang Gung University, Kweishan 333, Taoyuan, Taiwan (China); Ai, Chi-Fong; Tsai, Wen-Fa [Institute of Nuclear Energy Research, Atomic Energy Council, Longtan 325, Taoyuan, Taiwan (China)

    2014-03-15T23:59:59.000Z

    Characteristics improvement of gadolinium oxide (Gd{sub x}O{sub y}) resistive random access memories (RRAMs) treated by hydrogen plasma immersion ion implantation (PIII) was investigated. With the hydrogen PIII treatment, the Gd{sub x}O{sub y} RRAMs exhibited low set/reset voltages and a high resistance ratio, which were attributed to the enhanced movement of oxygen ions within the Gd{sub x}O{sub y} films and the increased Schottky barrier height at Pt/Gd{sub x}O{sub y} interface, respectively. The resistive switching mechanism of Gd{sub x}O{sub y} RRAMs was dominated by Schottky emission, as proved by the area dependence of the resistance in the low resistance state. After the hydrogen PIII treatment, a retention time of more than 10{sup 4}?s was achieved at an elevated measurement temperature. In addition, a stable cycling endurance with the resistance ratio of more than three orders of magnitude of the Gd{sub x}O{sub y} RRAMs can be obtained.

  5. Perpendicular spin transfer torque magnetic random access memories with high spin torque efficiency and thermal stability for embedded applications (invited)

    SciTech Connect (OSTI)

    Thomas, Luc, E-mail: luc.thomas@headway.com; Jan, Guenole; Zhu, Jian; Liu, Huanlong; Lee, Yuan-Jen; Le, Son; Tong, Ru-Ying; Pi, Keyu; Wang, Yu-Jen; Shen, Dongna; He, Renren; Haq, Jesmin; Teng, Jeffrey; Lam, Vinh; Huang, Kenlin; Zhong, Tom; Torng, Terry; Wang, Po-Kang [TDK-Headway Technologies, Inc., Milpitas, California 95035 (United States)

    2014-05-07T23:59:59.000Z

    Magnetic random access memories based on the spin transfer torque phenomenon (STT-MRAMs) have become one of the leading candidates for next generation memory applications. Among the many attractive features of this technology are its potential for high speed and endurance, read signal margin, low power consumption, scalability, and non-volatility. In this paper, we discuss our recent results on perpendicular STT-MRAM stack designs that show STT efficiency higher than 5?k{sub B}T/?A, energy barriers higher than 100?k{sub B}T at room temperature for sub-40?nm diameter devices, and tunnel magnetoresistance higher than 150%. We use both single device data and results from 8?Mb array to demonstrate data retention sufficient for automotive applications. Moreover, we also demonstrate for the first time thermal stability up to 400?°C exceeding the requirement of Si CMOS back-end processing, thus opening the realm of non-volatile embedded memory to STT-MRAM technology.

  6. CMOS Interface Circuits for Spin Tunneling Junction Based Magnetic Random Access Memories

    SciTech Connect (OSTI)

    Ganesh Saripalli

    2002-12-31T23:59:59.000Z

    Magneto resistive memories (MRAM) are non-volatile memories which use magnetic instead of electrical structures to store data. These memories, apart from being non-volatile, offer a possibility to achieve densities better than DRAMs and speeds faster than SRAMs. MRAMs could potentially replace all computer memory RAM technologies in use today, leading to future applications like instan-on computers and longer battery life for pervasive devices. Such rapid development was made possible due to the recent discovery of large magnetoresistance in Spin tunneling junction devices. Spin tunneling junctions (STJ) are composite structures consisting of a thin insulating layer sandwiched between two magnetic layers. This thesis research is targeted towards these spin tunneling junction based Magnetic memories. In any memory, some kind of an interface circuit is needed to read the logic states. In this thesis, four such circuits are proposed and designed for Magnetic memories (MRAM). These circuits interface to the Spin tunneling junctions and act as sense amplifiers to read their magnetic states. The physical structure and functional characteristics of these circuits are discussed in this thesis. Mismatch effects on the circuits and proper design techniques are also presented. To demonstrate the functionality of these interface structures, test circuits were designed and fabricated in TSMC 0.35{micro} CMOS process. Also circuits to characterize the process mismatches were fabricated and tested. These results were then used in Matlab programs to aid in design process and to predict interface circuit's yields.

  7. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  8. Evaluation of the colossal electroresistance (CER) effect and its application in the non-volatile Resistive Random Access Memory (RRAM)

    E-Print Network [OSTI]

    Wicaksono, Aulia Tegar

    2009-01-01T23:59:59.000Z

    Flash memory, the current leading technology for non-volatile memory (NVM), is projected by many to run obsolete in the face of future miniaturization trend in the semiconductor devices due to some of its technical ...

  9. Low leakage Ru-strontium titanate-Ru metal-insulator-metal capacitors for sub-20?nm technology node in dynamic random access memory

    SciTech Connect (OSTI)

    Popovici, M., E-mail: Mihaela.Ioana.Popovici@imec.be; Swerts, J.; Redolfi, A.; Kaczer, B.; Aoulaiche, M.; Radu, I.; Clima, S.; Everaert, J.-L.; Van Elshocht, S.; Jurczak, M. [Imec, Leuven 3001 (Belgium)

    2014-02-24T23:59:59.000Z

    Improved metal-insulator-metal capacitor (MIMCAP) stacks with strontium titanate (STO) as dielectric sandwiched between Ru as top and bottom electrode are shown. The Ru/STO/Ru stack demonstrates clearly its potential to reach sub-20?nm technology nodes for dynamic random access memory. Downscaling of the equivalent oxide thickness, leakage current density (J{sub g}) of the MIMCAPs, and physical thickness of the STO have been realized by control of the Sr/Ti ratio and grain size using a heterogeneous TiO{sub 2}/STO based nanolaminate stack deposition and a two-step crystallization anneal. Replacement of TiN with Ru as both top and bottom electrodes reduces the amount of electrically active defects and is essential to achieve a low leakage current in the MIM capacitor.

  10. Random access wireless networks with controlled mobility

    E-Print Network [OSTI]

    Modiano, Eytan H.

    This paper considers wireless networks where messages arriving randomly (in time and space) are collected by a mobile receiver. The messages are transmitted to the mobile receiver according to a random access scheme and ...

  11. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  12. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  13. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    DOE Patents [OSTI]

    Ohmacht, Martin

    2014-09-09T23:59:59.000Z

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  14. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-07-27T23:59:59.000Z

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  15. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02T23:59:59.000Z

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  16. Instruction sets for Parallel Random Access Machines

    SciTech Connect (OSTI)

    Trahan, J.L.

    1988-01-01T23:59:59.000Z

    The computational powers of time-bounded Parallel Random Access Machines (PRAMs) with different instruction sets are compared. A basic PRAM can perform the following operations in unit-time: addition, subtraction, Boolean operations, comparisons, and indirect addressing. Multiple processors may concurrently read and concurrently write a single cell. This thesis establishes that the class of languages accepted in polynomial time on a PRAM(*, {up arrow}, {down arrow}) contains the class of languages accepted in exponential time on a nondeterministic Turing machine (NEXPTIME) and is contained in the class of languages accepted in exponential space on a Turing machine. Efficient simulations are presented of PRAMs with enhanced instruction sets by sequential RAMs with the same instruction sets; also simulations of probabilistic PRAMs by deterministic PRAMs, using parallelism to replace randomness. Also given are simulations of PRAM(op)s by PRAMs, where both the simulated machine and the simulating machine are exclusive-read, exclusive-write machines.

  17. On admissible memory kernels for random unitary qubit evolution

    E-Print Network [OSTI]

    Filip A. Wudarski; Pawe? Nale?yty; Gniewomir Sarbicki; Dariusz Chru?ci?ski

    2015-04-12T23:59:59.000Z

    We analyze random unitary evolution of the qubit within memory kernel approach. We provide su?cient conditions which guarantee that the corresponding memory kernel generates physically legitimate quantum evolution. Interestingly, we are able to recover several well known examples and generate new classes of nontrivial qubit evolution. Surprisingly, it turns out that quantum evolution with memory kernel generated by our approach gives rise to vanishing non-Markovianity measure based on the distinguishability of quantum states.

  18. Direct access inter-process shared memory

    DOE Patents [OSTI]

    Brightwell, Ronald B; Pedretti, Kevin; Hudson, Trammell B

    2013-10-22T23:59:59.000Z

    A technique for directly sharing physical memory between processes executing on processor cores is described. The technique includes loading a plurality of processes into the physical memory for execution on a corresponding plurality of processor cores sharing the physical memory. An address space is mapped to each of the processes by populating a first entry in a top level virtual address table for each of the processes. The address space of each of the processes is cross-mapped into each of the processes by populating one or more subsequent entries of the top level virtual address table with the first entry in the top level virtual address table from other processes.

  19. Distributed Random Access Algorithm: Scheduling and Congesion Control

    E-Print Network [OSTI]

    Jiang, Libin

    This paper provides proofs of the rate stability, Harris recurrence, and ?-optimality of carrier sense multiple access (CSMA) algorithms where the random access (or backoff) parameter of each node is adjusted dynamically. ...

  20. Dynamic Optimal Random Access for Vehicle-to-Roadside Communications

    E-Print Network [OSTI]

    Huang, Jianwei

    significant momentum in recent years, especially after the Federal Communications Commission (FCCDynamic Optimal Random Access for Vehicle-to-Roadside Communications Man Hon Cheung, Fen Hou access, efficient resource allocation schemes are required to fully utilize the limited communication

  1. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A; Mamidala, Amith R

    2014-02-11T23:59:59.000Z

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  2. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A.; Mamidala, Amith R.

    2013-09-03T23:59:59.000Z

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  3. Instruction sets for Parallel Random Access Machines. Doctoral thesis

    SciTech Connect (OSTI)

    Trahan, J.L.

    1988-08-01T23:59:59.000Z

    An important model of parallel computation is the Parallel Random Access Machine (PRAM), which comprises multiple processors that execute instructions synchronously and share a common memory. Formalized by Fortune and Wyllie (1978) and Goldschlager (1982), the PRAM is a much more natural model of parallel computation than older models such as combinational circuits and alternating Turing machines (Ruzzo, 1981) because the PRAM abstracts the salient features of a modern multiprocessor computer. Eventually an algorithm developed for the PRAM can be implemented on a parallel network computer such as a mesh-connected array computer (Thompson and Kung, 1977), a hypercube machine (Seitz, 1985), a cube-connected cycles machine (Preparata and Vuillemin, 1981) or a bounded degree processor network (Alt et al., 1987); on all network computers the routing of data complicates the implementation of algorithms. The PRAM provides the foundation for the design of highly parallel algorithms (Luby, 1986; Miller and Reif, 1985; among many others). This model permits the exposure of the intrinsic parallelism in a computational problem because it simplifies the communication of data through a shared memory. To quantify differences in computational performance, the time complexities of simulations between PRAMS with different instruction sets are determined. Focus is on the computational complexity of simulations between PRAMs with the following operations: multiplication, division, arbitrary left shift, arbitrary right shift, and probabilistic choice.

  4. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

    2011-02-15T23:59:59.000Z

    DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

  5. Random Access Compressed Sensing over Fading and Noisy Communication Channels

    E-Print Network [OSTI]

    Stojanovic, Milica

    of the climate change. Such applications require the least control and intervention as well as minimum energy1 Random Access Compressed Sensing over Fading and Noisy Communication Channels Fatemeh Fazel on integrating random sensing with the communication architecture, and achieves overall efficiency in terms

  6. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2014-03-18T23:59:59.000Z

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  7. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A.; Miller, Douglas R.

    2013-01-01T23:59:59.000Z

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  8. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2012-10-23T23:59:59.000Z

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  9. Single-word multiple-bit upsets in static random access devices

    SciTech Connect (OSTI)

    Koga, R.; Pinkerton, S.D.; Lie, T.J.; Crawford, K.B. (Aerospace Corp., Los Angeles, CA (United States))

    1993-12-01T23:59:59.000Z

    Energetic ions and protons can cause single event upsets (SEUs) in static random access memory (SRAM) cells. In some cases multiple bits may be upset as the result of a single event. Space-borne electronics systems incorporating high-density SRAM are vulnerable to single-word multiple-bit upsets (SMUs). The authors review here recent observations of SMU, present the results of a systematic investigation of the physical cell arrangements employed in several currently available SRAM device types, and discuss implications for the occurrence and mitigation of SMU.

  10. Efficient Memory Access with NumPy Global Arrays using Local Memory Access

    SciTech Connect (OSTI)

    Daily, Jeffrey A.; Berghofer, Dan C.

    2013-08-03T23:59:59.000Z

    This paper discusses the work completed working with Global Arrays of data on distributed multi-computer systems and improving their performance. The tasks completed were done at Pacific Northwest National Laboratory in the Science Undergrad Laboratory Internship program in the summer of 2013 for the Data Intensive Computing Group in the Fundamental and Computational Sciences DIrectorate. This work was done on the Global Arrays Toolkit developed by this group. This toolkit is an interface for programmers to more easily create arrays of data on networks of computers. This is useful because scientific computation is often done on large amounts of data sometimes so large that individual computers cannot hold all of it. This data is held in array form and can best be processed on supercomputers which often consist of a network of individual computers doing their computation in parallel. One major challenge for this sort of programming is that operations on arrays on multiple computers is very complex and an interface is needed so that these arrays seem like they are on a single computer. This is what global arrays does. The work done here is to use more efficient operations on that data that requires less copying of data to be completed. This saves a lot of time because copying data on many different computers is time intensive. The way this challenge was solved is when data to be operated on with binary operations are on the same computer, they are not copied when they are accessed. When they are on separate computers, only one set is copied when accessed. This saves time because of less copying done although more data access operations were done.

  11. Improving Data Locality Using Dynamic Page Migration based on Memory Access Histograms

    E-Print Network [OSTI]

    Stamatakis, Alexandros

    Improving Data Locality Using Dynamic Page Migration based on Memory Access Histograms Jie Tao user­level page migration. It uses memory access histograms gathered by hardware monitors to make applications show the potential for a significant gain in speedup. In addition, a graphical user inter­ face

  12. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    DOE Patents [OSTI]

    Gala, Alan; Ohmacht, Martin

    2014-09-02T23:59:59.000Z

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  13. Materials Selection for Oxide-based Resistive Random Access Memories

    E-Print Network [OSTI]

    Guo, Yuzheng; Robertson, John

    2014-12-05T23:59:59.000Z

    , work function of the parent metal. eV Hbulk Hvac (O- poor limit) E(0/2+) ?Emig Hfrenk Parent metal work function HfO2 -5.9 0.2 -4.2 0.7 8.0 3.9 TiO2 -4.8 0.5 -4.3 0.7 6.1 4.3 Ta2O5 -4.3 0.1 -5.0 0.3 – 1.0 4.0 4.25 Al2O3 -6.8 1.5 -5.8 1.7 12...

  14. Dynamic Random Access Memory: A Survey Tulika Mitra

    E-Print Network [OSTI]

    Mitra, Tulika

    for graphics. The goal of this report is to provide a comprehensive survey of DRAM operations and the recent­ prehensive survey of DRAM operations, technology and architectures. Most of the surveys on DRAM [Bur97, Jon92 a comprehensive survey of DRAM operations, and various new DRAM architectures from a computer system designer

  15. Directoryless shared memory architecture using thread migration and remote access

    E-Print Network [OSTI]

    Shim, Keun Sup

    2014-01-01T23:59:59.000Z

    Chip multiprocessors (CMPs) have become mainstream in recent years, and, for scalability reasons, high-core-count designs tend towards tiled CMPs with physically distributed caches. In order to support shared memory, current ...

  16. access memory devices: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Information Sciences Websites Summary: magnetic disks, such as lower access latency, lower power consumption, lack of noise, and shock resistance of traditional...

  17. Directoryless Shared Memory Architecture using Thread Migration and Remote Access

    E-Print Network [OSTI]

    Gifford, David K.

    , Mieszko Lis, Omer Khan and Srinivas Devadas Massachusetts Institute of Technology, Cambridge, MA: the data must be brought to the core where the thread is running, incurring delays and energy costs, a database request might result in a series of phases, each consisting of many accesses to contiguous

  18. Circuit design for embedded memory in low-power integrated circuits

    E-Print Network [OSTI]

    Qazi, Masood

    2012-01-01T23:59:59.000Z

    This thesis explores the challenges for integrating embedded static random access memory (SRAM) and non-volatile memory-based on ferroelectric capacitor technology-into lowpower integrated circuits. First considered is the ...

  19. Analyzing the Energy and Power Consumption of Remote Memory Accesses in the OpenSHMEM Model

    SciTech Connect (OSTI)

    Jana, Siddhartha [University of Houston, Houston] [University of Houston, Houston; Hernandez, Oscar R [ORNL] [ORNL; Poole, Stephen W [ORNL] [ORNL; Hsu, Chung-Hsing [ORNL] [ORNL; Chapman, Barbara [University of Houston, Houston] [University of Houston, Houston

    2014-01-01T23:59:59.000Z

    PGAS models like OpenSHMEM provide interfaces to explicitly initiate one-sided remote memory accesses among processes. In addition, the model also provides synchronizing barriers to ensure a consistent view of the distributed memory at different phases of an application. The incorrect use of such interfaces affects the scalability achievable while using a parallel programming model. This study aims at understanding the effects of these constructs on the energy and power consumption behavior of OpenSHMEM applications. Our experiments show that cost incurred in terms of the total energy and power consumed depends on multiple factors across the software and hardware stack. We conclude that there is a significant impact on the power consumed by the CPU and DRAM due to multiple factors including the design of the data transfer patterns within an application, the design of the communication protocols within a middleware, the architectural constraints laid by the interconnect solutions, and also the levels of memory hierarchy within a compute node. This work motivates treating energy and power consumption as important factors while designing compute solutions for current and future distributed systems.

  20. Dynamic Conjectures in Random Access Networks Using Bio-inspired Learning

    E-Print Network [OSTI]

    Su, Yi

    2009-01-01T23:59:59.000Z

    This paper considers a conjecture-based distributed learning approach that enables autonomous nodes to independently optimize their transmission probabilities in random access networks. We model the interaction among multiple self-interested nodes as a game. It is well-known that the Nash equilibria in this game result in zero throughput for all the nodes if they take myopic best-response, thereby leading to a network collapse. This paper enables nodes to behave as intelligent entities which can proactively gather information, form internal conjectures on how their competitors would react to their actions, and update their beliefs according to their local observations. In this way, nodes are capable to autonomously "learn" the behavior of their competitors, optimize their own actions, and eventually cultivate reciprocity in the random access network. To characterize the steady-state outcome, the conjectural equilibrium is introduced. Inspired by the biological phenomena of "derivative action" and "gradient dy...

  1. Appeared in Proceedings of First International ACM/IEEE Symposium on Code Generation and Optimization, 2003 Optimizing Memory Accesses For Spatial Computation

    E-Print Network [OSTI]

    Budiu, Mihai

    many efficient and powerful optimizations it cannot be easily applied in the presence of pointers and Optimization, 2003 Optimizing Memory Accesses For Spatial Computation Mihai Budiu and Seth C. Goldstein present the internal representation and optimizations used by the CASH compiler for improving the memory

  2. Dynamic Modeling and Analysis for Design of Memristive and Static Random Access Memories

    E-Print Network [OSTI]

    Ho, Yenpo

    2014-08-27T23:59:59.000Z

    and giving me helpful suggestions. In addition, I would like to thank Dr. José Silva-Martínez and Dr. Guergana Petrova for serving on my committee. Thanks also go to my friends: Wenzong Wang, Hangtian Lei, Tian Lan, Li-Wei Tseng, Saeed Samadi, Ting... ........................... 7 2.1. The Memristor Theory Background ........................................................... 7 2.2. The Memristor Device Models .................................................................. 8 CHAPTER III DYNAMIC BEHAVIOR...

  3. Memory abstractions for parallel programming

    E-Print Network [OSTI]

    Lee, I-Ting Angelina

    2012-01-01T23:59:59.000Z

    A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly ...

  4. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

    2007-09-25T23:59:59.000Z

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  5. Performance evaluation of NUMA and COMA distributed shared-memory multiprocessors

    E-Print Network [OSTI]

    Holzrichter, Michael Warren

    1995-01-01T23:59:59.000Z

    Memory architecture is an important component in a distributed shared-memory parallel computer. This thesis studies three shared-memory architectures-Non-Uniform Memory Access (NUMA) with full-mapped directories, Cache-Only Memory Architecture (COMA...

  6. E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing

    E-Print Network [OSTI]

    Scott, Michael L.

    E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing Nikolaos Hardavellas@cs.rochester.edu Abstract Memory-mapped network interfaces provide users with fast and cheap access to remote memory access capabilities of these networks suggest the need to re-evaluate the assumptions underlying

  7. Ferroelectric tunneling element and memory applications which utilize the tunneling element

    DOE Patents [OSTI]

    Kalinin, Sergei V. (Knoxville, TN) [Knoxville, TN; Christen, Hans M. (Knoxville, TN) [Knoxville, TN; Baddorf, Arthur P. (Knoxville, TN) [Knoxville, TN; Meunier, Vincent (Knoxville, TN) [Knoxville, TN; Lee, Ho Nyung (Oak Ridge, TN) [Oak Ridge, TN

    2010-07-20T23:59:59.000Z

    A tunneling element includes a thin film layer of ferroelectric material and a pair of dissimilar electrically-conductive layers disposed on opposite sides of the ferroelectric layer. Because of the dissimilarity in composition or construction between the electrically-conductive layers, the electron transport behavior of the electrically-conductive layers is polarization dependent when the tunneling element is below the Curie temperature of the layer of ferroelectric material. The element can be used as a basis of compact 1R type non-volatile random access memory (RAM). The advantages include extremely simple architecture, ultimate scalability and fast access times generic for all ferroelectric memories.

  8. PHYSICAL REVIEW B 83, 134205 (2011) Atomic structure and electronic properties of the SixSb100-x phase-change memory material

    E-Print Network [OSTI]

    Svane, Axel Torstein

    2011-01-01T23:59:59.000Z

    .134205 PACS number(s): 64.70.dg, 61.20.Gy, 71.15.Mb, 71.15.Pd I. INTRODUCTION Most phase-change random access into the heating electrode (write or rewrite steps) that may result in degradation of the memory device. Further

  9. The Leadership Cluster Memorial Union

    E-Print Network [OSTI]

    Escher, Christine

    The Leadership Cluster Memorial Union Student Leadership and Involvement Student Media Something New @ OSU #12;Access Diversity "Leadership/Citizenship" Community Connection Health & Wellness Housing & Dining Administrative Leadership #12;Student Leadership & Involvement SLI-Activities Program Club

  10. Web Accessibility Accessibility

    E-Print Network [OSTI]

    Oklahoma, University of

    Web Accessibility #12;Accessibility Webaim This is a pre-y prolific site that vary based on the type of web content. StaFc, content managed and dynamic web sites can benefit from our accessibility review service. Rich media

  11. Enhancing Compiler Techniques for Memory Energy Optimizations

    E-Print Network [OSTI]

    Kuzmanovic, Aleksandar

    in the total energy consumption equation. 1 Introduction As the market for embedded systems continues to grow for Memory Energy Optimizations 365 tend to increase code size. This increased code size is an important. An increase in instruction memory size, in turn, increases both per access dynamic energy consumption and leak

  12. Property Testing is the study of super-fast (randomized) algorithms for approx-imate decision making. These algorithms are given direct access to items of a

    E-Print Network [OSTI]

    Goldreich, Oded

    in the Institute for Computer Science (ITCS) at Tsinghua University (Beijing). The mini-workshop brought together every #15; > 0), it holds that Pr[T f (n; #15;)=1] #21; 2=3. #12; VI 2. Given #15; > 0 and oracle access f is #15;-far from #5;n if, for every g 2 #5;n , it holds that jfe 2 Dn : f(e) 6= g(e)gj > #15; #1

  13. System and method for programmable bank selection for banked memory subsystems

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Hoenicke, Dirk (Seebruck-Seeon, DE); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Sugavanam, Krishnan (Mahopac, NY)

    2010-09-07T23:59:59.000Z

    A programmable memory system and method for enabling one or more processor devices access to shared memory in a computing environment, the shared memory including one or more memory storage structures having addressable locations for storing data. The system comprises: one or more first logic devices associated with a respective one or more processor devices, each first logic device for receiving physical memory address signals and programmable for generating a respective memory storage structure select signal upon receipt of pre-determined address bit values at selected physical memory address bit locations; and, a second logic device responsive to each of the respective select signal for generating an address signal used for selecting a memory storage structure for processor access. The system thus enables each processor device of a computing environment memory storage access distributed across the one or more memory storage structures.

  14. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN), Blocksome; Michael A. (Rochester, MN), Parker; Jeffrey J. (Rochester, MN)

    2011-02-15T23:59:59.000Z

    Methods, systems, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA on an origin node in an origin injection FIFO, a data descriptor for an application message; inserting, by the origin DMA, a reflection descriptor in the origin injection FIFO, the reflection descriptor specifying a remote get operation for injecting a completion notification descriptor in a reflection injection FIFO on a reflection node; transferring, by the origin DMA to a target node, the message in dependence upon the data descriptor; in response to completing the message transfer, transferring, by the origin DMA to the reflection node, the completion notification descriptor in dependence upon the reflection descriptor; receiving, by the origin DMA from the reflection node, a completion packet; and notifying, by the origin DMA in response to receiving the completion packet, the origin node's processing core that the message transfer is complete.

  15. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

    2010-08-17T23:59:59.000Z

    Methods, apparatus, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA engine on an origin compute node in an injection FIFO buffer, a data descriptor for an application message to be transferred to a target compute node on behalf of an application on the origin compute node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying an address of a completion notification field in application storage for the application; transferring, by the origin DMA engine to the target compute node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that the transfer of the message is complete, including performing a local direct put operation to store predesignated notification data at the address of the completion notification field.

  16. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target...

  17. Flexible and Transparent Memory

    E-Print Network [OSTI]

    KIM, SUNG MIN

    2012-01-01T23:59:59.000Z

    H. Seo and K. L. Wang. , “Flexible and Transparent Memory”2] S. Kim and J. Lee “Flexible Organic Transistor MemoryMemory Transistors for Flexible Sensor Arrays” Science, Vol.

  18. architectural accessibility: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Decoupled Access DRAM Architecture CiteSeer Summary: This paper discusses an approach to reducing memory latency in...

