Powered by Deep Web Technologies
Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Materials Selection for Oxide-based Resistive Random Access Memories  

E-Print Network [OSTI]

The energies of atomic processes in resistive random access memories (RRAMs) are calculated for four typical oxides, HfO2, TiO2, Ta 2O5, and Al2O3, to define a materials selection process. O vacancies have the lowest defect formation energy in the O...

Guo, Yuzheng; Robertson, John

2014-12-05T23:59:59.000Z

2

Paging memory from random access memory to backing storage in a parallel computer  

DOE Patents [OSTI]

Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

2013-05-21T23:59:59.000Z

3

A random access memory immune to single event upset using a T-Resistor  

DOE Patents [OSTI]

In a random access memory cell, a resistance ''T'' decoupling network in each leg of the cell reduces random errors caused by the interaction of energetic ions with the semiconductor material forming the cell. The cell comprises two parallel legs each containing a series pair of complementary MOS transistors having a common gate connected to the node between the transistors of the opposite leg. The decoupling network in each leg is formed by a series pair of resistors between the transistors together with a third resistor interconnecting the junction between the pair of resistors and the gate of the transistor pair forming the opposite leg of the cell. 4 figs.

Ochoa, A. Jr.

1987-10-28T23:59:59.000Z

4

Random access memory immune to single event upset using a T-resistor  

DOE Patents [OSTI]

In a random access memory cell, a resistance "T" decoupling network in each leg of the cell reduces random errors caused by the interaction of energetic ions with the semiconductor material forming the cell. The cell comprises two parallel legs each containing a series pair of complementary MOS transistors having a common gate connected to the node between the transistors of the opposite leg. The decoupling network in each leg is formed by a series pair of resistors between the transistors together with a third resistor interconnecting the junction between the pair of resistors and the gate of the transistor pair forming the opposite leg of the cell.

Ochoa, Jr., Agustin (Vista, CA)

1989-01-01T23:59:59.000Z

5

Dual operation characteristics of resistance random access memory in indium-gallium-zinc-oxide thin film transistors  

SciTech Connect (OSTI)

In this study, indium-gallium-zinc-oxide thin film transistors can be operated either as transistors or resistance random access memory devices. Before the forming process, current-voltage curve transfer characteristics are observed, and resistance switching characteristics are measured after a forming process. These resistance switching characteristics exhibit two behaviors, and are dominated by different mechanisms. The mode 1 resistance switching behavior is due to oxygen vacancies, while mode 2 is dominated by the formation of an oxygen-rich layer. Furthermore, an easy approach is proposed to reduce power consumption when using these resistance random access memory devices with the amorphous indium-gallium-zinc-oxide thin film transistor.

Yang, Jyun-Bao; Chen, Yu-Ting; Chu, Ann-Kuo [Department of Photonics, National Sun Yat-Sen University, Kaohsiung, Taiwan (China); Chang, Ting-Chang, E-mail: tcchang@mail.phys.nsysu.edu.tw [Department of Photonics, National Sun Yat-Sen University, Kaohsiung, Taiwan (China); Department of Physics, National Sun Yat-Sen University, Kaohsiung, Taiwan (China); Advanced Optoelectronics Technology Center, National Cheng Kung University, Taiwan (China); Huang, Jheng-Jie; Chen, Yu-Chun; Tseng, Hsueh-Chih [Department of Physics, National Sun Yat-Sen University, Kaohsiung, Taiwan (China); Sze, Simon M. [Department of Physics, National Sun Yat-Sen University, Kaohsiung, Taiwan (China); Department of Electronics Engineering, National Chiao Tung University, Hsinchu, Taiwan (China)

2014-04-14T23:59:59.000Z

6

Carbon Resistive Random Access Memory Materials -CareRAMM An FP7 NMP Project led by the University of Exeter and in collaboration with IBM Research  

E-Print Network [OSTI]

Carbon Resistive Random Access Memory Materials - CareRAMM An FP7 NMP Project led by the University, super-paramagnetic limits in magnetic disk storage). In this context the time is ripe for intensive capable of implementation in a flexible format are thus essential. It is in this context that carbon

Mumby, Peter J.

7

Total ionizing dose effect of ?-ray radiation on the switching characteristics and filament stability of HfOx resistive random access memory  

SciTech Connect (OSTI)

The total ionizing dose (TID) effect of gamma-ray (?-ray) irradiation on HfOx based resistive random access memory was investigated by electrical and material characterizations. The memory states can sustain TID level ?5.2 Mrad (HfO{sub 2}) without significant change in the functionality or the switching characteristics under pulse cycling. However, the stability of the filament is weakened after irradiation as memory states are more vulnerable to flipping under the electrical stress. X-ray photoelectron spectroscopy was performed to ascertain the physical mechanism of the stability degradation, which is attributed to the Hf-O bond breaking by the high-energy ?-ray exposure.

Fang, Runchen; Yu, Shimeng, E-mail: shimengy@asu.edu [School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, Arizona 85281 (United States); School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, Arizona 85287 (United States); Gonzalez Velo, Yago; Chen, Wenhao; Holbert, Keith E.; Kozicki, Michael N.; Barnaby, Hugh [School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, Arizona 85287 (United States)

2014-05-05T23:59:59.000Z

8

Distribution of nanoscale nuclei in the amorphous dome of a phase change random access memory  

SciTech Connect (OSTI)

The nanoscale crystal nuclei in an amorphous Ge{sub 2}Sb{sub 2}Te{sub 5} bit in a phase change memory device were evaluated by fluctuation transmission electron microscopy. The quench time in the device (?10 ns) afforded more and larger nuclei in the melt-quenched state than in the as-deposited state. However, nuclei were even more numerous and larger in a test structure with a longer quench time (?100 ns), verifying the prediction of nucleation theory that slower cooling produces more nuclei. It also demonstrates that the thermal design of devices will strongly influence the population of nuclei, and thus the speed and data retention characteristics.

Lee, Bong-Sub, E-mail: bongsub@gmail.com; Darmawikarta, Kristof; Abelson, John R. [Department of Materials Science and Engineering and the Coordinated Sciences Laboratory, University of Illinois at Urbana-Champaign, Urbana, Illinois 61801 (United States); Raoux, Simone; Shih, Yen-Hao; Zhu, Yu [IBM/Macronix PCRAM Joint Project, IBM T. J. Watson Research Center, Yorktown Heights, New York 10598 (United States); Bishop, Stephen G. [Department of Materials Science and Engineering and the Coordinated Sciences Laboratory, University of Illinois at Urbana-Champaign, Urbana, Illinois 61801 (United States); Department of Electrical and Computer Engineering and the Coordinated Sciences Laboratory, University of Illinois at Urbana-Champaign, Urbana, Illinois 61801 (United States)

2014-02-17T23:59:59.000Z

9

Mechanism of power consumption inhibitive multi-layer Zn:SiO{sub 2}/SiO{sub 2} structure resistance random access memory  

SciTech Connect (OSTI)

In this paper, multi-layer Zn:SiO{sub 2}/SiO{sub 2} structure is introduced to reduce the operation power consumption of resistive random access memory (RRAM) device by modifying the filament formation process. And the configuration of multi-layer Zn:SiO{sub 2}/SiO{sub 2} structure is confirmed and demonstrated by auger electron spectrum. Material analysis together with conduction current fitting is applied to qualitatively evaluate the carrier conduction mechanism on both low resistance state and high resistance state. Finally, single layer and multilayer conduction models are proposed, respectively, to clarify the corresponding conduction characteristics of two types of RRAM devices.

Zhang, Rui; Lou, Jen-Chung [School of Software and Microelectronics, Peking University, Beijing 100871 (China); Tsai, Tsung-Ming, E-mail: tmtsai@faculty.nsysu.edu.tw, E-mail: tcchang@mail.phys.nsysu.edu.tw; Chang, Kuan-Chang; Huang, Syuan-Yong; Shih, Chih-Cheng; Pan, Jhih-Hong; Tung, Cheng-Wei [Department of Materials and Optoelectronic Science, National Sun Yat-Sen University, Kaohsiung 804, Taiwan (China); Chang, Ting-Chang, E-mail: tmtsai@faculty.nsysu.edu.tw, E-mail: tcchang@mail.phys.nsysu.edu.tw [Department of Physics, National Sun Yat-Sen University, Kaohsiung 804, Taiwan (China); Advanced Optoelectronics Technology Center, National Cheng Kung University, Tainan 700, Taiwan (China); Chen, Kai-Huang [Department of Electronics Engineering and Computer Science, Tung-Fang Design Institute, Kaohsiung, Taiwan (China); Young, Tai-Fa; Chen, Hsin-Lu [Department of Mechanical and Electro-Mechanical Engineering, National Sun Yat-Sen University, Kaohsiung, Taiwan (China); Chen, Jung-Hui [Department of Chemistry, National Kaohsiung Normal University, Kaohsiung, Taiwan (China); Chen, Min-Chen; Syu, Yong-En [Department of Physics, National Sun Yat-Sen University, Kaohsiung 804, Taiwan (China); Sze, Simon M. [Department of Electronics Engineering, National Chiao Tung University, Hsinchu 300, Taiwan (China)

2013-12-21T23:59:59.000Z

10

Remote direct memory access  

DOE Patents [OSTI]

Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

Archer, Charles J.; Blocksome, Michael A.

2012-12-11T23:59:59.000Z

11

Evaluation of the colossal electroresistance (CER) effect and its application in the non-volatile Resistive Random Access Memory (RRAM)  

E-Print Network [OSTI]

Flash memory, the current leading technology for non-volatile memory (NVM), is projected by many to run obsolete in the face of future miniaturization trend in the semiconductor devices due to some of its technical ...

Wicaksono, Aulia Tegar

2009-01-01T23:59:59.000Z

12

Low leakage Ru-strontium titanate-Ru metal-insulator-metal capacitors for sub-20?nm technology node in dynamic random access memory  

SciTech Connect (OSTI)

Improved metal-insulator-metal capacitor (MIMCAP) stacks with strontium titanate (STO) as dielectric sandwiched between Ru as top and bottom electrode are shown. The Ru/STO/Ru stack demonstrates clearly its potential to reach sub-20?nm technology nodes for dynamic random access memory. Downscaling of the equivalent oxide thickness, leakage current density (J{sub g}) of the MIMCAPs, and physical thickness of the STO have been realized by control of the Sr/Ti ratio and grain size using a heterogeneous TiO{sub 2}/STO based nanolaminate stack deposition and a two-step crystallization anneal. Replacement of TiN with Ru as both top and bottom electrodes reduces the amount of electrically active defects and is essential to achieve a low leakage current in the MIM capacitor.

Popovici, M., E-mail: Mihaela.Ioana.Popovici@imec.be; Swerts, J.; Redolfi, A.; Kaczer, B.; Aoulaiche, M.; Radu, I.; Clima, S.; Everaert, J.-L.; Van Elshocht, S.; Jurczak, M. [Imec, Leuven 3001 (Belgium)

2014-02-24T23:59:59.000Z

13

Effect of memory access and caching on high performance computing.  

E-Print Network [OSTI]

??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers… (more)

Groening, James

2012-01-01T23:59:59.000Z

14

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

2010-10-19T23:59:59.000Z

15

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2007-02-06T23:59:59.000Z

16

Influence of carbon content on the copper-telluride phase formation and on the resistive switching behavior of carbon alloyed Cu-Te conductive bridge random access memory cells  

SciTech Connect (OSTI)

In this paper, we investigate the influence of the carbon content on the Cu-Te phase formation and on the resistive switching behavior in carbon alloyed Cu{sub 0.6}Te{sub 0.4} based conductive bridge random access memory (CBRAM) cells. Carbon alloying of copper-tellurium inhibits the crystallization, while attractive switching behavior is preserved when using the material as Cu-supply layer in CBRAM cells. The phase formation is first investigated in a combinatorial way. With increasing carbon content, an enlargement of the temperature window in which the material stays amorphous was observed. Moreover, if crystalline phases are formed, subsequent phase transformations are inhibited. The electrical switching behavior of memory cells with different carbon contents is then investigated by implementing them in 580??m diameter dot TiN/Cu{sub 0.6}Te{sub 0.4}-C/Al{sub 2}O{sub 3}/Si memory cells. Reliable switching behavior is observed for carbon contents up to 40 at. %, with a resistive window of more than 2 orders of magnitude, whereas for 50 at. % carbon, a higher current in the off state and only a small resistive window are present after repeated cycling. This degradation can be ascribed to the higher thermal and lower drift contribution to the reset operation due to a lower Cu affinity towards the supply layer, leading cycle-after-cycle to an increasing amount of Cu in the switching layer, which contributes to the current. The thermal diffusion of Cu into Al{sub 2}O{sub 3} under annealing also gives an indication of the Cu affinity of the source layer. Time of flight secondary ion mass spectroscopy was used to investigate this migration depth in Al{sub 2}O{sub 3} before and after annealing, showing a higher Cu, Te, and C migration for high carbon contents.

Devulder, Wouter, E-mail: Wouter.Devulder@UGent.be; De Schutter, Bob; Detavernier, Christophe [Department of Solid State Sciences, Universiteit Gent, Krijgslaan 281 (S1), 9000 Gent (Belgium); Opsomer, Karl; Franquet, Alexis; Meersschaut, Johan; Muller, Robert; Van Elshocht, Sven; Jurczak, Malgorzata; Goux, Ludovic [IMEC, Kapeldreef 75, 3001 Leuven (Belgium); Belmonte, Attilio [IMEC, Kapeldreef 75, 3001 Leuven (Belgium); KU Leuven, Department of Physics and Astronomy, Celestijnenlaan 200D, 3001 Leuven (Belgium)

2014-02-07T23:59:59.000Z

17

Hydrodynamical random walker with chemotactic memory  

E-Print Network [OSTI]

A three-dimensional hydrodynamical model for a micro random walker is combined with the idea of chemotactic signaling network of E. coli. Diffusion exponents, orientational correlation functions and their dependence on the geometrical and dynamical parameters of the system are analyzed numerically. Because of the chemotactic memory, the walker shows superdiffusing displacements in all directions with the largest diffusion exponent for a direction along the food gradient. Mean square displacements and orientational correlation functions show that the chemotactic memory washes out all the signatures due to the geometrical asymmetry of the walker and statistical properties are asymmetric only with respect to the direction of food gradient. For different values of the memory time, the Chemotactic index (CI) is also calculated.

H. Mohammady; B. Esckandariun; A. Najafi

2014-10-01T23:59:59.000Z

18

Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses  

E-Print Network [OSTI]

Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses Bertrand Le pipelined memory access controllers can be generated improving the pipeline access mode to RAM. We focus as unpredictable ones (dynamic address computations) in a pipeline way. 1 Introduction Actual researches

Paris-Sud XI, Université de

19

Remote direct memory access over datagrams  

DOE Patents [OSTI]

A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

2014-12-02T23:59:59.000Z

20

Direct memory access transfer completion notification  

DOE Patents [OSTI]

Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

2010-07-27T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses  

DOE Patents [OSTI]

In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

Ohmacht, Martin

2014-09-09T23:59:59.000Z

22

Instruction sets for Parallel Random Access Machines  

SciTech Connect (OSTI)

The computational powers of time-bounded Parallel Random Access Machines (PRAMs) with different instruction sets are compared. A basic PRAM can perform the following operations in unit-time: addition, subtraction, Boolean operations, comparisons, and indirect addressing. Multiple processors may concurrently read and concurrently write a single cell. This thesis establishes that the class of languages accepted in polynomial time on a PRAM(*, {up arrow}, {down arrow}) contains the class of languages accepted in exponential time on a nondeterministic Turing machine (NEXPTIME) and is contained in the class of languages accepted in exponential space on a Turing machine. Efficient simulations are presented of PRAMs with enhanced instruction sets by sequential RAMs with the same instruction sets; also simulations of probabilistic PRAMs by deterministic PRAMs, using parallelism to replace randomness. Also given are simulations of PRAM(op)s by PRAMs, where both the simulated machine and the simulating machine are exclusive-read, exclusive-write machines.

Trahan, J.L.

1988-01-01T23:59:59.000Z

23

Distributed Random Access Algorithm: Scheduling and Congesion Control  

E-Print Network [OSTI]

This paper provides proofs of the rate stability, Harris recurrence, and ?-optimality of carrier sense multiple access (CSMA) algorithms where the random access (or backoff) parameter of each node is adjusted dynamically. ...

Jiang, Libin

24

Direct access inter-process shared memory  

DOE Patents [OSTI]

A technique for directly sharing physical memory between processes executing on processor cores is described. The technique includes loading a plurality of processes into the physical memory for execution on a corresponding plurality of processor cores sharing the physical memory. An address space is mapped to each of the processes by populating a first entry in a top level virtual address table for each of the processes. The address space of each of the processes is cross-mapped into each of the processes by populating one or more subsequent entries of the top level virtual address table with the first entry in the top level virtual address table from other processes.

Brightwell, Ronald B; Pedretti, Kevin; Hudson, Trammell B

2013-10-22T23:59:59.000Z

25

Instruction sets for Parallel Random Access Machines. Doctoral thesis  

SciTech Connect (OSTI)

An important model of parallel computation is the Parallel Random Access Machine (PRAM), which comprises multiple processors that execute instructions synchronously and share a common memory. Formalized by Fortune and Wyllie (1978) and Goldschlager (1982), the PRAM is a much more natural model of parallel computation than older models such as combinational circuits and alternating Turing machines (Ruzzo, 1981) because the PRAM abstracts the salient features of a modern multiprocessor computer. Eventually an algorithm developed for the PRAM can be implemented on a parallel network computer such as a mesh-connected array computer (Thompson and Kung, 1977), a hypercube machine (Seitz, 1985), a cube-connected cycles machine (Preparata and Vuillemin, 1981) or a bounded degree processor network (Alt et al., 1987); on all network computers the routing of data complicates the implementation of algorithms. The PRAM provides the foundation for the design of highly parallel algorithms (Luby, 1986; Miller and Reif, 1985; among many others). This model permits the exposure of the intrinsic parallelism in a computational problem because it simplifies the communication of data through a shared memory. To quantify differences in computational performance, the time complexities of simulations between PRAMS with different instruction sets are determined. Focus is on the computational complexity of simulations between PRAMs with the following operations: multiplication, division, arbitrary left shift, arbitrary right shift, and probabilistic choice.

Trahan, J.L.

1988-08-01T23:59:59.000Z

26

Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer  

DOE Patents [OSTI]

Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

Blocksome, Michael A; Mamidala, Amith R

2014-02-11T23:59:59.000Z

27

Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer  

DOE Patents [OSTI]

Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

Blocksome, Michael A.; Mamidala, Amith R.

2013-09-03T23:59:59.000Z

28

Quantifying Locality in the Memory Access Patterns of HPCApplications  

SciTech Connect (OSTI)

Several benchmarks for measuring memory performance of HPC systems along dimensions of spatial and temporal memory locality have recently been proposed. However, little is understood about the relationships of these benchmarks to real applications and to each other. In this paper, we propose a methodology for producing architecture-neutral characterizations of the spatial and temporal locality exhibited by the memory access patterns of applications. We demonstrate that the results track intuitive notions of spatial and temporal locality on several synthetic and application benchmarks. We employ the methodology to analyze the memory performance components of the HPC Challenge Benchmarks, the Apex-MAP benchmark, and their relationships to each other and other benchmarks and applications. We show that this analysis can be used to both increase understanding of the benchmarks and enhance their usefulness by mapping them, along with applications, to a 2-D space along axes of spatial and temporal locality.

Weinberg, Jonathan; Snavely, Allan; McCracken, Michael O.; Strohmaier, Erich

2005-07-25T23:59:59.000Z

29

Direct memory access transfer completion notification  

DOE Patents [OSTI]

DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

2011-02-15T23:59:59.000Z

30

Random Access Compressed Sensing over Fading and Noisy Communication Channels  

E-Print Network [OSTI]

of the climate change. Such applications require the least control and intervention as well as minimum energy1 Random Access Compressed Sensing over Fading and Noisy Communication Channels Fatemeh Fazel on integrating random sensing with the communication architecture, and achieves overall efficiency in terms

Stojanovic, Milica

31

Administering an epoch initiated for remote memory access  

DOE Patents [OSTI]

Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

Blocksome, Michael A; Miller, Douglas R

2014-03-18T23:59:59.000Z

32

Administering an epoch initiated for remote memory access  

DOE Patents [OSTI]

Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

Blocksome, Michael A.; Miller, Douglas R.

2013-01-01T23:59:59.000Z

33

Efficient Memory Access with NumPy Global Arrays using Local Memory Access  

SciTech Connect (OSTI)

This paper discusses the work completed working with Global Arrays of data on distributed multi-computer systems and improving their performance. The tasks completed were done at Pacific Northwest National Laboratory in the Science Undergrad Laboratory Internship program in the summer of 2013 for the Data Intensive Computing Group in the Fundamental and Computational Sciences DIrectorate. This work was done on the Global Arrays Toolkit developed by this group. This toolkit is an interface for programmers to more easily create arrays of data on networks of computers. This is useful because scientific computation is often done on large amounts of data sometimes so large that individual computers cannot hold all of it. This data is held in array form and can best be processed on supercomputers which often consist of a network of individual computers doing their computation in parallel. One major challenge for this sort of programming is that operations on arrays on multiple computers is very complex and an interface is needed so that these arrays seem like they are on a single computer. This is what global arrays does. The work done here is to use more efficient operations on that data that requires less copying of data to be completed. This saves a lot of time because copying data on many different computers is time intensive. The way this challenge was solved is when data to be operated on with binary operations are on the same computer, they are not copied when they are accessed. When they are on separate computers, only one set is copied when accessed. This saves time because of less copying done although more data access operations were done.

Daily, Jeffrey A.; Berghofer, Dan C.

2013-08-03T23:59:59.000Z

34

Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests  

DOE Patents [OSTI]

A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

Gala, Alan; Ohmacht, Martin

2014-09-02T23:59:59.000Z

35

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks Paul G protocol design for wireless ad hoc networks is between proactive and reactive coor- dination, where describe Clique-Based Randomized Multiple Access (CRMA), a distributed MAC protocol for wireless ad hoc

36

access memory devices: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences Websites Summary: magnetic disks, such as lower access latency, lower power consumption, lack of noise, and shock resistance of traditional...

37

Energy-Performance Trade-offs for Spatial Access Methods on Memory-Resident Data  

E-Print Network [OSTI]

Energy-Performance Trade-offs for Spatial Access Methods on Memory-Resident Data Ning An Sudhanva-force approach that does not use an index. The results show that there are both performance and energy trade also play an important role in determining the energy-performance trade-offs. Further, technological

Gurumurthi, Sudhanva

38

A Stackelberg Game for Cooperative Transmission and Random Access in Cognitive Radio Networks  

E-Print Network [OSTI]

their strategies of random access when the licensed spectrum of the PU is available. In this paper, we first) scheme. I. INTRODUCTION Spectrum resources are scarce and the demand for the radio spectrum has been], fixed spectrum allocation may not always be efficient and the licensed spectrum may remain unoccupied

Wong, Vincent

39

Circuit design for embedded memory in low-power integrated circuits  

E-Print Network [OSTI]

This thesis explores the challenges for integrating embedded static random access memory (SRAM) and non-volatile memory-based on ferroelectric capacitor technology-into lowpower integrated circuits. First considered is the ...