  19. Optical memory

    DOE Patents [OSTI]

    Mao, Samuel S; Zhang, Yanfeng

    2013-07-02T23:59:59.000Z

    Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

  20. Simulation of thermal reset transitions in resistive switching memories including quantum effects

    SciTech Connect (OSTI)

    Villena, M. A.; Jiménez-Molinos, F.; Roldán, J. B. [Departamento de Electrónica y Tecnología de Computadores, Universidad de Granada, Facultad de Ciencias, Avd. Fuentenueva s/n, 18071 Granada (Spain); González, M. B.; Campabadal, F. [Institut de Microelectrònica de Barcelona, IMB-CNM (CSIC), Campus UAB, 08193 Bellaterra (Spain); Suñé, J.; Miranda, E. [Departament d'Enginyeria Electrònica, Universitat Autònoma de Barcelona, Bellaterra Cerdanyola del Vallès 08193 (Spain); Romera, E. [Departamento de Física Atómica, Molecular y Nuclear and Instituto Carlos I de Física Teórica y Computacional, Universidad de Granada, Avd. Fuentenueva s/n, 18071 Granada (Spain)

    2014-06-07T23:59:59.000Z

    An in-depth study of reset processes in RRAMs (Resistive Random Access Memories) based on Ni/HfO{sub 2}/Si-n{sup +} structures has been performed. To do so, we have developed a physically based simulator where both ohmic and tunneling based conduction regimes are considered along with the thermal description of the devices. The devices under study have been successfully fabricated and measured. The experimental data are correctly reproduced with the simulator for devices with a single conductive filament as well as for devices including several conductive filaments. The contribution of each conduction regime has been explained as well as the operation regimes where these ohmic and tunneling conduction processes dominate.

  1. Circular polarization memory in polydisperse scattering media

    E-Print Network [OSTI]

    Macdonald, Callum M; Meglinski, Igor

    2015-01-01T23:59:59.000Z

    We investigate the survival of circularly polarized light in random scattering media. The surprising persistence of this form of polarization has a known dependence on the size and refractive index of scattering particles, however a general description regarding polydisperse media is lacking. Through analysis of Mie theory, we present a means of calculating the magnitude of circular polarization memory in complex media, with total generality in the distribution of particle sizes and refractive indices. Quantification of this memory effect enables an alternate pathway towards recovering particle size distribution, based on measurements of diffusing circularly polarized light.

  2. Edison memory upgrade

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Edison memory upgraded during the maintenance in Jan 13-16, 2015 Edison memory upgraded during the maintenance in Jan 13-16, 2015 January 16, 2015 (0 Comments) Edison compute node...

  3. Drifting absence :: drafting memory

    E-Print Network [OSTI]

    Kuhn, Marlene Eva

    2006-01-01T23:59:59.000Z

    The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

  4. Using DMA for copying performance counter data to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W

    2013-12-31T23:59:59.000Z

    A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance data.

  5. Randomized metarounding

    SciTech Connect (OSTI)

    CARR,ROBERT D.; VEMPALA,SANTOSH

    2000-01-25T23:59:59.000Z

    The authors present a new technique for the design of approximation algorithms that can be viewed as a generalization of randomized rounding. They derive new or improved approximation guarantees for a class of generalized congestion problems such as multicast congestion, multiple TSP etc. Their main mathematical tool is a structural decomposition theorem related to the integrality gap of a relaxation.

  6. Remote File Access 2010

    E-Print Network [OSTI]

    University of Technology, Sydney

    Remote File Access 2010 Mac Users Guide #12;Remote File Access: MAC Users Guide 2010 2 Table Remote File Access 11 Part IV: Using Remote File Access 15 Part V: FAQ 24 #12;Remote File Access: MAC Users Guide 2010 3 1. What is Remote File Access? UTS Remote File Access service is provided to enable

  7. Accessing PDSF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean WaterAccessing HPSS

  8. Open Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTest and Evaluation |quasicrystals65 (9/12) Page 1 of

  9. Memorial Self-Service A Step-by-Step Guide for

    E-Print Network [OSTI]

    Oyet, Alwell

    on Memorial Self-Service. Step 2: Enter your "User ID" and "PIN" and click Login. First time user. Forgot your PIN? Enter in your User ID and click the Forgot PIN? Button. Follow the steps to reset your PIN. #12;"How do I access Memorial Self-Service?" Step 3: After successfully entering your temporary

  10. Cache directory look-up re-use as conflict check mechanism for speculative memory requests

    DOE Patents [OSTI]

    Ohmacht, Martin

    2013-09-10T23:59:59.000Z

    In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

  11. OPEN ACCESS

    E-Print Network [OSTI]

    Thomas F. Kresina; Robert Lubran

    Abstract: Providing access to and utilization of medication assisted treatment (MAT) for the treatment of opioid abuse and dependence provides an important opportunity to improve public health. Access to health services comprising MAT in the community is fundamental to achieve broad service coverage. The type and placement of the health services comprising MAT and integration with primary medical care including human immunodeficiency virus (HIV) prevention, care and treatment services are optimal for addressing both substance abuse and co-occurring infectious diseases. As an HIV prevention intervention, integrated (same medical record for HIV services and MAT services) MAT with HIV prevention, care and treatment programs provides the best “one stop shopping ” approach for health service utilization. Alternatively, MAT, medical and HIV services can be separately managed but co-located to allow convenient utilization of primary care, MAT and HIV services. A third approach is coordinated care and treatment, where primary care, MAT and HIV services are provided at distinct locations and case managers, peer facilitators, or others promote direct service utilization at the various locations. Developing a continuum of care for patients with opioid dependence throughout

  12. Pre-and Post-Scheduling Memory Allocation Strategies on MPSoCs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of deriving, from a Synchronous Dataflow (SDF) algorithm description, a Memory Exclusion Graph (MEG on descriptions of real applications and a set of random SDF graphs generated with the SDF For Free (SDF3) toolC. This paper focuses on memory allocation of applications described by a Synchronous Dataflow (SDF) Model

  13. [MRO] Oligocrystalline Shape Memory Alloys

    E-Print Network [OSTI]

    Chen, Ying

    Copper-based shape memory alloys (SMAs) exhibit excellent shape memory properties in single crystalline form. However, when they are polycrystalline, their shape memory properties are severely compromised by brittle fracture ...

  14. Technology strategy for the semiconductor memory market

    E-Print Network [OSTI]

    Nakamura, Tomohiko

    2012-01-01T23:59:59.000Z

    Solid state memories are used in a variety of applications as data and code storages. A non-volatile memory is a memory that retains information when its power supply is off. Flash memory is a type of nonvolatile memory ...

  15. Selection Conditions in Main Memory KENNETH A. ROSS

    E-Print Network [OSTI]

    Ross, Kenneth A.

    Architectures]; H.2.2 [Database Manage- ment]: Physical Design--access methods; H.2.4 [Database Management was supported by National Science Foundation grants IIS-98-12014, IIS-01-20939, EIA-98-76739, and EIA-00 memory. In Proceedings of the ACM Symposium on Principles of Database Systems. ACM, New York, 109

  16. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John (Greenwood, MO)

    2002-01-01T23:59:59.000Z

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  17. Memory efficient RNA energy landscape exploration -Supplementary Material -

    E-Print Network [OSTI]

    Brendel, Volker

    Memory efficient RNA energy landscape exploration - Supplementary Material - Martin Mann 1 , Marcel, University of Vienna, W¨ahringerstraße 17, 1090 Vienna, Austria 3 Center for Integrative Bioinformatics on the random data set and grouped by sequence length. q q 25 27 29 31 33 35 0.00.20.40.60.8 Correlation Exact

  18. Memory with memory: Soft assignment in Genetic Programming

    E-Print Network [OSTI]

    Poli, Riccardo

    Keywords Genetic Programming, Linear GP, Soft assignment, Memory with memory, Symbolic regressionMemory with memory: Soft assignment in Genetic Programming Nicholas Freitag McPhee Division was carried over to most versions of genetic programming (GP) that had state and assignments. This includes

  19. Memory with Memory: Soft Assignment in Genetic Programming

    E-Print Network [OSTI]

    Fernandez, Thomas

    Keywords Genetic Programming, Linear GP, Soft assignment, Memory with memory, Symbolic regressionMemory with Memory: Soft Assignment in Genetic Programming Nicholas Freitag McPhee Division was carried over to most versions of genetic programming (GP) that had state and assignments. This includes

  20. Collective Memory Transfers for Multi-Core Chips

    SciTech Connect (OSTI)

    Michelogiannakis, George; Williams, Alexander; Shalf, John

    2013-11-13T23:59:59.000Z

    Future performance improvements for microprocessors have shifted from clock frequency scaling towards increases in on-chip parallelism. Performance improvements for a wide variety of parallel applications require domain-decomposition of data arrays from a contiguous arrangement in memory to a tiled layout for on-chip L1 data caches and scratchpads. How- ever, DRAM performance suffers under the non-streaming access patterns generated by many independent cores. We propose collective memory scheduling (CMS) that actively takes control of collective memory transfers such that requests arrive in a sequential and predictable fashion to the memory controller. CMS uses the hierarchically tiled arrays formal- ism to compactly express collective operations, which greatly improves programmability over conventional prefetch or list- DMA approaches. CMS reduces application execution time by up to 32% and DRAM read power by 2.2×, compared to a baseline DMA architecture such as STI Cell.

  1. An analog memory using a CCD memory cell

    E-Print Network [OSTI]

    Murray, James Ray

    1983-01-01T23:59:59.000Z

    . Charge Storage . B. Charge Transfer C. Charge Injection D. Charge Detection CHAPTER III. DESIGN OF THE 4K ANALOG MEMORY A. Overview of the 4K Analog Memory B. NMOS Process . C. CCD Memory Cell D. Address Decoding . Page iv vi vii I 12 18 23... Gain Buffer . 18. ADC-DAC Loop . 19. Memory with Addressing Scheme 20. Memory with AD Loop and Addressing Scheme Page 13 15 16 17 20 21 24 26 ix 21. Floor Plan of the 4K Analog Memory 22. Overhead Plot of Memory Cell 23. Side View...

  2. Memory in the system: trajectory-environment

    E-Print Network [OSTI]

    Maxim Budaev

    2007-08-10T23:59:59.000Z

    In the paper the memory effect in the system consisting from a trajectory of process and an environment is considered. The environment is presented by scalar potential and noise. The evolution of system is interpreted as process of the continuous "measurement" of a trajectory by an environment and\\or on the contrary. In this sense the measured value is entropy-the information about embedding of the trajectory into configurations space. The concepts "measurement" and "interaction" are identified alike in quantum theory. Thus, the entropy evolution is not only the effect of dynamics, but also its cause, if it is possible to speak about causality in this case. It is shown, that such non-elastic interaction leads to occurrence of memory in the system. The reflex memory mechanism is realized as a real conformal dynamic metrics. The metastable event (attractor) is defined and time of its life is estimated. It is shown, that in the system there is a change of dynamic modes from spatial localization to random walk (fluctuation, relaxation). On scale of the attractors dynamics the memory is appearing as a semi-regular (in some information sense) drift of the image of fluctuations in a power spectrum of environment to absolute minimum. The latter properties (topological convergence) attract the attention to algorithmic aspect of a considered system.

  3. Capital Access Program (Vermont)

    Broader source: Energy.gov [DOE]

    The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

  4. Mondriaan memory protection

    E-Print Network [OSTI]

    Witchel, Emmett Jethro, 1970-

    2004-01-01T23:59:59.000Z

    Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

  5. Schema and memory consolidation 

    E-Print Network [OSTI]

    Tse, Dorothy

    2011-06-27T23:59:59.000Z

    The traditional view of systems memory consolidation is that it is a gradual process that takes place over days or weeks. Within this approach, the hippocampus (HPC) is thought to be involved in the rapid encoding of ...

  6. Profiling Transactional Memory Applications Mohammad Ansari, Kim Jarvis, Christos Kotselidis, Mikel Lujan, Chris Kirkham and Ian Watson

    E-Print Network [OSTI]

    Singer, Jeremy

    Profiling Transactional Memory Applications Mohammad Ansari, Kim Jarvis, Christos Kotselidis, Mikel:{ansari, kotselidis, jarvis, mikel, chris, watson}@cs.manchester.ac.uk Abstract--Transactional Memory (TM) has become multiprocessors [3]. TM requires a programmer to mark code blocks that access shared data as transactions

  7. Motor Representations In Memory And Mental Models: The Embodied Zork Daniel C. Richardson (dcr18@cornell.edu)

    E-Print Network [OSTI]

    Richardson, Daniel C.

    Motor Representations In Memory And Mental Models: The Embodied Zork Daniel C. Richardson (dcr18 suggested that motor systems can participate in what were thought to be purely perceptual tasks. Extending stimulus accessed from memory can activate potential motor interactions. Other research has shown

  8. DESIGN AND IMPLEMENTATION OF AN ORDERED MEMORY ACCESS ARCHITECTURE1

    E-Print Network [OSTI]

    Data Flow (SDF) refers to a sub- class of data flow graphs where the actors lack data depen- dency in their firing patterns [5]. Thus in SDF graphs the number of tokens produced and consumed in each of the output of DSP algorithms fall into the SDF paradigm. In our group at Berkeley, we have imple- mented Gabriel

  9. Low latency remote memory access on the Intel Paragon

    SciTech Connect (OSTI)

    Rosing, M. [Pacific Northwest Lab., Richland, WA (United States); Pierce, P. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1994-06-20T23:59:59.000Z

    We describe a cooperative project between Pacific Northwest Laboratory and Intel on providing low latency communications on the Intel Paragon. Our interest is in developing modules that are tailored to specific types of communication and are optimized for these cases. The modules described are implemented as simple extensions to the Paragon operating system. The first extension supports remote reads, writes, and accumulates on subsections of matrices. This module is intended to be used where the communication pattern is not known until run time. The second extension is designed to support low latency communication for short messages in a pipelined fashion. Finally, an interface for doing highly structured communication where the patterns of communication are well understood ahead of time is described. This is intended to be used in global communications such as global reduction.

  10. BUILDING MANAGEMENT & RESTRICTED ACCESS

    E-Print Network [OSTI]

    Johnston, Daniel

    BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

  11. Evaluation of architectural paradigms for addressing theprocessor-memory gap

    SciTech Connect (OSTI)

    Oliker, Leonid; Gorden, Grime; Husbands, Parry; Chame, Jacqualine

    2003-07-04T23:59:59.000Z

    Many high performance applications run well below the peak arithmetic performance of the underlying machine, with inefficiencies often attributed to poor memory system behavior. In the context of scientific computing we examine three emerging processors designed to address the well-known gap between processor and memory performance through the exploitation of data parallelism. The VIRAM architecture uses novel PIM technology to combine embedded DRAM with a vector co-processor for exploiting its large bandwidth potential. The DIVA architecture incorporates a collection of PIM chips as smart-memory coprocessors to a conventional microprocessor, and relies on superword-level parallelism to make effective use of the available memory bandwidth. The Imagine architecture provides a stream-aware memory hierarchy to support the tremendous processing potential of SIMD controlled VLIW clusters. First we develop a scalable synthetic probe that allows us to parametize key performance attributes of VIRAM, DIVA and Imagine while capturing the performance crossover points of these architectures. Next we present results for scientific kernels with different sets of computational characteristics and memory access patterns. Our experiments allow us to evaluate the strategies employed to exploit data parallelism, isolate the set of application characteristics best suited to each architecture and show a promising direction towards interfacing leading-edge processor technology with high-end scientific computations.

  12. An analog memory using a CCD memory cell 

    E-Print Network [OSTI]

    Murray, James Ray

    1983-01-01T23:59:59.000Z

    23 26 29 E. Digital-to-Analog Converter F. Analog-to-Digital Converter G. Operation CHAPTER IV. ANALYSIS OF THE CIRCUIT A. Testing of Major Components B. Performance of the Memory C. Comparison with Digital Memories D. Proposed Modifications... of Memory Cell 24. Four Interconnected Memory Cells 25. Four-to-Sixteen Converter 26. Column Address Decoding Circuit. 27. Row Address Decoding Circuit 28. Digital-to-Analog Converter 29. Comparator Circuit Diagram . 30. DC Transfer Function...

  13. A double-blind, randomized, multicenter phase 2 study of prasugrel versus placebo in adult patients with sickle cell disease

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    Clinical and biological double-blind-study of ticlopidine inRESEARCH Open Access A double-blind, randomized, multicenterwe conducted a double-blind, randomized, placebo-controlled

  14. Cache Memories ALAN JAY SMITH

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Cache Memories ALAN JAY SMITH Unwersity of California, Berkeley, Californm 94720 Cache memories 1982 #12;474 * A. J. Smith CONTENTS INTRODUCTION Definltlonand Rationale Overwew of Cache Deslgn Cache

  15. Ubiquitous Memory Introspection (Preliminary Manuscript)

    E-Print Network [OSTI]

    Zhao, Qin

    2006-09-25T23:59:59.000Z

    Modern memory systems play a critical role in the performance ofapplications, but a detailed understanding of the application behaviorin the memory system is not trivial to attain. It requires timeconsuming simulations of ...

  16. Shape memory polymer medical device

    DOE Patents [OSTI]

    Maitland, Duncan (Pleasant Hill, CA); Benett, William J. (Livermore, CA); Bearinger, Jane P. (Livermore, CA); Wilson, Thomas S. (San Leandro, CA); Small, IV, Ward (Livermore, CA); Schumann, Daniel L. (Concord, CA); Jensen, Wayne A. (Livermore, CA); Ortega, Jason M. (Pacifica, CA); Marion, III, John E. (Livermore, CA); Loge, Jeffrey M. (Stockton, CA)

    2010-06-29T23:59:59.000Z

    A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

  17. Memorial to James Allan Bennyhoff

    E-Print Network [OSTI]

    Hughes, Richard E

    1994-01-01T23:59:59.000Z

    REFERENCES Anonymous 1993 James Allan Bennyhoff. Society forMemorial to James Allan Bennyhoff (January 3, 1926 - August

  18. An Adaptive Memory Interface Controller for Improving Bandwidth Utilization of Hybrid and Reconfigurable Systems

    SciTech Connect (OSTI)

    Castellana, Vito G.; Tumeo, Antonino; Ferrandi, Fabrizio

    2014-05-30T23:59:59.000Z

    Emerging applications such as data mining, bioinformatics, knowledge discovery, social network analysis are irregular. They use data structures based on pointers or linked lists, such as graphs, unbalanced trees or unstructures grids, which generates unpredictable memory accesses. These data structures usually are large, but difficult to partition. These applications mostly are memory bandwidth bounded and have high synchronization intensity. However, they also have large amounts of inherent dynamic parallelism, because they potentially perform a task for each one of the element they are exploring. Several efforts are looking at accelerating these applications on hybrid architectures, which integrate general purpose processors with reconfigurable devices. Some solutions, which demonstrated significant speedups, include custom-hand tuned accelerators or even full processor architectures on the reconfigurable logic. In this paper we present an approach for the automatic synthesis of accelerators from C, targeted at irregular applications. In contrast to typical High Level Synthesis paradigms, which construct a centralized Finite State Machine, our approach generates dynamically scheduled hardware components. While parallelism exploitation in typical HLS-generated accelerators is usually bound within a single execution flow, our solution allows concurrently running multiple execution flow, thus also exploiting the coarser grain task parallelism of irregular applications. Our approach supports multiple, multi-ported and distributed memories, and atomic memory operations. Its main objective is parallelizing as many memory operations as possible, independently from their execution time, to maximize the memory bandwidth utilization. This significantly differs from current HLS flows, which usually consider a single memory port and require precise scheduling of memory operations. A key innovation of our approach is the generation of a memory interface controller, which dynamically maps concurrent memory accesses to multiple ports. We present a case study on a typical irregular kernel, Graph Breadth First search (BFS), exploring different tradeoffs in terms of parallelism and number of memories.

  19. Open Access Task Force Open Access to

    E-Print Network [OSTI]

    Jiang, Huiqiang

    Libraries Initiative launched by National Science Foundation; Social Sciences Research Network (SSRN Library System rgmiller@pitt.edu #12;Open Access Task Force Open Access is... · A family of copyright · The only constraint on reproduction and distribution, and the only role for copyright in this domain

  20. Randomized, double-blind, placebo-controlled, crossover study of the efficacy and safety of lisdexamfetamine dimesylate in adults with attention-deficit/hyperactivity disorder: novel findings using a simulated adult workplace environment design

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    with ADHD: a randomized, double-blind, multicenter, placebo-et al. , Randomized, double-blind, placebo-con- trolled,Open Access Randomized, double-blind, placebo-controlled,

  1. Accessibility to dental services 

    E-Print Network [OSTI]

    Evenden, Craig Andrew

    2007-08-15T23:59:59.000Z

    . Accessibility indexes need to be developed that incorporate a number of characteristics that are currently affecting accessibility to dental services. More research needs to be conducted at a local level to provide better advice to health planners and policy...

  2. Global aspects of radiation memory

    E-Print Network [OSTI]

    J. Winicour

    2014-10-11T23:59:59.000Z

    Gravitational radiation has a memory effect represented by a net change in the relative positions of test particles. Both the linear and nonlinear sources proposed for this radiation memory are of the "electric" type, or E mode, as characterized by the even parity of the polarization pattern. Although "magnetic" type, or B mode, radiation memory is mathematically possible, no physically realistic source has been identified. There is an electromagnetic counterpart to radiation memory in which the velocity of charged particles obtain a net "kick". Again, the physically realistic sources of electromagnetic radiation memory that have been identified are of the electric type. In this paper, a global null cone description of the electromagnetic field is applied to establish the non-existence of B mode radiation memory and the non-existence of E mode radiation memory due to a bound charge distribution.

  3. Random solutions of random problems...are not just random

    E-Print Network [OSTI]

    Achlioptas, Dimitris

    2008-01-01T23:59:59.000Z

    Let I(n,m) denote a uniformly random instance of some constraint satisfaction problem CSP with n variables and m constraints. Assume that the density r=m/n is small enough so that with high probability I(n,m) has a solution, and consider the experiment of first choosing an instance I=I(n,m) at random, and then sampling a random solution sigma of I (if one exists). For many CSPs (e.g., k-SAT, k-NAE, or k-coloring), this experiment appears difficult both to implement and to analyze; in fact, for a large range of r, no efficient algorithm is known to even compute a single solution of I. In the present paper we show that for many CSPs the above experiment is essentially equivalent to first choosing a random assignment sigma to the n variables, and then drawing a random instance satisfied by sigma uniformly. In general, this second experiment is very easy to implement and amenable to a rigorous analysis. In fact, using this equivalence, we can analyze the solution space of random CSPs. Thus, we can achieve the lon...

  4. Random walk in random environment: a dynamicist's approch

    E-Print Network [OSTI]

    Liu, I-Shih

    , equivalently: RW in a (quenched) disordered medium, or: Random walk in random environment (RWRE) Marco LenciRandom walk in random environment: a dynamicist's approch Marco Lenci Universit`a di Bologna RWRE #12;Random walk in random environment Random walk (RW): Point (particle, walker) travels on Zd

  5. Performance analysis of memory hierachies in high performance systems

    SciTech Connect (OSTI)

    Yogesh, A.

    1993-07-01T23:59:59.000Z

    This thesis studies memory bandwidth as a performance predictor of programs. The focus of this work is on computationally intensive programs. These programs are the most likely to access large amounts of data, stressing the memory system. Computationally intensive programs are also likely to use highly optimizing compilers to produce the fastest executables possible. Methods to reduce the amount of data traffic by increasing the average number of references to each item while it resides in the cache are explored. Increasing the average number of references to each cache item reduces the number of memory requests. Chapter 2 describes the DLX architecture. This is the architecture on which all the experiments were performed. Chapter 3 studies memory moves as a performance predictor for a group of application programs. Chapter 4 introduces a model to study the performance of programs in the presence of memory hierarchies. Chapter 5 explores some compiler optimizations that can help increase the references to each item while it resides in the cache.

  6. The memory glasses : wearable computing for just-in-time memory support

    E-Print Network [OSTI]

    DeVaul, Richard W. (Richard Wayne), 1971-

    2004-01-01T23:59:59.000Z

    This thesis documents a body of wearable computing research surrounding the development of the Memory Glasses, a new type of proactive memory support technology. The Memory Glasses combines features of existing memory ...

  7. TED KYCIA MEMORIAL SYMPOSIUM.

    SciTech Connect (OSTI)

    LITTENBERG, L.; RUBINSTEIN, R.; SAMIOS, N.; LI, K.; GIACOMELLI, G.; MOCKETT, P.; CARROLL, A.; JOHNSON, R.; BRYMAN, D.; TIPPENS, B.

    2000-05-19T23:59:59.000Z

    On the afternoon of May 19 2000, a Memorial Seminar was held in the BNL physics Large Seminar Room to honor the memory of Ted Kyeia, a prominent particle physicist who had been a member of the BNL staff for 40 years. Although it was understandably a somewhat sad occasion because Ted was no longer with us, nevertheless there was much for his colleagues and friends to celebrate in recalling the outstanding contributions that he had made in those four decades. The Seminar speakers were all people who had worked with Ted during that period; each discussed one aspect of his career, but also included anecdotes and personal reminiscences. This booklet contains the Seminar program, listing the speakers, and also copies of transparencies of the talks (and one paper which was a later expansion of a talk); sadly, not all of the personal remarks appeared on the transparencies.

  8. Shape memory alloy actuator

    DOE Patents [OSTI]

    Varma, Venugopal K. (Knoxville, TN)

    2001-01-01T23:59:59.000Z

    An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

  9. Gifts in Memory of LEHIGH UNIVERSITY 1 Anonymous, in memory of

    E-Print Network [OSTI]

    Gilchrist, James F.

    . Brown, in memory of Lawrence J. Varnerin, Jr. '91P R. N. Brummer, in memory of James W. Niemeyer '43 '68. Campbell, in memory of Gerald G. Leeman '71P '10GP Michael J. Caruso '67, in memory of Gerald G. Leeman '71, in memory of James E. Schierloh '51 Martin D. Cohen, in memory of Gerald G. Leeman '71P '10GP Kathleen

  10. Demystifying Open Access

    SciTech Connect (OSTI)

    Mele, Salvatore

    2007-05-14T23:59:59.000Z

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  11. Identity and Access Management: Access Management Survey 1 Access Management Survey Questions

    E-Print Network [OSTI]

    Maroncelli, Mark

    Identity and Access Management: Access Management Survey 1 Access Management Survey Questions has developed a survey to solicit your input for Access Management. Please take a moment to complete be submitted by Friday May 14, 2010. #12;Identity and Access Management: Access Management Survey 2 Group

  12. Nitinol-reinforced shape-memory polymers

    E-Print Network [OSTI]

    Di Leo, Claudio V

    2010-01-01T23:59:59.000Z

    Reinforced shape-memory polymers have been developed from an acrylate based thermoset shape-memory polymer and nitinol wires. A rectangular shape-memory polymer measuring approximately 1 by 2 by 0.1 inches has a ten fold ...

  13. Memory with Memory in Tree-Based Genetic Programming

    E-Print Network [OSTI]

    Poli, Riccardo

    was carried over to most versions of genetic programming (GP) that had state and assign- ments (see [8 of assignment in a linear GP system can significantly improve performance on a variety of symbolic regressionMemory with Memory in Tree-Based Genetic Programming Riccardo Poli1 , Nicholas F. McPhee2 , Luca

  14. Memory Considerations for Carver

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembers HomeMemory

  15. Internet architecture Access networks

    E-Print Network [OSTI]

    access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

  16. ATLAS Data Access Policy

    E-Print Network [OSTI]

    The ATLAS collaboration

    2015-01-01T23:59:59.000Z

    ATLAS has fully supported the principle of open access in its publication policy. This document outlines the policy of ATLAS as regards open access to data at different levels as described in the DPHEP model. The main objective is to make the data available in a usable way to people external to the ATLAS collaboration.

  17. Shape memory alloy thaw sensors

    SciTech Connect (OSTI)

    Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

    1998-01-01T23:59:59.000Z

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

  18. Paver Program Oklahoma Memorial Union

    E-Print Network [OSTI]

    Oklahoma, University of

    Paver Program Oklahoma Memorial Union The UniversiTy of oklahoma Alumni Association Pave the Way in the Oklahoma Memorial Union Courtyard. Now you can. The UniversiTy of oklahoma Alumni Association 900 Asp Ave of Oklahoma is an equal opportunity institution. This brochure was printed at no cost to the taxpayers

  19. Multiassociative Memory John F. Kolen

    E-Print Network [OSTI]

    Pollack, Jordan B.

    Multiassociative Memory John F. Kolen Jordan B. Pollack The Laboratory for AI Research Department)292-7402 kolen-j@cis.ohio-state.edu pollack@cis.ohio-state.edu Abstract This paper discusses the problem of how Conference of the Cognitive Science Society. August 7-10, 1991. #12;Multiassociative Memory1 John F. Kolen

  20. Multiassociative Memory John F. Kolen

    E-Print Network [OSTI]

    Pollack, Jordan B.

    Multiassociative Memory John F. Kolen Jordan B. Pollack The Laboratory for AI Research Department)292­7402 kolen­j@cis.ohio­state.edu pollack@cis.ohio­state.edu Abstract This paper discusses the problem of how Conference of the Cognitive Science Society. August 7­10, 1991. #12; Multiassociative Memory 1 John F. Kolen

  1. Symmetrical Multilevel Diversity Coding with an All-Access Encoder

    E-Print Network [OSTI]

    Marukala, Neeharika

    2012-07-16T23:59:59.000Z

    and L randomly accessible en- coders 1 to L. A total of L + 1 independent discrete memoryless sources (S0, S1, . . . , SL) are to be encoded at the encoders. The decoder, which has access to encoder 0 and a subset U of the ran- domly accessible... encoders, needs to nearly perfectly reconstruct the sources (S0, S1, . . . , S|U |) no matter what the realization of U is. . 6 2 An illustration of the (R0, Rs) admissible rate region R?. In gen- eral, the region is a (two-dimensional) polyhedron...

  2. Hybrid analysis of memory references and its application to automatic parallelization

    E-Print Network [OSTI]

    Rus, Silvius Vasile

    2009-05-15T23:59:59.000Z

    Transformations . . . . . . . . . . . . . . . . 20 a. Removing Flow Dependences . . . . . . . . . . . 20 b. Removing Storage Related Dependences . . . . . 21 c. Results in Automatic Parallelization . . . . . . . 21 3. Run Time Parallelization Techniques... . . . . . . . . . . . . . . . . . . . . . 33 2. Background: the Linear Memory Access Descriptor . . 33 3. Abstraction of Set Operations . . . . . . . . . . . . . . 35 viii CHAPTER a. Set Intersection . . . . . . . . . . . . . . . . . . . 35 b. Set Di erence...

  3. MUN WATER PLEDGE In signing this pledge, the Memorial University of Newfoundland community pledges to

    E-Print Network [OSTI]

    Oyet, Alwell

    MUN WATER PLEDGE In signing this pledge, the Memorial University of Newfoundland community pledges to: 1. Progressively and systematically eliminate the distribution of plastic bottled water at all of a university community that is bottled water free. 2. Conduct a University-wide Public Water Access Audit

  4. Random coincidence of $2\

    E-Print Network [OSTI]

    D. M. Chernyak; F. A. Danevich; A. Giuliani; E. Olivieri; M. Tenconi; V. I. Tretyak

    2013-01-17T23:59:59.000Z

    Two neutrino double $\\beta$ decay can create irremovable background even in high energy resolution detectors searching for neutrinoless double $\\beta$ decay due to random coincidence of $2\

  5. Access Management Software Requirements Specification

    E-Print Network [OSTI]

    Maroncelli, Mark

    with a digital identity record. Attributes may be general or personal. A subset of all attributes defines. IAM Defined #12;· Access to Protected Library Resources · Library Staff Access to Integrated Library System · Access to Library Public Workstations · HMC Affiliate · Access to Library Resources · Access

  6. access study access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  7. RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory of J. Ronald Miner, an

    E-Print Network [OSTI]

    Tullos, Desiree

    RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory of J. Ronald Miner, an Agricultural Engineering professor at OSU for over thirty years. Ron came to OSU from the Ron Miner Memorial Scholarship which resides with the OSU Foundation. The name

  8. RESEARCH ARTICLE Open Access Mutation accumulation in Tetrahymena

    E-Print Network [OSTI]

    Gordo, Isabel

    RESEARCH ARTICLE Open Access Mutation accumulation in Tetrahymena Patrícia H Brito1* , Elsa are estimated in mutation accumulation experiments where replicate lines are propagated in conditions that allow mutations to randomly accumulate without the purging effect of natural selection. These experiments have

  9. Random walks in random environment Tom Schmitz (MPI Leipzig)

    E-Print Network [OSTI]

    Thalmaier, Anton

    Random walks in random environment Tom Schmitz (MPI Leipzig) The model of random walks in random environment (RWRE) originates from physical and biological sciences and describes a random motion in a disordered medium. We consider RWRE on the d-dimensional lattice. The jump probabil- ities are themselves

  10. Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture

    SciTech Connect (OSTI)

    Gebis, Joseph; Oliker, Leonid; Shalf, John; Williams, Samuel; Yelick, Katherine

    2009-01-12T23:59:59.000Z

    The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software controlled scratchpad memories, such as the Cell local store, attempt to ameliorate this discrepancy by enabling precise control over memory movement; however, scratchpad technology confronts the programmer and compiler with an unfamiliar and difficult programming model. In this work, we present the Virtual Vector Architecture (ViVA), which combines the memory semantics of vector computers with a software-controlled scratchpad memory in order to provide a more effective and practical approach to latency hiding. ViVA requires minimal changes to the core design and could thus be easily integrated with conventional processor cores. To validate our approach, we implemented ViVA on the Mambo cycle-accurate full system simulator, which was carefully calibrated to match the performance on our underlying PowerPC Apple G5 architecture. Results show that ViVA is able to deliver significant performance benefits over scalar techniques for a variety of memory access patterns as well as two important memory-bound compact kernels, corner turn and sparse matrix-vector multiplication -- achieving 2x-13x improvement compared the scalar version. Overall, our preliminary ViVA exploration points to a promising approach for improving application performance on leading microprocessors with minimal design and complexity costs, in a power efficient manner.

  11. CHARACTERIZATION OF SHAPE MEMORY ALLOY BEHAVIOR AND

    E-Print Network [OSTI]

    Valasek, John

    CHARACTERIZATION OF SHAPE MEMORY ALLOY BEHAVIOR AND POSITION CONTROL USING REINFORCEMENT LEARNING for Intelligent Bio-Nano Materials and Structures for Aerospace Vehicles Problem: Shape Memory Alloy and Structures for Aerospace Vehicles 4 Shape Memory Alloys (SMAs) Metallic Alloys used as actuators Shape Memory

  12. Thermomechanical behavior of shape memory elastomeric composites

    E-Print Network [OSTI]

    Mather, Patrick T.

    Thermomechanical behavior of shape memory elastomeric composites Qi Ge a , Xiaofan Luo b,c , Erika September 2011 Available online 1 October 2011 Keywords: Shape memory Shape memory polymers Soft active materials Thermomechanical behaviors Constitutive models a b s t r a c t Shape memory polymers (SMPs) can

  13. Special Access Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-03-29T23:59:59.000Z

    This Order is for OFFICIAL USE ONLY and will not be distributed on the Directives' Portal. For distribution, please contact the Executive Secretary of the Special Access Program Oversight Committee at (202) 586-3345. Does not cancel other directives.

  14. Virginia Capital Access Program (Virginia)

    Broader source: Energy.gov [DOE]

    The Virginia Capital Access Program (CAP), in partnership with Virginia’s Small Business Financing Authority, provides access to capital for small businesses. Businesses must apply to...

  15. Capital Access Program (CAP) (Michigan)

    Broader source: Energy.gov [DOE]

    The Capital Access Program (CAP), utilizes public resources to generate private financing for small business in Michigan seeking access to capital. Funding from the Michigan Strategic Fund is...

  16. Asymptotic properties of a bold random walk

    E-Print Network [OSTI]

    Maurizio Serva

    2014-06-13T23:59:59.000Z

    In a recent paper we proposed a non-Markovian random walk model with memory of the maximum distance ever reached from the starting point (home). The behavior of the walker is at variance with respect to the simple symmetric random walk (SSRW) only when she is at this maximum distance, where, having the choice to move either farther or closer, she decides with different probabilities. If the probability of a forward step is higher then the probability of a backward step, the walker is bold and her behavior turns out to be super-diffusive, otherwise she is timorous and her behavior turns out to be sub-diffusive. The scaling behavior vary continuously from sub-diffusive (timorous) to super-diffusive (bold) according to a single parameter $\\gamma \\in R$. We investigate here the asymptotic properties of the bold case in the non ballistic region $\\gamma \\in [0,1/2]$, a problem which was left partially unsolved in \\cite{S}. The exact results proved in this paper require new probabilistic tools which rely on the construction of appropriate martingales of the random walk and its hitting times.

  17. Effects of ZrO{sub 2} doping on HfO{sub 2} resistive switching memory characteristics

    SciTech Connect (OSTI)

    Ryu, Seung Wook; Kwac, Jungsuk; Nishi, Yoshio [Department of Electrical Engineering, Stanford University, Stanford, California 94305 (United States); Cho, Seongjae, E-mail: felixcho@gachon.ac.kr [Department of Electronic Engineering and New Technology Component and Material Research Center (NCMRC), Gachon University, Seongnam-si, Gyeonggi-do 461-741 (Korea, Republic of); Park, Joonsuk [Department of Materials Science and Engineering, Stanford University, Stanford, California 94305 (United States); Kim, Hyeong Joon [Department of Materials Science and Engineering and Inter-university Semiconductor Research Center (ISRC), Seoul National University, Seoul 151-744 (Korea, Republic of)

    2014-08-18T23:59:59.000Z

    A resistive switching (RS) random access memory device with ZrO{sub 2}-doped HfO{sub 2} exhibits better RS performance than that with pure HfO{sub 2}. In particular, I{sub res}, V{sub res}, and V{sub set} are reduced by approximately 58%, 38%, and 39%, respectively, when HfO{sub 2} is doped with ZrO{sub 2} (9 at.?%). In addition, the ZrO{sub 2} doping in HfO{sub 2} makes the distribution of most parameters steeper. Transmission electron microscopy (TEM) analysis reveals that the deposited zirconium-doped hafnium oxide (HZO) (9 at.?%) is polycrystalline. Elemental mapping results by scanning TEM–energy dispersive spectroscopy also prove that ZrO{sub 2} is uniformly distributed in the HZO (9 at.?%) film. The possible mechanism for the improvement in the RS characteristics is also suggested on the basis of the X-ray photoelectron spectroscopy results and filamentary RS mechanism. These results suggest that the ZrO{sub 2} doping into HfO{sub 2} likely not only will reduce power consumption but also will improve cyclic endurance by controlling the nonstoichiometric phase.

  18. External-Memory Computational Geometry

    E-Print Network [OSTI]

    Goodrich, Michael T.; Tsay, Jyh-Jong; Vengroff, Darren Erik; Vitter, Jeffrey Scott

    1993-01-01T23:59:59.000Z

    the rst known optimal al- gorithms for a wide range of two-level and hierarchical multilevel memory models, including parallel models. The algorithms are optimal both in terms of I/O cost and internal computation....

  19. Bridges of Random Walks in a Random Environment

    E-Print Network [OSTI]

    Jonathon Peterson

    2010-02-19T23:59:59.000Z

    Feb 25, 2010 ... Bridges of Random Walks in a Random Environment. Jonathon Peterson. Cornell University. Department of Mathematics. Joint work with Nina ...

  20. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, M.; Martinez, D.R.

    1998-04-07T23:59:59.000Z

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

  1. Directed random testing

    E-Print Network [OSTI]

    Pacheco, Carlos, Ph.D. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    Random testing can quickly generate many tests, is easy to implement, scales to large software applications, and reveals software errors. But it tends to generate many tests that are illegal or that exercise the same parts ...

  2. Exponential Random Simplicial Complexes

    E-Print Network [OSTI]

    Zuev, Konstantin; Krioukov, Dmitri

    2015-01-01T23:59:59.000Z

    Exponential random graph models have attracted significant research attention over the past decades. These models are maximum-entropy ensembles under the constraints that the expected values of a set of graph observables are equal to given values. Here we extend these maximum-entropy ensembles to random simplicial complexes, which are more adequate and versatile constructions to model complex systems in many applications. We show that many random simplicial complex models considered in the literature can be casted as maximum-entropy ensembles under certain constraints. We introduce and analyze the most general random simplicial complex ensemble $\\mathbf{\\Delta}$ with statistically independent simplices. Our analysis is simplified by the observation that any distribution $\\mathbb{P}(O)$ on any collection of objects $\\mathcal{O}=\\{O\\}$, including graphs and simplicial complexes, is maximum-entropy under the constraint that the expected value of $-\\ln \\mathbb{P}(O)$ is equal to the entropy of the distribution. W...

  3. Random array grid collimator

    DOE Patents [OSTI]

    Fenimore, E.E.

    1980-08-22T23:59:59.000Z

    A hexagonally shaped quasi-random no-two-holes touching grid collimator. The quasi-random array grid collimator eliminates contamination from small angle off-axis rays by using a no-two-holes-touching pattern which simultaneously provides for a self-supporting array increasng throughput by elimination of a substrate. The presentation invention also provides maximum throughput using hexagonally shaped holes in a hexagonal lattice pattern for diffraction limited applications. Mosaicking is also disclosed for reducing fabrication effort.

  4. Recycle of random sequences

    E-Print Network [OSTI]

    Nobuyasu Ito; Macoto Kikuchi; Yutaka Okabe

    1993-02-07T23:59:59.000Z

    The correlation between a random sequence and its transformed sequences is studied. In the case of a permutation operation or, in other word, the shuffling operation, it is shown that the correlation can be so small that the sequences can be regarded as independent random sequences. The applications to the Monte Carlo simulations are also given. This method is especially useful in the Ising Monte Carlo simulation.

  5. Random multiparty entanglement distillation

    E-Print Network [OSTI]

    Ben Fortescue; Hoi-Kwong Lo

    2008-01-15T23:59:59.000Z

    We describe various results related to the random distillation of multiparty entangled states - that is, conversion of such states into entangled states shared between fewer parties, where those parties are not predetermined. In previous work [Phys. Rev. Lett. 98, 260501 (2007)] we showed that certain output states (namely Einstein-Podolsky-Rosen (EPR) pairs) could be reliably acquired from a prescribed initial multipartite state (namely the W state) via random distillation that could not be reliably created between predetermined parties. Here we provide a more rigorous definition of what constitutes ``advantageous'' random distillation. We show that random distillation is always advantageous for W-class three-qubit states (but only sometimes for Greenberger-Horne-Zeilinger (GHZ)-class states). We show that the general class of multiparty states known as symmetric Dicke states can be readily converted to many other states in the class via random distillation. Finally we show that random distillation is provably not advantageous in the limit of multiple copies of pure states.

  6. Energy Efficient Memory Speculation With Memory Latency Tolerance Supporting Sequential Consistency Without A Coherence Protocol

    E-Print Network [OSTI]

    Munday, David Alexander

    2013-01-01T23:59:59.000Z

    1–17, Sept. 2006. [35] Derek Hower. Acoherent shared memory.memory consistency models. Derek Hower [35] pro- posed the

  7. Accessing HPSS at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean WaterAccessing HPSS Accessing

  8. Optimizing TLB entries for mixed page size storage in contiguous memory

    DOE Patents [OSTI]

    Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Kriegel, Jon K.; Ohmacht, Martin; Steinmacher-Burow, Burkhard

    2013-04-30T23:59:59.000Z

    A system and method for accessing memory are provided. The system comprises a lookup buffer for storing one or more page table entries, wherein each of the one or more page table entries comprises at least a virtual page number and a physical page number; a logic circuit for receiving a virtual address from said processor, said logic circuit for matching the virtual address to the virtual page number in one of the page table entries to select the physical page number in the same page table entry, said page table entry having one or more bits set to exclude a memory range from a page.

  9. Characterization of Shape Memory Alloys Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    1 Characterization of Shape Memory Alloys Using Artificial Neural Networks Jim Henrickson, Kenton ­ Shape Memory Alloys ­ Artificial Neural Networks Process ­ Implement Shape Memory Alloy Model;3 Introduction Shape memory alloys (SMAs) ­ Active material: material that undergoes macroscopic change

  10. Library Guide Access ... 3

    E-Print Network [OSTI]

    Steiner, Ullrich

    ____________________________ Library Guide 2014-2015 #12;Contents Access ... 3 Finding things ... 4-6 Layout and classification... 7 Floor plans ... 8-9 Borrowing things ... 10 Renewing and returning things;Sidney Sussex Library Guide 2014-2015 Welcome to the Richard Powell Library Tel: (01223) 338852 e

  11. Library Guide Access ... 3

    E-Print Network [OSTI]

    Steiner, Ullrich

    ____________________________ Library Guide 2012-2013 #12;Contents Access ... 3 Finding things ... 4-6 Layout and classification... 7 Floor plans ... 8-9 Borrowing things ... 10 Renewing and returning things;Sidney Sussex Library Guide 2012-2013 Welcome to the Richard Powell Library Tel: (01223) 338852 e

  12. A discrete fractional random transform

    E-Print Network [OSTI]

    Zhengjun Liu; Haifa Zhao; Shutian Liu

    2006-05-20T23:59:59.000Z

    We propose a discrete fractional random transform based on a generalization of the discrete fractional Fourier transform with an intrinsic randomness. Such discrete fractional random transform inheres excellent mathematical properties of the fractional Fourier transform along with some fantastic features of its own. As a primary application, the discrete fractional random transform has been used for image encryption and decryption.

  13. acquired immunologic memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and investigates urinary metabolomic biomarkers (more) Skappak, Christopher Dustin 163 Memory traces of trace memories: neurogenesis, synaptogenesis and Biology and...

  14. Rerun: Exploiting Episodes for Lightweight Memory Race Recording

    E-Print Network [OSTI]

    Derek R. Hower; Mark D. Hill

    Multiprocessor deterministic replay has many potential uses in the era of multicore computing, including enhanced debugging, fault tolerance, and intrusion detection. While sources of nondeterminism in a uniprocessor can be recorded efficiently in software, it seems likely that hardware support will be needed in a multiprocessor environment where the outcome of memory races must also be recorded. We develop a memory race recording mechanism, called Rerun, that uses small hardware state (~166 bytes/core), writes a small race log (~4 bytes/kiloinstruction), and operates well as the number of cores per system scales (e.g., to 16 cores). Rerun exploits the dual of conventional wisdom in race recording: Rather than record information about individual memory accesses that conflict, we record how long a thread executes without conflicting with other threads. In particular, Rerun passively creates atomic episodes. Each episode is a dynamic instruction sequence that a thread happens to execute without interacting with other threads. Rerun uses Lamport Clocks to order episodes and enable replay of an equivalent execution. 1.

  15. Hipikat: A Project Memory for Software Development

    E-Print Network [OSTI]

    van der Hoek, André

    Hipikat: A Project Memory for Software Development Davor CCubranicc, Gail C. Murphy, Member, IEEE's usefulness in software modification tasks. One study evaluated the usefulness of Hipikat's recommendations Terms--Software development teams, project memory, software artifacts, recommender system, user studies

  16. Program Transformations in Weak Memory Models 

    E-Print Network [OSTI]

    Sevcik, Jaroslav

    2009-01-01T23:59:59.000Z

    We analyse the validity of common optimisations on multi-threaded programs in two memory models—the DRF guarantee and the Java Memory Model. Unlike in the single-threaded world, even simple program transformations, such ...

  17. Exploring the interaction between working memory and long-term memory: Evidence for the workspace model 

    E-Print Network [OSTI]

    van der Meulen, Marian

    There is a large range of models of working memory, each with different scopes and emphases. Current interest focuses strongly on the interaction of working memory with long-term memory, as it has become clear that models of working memory alone...

  18. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)

    E-Print Network [OSTI]

    Saxena, Nitesh

    2009-01-01T23:59:59.000Z

    Random number generation is a fundamental security primitive for RFID devices. However, even this relatively simple requirement is beyond the capacity of today's average RFID tag. A recently proposed solution, Fingerprint Extraction and Random Number Generation in SRAM (FERNS) [14, 15], involves the use of onboard RAM as the source of "true" randomness. Unfortunately, practical considerations prevent this approach from reaching its full potential. First, this method must compete with other system functionalities for use of memory. Thus, the amount of uninitialized RAM available for utilization as a randomness generator may be severely restricted. Second, RAM is subject to data remanence; there is a time period after losing power during which stored data remains intact in memory. This means that after a portion of memory has been used for entropy collection once it will require a relatively extended period of time without power before it can be reused. In a usable RFID based security application, which require...

  19. A study of analog memories

    E-Print Network [OSTI]

    Ott, Joseph Michael

    1983-01-01T23:59:59.000Z

    A STUDY OF ANALOG MEMORIES A Thesis by JOSEPH MICHAEL OTT Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirements tor the degree of MASTER OF SCIENCE August 1983 Major Subject: Electrical... Fngineering A STUDY OF ANALOG MEMORIES A Thesis JOSEPH MZCHAEL OTT Approved as to style and content by: P. E. Allen (Chairman of Committee) N. R. Strader (Member) W. M. Lxvely (Member) W. B. Jones (Head of Department) August 1983 , 0 AS STRA C...

  20. Memory Usage Considerations on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembersMemoryMemory

  1. Government User Session Translation Memory TechnologyTranslation Memory Technology

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Rachael Richardson Tucker Maney Naval Research Laboratory Carol Van Ess-Dykema Susan Converse John S Requirements for Multi-Genre Translation · Motivations for TM Technology Assessment · Pilot Study · ResultsPoint slides, etc. #12;Government User Session Translation Memory Technology Assessment: Pilot Study Goals

  2. Shape memory polymer foams for endovascular therapies

    DOE Patents [OSTI]

    Wilson, Thomas S. (Castro Valley, CA); Maitland, Duncan J. (Pleasant Hill, CA)

    2012-03-13T23:59:59.000Z

    A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

  3. Memory Optimization for Phase-field Simulations

    SciTech Connect (OSTI)

    Derek Gaston; John Peterson; Andrew Slaughter; Cody Permann; David Andrs

    2014-08-01T23:59:59.000Z

    Phase-field simulations are computationally and memory intensive applications. Many of the phase-field simulations being conducted in support of NEAMS were not capable of running on “normal clusters” with 2-4GB of RAM per core, and instead required specialized “big-memory” clusters with 64GB per core. To address this issue, the MOOSE team developed a new Python-based utility called MemoryLogger, and applied it to locate, diagnose, and eradicate memory bottlenecks within the MOOSE framework. MemoryLogger allows for a better understanding of the memory usage of an application being run in parallel across a cluster. Memory usage information is captured for every individual process in a parallel job, and communicated to the head node of the cluster. Console text output from the application itself is automatically matched with this memory usage information to produce a detailed picture of memory usage over time, making it straightforward to identify the subroutines which contribute most to the application’s peak memory usage. The information produced by the MemoryLogger quickly and effectively narrows the search for memory optimizations to the most data-intensive parts of the simulation.

  4. Configurable memory system and method for providing atomic counting operations in a memory device

    DOE Patents [OSTI]

    Bellofatto, Ralph E. (Ridgefield, CT); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Ohmacht, Martin (Yorktown Heights, NY)

    2010-09-14T23:59:59.000Z

    A memory system and method for providing atomic memory-based counter operations to operating systems and applications that make most efficient use of counter-backing memory and virtual and physical address space, while simplifying operating system memory management, and enabling the counter-backing memory to be used for purposes other than counter-backing storage when desired. The encoding and address decoding enabled by the invention provides all this functionality through a combination of software and hardware.

  5. Accessibility-based transit planning

    E-Print Network [OSTI]

    Busby, Jeffrey R

    2004-01-01T23:59:59.000Z

    A method for evaluating transit planning proposals using accessibility metrics is advanced in this research. A transit-accessibility model is developed intended for use by in-house transit agency planning staff as a ...

  6. Mentoring@Memorial Mentor Application

    E-Print Network [OSTI]

    Oyet, Alwell

    Mentoring@Memorial Mentor Application The Department of Human Resources offers a mentoring program for staff, administrative leaders, and academic leaders. To participate in the program, we require mentors Mentoring Agreement; · Provide evaluative feedback by completing an evaluation form; and · Agree to disclose

  7. Mentoring@Memorial Mentee Application

    E-Print Network [OSTI]

    Oyet, Alwell

    Mentoring@Memorial Mentee Application The Department of Human Resources offers a mentoring program for staff, administrative leaders, and academic leaders. To participate in the program, we require mentors Mentoring Agreement; · Provide evaluative feedback by completing an evaluation form; and · Agree to disclose

  8. Random Walks with Lookahead in Power Law Random Graphs

    E-Print Network [OSTI]

    Mihail, Milena

    1 Random Walks with Lookahead in Power Law Random Graphs Milena Mihail Amin Saberi Prasad Tetali Georgia Institute of Technology Email: mihail, saberi¡ @cc.gatech.edu tetali@math.cc.gatech.edu Abstract

  9. Randomization vs. Nondeterminisma What are the differences between randomized algorithms

    E-Print Network [OSTI]

    Lyuu, Yuh-Dauh

    Inequalitya Lemma 61 Let x be a random variable taking nonnegative integer values. Then for any k > 0, prob[ x

  10. Role-Based Access Controls

    E-Print Network [OSTI]

    Ferraiolo, David F

    2009-01-01T23:59:59.000Z

    While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC.