Qazi, Masood

2012-01-01T23:59:59.000Z

40

Analyzing the Energy and Power Consumption of Remote Memory Accesses in the OpenSHMEM Model  

SciTech Connect (OSTI)

PGAS models like OpenSHMEM provide interfaces to explicitly initiate one-sided remote memory accesses among processes. In addition, the model also provides synchronizing barriers to ensure a consistent view of the distributed memory at different phases of an application. The incorrect use of such interfaces affects the scalability achievable while using a parallel programming model. This study aims at understanding the effects of these constructs on the energy and power consumption behavior of OpenSHMEM applications. Our experiments show that cost incurred in terms of the total energy and power consumed depends on multiple factors across the software and hardware stack. We conclude that there is a significant impact on the power consumed by the CPU and DRAM due to multiple factors including the design of the data transfer patterns within an application, the design of the communication protocols within a middleware, the architectural constraints laid by the interconnect solutions, and also the levels of memory hierarchy within a compute node. This work motivates treating energy and power consumption as important factors while designing compute solutions for current and future distributed systems.

Jana, Siddhartha [University of Houston, Houston] [University of Houston, Houston; Hernandez, Oscar R [ORNL] [ORNL; Poole, Stephen W [ORNL] [ORNL; Hsu, Chung-Hsing [ORNL] [ORNL; Chapman, Barbara [University of Houston, Houston] [University of Houston, Houston

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Appeared in Proceedings of First International ACM/IEEE Symposium on Code Generation and Optimization, 2003 Optimizing Memory Accesses For Spatial Computation  

E-Print Network [OSTI]

many efficient and powerful optimizations it cannot be easily applied in the presence of pointers and Optimization, 2003 Optimizing Memory Accesses For Spatial Computation Mihai Budiu and Seth C. Goldstein present the internal representation and optimizations used by the CASH compiler for improving the memory

Budiu, Mihai

42

Secure Memories Resistant to Both Random Errors and Fault Injection Attacks Using Nonlinear Error Correction Codes  

E-Print Network [OSTI]

University, Boston , USA shizunge@bu.edu, wang.zhen.mtk@gmail.com, luopei@bu.edu, markkar@bu.edu Abstract and internal memories in em- bedded systems. Non-volatile memories like EEPROM and Flashes are often used author now works for Mediatek Wireless, Inc. The work of the fourth author is sponsored by the NSF grant

43

Multi-scale quantum point contact model for filamentary conduction in resistive random access memories devices  

SciTech Connect (OSTI)

We depart from first-principle simulations of electron transport along paths of oxygen vacancies in HfO{sub 2} to reformulate the Quantum Point Contact (QPC) model in terms of a bundle of such vacancy paths. By doing this, the number of model parameters is reduced and a much clearer link between the microscopic structure of the conductive filament (CF) and its electrical properties can be provided. The new multi-scale QPC model is applied to two different HfO{sub 2}-based devices operated in the unipolar and bipolar resistive switching (RS) modes. Extraction of the QPC model parameters from a statistically significant number of CFs allows revealing significant structural differences in the CF of these two types of devices and RS modes.

Lian, Xiaojuan, E-mail: xjlian2005@gmail.com; Cartoixà, Xavier; Miranda, Enrique; Suñé, Jordi [Departament d'Enginyeria Electrònica, Universitat Autònoma de Barcelona, 08193 Bellaterra (Spain); Perniola, Luca [CEA-LETI, MINATEC, Grenoble (France); Rurali, Riccardo [Institut de Ciència de Materials de Barcelona (ICMAB-CSIC), Campus de Bellaterra, 08193 Bellaterra (Spain); Long, Shibing; Liu, Ming [Laboratory of Nanofabrication and Novel Device Integration, Institute of Microelectronics, Chinese Academy of Sciences, Beijing 100029 (China)

2014-06-28T23:59:59.000Z

44

Dynamic Modeling and Analysis for Design of Memristive and Static Random Access Memories  

E-Print Network [OSTI]

duration. .................................................. 102 8.4 (a) The simulated phase portrait of a 65nm SRAM based on the S-H model. It shows a cell state crosses separatrix (45o line through origin) and flips to the other side; (b... as Roff . Thus, the mathematical model for memristive device resistance can be described as [18]: ? ?)1()( DwRDwRwR offon ????? , (2. 6) or it can be written as: ? ? DwRRRwR onoffoff ????)( . (2. 7) Because of physical constraint 0?w?D, P r o perty...

Ho, Yenpo

2014-08-27T23:59:59.000Z

45

Enabling access-privacy for random walk based data analysis applications q  

E-Print Network [OSTI]

of the future states depend only on the present. A Markov chain is a discrete-time stochastic process which. In this paper, we focus on access-privacy enabled outsourced Markov chain based data analysis applications This submission is an extended version of Ping Lin, K. Selc¸uk Candan: Access-private outsourcing of Markov chain

Candan, Selçuk

46

Memory abstractions for parallel programming  

E-Print Network [OSTI]

A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly ...

Lee, I-Ting Angelina

2012-01-01T23:59:59.000Z

47

Accessibility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGate Access Access

48

Memory-mapped transactions  

E-Print Network [OSTI]

Memory-mapped transactions combine the advantages of both memory mapping and transactions to provide a programming interface for concurrently accessing data on disk without explicit I/O or locking operations. This interface ...

Sukha, Jim

2005-01-01T23:59:59.000Z

49

System for loading executable code into volatile memory in a downhole tool  

DOE Patents [OSTI]

A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

2007-09-25T23:59:59.000Z

50

Performance evaluation of NUMA and COMA distributed shared-memory multiprocessors  

E-Print Network [OSTI]

Memory architecture is an important component in a distributed shared-memory parallel computer. This thesis studies three shared-memory architectures-Non-Uniform Memory Access (NUMA) with full-mapped directories, Cache-Only Memory Architecture (COMA...

Holzrichter, Michael Warren

1995-01-01T23:59:59.000Z

51

Ferroelectric tunneling element and memory applications which utilize the tunneling element  

DOE Patents [OSTI]

A tunneling element includes a thin film layer of ferroelectric material and a pair of dissimilar electrically-conductive layers disposed on opposite sides of the ferroelectric layer. Because of the dissimilarity in composition or construction between the electrically-conductive layers, the electron transport behavior of the electrically-conductive layers is polarization dependent when the tunneling element is below the Curie temperature of the layer of ferroelectric material. The element can be used as a basis of compact 1R type non-volatile random access memory (RAM). The advantages include extremely simple architecture, ultimate scalability and fast access times generic for all ferroelectric memories.

Kalinin, Sergei V. (Knoxville, TN) [Knoxville, TN; Christen, Hans M. (Knoxville, TN) [Knoxville, TN; Baddorf, Arthur P. (Knoxville, TN) [Knoxville, TN; Meunier, Vincent (Knoxville, TN) [Knoxville, TN; Lee, Ho Nyung (Oak Ridge, TN) [Oak Ridge, TN

2010-07-20T23:59:59.000Z

52

PHYSICAL REVIEW B 83, 134205 (2011) Atomic structure and electronic properties of the SixSb100-x phase-change memory material  

E-Print Network [OSTI]

.134205 PACS number(s): 64.70.dg, 61.20.Gy, 71.15.Mb, 71.15.Pd I. INTRODUCTION Most phase-change random access into the heating electrode (write or rewrite steps) that may result in degradation of the memory device. Further

Svane, Axel Torstein

2011-01-01T23:59:59.000Z

53

Mechanical memory  

DOE Patents [OSTI]

A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Albuquerque, NM); Baker, Michael S. (Albuquerque, NM)

2006-05-16T23:59:59.000Z

54

Mechanical memory  

DOE Patents [OSTI]

A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Alburquerque, NM); Baker, Michael S. (Albuquerque, NM)

2006-08-15T23:59:59.000Z

55

Web Accessibility Accessibility  

E-Print Network [OSTI]

Web Accessibility #12;Accessibility Webaim This is a pre-y prolific site that vary based on the type of web content. StaFc, content managed and dynamic web sites can benefit from our accessibility review service. Rich media

Oklahoma, University of

56

E-Print Network 3.0 - access control scheme Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Access Scheduling Schemes Zhibin Fang Xian-He Sun Yong Chen Surendra Byna... access scheduling is performed by a shared memory controller that is integrated onto the same...

57

Memory-bit selection and recording by rotating fields in vortex-core cross-point architecture  

SciTech Connect (OSTI)

In one of our earlier studies [Appl. Phys. Lett. 92, 022509 (2008)], we proposed a concept of robust information storage, recording and readout, which can be implementaed in nonvolatile magnetic random-access memories and is based on the energetically degenerated twofold ground states of vortex-core magnetizations. In the present study, we experimentally demonstrate reliable memory-bit selection and information recording in vortex-core cross-point architecture, specifically using a two-by-two vortex-state disk array. In order to efficiently switch a vortex core positioned at the intersection of crossed electrodes, two orthogonal addressing electrodes are selected, and then two Gaussian pulse currents of optimal pulse width and time delay are applied. Such tailored pulse-type rotating magnetic fields which occurs only at the selected intersection is prerequisite for a reliable memory-bit selection and low-power-consumption recording of information in the existing cross-point architecture.

Yu, Y. -S.; Jung, H.; Lee, K. -S.; Fischer, P.; Kim, S. -K.

2010-10-21T23:59:59.000Z

58

System and method for programmable bank selection for banked memory subsystems  

DOE Patents [OSTI]

A programmable memory system and method for enabling one or more processor devices access to shared memory in a computing environment, the shared memory including one or more memory storage structures having addressable locations for storing data. The system comprises: one or more first logic devices associated with a respective one or more processor devices, each first logic device for receiving physical memory address signals and programmable for generating a respective memory storage structure select signal upon receipt of pre-determined address bit values at selected physical memory address bit locations; and, a second logic device responsive to each of the respective select signal for generating an address signal used for selecting a memory storage structure for processor access. The system thus enables each processor device of a computing environment memory storage access distributed across the one or more memory storage structures.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Hoenicke, Dirk (Seebruck-Seeon, DE); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Sugavanam, Krishnan (Mahopac, NY)

2010-09-07T23:59:59.000Z

59

E-Print Network 3.0 - access ofdma systems Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

multiple access (OFDMA... ) for the random access scheme, the power line communication (PLC) can improve system throughput. In this paper, we... propose a carrier sense multiple...

60

Nanopatterned ferroelectrics for ultrahigh density rad-hard nonvolatile memories.  

SciTech Connect (OSTI)

Radiation hard nonvolatile random access memory (NVRAM) is a crucial component for DOE and DOD surveillance and defense applications. NVRAMs based upon ferroelectric materials (also known as FERAMs) are proven to work in radiation-rich environments and inherently require less power than many other NVRAM technologies. However, fabrication and integration challenges have led to state-of-the-art FERAMs still being fabricated using a 130nm process while competing phase-change memory (PRAM) has been demonstrated with a 20nm process. Use of block copolymer lithography is a promising approach to patterning at the sub-32nm scale, but is currently limited to self-assembly directly on Si or SiO{sub 2} layers. Successful integration of ferroelectrics with discrete and addressable features of {approx}15-20nm would represent a 100-fold improvement in areal memory density and would enable more highly integrated electronic devices required for systems advances. Towards this end, we have developed a technique that allows us to carry out block copolymer self-assembly directly on a huge variety of different materials and have investigated the fabrication, integration, and characterization of electroceramic materials - primarily focused on solution-derived ferroelectrics - with discrete features of {approx}20nm and below. Significant challenges remain before such techniques will be capable of fabricating fully integrated NVRAM devices, but the tools developed for this effort are already finding broader use. This report introduces the nanopatterned NVRAM device concept as a mechanism for motivating the subsequent studies, but the bulk of the document will focus on the platform and technology development.

Brennecka, Geoffrey L.; Stevens, Jeffrey; Scrymgeour, David; Gin, Aaron V.; Tuttle, Bruce Andrew

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Robust exponential memory in Hopfield networks  

E-Print Network [OSTI]

The Hopfield recurrent neural network is an auto-associative distributed model of memory. This architecture is able to store collections of generic binary patterns as robust attractors; i.e., fixed-points of the network dynamics having large basins of attraction. However, the number of (randomly generated) storable memories scales at most linearly in the number of neurons, and it has been a long-standing question whether robust super-polynomial storage is possible in recurrent networks of linear threshold elements. Here, we design sparsely-connected Hopfield networks on $n$-nodes having \\[\\frac{2^{\\sqrt{2n} + \\frac{1}{4}}}{n^{1/4} \\sqrt{\\pi}}\\] graph cliques as robust memories by analytically minimizing the probability flow objective function over these patterns. Our methods also provide a biologically plausible convex learning algorithm that efficiently discovers these networks from training on very few sample memories.

Christopher Hillar; Ngoc M. Tran

2014-11-17T23:59:59.000Z

62

Optical memory  

DOE Patents [OSTI]

Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

Mao, Samuel S; Zhang, Yanfeng

2013-07-02T23:59:59.000Z

63

Simulation of thermal reset transitions in resistive switching memories including quantum effects  

SciTech Connect (OSTI)

An in-depth study of reset processes in RRAMs (Resistive Random Access Memories) based on Ni/HfO{sub 2}/Si-n{sup +} structures has been performed. To do so, we have developed a physically based simulator where both ohmic and tunneling based conduction regimes are considered along with the thermal description of the devices. The devices under study have been successfully fabricated and measured. The experimental data are correctly reproduced with the simulator for devices with a single conductive filament as well as for devices including several conductive filaments. The contribution of each conduction regime has been explained as well as the operation regimes where these ohmic and tunneling conduction processes dominate.

Villena, M. A.; Jiménez-Molinos, F.; Roldán, J. B. [Departamento de Electrónica y Tecnología de Computadores, Universidad de Granada, Facultad de Ciencias, Avd. Fuentenueva s/n, 18071 Granada (Spain); González, M. B.; Campabadal, F. [Institut de Microelectrònica de Barcelona, IMB-CNM (CSIC), Campus UAB, 08193 Bellaterra (Spain); Suñé, J.; Miranda, E. [Departament d'Enginyeria Electrònica, Universitat Autònoma de Barcelona, Bellaterra Cerdanyola del Vallès 08193 (Spain); Romera, E. [Departamento de Física Atómica, Molecular y Nuclear and Instituto Carlos I de Física Teórica y Computacional, Universidad de Granada, Avd. Fuentenueva s/n, 18071 Granada (Spain)

2014-06-07T23:59:59.000Z

64

Randomized metarounding  

SciTech Connect (OSTI)

The authors present a new technique for the design of approximation algorithms that can be viewed as a generalization of randomized rounding. They derive new or improved approximation guarantees for a class of generalized congestion problems such as multicast congestion, multiple TSP etc. Their main mathematical tool is a structural decomposition theorem related to the integrality gap of a relaxation.

CARR,ROBERT D.; VEMPALA,SANTOSH

2000-01-25T23:59:59.000Z

65

Accessibility | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility

66

Accessing PDSF  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGateAccessing PDSF

67

Open Access  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratorySpeeding access1 TechnicalOilOnline Application Process

68

OPEN ACCESS  

E-Print Network [OSTI]

Abstract: Providing access to and utilization of medication assisted treatment (MAT) for the treatment of opioid abuse and dependence provides an important opportunity to improve public health. Access to health services comprising MAT in the community is fundamental to achieve broad service coverage. The type and placement of the health services comprising MAT and integration with primary medical care including human immunodeficiency virus (HIV) prevention, care and treatment services are optimal for addressing both substance abuse and co-occurring infectious diseases. As an HIV prevention intervention, integrated (same medical record for HIV services and MAT services) MAT with HIV prevention, care and treatment programs provides the best “one stop shopping ” approach for health service utilization. Alternatively, MAT, medical and HIV services can be separately managed but co-located to allow convenient utilization of primary care, MAT and HIV services. A third approach is coordinated care and treatment, where primary care, MAT and HIV services are provided at distinct locations and case managers, peer facilitators, or others promote direct service utilization at the various locations. Developing a continuum of care for patients with opioid dependence throughout

Thomas F. Kresina; Robert Lubran

69

Using DMA for copying performance counter data to memory  

DOE Patents [OSTI]

A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance data.

Gara, Alan; Salapura, Valentina; Wisniewski, Robert W

2013-12-31T23:59:59.000Z

70

A hybrid magnetic/complementary metal oxide semiconductor three-context memory bit cell for non-volatile circuit design  

SciTech Connect (OSTI)

After decades of continued scaling to the beat of Moore's law, it now appears that conventional silicon based devices are approaching their physical limits. In today's deep-submicron nodes, a number of short-channel and quantum effects are emerging that affect the manufacturing process, as well as, the functionality of the microelectronic systems-on-chip. Spintronics devices that exploit both the intrinsic spin of the electron and its associated magnetic moment, in addition to its fundamental electronic charge, are promising solutions to circumvent these scaling threats. Being compatible with the CMOS technology, such devices offer a promising synergy of radiation immunity, infinite endurance, non-volatility, increased density, etc. In this paper, we present a hybrid (magnetic/CMOS) cell that is able to store and process data both electrically and magnetically. The cell is based on perpendicular spin-transfer torque magnetic tunnel junctions (STT-MTJs) and is suitable for use in magnetic random access memories and reprogrammable computing (non-volatile registers, processor cache memories, magnetic field-programmable gate arrays, etc). To demonstrate the potential our hybrid cell, we physically implemented a small hybrid memory block using 45?nm × 45?nm round MTJs for the magnetic part and 28?nm fully depleted silicon on insulator (FD-SOI) technology for the CMOS part. We also report the cells measured performances in terms of area, robustness, read/write speed and energy consumption.

Jovanovi?, B., E-mail: bojan.jovanovic@lirmm.fr, E-mail: lionel.torres@lirmm.fr; Brum, R. M.; Torres, L. [LIRMM—University of Montpellier 2/UMR CNRS 5506, 161 Rue Ada, 34095 Montpellier (France)

2014-04-07T23:59:59.000Z

71

Cache directory look-up re-use as conflict check mechanism for speculative memory requests  

DOE Patents [OSTI]

In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

Ohmacht, Martin

2013-09-10T23:59:59.000Z

72

Pre-and Post-Scheduling Memory Allocation Strategies on MPSoCs  

E-Print Network [OSTI]

of deriving, from a Synchronous Dataflow (SDF) algorithm description, a Memory Exclusion Graph (MEG on descriptions of real applications and a set of random SDF graphs generated with the SDF For Free (SDF3) toolC. This paper focuses on memory allocation of applications described by a Synchronous Dataflow (SDF) Model

Paris-Sud XI, Université de

73

Technology strategy for the semiconductor memory market  

E-Print Network [OSTI]

Solid state memories are used in a variety of applications as data and code storages. A non-volatile memory is a memory that retains information when its power supply is off. Flash memory is a type of nonvolatile memory ...

Nakamura, Tomohiko

2012-01-01T23:59:59.000Z

74

Computer memory management system  

DOE Patents [OSTI]

A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

Kirk, III, Whitson John (Greenwood, MO)

2002-01-01T23:59:59.000Z

75

Capital Access Program (Vermont)  

Broader source: Energy.gov [DOE]

The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

76

Mobile applications constantly demand additional memory, and traditional  

E-Print Network [OSTI]

. This remote access could reduce local storage space, thereby reducing energy demands on the mobile plat- form60 Mobile applications constantly demand additional memory, and traditional designs increase- port connected ubiquitous environments. Engineers attempt to minimize network use because of its

Lee, Hsien-Hsin "Sean"

77

Memory in the system: trajectory-environment  

E-Print Network [OSTI]

In the paper the memory effect in the system consisting from a trajectory of process and an environment is considered. The environment is presented by scalar potential and noise. The evolution of system is interpreted as process of the continuous "measurement" of a trajectory by an environment and\\or on the contrary. In this sense the measured value is entropy-the information about embedding of the trajectory into configurations space. The concepts "measurement" and "interaction" are identified alike in quantum theory. Thus, the entropy evolution is not only the effect of dynamics, but also its cause, if it is possible to speak about causality in this case. It is shown, that such non-elastic interaction leads to occurrence of memory in the system. The reflex memory mechanism is realized as a real conformal dynamic metrics. The metastable event (attractor) is defined and time of its life is estimated. It is shown, that in the system there is a change of dynamic modes from spatial localization to random walk (fluctuation, relaxation). On scale of the attractors dynamics the memory is appearing as a semi-regular (in some information sense) drift of the image of fluctuations in a power spectrum of environment to absolute minimum. The latter properties (topological convergence) attract the attention to algorithmic aspect of a considered system.

Maxim Budaev

2007-08-10T23:59:59.000Z

78

Collective Memory Transfers for Multi-Core Chips  

SciTech Connect (OSTI)

Future performance improvements for microprocessors have shifted from clock frequency scaling towards increases in on-chip parallelism. Performance improvements for a wide variety of parallel applications require domain-decomposition of data arrays from a contiguous arrangement in memory to a tiled layout for on-chip L1 data caches and scratchpads. How- ever, DRAM performance suffers under the non-streaming access patterns generated by many independent cores. We propose collective memory scheduling (CMS) that actively takes control of collective memory transfers such that requests arrive in a sequential and predictable fashion to the memory controller. CMS uses the hierarchically tiled arrays formal- ism to compactly express collective operations, which greatly improves programmability over conventional prefetch or list- DMA approaches. CMS reduces application execution time by up to 32% and DRAM read power by 2.2×, compared to a baseline DMA architecture such as STI Cell.

Michelogiannakis, George; Williams, Alexander; Shalf, John

2013-11-13T23:59:59.000Z

79

Device Memories and Matrix Multiplication 1 Device Memories  

E-Print Network [OSTI]

the same location. The GeForce 9400M has 65,536 bytes of constant memory, the total amount of global memory is 254 MBytes. The Tesla C2050/C2070 has 65,536 bytes of constant memory, the total amount of global memory, the total amount of global memory is 4,800 MBytes (5,032,706,048 bytes) with 1

Verschelde, Jan

80

BUILDING MANAGEMENT & RESTRICTED ACCESS  

E-Print Network [OSTI]

BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

Johnston, Daniel

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Symmetrical Multilevel Diversity Coding with an All-Access Encoder  

E-Print Network [OSTI]

and L randomly accessible en- coders 1 to L. A total of L + 1 independent discrete memoryless sources (S0, S1, . . . , SL) are to be encoded at the encoders. The decoder, which has access to encoder 0 and a subset U of the ran- domly accessible... with polyhedral cone being the first quadrant and L + 2 faces. . . . . . . . . . . . . . 24 3 An illustration of the sliding windows of length ? when the in- tegers 1, . . . , L are circularly placed (clockwise) based on their natural order...