  11. Device Independent Random Number Generation

    E-Print Network [OSTI]

    Mataj Pivoluska; Martin Plesch

    2015-02-23T23:59:59.000Z

    Randomness is an invaluable resource in today's life with a broad use reaching from numerical simulations through randomized algorithms to cryptography. However, on the classical level no true randomness is available and even the use of simple quantum devices in a prepare-measure setting suffers from lack of stability and controllability. This gave rise to a group of quantum protocols that provide randomness certified by classical statistical tests -- Device Independent Quantum Random Number Generators. In this paper we review the most relevant results in this field, which allow the production of almost perfect randomness with help of quantum devices, supplemented with an arbitrary weak source of additional randomness. This is in fact the best one could hope for to achieve, as with no starting randomness (corresponding to no free will in a different concept) even a quantum world would have a fully deterministic description.

  12. Access for All

    E-Print Network [OSTI]

    Stearns, Linda Lea Merenda

    2012-07-16T23:59:59.000Z

    ?s Algebra 1 final grades to examine correlation with the students? grade in Algebra. Each scatter plot contained a solid linear regression line and a dashed line, y = x. The data points with a square shape represent the scores of students who were Waived... classes in a central Texas school district to determine if there is fair and equitable access for all students. The paper contains two major components. The first is quantitative study of the four entrance requirements for 8th grade Algebra I Pre-AP at a...

  13. LANL access restrictions lifted

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as ReadyAppointedKyungmin Ham, Ph.D.access restrictions

  14. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In theACME -ToggleAccess to the ALS Print

  15. Accessibility | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In theACME -ToggleAccess to the ALS

  16. Shape memory alloy/shape memory polymer tools

    DOE Patents [OSTI]

    Seward, Kirk P.; Krulevitch, Peter A.

    2005-03-29T23:59:59.000Z

    Micro-electromechanical tools for minimally invasive techniques including microsurgery. These tools utilize composite shape memory alloy (SMA), shape memory polymer (SMP) and combinations of SMA and SMP to produce catheter distal tips, actuators, etc., which are bistable. Applications for these structures include: 1) a method for reversible fine positioning of a catheter tip, 2) a method for reversible fine positioning of tools or therapeutic catheters by a guide catheter, 3) a method for bending articulation through the body's vasculature, 4) methods for controlled stent delivery, deployment, and repositioning, and 5) catheters with variable modulus, with vibration mode, with inchworm capability, and with articulated tips. These actuators and catheter tips are bistable and are opportune for in vivo usage because the materials are biocompatible and convenient for intravascular use as well as other minimal by invasive techniques.

  17. Random Selection for Drug Screening

    SciTech Connect (OSTI)

    Center for Human Reliability Studies

    2007-05-01T23:59:59.000Z

    Simple random sampling is generally the starting point for a random sampling process. This sampling technique ensures that each individual within a group (population) has an equal chance of being selected. There are a variety of ways to implement random sampling in a practical situation.

  18. LHAPDF6: parton density access in the LHC precision era

    E-Print Network [OSTI]

    Andy Buckley; James Ferrando; Stephen Lloyd; Karl Nordstrom; Ben Page; Martin Ruefenacht; Marek Schoenherr; Graeme Watt

    2015-03-05T23:59:59.000Z

    The Fortran LHAPDF library has been a long-term workhorse in particle physics, providing standardised access to parton density functions for experimental and phenomenological purposes alike, following on from the venerable PDFLIB package. During Run 1 of the LHC, however, several fundamental limitations in LHAPDF's design have became deeply problematic, restricting the usability of the library for important physics-study procedures and providing dangerous avenues by which to silently obtain incorrect results. In this paper we present the LHAPDF 6 library, a ground-up re-engineering of the PDFLIB/LHAPDF paradigm for PDF access which removes all limits on use of concurrent PDF sets, massively reduces static memory requirements, offers improved CPU performance, and fixes fundamental bugs in multi-set access to PDF metadata. The new design, restricted for now to interpolated PDFs, uses centralised numerical routines and a powerful cascading metadata system to decouple software releases from provision of new PDF data and allow completely general parton content. More than 200 PDF sets have been migrated from LHAPDF 5 to the new universal data format, via a stringent quality control procedure. LHAPDF 6 is supported by many Monte Carlo generators and other physics programs, in some cases via a full set of compatibility routines, and is recommended for the demanding PDF access needs of LHC Run 2 and beyond.

  19. SYSTEMS OF ONE-DIMENSIONAL RANDOM WALKS IN A COMMON RANDOM ENVIRONMENT

    E-Print Network [OSTI]

    Peterson, Jonathon

    SYSTEMS OF ONE-DIMENSIONAL RANDOM WALKS IN A COMMON RANDOM ENVIRONMENT JONATHON PETERSON Abstract. We consider a system of independent one-dimensional random walks in a common random environment under-dimensional random walks in a common random environment. We modify the standard notion of random walks in random

  20. Pennsylvania Capital Access Program (Pennsylvania)

    Broader source: Energy.gov [DOE]

    The Pennsylvania Capital Access Program provides loan guarantees for all businesses for the purchase of land, buildings, machinery, equipment and working capital through participating banks. The...

  1. Vehicle barrier with access delay

    DOE Patents [OSTI]

    Swahlan, David J; Wilke, Jason

    2013-09-03T23:59:59.000Z

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  2. Accelerated Randomized Benchmarking

    E-Print Network [OSTI]

    Christopher Granade; Christopher Ferrie; D. G. Cory

    2014-09-24T23:59:59.000Z

    Quantum information processing offers promising advances for a wide range of fields and applications, provided that we can efficiently assess the performance of the control applied in candidate systems. That is, we must be able to determine whether we have implemented a desired gate, and refine accordingly. Randomized benchmarking reduces the difficulty of this task by exploiting symmetries in quantum operations. Here, we bound the resources required for benchmarking and show that, with prior information, we can achieve several orders of magnitude better accuracy than in traditional approaches to benchmarking. Moreover, by building on state-of-the-art classical algorithms, we reach these accuracies with near-optimal resources. Our approach requires an order of magnitude less data to achieve the same accuracies and to provide online estimates of the errors in the reported fidelities. We also show that our approach is useful for physical devices by comparing to simulations. Our results thus enable the application of randomized benchmarking in new regimes, and dramatically reduce the experimental effort required to assess control fidelities in quantum systems. Finally, our work is based on open-source scientific libraries, and can readily be applied in systems of interest.

  3. Random rectangular Graphs

    E-Print Network [OSTI]

    Estrada, Ernesto

    2015-01-01T23:59:59.000Z

    A generalization of the random geometric graph (RGG) model is proposed by considering a set of points uniformly and independently distributed on a rectangle of unit area instead of on a unit square \\left[0,1\\right]^{2}. The topological properties, such as connectivity, average degree, average path length and clustering, of the random rectangular graphs (RRGs) generated by this model are then studied as a function of the rectangle sides lengths a and b=1/a, and the radius r used to connect the nodes. When a=1 we recover the RGG, and when a\\rightarrow\\infty the very elongated rectangle generated resembles a one-dimensional RGG. We provided computational and analytical evidence that the topological properties of the RRG differ significantly from those of the RGG. The connectivity of the RRG depends not only on the number of nodes as in the case of the RGG, but also on the side length of the rectangle. As the rectangle is more elongated the critical radius for connectivity increases following first a power-law an...

  4. Immunological Memory is Associative Derek J. Smith

    E-Print Network [OSTI]

    Somayaji, Anil

    Immunological Memory is Associative Derek J. Smith Department of Computer Science University of New , 1989; Nara & Goudsmit, 1990; Smith, 1994). Immunologists refer to associative recall as a cross

  5. Improving Memory Error Handling Using Linux

    SciTech Connect (OSTI)

    Carlton, Michael Andrew [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Blanchard, Sean P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Debardeleben, Nathan A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-07-25T23:59:59.000Z

    As supercomputers continue to get faster and more powerful in the future, they will also have more nodes. If nothing is done, then the amount of memory in supercomputer clusters will soon grow large enough that memory failures will be unmanageable to deal with by manually replacing memory DIMMs. "Improving Memory Error Handling Using Linux" is a process oriented method to solve this problem by using the Linux kernel to disable (offline) faulty memory pages containing bad addresses, preventing them from being used again by a process. The process of offlining memory pages simplifies error handling and results in reducing both hardware and manpower costs required to run Los Alamos National Laboratory (LANL) clusters. This process will be necessary for the future of supercomputing to allow the development of exascale computers. It will not be feasible without memory error handling to manually replace the number of DIMMs that will fail daily on a machine consisting of 32-128 petabytes of memory. Testing reveals the process of offlining memory pages works and is relatively simple to use. As more and more testing is conducted, the entire process will be automated within the high-performance computing (HPC) monitoring software, Zenoss, at LANL.

  6. Video Stores, Media Technologies, and Memory

    E-Print Network [OSTI]

    Wilken, Rowan

    2010-01-01T23:59:59.000Z

    a collection entitled Mobile Technology & Place (Routledge,Identity,” in Mobile Technologies: From Telecommunicationsin an essay on mobile media technologies and memory, Nicola

  7. Battelle Memorial Institute Technologies Available for Licensing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Fuels Wind Energy Partners (27) Visual Patent Search Success Stories News Events Battelle Memorial Institute Technologies Available for Licensing Battelle is the world's...

  8. Central Limit Theorem for Branching Random Walks in Random Environment

    E-Print Network [OSTI]

    Nobuo Yoshida

    2007-12-05T23:59:59.000Z

    We consider branching random walks in $d$-dimensional integer lattice with time-space i.i.d. offspring distributions. When $d \\ge 3$ and the fluctuation of the environment is well moderated by the random walk, we prove a central limit theorem for the density of the population, together with upper bounds for the density of the most populated site and the replica overlap. We also discuss the phase transition of this model in connection with directed polymers in random environment.

  9. Shape memory response of ni2mnga and nimncoin magnetic shape memory alloys under compression

    E-Print Network [OSTI]

    Brewer, Andrew Lee

    2009-05-15T23:59:59.000Z

    In this study, the shape memory response of Ni2MnGa and NiMnCoIn magnetic shape memory alloys was observed under compressive stresses. Ni2MnGa is a magnetic shape memory alloy (MSMA) that has been shown to exhibit fully reversible, stressassisted...

  10. Energy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems

    E-Print Network [OSTI]

    Conte, Thomas M.

    hybrid system using a commodity DRAM cache. Keywords-Memory Controller, DRAM, PCM, Energy I. INTRODUCTIONEnergy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems Abstract system of similar storage size. Our proposed system is highly energy efficient and provides 35

  11. A Feasible Graph Partition Framework for Random Walks Implemented by Parallel Computing in Big Graph

    E-Print Network [OSTI]

    Liu, Xiaoming; Guan, Xiaohong

    2015-01-01T23:59:59.000Z

    Graph partition is a fundamental problem of parallel computing for big graph data. Many graph partition algorithms have been proposed to solve the problem in various applications, such as matrix computations and PageRank, etc., but none has pay attention to random walks. Random walks is a widely used method to explore graph structure in lots of fields. The challenges of graph partition for random walks include the large number of times of communication between partitions, lots of replications of the vertices, unbalanced partition, etc. In this paper, we propose a feasible graph partition framework for random walks implemented by parallel computing in big graph. The framework is based on two optimization functions to reduce the bandwidth, memory and storage cost in the condition that the load balance is guaranteed. In this framework, several greedy graph partition algorithms are proposed. We also propose five metrics from different perspectives to evaluate the performance of these algorithms. By running the al...

  12. Cu-based shape memory microwires : towards complex structures

    E-Print Network [OSTI]

    Gager, Mac (Brian McClure, Jr.)

    2014-01-01T23:59:59.000Z

    Shape memory alloys are a distinctive type of material that exhibits the fascinating properties of the shape memory effect and superelasticity. Shape memory properties are characterized by the diffusionless phase transformation ...

  13. Grain constraint and size effects in shape memory alloy microwires

    E-Print Network [OSTI]

    Ueland, Stian Melhus

    2013-01-01T23:59:59.000Z

    Shape memory alloys exhibit interesting and useful properties, such as the shape memory effect and superelasticity. Among the many alloy families that have been shown to exhibit shape memory properties the ones based on ...

  14. Querying Schemas With Access Restrictions

    E-Print Network [OSTI]

    Benedikt, Michael; Ley, Clemens

    2012-01-01T23:59:59.000Z

    We study verification of systems whose transitions consist of accesses to a Web-based data-source. An access is a lookup on a relation within a relational database, fixing values for a set of positions in the relation. For example, a transition can represent access to a Web form, where the user is restricted to filling in values for a particular set of fields. We look at verifying properties of a schema describing the possible accesses of such a system. We present a language where one can describe the properties of an access path, and also specify additional restrictions on accesses that are enforced by the schema. Our main property language, AccLTL, is based on a first-order extension of linear-time temporal logic, interpreting access paths as sequences of relational structures. We also present a lower-level automaton model, Aautomata, which AccLTL specifications can compile into. We show that AccLTL and A-automata can express static analysis problems related to "querying with limited access patterns" that h...

  15. Data Representation for Efficient and Reliable Storage in Flash Memories

    E-Print Network [OSTI]

    Wang, Yue

    2013-05-02T23:59:59.000Z

    challenges. In addition, we present an overview of related works on ash memories. 1.1 Flash Memories and Their Properties Flash memory, invented by Dr. Fujio Masuoka, is a type of non-volatile memory that can be electrically erased and reprogrammed... years have witnessed a proliferation of ash memories as an emerging storage technology with wide applications in many important areas. Like magnetic recording and optimal recording, ash memories have their own distinct properties and usage...

  16. Stretched Polymers in Random Environment

    E-Print Network [OSTI]

    Dmitry Ioffe; Yvan Velenik

    2011-03-01T23:59:59.000Z

    We survey recent results and open questions on the ballistic phase of stretched polymers in both annealed and quenched random environments.

  17. A quantum access network

    E-Print Network [OSTI]

    Bernd Fröhlich; James F. Dynes; Marco Lucamarini; Andrew W. Sharpe; Zhiliang Yuan; Andrew J. Shields

    2014-09-02T23:59:59.000Z

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realising multi-user QKD networks with resource efficiency and brings QKD closer to becoming the first widespread technology based on quantum physics.

  18. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUserHadoopon-package memory Using

  19. Memory Usage Considerations on Franklin

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembersMemory

  20. Modesto Memorial Hospital Space Heating Low Temperature Geothermal...

    Open Energy Info (EERE)

    Memorial Hospital Space Heating Low Temperature Geothermal Facility Jump to: navigation, search Name Modesto Memorial Hospital Space Heating Low Temperature Geothermal Facility...

  1. attention working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and working memory. (more) Mayer, Jamie F. 2010-01-01 30 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  2. associative memory models: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David 1971-01-01 2 COMPLEX ASSOCIATIVE MEMORY NEURAL NETWORK MODEL FOR INVARIANT PATTERN RECOGNITION Engineering Websites Summary: COMPLEX ASSOCIATIVE MEMORY NEURAL...

  3. associative memory model: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David 1971-01-01 2 COMPLEX ASSOCIATIVE MEMORY NEURAL NETWORK MODEL FOR INVARIANT PATTERN RECOGNITION Engineering Websites Summary: COMPLEX ASSOCIATIVE MEMORY NEURAL...

  4. Memorial University of Newfoundland Indirect Costs Report

    E-Print Network [OSTI]

    deYoung, Brad

    Memorial University of Newfoundland Indirect Costs Report 2012-13 The grant provided through the Government of Canada Indirect Costs Program (ICP) is essential to Memorial's research success. Funding and impact can be found in the following section. Total 2013 Indirect Costs Grant: $4,318,814 Management

  5. Cultural differences on the children's memory scale

    E-Print Network [OSTI]

    Cash, Deborah Dyer

    2009-05-15T23:59:59.000Z

    ) is an assessment instrument used to identify memory and learning deficits and strengths in children ages five through 16. This study investigated the impact of culture and parent educational level (PEL) on student performance on the Children’s Memory Scale using...

  6. How Minds Work Memories and Learning

    E-Print Network [OSTI]

    Memphis, University of

    & Learning 7 Types of Human Learning Requiring Distinct Mechanisms · Perceptual learning ­ Identify1 How Minds Work Memories and Learning Stan Franklin Computer Science Division & Institute for Intelligent Systems The University of Memphis #12;How Minds Work: Memory & Learning 2 Human Learning

  7. Learning and Memory Eric R. Kandel

    E-Print Network [OSTI]

    Ulanovsky, Nachum

    and memory we are interested in several questions. What are the major forms of P.1228 learning? What types of information about the environment are learned most easily? Do different types of learning give riseBack 62 Learning and Memory Eric R. Kandel Irving Kupfermann Susan Iversen BEHAVIOR IS THE RESULT

  8. Shape memory polymer actuator and catheter

    DOE Patents [OSTI]

    Maitland, Duncan J. (Pleasant Hill, CA); Lee, Abraham P. (Walnut Creek, CA); Schumann, Daniel L. (Concord, CA); Matthews, Dennis L. (Moss Beach, CA); Decker, Derek E. (Byron, CA); Jungreis, Charles A. (Pittsburgh, PA)

    2007-11-06T23:59:59.000Z

    An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

  9. Shape memory polymer actuator and catheter

    SciTech Connect (OSTI)

    Maitland, Duncan J.; Lee, Abraham P.; Schumann, Daniel L.; Matthews, Dennis L.; Decker, Derek E.; Jungreis, Charles A.

    2004-05-25T23:59:59.000Z

    An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

  10. Online Data Structures in External Memory

    E-Print Network [OSTI]

    Vitter, Jeffrey Scott

    1999-01-01T23:59:59.000Z

    /output communication (or I/O) between the external and internal memories. In this paper we discuss a variety of online data structures for external memory, some very old and some very new, such as hashing (for dictionaries), B-trees (for dictionaries and 1-D range...

  11. Tier identification (TID) for tiered memory characteristics

    DOE Patents [OSTI]

    Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

    2014-03-25T23:59:59.000Z

    A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

  12. Synaptic plasticity and memory Richard Kempter

    E-Print Network [OSTI]

    Kempter, Richard

    Synaptic plasticity and memory Richard Kempter 1,2,3 & Dietmar Schmitz 2,3 1 Institute in the central nervous system. In its most general form, the "synaptic plasticity and memory hypothesis" states, and that synaptic plasticity is both necessary and sufficient for the storage of information underlying

  13. Access Digital Library, Search, News and more

    E-Print Network [OSTI]

    Goodrich, Lisa V.

    [General] Access Digital Library, Search, News and more [Education] Access MyCourses content [Research] Access Digital Library, NCBI Blast and more [Personal] Access your portable bookmarks using My and 500 textbooks via the Digital Library, one click access to NCBI Blast sequence databases. [General

  14. Data Movement Dominates: Advanced Memory Technology to Address the Real Exascale Power Problem

    SciTech Connect (OSTI)

    Bergman, Keren

    2014-08-28T23:59:59.000Z

    Energy is the fundamental barrier to Exascale supercomputing and is dominated by the cost of moving data from one point to another, not computation. Similarly, performance is dominated by data movement, not computation. The solution to this problem requires three critical technologies: 3D integration, optical chip-to-chip communication, and a new communication model. The central goal of the Sandia led "Data Movement Dominates" project aimed to develop memory systems and new architectures based on these technologies that have the potential to lower the cost of local memory accesses by orders of magnitude and provide substantially more bandwidth. Only through these transformational advances can future systems reach the goals of Exascale computing with a manageable power budgets. The Sandia led team included co-PIs from Columbia University, Lawrence Berkeley Lab, and the University of Maryland. The Columbia effort of Data Movement Dominates focused on developing a physically accurate simulation environment and experimental verification for optically-connected memory (OCM) systems that can enable continued performance scaling through high-bandwidth capacity, energy-efficient bit-rate transparency, and time-of-flight latency. With OCM, memory device parallelism and total capacity can scale to match future high-performance computing requirements without sacrificing data-movement efficiency. When we consider systems with integrated photonics, links to memory can be seamlessly integrated with the interconnection network-in a sense, memory becomes a primary aspect of the interconnection network. At the core of the Columbia effort, toward expanding our understanding of OCM enabled computing we have created an integrated modeling and simulation environment that uniquely integrates the physical behavior of the optical layer. The PhoenxSim suite of design and software tools developed under this effort has enabled the co-design of and performance evaluation photonics-enabled OCM architectures on Exascale computing systems.

  15. Adiabatic Quantum Optimization for Associative Memory Recall

    E-Print Network [OSTI]

    Hadayat Seddiqi; Travis S. Humble

    2014-12-12T23:59:59.000Z

    Hopfield networks are a variant of associative memory that recall information stored in the couplings of an Ising model. Stored memories are fixed points for the network dynamics that correspond to energetic minima of the spin state. We formulate the recall of memories stored in a Hopfield network using energy minimization by adiabatic quantum optimization (AQO). Numerical simulations of the quantum dynamics allow us to quantify the AQO recall accuracy with respect to the number of stored memories and the noise in the input key. We also investigate AQO performance with respect to how memories are stored in the Ising model using different learning rules. Our results indicate that AQO performance varies strongly with learning rule due to the changes in the energy landscape. Consequently, learning rules offer indirect methods for investigating change to the computational complexity of the recall task and the computational efficiency of AQO.

  16. Temperature and electrical memory of polymer fibers

    SciTech Connect (OSTI)

    Yuan, Jinkai; Zakri, Cécile; Grillard, Fabienne; Neri, Wilfrid; Poulin, Philippe [Centre de Recherche Paul Pascal - CNRS, University of Bordeaux, Avenue Schweitzer, 33600 Pessac (France)

    2014-05-15T23:59:59.000Z

    We report in this work studies of the shape memory behavior of polymer fibers loaded with carbon nanotubes or graphene flakes. These materials exhibit enhanced shape memory properties with the generation of a giant stress upon shape recovery. In addition, they exhibit a surprising temperature memory with a peak of generated stress at a temperature nearly equal to the temperature of programming. This temperature memory is ascribed to the presence of dynamical heterogeneities and to the intrinsic broadness of the glass transition. We present recent experiments related to observables other than mechanical properties. In particular nanocomposite fibers exhibit variations of electrical conductivity with an accurate memory. Indeed, the rate of conductivity variations during temperature changes reaches a well defined maximum at a temperature equal to the temperature of programming. Such materials are promising for future actuators that couple dimensional changes with sensing electronic functionalities.

  17. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J. (Rochester, MN); Dozsa, Gabor (Ardsley, NY); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2012-04-17T23:59:59.000Z

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  18. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J; Dozsa, Gabor; Ratterman, Joseph D; Smith, Brian E

    2014-06-10T23:59:59.000Z

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  19. Random Curves by Conformal Welding

    E-Print Network [OSTI]

    K. Astala; P. Jones; A. Kupiainen; E. Saksman

    2009-12-17T23:59:59.000Z

    We construct a conformally invariant random family of closed curves in the plane by welding of random homeomorphisms of the unit circle given in terms of the exponential of Gaussian Free Field. We conjecture that our curves are locally related to SLE$(\\kappa)$ for $\\kappa<4$.

  20. Random Curves by Conformal Welding

    E-Print Network [OSTI]

    Astala, K; Kupiainen, A; Saksman, E

    2009-01-01T23:59:59.000Z

    We construct a conformally invariant random family of closed curves in the plane by welding of random homeomorphisms of the unit circle given in terms of the exponential of Gaussian Free Field. We conjecture that our curves are locally related to SLE$(\\kappa)$ for $\\kappa<4$.

  1. Better Randomness with Single Photons

    E-Print Network [OSTI]

    Oberreiter, Lukas

    2014-01-01T23:59:59.000Z

    Randomness is one of the most important resources in modern information science, since encryption founds upon the trust in random numbers. Since it is impossible to prove if an existing random bit string is truly random, it is relevant that they be generated in a trust worthy process. This requires specialized hardware for random numbers, for example a die or a tossed coin. But when all input parameters are known, their outcome might still be predicted. A quantum mechanical superposition allows for provably true random bit generation. In the past decade many quantum random number generators (QRNGs) were realized. A photonic implementation is described as a photon which impinges on a beam splitter, but such a protocol is rarely realized with non-classical light or anti-bunched single photons. Instead, laser sources or light emitting diodes are used. Here we analyze the difference in generating a true random bit string with a laser and with anti-bunched light. We show that a single photon source provides more r...

  2. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  3. access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  4. accessibility: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  5. Dynamic, Flexible, and Optimistic Access Control

    E-Print Network [OSTI]

    Peisert, Sean; Bishop, Matt

    2013-01-01T23:59:59.000Z

    and N. Dulay. Rumpole: A Flexible Break-Glass Access ControlDynamic, Flexible, and Optimistic Access Control Seannor are they intended to be flexible enough to reduce access

  6. Florida Capital Access Program (Florida)

    Broader source: Energy.gov [DOE]

    The Florida Capital Access Program, run by the Florida Department of Economic Development, is a loan portfolio insurance program enabling lenders to make loans to credit-worthy small businesses. ...

  7. Threshold phenomena and complexity: a statistical physics analysis of the random

    E-Print Network [OSTI]

    Duxbury, Phillip M.

    Threshold phenomena and complexity: a statistical physics analysis of the random Satis#12;ability problem. R#19;emi Monasson 1 Laboratoire de Physique Th#19;eorique de l'ENS, 75005 Paris. Abstract designed by physicists to deal with optimization or decision problems in an accessible language

  8. Access Business Systems | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Business Systems Dash provides access to select Argonne business systems without VPN. Dash is a secure platform, based on Citrix, for accessing Argonne business systems. Dash is...

  9. Random Deployment of Data Collectors for Serving Randomly-Located Sensors

    E-Print Network [OSTI]

    Kwon, Taesoo

    2011-01-01T23:59:59.000Z

    Recently, wireless communication industries have begun to extend their services to machine-type communication devices as well as to the user equipment. Such machine-type communication devices as meters and sensors need intermittent uplink resources to report measured or sensed data to their serving data collector. It is however hard to dedicate limited uplink resources to each of them. Thus, efficient service of a tremendous number of devices with low activities may consider simple random access as a solution. The data collectors receiving the measured data from many sensors simultaneously can successfully decode only signals with signal-to-interference-plus-noise-ratio (SINR) above a certain value. The main design issues for this environment become how many data collectors are needed, how much power sensor nodes transmit with, and how wireless channels affect the performance. This paper provides answers to those questions through a stochastic analysis based on a spatial point process and on simulations.

  10. Learning, Memory, and Education Lessons for the Classroom

    E-Print Network [OSTI]

    Rose, Michael R.