Marukala, Neeharika

2012-07-16T23:59:59.000Z

82

DESIGN AND IMPLEMENTATION OF AN ORDERED MEMORY ACCESS ARCHITECTURE1  

E-Print Network [OSTI]

Data Flow (SDF) refers to a sub- class of data flow graphs where the actors lack data depen- dency in their firing patterns [5]. Thus in SDF graphs the number of tokens produced and consumed in each of the output of DSP algorithms fall into the SDF paradigm. In our group at Berkeley, we have imple- mented Gabriel

83

ISIT2002, Lausanne, Switzerland, June 30 -July 5,2002 The use of memory in  

E-Print Network [OSTI]

consider the following canonical load balancing problem: Drop n balls into n bins so as to minimize the following randomized load balancing policy, called the " ( d , m )policy": Suppose that d 2 m. At the beISIT2002, Lausanne, Switzerland, June 30 -July 5,2002 The use of memory in randomized load

Prabhakar, Balaji

84

In memory of Roland L. Dobrushin DECAY OF CORRELATIONS IN SUBCRITICAL  

E-Print Network [OSTI]

In memory of Roland L. Dobrushin DECAY OF CORRELATIONS IN SUBCRITICAL POTTS AND RANDOM R of the cluster at the origin, for subcritical random-cluster models, under an assumption slightly throughout the subcritical phase, then P(R n) exp( n) for some > 0. This implies the exponential decay

Grimmett, Geoffrey

85

In memory of Roland L. Dobrushin DECAY OF CORRELATIONS IN SUBCRITICAL  

E-Print Network [OSTI]

In memory of Roland L. Dobrushin DECAY OF CORRELATIONS IN SUBCRITICAL POTTS AND RANDOM R of the cluster at the origin, for subcritical random­cluster models, under an assumption slightly ) ! 1 throughout the subcritical phase, then P(R â?? n) Ÿ exp(\\Gammaffn) for some ff ? 0. This implies

Grimmett, Geoffrey

86

Mondriaan memory protection  

E-Print Network [OSTI]

Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

Witchel, Emmett Jethro, 1970-

2004-01-01T23:59:59.000Z

87

Zinc Oxide Based Nonvolatile Memories and Random Lasers  

E-Print Network [OSTI]

2013). [41] 2010 Optoelectronics Market Report. Databeans,studied. The ZnO based optoelectronics devices are studiedmethods [7]. For many optoelectronics and microelectronics

Huang, Jian

2013-01-01T23:59:59.000Z

88

A double-blind, randomized, multicenter phase 2 study of prasugrel versus placebo in adult patients with sickle cell disease  

E-Print Network [OSTI]

Clinical and biological double-blind-study of ticlopidine inRESEARCH Open Access A double-blind, randomized, multicenterwe conducted a double-blind, randomized, placebo-controlled

2013-01-01T23:59:59.000Z

89

Efficient Memory Shadowing for 64-bit Architectures  

E-Print Network [OSTI]

Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of application memory. The efficiency of mapping between application memory and shadow memory has substantial impact on the ...

Zhao, Qin

2010-01-01T23:59:59.000Z

90

Cache Memories ALAN JAY SMITH  

E-Print Network [OSTI]

Cache Memories ALAN JAY SMITH Unwersity of California, Berkeley, Californm 94720 Cache memories 1982 #12;474 * A. J. Smith CONTENTS INTRODUCTION Definltlonand Rationale Overwew of Cache Deslgn Cache

Lee, Hsien-Hsin "Sean"

91

Randomized, double-blind, placebo-controlled, crossover study of the efficacy and safety of lisdexamfetamine dimesylate in adults with attention-deficit/hyperactivity disorder: novel findings using a simulated adult workplace environment design  

E-Print Network [OSTI]

with ADHD: a randomized, double-blind, multicenter, placebo-et al. , Randomized, double-blind, placebo-con- trolled,Open Access Randomized, double-blind, placebo-controlled,

2010-01-01T23:59:59.000Z

92

Memorial to James Allan Bennyhoff  

E-Print Network [OSTI]

REFERENCES Anonymous 1993 James Allan Bennyhoff. Society forMemorial to James Allan Bennyhoff (January 3, 1926 - August

Hughes, Richard E

1994-01-01T23:59:59.000Z

93

Random solutions of random problems...are not just random  

E-Print Network [OSTI]

Let I(n,m) denote a uniformly random instance of some constraint satisfaction problem CSP with n variables and m constraints. Assume that the density r=m/n is small enough so that with high probability I(n,m) has a solution, and consider the experiment of first choosing an instance I=I(n,m) at random, and then sampling a random solution sigma of I (if one exists). For many CSPs (e.g., k-SAT, k-NAE, or k-coloring), this experiment appears difficult both to implement and to analyze; in fact, for a large range of r, no efficient algorithm is known to even compute a single solution of I. In the present paper we show that for many CSPs the above experiment is essentially equivalent to first choosing a random assignment sigma to the n variables, and then drawing a random instance satisfied by sigma uniformly. In general, this second experiment is very easy to implement and amenable to a rigorous analysis. In fact, using this equivalence, we can analyze the solution space of random CSPs. Thus, we can achieve the lon...

Achlioptas, Dimitris

2008-01-01T23:59:59.000Z

94

An Adaptive Memory Interface Controller for Improving Bandwidth Utilization of Hybrid and Reconfigurable Systems  

SciTech Connect (OSTI)

Emerging applications such as data mining, bioinformatics, knowledge discovery, social network analysis are irregular. They use data structures based on pointers or linked lists, such as graphs, unbalanced trees or unstructures grids, which generates unpredictable memory accesses. These data structures usually are large, but difficult to partition. These applications mostly are memory bandwidth bounded and have high synchronization intensity. However, they also have large amounts of inherent dynamic parallelism, because they potentially perform a task for each one of the element they are exploring. Several efforts are looking at accelerating these applications on hybrid architectures, which integrate general purpose processors with reconfigurable devices. Some solutions, which demonstrated significant speedups, include custom-hand tuned accelerators or even full processor architectures on the reconfigurable logic. In this paper we present an approach for the automatic synthesis of accelerators from C, targeted at irregular applications. In contrast to typical High Level Synthesis paradigms, which construct a centralized Finite State Machine, our approach generates dynamically scheduled hardware components. While parallelism exploitation in typical HLS-generated accelerators is usually bound within a single execution flow, our solution allows concurrently running multiple execution flow, thus also exploiting the coarser grain task parallelism of irregular applications. Our approach supports multiple, multi-ported and distributed memories, and atomic memory operations. Its main objective is parallelizing as many memory operations as possible, independently from their execution time, to maximize the memory bandwidth utilization. This significantly differs from current HLS flows, which usually consider a single memory port and require precise scheduling of memory operations. A key innovation of our approach is the generation of a memory interface controller, which dynamically maps concurrent memory accesses to multiple ports. We present a case study on a typical irregular kernel, Graph Breadth First search (BFS), exploring different tradeoffs in terms of parallelism and number of memories.

Castellana, Vito G.; Tumeo, Antonino; Ferrandi, Fabrizio

2014-05-30T23:59:59.000Z

95

Random walk in random environment: a dynamicist's approch  

E-Print Network [OSTI]

, equivalently: RW in a (quenched) disordered medium, or: Random walk in random environment (RWRE) Marco LenciRandom walk in random environment: a dynamicist's approch Marco Lenci Universit`a di Bologna RWRE #12;Random walk in random environment Random walk (RW): Point (particle, walker) travels on Zd

Liu, I-Shih

96

Global aspects of radiation memory  

E-Print Network [OSTI]

Gravitational radiation has a memory effect represented by a net change in the relative positions of test particles. Both the linear and nonlinear sources proposed for this radiation memory are of the "electric" type, or E mode, as characterized by the even parity of the polarization pattern. Although "magnetic" type, or B mode, radiation memory is mathematically possible, no physically realistic source has been identified. There is an electromagnetic counterpart to radiation memory in which the velocity of charged particles obtain a net "kick". Again, the physically realistic sources of electromagnetic radiation memory that have been identified are of the electric type. In this paper, a global null cone description of the electromagnetic field is applied to establish the non-existence of B mode radiation memory and the non-existence of E mode radiation memory due to a bound charge distribution.

J. Winicour

2014-10-11T23:59:59.000Z

97

Demystifying Open Access  

SciTech Connect (OSTI)

The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

Mele, Salvatore

2007-05-14T23:59:59.000Z

98

TED KYCIA MEMORIAL SYMPOSIUM.  

SciTech Connect (OSTI)

On the afternoon of May 19 2000, a Memorial Seminar was held in the BNL physics Large Seminar Room to honor the memory of Ted Kyeia, a prominent particle physicist who had been a member of the BNL staff for 40 years. Although it was understandably a somewhat sad occasion because Ted was no longer with us, nevertheless there was much for his colleagues and friends to celebrate in recalling the outstanding contributions that he had made in those four decades. The Seminar speakers were all people who had worked with Ted during that period; each discussed one aspect of his career, but also included anecdotes and personal reminiscences. This booklet contains the Seminar program, listing the speakers, and also copies of transparencies of the talks (and one paper which was a later expansion of a talk); sadly, not all of the personal remarks appeared on the transparencies.

LITTENBERG, L.; RUBINSTEIN, R.; SAMIOS, N.; LI, K.; GIACOMELLI, G.; MOCKETT, P.; CARROLL, A.; JOHNSON, R.; BRYMAN, D.; TIPPENS, B.

2000-05-19T23:59:59.000Z

99

Performance analysis of memory hierachies in high performance systems  

SciTech Connect (OSTI)

This thesis studies memory bandwidth as a performance predictor of programs. The focus of this work is on computationally intensive programs. These programs are the most likely to access large amounts of data, stressing the memory system. Computationally intensive programs are also likely to use highly optimizing compilers to produce the fastest executables possible. Methods to reduce the amount of data traffic by increasing the average number of references to each item while it resides in the cache are explored. Increasing the average number of references to each cache item reduces the number of memory requests. Chapter 2 describes the DLX architecture. This is the architecture on which all the experiments were performed. Chapter 3 studies memory moves as a performance predictor for a group of application programs. Chapter 4 introduces a model to study the performance of programs in the presence of memory hierarchies. Chapter 5 explores some compiler optimizations that can help increase the references to each item while it resides in the cache.

Yogesh, A.

1993-07-01T23:59:59.000Z

100

Internet architecture Access networks  

E-Print Network [OSTI]

access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

ATLAS Data Access Policy  

E-Print Network [OSTI]

ATLAS has fully supported the principle of open access in its publication policy. This document outlines the policy of ATLAS as regards open access to data at different levels as described in the DPHEP model. The main objective is to make the data available in a usable way to people external to the ATLAS collaboration.

The ATLAS collaboration

2015-01-01T23:59:59.000Z

102

The memory glasses : wearable computing for just-in-time memory support  

E-Print Network [OSTI]

This thesis documents a body of wearable computing research surrounding the development of the Memory Glasses, a new type of proactive memory support technology. The Memory Glasses combines features of existing memory ...

DeVaul, Richard W. (Richard Wayne), 1971-

2004-01-01T23:59:59.000Z

103

Gifts in Memory of LEHIGH UNIVERSITY 1 Anonymous, in memory of  

E-Print Network [OSTI]

. Brown, in memory of Lawrence J. Varnerin, Jr. '91P R. N. Brummer, in memory of James W. Niemeyer '43 '68. Campbell, in memory of Gerald G. Leeman '71P '10GP Michael J. Caruso '67, in memory of Gerald G. Leeman '71, in memory of James E. Schierloh '51 Martin D. Cohen, in memory of Gerald G. Leeman '71P '10GP Kathleen

Gilchrist, James F.

104

Random coincidence of $2\  

E-Print Network [OSTI]

Two neutrino double $\\beta$ decay can create irremovable background even in high energy resolution detectors searching for neutrinoless double $\\beta$ decay due to random coincidence of $2\

D. M. Chernyak; F. A. Danevich; A. Giuliani; E. Olivieri; M. Tenconi; V. I. Tretyak

2013-01-17T23:59:59.000Z

105

Multicoloured Random Graphs: The Random Dynamics Program  

E-Print Network [OSTI]

The Random Dynamics program is a proposal to explain the origin of all symmetries, including Lorentz and gauge invariance without appeal to any fundamental invariance of the laws of nature, and to derive the known physical laws in such a way as to be almost unavoidable. C. D. Froggatt and H. B. Nielsen proposed in their book Origin of Symmetries, that symmetries and physical laws should arise naturally from some essentially random dynamics rather than being postulated to be exact. The most useful assumption of the program that can be made about the fundamental laws is taken to be that they are random and then to see how known physics like mechanics and relativity follow from them. It is believed that almost any model of these regularities would appear in some limit for example as energies become small. Almost all theories or models at the fundamental level could then explain known physics. We suggest how using the formalism and properties of random graphs might be useful in developing the theory, and point towards directions in which it can be more fully extended in future work.

Sam Tarzi

2014-07-15T23:59:59.000Z

106

Nanoparticle shuttle memory  

DOE Patents [OSTI]

A device for storing data using nanoparticle shuttle memory having a nanotube. The nanotube has a first end and a second end. A first electrode is electrically connected to the first end of the nanotube. A second electrode is electrically connected to the second end of the nanotube. The nanotube has an enclosed nanoparticle shuttle. A switched voltage source is electrically connected to the first electrode and the second electrode, whereby a voltage may be controllably applied across the nanotube. A resistance meter is also connected to the first electrode and the second electrode, whereby the electrical resistance across the nanotube can be determined.

Zettl, Alex Karlwalter (Kensington, CA)

2012-03-06T23:59:59.000Z

107

Memory Considerations for Carver  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challenge fund LasDubeyChallenge Melrose named topMemorial

108

Building Memories: Remembering and Forgetting of  

E-Print Network [OSTI]

Building Memories: Remembering and Forgetting of Verbal Experiences as Predicted by Brain Activity R. Rosen, Randy L. Buckner A fundamental question about human memory is why some experiences

Wagner, Anthony

109

Random walks in random environment Tom Schmitz (MPI Leipzig)  

E-Print Network [OSTI]

Random walks in random environment Tom Schmitz (MPI Leipzig) The model of random walks in random environment (RWRE) originates from physical and biological sciences and describes a random motion in a disordered medium. We consider RWRE on the d-dimensional lattice. The jump probabil- ities are themselves

Thalmaier, Anton

110

Memory distortion: an adaptive perspective  

E-Print Network [OSTI]

concerning factors that can influence the occurrence of memory distortions, such as sleep and retrieval kinds of errors and distortions. Studies of memory distortion have a long history in both theoretical narrative that becomes our autobiography. In the process of reconstructing the past, we color and shape our

Schacter, Daniel

111

Capital Access Program (CAP) (Michigan)  

Broader source: Energy.gov [DOE]

The Capital Access Program (CAP), utilizes public resources to generate private financing for small business in Michigan seeking access to capital. Funding from the Michigan Strategic Fund is...

112

Virginia Capital Access Program (Virginia)  

Broader source: Energy.gov [DOE]

The Virginia Capital Access Program (CAP), in partnership with Virginia’s Small Business Financing Authority, provides access to capital for small businesses. Businesses must apply to...

113

Utility Access Questionnaire | Utility Access Questionnaire  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: Salt Lake City, Utah Zip: 84111Jump to:Access Questionnaire

114

Hybrid analysis of memory references and its application to automatic parallelization  

E-Print Network [OSTI]

Transformations . . . . . . . . . . . . . . . . 20 a. Removing Flow Dependences . . . . . . . . . . . 20 b. Removing Storage Related Dependences . . . . . 21 c. Results in Automatic Parallelization . . . . . . . 21 3. Run Time Parallelization Techniques... . . . . . . . . . . . . . . . . . . . . . 33 2. Background: the Linear Memory Access Descriptor . . 33 3. Abstraction of Set Operations . . . . . . . . . . . . . . 35 viii CHAPTER a. Set Intersection . . . . . . . . . . . . . . . . . . . 35 b. Set Di erence...

Rus, Silvius Vasile

2009-05-15T23:59:59.000Z

115

Asymptotic properties of a bold random walk  

E-Print Network [OSTI]

In a recent paper we proposed a non-Markovian random walk model with memory of the maximum distance ever reached from the starting point (home). The behavior of the walker is at variance with respect to the simple symmetric random walk (SSRW) only when she is at this maximum distance, where, having the choice to move either farther or closer, she decides with different probabilities. If the probability of a forward step is higher then the probability of a backward step, the walker is bold and her behavior turns out to be super-diffusive, otherwise she is timorous and her behavior turns out to be sub-diffusive. The scaling behavior vary continuously from sub-diffusive (timorous) to super-diffusive (bold) according to a single parameter $\\gamma \\in R$. We investigate here the asymptotic properties of the bold case in the non ballistic region $\\gamma \\in [0,1/2]$, a problem which was left partially unsolved in \\cite{S}. The exact results proved in this paper require new probabilistic tools which rely on the construction of appropriate martingales of the random walk and its hitting times.

Maurizio Serva

2014-06-13T23:59:59.000Z

116

Efficient Virtual Memory for Big Memory Servers Our analysis shows that many "big-memory" server workloads,  

E-Print Network [OSTI]

-memory" server workloads, such as databases, in-memory caches, and graph analytics, pay a high cost for page introduced [13]. In contrast, virtual memory usage has changed dramatically in recent years. For example-negligible energy [5, 41] To reevaluate the cost and benefit of decades-old page-based vir- tual memory in today

Hill, Mark D.

117

Bridges of Random Walks in a Random Environment  

E-Print Network [OSTI]

Feb 25, 2010 ... Bridges of Random Walks in a Random Environment. Jonathon Peterson. Cornell University. Department of Mathematics. Joint work with Nina ...

Jonathon Peterson

2010-02-19T23:59:59.000Z

118

Directed random testing  

E-Print Network [OSTI]

Random testing can quickly generate many tests, is easy to implement, scales to large software applications, and reveals software errors. But it tends to generate many tests that are illegal or that exercise the same parts ...

Pacheco, Carlos, Ph.D. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

119

Exponential Random Simplicial Complexes  

E-Print Network [OSTI]

Exponential random graph models have attracted significant research attention over the past decades. These models are maximum-entropy ensembles under the constraints that the expected values of a set of graph observables are equal to given values. Here we extend these maximum-entropy ensembles to random simplicial complexes, which are more adequate and versatile constructions to model complex systems in many applications. We show that many random simplicial complex models considered in the literature can be casted as maximum-entropy ensembles under certain constraints. We introduce and analyze the most general random simplicial complex ensemble $\\mathbf{\\Delta}$ with statistically independent simplices. Our analysis is simplified by the observation that any distribution $\\mathbb{P}(O)$ on any collection of objects $\\mathcal{O}=\\{O\\}$, including graphs and simplicial complexes, is maximum-entropy under the constraint that the expected value of $-\\ln \\mathbb{P}(O)$ is equal to the entropy of the distribution. W...

Zuev, Konstantin; Krioukov, Dmitri

2015-01-01T23:59:59.000Z

120

Access to the ALS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGate Access Access to

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Access to the ALS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access yourAccess

122

External-Memory Computational Geometry  

E-Print Network [OSTI]

the rst known optimal al- gorithms for a wide range of two-level and hierarchical multilevel memory models, including parallel models. The algorithms are optimal both in terms of I/O cost and internal computation....

Goodrich, Michael T.; Tsay, Jyh-Jong; Vengroff, Darren Erik; Vitter, Jeffrey Scott

1993-01-01T23:59:59.000Z

123

Some Properties of the Random Universe  

E-Print Network [OSTI]

What is the role of the constants of nature in physical theory? I hypothesize that the observable universe, u0, constitutes a Universal Turing Machine (UTM) constrained by algorithmically random logical tape parameters defining its material properties (a physical UTM). The finite non-zero empirical values of Planck's constant, h, and other constants of nature exemplify those logical parameters. Their algorithmic randomness is necessary and sufficient for the consistent operation of a physical UTM. At any given time, ti, these constants correspond to the first n random halt digits, Omega-n, of Chaitin's Halting Probability, Omega. Planck's equation E=hv and Boltzmann's relation S=kLogW are shown to apply to the operation of a physical UTM. The genomic evolution of u0 in constants of nature space (CON space) from an undecidable state in u0's Planck era to its current ordered condition occurs through the algorithmically random, symmetry-breaking addition of new constants to the laws by which u0 operates -- a process called logical tunneling. The temperature of u0 for t<=tp is shown to be T=0K. The energy dissipated when a physical UTM clears its memory after each computation is proposed as a candidate for cold dark matter (CDM) and is calculated to comprise 87.5% of the cosmological matter content, Omega-M, of u0. This result concurs with current astronomical estimates that 87.1% of the matter content of u0 consists of CDM. The energy incorporated in u0 through the process of logical tunneling from undecidable states of the complete Universe, E, to decidable states of u0 is suggested as a candidate for the unexplained "dark energy", Omega-X, hypothesized to drive the accelerating cosmological expansion of space and believed to constitute 66% of the critical mass, Omega-0, of the observable universe.

Anthony E. Scoville

2013-07-24T23:59:59.000Z

124

Multiplayer Quantum Games and its Application as Access Controller in Architecture of Quantum Computers  

E-Print Network [OSTI]

One of the basics tasks in computer systems is the control of access of resources. Basically, there is a finite amount of resources that can be, for example, the CPU, memory or I/O ports, and several processes requiring those resources. If there is not enough resource in order to attend the demand, some kind of control access has to be employed. In this work, recognizing the resource sharing problem as a competition, we employ a simplified multiplayer quantum game as an access controller. The proposed quantum game can be employed in the architecture of quantum computers.

Paulo Benicio; Melo de Sousa; Rubens Viana Ramos

2008-02-26T23:59:59.000Z

125

A discrete fractional random transform  

E-Print Network [OSTI]

We propose a discrete fractional random transform based on a generalization of the discrete fractional Fourier transform with an intrinsic randomness. Such discrete fractional random transform inheres excellent mathematical properties of the fractional Fourier transform along with some fantastic features of its own. As a primary application, the discrete fractional random transform has been used for image encryption and decryption.

Zhengjun Liu; Haifa Zhao; Shutian Liu

2006-05-20T23:59:59.000Z

126

Energy Efficient Memory Speculation With Memory Latency Tolerance Supporting Sequential Consistency Without A Coherence Protocol  

E-Print Network [OSTI]

1–17, Sept. 2006. [35] Derek Hower. Acoherent shared memory.memory consistency models. Derek Hower [35] pro- posed the

Munday, David Alexander

2013-01-01T23:59:59.000Z

127

Accessibility | Jefferson Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access

128

Accessibility-based transit planning  

E-Print Network [OSTI]

A method for evaluating transit planning proposals using accessibility metrics is advanced in this research. A transit-accessibility model is developed intended for use by in-house transit agency planning staff as a ...

Busby, Jeffrey R

2004-01-01T23:59:59.000Z

129

Open Access Week Planning Materials  

E-Print Network [OSTI]

TAMUemployees list TAMUemployees list KAMU-TV Magazine TAMU Landing-page for Open Access Week library.tamu.edu/oaweek Open Access Week (organized by SPARC) www.openaccessweek.org Digital Repository Disseminate your work... via the Texas A&M University Digital Repository and get ? ?more exposure universal access easier information discovery persistent access wide range of content? SPARC http://www.arl.org/sparc...

130

Reader set encoding for directory of shared cache memory in multiprocessor system  

SciTech Connect (OSTI)

In a parallel processing system with speculative execution, conflict checking occurs in a directory lookup of a cache memory that is shared by all processors. In each case, the same physical memory address will map to the same set of that cache, no matter which processor originated that access. The directory includes a dynamic reader set encoding, indicating what speculative threads have read a particular line. This reader set encoding is used in conflict checking. A bitset encoding is used to specify particular threads that have read the line.

Ahn, Dnaiel; Ceze, Luis H.; Gara, Alan; Ohmacht, Martin; Xiaotong, Zhuang

2014-06-10T23:59:59.000Z

131

Optimizing TLB entries for mixed page size storage in contiguous memory  

DOE Patents [OSTI]

A system and method for accessing memory are provided. The system comprises a lookup buffer for storing one or more page table entries, wherein each of the one or more page table entries comprises at least a virtual page number and a physical page number; a logic circuit for receiving a virtual address from said processor, said logic circuit for matching the virtual address to the virtual page number in one of the page table entries to select the physical page number in the same page table entry, said page table entry having one or more bits set to exclude a memory range from a page.

Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Kriegel, Jon K.; Ohmacht, Martin; Steinmacher-Burow, Burkhard

2013-04-30T23:59:59.000Z

132

We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)  

E-Print Network [OSTI]

Random number generation is a fundamental security primitive for RFID devices. However, even this relatively simple requirement is beyond the capacity of today's average RFID tag. A recently proposed solution, Fingerprint Extraction and Random Number Generation in SRAM (FERNS) [14, 15], involves the use of onboard RAM as the source of "true" randomness. Unfortunately, practical considerations prevent this approach from reaching its full potential. First, this method must compete with other system functionalities for use of memory. Thus, the amount of uninitialized RAM available for utilization as a randomness generator may be severely restricted. Second, RAM is subject to data remanence; there is a time period after losing power during which stored data remains intact in memory. This means that after a portion of memory has been used for entropy collection once it will require a relatively extended period of time without power before it can be reused. In a usable RFID based security application, which require...

Saxena, Nitesh

2009-01-01T23:59:59.000Z

133

acquired immunologic memory: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and investigates urinary metabolomic biomarkers (more) Skappak, Christopher Dustin 163 Memory traces of trace memories: neurogenesis, synaptogenesis and Biology and...

134

Role-Based Access Controls  

E-Print Network [OSTI]

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC.

Ferraiolo, David F

2009-01-01T23:59:59.000Z

135

Random Walks with Lookahead in Power Law Random Graphs  

E-Print Network [OSTI]

1 Random Walks with Lookahead in Power Law Random Graphs Milena Mihail Amin Saberi Prasad Tetali Georgia Institute of Technology Email: mihail, saberi¡ @cc.gatech.edu tetali@math.cc.gatech.edu Abstract

Mihail, Milena

136

Quantum memory for superconducting qubits  

SciTech Connect (OSTI)

Many protocols for quantum computation require a memory element to store qubits. We discuss the speed and accuracy with which quantum states prepared in a superconducting qubit can be stored in and later retrieved from an attached high-Q resonator. The memory fidelity depends on both the qubit-resonator coupling strength and the location of the state on the Bloch sphere. Our results show that a quantum memory demonstration should be possible with existing superconducting qubit designs, which would be an important milestone in solid-state quantum information processing. Although we specifically focus on a large-area, current-biased Josesphson-junction phase qubit coupled to the dilatational mode of a piezoelectric nanoelectromechanical disk resonator, many of our results will apply to other qubit-oscillator models.

Pritchett, Emily J.; Geller, Michael R. [Department of Physics and Astronomy, University of Georgia, Athens, Georgia 30602-2451 (United States)

2005-07-15T23:59:59.000Z

137

Access for All  

E-Print Network [OSTI]

?s Algebra 1 final grades to examine correlation with the students? grade in Algebra. Each scatter plot contained a solid linear regression line and a dashed line, y = x. The data points with a square shape represent the scores of students who were Waived... classes in a central Texas school district to determine if there is fair and equitable access for all students. The paper contains two major components. The first is quantitative study of the four entrance requirements for 8th grade Algebra I Pre-AP at a...

Stearns, Linda Lea Merenda

2012-07-16T23:59:59.000Z

138

Accessibility - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility About Us

139

Accessibility | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility Home | SHARE

140

Access to Capital  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access your

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Rerun: Exploiting Episodes for Lightweight Memory Race Recording  

E-Print Network [OSTI]

Multiprocessor deterministic replay has many potential uses in the era of multicore computing, including enhanced debugging, fault tolerance, and intrusion detection. While sources of nondeterminism in a uniprocessor can be recorded efficiently in software, it seems likely that hardware support will be needed in a multiprocessor environment where the outcome of memory races must also be recorded. We develop a memory race recording mechanism, called Rerun, that uses small hardware state (~166 bytes/core), writes a small race log (~4 bytes/kiloinstruction), and operates well as the number of cores per system scales (e.g., to 16 cores). Rerun exploits the dual of conventional wisdom in race recording: Rather than record information about individual memory accesses that conflict, we record how long a thread executes without conflicting with other threads. In particular, Rerun passively creates atomic episodes. Each episode is a dynamic instruction sequence that a thread happens to execute without interacting with other threads. Rerun uses Lamport Clocks to order episodes and enable replay of an equivalent execution. 1.

Derek R. Hower; Mark D. Hill

142

THE HEART OF CAMPUS Memorial Union Building  

E-Print Network [OSTI]

THE HEART OF CAMPUS Memorial Union Building University of New Hampshire 83 Main Street Durham, NH The Memorial Union Building is "The Heart of Campus" and serves as the official New Hampshire State War

New Hampshire, University of

143

Design of Ferromagnetic Shape Memory Alloy Composites  

E-Print Network [OSTI]

, superelasticity, bending plate, coil spring. INTRODUCTION RECENTLY, FERROMAGNETIC SHAPE memory alloys (FSMAs torque actuator (bending of FSMA composite plate) and spring actuator (torsion of helical FSMA composite spring). KEY WORDS: shape memory alloy, ferromagnetic material, stress-induced martensite transformation

Taya, Minoru

144

Program Transformations in Weak Memory Models   

E-Print Network [OSTI]

We analyse the validity of common optimisations on multi-threaded programs in two memory models—the DRF guarantee and the Java Memory Model. Unlike in the single-threaded world, even simple program transformations, such ...

Sevcik, Jaroslav

2009-01-01T23:59:59.000Z

145

Exploring the interaction between working memory and long-term memory: Evidence for the workspace model   

E-Print Network [OSTI]

There is a large range of models of working memory, each with different scopes and emphases. Current interest focuses strongly on the interaction of working memory with long-term memory, as it has become clear that models of working memory alone...

van der Meulen, Marian

146

A study of analog memories  

E-Print Network [OSTI]

A STUDY OF ANALOG MEMORIES A Thesis by JOSEPH MICHAEL OTT Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirements tor the degree of MASTER OF SCIENCE August 1983 Major Subject: Electrical... Fngineering A STUDY OF ANALOG MEMORIES A Thesis JOSEPH MZCHAEL OTT Approved as to style and content by: P. E. Allen (Chairman of Committee) N. R. Strader (Member) W. M. Lxvely (Member) W. B. Jones (Head of Department) August 1983 , 0 AS STRA C...

Ott, Joseph Michael

1983-01-01T23:59:59.000Z

147

Memory Usage Considerations on Edison  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challenge fund LasDubeyChallenge Melrose named topMemorialMemory

148

Government User Session Translation Memory TechnologyTranslation Memory Technology  

E-Print Network [OSTI]

Rachael Richardson Tucker Maney Naval Research Laboratory Carol Van Ess-Dykema Susan Converse John S Requirements for Multi-Genre Translation · Motivations for TM Technology Assessment · Pilot Study · ResultsPoint slides, etc. #12;Government User Session Translation Memory Technology Assessment: Pilot Study Goals

Gupta, Kalyan Moy

149

Memory Optimization for Phase-field Simulations  

SciTech Connect (OSTI)

Phase-field simulations are computationally and memory intensive applications. Many of the phase-field simulations being conducted in support of NEAMS were not capable of running on “normal clusters” with 2-4GB of RAM per core, and instead required specialized “big-memory” clusters with 64GB per core. To address this issue, the MOOSE team developed a new Python-based utility called MemoryLogger, and applied it to locate, diagnose, and eradicate memory bottlenecks within the MOOSE framework. MemoryLogger allows for a better understanding of the memory usage of an application being run in parallel across a cluster. Memory usage information is captured for every individual process in a parallel job, and communicated to the head node of the cluster. Console text output from the application itself is automatically matched with this memory usage information to produce a detailed picture of memory usage over time, making it straightforward to identify the subroutines which contribute most to the application’s peak memory usage. The information produced by the MemoryLogger quickly and effectively narrows the search for memory optimizations to the most data-intensive parts of the simulation.

Derek Gaston; John Peterson; Andrew Slaughter; Cody Permann; David Andrs

2014-08-01T23:59:59.000Z

150

Shape memory polymer foams for endovascular therapies  

DOE Patents [OSTI]

A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

Wilson, Thomas S. (Castro Valley, CA); Maitland, Duncan J. (Pleasant Hill, CA)

2012-03-13T23:59:59.000Z

151

Improving locality with dynamic memory allocation  

E-Print Network [OSTI]

xii LIST OF FIGURES FIGURE Page 1 Object size distribution : : : : : : : : : : : : : : : : : : : : : : : : : 23 2 Memory distribution : : : : : : : : : : : : : : : : : : : : : : : : : : : 23 3 Example where traditional memory allocation does.... The faster, more This dissertation follows the style of ACM Special Interest Group on Programming Languages. 1In spite of a recent slowdown of the processor speed due to shrinking distances, power consumption and heat, memory bandwidth still does not keep up...

Jula, Alin Narcis

2009-05-15T23:59:59.000Z

152

Nanoscale Reversible Mass Transport for Archival Memory  

E-Print Network [OSTI]

years. The memory unit can be written to and read out using two-terminal electrical leads operated, allowing application as a nonvolatile memory element with potentially hundreds of memory states per device of Physics, PennsylVania State UniVersity, UniVersity Park, PennsylVania 16802 Received December 16, 2008

Yuzvinsky, Tom

153

Device Independent Random Number Generation  

E-Print Network [OSTI]

Randomness is an invaluable resource in today's life with a broad use reaching from numerical simulations through randomized algorithms to cryptography. However, on the classical level no true randomness is available and even the use of simple quantum devices in a prepare-measure setting suffers from lack of stability and controllability. This gave rise to a group of quantum protocols that provide randomness certified by classical statistical tests -- Device Independent Quantum Random Number Generators. In this paper we review the most relevant results in this field, which allow the production of almost perfect randomness with help of quantum devices, supplemented with an arbitrary weak source of additional randomness. This is in fact the best one could hope for to achieve, as with no starting randomness (corresponding to no free will in a different concept) even a quantum world would have a fully deterministic description.

Mataj Pivoluska; Martin Plesch

2015-02-23T23:59:59.000Z

154

Configurable memory system and method for providing atomic counting operations in a memory device  

DOE Patents [OSTI]

A memory system and method for providing atomic memory-based counter operations to operating systems and applications that make most efficient use of counter-backing memory and virtual and physical address space, while simplifying operating system memory management, and enabling the counter-backing memory to be used for purposes other than counter-backing storage when desired. The encoding and address decoding enabled by the invention provides all this functionality through a combination of software and hardware.

Bellofatto, Ralph E. (Ridgefield, CT); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Ohmacht, Martin (Yorktown Heights, NY)

2010-09-14T23:59:59.000Z

155

Random Selection for Drug Screening  

SciTech Connect (OSTI)

Simple random sampling is generally the starting point for a random sampling process. This sampling technique ensures that each individual within a group (population) has an equal chance of being selected. There are a variety of ways to implement random sampling in a practical situation.

Center for Human Reliability Studies

2007-05-01T23:59:59.000Z

156

Targeting Atmospheric Simulation Algorithms for Large Distributed Memory GPU Accelerated Computers  

SciTech Connect (OSTI)

Computing platforms are increasingly moving to accelerated architectures, and here we deal particularly with GPUs. In [15], a method was developed for atmospheric simulation to improve efficiency on large distributed memory machines by reducing communication demand and increasing the time step. Here, we improve upon this method to further target GPU accelerated platforms by reducing GPU memory accesses, removing a synchronization point, and better clustering computations. The modification ran over two times faster in some cases even though more computations were required, demonstrating the merit of improving memory handling on the GPU. Furthermore, we discover that the modification also has a near 100% hit rate in fast on-chip L1 cache and discuss the reasons for this. In concluding, we remark on further potential improvements to GPU efficiency.

Norman, Matthew R [ORNL

2013-01-01T23:59:59.000Z

157

Vehicle barrier with access delay  

DOE Patents [OSTI]

An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

Swahlan, David J; Wilke, Jason

2013-09-03T23:59:59.000Z

158

Pennsylvania Capital Access Program (Pennsylvania)  

Broader source: Energy.gov [DOE]

The Pennsylvania Capital Access Program provides loan guarantees for all businesses for the purchase of land, buildings, machinery, equipment and working capital through participating banks. The...

159

Accelerated Randomized Benchmarking  

E-Print Network [OSTI]

Quantum information processing offers promising advances for a wide range of fields and applications, provided that we can efficiently assess the performance of the control applied in candidate systems. That is, we must be able to determine whether we have implemented a desired gate, and refine accordingly. Randomized benchmarking reduces the difficulty of this task by exploiting symmetries in quantum operations. Here, we bound the resources required for benchmarking and show that, with prior information, we can achieve several orders of magnitude better accuracy than in traditional approaches to benchmarking. Moreover, by building on state-of-the-art classical algorithms, we reach these accuracies with near-optimal resources. Our approach requires an order of magnitude less data to achieve the same accuracies and to provide online estimates of the errors in the reported fidelities. We also show that our approach is useful for physical devices by comparing to simulations. Our results thus enable the application of randomized benchmarking in new regimes, and dramatically reduce the experimental effort required to assess control fidelities in quantum systems. Finally, our work is based on open-source scientific libraries, and can readily be applied in systems of interest.

Christopher Granade; Christopher Ferrie; D. G. Cory

2014-04-21T23:59:59.000Z

160

Storage Techniques in Flash Memories and Phase-change Memories  

E-Print Network [OSTI]

advice on research, writing, and presentation. Without Andrew?s encouragement and help during the difficult times in my PhD study, this dissertation would not have been possible. I would like to thank Dr. Jennifer Welch, Dr. Jianer Chen, and Dr. Alex... . . . . . . . . . . . . . . . . 4 1. Principles and Operations in Flash Memories . . . . . 4 a. Read Operation . . . . . . . . . . . . . . . . . . . 5 b. Programming Operation . . . . . . . . . . . . . . 5 c. Erase Operation . . . . . . . . . . . . . . . . . . . 6 d. Decreasing...

Li, Hao

2010-10-12T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

SYSTEMS OF ONE-DIMENSIONAL RANDOM WALKS IN A COMMON RANDOM ENVIRONMENT  

E-Print Network [OSTI]

SYSTEMS OF ONE-DIMENSIONAL RANDOM WALKS IN A COMMON RANDOM ENVIRONMENT JONATHON PETERSON Abstract. We consider a system of independent one-dimensional random walks in a common random environment under-dimensional random walks in a common random environment. We modify the standard notion of random walks in random

Peterson, Jonathon

162

Central Limit Theorem for Branching Random Walks in Random Environment  

E-Print Network [OSTI]

We consider branching random walks in $d$-dimensional integer lattice with time-space i.i.d. offspring distributions. When $d \\ge 3$ and the fluctuation of the environment is well moderated by the random walk, we prove a central limit theorem for the density of the population, together with upper bounds for the density of the most populated site and the replica overlap. We also discuss the phase transition of this model in connection with directed polymers in random environment.

Nobuo Yoshida

2007-12-05T23:59:59.000Z

163

Mobile Information Access M. Satyanarayanan  

E-Print Network [OSTI]

Carnegie Mellon University Pittsburgh, PA 15213 To appear in IEEE Personal Communications, Volume 3, No. 1, February 1996 Abstract The ability to access information on demand when mobile will be a criticalMobile Information Access M. Satyanarayanan January 1996 CMU­CS­96­107 School of Computer Science

164

Memorial Day | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department of EnergyDevelopmentTechnologies |Charles Page -to DOE re5,Memorial Day

165

Separable states improve protocols with restricted randomness  

E-Print Network [OSTI]

It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterise the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models and separable, i.e. disentangled, states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that in particular, separable states may improve the so-called random access codes, which is a class of communication problems where one party tries to read a portion of the data held by another distant party in presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

T. K. Chuan; T. Paterek

2014-10-07T23:59:59.000Z

166

Stretched Polymers in Random Environment  

E-Print Network [OSTI]

We survey recent results and open questions on the ballistic phase of stretched polymers in both annealed and quenched random environments.

Dmitry Ioffe; Yvan Velenik

2011-03-01T23:59:59.000Z

167

COMPUTING THE DRIFT OF RANDOM WALKS IN DEPENDENT RANDOM ENVIRONMENTS  

E-Print Network [OSTI]

new theory and methodology for the computation of the drift of the random walk for various depen- dent for RWREs was laid by Solomon [13], who proved conditions for recurrence/transience for one with independent random environments. The purpose of this paper is to develop theory and methodology

Kroese, Dirk P.

168

Packing Hamilton Cycles in Random and Pseudo-Random Hypergraphs  

E-Print Network [OSTI]

Packing Hamilton Cycles in Random and Pseudo-Random Hypergraphs Alan Frieze Michael Krivelevich February 16, 2011 Abstract We say that a k-uniform hypergraph C is a Hamilton cycle of type , for some 1 Hamilton cycles. A slightly weaker result is given for = k/2. We also provide sufficient conditions

Krivelevich, Michael

169

Attachment and memory for negative emotional events  

E-Print Network [OSTI]

Control of Emotions on Explicit Memory. . . . . . Interaction of Anxiety X EEQ Positive Affect on Explicit Memory. . 50 51 51 Mediation Model 52 Interaction of Anxiety X Video Mood on Explicit Memory 52 Interaction of Avoidance X Sex on Imphcit... monitored their responses to the video content through a hidden camera in the laboratory room. The video clip, which came from the Swedish film Autumn Sonata directed by Ingmar Bergman, was selected on the basis of its negative, attachment-relevant content...

Wilson, Carol Leigh

2012-06-07T23:59:59.000Z

170

Video Stores, Media Technologies, and Memory  

E-Print Network [OSTI]

a collection entitled Mobile Technology & Place (Routledge,Identity,” in Mobile Technologies: From Telecommunicationsin an essay on mobile media technologies and memory, Nicola

Wilken, Rowan

2010-01-01T23:59:59.000Z

171

Immunological Memory is Associative Derek J. Smith  

E-Print Network [OSTI]

Immunological Memory is Associative Derek J. Smith Department of Computer Science University of New , 1989; Nara & Goudsmit, 1990; Smith, 1994). Immunologists refer to associative recall as a cross

Somayaji, Anil

172

Shape memory response of ni2mnga and nimncoin magnetic shape memory alloys under compression  

E-Print Network [OSTI]

In this study, the shape memory response of Ni2MnGa and NiMnCoIn magnetic shape memory alloys was observed under compressive stresses. Ni2MnGa is a magnetic shape memory alloy (MSMA) that has been shown to exhibit fully reversible, stressassisted...

Brewer, Andrew Lee

2009-05-15T23:59:59.000Z

173

Energy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems  

E-Print Network [OSTI]

hybrid system using a commodity DRAM cache. Keywords-Memory Controller, DRAM, PCM, Energy I. INTRODUCTIONEnergy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems Abstract system of similar storage size. Our proposed system is highly energy efficient and provides 35

Conte, Thomas M.

174

Bounded Randomness Paul Brodhead1  

E-Print Network [OSTI]

kmng@ntu.edu.sg Abstract. We introduce some new variations of the notions of being Martin-L¨of random effective betting, effective regularities or effective compression. Exactly what we mean here by "effective to calibrate no- tions of randomness by varying the notion of effectivity. For example, classical Martin

Ng, Keng Meng "Selwyn"

175

Random Curves by Conformal Welding  

E-Print Network [OSTI]

We construct a conformally invariant random family of closed curves in the plane by welding of random homeomorphisms of the unit circle given in terms of the exponential of Gaussian Free Field. We conjecture that our curves are locally related to SLE$(\\kappa)$ for $\\kappa<4$.

Astala, K; Kupiainen, A; Saksman, E

2009-01-01T23:59:59.000Z

176

Random Curves by Conformal Welding  

E-Print Network [OSTI]

We construct a conformally invariant random family of closed curves in the plane by welding of random homeomorphisms of the unit circle given in terms of the exponential of Gaussian Free Field. We conjecture that our curves are locally related to SLE$(\\kappa)$ for $\\kappa<4$.

K. Astala; P. Jones; A. Kupiainen; E. Saksman

2009-12-17T23:59:59.000Z

177

Better Randomness with Single Photons  

E-Print Network [OSTI]

Randomness is one of the most important resources in modern information science, since encryption founds upon the trust in random numbers. Since it is impossible to prove if an existing random bit string is truly random, it is relevant that they be generated in a trust worthy process. This requires specialized hardware for random numbers, for example a die or a tossed coin. But when all input parameters are known, their outcome might still be predicted. A quantum mechanical superposition allows for provably true random bit generation. In the past decade many quantum random number generators (QRNGs) were realized. A photonic implementation is described as a photon which impinges on a beam splitter, but such a protocol is rarely realized with non-classical light or anti-bunched single photons. Instead, laser sources or light emitting diodes are used. Here we analyze the difference in generating a true random bit string with a laser and with anti-bunched light. We show that a single photon source provides more r...

Oberreiter, Lukas

2014-01-01T23:59:59.000Z

178

Grain constraint and size effects in shape memory alloy microwires  

E-Print Network [OSTI]

Shape memory alloys exhibit interesting and useful properties, such as the shape memory effect and superelasticity. Among the many alloy families that have been shown to exhibit shape memory properties the ones based on ...

Ueland, Stian Melhus

2013-01-01T23:59:59.000Z

179

Cu-based shape memory microwires : towards complex structures  

E-Print Network [OSTI]

Shape memory alloys are a distinctive type of material that exhibits the fascinating properties of the shape memory effect and superelasticity. Shape memory properties are characterized by the diffusionless phase transformation ...

Gager, Mac (Brian McClure, Jr.)