    Learning, Memory, and Education Lessons for the Classroom Michael A. Yassa, M.A. Ph.D. Candidate memory? How can we optimize individual learning? How do lessons from memory apply to the classroom? Brain individual learning? How do lessons from memory apply to the classroom? Brain-based learning: fact or fiction

  11. UTILIZING THE SHAPE MEMORY EFFECT TO ENABLE FLEXIBLE ELECTRONICS

    E-Print Network [OSTI]

    Petta, Jason

    UTILIZING THE SHAPE MEMORY EFFECT TO ENABLE FLEXIBLE ELECTRONICS Abhishek Raj The University under strain #12;The Shape Memory Effect Shape-memory polymer (SMP) orthopedic cast 4 #12;Polymer Glass Transition Temperature Yakacki CM, Willis S, Luders C, and Gall K. Deformation Limits in Shape-Memory

  12. Organizational Memory: Processes, Boundary Objects, and Trajectories Mark S. Ackerman

    E-Print Network [OSTI]

    Ackerman, Mark S.

    Organizational Memory: Processes, Boundary Objects, and Trajectories Mark S. Ackerman Information 7751 krys@watson.ibm.com Abstract The term organizational memory is due for an overhaul. Memory appears and analyzing organizational memory. 1. Introduction After nearly ten years of research, the term organizational

  13. Row Buffer Locality Aware Caching Policies for Hybrid Memories

    E-Print Network [OSTI]

    strengths · A hybrid memory system (DRAM-PCM) aims for best of both · Problem: How to place data between static energy (no refresh) 6 DRAM PCM CPU MC MC #12;Hybrid Memory · Design direction: DRAM as a cache memory devices? 8 DRAM PCM CPU MC MC #12;Outline · Background: Hybrid Memory Systems · Motivation: Row

  14. Characterization of the angular memory effect of scattered light in biological tissues

    E-Print Network [OSTI]

    Schott, Sam; Léger, Jean-Francois; Bourdieu, Laurent; Gigan, Sylvain

    2015-01-01T23:59:59.000Z

    High resolution optical microscopy is essential in neuroscience but suffers from scattering in biological tissues. It therefore grants access to superficial layers only. Recently developed techniques use scattered photons for imaging by exploiting angular correlations in transmitted light and could potentially increase imaging depths. But those correlations (`angular memory effect') are of very short range and, in theory, only present behind and not inside scattering media. From measurements on neural tissues and complementary simulations, we find that strong forward scattering in biological tissues can enhance the memory effect range (and thus the possible field-of-view) by more than an order of magnitude compared to isotropic scattering for $\\sim$1\\,mm thick tissue layers.

  15. Boston solar retrofits: studies of solar access and economics

    SciTech Connect (OSTI)

    Shapiro, M.

    1980-11-01T23:59:59.000Z

    Studies of solar access and solar retrofit economics are described for residential applications in the City of Boston. The study of solar access was based upon a random sample of 94 buildings; the sample was stratified to ensure a broad geographic representation from the city's various sections. Using available data on the heights and orientations of the sampled structures and surrounding buildings, each building's hourly access to sunlight was computed separately for the roof and south facing walls. These data were then aggregated by broad structural classifications in order to provide general measures of solar access. The second study was a comparative analysis of the economics of several solar heating and hot water systems. An active hot water system, installed using pre-assembled, commercially purchased equipment, was selected as a reference technology. A variety of measures of economic performance were computed for this system, with and without existing tax credits and under various financing arrangements. Next, a number of alternative approaches for solar space and water heating were identified from interviews with individuals and groups involved in solar retrofit projects in the Boston area. The objective was to identify approaches that many of those interviewed believe to be low-cost means of applying solar energy in residential settings. The approaches selected include thermal window covers, wall collectors, bread box water heaters, and sun spaces. Preliminary estimates of the performance of several representative designs were developed and the economics of these designs evaluated.

  16. Non-volatile memory for checkpoint storage

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.; Coteus, Paul W.; Gara, Alan; Heidelberger, Philip; Jeanson, Mark J.; Kopcsay, Gerard V.; Ohmacht, Martin; Takken, Todd E.

    2014-07-22T23:59:59.000Z

    A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, the non-volatile memory is a pluggable flash memory card.

  17. Securing non-volatile memory regions

    DOE Patents [OSTI]

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    2013-08-20T23:59:59.000Z

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  18. Coherent instabilities in random lasers

    SciTech Connect (OSTI)

    Andreasen, Jonathan; Sebbah, Patrick; Vanneste, Christian [Laboratoire de Physique de la Matiere Condensee, CNRS UMR 6622, Universite de Nice-Sophia Antipolis, Parc Valrose, F-06108, Nice Cedex 02 (France)

    2011-08-15T23:59:59.000Z

    A numerical study is presented of random lasers as a function of the pumping rate above the threshold for lasing. Depending on the leakiness of the system resonances, which is typically larger in random lasers compared to conventional lasers, we observe that the stationary lasing regime becomes unstable above a second threshold. Coherent instabilities are observed as self pulsation at a single frequency of the output intensity, population inversion, as well as the atomic polarization. We find these Rabi oscillations have the same frequency everywhere in the random laser despite the fact that the field intensity strongly depends on the spatial location.

  19. Laser annealing of amorphous NiTi shape memory alloy thin films to locally induce shape memory properties

    E-Print Network [OSTI]

    Laser annealing of amorphous NiTi shape memory alloy thin films to locally induce shape memory the results of a crystallization study on NiTi shape memory thin films in which amorphous films are annealed by a scanning laser. This technique has the advantage that shape memory properties can be spatially distributed

  20. Random Selection for Drug Screening

    SciTech Connect (OSTI)

    Center for Human Reliability Studies

    2007-05-01T23:59:59.000Z

    Sampling is the process of choosing some members out of a group or population. Probablity sampling, or random sampling, is the process of selecting members by chance with a known probability of each individual being chosen.

  1. Randomized algorithms for reliable broadcast

    E-Print Network [OSTI]

    Vaikuntanathan, Vinod

    2009-01-01T23:59:59.000Z

    In this thesis, we design randomized algorithms for classical problems in fault tolerant distributed computing in the full-information model. The full-information model is a strong adversarial model which imposes no ...

  2. RANDOM WALK IN RANDOM ENVIRONMENT IN A TWO-DIMENSIONAL STRATIFIED MEDIUM WITH ORIENTATIONS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RANDOM WALK IN RANDOM ENVIRONMENT IN A TWO-DIMENSIONAL STRATIFIED MEDIUM WITH ORIENTATIONS ALEXIS oriented lattices, random walk in random environment, random walk in random scenery, functional limit-00634636,version2-24Nov2012 #12;RWRE IN A STRATIFIED ORIENTED MEDIUM 2 We denote by E and E

  3. Orthopaedic applications of ferromagnetic shape memory alloys

    E-Print Network [OSTI]

    Guo, Weimin, M. Eng. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    Ferromagnetic shape memory alloys (FSMAs) are a new class of magnetic field-actuated active materials with no current commercial applications. By applying a magnetic field of around 0.4 T, they can exert a stress of ...

  4. Thermomechanical modeling of a shape memory polymer 

    E-Print Network [OSTI]

    Ghosh, Pritha B.

    2009-05-15T23:59:59.000Z

    The aim of this work is to demonstrate a Helmholtz potential based approach for the development of the constitutive equations for a shape memory polymer undergoing a thermomechanical cycle. The approach is motivated by the use of a simple spring...

  5. ACOHERENT SHARED MEMORY Derek R. Hower

    E-Print Network [OSTI]

    Hill, Mark D.

    ACOHERENT SHARED MEMORY by Derek R. Hower A dissertation submitted in partial fulfillment. Hower 2012 All Rights Reserved #12;i Abstract The computer industry has entered an era where energy

  6. Thermomechanical modeling of a shape memory polymer

    E-Print Network [OSTI]

    Ghosh, Pritha B.

    2009-05-15T23:59:59.000Z

    The aim of this work is to demonstrate a Helmholtz potential based approach for the development of the constitutive equations for a shape memory polymer undergoing a thermomechanical cycle. The approach is motivated by the use of a simple spring...

  7. Size Effects in Ferromagnetic Shape Memory Alloys

    E-Print Network [OSTI]

    Ozdemir, Nevin

    2012-07-16T23:59:59.000Z

    effects in these mechanisms has both scientific and technological relevance. Superelastic behavior of Ni54Fe19Ga27 shape memory alloy single crystalline pillars was studied under compression as a function of pillar diameter. Multiple pillars...

  8. Funes the Memorious by Jorge Luis Borges

    E-Print Network [OSTI]

    Funes, who, after falling off his horse and receiving a bad head injury, acquired the amazing talent on the morning of April 30, 1882, and he could compare them in his memory with the veins in the marbled binding

  9. Housing memory: architecture, materiality and time 

    E-Print Network [OSTI]

    Spanou, Sofia-Irini

    2008-01-01T23:59:59.000Z

    , and cognition – and their intricate relationships with material culture, especially architecture, landscapes, practical action and social life, the aim is to suggest a theoretical and methodological framework within which to explore how memory of the past...

  10. Video Stores, Media Technologies, and Memory

    E-Print Network [OSTI]

    Wilken, Rowan

    2010-01-01T23:59:59.000Z

    both for analogue and digital media (e.g. , memory loss duefrom all forms of digital media usage (broadband downloadingin relation to digital media is signal compression and audio

  11. Aggressive children's memory for attachment relevant information

    E-Print Network [OSTI]

    Collie, Claire Futamase

    2004-09-30T23:59:59.000Z

    This study examined a measure of children's memory for information from a story about a hypothetical mother and child, the Story Task, as a potential tool to delineate subtypes of aggressive children based on the pattern of information processing...

  12. Page-Differential Logging: An Efficient and DBMS-independent Approach for Storing Data into Flash Memory

    E-Print Network [OSTI]

    Kim, Yi-Reun; Song, Il-Yeol

    2010-01-01T23:59:59.000Z

    Flash memory is widely used as the secondary storage in lightweight computing devices due to its outstanding advantages over magnetic disks. Flash memory has many access characteristics different from those of magnetic disks, and how to take advantage of them is becoming an important research issue. There are two existing approaches to storing data into flash memory: page-based and log-based. The former has good performance for read operations, but poor performance for write operations. In contrast, the latter has good performance for write operations when updates are light, but poor performance for read operations. In this paper, we propose a new method of storing data, called page-differential logging, for flash-based storage systems that solves the drawbacks of the two methods. The primary characteristics of our method are: (1) writing only the difference (which we define as the page-differential) between the original page in flash memory and the up-to-date page in memory; (2) computing and writing the pag...

  13. Statistical Performance Modeling of SRAMs 

    E-Print Network [OSTI]

    Zhao, Chang

    2011-02-22T23:59:59.000Z

    Yield analysis is a critical step in memory designs considering a variety of performance constraints. Traditional circuit level Monte-Carlo simulations for yield estimation of Static Random Access Memory (SRAM) cell is quite time consuming due...

  14. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L; Sexton, James C

    2013-10-22T23:59:59.000Z

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  15. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L.; Sexton, James C.

    2013-01-22T23:59:59.000Z

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  16. Post polymerization cure shape memory polymers

    SciTech Connect (OSTI)

    Wilson, Thomas S; Hearon, Michael Keith; Bearinger, Jane P

    2014-11-11T23:59:59.000Z

    This invention relates to chemical polymer compositions, methods of synthesis, and fabrication methods for devices regarding polymers capable of displaying shape memory behavior (SMPs) and which can first be polymerized to a linear or branched polymeric structure, having thermoplastic properties, subsequently processed into a device through processes typical of polymer melts, solutions, and dispersions and then crossed linked to a shape memory thermoset polymer retaining the processed shape.

  17. Associative memory in phasing neuron networks

    SciTech Connect (OSTI)

    Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

    2014-01-01T23:59:59.000Z

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  18. Identity, Credential, and Access Management (ICAM)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-02-19T23:59:59.000Z

    To establish requirements and responsibilities for DOE identity, credential, and access management program.

  19. LOCH: Open Access Implementation Responsibility Matrix 

    E-Print Network [OSTI]

    Krzak, Anna

    2015-02-05T23:59:59.000Z

    Draft Responsibility Matrix for College of Medicine and Veterinary Medicine for REF Open Access requirements implementation.

  20. 2020 Vision The Trinity Access Programmes

    E-Print Network [OSTI]

    O'Mahony, Donal E.

    2020 Vision The Trinity Access Programmes Strategic Plan to 2020 #12;2020 VISION - THE TRINITY ACCESS PROGRAMMES STRATEGIC PLAN TO 20202020 VISION - THE TRINITY ACCESS PROGRAMMES STRATEGIC PLAN TO 2020 Trinity Access Programmes "Our vision for 2014 is of a university providing further leadership

  1. Chaining direct memory access data transfer operations for compute nodes in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN)

    2010-09-28T23:59:59.000Z

    Methods, systems, and products are disclosed for chaining DMA data transfer operations for compute nodes in a parallel computer that include: receiving, by an origin DMA engine on an origin node in an origin injection FIFO buffer for the origin DMA engine, a RGET data descriptor specifying a DMA transfer operation data descriptor on the origin node and a second RGET data descriptor on the origin node, the second RGET data descriptor specifying a target RGET data descriptor on the target node, the target RGET data descriptor specifying an additional DMA transfer operation data descriptor on the origin node; creating, by the origin DMA engine, an RGET packet in dependence upon the RGET data descriptor, the RGET packet containing the DMA transfer operation data descriptor and the second RGET data descriptor; and transferring, by the origin DMA engine to a target DMA engine on the target node, the RGET packet.

  2. Conflict-Free Star-Access in Parallel Memory Systems Sajal K. Das

    E-Print Network [OSTI]

    Finocchi, Irene

    popular interconnection network topologies. The proposed conflict-free mappings on these graphs are fast and Distributed Processing Symposium (IPDPS'04), Santa Fe, New Mexico, April 2004 [15]. § Part of this work

  3. SCHEDULING FOR MINIMIZING THE NUMBER OF MEMORY ACCESSES IN LOW POWER

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    and circuit levels [1]. Most of the optimization is based on reducing the switch­ ing activity, since power also be reduced by transformations such as subexpression elimination, operation substitution, resource utilization, transition activity reduction etc [2]. Most of the previous work on power optimization has been

  4. AI-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous Incremental Checkpointing

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    the last years in all fields of science and industry. They pro- vide an indispensable tool for new insight Bogdan Nicolae IBM Research Dublin, Ireland bogdan.nicolae@ie.ibm.com Franck Cappello Joint Laboratory for Petascale Computing INRIA, France University of Illinois at Urbana-Champaign, USA fci@lri.fr ABSTRACT

  5. Energy-Performance Trade-offs for Spatial Access Methods on Memory-Resident Data

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    , weight, cost and diverse oper- ating conditions. It is widely recognized that battery energy is, perhaps of the system architecture, and the software has a key role to play in conserving the battery energy on mobile devices (PDAs, laptops, etc.) can be subject to very different operating conditions com- pared

  6. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  7. LARGE FORCE SHAPE MEMORY ALLOY LINEAR ACTUATOR JOS R. SANTIAGO ANADN

    E-Print Network [OSTI]

    Florida, University of

    LARGE FORCE SHAPE MEMORY ALLOY LINEAR ACTUATOR By JOSÉ R. SANTIAGO ANADÓN A THESIS PRESENTED ............................................................................................................1 Shape Memory Basics........................................................................................... 5 The Shape Memory Effect

  8. Open Source in accessibility analyses Open Source in accessibility analyses

    E-Print Network [OSTI]

    Köbben, Barend

    petrol station accessibility in Germany by Stefan Neumeier Johann Heinrich von Thünen-Institut, Federal The paper relates two closely intertwined story lines. A socioeconomic one concentrating on street petrol- sibility of street petrol stations as one core service of general interest important for the overall

  9. California State University, Fullerton Human Resources Access Request Form

    E-Print Network [OSTI]

    de Lijser, Peter

    Resources Access Request Form ** CISO Signature Date Employee Name Date Date I certify that this access

  10. Localization for Branching Random Walks in Random Environment

    E-Print Network [OSTI]

    Yueyun Hu; Nobuo Yoshida

    2007-12-05T23:59:59.000Z

    We consider branching random walks in $d$-dimensional integer lattice with time-space i.i.d. offspring distributions. This model is known to exhibit a phase transition: If $d \\ge 3$ and the environment is "not too random", then, the total population grows as fast as its expectation with strictly positive probability. If,on the other hand, $d \\le 2$, or the environment is ``random enough", then the total population grows strictly slower than its expectation almost surely. We show the equivalence between the slow population growth and a natural localization property in terms of "replica overlap". We also prove a certain stronger localization property, whenever the total population grows strictly slower than its expectation almost surely.

  11. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2012-05-29T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  12. Shape memory system with integrated actuation using embedded particles

    SciTech Connect (OSTI)

    Buckley, Patrick R; Maitland, Duncan J

    2014-04-01T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  13. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2009-09-22T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  14. Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

  15. Missing working memory deficit in dyslexia: children writing from memory Erlijn van Genuchtena,b

    E-Print Network [OSTI]

    Cheng, Peter

    Missing working memory deficit in dyslexia: children writing from memory Erlijn van Genuchtena,b (e of writing processes of children with dyslexia, in order to examine the relationship between WM and writing. An experiment was used in which children with dyslexia, and chronological age-matched and reading age

  16. Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms

    E-Print Network [OSTI]

    Jin, Ruoming

    Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms Ruoming that are applicable to a number of common data mining algorithms. These techniques are incorpo- rated in a middleware-alone implementations of individual parallel data mining algorithms. Over- all, our work shows that a common framework

  17. Homogeneous Random Measures and Strongly Supermedian Kernels

    E-Print Network [OSTI]

    Fitzsimmons, Patrick J.

    . Keywords and phrases: Homogeneous random measure, additive functional, Kuznets* *ov measure, potential

  18. open access journal Public Health

    E-Print Network [OSTI]

    Oakley, Jeremy

    open access journal Journal of Public Health in AfricaeISSN 2038-9930 i www the Journal of Public Health in Africa is a peer-reviewed, electronic quarterly, that focuses on health issues in the African continent. The journal editors seek high quality original articles on public health related issues

  19. Random-walk in Beta-distributed random environment

    E-Print Network [OSTI]

    Guillaume Barraquand; Ivan Corwin

    2015-03-26T23:59:59.000Z

    We introduce an exactly-solvable model of random walk in random environment that we call the Beta RWRE. This is a random walk in $\\mathbb{Z}$ which performs nearest neighbour jumps with transition probabilities drawn according to the Beta distribution. We also describe a related directed polymer model, which is a limit of the $q$-Hahn interacting particle system. Using a Fredholm determinant representation for the quenched probability distribution function of the walker's position, we are able to prove second order cube-root scale corrections to the large deviation principle satisfied by the walker's position, with convergence to the Tracy-Widom distribution. We also show that this limit theorem can be interpreted in terms of the maximum of strongly correlated random variables: the positions of independent walkers in the same environment. The zero-temperature counterpart of the Beta RWRE can be studied in a parallel way. We also prove a Tracy-Widom limit theorem for this model.

  20. Random sequential adsorption of tetramers

    E-Print Network [OSTI]

    Micha? Cie?la

    2013-06-12T23:59:59.000Z

    Adsorption of tetramer built of four identical spheres was studied numerically using the Random Sequential Adsorption (RSA) algorithm. Tetramers were adsorbed on a two dimensional, flat and homogeneous surface. Two different models of the adsorbate were investigated: a rhomboid and a square one; monomer centres were put on vertices of rhomboids and squares, respectively. Numerical simulations allow to establish the maximal random coverage ratio as well as the Available Surface Function (ASF), which is crucial for determining kinetics of the adsorption process. These results were compared with data obtained experimentally for KfrA plasmid adsorption. Additionally, the density autocorrelation function was measured.

  1. RANDOM WALK IN RANDOM ENVIRONMENT IN A TWO-DIMENSIONAL STRATIFIED MEDIUM WITH ORIENTATIONS

    E-Print Network [OSTI]

    Pène, Françoise

    RANDOM WALK IN RANDOM ENVIRONMENT IN A TWO-DIMENSIONAL STRATIFIED MEDIUM WITH ORIENTATIONS ALEXIS walk in random environment, random walk in random scenery, functional limit theorem, transience. This research was supported by the french ANR project MEMEMO2. 1 #12;RWRE IN A STRATIFIED ORIENTED MEDIUM 2 Our

  2. LDRD final report : managing shared memory data distribution in hybrid HPC applications.

    SciTech Connect (OSTI)

    Merritt, Alexander M. (Georgia Institute of Technology, Atlanta, GA); Pedretti, Kevin Thomas Tauke

    2010-09-01T23:59:59.000Z

    MPI is the dominant programming model for distributed memory parallel computers, and is often used as the intra-node programming model on multi-core compute nodes. However, application developers are increasingly turning to hybrid models that use threading within a node and MPI between nodes. In contrast to MPI, most current threaded models do not require application developers to deal explicitly with data locality. With increasing core counts and deeper NUMA hierarchies seen in the upcoming LANL/SNL 'Cielo' capability supercomputer, data distribution poses an upper boundary on intra-node scalability within threaded applications. Data locality therefore has to be identified at runtime using static memory allocation policies such as first-touch or next-touch, or specified by the application user at launch time. We evaluate several existing techniques for managing data distribution using micro-benchmarks on an AMD 'Magny-Cours' system with 24 cores among 4 NUMA domains and argue for the adoption of a dynamic runtime system implemented at the kernel level, employing a novel page table replication scheme to gather per-NUMA domain memory access traces.

  3. Experimental Evaluation of the Rheological Properties of Veriflex Shape Memory Polymer

    E-Print Network [OSTI]

    Jan Klesa; Vincent Placet; Emmanuel Foltete; Manuel Collet

    2009-09-16T23:59:59.000Z

    Shape memory polymers (SMPs) are materials with a great potential for future use in smart materials and structures. When heated from cold state (below the transformation temperature, which can either be the glass transition temperature or the melting temperature of the polymer) to hot state (above the transformation temperature) they undergo transformation which can be compared with martensitic transformation of shape memory alloys. This process induces great changes of the mechanical properties and some shape memory phenomenon can be observed. This study is an experimental evaluation of the mechanical properties of SMP Veriflex under different test conditions. Veriflex was chosen because of its easy accessibility. Furthermore its properties are similar to epoxy resins which make it very suitable for usage in a wide variety of technical applications. Dynamic mechanical analysis (DMA) was used to determine evolution of the viscoelastic properties versus temperature and frequency under cyclic harmonic loading. The glass transition temperature clearly appears in a range from 45\\degree C to 60\\degree C depending on loading frequency. The glass transition is noticeably marked by an impressive decrease in the storage modulus of about 4 decades. The master curve of Veriflex was created and allows the time-temperature superposition to be constructed for this material. Thermo-mechanical working cycle of SMP with 100% elongation was also experimentally tested. Finally results from all these experimental investigations were used to design a demonstrator showing the possibility of application in engineering and especially for shape control.

  4. Supersymmetry in Random Matrix Theory

    E-Print Network [OSTI]

    Thomas Guhr

    2010-05-06T23:59:59.000Z

    Supersymmetry is nowadays indispensable for many problems in Random Matrix Theory. It is presented here with an emphasis on conceptual and structural issues. An introduction to supermathematics is given. The Hubbard-Stratonovich transformation as well as its generalization and superbosonization are explained. The supersymmetric non-linear sigma model, Brownian motion in superspace and the color-flavor transformation are discussed.

  5. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    1998-01-01T23:59:59.000Z

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  6. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, W.L.; Vanheusden, K.J.R.; Fleetwood, D.M.; Devine, R.A.B.

    1998-11-03T23:59:59.000Z

    An electrically written memory element is disclosed utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element. 19 figs.

  7. Ni-Mn-Ga shape memory nanoactuation

    SciTech Connect (OSTI)

    Kohl, M., E-mail: manfred.kohl@kit.edu; Schmitt, M.; Krevet, B. [Karlsruhe Institute of Technology, IMT, P.O. Box 3640, 76021 Karlsruhe (Germany); Backen, A.; Schultz, L. [IFW Dresden, P.O. Box 270116, 01171 Dresden (Germany); Fähler, S. [IFW Dresden, P.O. Box 270116, 01171 Dresden (Germany); Technische Universität Chemnitz, Institute of Physics, 09107 Chemnitz (Germany)

    2014-01-27T23:59:59.000Z

    To probe finite size effects in ferromagnetic shape memory nanoactuators, double-beam structures with minimum dimensions down to 100?nm are designed, fabricated, and characterized in-situ in a scanning electron microscope with respect to their coupled thermo-elastic and electro-thermal properties. Electrical resistance and mechanical beam bending tests demonstrate a reversible thermal shape memory effect down to 100?nm. Electro-thermal actuation involves large temperature gradients along the nanobeam in the order of 100?K/?m. We discuss the influence of surface and twin boundary energies and explain why free-standing nanoactuators behave differently compared to constrained geometries like films and nanocrystalline shape memory alloys.

  8. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    2000-01-01T23:59:59.000Z

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  9. Structural Thermomechanical Models for Shape Memory Alloy Components

    E-Print Network [OSTI]

    Rao, Ashwin

    2014-04-18T23:59:59.000Z

    Thermally responsive shape memory alloys (SMA) demonstrate interesting properties like shape memory effect (SME) and superelasticity (SE). SMA components in the form of wires, springs and beams typically exhibit complex, nonlinear hysteretic...

  10. Early remodeling of the neocortex upon episodic memory encoding

    E-Print Network [OSTI]

    Ericsson, M.

    Understanding the mechanisms by which long-term memories are formed and stored in the brain represents a central aim of neuroscience. Prevailing theory suggests that long-term memory encoding involves early plasticity ...

  11. Intellectual property strategy : analysis of the flash memory industry

    E-Print Network [OSTI]

    Ogura, Tomoko H

    2006-01-01T23:59:59.000Z

    This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

  12. Main Memory Management for Persistence Antony L. Hosking

    E-Print Network [OSTI]

    Hosking, Antony

    Reachability-based persistence imposes new requirements for main memory management in general, and garbage col memory heap. However, objects may survive from one run of a program to the next, by virtue of being

  13. Linking dopaminergic physiology to working memory related neural circuitry

    E-Print Network [OSTI]

    Bolton, Andrew D. (Andrew Donald)

    2014-01-01T23:59:59.000Z

    Working memory is the ability to hold information "online" over a delay in order to perform a task. This kind of memory is thought to be encoded in the brain by persistent neural activity that outlasts the presentation of ...