2014-01-01T23:59:59.000Z

180

Florida Capital Access Program (Florida)  

Broader source: Energy.gov [DOE]

The Florida Capital Access Program, run by the Florida Department of Economic Development, is a loan portfolio insurance program enabling lenders to make loans to credit-worthy small businesses. ...

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

access: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

182

accessibility: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

183

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System  

Broader source: Energy.gov [DOE]

A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

184

Using on-package memory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser GuideHadoopUsingon-package memory

185

Extra-Large Memory Nodes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin FilmEquipment SSRLExploringExtra-Large Memory

186

Earthquake 'memory' could spur aftershocks  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed NewcatalystNeutronEnvironmentZIRKLE FRUIT reducesEarlyEarthquake 'memory' could spur

187

Measuring and Understanding Memory Bandwidth  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challenge fund LasDubey MathematicaMeasuring and Understanding Memory

188

Memory Usage Considerations on Hopper  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challenge fund LasDubeyChallenge Melrose namedMemory Considerations

189

International Electricity Trade - Open Access | Department of...  

Broader source: Energy.gov (indexed) [DOE]

International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

190

Modesto Memorial Hospital Space Heating Low Temperature Geothermal...  

Open Energy Info (EERE)

Memorial Hospital Space Heating Low Temperature Geothermal Facility Jump to: navigation, search Name Modesto Memorial Hospital Space Heating Low Temperature Geothermal Facility...

191

associative memory models: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

David 1971-01-01 2 COMPLEX ASSOCIATIVE MEMORY NEURAL NETWORK MODEL FOR INVARIANT PATTERN RECOGNITION Engineering Websites Summary: COMPLEX ASSOCIATIVE MEMORY NEURAL...

192

associative memory model: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

David 1971-01-01 2 COMPLEX ASSOCIATIVE MEMORY NEURAL NETWORK MODEL FOR INVARIANT PATTERN RECOGNITION Engineering Websites Summary: COMPLEX ASSOCIATIVE MEMORY NEURAL...

193

Online Data Structures in External Memory  

E-Print Network [OSTI]

/output communication (or I/O) between the external and internal memories. In this paper we discuss a variety of online data structures for external memory, some very old and some very new, such as hashing (for dictionaries), B-trees (for dictionaries and 1-D range...

Vitter, Jeffrey Scott

1999-01-01T23:59:59.000Z

194

Memory and Reality Marcia K. Johnson  

E-Print Network [OSTI]

Memory and Reality Marcia K. Johnson Yale University Although it may be disconcerting guilty that we didn't save any for my father (Johnson, 1985). When I finished, my parents laughed in reality monitoring, or a false memory (Johnson, 1977, 1988; Johnson & Raye, 1981, 1998). Of course, people

Johnson, Marcia K.

195

Synaptic plasticity and memory Richard Kempter  

E-Print Network [OSTI]

Synaptic plasticity and memory Richard Kempter 1,2,3 & Dietmar Schmitz 2,3 1 Institute in the central nervous system. In its most general form, the "synaptic plasticity and memory hypothesis" states, and that synaptic plasticity is both necessary and sufficient for the storage of information underlying

Kempter, Richard

196

Tier identification (TID) for tiered memory characteristics  

DOE Patents [OSTI]

A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

2014-03-25T23:59:59.000Z

197

Temperature and electrical memory of polymer fibers  

SciTech Connect (OSTI)

We report in this work studies of the shape memory behavior of polymer fibers loaded with carbon nanotubes or graphene flakes. These materials exhibit enhanced shape memory properties with the generation of a giant stress upon shape recovery. In addition, they exhibit a surprising temperature memory with a peak of generated stress at a temperature nearly equal to the temperature of programming. This temperature memory is ascribed to the presence of dynamical heterogeneities and to the intrinsic broadness of the glass transition. We present recent experiments related to observables other than mechanical properties. In particular nanocomposite fibers exhibit variations of electrical conductivity with an accurate memory. Indeed, the rate of conductivity variations during temperature changes reaches a well defined maximum at a temperature equal to the temperature of programming. Such materials are promising for future actuators that couple dimensional changes with sensing electronic functionalities.

Yuan, Jinkai; Zakri, Cécile; Grillard, Fabienne; Neri, Wilfrid; Poulin, Philippe [Centre de Recherche Paul Pascal - CNRS, University of Bordeaux, Avenue Schweitzer, 33600 Pessac (France)

2014-05-15T23:59:59.000Z

198

Adiabatic Quantum Optimization for Associative Memory Recall  

E-Print Network [OSTI]

Hopfield networks are a variant of associative memory that recall information stored in the couplings of an Ising model. Stored memories are fixed points for the network dynamics that correspond to energetic minima of the spin state. We formulate the recall of memories stored in a Hopfield network using energy minimization by adiabatic quantum optimization (AQO). Numerical simulations of the quantum dynamics allow us to quantify the AQO recall accuracy with respect to the number of stored memories and the noise in the input key. We also investigate AQO performance with respect to how memories are stored in the Ising model using different learning rules. Our results indicate that AQO performance varies strongly with learning rule due to the changes in the energy landscape. Consequently, learning rules offer indirect methods for investigating change to the computational complexity of the recall task and the computational efficiency of AQO.

Hadayat Seddiqi; Travis S. Humble

2014-12-12T23:59:59.000Z

199

Performing an allreduce operation using shared memory  

DOE Patents [OSTI]

Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

Archer, Charles J. (Rochester, MN); Dozsa, Gabor (Ardsley, NY); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2012-04-17T23:59:59.000Z

200

Data Movement Dominates: Advanced Memory Technology to Address the Real Exascale Power Problem  

SciTech Connect (OSTI)

Energy is the fundamental barrier to Exascale supercomputing and is dominated by the cost of moving data from one point to another, not computation. Similarly, performance is dominated by data movement, not computation. The solution to this problem requires three critical technologies: 3D integration, optical chip-to-chip communication, and a new communication model. The central goal of the Sandia led "Data Movement Dominates" project aimed to develop memory systems and new architectures based on these technologies that have the potential to lower the cost of local memory accesses by orders of magnitude and provide substantially more bandwidth. Only through these transformational advances can future systems reach the goals of Exascale computing with a manageable power budgets. The Sandia led team included co-PIs from Columbia University, Lawrence Berkeley Lab, and the University of Maryland. The Columbia effort of Data Movement Dominates focused on developing a physically accurate simulation environment and experimental verification for optically-connected memory (OCM) systems that can enable continued performance scaling through high-bandwidth capacity, energy-efficient bit-rate transparency, and time-of-flight latency. With OCM, memory device parallelism and total capacity can scale to match future high-performance computing requirements without sacrificing data-movement efficiency. When we consider systems with integrated photonics, links to memory can be seamlessly integrated with the interconnection network-in a sense, memory becomes a primary aspect of the interconnection network. At the core of the Columbia effort, toward expanding our understanding of OCM enabled computing we have created an integrated modeling and simulation environment that uniquely integrates the physical behavior of the optical layer. The PhoenxSim suite of design and software tools developed under this effort has enabled the co-design of and performance evaluation photonics-enabled OCM architectures on Exascale computing systems.

Bergman, Keren

2014-08-28T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Coherent instabilities in random lasers  

SciTech Connect (OSTI)

A numerical study is presented of random lasers as a function of the pumping rate above the threshold for lasing. Depending on the leakiness of the system resonances, which is typically larger in random lasers compared to conventional lasers, we observe that the stationary lasing regime becomes unstable above a second threshold. Coherent instabilities are observed as self pulsation at a single frequency of the output intensity, population inversion, as well as the atomic polarization. We find these Rabi oscillations have the same frequency everywhere in the random laser despite the fact that the field intensity strongly depends on the spatial location.

Andreasen, Jonathan; Sebbah, Patrick; Vanneste, Christian [Laboratoire de Physique de la Matiere Condensee, CNRS UMR 6622, Universite de Nice-Sophia Antipolis, Parc Valrose, F-06108, Nice Cedex 02 (France)

2011-08-15T23:59:59.000Z

202

Boston solar retrofits: studies of solar access and economics  

SciTech Connect (OSTI)

Studies of solar access and solar retrofit economics are described for residential applications in the City of Boston. The study of solar access was based upon a random sample of 94 buildings; the sample was stratified to ensure a broad geographic representation from the city's various sections. Using available data on the heights and orientations of the sampled structures and surrounding buildings, each building's hourly access to sunlight was computed separately for the roof and south facing walls. These data were then aggregated by broad structural classifications in order to provide general measures of solar access. The second study was a comparative analysis of the economics of several solar heating and hot water systems. An active hot water system, installed using pre-assembled, commercially purchased equipment, was selected as a reference technology. A variety of measures of economic performance were computed for this system, with and without existing tax credits and under various financing arrangements. Next, a number of alternative approaches for solar space and water heating were identified from interviews with individuals and groups involved in solar retrofit projects in the Boston area. The objective was to identify approaches that many of those interviewed believe to be low-cost means of applying solar energy in residential settings. The approaches selected include thermal window covers, wall collectors, bread box water heaters, and sun spaces. Preliminary estimates of the performance of several representative designs were developed and the economics of these designs evaluated.

Shapiro, M.

1980-11-01T23:59:59.000Z

203

Random Deployment of Data Collectors for Serving Randomly-Located Sensors  

E-Print Network [OSTI]

Recently, wireless communication industries have begun to extend their services to machine-type communication devices as well as to the user equipment. Such machine-type communication devices as meters and sensors need intermittent uplink resources to report measured or sensed data to their serving data collector. It is however hard to dedicate limited uplink resources to each of them. Thus, efficient service of a tremendous number of devices with low activities may consider simple random access as a solution. The data collectors receiving the measured data from many sensors simultaneously can successfully decode only signals with signal-to-interference-plus-noise-ratio (SINR) above a certain value. The main design issues for this environment become how many data collectors are needed, how much power sensor nodes transmit with, and how wireless channels affect the performance. This paper provides answers to those questions through a stochastic analysis based on a spatial point process and on simulations.

Kwon, Taesoo

2011-01-01T23:59:59.000Z

204

Bibliography on transmission access issues  

SciTech Connect (OSTI)

This paper presents a bibliography on issues related to transmission access in electric power systems. There are 233 citations referenced in this bibliography. This bibliography presents a collection of selected literature on issues related to transmission access. It does not contain all of the material available on this subject or the categories contained herein. Some readers may feel that citations within this bibliography should be strictly limited to transmission system issues and not include energy pricing or reliability issues. However, it was the decision of the Subcommittee of the IEEE Task Force on Transmission Access and Nonutility Generation that selected entries relating to reliability and energy pricing, most relevant to transmission access, should be included. This decision was made because certain issues relating to reliability, transmission and energy pricing are perceived by the industry to be critical in the discussion of transmission access. The bibliography has been divided into the following sections or sub-sections: 2.0 Operational (Engineering) Issues, 3.0 Planning, 4.0 Reliability, 5.1 Economics: Costing, 5.2(a) Economics: Location-Differentiated Pricing, 5.2(b) Economics: Time-Differentiated Pricing, 5.3 Economics: Brokering, Bidding, and Auctioning, 6.0 Regulatory, and 7.0 General. Although the content of many publications spanned two or more of these sections, the desire to limit document length required that all publications be placed in the single most appropriate section. Publications are sorted according to author or publication resource.

Lankford, C.B. [Oklahoma Gas and Electric Co., Oklahoma City, OK (United States)] [Oklahoma Gas and Electric Co., Oklahoma City, OK (United States); McCalley, J.D. [Iowa State Univ., Ames, IA (United States)] [Iowa State Univ., Ames, IA (United States); Saini, N.K. [Entergy Services Corp., Metairie, LA (United States)] [Entergy Services Corp., Metairie, LA (United States)

1996-02-01T23:59:59.000Z

205

Random Selection for Drug Screening  

SciTech Connect (OSTI)

Sampling is the process of choosing some members out of a group or population. Probablity sampling, or random sampling, is the process of selecting members by chance with a known probability of each individual being chosen.

Center for Human Reliability Studies

2007-05-01T23:59:59.000Z

206

Identity, Credential, and Access Management (ICAM)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities for DOE identity, credential, and access management program.

2013-02-19T23:59:59.000Z

207

Forests for People Access, recreation & tourism  

E-Print Network [OSTI]

Strategy Forests for People Access, recreation & tourism on the national forest estate #12;#12;Access, recreation and tourism on the national forest estate | 3 Forests for People Access, recreation and tourism on the national forest estate Setting the scene Everyone has a right of responsible access

208

RANDOM WALK IN RANDOM ENVIRONMENT IN A TWO-DIMENSIONAL STRATIFIED MEDIUM WITH ORIENTATIONS  

E-Print Network [OSTI]

RANDOM WALK IN RANDOM ENVIRONMENT IN A TWO-DIMENSIONAL STRATIFIED MEDIUM WITH ORIENTATIONS ALEXIS oriented lattices, random walk in random environment, random walk in random scenery, functional limit-00634636,version2-24Nov2012 #12;RWRE IN A STRATIFIED ORIENTED MEDIUM 2 We denote by E and E

Paris-Sud XI, Université de

209

SCHEDULING FOR MINIMIZING THE NUMBER OF MEMORY ACCESSES IN LOW POWER  

E-Print Network [OSTI]

and circuit levels [1]. Most of the optimization is based on reducing the switch­ ing activity, since power also be reduced by transformations such as subexpression elimination, operation substitution, resource utilization, transition activity reduction etc [2]. Most of the previous work on power optimization has been

Kambhampati, Subbarao

210

Data Access Reorganizations in Compiling Out-of-Core Data Parallel Programs on Distributed Memory Machines  

E-Print Network [OSTI]

that these op- timizations can reduce the amount of time spent in I/O by as much as an order of magnitude. 1) administered by US Army at Fort Huachuca. Program In-Core Phase Out-of-Core Phase Node Program Figure 1. Flow-Chart

Kuzmanovic, Aleksandar

211

E-Print Network 3.0 - access memory cell Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Department of Biology, Northeastern University Collection: Engineering 9 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Figure 1. DICE...

212

Providing fast and safe access to next-generation, non- volatile memories  

E-Print Network [OSTI]

symposium on Computer architecture, pages 2–13, New York,In High Performance Computer Architecture (HPCA), 2011 IEEEsymposium on Computer architecture, pages 14–23, New York,

Coburn, Joel Dylan

2012-01-01T23:59:59.000Z

213

Chaining direct memory access data transfer operations for compute nodes in a parallel computer  

DOE Patents [OSTI]

Methods, systems, and products are disclosed for chaining DMA data transfer operations for compute nodes in a parallel computer that include: receiving, by an origin DMA engine on an origin node in an origin injection FIFO buffer for the origin DMA engine, a RGET data descriptor specifying a DMA transfer operation data descriptor on the origin node and a second RGET data descriptor on the origin node, the second RGET data descriptor specifying a target RGET data descriptor on the target node, the target RGET data descriptor specifying an additional DMA transfer operation data descriptor on the origin node; creating, by the origin DMA engine, an RGET packet in dependence upon the RGET data descriptor, the RGET packet containing the DMA transfer operation data descriptor and the second RGET data descriptor; and transferring, by the origin DMA engine to a target DMA engine on the target node, the RGET packet.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN)

2010-09-28T23:59:59.000Z

214

Row Buffer Locality Aware Caching Policies for Hybrid Memories  

E-Print Network [OSTI]

strengths · A hybrid memory system (DRAM-PCM) aims for best of both · Problem: How to place data between static energy (no refresh) 6 DRAM PCM CPU MC MC #12;Hybrid Memory · Design direction: DRAM as a cache memory devices? 8 DRAM PCM CPU MC MC #12;Outline · Background: Hybrid Memory Systems · Motivation: Row

215

Learning, Memory, and Education Lessons for the Classroom  

E-Print Network [OSTI]

Learning, Memory, and Education Lessons for the Classroom Michael A. Yassa, M.A. Ph.D. Candidate memory? How can we optimize individual learning? How do lessons from memory apply to the classroom? Brain individual learning? How do lessons from memory apply to the classroom? Brain-based learning: fact or fiction

Rose, Michael R.

216

Automatic Memory Partitioning and Scheduling for Throughput and Power Optimization  

E-Print Network [OSTI]

- matic memory partitioning technique which can efficiently improve throughput and reduce energy to tackle this problem is to increase memory ports in the final memory imple- mentations. However, recent research in [16] shows that the size of memory cells increases almost quadratically with port number N

Cong, Jason "Jingsheng"

217

Non-volatile memory for checkpoint storage  

DOE Patents [OSTI]

A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, the non-volatile memory is a pluggable flash memory card.

Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.; Coteus, Paul W.; Gara, Alan; Heidelberger, Philip; Jeanson, Mark J.; Kopcsay, Gerard V.; Ohmacht, Martin; Takken, Todd E.

2014-07-22T23:59:59.000Z

218

Securing non-volatile memory regions  

DOE Patents [OSTI]

Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

2013-08-20T23:59:59.000Z

219

Characterization of the angular memory effect of scattered light in biological tissues  

E-Print Network [OSTI]

High resolution optical microscopy is essential in neuroscience but suffers from scattering in biological tissues. It therefore grants access to superficial layers only. Recently developed techniques use scattered photons for imaging by exploiting angular correlations in transmitted light and could potentially increase imaging depths. But those correlations (`angular memory effect') are of very short range and, in theory, only present behind and not inside scattering media. From measurements on neural tissues and complementary simulations, we find that strong forward scattering in biological tissues can enhance the memory effect range (and thus the possible field-of-view) by more than an order of magnitude compared to isotropic scattering for $\\sim$1\\,mm thick tissue layers.

Schott, Sam; Léger, Jean-Francois; Bourdieu, Laurent; Gigan, Sylvain

2015-01-01T23:59:59.000Z

220

Localization for Branching Random Walks in Random Environment  

E-Print Network [OSTI]

We consider branching random walks in $d$-dimensional integer lattice with time-space i.i.d. offspring distributions. This model is known to exhibit a phase transition: If $d \\ge 3$ and the environment is "not too random", then, the total population grows as fast as its expectation with strictly positive probability. If,on the other hand, $d \\le 2$, or the environment is ``random enough", then the total population grows strictly slower than its expectation almost surely. We show the equivalence between the slow population growth and a natural localization property in terms of "replica overlap". We also prove a certain stronger localization property, whenever the total population grows strictly slower than its expectation almost surely.

Yueyun Hu; Nobuo Yoshida

2007-12-05T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Funes the Memorious by Jorge Luis Borges  

E-Print Network [OSTI]

Funes, who, after falling off his horse and receiving a bad head injury, acquired the amazing talent on the morning of April 30, 1882, and he could compare them in his memory with the veins in the marbled binding

222

Engineer Nanocrystal Floating Gate Memory Scaling  

E-Print Network [OSTI]

flash memory [2-9]. Metal silicide NCs, with high density ofsemiconductors [14], metal, metallic silicide and metal-like2, 3], metal [4, 5], metallic silicide [6, 7, 8], core-shell

Ren, Jingjian

2012-01-01T23:59:59.000Z

223

Size Effects in Ferromagnetic Shape Memory Alloys  

E-Print Network [OSTI]

effects in these mechanisms has both scientific and technological relevance. Superelastic behavior of Ni54Fe19Ga27 shape memory alloy single crystalline pillars was studied under compression as a function of pillar diameter. Multiple pillars...

Ozdemir, Nevin

2012-07-16T23:59:59.000Z

224

Painted Ponies: Essays on Memory and Loss  

E-Print Network [OSTI]

This collection explores the spiral nature of memory as it examines the way loss and one's reactions to loss repeat themselves in new guises and new contexts. Interspersing poetry with essays of memoir, Klayder examines ...

Klayder, Mary

2008-12-30T23:59:59.000Z

225

Orthopaedic applications of ferromagnetic shape memory alloys  

E-Print Network [OSTI]

Ferromagnetic shape memory alloys (FSMAs) are a new class of magnetic field-actuated active materials with no current commercial applications. By applying a magnetic field of around 0.4 T, they can exert a stress of ...

Guo, Weimin, M. Eng. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

226

Video Stores, Media Technologies, and Memory  

E-Print Network [OSTI]

both for analogue and digital media (e.g. , memory loss duefrom all forms of digital media usage (broadband downloadingin relation to digital media is signal compression and audio

Wilken, Rowan

2010-01-01T23:59:59.000Z

227

ACOHERENT SHARED MEMORY Derek R. Hower  

E-Print Network [OSTI]

ACOHERENT SHARED MEMORY by Derek R. Hower A dissertation submitted in partial fulfillment. Hower 2012 All Rights Reserved #12;i Abstract The computer industry has entered an era where energy

Hill, Mark D.

228

Aggressive children's memory for attachment relevant information  

E-Print Network [OSTI]

This study examined a measure of children's memory for information from a story about a hypothetical mother and child, the Story Task, as a potential tool to delineate subtypes of aggressive children based on the pattern of information processing...

Collie, Claire Futamase

2004-09-30T23:59:59.000Z

229

Distributed trace using central performance counter memory  

DOE Patents [OSTI]

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L; Sexton, James C

2013-10-22T23:59:59.000Z

230

Distributed trace using central performance counter memory  

DOE Patents [OSTI]

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L.; Sexton, James C.

2013-01-22T23:59:59.000Z

231

Associative memory in phasing neuron networks  

SciTech Connect (OSTI)

We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

2014-01-01T23:59:59.000Z

232

Post polymerization cure shape memory polymers  

DOE Patents [OSTI]

This invention relates to chemical polymer compositions, methods of synthesis, and fabrication methods for devices regarding polymers capable of displaying shape memory behavior (SMPs) and which can first be polymerized to a linear or branched polymeric structure, having thermoplastic properties, subsequently processed into a device through processes typical of polymer melts, solutions, and dispersions and then crossed linked to a shape memory thermoset polymer retaining the processed shape.

Wilson, Thomas S; Hearon, Michael Keith; Bearinger, Jane P

2014-11-11T23:59:59.000Z

233

Page-Differential Logging: An Efficient and DBMS-independent Approach for Storing Data into Flash Memory  

E-Print Network [OSTI]

Flash memory is widely used as the secondary storage in lightweight computing devices due to its outstanding advantages over magnetic disks. Flash memory has many access characteristics different from those of magnetic disks, and how to take advantage of them is becoming an important research issue. There are two existing approaches to storing data into flash memory: page-based and log-based. The former has good performance for read operations, but poor performance for write operations. In contrast, the latter has good performance for write operations when updates are light, but poor performance for read operations. In this paper, we propose a new method of storing data, called page-differential logging, for flash-based storage systems that solves the drawbacks of the two methods. The primary characteristics of our method are: (1) writing only the difference (which we define as the page-differential) between the original page in flash memory and the up-to-date page in memory; (2) computing and writing the pag...

Kim, Yi-Reun; Song, Il-Yeol

2010-01-01T23:59:59.000Z

234

Accessibility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuel

235

Evaluating operating system vulnerability to memory errors.  