  14. Reversible neural inactivation reveals hippocampal particin several memory processesipation 

    E-Print Network [OSTI]

    Riedel, G; Micheau, J; Lam, A G M; Roloff, E.v.L.; Martin, Stephen J; Bridge, H; de Hoz, L; Poeschel, B; McCulloch, J; Morris, Richard G M

    Studies of patients and animals with brain lesions have implicated the hippocampal formation in spatial, declarative/relational and episodic types of memory. These and other types of memory consist of a series of ...

  15. Development of Superelastic Effects in Ferrous Shape Memory Alloy

    E-Print Network [OSTI]

    Olson, Scott Michael

    SE: Superelastic effect SME: Shape memory effect Nitinol:shape memory effect, (SME), whereby the material returns toelastic strain. In SMAs, the SME and SE are based on the

  16. Curating Memory: 9/11 Commemoration and Foucault's Archive 

    E-Print Network [OSTI]

    Rowe, Sara 1988-

    2012-08-17T23:59:59.000Z

    This study of commemoration of 9/11 on the 10th anniversary is performed at the intersection of public memory and rhetorical studies. Examining the role of the individual within public memory, this study furthers both ...

  17. Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture

    E-Print Network [OSTI]

    Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture Raphael compatible. Keywords: transactional memory, game theory, multicore architecture, concurrency, contention management, mechanism design, human factors 1. Introduction In traditional single core architecture

  18. Method for refreshing a non-volatile memory

    SciTech Connect (OSTI)

    Riekels, James E. (New Hope, MN); Schlesinger, Samuel (Aventura, FL)

    2008-11-04T23:59:59.000Z

    A non-volatile memory and a method of refreshing a memory are described. The method includes allowing an external system to control refreshing operations within the memory. The memory may generate a refresh request signal and transmit the refresh request signal to the external system. When the external system finds an available time to process the refresh request, the external system acknowledges the refresh request and transmits a refresh acknowledge signal to the memory. The memory may also comprise a page register for reading and rewriting a data state back to the memory. The page register may comprise latches in lieu of supplemental non-volatile storage elements, thereby conserving real estate within the memory.

  19. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean Water Innovations

  20. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Become agovEducationWelcome FinancialScience at

  1. Overview of Quantum Memory Protection and Adiabaticity Induction by Fast-Signal Control

    E-Print Network [OSTI]

    Jun Jing; Lian-Ao Wu

    2014-12-04T23:59:59.000Z

    A quantum memory or information processing device is subject to disturbance from its surrounding environment or inevitable leakage due to its contact with other systems. To tackle these problems, several control protocols have been proposed for quantum memory or storage. Among them, the fast-signal control or dynamical decoupling based on external pulse sequences provides a prevailing strategy aimed at suppressing decoherence and preventing the target systems from the leakage or diffusion process. In this paper, we review the applications of this protocol in protecting quantum memory under the non-Markovian dissipative noise and maintaining systems on finite speed adiabatic passages without leakage there-from. We analyze leakage and control perturbative and nonperturbative dynamical equations including second-order master equation, quantum-state-diffusion equation, and one-component master equation derived from Feshbach PQ-partitioning technique. It turns out that the quality of fast-modulated signal control is insensitive to configurations of the applied pulse sequences. Specifically, decoherence and leakage will be greatly suppressed as long as the control sequence is able to effectively shift the system beyond the bath cutoff frequency, almost independent of the details of the control sequences which could be ideal pulses, regular rectangular pulses, random pulses and even noisy pulses.

  2. Site Access Policy | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Access Policy All visitors to Argonne require appropriate authorization before they are allowed on the Argonne site. For information regarding site access for a U.S. citizen...

  3. City of Boulder- Solar Access Ordinance

    Broader source: Energy.gov [DOE]

    The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

  4. Metropolitan Accessibility and Transportation Sustainability:Sustainability

    E-Print Network [OSTI]

    Papalambros, Panos

    Metropolitan Accessibility and Transportation Sustainability:Sustainability: Comparative Reduce (fulfillment of)Promote Sustainability: Meet needs of (fulfillment of) needs present Institute SMART Sustainable Mobility and Accessibility Research andSMART Sustainable Mobility

  5. Alexandria Digital Library Project Content Access Characterization

    E-Print Network [OSTI]

    Janée, Greg

    Alexandria Digital Library Project Content Access Characterization in Digital Libraries Greg Janée · James Frew · David Valentine University of California, Santa Barbara #12;Alexandria Digital Library environments e.g., GIS #12;Alexandria Digital Library Project Janée, Frew, Valentine · Content Access

  6. Argonne Site Access | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Site Access Argonne National Laboratory is a controlled-access facility. You will need a visitor's pass or a user badge to enter the Argonne campus. You must notify us of...

  7. Fast Access Data Acquisition System

    SciTech Connect (OSTI)

    Dr. Vladimir Katsman

    1998-03-17T23:59:59.000Z

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  8. Subject Access to Your Information 

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Subject Access to Your Information Sandy Tucker Texas A&M University Libraries August 1, 2006 Second International Symposium on Transportation Technology Transfer Introduction You have packages ? books, pamphlets, files, electronic documents. You... have records of packages ? cards or an online database. Other? We?re talking about adding subject information to the records of packages. Specifically, we?ll talk about using a ?controlled vocabulary.? Controlled Vocabulary Using a fixed list...

  9. Life-cycle assessment of NAND flash memory

    E-Print Network [OSTI]

    Boyd, Sarah; Horvath, A; Dornfeld, David

    2010-01-01T23:59:59.000Z

    global warming potential (GWP) of ?ash memory are abatement of per?uorinated compounds (PFCs) and reduction of electricity-

  10. Making Memorial Day Plans? Be Sure They're Efficient

    Broader source: Energy.gov [DOE]

    Useful tips from Energy Savers - from cooking, to entertaining, to driving - how to stay energy efficient this Memorial Day weekend.

  11. Development of Superelastic Effects in Ferrous Shape Memory Alloy

    E-Print Network [OSTI]

    Olson, Scott Michael

    titanium shape memory alloy SIM: Stress-induced martensite LOM: Light optical microscopy SEM: Scanning electron microscope EDS: Energy

  12. Shape memory and pseudoelasticity in metal nanowires.

    SciTech Connect (OSTI)

    Zimmerman, Jonathan A.; Park, Harold S.; Gall, Ken

    2005-07-01T23:59:59.000Z

    Structural reorientations in metallic fcc nanowires are controlled by a combination of size, thermal energy, and the type of defects formed during inelastic deformation. By utilizing atomistic simulations, we show that certain fcc nanowires can exhibit both shape memory and pseudoelastic behavior. We also show that the formation of defect-free twins, a process related to the material stacking fault energy, nanometer size scale, and surface stresses is the mechanism that controls the ability of fcc nanowires of different materials to show a reversible transition between two crystal orientations during loading and thus shape memory and pseudoelasticity.

  13. Shape memory behavior of ultrafine grained NiTi and TiNiPd shape memory alloys

    E-Print Network [OSTI]

    Kockar, Benat

    2009-05-15T23:59:59.000Z

    The cyclic instability in shape memory characteristics of NiTi-based shape memory alloys (SMAs), such as transformation temperatures, transformation and irrecoverable strains and transformation hysteresis upon thermal and mechanical cycling limits...

  14. The nature of the working memory system underlying language processing and its relationship to the long-term memory system

    E-Print Network [OSTI]

    Fedorenko, Evelina Georgievna

    2007-01-01T23:59:59.000Z

    This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

  15. Evaluating Memory Energy Efficiency in Parallel I/O Workloads

    E-Print Network [OSTI]

    Zhu, Yifeng

    Evaluating Memory Energy Efficiency in Parallel I/O Workloads Jianhui Yue,Yifeng Zhu , Zhao Cai the ever- widening gap between disk and processor speeds, memory energy efficiency becomes an increasingly management policies heavily influence the overall memory energy efficiency. In partic- ular, under the same

  16. Reinforcement Learning for Active Length Control of Shape Memory Alloys

    E-Print Network [OSTI]

    Valasek, John

    Reinforcement Learning for Active Length Control of Shape Memory Alloys Kenton Kirkpatrick John Valasek Aerospace Engineering Department Texas A&M University AIAA GNC Conference 21 August 2008 Honolulu;Kirkpatrick & Valasek - 5 Shape Memory Alloys (SMA) Metallic Alloys used as actuators Shape Memory Effect

  17. An Instance Theory of Attention and Memory Gordon D. Logan

    E-Print Network [OSTI]

    Logan, Gordon D.

    of attention and memory (ITAM) is presented that integrates formal theories of attention and memory phenomena; objects are categorized by attending to them. ITAM incorporates each of its ancestors as a special case of this heritage, I call the new theory the instance theory of attention and memory (ITAM). Its ancestors on each

  18. Using Multilevel Phase Change Memory to Build Data Storage: A

    E-Print Network [OSTI]

    Zhang, Tong

    cache. It is well known that phase-change material resistance drift gradually reduces memory deviceUsing Multilevel Phase Change Memory to Build Data Storage: A Time-Aware System Design Perspective per cell (MLC) phase-change memory (PCM) in data storage systems such as solid-state disk and disk

  19. Phase Change Memory An Architecture and Systems Perspective

    E-Print Network [OSTI]

    Lee, Benjamin C.

    #12;Phase Change Memory Store data within phase change material [Ovshinsky68] Set phase via currentPhase Change Memory An Architecture and Systems Perspective Benjamin Lee Computer Architecture lifetime 1 B.Lee et al. "Architecting phase change memory as a scalable DRAM alternative." ISCA-36

  20. Coding-based Energy Minimization for Phase Change Memory

    E-Print Network [OSTI]

    -1-4503-1199-1/12/06 ...$10.00. states of the phase-change material. In one state, the ma- terial is amorphous with a highCoding-based Energy Minimization for Phase Change Memory Azalia Mirhoseini Electrical and Computer Phase Change Memory write energy. Our method minimizes the energy required for memory rewrites

  1. Guide wire extension for shape memory polymer occlusion removal devices

    DOE Patents [OSTI]

    Maitland, Duncan J. (Pleasant Hill, CA); Small, IV, Ward (Livermore, CA); Hartman, Jonathan (Sacramento, CA)

    2009-11-03T23:59:59.000Z

    A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

  2. Design of Innovative Thermoset Shape Memory Polyurethanes (SMPUs)

    E-Print Network [OSTI]

    Dalang, Robert C.

    Design of Innovative Thermoset Shape Memory Polyurethanes (SMPUs) Author: Yaobo Ding Supervisor, École Polytechnique Fédérale de Lausanne Email: yaobo.ding@epfl.ch Motivation Shape memory polymers-based shape memory polymers, and microfludic devices is one of them. Low cost SMPUs for microfluidics

  3. Shape Memory Polymer Patrick T. Mather,1,2

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape Memory Polymer Research Patrick T. Mather,1,2 Xiaofan Luo,1,2 and Ingrid A. Rousseau3 1-145419 Copyright c 2009 by Annual Reviews. All rights reserved 1531-7331/09/0804-0445$20.00 Key Words shape memory witnessed significant advances in the field of shape memory polymers (SMPs) with the elucidation of new

  4. Introduction Nickel Titanium exhibits shape-memory or

    E-Print Network [OSTI]

    Dalang, Robert C.

    Introduction Nickel Titanium exhibits shape-memory or superelastic effect coupled with good of the implant. Figure 1: (a) Shape-memory effect. (b) Superelastic effect Processing and Characterization of NiTi Shape-Memory Alloys with 3D Interconnected Porosity Antoine Emery Supervisors: Prof. A. Mortensen (EPFL

  5. Shape Memory Assisted Self-Healing Coating Xiaofan Luo

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape Memory Assisted Self-Healing Coating Xiaofan Luo and Patrick T. Mather* Department and characterization of new shape memory assisted self- healing (SMASH) coatings. The coatings feature a phase in a shape memory epoxy matrix. Mechanical damage to the coating can be self-healed via heating, which

  6. Toward Evaluation of Shape Memory Alloy Actuators for Endosurgery

    E-Print Network [OSTI]

    Toward Evaluation of Shape Memory Alloy Actuators for Endosurgery Kaari Koehn and Shahram Payandeh the movements of MIS tools. One such altemative could be the e:lectromechanical shape memory alloy actuators as in teleoperation. Nickel-Titanium (NiTi)alloy is a commerciallyavailable member of the family of Shape Memory

  7. Dynamic Buckling and Recovery of Thin Cylindrical Shape Memory Shells

    E-Print Network [OSTI]

    Nemat-Nasser, Sia

    Dynamic Buckling and Recovery of Thin Cylindrical Shape Memory Shells Mahmoud Reza Amini and Sia@ucsd.edu Phone: (858) 534-6525 FAX: (858) 534-2727 Abstract Shape-memory alloys can sustain relatively large consisting of shape-memory alloys in order to understand the response when used as the core of the sandwich

  8. Shape memory and nanostructure in poly(norbornyl-POSS) copolymers

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape memory and nanostructure in poly(norbornyl-POSS) copolymers HG Jeon,1 * PT Mather2 and TS Blvd., Edwards AFB, CA 93524­7680, USA Abstract: The microstructure and shape-memory properties by rapid quenching in LN2. Shape-memory properties of such drawn samples were explored by measuring

  9. A shape memory-based multifunctional structural actuator panel

    E-Print Network [OSTI]

    Wadley, Haydn

    A shape memory-based multifunctional structural actuator panel Dana M. Elzey *, Aarash Y.N. Sofla significant load. The shape change is effected by shape memory alloy face sheet elements, which exploit a ``one-way'' shape memory effect only. Unlike other related designs, no external or bias forces

  10. Characterization of Shape Memory Alloys Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    Characterization of Shape Memory Alloys Using Artificial Neural Networks James V. Henrickson , Kenton Kirkpatrick, and John Valasek Texas A&M University, College Station, Texas 77843-3141 Shape memory of shape memory alloys, however, is often com- plicated by their hysteretic, non-linear, thermo

  11. Combining Pattern Instability and Shape-Memory Hysteresis for Phononic

    E-Print Network [OSTI]

    Combining Pattern Instability and Shape-Memory Hysteresis for Phononic Switching Ji-Hyun Jang Received April 10, 2009 ABSTRACT We report a fully reversible and robust shape-memory effect in a two simulations correctly capture the three steps of the shape-memory cycle observed experimentally. Structures

  12. On the thermomechanical deformation of silver shape memory nanowires

    E-Print Network [OSTI]

    Lin, Xi

    On the thermomechanical deformation of silver shape memory nanowires Harold S. Park *, Changjiang an analysis of the uniaxial thermomechanical deformation of single-crystal silver shape memory nanowires using atomistic simulations. We first demonstrate that silver nanowires can show both shape memory

  13. Model-Free Control of Shape Memory Alloys Antagonistic Actuators

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Model-Free Control of Shape Memory Alloys Antagonistic Actuators Pierre-Antoine G´edouin , C with a first application of the new framework of model-free control to the promising technology of shape memory alloys actuators. In particular antagonistic shape memory alloys actuator. These devices are known

  14. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

    1997-01-01T23:59:59.000Z

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

  15. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, G.S.; Grafe, V.G.

    1997-10-07T23:59:59.000Z

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a ``fire`` signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor. 11 figs.

  16. Behavioral/Systems/Cognitive Consolidation Patterns of Human Motor Memory

    E-Print Network [OSTI]

    Shadmehr, Reza

    Behavioral/Systems/Cognitive Consolidation Patterns of Human Motor Memory Sarah E. Criscimagna-Hemminger and Reza Shadmehr Laboratory for Computational Motor Control, Department of Biomedical Engineering, Johns of acquiring a new memory that competes with the old, effectively masking it? We considered motor memories

  17. An implementation of SISAL for distributed-memory architectures

    SciTech Connect (OSTI)

    Beard, P.C.

    1995-06-01T23:59:59.000Z

    This thesis describes a new implementation of the implicitly parallel functional programming language SISAL, for massively parallel processor supercomputers. The Optimizing SISAL Compiler (OSC), developed at Lawrence Livermore National Laboratory, was originally designed for shared-memory multiprocessor machines and has been adapted to distributed-memory architectures. OSC has been relatively portable between shared-memory architectures, because they are architecturally similar, and OSC generates portable C code. However, distributed-memory architectures are not standardized -- each has a different programming model. Distributed-memory SISAL depends on a layer of software that provides a portable, distributed, shared-memory abstraction. This layer is provided by Split-C, a dialect of the C programming language developed at U.C. Berkeley, which has demonstrated good performance on distributed-memory architectures. Split-C provides important capabilities for good performance: support for program-specific distributed data structures, and split-phase memory operations. Distributed data structures help achieve good memory locality, while split-phase memory operations help tolerate the longer communication latencies inherent in distributed-memory architectures. The distributed-memory SISAL compiler and run-time system takes advantage of these capabilities. The results of these efforts is a compiler that runs identically on the Thinking Machines Connection Machine (CM-5), and the Meiko Computing Surface (CS-2).

  18. SECURITY REFRESH: PROTECTING PHASE-CHANGE MEMORY AGAINST

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    SOFTWARE. ......Given the grim prospect of technology scaling in flash memories and dynamic RAM (DRAM), designers are seeking alternative memory technologies to continue the prophecy of Moore's law for memories device totally useless in a matter of minutes because it has a faster ac- cess speed than flash

  19. Energy Efficient Proactive Thermal Management in Memory Subsystem

    E-Print Network [OSTI]

    Simunic, Tajana

    Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

  20. GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS

    E-Print Network [OSTI]

    Schott, René - Institut de Mathématiques Élie Cartan, Université Henri Poincaré

    GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS Maha IDRISSI AOUAD.loria.fr/zendra Keywords: Energy consumption reduction, Genetic heuristics, memory allocation management, optimizations on heuristic methods for SPMs careful management in order to reduce memory energy consumption. We propose

  1. Self-calibrating random access logarithmic pixel for on chip camera

    E-Print Network [OSTI]

    Hong, Augustin Jinwoo

    2005-08-29T23:59:59.000Z

    CMOS active pixel sensors (APS) have shown competitive performance with charge-coupled device (CCD) and offer many advantages in cost, system power reduction and on-chip integration of VLSI electronics. Among CMOS image sensors, sensors...

  2. Co-adapted coupling Random walk on Zn 2 Random walk on Gn

    E-Print Network [OSTI]

    Co-adapted coupling Random walk on Zn 2 Random walk on Gn d Optimal co-adapted coupling Stephen Connor sbc502@york.ac.uk #12;Co-adapted coupling Random walk on Zn 2 Random walk on Gn d Outline 1 Co-adapted coupling 2 Simple random walk on the hypercube, Zn 2 3 Simple random walk on Gn d #12;Co-adapted coupling

  3. Human Resources Security Access Matrix Function Training

    E-Print Network [OSTI]

    Wu, Shin-Tson

    June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

  4. Revised Spring 2008 NIH Public Access Policy

    E-Print Network [OSTI]

    Revised Spring 2008 NIH Public Access Policy Notice Number: NOT-OD-08-033 - (See Notice NOT-OD-08-161 (Consolidated Appropriations Act, 2008), the NIH voluntary Public Access Policy (NOT-OD-05-022) is now mandatory shall implement the public access policy in a manner consistent with copyright law. Specifics 1. The NIH

  5. AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE

    E-Print Network [OSTI]

    Oregon, University of

    AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

  6. Large deviations for random walks in a random environment on a strip

    E-Print Network [OSTI]

    2013-02-28T23:59:59.000Z

    Feb 28, 2013 ... We consider a random walk in a random environment (RWRE) on the strip ... For a fixed environment ?, we can define the RWRE starting at (x, ...

  7. Instructions for Accessing FedConnect Postings, June 30, 2009...

    Broader source: Energy.gov (indexed) [DOE]

    Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings and...

  8. Acronyms A AAAP Accelerated Access Authorization Program ACREM...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    S S Secret SRD SecretRestricted Data SAACS Security Alarm and Access Control System SAP Special Access Program SAPOC Special Access Program Oversight Committee SC Office...

  9. Administrative Access Policy Exception Process & Request Form Administrative Access Policy Exception Process

    E-Print Network [OSTI]

    Arnold, Jonathan

    Administrative Access Policy ­ Exception Process & Request Form (Page 1) Administrative Access Policy ­ Exception Process Administrative Access Policy Overview According to the Franklin College Administrative Access Policy , all IT devices with a UGA control number will be setup with user

  10. Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable Memory Architectures

    E-Print Network [OSTI]

    Kavi, Krishna

    Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable) as a promising candidate to achieve scalable, low power and thermal friendly memory system architecture leakages and retention time. DRAM-based main memory is also consuming an increasing proportion of the power

  11. Protist Web Alert Memories of Times Past

    E-Print Network [OSTI]

    Simpson, Larry

    Protist Web Alert Memories of Times Past The Euglenoid Project (http that the Euglenoids have always fascinated me and so did this site. Micro*scope Astrobiology Institute Web Site from reviewed this site in a previous Web Alert, but it has been revised and updated and so is worth another

  12. Characterizing Flash Memory: Anomalies, Observations, and Applications

    E-Print Network [OSTI]

    Wang, Deli

    ), and reliability of flash memory. In addition, we must understand how different usage patterns affect char- acteristics and show how we can use them to improve responsive- ness and energy consumption begun to make the transi- tion from embedded devices to laptops, desktops, and data cen- ters

  13. Rewritable Memory by Controllable Nanopatterning of DNA

    E-Print Network [OSTI]

    Pierce, Niles A.

    ABSTRACT Fabricating a nanostructure capable of reversibly patterning molecules is a fundamental goal within nanotechnology, underlying diverse processes such as information storage, scaffold functioning of the device as rewritable memory. The bit state of each address is controlled by specific DNA

  14. Memorial University of Newfoundland Diving Safety

    E-Print Network [OSTI]

    deYoung, Brad

    .2 Maintenance and Inspections 17 9.3 Use of Diving Equipment 17 9.4 Equipment Procedures 18 9.5 Inspection PROCEDURES 20 12.1 Planning of Diving Operations 21 12.2 Adherence to Planned Depth Procedures 21 12 safety manual is designed to provide Memorial University scientific divers with standards and procedures

  15. Dahlia Greidinger Memorial Symposium Department of Environmental,

    E-Print Network [OSTI]

    and Agricultural Engineering Organized and supported by: The Dahlia Greidinger Memorial Fund and BARD, The United dynamics and reaction mechanisms, particularly those of nitrogen and phosphorus in crop/food production systems, with special emphasis on interactions with organic loads/wastes and under possible global changes

  16. Finding Memory Leaks in Java with JDeveloper

    E-Print Network [OSTI]

    Livshits, Ben

    believe, Java's garbage collector does not solve all me- mory problems that might occur in practice feature of memory management in Java is its garbage-collected heap. A typical garbage collector that comes all objects reach- able from a set of roots. These reachable objects survive collections because

  17. 11. Memory Limitations in Artificial Intelligence

    E-Print Network [OSTI]

    [424], take the oldest known scien- tific treatise surviving from the ancient world, the surgical confronted to AI for many years. As an example, take the garbage collector problem. Min- sky [551] proposes the first copying garbage collector for LISP; an algorithm using serial secondary memory. The live data

  18. External Memory Data Structures (Invited Paper)

    E-Print Network [OSTI]

    Arge, Lars

    bottleneck. In this paper we survey recent advances in the development of worst­case I/O­efficient external databases for objects that satisfy certain spatial constraints. Typical queries include reporting the ob­purpose) external memory data structures (or indexes) has always been a main concern in the database community, most

  19. Allegories of Modernity, Geographies of Memory

    E-Print Network [OSTI]

    Jeon, Seenhwa

    2012-10-19T23:59:59.000Z

    imaginary with mirror images and events. The postmodernist narrative of memory in these novels turns the time of the now into a time for the "past as to come," a time to detect the unrealized and unfulfilled possibilities of the past, through retellings...

  20. Orderly Spectra from Random Interactions

    SciTech Connect (OSTI)

    Johnson, C.W. [Department of Physics and Astronomy, Louisiana State University, Baton Rouge, Louisiana 70803-4001 (United States)] [Department of Physics and Astronomy, Louisiana State University, Baton Rouge, Louisiana 70803-4001 (United States); Bertsch, G.F. [Department of Physics, FM-15, University of Washington, Seattle, Washington 98195 (United States)] [Department of Physics, FM-15, University of Washington, Seattle, Washington 98195 (United States); Dean, D.J.; Dean, D.J. [Department of Physics and Astronomy, University of Tennessee, Knoxville, Tennessee 37996 (United States) [Department of Physics and Astronomy, University of Tennessee, Knoxville, Tennessee 37996 (United States); Department of Physics and Astronomy, Louisiana State University, Baton Rouge, Louisiana 70803-4001 (United States)

    1998-03-01T23:59:59.000Z

    We investigate the low-lying spectra of many-body systems with random two-body interactions, specifying that the ensemble be invariant under particle-hole conjugation. Surprisingly we find patterns reminiscent of more orderly interactions, such as a predominance of J=0 ground states separated by a gap from the excited states, and evidence of phonon vibrations in the low-lying spectra. {copyright} {ital 1998} {ital The American Physical Society}

  1. Semi-device-independent randomness expansion with partially free random sources

    E-Print Network [OSTI]

    Yu-Qian Zhou; Hong-Wei Li; Yu-Kun Wang; Dan-Dan Li; Fei Gao; Qiao-Yan Wen

    2015-03-30T23:59:59.000Z

    By proposing device-independent protocols, S. Pironio et al. [Nature 464, 1021-1024 (2010)] and R. Colbeck et al. [Nature Physics 8, 450-453 (2012)] proved that new randomness can be generated by using perfectly free random sources or partially free ones as seed. Subsequently, Li et al. [Phys. Rev. A 84, 034301 (2011)] studied this topic in the framework of semi-device-independent and proved that new randomness can be obtained from perfectly free random sources. Here we discuss whether and how partially free random sources bring us new randomness in semi-device-independent scenario. We propose a semi-device-independent randomness expansion protocol with partially free random sources, and obtain the condition that the partially free random sources should satisfy to generate new randomness. In the process of analysis, we acquire a new 2-dimensional quantum witness. Furthermore, we get the analytic relationship between the generated randomness and the 2-dimensional quantum witness violation.

  2. High speed optical quantum random number generation

    E-Print Network [OSTI]

    Weinfurter, Harald

    .3351 (2009). 6. I. Reidler, Y. Aviad, M. Rosenbluh, and I. Kanter, "Ultrahigh-speed random number generation

  3. Subject Access to Your Information

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Lists Transportation Research Thesaurus Your own list Use a Short List or a Long List of Terms? If you have a small collection, a short list of terms is appropriate. If you have a large collection, a longer list of more specific terms..., such as the Transportation Research Thesaurus, may be helpful. Longer list will help describe your packages in more specific ways. Subject Access to Other Kinds of Information People ? Expertise Groups of People Projects Equipment, Facilities Use the same set of subject...

  4. Laboratory Access | Sample Preparation Laboratories

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home asLCLS ExperimentalFiveVentureFrontiers inAccess

  5. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote Access Ames Laboratory

  6. Random Fractal Measures via the Contraction Method

    E-Print Network [OSTI]

    Rüschendorf, Ludger

    Random Fractal Measures via the Contraction Method John E. Hutchinson Australian National mapping method to prove various existence and uniqueness properties of (self­similar) random fractal in order to establish a.s. exponential convergence to the unique random fractal measure. The arguments used

  7. Introduction to Network Science 1 Random Models

    E-Print Network [OSTI]

    Safro, Ilya

    to the degree distribution in random model ... #12;Introduction to Network Science 4 In contrast to the degree distribution in random model ... #12;Introduction to Network Science 5 Newman, "Random graphs as models of vertices. Average component size #12;Introduction to Network Science 15 Distribution of component sizes #12;

  8. Local Limit Theorems for Random Walks in a 1D Random Environment

    E-Print Network [OSTI]

    Dolgopyat, Dmitry

    Local Limit Theorems for Random Walks in a 1D Random Environment D. Dolgopyat and I. Goldsheid Abstract. We consider random walks (RW) in a one-dimensional i.i.d. random environment with jumps to the nearest neighbours. For almost all environments, we prove a quenched Local Limit Theorem (LLT

  9. Random number stride in Monte Carlo calculations

    SciTech Connect (OSTI)

    Hendricks, J.S.

    1990-01-01T23:59:59.000Z

    Monte Carlo radiation transport codes use a sequence of pseudorandom numbers to sample from probability distributions. A common practice is to start each source particle a predetermined number of random numbers up the pseudorandom number sequence. This number of random numbers skipped between each source particles the random number stride, S. Consequently, the jth source particle always starts with the j{center dot}Sth random number providing correlated sampling'' between similar calculations. A new machine-portable random number generator has been written for the Monte Carlo radiation transport code MCNP providing user's control of the random number stride. First the new MCNP random number generator algorithm will be described and then the effects of varying the stride will be presented. 2 refs., 1 fig.

  10. Quantum random walks without walking

    SciTech Connect (OSTI)

    Manouchehri, K.; Wang, J. B. [School of Physics, University of Western Australia, 35 Stirling Highway, Crawley WA 6009 (Australia)

    2009-12-15T23:59:59.000Z

    Quantum random walks have received much interest due to their nonintuitive dynamics, which may hold the key to a new generation of quantum algorithms. What remains a major challenge is a physical realization that is experimentally viable and not limited to special connectivity criteria. We present a scheme for walking on arbitrarily complex graphs, which can be realized using a variety of quantum systems such as a Bose-Einstein condensate trapped inside an optical lattice. This scheme is particularly elegant since the walker is not required to physically step between the nodes; only flipping coins is sufficient.

  11. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  12. Quantum Error Correction for Quantum Memories

    E-Print Network [OSTI]

    Barbara M. Terhal

    2015-01-20T23:59:59.000Z

    Active quantum error correction using qubit stabilizer codes has emerged as a promising, but experimentally challenging, engineering program for building a universal quantum computer. In this review we consider the formalism of qubit stabilizer and subsystem stabilizer codes and their possible use in protecting quantum information in a quantum memory. We review the theory of fault-tolerance and quantum error-correction, discuss examples of various codes and code constructions, the general quantum error correction conditions, the noise threshold, the special role played by Clifford gates and the route towards fault-tolerant universal quantum computation. The second part of the review is focused on providing an overview of quantum error correction using two-dimensional (topological) codes, in particular the surface code architecture. We discuss the complexity of decoding and the notion of passive or self-correcting quantum memories. The review does not focus on a particular technology but discusses topics that will be relevant for various quantum technologies.

  13. Accessing graphic information: Challenges of tomorrow

    SciTech Connect (OSTI)

    Frazer, G. Jr. [Power System Engineering, Inc., Madison, WI (United States). AM/FM Service Div.

    1995-12-31T23:59:59.000Z

    During the justification process of AM/FM projects, utilities seek to find as many benefits as possible using AM/FM technology. In many cases the ultimate benefit of simply providing users the ability to access the digital information is overlooked. This paper outlines why access may be overlooked, why providing access is important and what kind of tool is needed in the long term.

  14. SLAC All Access: Laser Labs

    SciTech Connect (OSTI)

    Minitti, Mike; Woods Mike

    2013-03-01T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  15. SLAC All Access: Laser Labs

    ScienceCinema (OSTI)

    Minitti, Mike; Woods Mike

    2014-06-03T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  16. Multi-core and Many-core Shared-memory Parallel Raycasting Volume Rendering Optimization and Tuning

    SciTech Connect (OSTI)

    Howison, Mark

    2012-01-31T23:59:59.000Z

    Given the computing industry trend of increasing processing capacity by adding more cores to a chip, the focus of this work is tuning the performance of a staple visualization algorithm, raycasting volume rendering, for shared-memory parallelism on multi-core CPUs and many-core GPUs. Our approach is to vary tunable algorithmic settings, along with known algorithmic optimizations and two different memory layouts, and measure performance in terms of absolute runtime and L2 memory cache misses. Our results indicate there is a wide variation in runtime performance on all platforms, as much as 254% for the tunable parameters we test on multi-core CPUs and 265% on many-core GPUs, and the optimal configurations vary across platforms, often in a non-obvious way. For example, our results indicate the optimal configurations on the GPU occur at a crossover point between those that maintain good cache utilization and those that saturate computational throughput. This result is likely to be extremely difficult to predict with an empirical performance model for this particular algorithm because it has an unstructured memory access pattern that varies locally for individual rays and globally for the selected viewpoint. Our results also show that optimal parameters on modern architectures are markedly different from those in previous studies run on older architectures. And, given the dramatic performance variation across platforms for both optimal algorithm settings and performance results, there is a clear benefit for production visualization and analysis codes to adopt a strategy for performance optimization through auto-tuning. These benefits will likely become more pronounced in the future as the number of cores per chip and the cost of moving data through the memory hierarchy both increase.

  17. Generalized Deam-Edwards Approach to the Statistical Mechanics of Randomly Crosslinked Systems

    E-Print Network [OSTI]

    Xiangjun Xing; Bing-Sui Lu; Fangfu Ye; Paul M. Goldbart

    2013-05-03T23:59:59.000Z

    We address the statistical mechanics of randomly and permanently crosslinked networks. We develop a theoretical framework (vulcanization theory) which can be used to systematically analyze the correlation between the statistical properties of random networks and their histories of formation. Generalizing the original idea of Deam and Edwards, we consider an instantaneous crosslinking process, where all crosslinkers (modeled as Gaussian springs) are introduced randomly at once in an equilibrium liquid state, referred to as the preparation state. The probability that two functional sites are crosslinked by a spring exponentially decreases with their distance squared. After formally averaging over network connectivity, we obtained an effective theory with all degrees of freedom replicated 1 + n times. Two thermodynamic ensembles, the preparation ensemble and the measurement ensemble, naturally appear in this theory. The former describes the thermodynamic fluctuations in the state of preparation, while the latter describes the thermodynamic fluctuations in the state of measurement. We classify various correlation functions and discuss their physical significances. In particular, the memory correlation functions characterize how the properties of networks depend on their history of formation, and are the hallmark properties of all randomly crosslinked materials. We clarify the essential difference between our approach and that of Deam-Edwards, discuss the saddle-point order parameters and its physical significance. Finally we also discuss the connection between saddle-point approximation of vulcanization theory, and the classical theory of rubber elasticity as well as the neo-classical theory of nematic elastomers.

  18. Characterizing Open Access Publishing at Your Institution 

    E-Print Network [OSTI]

    Hubbard, David E.; Li, Yu

    2014-11-03T23:59:59.000Z

    Medical Library, 2008) Open Access (OA) “… digital, online, free of charge, and free of most copyright and licensing restrictions.” (Suber, 2012, p. 4) “Flavors” of Open Access Gold: provide immediate open access, peer reviewed; authors retain copyright...://becker.wustl.edu/services/scholarly/whatis.html. Ali, A., Shah, T. A., & Mirza, I. Z. (2011). Open Access Research Output of the University of Kashmir. Trends in Information Management, 7(2), 237-243. Amos, K., Mower, A., James, M. A., Weber, A., Yaffe, J., & Youngkin, M. (2012). Exploring...

  19. International Electricity Trade - Open Access | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    DOE has consistently expressed its policy that international electricity trade should be subject to the same principles of comparable open access and non-discrimination that apply...

  20. The Ohio Capital Access Program (OCAP) (Ohio)

    Broader source: Energy.gov [DOE]

    The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business...

  1. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Pacific Ocean Science & Technology Kuykendall Annex Information Technology Center Krauss Hall Holmes HallStairs Pond UH Parking Access & Mid-Pacific Institute Exit Dole Street Offices Multipurpose

  2. ACCESS 2010 Level 1 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and modify new databases. Course Goals: Identify the basic components of an Access database. Build the structure of a database. Manage data in tables. Query a database. Design...

  3. Access Control for SAR Systems Stephen Quirolgico

    E-Print Network [OSTI]

    Access Control for SAR Systems Stephen Quirolgico Vincent Hu Tom Karygiannis NIST IR 7815 #12;NIST Systems Stephen Quirolgico Vincent Hu Tom Karygiannis Computer Security Division Information Technology

  4. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified...

  5. Shape Memory Polymer Therapeutic Devices for Stroke

    SciTech Connect (OSTI)

    Wilson, T S; Small IV, W; Benett, W J; Bearinger, J P; Maitland, D J

    2005-10-11T23:59:59.000Z

    Shape memory polymers (SMPs) are attracting a great deal of interest in the scientific community for their use in applications ranging from light weight structures in space to micro-actuators in MEMS devices. These relatively new materials can be formed into a primary shape, reformed into a stable secondary shape, and then controllably actuated to recover their primary shape. The first part of this presentation will be a brief review of the types of polymeric structures which give rise to shape memory behavior in the context of new shape memory polymers with highly regular network structures recently developed at LLNL for biomedical devices. These new urethane SMPs have improved optical and physical properties relative to commercial SMPs, including improved clarity, high actuation force, and sharper actuation transition. In the second part of the presentation we discuss the development of SMP based devices for mechanically removing neurovascular occlusions which result in ischemic stroke. These devices are delivered to the site of the occlusion in compressed form, are pushed through the occlusion, actuated (usually optically) to take on an expanded conformation, and then used to dislodge and grip the thrombus while it is withdrawn through the catheter.

  6. Thermomechanical indentation of shape memory polymers.

    SciTech Connect (OSTI)

    Long, Kevin N. (University of Colorado, Boulder, CO); Nguyen, Thao D.; Castro, Francisco (University of Colorado, Boulder, CO); Qi, H. Jerry (University of Colorado, Boulder, CO); Dunn, Martin L. (University of Colorado, Boulder, CO); Shandas, Robin (University of Colorado, Boulder, CO)

    2007-04-01T23:59:59.000Z

    Shape memory polymers (SMPs) are receiving increasing attention because of their ability to store a temporary shape for a prescribed period of time, and then when subjected to an environmental stimulus, recover an original programmed shape. They are attractive candidates for a wide range of applications in microsystems, biomedical devices, deployable aerospace structures, and morphing structures. In this paper we investigate the thermomechanical behavior of shape memory polymers due to instrumented indentation, a loading/deformation scenario that represents complex multiaxial deformation. The SMP sample is indented using a spherical indenter at a temperature T{sub 1} (>T{sub g}). The temperature is then lowered to T{sub 2} (memory is then activated by increasing the temperature to T{sub 1} (>T{sub g}) during free recovery the indentation impression disappears and the surface of the SMP recovers to its original profile. A recently-developed three-dimensional finite deformation constitutive model for the thermomechanical behavior of SMPs is then used with the finite element method to simulate this process. Measurement and simulation results are compared for cases of free and constrained recovery and good agreement is obtained, suggesting the appropriateness of the simulation approach for complex multiaxial loading/deformations that are likely to occur in applications.

  7. DESIGN OF A VARIABLE STIFFNESS LEG USING SHAPE MEMORY POLYMER COMPOSITES

    E-Print Network [OSTI]

    Collins, Emmanuel

    571 DESIGN OF A VARIABLE STIFFNESS LEG USING SHAPE MEMORY POLYMER COMPOSITES DUNCAN W. HALDANE materials called shape memory polymers. Shape Memory Polymers (SMPs) experience a several order of magnitude a SMP as the resin matrix, a shape memory polymer composite is formed. A shape memory polymer composite

  8. Academic Libraries and Open Access: Policies, Services and Resources for Increasing Access to Scholarship

    E-Print Network [OSTI]

    Rosenblum, Brian

    2010-07-06T23:59:59.000Z

    This presentation will focus on emerging roles for academic libraries in supporting access to scholarship through open access policies and practices. The University of Kansas recently became the first public university in ...

  9. Texture memory and strain-texture mapping in a NiTi shape memory alloy

    SciTech Connect (OSTI)

    Ye, B.; Majumdar, B. S.; Dutta, I. [Materials Department, New Mexico Tech, 801 Leroy Place, Socorro, New Mexico 87801 (United States); Center for Materials Science, Naval Postgraduate School, Monterey, California 93943 (United States)

    2007-08-06T23:59:59.000Z

    The authors report on the near-reversible strain hysteresis during thermal cycling of a polycrystalline NiTi shape memory alloy at a constant stress that is below the yield strength of the martensite. In situ neutron diffraction experiments are used to demonstrate that the strain hysteresis occurs due to a texture memory effect, where the martensite develops a texture when it is cooled under load from the austenite phase and is thereafter ''remembered.'' Further, the authors quantitatively relate the texture to the strain by developing a calculated strain-texture map or pole figure for the martensite phase, and indicate its applicability in other martensitic transformations.

  10. Randomness and Earth climate variability

    E-Print Network [OSTI]

    Levinshtein, Michael E; Dmitriev, Alexander P; Shmakov, Pavel M

    2015-01-01T23:59:59.000Z

    Paleo-Sciences including palaeoclimatology and palaeoecology have accumulated numerous records related to climatic changes. The researchers have usually tried to identify periodic and quasi-periodic processes in these paleoscientific records. In this paper, we show that this analysis is incomplete. As follows from our results, random processes, namely processes with a single-time-constant (noise with a Lorentzian noise spectrum), play a very important and, perhaps, a decisive role in numerous natural phenomena. For several of very important natural phenomena the characteristic time constants are very similar and equal to (5-8)x10^3 years. However, this value is not universal. For example, the spectral density fluctuations of the atmospheric radiocarbon 14C are characterized by a Lorentzian with time constant 300 years. The frequency dependence of spectral density fluctuations for benthic 18O records contains two Lorentzians with time constans 8000 years and > 105 years.

  11. autobiographical memory recall: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Inc. All rights reserved Boahen, Kwabena 93 Memory Distortion in People Reporting Abduction by Aliens Susan A. Clancy, Richard J. McNally, Biology and Medicine Websites...

  12. aversive memory recall: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Inc. All rights reserved Boahen, Kwabena 119 Memory Distortion in People Reporting Abduction by Aliens Susan A. Clancy, Richard J. McNally, Biology and Medicine Websites...

  13. Adaptive memory in humans from a comparative perspective

    E-Print Network [OSTI]

    Krause, Mark

    2015-01-01T23:59:59.000Z

    support a specific type of learning (e.g. , taste aversions,appear to be a distinct type of learning or memory process

  14. Building Green in Greensburg: Kiowa County Memorial Hospital

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

  15. Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2010-03-01T23:59:59.000Z

    This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas.

  16. auditory working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    requires not only attention Sturm, Alexandra Noelle 2013-01-01 9 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  17. Recommendation 196: Alternatives to Memorialize the K-25 Building

    Broader source: Energy.gov [DOE]

    The ORSSAB Recommends to DOE Alternatives to Memorialize the K-25 Building at East Tennessee Technology Park and Manhattan Project Exhibits in Oak Ridge, Tennessee.

  18. Life-cycle assessment of NAND flash memory

    E-Print Network [OSTI]

    Boyd, Sarah; Horvath, A; Dornfeld, David

    2010-01-01T23:59:59.000Z

    paired trends, primary energy consumption per gigabyte (GB)energy consumption per memory capacity (MJ/GB), over ?ve technology nodes relatively ?at. In Fig 3 the trends

  19. Neuromorphic, Digital and Quantum Computation with Memory Circuit Elements

    E-Print Network [OSTI]

    Yuriy V. Pershin; Massimiliano Di Ventra

    2011-09-28T23:59:59.000Z

    Memory effects are ubiquitous in nature and the class of memory circuit elements - which includes memristors, memcapacitors and meminductors - shows great potential to understand and simulate the associated fundamental physical processes. Here, we show that such elements can also be used in electronic schemes mimicking biologically-inspired computer architectures, performing digital logic and arithmetic operations, and can expand the capabilities of certain quantum computation schemes. In particular, we will discuss few examples where the concept of memory elements is relevant to the realization of associative memory in neuronal circuits, spike-timing-dependent plasticity of synapses, digital and field-programmable quantum computing.

  20. Institute of Computer Science A modified limited-memory BNS ...

    E-Print Network [OSTI]

    2014-03-12T23:59:59.000Z

    Institute of Computer Science. Academy of Sciences of the Czech Republic. A modified limited-memory BNS method for unconstrained minimization based on ...

  1. Web Accessibility Office of Diversity and Inclusion

    E-Print Network [OSTI]

    Jones, Michelle

    Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

  2. AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS

    E-Print Network [OSTI]

    Samarati, Pierangela

    - ever, XML-based graphics formats such as the Scalable Vector Graphics (SVG) standard are becoming by means of new XML-based standards such as the World Wide Web Consortium's Scalable Vector Graphics (SVG controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector

  3. A Hardware Approach for Trusted Access and

    E-Print Network [OSTI]

    Global is prohibited. IntroductIon In computer systems, access control models management in the database context, trying to ABStrAct ThischapteradvocatestheconvergencebetweenAccessControl(AC)models. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must

  4. Interactive Database Access with Statistics and Graphics

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    DbAccess The Manual Interactive Database Access with Statistics and Graphics Version 2.1.1 D. M and graphical needs of NSTX Physicists. Flexible views and joins are possible, including options for complex SQL General Atomics (GA Plot Objects) adds extensive graphical and interactive capabilities (and documentation

  5. Usability and Accessibility in Consumer Health Informatics

    E-Print Network [OSTI]

    Shneiderman, Ben

    Usability and Accessibility in Consumer Health Informatics Current Trends and Future Challenges, for innovative eHealth systems to have true value and impact, they must first and foremost be usable challenges in the usability and accessibility of consumer health informatics will be described. Consumer

  6. National Radiobiology Archives Distributed Access user's manual

    SciTech Connect (OSTI)

    Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

    1991-11-01T23:59:59.000Z

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

  7. University Library Fact Sheet Sconul Access

    E-Print Network [OSTI]

    Brierley, Andrew

    University Library Fact Sheet Sconul Access Opening Hours Please consult the library website for our current opening hours: http://www.st-andrews.ac.uk/library/ Library Cards To borrow books and access the Library you must bring your card with you to the library on each visit. Please notify

  8. Database Hints for Readex's AccessUN

    E-Print Network [OSTI]

    Stowell, Michael

    Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

  9. Locally Accessible Information and Distillation of Entanglement

    E-Print Network [OSTI]

    Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

    2004-03-18T23:59:59.000Z

    A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  10. Foreign National Access to DOE Cyber Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-01T23:59:59.000Z

    DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

  11. The random lattice as a regularization scheme

    E-Print Network [OSTI]

    B. Alles

    1994-12-05T23:59:59.000Z

    A semi-analytic method to compute the first coefficients of the renormalization group functions on a random lattice is introduced. It is used to show that the two-dimensional $O(N)$ non-linear $\\sigma$-model regularized on a random lattice has the correct continuum limit. A degree $\\kappa$ of ``randomness'' in the lattice is introduced and an estimate of the ratio $\\Lambda_{random}/\\Lambda_{regular}$ for two rather opposite values of $\\kappa$ in the $\\sigma$-model is also given. This ratio turns out to depend on $\\kappa$.

  12. Logarithmic Opinion Pools for Conditional Random Fields 

    E-Print Network [OSTI]

    Smith, Andrew

    2007-06-26T23:59:59.000Z

    Since their recent introduction, conditional random fields (CRFs) have been successfully applied to a multitude of structured labelling tasks in many different domains. Examples include natural language processing ...

  13. A fluctuation theorem in a random environment

    E-Print Network [OSTI]

    F. Bonetto; G. Gallavotti; G. Gentile

    2006-04-29T23:59:59.000Z

    A simple class of chaotic systems in a random environment is considered and the fluctuation theorem is extended under the assumption of reversibility.

  14. True random numbers from amplified quantum vacuum

    E-Print Network [OSTI]

    M. Jofre; M. Curty; F. Steinlechner; G. Anzolin; J. P. Torres; M. W. Mitchell; V. Pruneri

    2011-10-17T23:59:59.000Z

    Random numbers are essential for applications ranging from secure communications to numerical simulation and quantitative finance. Algorithms can rapidly produce pseudo-random outcomes, series of numbers that mimic most properties of true random numbers while quantum random number generators (QRNGs) exploit intrinsic quantum randomness to produce true random numbers. Single-photon QRNGs are conceptually simple but produce few random bits per detection. In contrast, vacuum fluctuations are a vast resource for QRNGs: they are broad-band and thus can encode many random bits per second. Direct recording of vacuum fluctuations is possible, but requires shot-noise-limited detectors, at the cost of bandwidth. We demonstrate efficient conversion of vacuum fluctuations to true random bits using optical amplification of vacuum and interferometry. Using commercially-available optical components we demonstrate a QRNG at a bit rate of 1.11 Gbps. The proposed scheme has the potential to be extended to 10 Gbps and even up to 100 Gbps by taking advantage of high speed modulation sources and detectors for optical fiber telecommunication devices.

  15. Reinforcement Learning for Characterization of Hysteresis Behavior in Shape Memory Alloys, and Application to

    E-Print Network [OSTI]

    Valasek, John

    Reinforcement Learning for Characterization of Hysteresis Behavior in Shape Memory Alloys & Valasek - 2 Briefing Agenda Shape Memory Alloy Characterization and Control Learning Simulation Results Membrane Air #12;Kirkpatrick & Valasek - 4 Shape Memory Alloys (SMA) Metallic Alloys used as actuators

  16. A microscopically motivated constitutive model for shape memory alloys: formulation, analysis

    E-Print Network [OSTI]

    Rheinisch-Westfälische Technische Hochschule Aachen (RWTH)

    A microscopically motivated constitutive model for shape memory alloys: formulation, analysisTi polycrystalline shape memory alloys exhibiting transformations between three solid phases (austenite, R presented. 1 Introduction Shape memory alloys (SMA) are metallic materials exhibiting remarkable properties

  17. Altered gene regulation and synaptic morphology in Drosophila learning and memory mutants

    E-Print Network [OSTI]

    Guan, Zhuo

    Genetic studies in Drosophila have revealed two separable long-term memory pathways defined as anesthesia-resistant memory (ARM) and long-lasting long-term memory (LLTM). ARM is disrupted in radish (rsh) mutants, whereas ...

  18. An Application Specific Memory Characterization Technique for Co-processor Accelerators

    SciTech Connect (OSTI)

    Alam, Sadaf R [ORNL; Smith, Melissa C [ORNL; Vetter, Jeffrey S [ORNL

    2007-01-01T23:59:59.000Z

    Commodity accelerator technologies including reconfigurable devices and graphical processing units (GPUs) provide an order of magnitude performance improvement compared to mainstream microprocessor systems. A number of compute-intensive, scientific applications, therefore, can potentially benefit from commodity computing devices available in the form of co-processor accelerators. However, there has been little progress in accelerating production-level scientific applications using these technologies due to several programming and performance challenges. One of the key performance challenges is performance sustainability. While computation is often accelerated substantially by accelerator devices, the achievable performance is significantly lower once the data transfer costs and overheads are incorporated. We present an application-specific memory characterization technique for an FPGA-accelerated system that enabled us to reduce data transfer overhead for a scientific application by a factor of 5. We classify large data structures in the application according to their read and write characteristics and access patterns. This classification in turn enabled us to sustain a speedup of over three for a full-scale scientific application. Our proposed technique extends to applications that exhibit similar memory behavior and to co-processor accelerator systems that support data streaming and pipelining, and allow overlapped execution between the host and the accelerator device.

  19. Effects of Constrained Aging on the Shape Memory Response of Nickel Rich Niti Shape Memory Alloys

    E-Print Network [OSTI]

    Barrie, Fatmata Haja

    2011-02-22T23:59:59.000Z

    Ni50.6Ti49.4 single and Ni52Ti48 polycrystalline shape memory alloy samples were subjected to aging under a uniaxial stress, to form a single Ni4Ti3 precipitate variant and to investigate the effects of single versus multi-variant coherent...

  20. Oil Price Trackers Inspired by Immune Memory

    E-Print Network [OSTI]

    Wilson, WIlliam; Aickelin, Uwe

    2010-01-01T23:59:59.000Z

    We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

  1. Nickel porphyrins for memory optical applications

    DOE Patents [OSTI]

    Shelnutt, John A. (Tijeras, NM); Jia, Songling (Albuquerque, NM); Medforth, Craig (Vacaville, CA); Holten, Dewey (St. Louis, MO); Nelson, Nora Y. (Manteca, CA); Smith, Kevin M. (Davis, CA)

    2000-01-01T23:59:59.000Z

    The present invention relates to a nickel-porphyrin derivative in a matrix, the nickel-porphyrin derivative comprising at least two conformational isomers, a lower-energy-state conformer and a higher-energy-state conformer, such that when the higher-energy-state conformer is generated from the lower-energy-state conformer following absorption of a photon of suitable energy, the time to return to the lower-energy-state conformer is greater than 40 nanoseconds at approximately room temperature. The nickel-porphyrin derivative is useful in optical memory applications.

  2. Localized quantum walks as secured quantum memory

    E-Print Network [OSTI]

    C. M. Chandrashekar; Th. Busch

    2015-04-21T23:59:59.000Z

    We show that a quantum walk process can be used to construct and secure quantum memory. More precisely, we show that a localized quantum walk with temporal disorder can be engineered to store the information of a single, unknown qubit on a compact position space and faithfully recover it on demand. Since the localization occurss with a finite spread in position space, the stored information of the qubit will be naturally secured from the simple eavesdropper. Our protocol can be adopted to any quantum system for which experimental control over quantum walk dynamics can be achieved.