SciTech Connect (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

236

Random-walk in Beta-distributed random environment  

E-Print Network [OSTI]

We introduce an exactly-solvable model of random walk in random environment that we call the Beta RWRE. This is a random walk in $\\mathbb{Z}$ which performs nearest neighbour jumps with transition probabilities drawn according to the Beta distribution. We also describe a related directed polymer model, which is a limit of the $q$-Hahn interacting particle system. Using a Fredholm determinant representation for the quenched probability distribution function of the walker's position, we are able to prove second order cube-root scale corrections to the large deviation principle satisfied by the walker's position, with convergence to the Tracy-Widom distribution. We also show that this limit theorem can be interpreted in terms of the maximum of strongly correlated random variables: the positions of independent walkers in the same environment. The zero-temperature counterpart of the Beta RWRE can be studied in a parallel way. We also prove a Tracy-Widom limit theorem for this model.

Guillaume Barraquand; Ivan Corwin

2015-03-26T23:59:59.000Z

237

Statistical Performance Modeling of SRAMs  

E-Print Network [OSTI]

Yield analysis is a critical step in memory designs considering a variety of performance constraints. Traditional circuit level Monte-Carlo simulations for yield estimation of Static Random Access Memory (SRAM) cell is quite time consuming due...

Zhao, Chang

2011-02-22T23:59:59.000Z

238

RANDOM WALK IN RANDOM ENVIRONMENT IN A TWO-DIMENSIONAL STRATIFIED MEDIUM WITH ORIENTATIONS  

E-Print Network [OSTI]

RANDOM WALK IN RANDOM ENVIRONMENT IN A TWO-DIMENSIONAL STRATIFIED MEDIUM WITH ORIENTATIONS ALEXIS walk in random environment, random walk in random scenery, functional limit theorem, transience. This research was supported by the french ANR project MEMEMO2. 1 #12;RWRE IN A STRATIFIED ORIENTED MEDIUM 2 Our

Pène, Françoise

239

Random Walks and Electrical Networks Electrical Network Calculations in Random Walks in  

E-Print Network [OSTI]

Random Walks and Electrical Networks Electrical Network Calculations in Random Walks in Random 2/4/2008 1 / 23 #12;Random Walks and Electrical Networks Much of this talk is based on the book Random Walks and Electric Networks by Peter G. Doyle and J. Laurie Snell. Free download available at http

Peterson, Jonathon

240

Missing working memory deficit in dyslexia: children writing from memory Erlijn van Genuchtena,b  

E-Print Network [OSTI]

Missing working memory deficit in dyslexia: children writing from memory Erlijn van Genuchtena,b (e of writing processes of children with dyslexia, in order to examine the relationship between WM and writing. An experiment was used in which children with dyslexia, and chronological age-matched and reading age

Cheng, Peter

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory  

E-Print Network [OSTI]

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

Mutlu, Onur

242

Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms  

E-Print Network [OSTI]

Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms Ruoming that are applicable to a number of common data mining algorithms. These techniques are incorpo- rated in a middleware-alone implementations of individual parallel data mining algorithms. Over- all, our work shows that a common framework

Jin, Ruoming

243

City of Boulder- Solar Access Ordinance  

Broader source: Energy.gov [DOE]

The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

244

Metropolitan Accessibility and Transportation Sustainability:Sustainability  

E-Print Network [OSTI]

Metropolitan Accessibility and Transportation Sustainability:Sustainability: Comparative Reduce (fulfillment of)Promote Sustainability: Meet needs of (fulfillment of) needs present Institute SMART Sustainable Mobility and Accessibility Research andSMART Sustainable Mobility

Papalambros, Panos

245

Self-calibrating random access logarithmic pixel for on chip camera  

E-Print Network [OSTI]

??.?????????????????????????...89 VITA???????????????????????????????.. 92 viii LIST OF FIGURES Page Figure 1-1 Passive pixel schematic.................................................................................2 Figure 1-2 Photodiode-type active pixel schematic... of photons, i.e., a lens; 2) wavelength discrimination of photons, i.e., filters; 3) detector for conversion of photons, e.g., photodiode; 4) a method to readout the detectors, e.g., a CCD; 5) timing, control and drive electronics for the sensor; 6) signal...

Hong, Augustin Jinwoo

2005-08-29T23:59:59.000Z

246

Energy Data Access | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Data Management Building Energy Use Benchmarking Benchmarking & Disclosure Policy Data-Driven, Strategic Energy Management Data Access Evaluation, Measurement, & Verification...

247

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE  

E-Print Network [OSTI]

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

Oregon, University of

248

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

249

AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS  

E-Print Network [OSTI]

AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS E. Damiani1, S. De Capitani di Vimercati2, E. Fern controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector such as GIF, JPEG, and PNG, SVG has many advantages: SVG documents are plain text, so they can be read

Samarati, Pierangela

250

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS is around 340m/s. #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS Homework Problem 2: Calculate

Kieu, Khanh

251

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS OPTI · Metropolitan and local area networks #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS OPTI500C Syllabus

Kieu, Khanh

252

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS multiplexing · Network topology #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS Communication Source

Kieu, Khanh

253

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS Significant progress #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS What else can we multiplex

Kieu, Khanh

254

Administrative Access Policy Exception Process & Request Form Administrative Access Policy Exception Process  

E-Print Network [OSTI]

Administrative Access Policy ­ Exception Process & Request Form (Page 1) Administrative Access Policy ­ Exception Process Administrative Access Policy Overview According to the Franklin College Administrative Access Policy , all IT devices with a UGA control number will be setup with user

Arnold, Jonathan

255

Solar access of residential rooftops in four California cities  

E-Print Network [OSTI]

rooftops in four California cities Solar access ofcomputed. Solar access violation California Public ResourcesSolar access of residential rooftops in four California

Levinson, Ronnen

2010-01-01T23:59:59.000Z

256

Instructions for Accessing FedConnect Postings, June 30, 2009...  

Broader source: Energy.gov (indexed) [DOE]

Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings and...

257

Subject Access to Your Information  

E-Print Network [OSTI]

Lists Transportation Research Thesaurus Your own list Use a Short List or a Long List of Terms? If you have a small collection, a short list of terms is appropriate. If you have a large collection, a longer list of more specific terms..., such as the Transportation Research Thesaurus, may be helpful. Longer list will help describe your packages in more specific ways. Subject Access to Other Kinds of Information People ? Expertise Groups of People Projects Equipment, Facilities Use the same set of subject...

Tucker, Sandra

2006-08-01T23:59:59.000Z

258

Remote Access | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote Access Ames

259

Large deviations for random walks in a random environment on a strip  

E-Print Network [OSTI]

Feb 28, 2013 ... We consider a random walk in a random environment (RWRE) on the strip ... For a fixed environment ?, we can define the RWRE starting at (x, ...

2013-02-28T23:59:59.000Z

260

Review of Probability Random Variable  

E-Print Network [OSTI]

at close 4) Height of wheel going over a rocky road #12;3 Random Variable Non-examples 1) `Heads' or `Tails' on coin 2) Red or Black ball from urn But we can make these into RV's Basic Idea ­ don't know · Temperature · Wheel height #12;5 Given Continuous RV X... What is the probability that X = x0 ? Oddity : P

Fowler, Mark

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Memory device using movement of protons  

DOE Patents [OSTI]

An electrically written memory element is disclosed utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element. 19 figs.

Warren, W.L.; Vanheusden, K.J.R.; Fleetwood, D.M.; Devine, R.A.B.

1998-11-03T23:59:59.000Z

262

Memory device using movement of protons  

DOE Patents [OSTI]

An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

2000-01-01T23:59:59.000Z

263

LDRD final report : managing shared memory data distribution in hybrid HPC applications.  

SciTech Connect (OSTI)

MPI is the dominant programming model for distributed memory parallel computers, and is often used as the intra-node programming model on multi-core compute nodes. However, application developers are increasingly turning to hybrid models that use threading within a node and MPI between nodes. In contrast to MPI, most current threaded models do not require application developers to deal explicitly with data locality. With increasing core counts and deeper NUMA hierarchies seen in the upcoming LANL/SNL 'Cielo' capability supercomputer, data distribution poses an upper boundary on intra-node scalability within threaded applications. Data locality therefore has to be identified at runtime using static memory allocation policies such as first-touch or next-touch, or specified by the application user at launch time. We evaluate several existing techniques for managing data distribution using micro-benchmarks on an AMD 'Magny-Cours' system with 24 cores among 4 NUMA domains and argue for the adoption of a dynamic runtime system implemented at the kernel level, employing a novel page table replication scheme to gather per-NUMA domain memory access traces.

Merritt, Alexander M. (Georgia Institute of Technology, Atlanta, GA); Pedretti, Kevin Thomas Tauke

2010-09-01T23:59:59.000Z

264

Development of Superelastic Effects in Ferrous Shape Memory Alloy  

E-Print Network [OSTI]

SE: Superelastic effect SME: Shape memory effect Nitinol:shape memory effect, (SME), whereby the material returns toelastic strain. In SMAs, the SME and SE are based on the

Olson, Scott Michael

265

Linking dopaminergic physiology to working memory related neural circuitry  

E-Print Network [OSTI]

Working memory is the ability to hold information "online" over a delay in order to perform a task. This kind of memory is thought to be encoded in the brain by persistent neural activity that outlasts the presentation of ...

Bolton, Andrew D. (Andrew Donald)

2014-01-01T23:59:59.000Z

266

Intellectual property strategy : analysis of the flash memory industry  

E-Print Network [OSTI]

This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

Ogura, Tomoko H

2006-01-01T23:59:59.000Z

267

Speedy transactions in multicore in-memory databases  

E-Print Network [OSTI]

Silo is a new in-memory database that achieves excellent performance and scalability on modern multicore machines. Silo was designed from the ground up to use system memory and caches efficiently. For instance, it avoids ...

Tu, Stephen

268

Method for refreshing a non-volatile memory  

DOE Patents [OSTI]

A non-volatile memory and a method of refreshing a memory are described. The method includes allowing an external system to control refreshing operations within the memory. The memory may generate a refresh request signal and transmit the refresh request signal to the external system. When the external system finds an available time to process the refresh request, the external system acknowledges the refresh request and transmits a refresh acknowledge signal to the memory. The memory may also comprise a page register for reading and rewriting a data state back to the memory. The page register may comprise latches in lieu of supplemental non-volatile storage elements, thereby conserving real estate within the memory.

Riekels, James E. (New Hope, MN); Schlesinger, Samuel (Aventura, FL)

2008-11-04T23:59:59.000Z

269

Structural Thermomechanical Models for Shape Memory Alloy Components  

E-Print Network [OSTI]

Thermally responsive shape memory alloys (SMA) demonstrate interesting properties like shape memory effect (SME) and superelasticity (SE). SMA components in the form of wires, springs and beams typically exhibit complex, nonlinear hysteretic...

Rao, Ashwin

2014-04-18T23:59:59.000Z

270

Early remodeling of the neocortex upon episodic memory encoding  

E-Print Network [OSTI]

Understanding the mechanisms by which long-term memories are formed and stored in the brain represents a central aim of neuroscience. Prevailing theory suggests that long-term memory encoding involves early plasticity ...

Ericsson, M.

271

Semi-device-independent randomness expansion with partially free random sources  

E-Print Network [OSTI]

By proposing device-independent protocols, S. Pironio et al. [Nature 464, 1021-1024 (2010)] and R. Colbeck et al. [Nature Physics 8, 450-453 (2012)] proved that new randomness can be generated by using perfectly free random sources or partially free ones as seed. Subsequently, Li et al. [Phys. Rev. A 84, 034301 (2011)] studied this topic in the framework of semi-device-independent and proved that new randomness can be obtained from perfectly free random sources. Here we discuss whether and how partially free random sources bring us new randomness in semi-device-independent scenario. We propose a semi-device-independent randomness expansion protocol with partially free random sources, and obtain the condition that the partially free random sources should satisfy to generate new randomness. In the process of analysis, we acquire a new 2-dimensional quantum witness. Furthermore, we get the analytic relationship between the generated randomness and the 2-dimensional quantum witness violation.

Yu-Qian Zhou; Hong-Wei Li; Yu-Kun Wang; Dan-Dan Li; Fei Gao; Qiao-Yan Wen

2015-03-30T23:59:59.000Z

272

High speed optical quantum random number generation  

E-Print Network [OSTI]

.3351 (2009). 6. I. Reidler, Y. Aviad, M. Rosenbluh, and I. Kanter, "Ultrahigh-speed random number generation

Weinfurter, Harald

273

Invertibility of random matrices M. Rudelson  

E-Print Network [OSTI]

Invertibility of random matrices M. Rudelson We will discuss several recent developments related to invertibility and spectral properties of large random matrices. Consider an n Ã? n matrix, whose values are independent identically distributed random variables. The invertibility questions can be roughly divided

Weinberger, Hans

274

Random Matrix Theory, Numerical Computation and Applications  

E-Print Network [OSTI]

a precursor to a book on Random Matrix Theory that will be forthcoming. We reserve the right to reuseRandom Matrix Theory, Numerical Computation and Applications Alan Edelman, Brian D. Sutton new approaches to theory. We illustrate by describing such random matrix techniques as the stochastic

Edelman, Alan

275

Random Fractal Measures via the Contraction Method  

E-Print Network [OSTI]

Random Fractal Measures via the Contraction Method John E. Hutchinson Australian National mapping method to prove various existence and uniqueness properties of (self­similar) random fractal in order to establish a.s. exponential convergence to the unique random fractal measure. The arguments used

Rüschendorf, Ludger

276

Shape memory behavior of ultrafine grained NiTi and TiNiPd shape memory alloys  

E-Print Network [OSTI]

The cyclic instability in shape memory characteristics of NiTi-based shape memory alloys (SMAs), such as transformation temperatures, transformation and irrecoverable strains and transformation hysteresis upon thermal and mechanical cycling limits...

Kockar, Benat

2009-05-15T23:59:59.000Z

277

The nature of the working memory system underlying language processing and its relationship to the long-term memory system  

E-Print Network [OSTI]

This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

Fedorenko, Evelina Georgievna

2007-01-01T23:59:59.000Z

278

Evaluating Memory Energy Efficiency in Parallel I/O Workloads  

E-Print Network [OSTI]

Evaluating Memory Energy Efficiency in Parallel I/O Workloads Jianhui Yue,Yifeng Zhu , Zhao Cai the ever- widening gap between disk and processor speeds, memory energy efficiency becomes an increasingly management policies heavily influence the overall memory energy efficiency. In partic- ular, under the same

Zhu, Yifeng

279

GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS  

E-Print Network [OSTI]

GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS Maha IDRISSI AOUAD.loria.fr/zendra Keywords: Energy consumption reduction, Genetic heuristics, memory allocation management, optimizations on heuristic methods for SPMs careful management in order to reduce memory energy consumption. We propose

Schott, René - Institut de Mathématiques �lie Cartan, Université Henri Poincaré

280

An implementation of SISAL for distributed-memory architectures  

SciTech Connect (OSTI)

This thesis describes a new implementation of the implicitly parallel functional programming language SISAL, for massively parallel processor supercomputers. The Optimizing SISAL Compiler (OSC), developed at Lawrence Livermore National Laboratory, was originally designed for shared-memory multiprocessor machines and has been adapted to distributed-memory architectures. OSC has been relatively portable between shared-memory architectures, because they are architecturally similar, and OSC generates portable C code. However, distributed-memory architectures are not standardized -- each has a different programming model. Distributed-memory SISAL depends on a layer of software that provides a portable, distributed, shared-memory abstraction. This layer is provided by Split-C, a dialect of the C programming language developed at U.C. Berkeley, which has demonstrated good performance on distributed-memory architectures. Split-C provides important capabilities for good performance: support for program-specific distributed data structures, and split-phase memory operations. Distributed data structures help achieve good memory locality, while split-phase memory operations help tolerate the longer communication latencies inherent in distributed-memory architectures. The distributed-memory SISAL compiler and run-time system takes advantage of these capabilities. The results of these efforts is a compiler that runs identically on the Thinking Machines Connection Machine (CM-5), and the Meiko Computing Surface (CS-2).

Beard, P.C.

1995-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Direct match data flow memory for data driven computing  

DOE Patents [OSTI]

A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

1997-01-01T23:59:59.000Z

282

Direct match data flow memory for data driven computing  

DOE Patents [OSTI]

A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a ``fire`` signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor. 11 figs.

Davidson, G.S.; Grafe, V.G.

1997-10-07T23:59:59.000Z

283

SECURITY REFRESH: PROTECTING PHASE-CHANGE MEMORY AGAINST  

E-Print Network [OSTI]

SOFTWARE. ......Given the grim prospect of technology scaling in flash memories and dynamic RAM (DRAM), designers are seeking alternative memory technologies to continue the prophecy of Moore's law for memories device totally useless in a matter of minutes because it has a faster ac- cess speed than flash

Lee, Hsien-Hsin "Sean"

284

Energy Efficient Proactive Thermal Management in Memory Subsystem  

E-Print Network [OSTI]

Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

Simunic, Tajana

285

Local Limit Theorems for Random Walks in a 1D Random Environment  

E-Print Network [OSTI]

Local Limit Theorems for Random Walks in a 1D Random Environment D. Dolgopyat and I. Goldsheid Abstract. We consider random walks (RW) in a one-dimensional i.i.d. random environment with jumps to the nearest neighbours. For almost all environments, we prove a quenched Local Limit Theorem (LLT

Dolgopyat, Dmitry

286

SLAC All Access: Laser Labs  

ScienceCinema (OSTI)

From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

Minitti, Mike; Woods Mike

2014-06-03T23:59:59.000Z

287

Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable Memory Architectures  

E-Print Network [OSTI]

Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable) as a promising candidate to achieve scalable, low power and thermal friendly memory system architecture leakages and retention time. DRAM-based main memory is also consuming an increasing proportion of the power

Kavi, Krishna

288

3, 16031627, 2006 long-memory  

E-Print Network [OSTI]

HESSD 3, 1603­1627, 2006 Detecting long-memory W. Wang et al. Title Page Abstract Introduction Discussion EGU Hydrol. Earth Syst. Sci. Discuss., 3, 1603­1627, 2006 www.hydrol-earth-syst-sci-discuss.net/3/1603 2006 ­ Published: 14 July 2006 Correspondence to: W. Wang (w.wang@126.com) 1603 #12;HESSD 3, 1603

Boyer, Edmond

289

Allegories of Modernity, Geographies of Memory  

E-Print Network [OSTI]

imaginary with mirror images and events. The postmodernist narrative of memory in these novels turns the time of the now into a time for the "past as to come," a time to detect the unrealized and unfulfilled possibilities of the past, through retellings...

Jeon, Seenhwa

2012-10-19T23:59:59.000Z

290

Characterizing Flash Memory: Anomalies, Observations, and Applications  

E-Print Network [OSTI]

), and reliability of flash memory. In addition, we must understand how different usage patterns affect char- acteristics and show how we can use them to improve responsive- ness and energy consumption begun to make the transi- tion from embedded devices to laptops, desktops, and data cen- ters

Wang, Deli

291

From Shared Memory to Message Passing  

E-Print Network [OSTI]

memory, but pass messages along networks: ... but also smart grids... Smart grid with renewable energy? The node measuring the hottest temperature? Etc. - Election of a leader - Coloring the network (e.g., frequency spectrum allocation in wireless networks), computing independent sets, etc. Complexity evaluation

Schmid, Stefan

292

Protist Web Alert Memories of Times Past  

E-Print Network [OSTI]

Protist Web Alert Memories of Times Past The Euglenoid Project (http that the Euglenoids have always fascinated me and so did this site. Micro*scope Astrobiology Institute Web Site from reviewed this site in a previous Web Alert, but it has been revised and updated and so is worth another

Simpson, Larry

293

Memorial University of Newfoundland Diving Safety  

E-Print Network [OSTI]

.2 Maintenance and Inspections 17 9.3 Use of Diving Equipment 17 9.4 Equipment Procedures 18 9.5 Inspection PROCEDURES 20 12.1 Planning of Diving Operations 21 12.2 Adherence to Planned Depth Procedures 21 12 safety manual is designed to provide Memorial University scientific divers with standards and procedures

deYoung, Brad

294

Path Delay Test Through Memory Arrays  

E-Print Network [OSTI]

into a non-scan cell (including a memory cell) is propagated to a scan cell. The propagation of the captured value from non-scan cell to scan cell occurs during low-speed clock cycles. In this work, we assume that only one extra coda cycle is sufficient...

Pokharel, Punj

2013-07-29T23:59:59.000Z

295

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data  

Broader source: Energy.gov [DOE]

Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

296

Better accessibility for Paramaribo / Paramaribo beter bereikbaar:.  

E-Print Network [OSTI]

??A quantitative study for increasing the accessibility of Paramaribo, the capital of Suriname. The analysis was done with the help of a traffic demand model… (more)

Flu, M.E.

2012-01-01T23:59:59.000Z

297

Access Control for SAR Systems Stephen Quirolgico  

E-Print Network [OSTI]

Access Control for SAR Systems Stephen Quirolgico Vincent Hu Tom Karygiannis NIST IR 7815 #12;NIST Systems Stephen Quirolgico Vincent Hu Tom Karygiannis Computer Security Division Information Technology

298

The Ohio Capital Access Program (OCAP) (Ohio)  

Broader source: Energy.gov [DOE]

The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business...

299

Academic Libraries and Open Access: Policies, Services and Resources for Increasing Access to Scholarship  

E-Print Network [OSTI]

This presentation will focus on emerging roles for academic libraries in supporting access to scholarship through open access policies and practices. The University of Kansas recently became the first public university in ...