  3. Remote preparation of an atomic quantum memory

    E-Print Network [OSTI]

    Wenjamin Rosenfeld; Stefan Berner; Juergen Volz; Markus Weber; Harald Weinfurter

    2006-08-29T23:59:59.000Z

    Storage and distribution of quantum information are key elements of quantum information processing and quantum communication. Here, using atom-photon entanglement as the main physical resource, we experimentally demonstrate the preparation of a distant atomic quantum memory. Applying a quantum teleportation protocol on a locally prepared state of a photonic qubit, we realized this so-called remote state preparation on a single, optically trapped 87Rb atom. We evaluated the performance of this scheme by the full tomography of the prepared atomic state, reaching an average fidelity of 82%.

  4. Molecular mechanisms of memory in imprinting

    E-Print Network [OSTI]

    Solomonia, Revaz O.; McCabe, Brian J.

    2014-10-02T23:59:59.000Z

    an ess the chick (s In additi for study, r by the fact robiology o It is also a the recentl trolled, faci changes in or water for tive period animals tha A Fig. 1. Positio of section for mesopallium; vocalize ex which learn Imprinting with proce... . mulated evidence strongly indicates that formation of tion memory of imprinting involves a time-dependent ochemical processes in the IMM. Such processes are essed in the left side of this region. Changes in the right raining, though resembling events...

  5. Painted Ponies: Essays on Memory and Loss

    E-Print Network [OSTI]

    Klayder, Mary

    2008-12-30T23:59:59.000Z

    , and galloping around the neighborhood. I refused to neigh. After I finished reading The Wizard of Oz enough times that I bored my mother with the highlights, someone – I have no memory of who – took me to the library to check out the other books.... It was a humid June night. A thunderhead rose to the south like a mountain. Clouds like that were so common I used to pretend I lived in Colorado, imagined I could go hiking on the cloud hills, hills that moved to different sides of the town...

  6. Gist Memory in Alzheimer's Disease: Evidence From Categorized Pictures Andrew E. Budson

    E-Print Network [OSTI]

    Schacter, Daniel

    Gist Memory in Alzheimer's Disease: Evidence From Categorized Pictures Andrew E. Budson Edith of items (gist memory; Reyna & Brainerd, 1995; Schacter, Norman, & Koutstaal, 1998). We have argued

  7. A signal-detection-based investigation into the nature of recognition memory

    E-Print Network [OSTI]

    Mickes, Laura Beth

    2010-01-01T23:59:59.000Z

    memory. Memory & Cognition, Speer, N. K. , & Curran, T. (Eichenbaum, 2008; Speer & Curran, 2007; Turriziani, Fadda,unitized familiarity (cf. Speer & Curran, 2007). While this

  8. auditory-verbal working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory 4 Percept Result of filtering Memphis, University of 4 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  9. The XY Spin Chain Random Block Operators

    E-Print Network [OSTI]

    Jung, Paul

    The XY Spin Chain Random Block Operators Proof of Main Result Open Questions Localization for Random Block Operators Related to the XY Spin Chain Jacob W. Chapman Division of Science Southern Wesleyan University Central, SC Joint work with G¨unter Stolz UAB NSF-CBMS Conference on Quantum Spin

  10. RANDOM WALK IN DETERMINISTICALLY CHANGING ENVIRONMENT

    E-Print Network [OSTI]

    Liverani, Carlangelo

    RANDOM WALK IN DETERMINISTICALLY CHANGING ENVIRONMENT DMITRY DOLGOPYAT AND CARLANGELO LIVERANI Abstract. We consider a random walk with transition probabilities weakly dependent on an environment of the environment the walk satisfies the CLT. 1. Introduction The continuing interest in the limit properties

  11. Selfattractive random polymers Remco van der Hofstad

    E-Print Network [OSTI]

    Klenke, Achim

    Self­attractive random polymers Remco van der Hofstad Stieltjes Institute of Mathematics Delft polymer of finite length in Zd . Its law is that of a finite simple random walk path in Zd receiving that for > the attraction dominates the repulsion, i.e., with high probability the polymer is contained in a finite box

  12. Contagious Sets in Random Graphs Uriel Feige

    E-Print Network [OSTI]

    Contagious Sets in Random Graphs Uriel Feige Michael Krivelevich Daniel Reichman August 10, 2014. A contagious set is a set whose activation results with the entire graph being active. Given a graph G, let m(G, 2) be the minimal size of a contagious set. We consider the binomial random graph G := G(n, p

  13. Advanced Concurrency Control for Transactional Memory

    E-Print Network [OSTI]

    Singer, Jeremy

    , Christos Kotselidis, Kim Jarvis, Mikel Luj´an, Chris Kirkham, and Ian Watson The University of Manchester {ansari,kotselidis,jarvis,mikel,chris,watson}@cs.manchester.ac.uk Abstract. Concurrency control-grain locking. TM requires developers to mark code blocks that access shared data struc- tures as transactions

  14. Memory as vibration in a disconnecting

    E-Print Network [OSTI]

    Zhang, Wendy

    experimentally accessible well-defined mathematical model Keim, Nagel Keim et al. PRL 06 #12;bubble break 91, Oguz & Prosperetti JFM 93, Burton et al, PRL 05 Gordillo et al, PRL 05 Bergmann et al, PRL 06, Thoroddsen et al, POF 07, Eggers et al PRL 07 #12;Break-up in many parameter regimes conform to prevailing

  15. 2001 Special issue Associative memory in networks of spiking neurons

    E-Print Network [OSTI]

    Wennekers, Thomas

    of the network dynamics. The memory is displayed rhythmically, coded by phase-locked bursts or regular spikes activity and trigger a phase-locked association event within one gamma period. Unlike as under tonic of ef®cient retrieval varying the memory load, the excitation/inhibition parameters, and background

  16. Rosebud: A Place for Interaction between Memory, Story, and Self

    E-Print Network [OSTI]

    Nehaniv, Chrystopher

    as part of the human­computer interaction. Ullmer & Ishii [55] make a comparison between levels of stories, memories, and identity. We describe the cognitive, social, and psychological aspects of one, identity, stuffed animals, tangible interfaces, memory, children, education. Scenario Susan, an eight year

  17. Immune Inspired Memory Algorithms Applied to Unknown Motif Detection

    E-Print Network [OSTI]

    Aickelin, Uwe

    . Wilson, P. Birkin and U. Aickelin. Oil Price Trackers Inspired by Immune Memory. AISB 2006 Bristol, intuitive and meaningful manner. Motifs help identify relationships in the data and they can aid. W. O. Wilson, P. Birkin and U. Aickelin. Price Trackers Inspired by Im- mune Memory. 5th

  18. Software Verification for Weak Memory via Program Transformation

    E-Print Network [OSTI]

    Kröning, Daniel

    on a PowerPC cluster, due to the memory model. We study this bug in detail in Sec. 5. This observation handle the write atomicity relaxation of Power/ARM: generality remains a challenge. Since we want verification w.r.t. weak memory. We present experi- ments for a broad variety of models (from x86-TSO to Power

  19. Forgotten, but Not Gone: Recovering Memories of Emotional Stories

    E-Print Network [OSTI]

    Handy, Justin Dean

    2012-02-14T23:59:59.000Z

    FORGOTTEN, BUT NOT GONE: RECOVERING MEMORIES OF EMOTIONAL STORIES A Thesis by JUSTIN DEAN HANDY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE December 2011 Major Subject: Psychology Forgotten, but Not Gone: Recovering Memories of Emotional Stories Copyright 2011 Justin Dean Handy FORGOTTEN, BUT NOT GONE...

  20. Silicon optical nanocrystal memory R. J. Walters,a)

    E-Print Network [OSTI]

    Atwater, Harry

    Silicon optical nanocrystal memory R. J. Walters,a) P. G. Kik, J. D. Casperson, and H. A. Atwater (Received 19 January 2004; accepted 22 July 2004) We describe the operation of a silicon optical nanocrystal memory device. The programmed logic state of the device is read optically by the detection of high or low

  1. Memory Scaling: A Systems Architecture Perspective Carnegie Mellon University

    E-Print Network [OSTI]

    @cmu.edu http://users.ece.cmu.edu/omutlu/ Abstract--The memory system is a fundamental performance and energy technology scaling challenges that make the maintenance and enhancement of its capacity, energy, whether they be server, embedded, desktop, mobile, sensor. Memory capacity, energy, cost, performance

  2. Business surveys modelling with Seasonal-Cyclical Long Memory models

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Business surveys modelling with Seasonal-Cyclical Long Memory models Ferrara L. and Guégan D. 2nd business surveys released by the European Commission. We introduce an innovative way for modelling those linear models. Keywords: Euro area, nowcasting, business surveys, seasonal, long memory. JEL

  3. Word learning, phonological short-term memory, phonotactic probability and

    E-Print Network [OSTI]

    Gupta, Prahlad

    for thinking about various types of studies of word learning. We then review a number of themes that in recent as a useful organizing scheme for thinking about various types of studies of word learning. In §2, we reviewWord learning, phonological short-term memory, phonotactic probability and long-term memory

  4. ORIGINAL PAPER Prevention of cerebral ischemia-induced memory deficits

    E-Print Network [OSTI]

    memory impairment produced pharmacologically or genetically. Comparably, much less is known about4 activity in the hippocam- pus. Memory was examined using Morris water-maze and step-through passive avoidance tests in rats subjected to global cerebral ischemia with or without repeated treatment

  5. MEMORY DESIGN AND EXPLORATION FOR LOW POWER, EMBEDDED SYSTEMS

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    by (i) applying memory optimizing transformations such as loop transformations, (ii) storing frequently transformations. In this paper, we describe a procedure for memory design and exploration for low power embedded optimizing transformations such as loop transformations. While there exists a large number of loop

  6. Performance Directed Energy Management for Main Memory and Disks #

    E-Print Network [OSTI]

    Zhou, Yuanyuan

    in the design of computing systems. For battery­operated mobile devices, energy consumption directly affects]. The storage hierarchy, which includes memory and disks, is a major energy consumer in computer systemsPerformance Directed Energy Management for Main Memory and Disks # Xiaodong Li, Zhenmin Li, Francis

  7. ESSES 2003 2003, Carla Schlatter Ellis Power-Aware Memory

    E-Print Network [OSTI]

    Ellis, Carla

    1 ESSES 2003© 2003, Carla Schlatter Ellis Power-Aware Memory Management 2ESSES 2003© 2003, Carla management · OS page allocation policies · Experimental results · Future work, open questions #12;2 3ESSES Allocation [ASPLOS00] ESSES 2003© 2003, Carla Schlatter Ellis Memory System Power Consumption · Laptop

  8. Algorithms and Data Representations for Emerging Non-Volatile Memories

    E-Print Network [OSTI]

    Li, Yue

    2014-04-29T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii 1. INTRODUCTION... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Basic Concepts of Flash Memory and PCM . . . . . . . . . . . . . . . . 2 1.2 Data Reliability Challenges for Flash Memory and PCM . . . . . . . . . 8 1.3 Overview of Research Directions . . . . . . . . . . . . . . . . . . . . . . 10 2...

  9. Organization of growing random networks

    SciTech Connect (OSTI)

    Krapivsky, P. L.; Redner, S.

    2001-06-01T23:59:59.000Z

    The organizational development of growing random networks is investigated. These growing networks are built by adding nodes successively, and linking each to an earlier node of degree k with an attachment probability A{sub k}. When A{sub k} grows more slowly than linearly with k, the number of nodes with k links, N{sub k}(t), decays faster than a power law in k, while for A{sub k} growing faster than linearly in k, a single node emerges which connects to nearly all other nodes. When A{sub k} is asymptotically linear, N{sub k}(t){similar_to}tk{sup {minus}{nu}}, with {nu} dependent on details of the attachment probability, but in the range 2{lt}{nu}{lt}{infinity}. The combined age and degree distribution of nodes shows that old nodes typically have a large degree. There is also a significant correlation in the degrees of neighboring nodes, so that nodes of similar degree are more likely to be connected. The size distributions of the in and out components of the network with respect to a given node{emdash}namely, its {open_quotes}descendants{close_quotes} and {open_quotes}ancestors{close_quotes}{emdash}are also determined. The in component exhibits a robust s{sup {minus}2} power-law tail, where s is the component size. The out component has a typical size of order lnt, and it provides basic insights into the genealogy of the network.

  10. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  11. Hybrid Access Control Mechanism in Two-Tier Femtocell Networks

    E-Print Network [OSTI]

    Mantravadi, Sirisha 1987-

    2012-08-21T23:59:59.000Z

    remains a challenge. Decentralized strategies such as femtocell access control have been identified as an effective means to mitigate cross-tier interference in two-tier networks. Femtocells can be configured to be either open access or closed access...

  12. ETSU College of Medicine Onity Door Access Authorization Form

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU College of Medicine Onity Door Access Authorization Form Please grant access to: 6 access. ____ ALL AREAS (ETSU Service Personnel Only) Medical School Research & Training, VA Bldg. #119-Mail: johnsodl@etsu.edu #12;

  13. A Dyslexic Perspective on e-Content Accessibility

    E-Print Network [OSTI]

    Brajnik, Giorgio

    an insight into the issues of web accessibility for users with Dyslexia (and/or other specific learning and accessibility issues of electronic educational content. Keywords: dyslexia, SLD, web accessibility, usability...................................................................................................2 2. Explaining Dyslexia

  14. ad libitum access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  15. Conjunctive Query Containment under Access Limitations

    E-Print Network [OSTI]

    Martinenghi, Davide

    2 both represent city names, and similarly the attributes named Artist represent artist names.1 to access r2. In turn, new tuples from r2 may provide new constants representing city names, that can

  16. Metadata Value Chain for Open Access Journals

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly communication lifecycle...

  17. COMMENTARY Open Access Effectively incorporating selected multimedia

    E-Print Network [OSTI]

    Hammerton, James

    COMMENTARY Open Access Effectively incorporating selected multimedia content into medical Schöbel5 , Markus Sellerer6 , Andreas Ziegler1 Abstract Until fairly recently, medical publications have significantly profit from advances in electronic publishing that permit the inclusion of multimedia content

  18. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  19. Accessing MDS with IDL February 1993

    E-Print Network [OSTI]

    California at San Diego, University of

    Accessing MDS with IDL Reference Manual February 1993 Software Version: MDS 5.2 VAX/VMS Version 4 Equipment Corporation: CDD DECnet VAX DATATRIEVE DECUS VAXcluster DEC MicroVAX VAX Information Architecture

  20. JOBAID-ACCESSING AND MODIFYING TALENT PROFILE

    Broader source: Energy.gov [DOE]

    The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

  1. Metadata Value Chain for Open Access Journals 

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly ...

  2. Decision Analysis of Dynamic Spectrum Access Rules

    SciTech Connect (OSTI)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01T23:59:59.000Z

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  3. North Carolina Capital Access Program (North Carolina)

    Broader source: Energy.gov [DOE]

    The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lender’s usual standards. The average CAP loan is ...

  4. Radioactive hot cell access hole decontamination machine

    DOE Patents [OSTI]

    Simpson, William E. (Richland, WA)

    1982-01-01T23:59:59.000Z

    Radioactive hot cell access hole decontamination machine. A mobile housing has an opening large enough to encircle the access hole and has a shielding door, with a door opening and closing mechanism, for uncovering and covering the opening. The housing contains a shaft which has an apparatus for rotating the shaft and a device for independently translating the shaft from the housing through the opening and access hole into the hot cell chamber. A properly sized cylindrical pig containing wire brushes and cloth or other disks, with an arrangement for releasably attaching it to the end of the shaft, circumferentially cleans the access hole wall of radioactive contamination and thereafter detaches from the shaft to fall into the hot cell chamber.

  5. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her...

  6. LOCH: Open Access Facilitator Job Description (DRAFT) 

    E-Print Network [OSTI]

    McMahon, Jacqueline

    2015-03-23T23:59:59.000Z

    DRAFT Job Description for an Open Access Facilitator job in the University of Edinburgh's College of Humanities and Social Sciences. This draft job description is being made available as part of the Jisc-funded LOCH Project....

  7. Rail Access to Yucca Mountain: Critical Issues

    SciTech Connect (OSTI)

    Halstead, R. J.; Dilger, F.; Moore, R. C.

    2003-02-25T23:59:59.000Z

    The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

  8. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

    E-Print Network [OSTI]

    Carl A. Miller; Yaoyun Shi

    2015-04-10T23:59:59.000Z

    Randomness is a vital resource for modern day information processing, especially for cryptography. A wide range of applications critically rely on abundant, high quality random numbers generated securely. Here we show how to expand a random seed at an exponential rate without trusting the underlying quantum devices. Our approach is secure against the most general adversaries, and has the following new features: cryptographic quality output security, tolerating a constant level of implementation imprecision, requiring only a constant size quantum memory for the honest implementation, and allowing a large natural class of constructions. In conjunct with a recent work by Chung, Shi and Wu (QIP 2014), it also leads to robust unbounded expansion using just 2 multi-part devices. When adapted for distributing cryptographic keys, our method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance. The proof proceeds by showing that the Renyi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates. At the heart of the proof are a new uncertainty principle on quantum measurements, and a method for simulating trusted measurements with untrusted devices.

  9. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  10. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

  11. NBP RFI: Data Access Honeywell Responses To Request for Information...

    Broader source: Energy.gov (indexed) [DOE]

    on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

  12. Bursting at the Seams: Water Access and Housing in Luanda

    E-Print Network [OSTI]

    Bulfin, Michael Patrick

    2009-01-01T23:59:59.000Z

    constructed areas. The lack of water access and properand how the lack of access to clean water, coupled withmost slum residents lack knowledge about the basics of water

  13. access control scheme: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  14. access control mac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  15. access control transportation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  16. access system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  17. Increasing Community Access to Solar: Designing and Developing...

    Broader source: Energy.gov (indexed) [DOE]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System (Fact Sheet), U.S. Department of Energy (DOE) Increasing Community Access to...

  18. Request Access to the PARSIIe Project Management Lessons Learned...

    Energy Savers [EERE]

    Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository PURPOSE...

  19. accessing integrated genomic: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 RESEARCH ARTICLE Open Access Integrating cytogenetics and genomics in Environmental Sciences and Ecology Websites Summary: RESEARCH ARTICLE Open Access...

  20. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  1. access control policies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Resiliency Policies in Access Control , Mahesh Tripunitara Computer Technologies and Information Sciences Websites Summary: Resiliency Policies in Access...

  2. Ames Lab 101: Ultrafast Magnetic Switching

    ScienceCinema (OSTI)

    Jigang Wang

    2013-06-05T23:59:59.000Z

    Ames Laboratory physicists have found a new way to switch magnetism that is at least 1000 times faster than currently used in magnetic memory technologies. Magnetic switching is used to encode information in hard drives, magnetic random access memory and other computing devices. The discovery potentially opens the door to terahertz and faster memory speeds.

  3. Scalla: Structured Cluster Architecture for Low Latency Access

    SciTech Connect (OSTI)

    Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

    2012-03-20T23:59:59.000Z

    Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

  4. Correlated bursts and the role of memory range

    E-Print Network [OSTI]

    Jo, Hang-Hyun; Kaski, Kimmo; Kertesz, Janos

    2015-01-01T23:59:59.000Z

    Inhomogeneous temporal processes in natural and social phenomena have been described by bursts that are rapidly occurring events within short time periods alternating with long periods of low activity. In addition to the analysis of heavy-tailed inter-event time distributions, higher-order correlations between inter-event times, called \\emph{correlated bursts}, have been studied only recently. As the possible mechanisms underlying such correlated bursts are far from being fully understood, we devise a simple model for correlated bursts by using a self-exciting point process with variable memory range. Here the probability that a new event occurs is determined by a memory function that is the sum of decaying memories of the past events. In order to incorporate the noise and/or limited memory capacity of systems, we apply two memory loss mechanisms, namely either fixed number or variable number of memories. By using theoretical analysis and numerical simulations we find that excessive amount of memory effect ma...

  5. Serotoninmushroom body circuit modulating the formation of anesthesia-resistant memory

    E-Print Network [OSTI]

    Huang, Haimei

    Serotonin­mushroom body circuit modulating the formation of anesthesia-resistant memory in Drosophila produces two genetically distinct forms of intermediate-term memories: anesthesia-sensitive memory, which requires the amnesiac gene, and anesthesia- resistant memory (ARM), which requires the radish gene

  6. Identification of Quaternary Shape Memory Alloys with Near-Zero Thermal Hysteresis and Unprecedented

    E-Print Network [OSTI]

    Rubloff, Gary W.

    Identification of Quaternary Shape Memory Alloys with Near-Zero Thermal Hysteresis the class of materials showing a reversible martensitic phase transformation and a shape memory effect (SME fatigue of shape memory alloys (SMAs) resulting in changes of physical, mechan- ical, and shape memory (SM

  7. THE EFFECTS OF LASER FORMING ON SUPERELASTIC NITI SHAPE MEMORY ALLOYS Paper # P529

    E-Print Network [OSTI]

    Yao, Y. Lawrence

    THE EFFECTS OF LASER FORMING ON SUPERELASTIC NITI SHAPE MEMORY ALLOYS Paper # P529 Andrew J Abstract This work focuses on application of the laser forming process to NiTi shape memory alloys. While all NiTi shape memory alloys exhibit both superlasticity and the shape memory effect, this study

  8. Behavior and modeling of superelastic shape memory alloy reinforced concrete beams

    E-Print Network [OSTI]

    Vecchio, Frank J.

    Behavior and modeling of superelastic shape memory alloy reinforced concrete beams Alaa Abdulridha analysis a b s t r a c t The re-centering phenomenon of superelastic Shape Memory Alloy (SMA) reinforced as Shape Memory Alloys (SMAs) has emerged in the research community. Shape memory al- loys have the ability

  9. Age Differences in the Frontal Lateralization of Verbal and Spatial Working Memory

    E-Print Network [OSTI]

    working memory in the human brain (Petrides, Alivisatos, Meyer, & Evans, 1993; Smith & Jonides, 1998; cf

  10. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (900 N. Randolph St., Arlington, VA 22203); Vanheusden, Karel J. R. (8401 Spain Rd., Albuquerque, NM 87111); Fleetwood, Daniel M. (5513 Estrellita del Norte, NE., Albuquerque, NM 87111); Devine, Roderick A. B. (12 Impasse de la Liberation, 38950 St. Martin le Vinoux, FR); Archer, Leo B. (3108 Vicky Ct., Garland, TX 75044); Brown, George A. (1512 Ridgeview Dr., Arlington, TX 76012-1940); Wallace, Robert M. (428 Park Bend Dr., Richardson, TX 75081)

    2000-01-01T23:59:59.000Z

    An enhancement of an electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure during an anneal in an atmosphere containing hydrogen gas. Device operation is enhanced by concluding this anneal step with a sudden cooling. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronics elements on the same silicon substrate.

  11. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, Ahmad A. (Bolingbrook, IL)

    1981-01-01T23:59:59.000Z

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  12. Release mechanism utilizing shape memory polymer material

    DOE Patents [OSTI]

    Lee, Abraham P. (Walnut Creek, CA); Northrup, M. Allen (Berkeley, CA); Ciarlo, Dino R. (Livermore, CA); Krulevitch, Peter A. (Pleasanton, CA); Benett, William J. (Livermore, CA)

    2000-01-01T23:59:59.000Z

    Microfabricated therapeutic actuators are fabricated using a shape memory polymer (SMP), a polyurethane-based material that undergoes a phase transformation at a specified temperature (Tg). At a temperature above temperature Tg material is soft and can be easily reshaped into another configuration. As the temperature is lowered below temperature Tg the new shape is fixed and locked in as long as the material stays below temperature Tg. Upon reheating the material to a temperature above Tg, the material will return to its original shape. By the use of such SMP material, SMP microtubing can be used as a release actuator for the delivery of embolic coils through catheters into aneurysms, for example. The microtubing can be manufactured in various sizes and the phase change temperature Tg is determinate for an intended temperature target and intended use.

  13. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, A.A.

    1980-01-21T23:59:59.000Z

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  14. Random Walks and Electrical Networks Electrical Network

    E-Print Network [OSTI]

    Jonathon Peterson

    2008-01-30T23:59:59.000Z

    Feb 4, 2008 ... Random Walks and Electrical Networks. Hitting Probabilities and Voltage. Voltage. Connect a 1V battery to nodes a and b. ix,y is the current ...

  15. MOMENT ASYMPTOTICS FOR MULTITYPE BRANCHING RANDOM WALKS

    E-Print Network [OSTI]

    König, Wolfgang

    of Montenegro 29 October, 2013 Abstract. We study a discrete time multitype branching random walk on a finite of Montenegro, Cetinjska 2, 81 000 Podgorica, Montenegro, ozrens@t-com.me AMS 2010 Subject Classification: 60J80

  16. MOMENT ASYMPTOTICS FOR MULTITYPE BRANCHING RANDOM WALKS

    E-Print Network [OSTI]

    König, Wolfgang

    of Montenegro 29 October, 2013 Abstract. We study a discrete time multitype branching random walk on a #28;nite of Montenegro, Cetinjska 2, 81 000 Podgorica, Montenegro, ozrens@t-com.me AMS 2010 Subject Classi#28;cation: 60J

  17. How Can Random Noise Help Us

    E-Print Network [OSTI]

    2009-03-18T23:59:59.000Z

    Basics of Random Walk – 2. 0. 5. 10. 15. 20. 25. 30. 35. 40. 45. 50. ?5. ?4. ?3. ?2. ?1. 0 ..... Back to Parrondo's Paradox. Playing Game A. . winning prob = 0.495.

  18. Chaotic generation of pseudo-random numbers

    E-Print Network [OSTI]

    Dornbusch, Andrew Wesley

    1999-01-01T23:59:59.000Z

    Generation of repeatable pseudo-random sequences with chaotic analog electronics is not feasible using standard circuit topologies. Component variation caused by imperfect fabrication causes the same divergence of output sequences as does varying...

  19. Spectral statistics for weakly correlated random potentials

    E-Print Network [OSTI]

    Frédéric Klopp

    2012-10-29T23:59:59.000Z

    We study localization and derive stochastic estimates (in particular, Wegner and Minami estimates) for the eigenvalues of weakly correlated random discrete Schr\\"odinger operators in the localized phase. We apply these results to obtain spectral statistics for general discrete alloy type models where the single site perturbation is neither of finite rank nor of fixed sign. In particular, for the models under study, the random potential exhibits correlations at any range.

  20. Hardware support for collecting performance counters directly to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W.

    2012-09-25T23:59:59.000Z

    Hardware support for collecting performance counters directly to memory, in one aspect, may include a plurality of performance counters operable to collect one or more counts of one or more selected activities. A first storage element may be operable to store an address of a memory location. A second storage element may be operable to store a value indicating whether the hardware should begin copying. A state machine may be operable to detect the value in the second storage element and trigger hardware copying of data in selected one or more of the plurality of performance counters to the memory location whose address is stored in the first storage element.