Rosenblum, Brian

2010-07-06T23:59:59.000Z

300

The NIH Public Access PolicyThe NIH Public Access Policy April 21, 2009  

E-Print Network [OSTI]

The NIH Public Access PolicyThe NIH Public Access Policy April 21, 2009 http://publicaccess.nih.gov/ 11 #12;The NIH Public Access Policy Is Mandatory · The Policy implements Division G, Title II of the National Institutes of Health shall require that all investigators funded by the NIH submit or have

Grishok, Alla

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Metering Schemes for General Access Structures  

E-Print Network [OSTI]

Metering Schemes for General Access Structures Barbara Masucci Dipartimento di Informatica ed, Canada E­mail: dstinson@cacr.math.uwaterloo.ca Abstract A metering scheme is a method by which an audit time frame. In this paper we construct metering schemes for more general access structures, which

Stinson, Douglas

302

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

RESEARCH & INNOVATION OFFICE EASY ACCESS IP AN INTRODUCTION FOR INDUSTRY PARTNERS FEBRUARY 2014 #12 to economic, environmental and social benefits. We believe there are some significant benefits to Easy Access, design and innovation Simple template license agreements means no lengthy and expensive negotiations

University of Technology, Sydney

303

Database Hints for Readex's AccessUN  

E-Print Network [OSTI]

Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

Stowell, Michael

304

Locally Accessible Information and Distillation of Entanglement  

E-Print Network [OSTI]

A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

2004-03-18T23:59:59.000Z

305

Revised Spring 2008 NIH Public Access Policy  

E-Print Network [OSTI]

Revised Spring 2008 NIH Public Access Policy Notice Number: NOT-OD-08-033 - (See Notice NOT-OD-08-161 (Consolidated Appropriations Act, 2008), the NIH voluntary Public Access Policy (NOT-OD-05-022) is now mandatory funded by the NIH submit or have submitted for them to the National Library of Medicine's PubMed Central

306

Web Accessibility Office of Diversity and Inclusion  

E-Print Network [OSTI]

Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

Jones, Michelle

307

Usability and Accessibility in Consumer Health Informatics  

E-Print Network [OSTI]

Usability and Accessibility in Consumer Health Informatics Current Trends and Future Challenges, for innovative eHealth systems to have true value and impact, they must first and foremost be usable challenges in the usability and accessibility of consumer health informatics will be described. Consumer

Shneiderman, Ben

308

Towards a sustainable web accessibility Giorgio Brajnik  

E-Print Network [OSTI]

this is by focussing on sustainable accessibility, i.e. by shaping and establishing effective acces- sibility processes;processes that can be sustained mainly by their own return on investment and by minimal additional resourcesTowards a sustainable web accessibility Giorgio Brajnik Dip. di Matematica e Informatica Universit

Brajnik, Giorgio

309

National Radiobiology Archives Distributed Access user's manual  

SciTech Connect (OSTI)

This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

1991-11-01T23:59:59.000Z

310

Interactive Database Access with Statistics and Graphics  

E-Print Network [OSTI]

DbAccess The Manual Interactive Database Access with Statistics and Graphics Version 2.1.1 D. M and graphical needs of NSTX Physicists. Flexible views and joins are possible, including options for complex SQL General Atomics (GA Plot Objects) adds extensive graphical and interactive capabilities (and documentation

Princeton Plasma Physics Laboratory

311

RESEARCH Open Access Probabilistic framework for opportunistic  

E-Print Network [OSTI]

approaches. Keywords: Cognitive radio networks, Opportunistic spectrum management, Medium access control 1 that the licensed spectrum is underutilized for 15 to 85% of the time depending on the spatial location [1]. ThusRESEARCH Open Access Probabilistic framework for opportunistic spectrum management in cognitive ad

Perkins, Dmitri

312

Foreign National Access to DOE Cyber Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

1999-11-01T23:59:59.000Z

313

Randomness and Earth climate variability  

E-Print Network [OSTI]

Paleo-Sciences including palaeoclimatology and palaeoecology have accumulated numerous records related to climatic changes. The researchers have usually tried to identify periodic and quasi-periodic processes in these paleoscientific records. In this paper, we show that this analysis is incomplete. As follows from our results, random processes, namely processes with a single-time-constant (noise with a Lorentzian noise spectrum), play a very important and, perhaps, a decisive role in numerous natural phenomena. For several of very important natural phenomena the characteristic time constants are very similar and equal to (5-8)x10^3 years. However, this value is not universal. For example, the spectral density fluctuations of the atmospheric radiocarbon 14C are characterized by a Lorentzian with time constant 300 years. The frequency dependence of spectral density fluctuations for benthic 18O records contains two Lorentzians with time constans 8000 years and > 105 years.

Levinshtein, Michael E; Dmitriev, Alexander P; Shmakov, Pavel M

2015-01-01T23:59:59.000Z

314

Quantum Error Correction for Quantum Memories  

E-Print Network [OSTI]

Active quantum error correction using qubit stabilizer codes has emerged as a promising, but experimentally challenging, engineering program for building a universal quantum computer. In this review we consider the formalism of qubit stabilizer and subsystem stabilizer codes and their possible use in protecting quantum information in a quantum memory. We review the theory of fault-tolerance and quantum error-correction, discuss examples of various codes and code constructions, the general quantum error correction conditions, the noise threshold, the special role played by Clifford gates and the route towards fault-tolerant universal quantum computation. The second part of the review is focused on providing an overview of quantum error correction using two-dimensional (topological) codes, in particular the surface code architecture. We discuss the complexity of decoding and the notion of passive or self-correcting quantum memories. The review does not focus on a particular technology but discusses topics that will be relevant for various quantum technologies.

Barbara M. Terhal

2015-01-20T23:59:59.000Z

315

Quantum Memory with a controlled homogeneous splitting  

E-Print Network [OSTI]

We propose a quantum memory protocol where a input light field can be stored onto and released from a single ground state atomic ensemble by controlling dynamically the strength of an external static and homogeneous field. The technique relies on the adiabatic following of a polaritonic excitation onto a state for which the forward collective radiative emission is forbidden. The resemblance with the archetypal Electromagnetically-Induced-Transparency (EIT) is only formal because no ground state coherence based slow-light propagation is considered here. As compared to the other grand category of protocols derived from the photon-echo technique, our approach only involves a homogeneous static field. We discuss two physical situations where the effect can be observed, and show that in the limit where the excited state lifetime is longer than the storage time, the protocols are perfectly efficient and noise-free. We compare the technique to other quantum memories, and propose atomic systems where the experiment c...

Hétet, G; Chanelière, T

2013-01-01T23:59:59.000Z

316

A fluctuation theorem in a random environment  

E-Print Network [OSTI]

A simple class of chaotic systems in a random environment is considered and the fluctuation theorem is extended under the assumption of reversibility.

F. Bonetto; G. Gallavotti; G. Gentile

2006-04-29T23:59:59.000Z

317

How Can Random Noise Help Us  

E-Print Network [OSTI]

How Can Random Noise Help Us. Global Transports from Thermal Fluctuations. Aaron N. K. Yip. Department of Mathematics. Purdue University. 0. 1. 2. 3. 4. 5. 6.

2009-03-18T23:59:59.000Z

318

The Theory of Random Laser Systems  

SciTech Connect (OSTI)

Studies of random laser systems are a new direction with promising potential applications and theoretical interest. The research is based on the theories of localization and laser physics. So far, the research shows that there are random lasing modes inside the systems which is quite different from the common laser systems. From the properties of the random lasing modes, they can understand the phenomena observed in the experiments, such as multi-peak and anisotropic spectrum, lasing mode number saturation, mode competition and dynamic processes, etc. To summarize, this dissertation has contributed the following in the study of random laser systems: (1) by comparing the Lamb theory with the Letokhov theory, the general formulas of the threshold length or gain of random laser systems were obtained; (2) they pointed out the vital weakness of previous time-independent methods in random laser research; (3) a new model which includes the FDTD method and the semi-classical laser theory. The solutions of this model provided an explanation of the experimental results of multi-peak and anisotropic emission spectra, predicted the saturation of lasing modes number and the length of localized lasing modes; (4) theoretical (Lamb theory) and numerical (FDTD and transfer-matrix calculation) studies of the origin of localized lasing modes in the random laser systems; and (5) proposal of using random lasing modes as a new path to study wave localization in random systems and prediction of the lasing threshold discontinuity at mobility edge.

Xunya Jiang

2002-06-27T23:59:59.000Z

319

Logarithmic Opinion Pools for Conditional Random Fields   

E-Print Network [OSTI]

Since their recent introduction, conditional random fields (CRFs) have been successfully applied to a multitude of structured labelling tasks in many different domains. Examples include natural language processing ...

Smith, Andrew

2007-06-26T23:59:59.000Z

320

Multi-core and Many-core Shared-memory Parallel Raycasting Volume Rendering Optimization and Tuning  

SciTech Connect (OSTI)

Given the computing industry trend of increasing processing capacity by adding more cores to a chip, the focus of this work is tuning the performance of a staple visualization algorithm, raycasting volume rendering, for shared-memory parallelism on multi-core CPUs and many-core GPUs. Our approach is to vary tunable algorithmic settings, along with known algorithmic optimizations and two different memory layouts, and measure performance in terms of absolute runtime and L2 memory cache misses. Our results indicate there is a wide variation in runtime performance on all platforms, as much as 254% for the tunable parameters we test on multi-core CPUs and 265% on many-core GPUs, and the optimal configurations vary across platforms, often in a non-obvious way. For example, our results indicate the optimal configurations on the GPU occur at a crossover point between those that maintain good cache utilization and those that saturate computational throughput. This result is likely to be extremely difficult to predict with an empirical performance model for this particular algorithm because it has an unstructured memory access pattern that varies locally for individual rays and globally for the selected viewpoint. Our results also show that optimal parameters on modern architectures are markedly different from those in previous studies run on older architectures. And, given the dramatic performance variation across platforms for both optimal algorithm settings and performance results, there is a clear benefit for production visualization and analysis codes to adopt a strategy for performance optimization through auto-tuning. These benefits will likely become more pronounced in the future as the number of cores per chip and the cost of moving data through the memory hierarchy both increase.

Howison, Mark

2012-01-31T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

A Framework for Flexible Access Control in Digital Library Systems  

E-Print Network [OSTI]

to merely control access to documents local to the digital library. The access control policies are often called DACM (Document Access Control Methods). The basic idea is geared toward discretionary accessA Framework for Flexible Access Control in Digital Library Systems Indrajit Ray and Sudip

Ray, Indrajit

322

Access to UCNI | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess to OUO Access to OUO DOE M 471.3-1, Admin Chg 1, ChapterAccess

323

Hamilton Cycles Containing Randomly Selected Edges in Random Regular Graphs \\Lambda  

E-Print Network [OSTI]

Hamilton Cycles Containing Randomly Selected Edges in Random Regular Graphs \\Lambda R. W. Robinson oriented root edges have been randomly specified for the cycle to contain. The Hamilton cycle must be orientable to agree with all of the orientations on the j root edges. It is shown that the requisite Hamilton

Robinson, Robert W.

324

RANDOM WALK IN DETERMINISTICALLY CHANGING ENVIRONMENT  

E-Print Network [OSTI]

RANDOM WALK IN DETERMINISTICALLY CHANGING ENVIRONMENT DMITRY DOLGOPYAT AND CARLANGELO LIVERANI Abstract. We consider a random walk with transition probabilities weakly dependent on an environment of the environment the walk satisfies the CLT. 1. Introduction The continuing interest in the limit properties

Liverani, Carlangelo

325

The XY Spin Chain Random Block Operators  

E-Print Network [OSTI]

The XY Spin Chain Random Block Operators Proof of Main Result Open Questions Localization for Random Block Operators Related to the XY Spin Chain Jacob W. Chapman Division of Science Southern Wesleyan University Central, SC Joint work with G¨unter Stolz UAB NSF-CBMS Conference on Quantum Spin

Jung, Paul

326

Introduction to Network Science 1 Random Models  

E-Print Network [OSTI]

Introduction to Network Science 1 Random Models #12;Introduction to Network Science 2 mean degree in a graph with exactly m edges Taylor series reminder: #12;Introduction to Network Science 3 In contrast to the degree distribution in random model ... #12;Introduction to Network Science 4 In contrast to the degree

Safro, Ilya

327

Randomized Parallel Algorithms in Optimization Stephen Wright  

E-Print Network [OSTI]

Randomized Parallel Algorithms in Optimization Stephen Wright University of Wisconsin-Madison July 2013 Wright (UW-Madison) Random Parallel Optimization July 2013 1 / 52 #12;Collaborators @ UW-Madison Victor Bittorf Ji Liu Ben Recht ( Berkeley) Chris R´e ( Stanford) Krishna Sridhar Wright (UW

328

auditory working memory: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

requires not only attention Sturm, Alexandra Noelle 2013-01-01 9 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

329

Institute of Computer Science A modified limited-memory BNS ...  

E-Print Network [OSTI]

Institute of Computer Science. Academy of Sciences of the Czech Republic. A modified limited-memory BNS method for unconstrained minimization based on ...

2014-03-12T23:59:59.000Z

330

Recommendation 196: Alternatives to Memorialize the K-25 Building  

Broader source: Energy.gov [DOE]

The ORSSAB Recommends to DOE Alternatives to Memorialize the K-25 Building at East Tennessee Technology Park and Manhattan Project Exhibits in Oak Ridge, Tennessee.

331

Life-cycle assessment of NAND flash memory  

E-Print Network [OSTI]

OF SSD VS . HDD Primary energy consumption MJ 96 GB ?ashpaired trends, primary energy consumption per gigabyte (GB)have been Fig. 2. Primary energy consumption per memory

Boyd, Sarah; Horvath, A; Dornfeld, David

2010-01-01T23:59:59.000Z

332

Building Green in Greensburg: Kiowa County Memorial Hospital  

Office of Energy Efficiency and Renewable Energy (EERE)

This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

333

aversive memory recall: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Inc. All rights reserved Boahen, Kwabena 119 Memory Distortion in People Reporting Abduction by Aliens Susan A. Clancy, Richard J. McNally, Biology and Medicine Websites...

334

Metadata Value Chain for Open Access Journals  

E-Print Network [OSTI]

In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly communication lifecycle...

Mercer, Holly; Dyas-Correia, Sharon

2011-01-01T23:59:59.000Z

335

Accessing MDS with IDL February 1993  

E-Print Network [OSTI]

Accessing MDS with IDL Reference Manual February 1993 Software Version: MDS 5.2 VAX/VMS Version 4 Equipment Corporation: CDD DECnet VAX DATATRIEVE DECUS VAXcluster DEC MicroVAX VAX Information Architecture

California at San Diego, University of

336

Radioactive hot cell access hole decontamination machine  

DOE Patents [OSTI]

Radioactive hot cell access hole decontamination machine. A mobile housing has an opening large enough to encircle the access hole and has a shielding door, with a door opening and closing mechanism, for uncovering and covering the opening. The housing contains a shaft which has an apparatus for rotating the shaft and a device for independently translating the shaft from the housing through the opening and access hole into the hot cell chamber. A properly sized cylindrical pig containing wire brushes and cloth or other disks, with an arrangement for releasably attaching it to the end of the shaft, circumferentially cleans the access hole wall of radioactive contamination and thereafter detaches from the shaft to fall into the hot cell chamber.

Simpson, William E. (Richland, WA)

1982-01-01T23:59:59.000Z

337

Cognitive Medium Access: Exploration, Exploitation and Competition  

E-Print Network [OSTI]

1 Cognitive Medium Access: Exploration, Exploitation and Competition Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor Abstract-- This paper establishes the equivalence between cognitive cognitive user wishes to opportunistically exploit the availability of empty fre- quency bands

El-Gamal, Hesham

338

Rail Access to Yucca Mountain: Critical Issues  

SciTech Connect (OSTI)

The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

Halstead, R. J.; Dilger, F.; Moore, R. C.

2003-02-25T23:59:59.000Z

339

Adjudicative Guidelines for Determining Eligibility for Access...  

Broader source: Energy.gov (indexed) [DOE]

access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her...

340

Decision Analysis of Dynamic Spectrum Access Rules  

SciTech Connect (OSTI)

A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

North Carolina Capital Access Program (North Carolina)  

Broader source: Energy.gov [DOE]

The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lender’s usual standards. The average CAP loan is ...

342

A Dyslexic Perspective on e-Content Accessibility  

E-Print Network [OSTI]

an insight into the issues of web accessibility for users with Dyslexia (and/or other specific learning and accessibility issues of electronic educational content. Keywords: dyslexia, SLD, web accessibility, usability...................................................................................................2 2. Explaining Dyslexia

Brajnik, Giorgio

343

ad libitum access: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

344

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

345

Computational Thermodynamics of CoNiGa High Temperature Shape Memory Alloys  

E-Print Network [OSTI]

Shape Memory Alloys (SMAs) are advanced materials with interesting properties such as pseudoelasticity (PE) and the shape memory effect (SME). Recently, the CoNiGa system has emerged as the basis for very promising High Temperature Shape Memory...

Chari, Arpita

2012-10-19T23:59:59.000Z

346

Altered gene regulation and synaptic morphology in Drosophila learning and memory mutants  

E-Print Network [OSTI]

Genetic studies in Drosophila have revealed two separable long-term memory pathways defined as anesthesia-resistant memory (ARM) and long-lasting long-term memory (LLTM). ARM is disrupted in radish (rsh) mutants, whereas ...

Guan, Zhuo

347

Effects of Constrained Aging on the Shape Memory Response of Nickel Rich Niti Shape Memory Alloys  

E-Print Network [OSTI]

Ni50.6Ti49.4 single and Ni52Ti48 polycrystalline shape memory alloy samples were subjected to aging under a uniaxial stress, to form a single Ni4Ti3 precipitate variant and to investigate the effects of single versus multi-variant coherent...

Barrie, Fatmata Haja

2011-02-22T23:59:59.000Z

348

NBP RFI: Data Access Honeywell Responses To Request for Information...  

Broader source: Energy.gov (indexed) [DOE]

on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

349

Bursting at the Seams: Water Access and Housing in Luanda  

E-Print Network [OSTI]

constructed areas. The lack of water access and properand how the lack of access to clean water, coupled withmost slum residents lack knowledge about the basics of water

Bulfin, Michael Patrick

2009-01-01T23:59:59.000Z

350

Increasing Community Access to Solar: Designing and Developing...  

Broader source: Energy.gov (indexed) [DOE]

Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System (Fact Sheet), U.S. Department of Energy (DOE) Increasing Community Access to...

351

SBA Expands Access to Contracting Opportunities for Women-Owned...  

Office of Environmental Management (EM)

SBA Expands Access to Contracting Opportunities for Women-Owned Small Businesses SBA Expands Access to Contracting Opportunities for Women-Owned Small Businesses January 22, 2013 -...

352

access system based: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

353

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

354

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Broader source: Energy.gov (indexed) [DOE]

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

355

access control policies: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Last Page Topic Index 1 Resiliency Policies in Access Control , Mahesh Tripunitara Computer Technologies and Information Sciences Websites Summary: Resiliency Policies in Access...

356

Public Roundtable- Data Access and Privacy Issues Related to...  

Office of Environmental Management (EM)

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

357

Equitable Access: Remote and Rural Communities 'Transport Needs...  

Open Energy Info (EERE)

Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

358

National Geothermal Data Systems Data Acquisition and Access...  

Broader source: Energy.gov (indexed) [DOE]

National Geothermal Data Systems Data Acquisition and Access National Geothermal Data Systems Data Acquisition and Access Project objective: To support the acquisition of new and...

359

Pre-Packaged Commercial Property-Accessed Clean Energy Financing...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Packaged Commercial Property-Accessed Clean Energy Financing Solutions - 2014 BTO Peer Review Pre-Packaged Commercial Property-Accessed Clean Energy Financing Solutions - 2014 BTO...

360

Molecular mechanisms of memory in imprinting  

E-Print Network [OSTI]

an ess the chick (s In additi for study, r by the fact robiology o It is also a the recentl trolled, faci changes in or water for tive period animals tha A Fig. 1. Positio of section for mesopallium; vocalize ex which learn Imprinting with proce... . mulated evidence strongly indicates that formation of tion memory of imprinting involves a time-dependent ochemical processes in the IMM. Such processes are essed in the left side of this region. Changes in the right raining, though resembling events...

Solomonia, Revaz O.; McCabe, Brian J.

2014-10-02T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Localized quantum walks as secured quantum memory  

E-Print Network [OSTI]

We show that a quantum walk process can be used to construct and secure quantum memory. More precisely, we show that a localized quantum walk with temporal disorder can be engineered to store the information of a single, unknown qubit on a compact position space and faithfully recover it on demand. Since the localization occurss with a finite spread in position space, the stored information of the qubit will be naturally secured from the simple eavesdropper. Our protocol can be adopted to any quantum system for which experimental control over quantum walk dynamics can be achieved.

C. M. Chandrashekar; Th. Busch

2015-04-21T23:59:59.000Z

362

Oil Price Trackers Inspired by Immune Memory  

E-Print Network [OSTI]

We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

Wilson, WIlliam; Aickelin, Uwe

2010-01-01T23:59:59.000Z

363

Memorial Gathering Pending for NERSC's Michael Welcome  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challenge fund LasDubeyChallenge Melrose named topMemorial Gathering

364

auditory-verbal working memory: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Memory 4 Percept Result of filtering Memphis, University of 4 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

365

E-Print Network 3.0 - avoidance memory role Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

by avoiding thrashing... on nodes with enough memory. This avoids thrashing at the cost of reduced utilization of memory... -level approach that avoided thrashing of an...

366

Gist Memory in Alzheimer's Disease: Evidence From Categorized Pictures Andrew E. Budson  

E-Print Network [OSTI]

Gist Memory in Alzheimer's Disease: Evidence From Categorized Pictures Andrew E. Budson Edith of items (gist memory; Reyna & Brainerd, 1995; Schacter, Norman, & Koutstaal, 1998). We have argued

Schacter, Daniel

367

Memory as vibration in a disconnecting  

E-Print Network [OSTI]

experimentally accessible well-defined mathematical model Keim, Nagel Keim et al. PRL 06 #12;bubble break 91, Oguz & Prosperetti JFM 93, Burton et al, PRL 05 Gordillo et al, PRL 05 Bergmann et al, PRL 06, Thoroddsen et al, POF 07, Eggers et al PRL 07 #12;Break-up in many parameter regimes conform to prevailing

Zhang, Wendy

368

MEMORY DESIGN AND EXPLORATION FOR LOW POWER, EMBEDDED SYSTEMS  

E-Print Network [OSTI]

by (i) applying memory optimizing transformations such as loop transformations, (ii) storing frequently transformations. In this paper, we describe a procedure for memory design and exploration for low power embedded optimizing transformations such as loop transformations. While there exists a large number of loop

Kambhampati, Subbarao

369

Data Representation for Efficient and Reliable Storage in Flash Memories  

E-Print Network [OSTI]

schemes are designed for already deployed low-power devices that use on-chip ash memory. Moreover, while devices at the scale of sensor nodes might switch to block-grained, large o -chip ash memory, RFID-scale platforms might not bene t from...

Wang, Yue

2013-05-02T23:59:59.000Z

370

Ubiquitous Memory Introspection Qin Zhao1,2  

E-Print Network [OSTI]

Center 4 Massachusetts Institute of Technology Abstract Modern memory systems play a critical role of a low cost, online, and accurate methodology for deriving fine- grained memory behavior profiles can delinquent load instruc- tions with an 88% rate of accuracy for applications with a relatively high number

Wong, Weng Fai

371

Stream and Memory Hierarchy Design for Multi-Purpose Accelerators  

E-Print Network [OSTI]

Stream and Memory Hierarchy Design for Multi-Purpose Accelerators Sylvain Girbal, Sami Yehia Hugues-purpose loop-based generated accelerators have emerged as an especially attractive accelerator option, with multiple streams, the memory behavior of such accelerators can become at least as complex

Boyer, Edmond

372

Forgotten, but Not Gone: Recovering Memories of Emotional Stories  

E-Print Network [OSTI]

FORGOTTEN, BUT NOT GONE: RECOVERING MEMORIES OF EMOTIONAL STORIES A Thesis by JUSTIN DEAN HANDY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE December 2011 Major Subject: Psychology Forgotten, but Not Gone: Recovering Memories of Emotional Stories Copyright 2011 Justin Dean Handy FORGOTTEN, BUT NOT GONE...

Handy, Justin Dean

2012-02-14T23:59:59.000Z

373

Memory Scaling: A Systems Architecture Perspective Carnegie Mellon University  

E-Print Network [OSTI]

@cmu.edu http://users.ece.cmu.edu/omutlu/ Abstract--The memory system is a fundamental performance and energy technology scaling challenges that make the maintenance and enhancement of its capacity, energy, whether they be server, embedded, desktop, mobile, sensor. Memory capacity, energy, cost, performance

374

ESSES 2003 2003, Carla Schlatter Ellis Power-Aware Memory  

E-Print Network [OSTI]

1 ESSES 2003© 2003, Carla Schlatter Ellis Power-Aware Memory Management 2ESSES 2003© 2003, Carla management · OS page allocation policies · Experimental results · Future work, open questions #12;2 3ESSES Allocation [ASPLOS00] ESSES 2003© 2003, Carla Schlatter Ellis Memory System Power Consumption · Laptop

Ellis, Carla

375

Business surveys modelling with Seasonal-Cyclical Long Memory models  

E-Print Network [OSTI]

Business surveys modelling with Seasonal-Cyclical Long Memory models Ferrara L. and Guégan D. 2nd business surveys released by the European Commission. We introduce an innovative way for modelling those linear models. Keywords: Euro area, nowcasting, business surveys, seasonal, long memory. JEL

Paris-Sud XI, Université de

376

2001 Special issue Associative memory in networks of spiking neurons  

E-Print Network [OSTI]

of the network dynamics. The memory is displayed rhythmically, coded by phase-locked bursts or regular spikes activity and trigger a phase-locked association event within one gamma period. Unlike as under tonic of ef®cient retrieval varying the memory load, the excitation/inhibition parameters, and background

Wennekers, Thomas

377

Optimizing Potential Information Transfer with Self-referential Memory  

E-Print Network [OSTI]

-theoretic design principle, intended to support an evolution of a memory structure fitting a specific selection computation; dis- tributed storage and transmission: e.g., neural networks and associative memory; search principles, underlying many recent developments. This is unsatisfactory not only from a methodological

Polani, Daniel

378

Rosebud: A Place for Interaction between Memory, Story, and Self  

E-Print Network [OSTI]

as part of the human­computer interaction. Ullmer & Ishii [55] make a comparison between levels of stories, memories, and identity. We describe the cognitive, social, and psychological aspects of one, identity, stuffed animals, tangible interfaces, memory, children, education. Scenario Susan, an eight year

Nehaniv, Chrystopher

379

Algorithms and Data Representations for Emerging Non-Volatile Memories  

E-Print Network [OSTI]

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii 1. INTRODUCTION... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Basic Concepts of Flash Memory and PCM . . . . . . . . . . . . . . . . 2 1.2 Data Reliability Challenges for Flash Memory and PCM . . . . . . . . . 8 1.3 Overview of Research Directions . . . . . . . . . . . . . . . . . . . . . . 10 2...

Li, Yue

2014-04-29T23:59:59.000Z

380

Scalla: Structured Cluster Architecture for Low Latency Access  

SciTech Connect (OSTI)

Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

2012-03-20T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Non-Rayleigh scattering by a randomly oriented elongated scatterer  

E-Print Network [OSTI]

The echo statistics of a randomly rough, randomly oriented prolate spheroid that is randomly located in a beampattern are investigated from physics-based principles both analytically and by Monte Carlo methods. This is a ...

Bhatia, Saurav

2012-01-01T23:59:59.000Z

382

MOMENT ASYMPTOTICS FOR MULTITYPE BRANCHING RANDOM WALKS  

E-Print Network [OSTI]

of Montenegro 29 October, 2013 Abstract. We study a discrete time multitype branching random walk on a finite of Montenegro, Cetinjska 2, 81 000 Podgorica, Montenegro, ozrens@t-com.me AMS 2010 Subject Classification: 60J80

König, Wolfgang

383

MOMENT ASYMPTOTICS FOR MULTITYPE BRANCHING RANDOM WALKS  

E-Print Network [OSTI]

of Montenegro 29 October, 2013 Abstract. We study a discrete time multitype branching random walk on a #28;nite of Montenegro, Cetinjska 2, 81 000 Podgorica, Montenegro, ozrens@t-com.me AMS 2010 Subject Classi#28;cation: 60J

König, Wolfgang

384

Chaotic generation of pseudo-random numbers  

E-Print Network [OSTI]

Generation of repeatable pseudo-random sequences with chaotic analog electronics is not feasible using standard circuit topologies. Component variation caused by imperfect fabrication causes the same divergence of output sequences as does varying...

Dornbusch, Andrew Wesley

1999-01-01T23:59:59.000Z

385

Weak multiplicativity for random quantum channels  

E-Print Network [OSTI]

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

386

Random Walks and Electrical Networks Electrical Network  

E-Print Network [OSTI]

Feb 4, 2008 ... Random Walks and Electrical Networks. Hitting Probabilities and Voltage. Voltage. Connect a 1V battery to nodes a and b. ix,y is the current ...

Jonathon Peterson

2008-01-30T23:59:59.000Z

387

RNG: A Practitioner's Overview Random Number Generation  

E-Print Network [OSTI]

RNG: A Practitioner's Overview Random Number Generation A Practitioner's Overview Prof. Michael and Monte Carlo Methods Pseudorandom number generation Types of pseudorandom numbers Properties of these pseudorandom numbers Parallelization of pseudorandom number generators New directions for SPRNG Quasirandom

Mascagni, Michael

388

Improving Data Access Efficiency by Using a Tagless Access Buffer (TAB)  

E-Print Network [OSTI]

of the processor's energy expenditure. We describe the implemen- tation and use of a tagless access buffer (TAB University of Technology [perla/mckee/pers]@chalmers.se Abstract The need for energy efficiency continues) that greatly improves data access energy efficiency while slightly im- proving performance. The compiler

Whalley, David

389

The UCSB Access ID Card Application for Department Use Door Access will be needed  

E-Print Network [OSTI]

of the University and must be returned to the department access controller (DAC) upon demand or when affiliation signature below asserts your identification information is correct and acknowledges your responsibility this or their own department's form/system to document approvals and record authorized access levels. Retention: One

Bigelow, Stephen

390

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

391

Student On Line Access to Records Provides on-line, self service access to  

E-Print Network [OSTI]

SOLAR Student On Line Access to Records #12;Provides on-line, self service access to: Registrar Enrollment Appointments · Review Solar Messages Student Account/ Financial Aid: · View Support offered (available aid ­ i.e. Federal loans, scholarships, etc.) · Accept financial aid (i.e. loans, etc.) ­ loan

392

Participant Name:_____________________________ Canadian Access Federation: Trust Assertion Document (TAD)  

E-Print Network [OSTI]

(TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation Access Federation: Trust Assertion Document (TAD) CANARIE Inc. - Canadian Access Federation Service Page Greg.Condon@unbc.ca (250) 960-5289 #12;Canadian Access Federation: Trust Assertion Document (TAD

Northern British Columbia, University of

393

activity monitor randomized: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

restricted randomization procedures and then apply this technique to approximate the joint distribution of sequentially computed conditional randomization tests. We also...

394

Performance estimates for personnel access control systems  

SciTech Connect (OSTI)

Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

Bradley, R. G.

1980-10-01T23:59:59.000Z

395

Access to OUO | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess to OUO Access to OUO DOE M 471.3-1, Admin Chg 1, Chapter II,

396

The average number of distinct sites visited by a random walker on random graphs  

E-Print Network [OSTI]

We study the linear large $n$ behavior of the average number of distinct sites $S(n)$ visited by a random walker after $n$ steps on a large random graph. An expression for the graph topology dependent prefactor $B$ in $S(n) = Bn$ is proposed. We use generating function techniques to relate this prefactor to the graph adjacency matrix and then devise message-passing equations to calculate its value. Numerical simulations are performed to evaluate the agreement between the message passing predictions and random walk simulations on random graphs. Scaling with system size and average graph connectivity are also analysed.

De Bacco, Caterina; Sollich, Peter

2015-01-01T23:59:59.000Z

397

Random selection as a confidence building tool  

SciTech Connect (OSTI)

Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement. The first concern can be addressed by performing the measurements within the host facility using instruments under the host's control. Because the data output in this measurement scenario is also under host control, it is difficult for the monitoring party to have confidence in that data. One technique for addressing this difficulty is random selection. The concept of random selection can be thought of as four steps: (1) The host presents several 'identical' copies of a component or system to the monitor. (2) One (or more) of these copies is randomly chosen by the monitors for use in the measurement system. (3) Similarly, one or more is randomly chosen to be validated further at a later date in a monitor-controlled facility. (4) Because the two components or systems are identical, validation of the 'validation copy' is equivalent to validation of the measurement system. This procedure sounds straightforward, but effective application may be quite difficult. Although random selection is often viewed as a panacea for confidence building, the amount of confidence generated depends on the monitor's continuity of knowledge for both validation and measurement systems. In this presentation, we will discuss the random selection technique, as well as where and how this technique might be applied to generate maximum confidence. In addition, we will discuss the role of modular measurement-system design in facilitating random selection and describe a simple modular measurement system incorporating six small {sup 3}He neutron detectors and a single high-purity germanium gamma detector.

Macarthur, Duncan W [Los Alamos National Laboratory; Hauck, Danielle [Los Alamos National Laboratory; Langner, Diana [Los Alamos National Laboratory; Thron, Jonathan [Los Alamos National Laboratory; Smith, Morag [Los Alamos National Laboratory; Williams, Richard [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

398

Exploring the randomness of Directed Acyclic Networks  

E-Print Network [OSTI]

The feed-forward relationship naturally observed in time-dependent processes and in a diverse number of real systems -such as some food-webs and electronic and neural wiring- can be described in terms of so-called directed acyclic graphs (DAGs). An important ingredient of the analysis of such networks is a proper comparison of their observed architecture against an ensemble of randomized graphs, thereby quantifying the {\\em randomness} of the real systems with respect to suitable null models. This approximation is particularly relevant when the finite size and/or large connectivity of real systems make inadequate a comparison with the predictions obtained from the so-called {\\em configuration model}. In this paper we analyze four methods of DAG randomization as defined by the desired combination of topological invariants (directed and undirected degree sequence and component distributions) aimed to be preserved. A highly ordered DAG, called \\textit{snake}-graph and a Erd\\:os-R\\'enyi DAG were used to validate the performance of the algorithms. Finally, three real case studies, namely, the \\textit{C. elegans} cell lineage network, a PhD student-advisor network and the Milgram's citation network were analyzed using each randomization method. Results show how the interpretation of degree-degree relations in DAGs respect to their randomized ensembles depend on the topological invariants imposed. In general, real DAGs provide disordered values, lower than the expected by chance when the directedness of the links is not preserved in the randomization process. Conversely, if the direction of the links is conserved throughout the randomization process, disorder indicators are close to the obtained from the null-model ensemble, although some deviations are observed.

Joaquín Goñi; Bernat Corominas-Murtra; Ricard V. Solé; Carlos Rodríguez-Caso

2010-06-11T23:59:59.000Z

399

Memory device using movement of protons  

DOE Patents [OSTI]

An enhancement of an electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure during an anneal in an atmosphere containing hydrogen gas. Device operation is enhanced by concluding this anneal step with a sudden cooling. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronics elements on the same silicon substrate.

Warren, William L. (900 N. Randolph St., Arlington, VA 22203); Vanheusden, Karel J. R. (8401 Spain Rd., Albuquerque, NM 87111); Fleetwood, Daniel M. (5513 Estrellita del Norte, NE., Albuquerque, NM 87111); Devine, Roderick A. B. (12 Impasse de la Liberation, 38950 St. Martin le Vinoux, FR); Archer, Leo B. (3108 Vicky Ct., Garland, TX 75044); Brown, George A. (1512 Ridgeview Dr., Arlington, TX 76012-1940); Wallace, Robert M. (428 Park Bend Dr., Richardson, TX 75081)

2000-01-01T23:59:59.000Z

400

Solid state engine using nitinol memory alloy  

DOE Patents [OSTI]

A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

Golestaneh, Ahmad A. (Bolingbrook, IL)

1981-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Solid state engine using nitinol memory alloy  

DOE Patents [OSTI]

A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

Golestaneh, A.A.

1980-01-21T23:59:59.000Z

402

files between "helped" and "unhelped" memory CD8 T cells to better understand  

E-Print Network [OSTI]

265 files between "helped" and "unhelped" memory CD8 T cells to better understand how memory CD8 the presence of CD4 help during "unhelped" memory CD8 T cell recall responses could not rem- edy their proliferative defects; and vice versa, the lack of CD4 help during "helped" memory CD8 T cell recall re- sponses

403

Serotoninmushroom body circuit modulating the formation of anesthesia-resistant memory  

E-Print Network [OSTI]

Serotonin­mushroom body circuit modulating the formation of anesthesia-resistant memory in Drosophila produces two genetically distinct forms of intermediate-term memories: anesthesia-sensitive memory, which requires the amnesiac gene, and anesthesia- resistant memory (ARM), which requires the radish gene

Huang, Haimei

404

OFC'13 Summary ---Access Networks-I  

E-Print Network [OSTI]

They Be A Blueprint for Optical Networks? Ali Khayrallah Ericsson Research USA Spectrum crunch, Feedback from receiver's residential network model to a converged access/aggregation platform based on SDN. Network convergence to reduce number of devices such as PON for residential, business as well as mobile backhauling ­ Long reach

California at Davis, University of

405

Example School Communications Email about Open Access   

E-Print Network [OSTI]

This is an example text for an email to be sent to the School of Mathematics as part of preparations for implementing Open Access requirements for the post-2014 REF. This is made available here as part of the Jisc-funded LOCH Project....

Tate, Dominic

2015-03-23T23:59:59.000Z

406

Caf Systems Central Security Access Form  

E-Print Network [OSTI]

and Procurement Tracking Reports (Encumbrances, Delivery, Change Order History) SCH_SUPPLY_CHAIN Ad Hoc Query Runner Ability to run reports created by Ad Hoc Query Authors CAFE_NU_COGNOS_AD_HOC_VIEWERS Ad Hoc Query Author (Training Required) Access to Query Studio to create, build, and save reports CAFE_NU_COGNOS_AD_HOC

Shull, Kenneth R.

407

ACCESS TO INFORMATION MANUAL NATIONAL RESEARCH FOUNDATION  

E-Print Network [OSTI]

ACCESS TO INFORMATION MANUAL FOR THE NATIONAL RESEARCH FOUNDATION Manual in terms of section 14 ............................................................................................. 1 2.2 A SCHEMATIC DIARAM OF THE STRUCTURE OF THE NATIONAL RESEARCH FOUNDATION......... 2 2 BODIES #12;© National Research Foundation Malefyane Mogale i FOREWORD In order to present a balanced

Jarrett, Thomas H.

408

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

the barriers to internal investment in development by offering the IP for free and using quick and simple university and an international partner of the initiative for Australasia in December 2013. This new approach Access IP? Whilst we will still protect and commercialise some IP as before, we will offer some of our IP

University of Technology, Sydney

409

Improving School Governance | 3 Open access publishing  

E-Print Network [OSTI]

Access Article Processing Charges Bo-Christer Björk and David Solomon March 2014 #12;1 Developing, Finland and Haslett, Michigan, USA Bo-Christer Björk, Dr. Tech. David J Solomon, PhD Professor Professor.............................................................................................................................................................7 1.2 Methodology

Rambaut, Andrew

410

REVIEW Open Access Pulmonary arterial hypertension  

E-Print Network [OSTI]

REVIEW Open Access Pulmonary arterial hypertension David Montani1,2,3 , Sven Günther1,2,3 , Peter,2,3 and Olivier Sitbon1,2,3* Abstract Pulmonary arterial hypertension (PAH) is a chronic and progressive disease and designated as clinical group 1'. Group 2 'Pulmonary hypertension due to left heart diseases' is divided

Paris-Sud XI, Université de

411

UH Parking Access & Mid-Pacific Institute  

E-Print Network [OSTI]

Hall Keller Hall Physical Science Building Pacific Ocean Science & Technology Kuykendall AnnexStairs Pond UH Parking Access & Mid-Pacific Institute Exit M¯anoa Innovation Center and Kau Auxiliary Services Pacific Biomedical Warehouse Agricultural Science Shops Campus Security n Landscaping

412

Access Agreement Principal Contact for Enquiries  

E-Print Network [OSTI]

Access Agreement 2014/15 Contents 1) Introduction 3 2) Fees, Student Numbers and Fee Income 4 3, strong community spirit and excellent student life. Observing Keele's founding ethos of 'the pursuit of education for individuals, communities and society and equality of opportunity. 1.2 Our University Mission

Stell, John

413

Technology Access Deutsches Patent; Internationale Patentanmeldung (PCT)  

E-Print Network [OSTI]

Technology Access offered by Deutsches Patent; Internationale Patentanmeldung (PCT) TM 586 besitzt einen so gro�en Einfluss auf eine Vielzahl zellulä- in zahlreichen Signalwegen #12; Deutsches Störungen, Depression, Schizophrenie sowie Haarausfall und verringerte Spermienmotilität. #12; Deutsches

Haller-Dintelmann, Robert

414

Characterizing Open Access Publishing at Your Institution  

E-Print Network [OSTI]

access scholarly communication in Tanzanian public universities. 76th IFLA General Conference and Assembly, Gothenburg, Sweden. Retrieved March 3, 2014, from http://conference.ifla.org/past-wlic/2010/138-dulle-en.pdf. Gul, S., Shah, T. A., & Bhagwan, T. A...

Hubbard, David E.; Li, Yu

2014-11-03T23:59:59.000Z

415

Flash Memory Garbage Collection in Hard Real-Time Systems  

E-Print Network [OSTI]

collection and compare it to that of more proactive schemes. I develop formulas to assess the schedulability of hard real- time periodic task sets under simpli ed memory consumption models. Results show that I prove the proactive schemes achieve the larger... work in the area of ash memory management. Moreover, we review the previous research about garbage collection in real-time system. In Chapter III we will describe a simpli ed ash memory model that will be used throughout the rest of the thesis...

Lai, Chien-An

2012-10-19T23:59:59.000Z

416

RENEWAL THEOREMS FOR RANDOM WALKS IN RANDOM SCENERY NADINE GUILLOTIN-PLANTARD AND FRANOISE PNE  

E-Print Network [OSTI]

RENEWAL THEOREMS FOR RANDOM WALKS IN RANDOM SCENERY NADINE GUILLOTIN-PLANTARD AND FRAN�OISE P�NE)n is recurrent) where h is some complex-valued function defined on R or Z. 1. Introduction Renewal theorems variables, renewal theorems were proved by Erdös, Feller and Pollard [11], Blackwell [1, 2], Breiman [6

Paris-Sud XI, Université de

417

LARGE DEVIATIONS FOR THE LOCAL TIMES OF A RANDOM WALK AMONG RANDOM CONDUCTANCES  

E-Print Network [OSTI]

.1) This operator is symmetric and generates the continuous-time random walk (X t ) t#[0,#) in Z d , the random walk AND TILMAN WOLFF In some recent publications (see, e.g., [BD10]), the above walk is called variable-speed times of the walk. The speed and the rate function of our principle are explicit in terms of the lower

König, Wolfgang

418

Non-invertible transformations and spatiotemporal randomness  

E-Print Network [OSTI]

We generalize the exact solution to the Bernoulli shift map. Under certain conditions, the generalized functions can produce unpredictable dynamics. We use the properties of the generalized functions to show that certain dynamical systems can generate random dynamics. For instance, the chaotic Chua's circuit coupled to a circuit with a non-invertible I-V characteristic can generate unpredictable dynamics. In general, a nonperiodic time-series with truncated exponential behavior can be converted into unpredictable dynamics using non-invertible transformations. Using a new theoretical framework for chaos and randomness, we investigate some classes of coupled map lattices. We show that, in some cases, these systems can produce completely unpredictable dynamics. In a similar fashion, we explain why some wellknown spatiotemporal systems have been found to produce very complex dynamics in numerical simulations. We discuss real physical systems that can generate random dynamics.

J. A. Gonzalez; A. J. Moreno; L. E. Guerrero

2006-02-12T23:59:59.000Z

419

Quantum random-walk search algorithm  

SciTech Connect (OSTI)

Quantum random walks on graphs have been shown to display many interesting properties, including exponentially fast hitting times when compared with their classical counterparts. However, it is still unclear how to use these novel properties to gain an algorithmic speedup over classical algorithms. In this paper, we present a quantum search algorithm based on the quantum random-walk architecture that provides such a speedup. It will be shown that this algorithm performs an oracle search on a database of N items with O({radical}(N)) calls to the oracle, yielding a speedup similar to other quantum search algorithms. It appears that the quantum random-walk formulation has considerable flexibility, presenting interesting opportunities for development of other, possibly novel quantum algorithms.

Shenvi, Neil; Whaley, K. Birgitta [Department of Chemistry, University of California, Berkeley, California 94720 (United States); Kempe, Julia [Department of Chemistry, University of California, Berkeley, California 94720 (United States); Computer Science Division, EECS, University of California, Berkeley, California 94720 (United States); CNRS-LRI, UMR 8623, Universite de Paris-Sud, 91405 Orsay (France)

2003-05-01T23:59:59.000Z

420

Efficient broadcast on random geometric graphs  

SciTech Connect (OSTI)

A Randon Geometric Graph (RGG) is constructed by distributing n nodes uniformly at random in the unit square and connecting two nodes if their Euclidean distance is at most r, for some prescribed r. They analyze the following randomized broadcast algorithm on RGGs. At the beginning, there is only one informed node. Then in each round, each informed node chooses a neighbor uniformly at random and informs it. They prove that this algorithm informs every node in the largest component of a RGG in {Omicron}({radical}n/r) rounds with high probability. This holds for any value of r larger than the critical value for the emergence of a giant component. In particular, the result implies that the diameter of the giant component is {Theta}({radical}n/r).

Bradonjic, Milan [Los Alamos National Laboratory; Elsasser, Robert [UNIV OF PADERBORN; Friedrich, Tobias [INTERNATIONAL COMPUTER SCI.; Sauerwald, Thomas [INTERNATIONAL COMPUTER SCI.

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Modified discrete random walk with absorption  

E-Print Network [OSTI]

We obtain expected number of arrivals, probability of arrival, absorption probabilities and expected time before absorption for a modified discrete random walk on the (sub)set of integers. In a [pqrs] random walk the particle can move one step forward or backward, stay for a moment in the same state or it can be absorbed immediately in the current state. M[pqrs] is a modified version, where probabilities on both sides of a multiple function barrier M are of different [pqrs] type.

Theo van Uem

2009-03-02T23:59:59.000Z

422

DESIGN OPTIONS FOR SMALL SCALE SHARED MEMORY MULTIPROCESSORS  

E-Print Network [OSTI]

i DESIGN OPTIONS FOR SMALL SCALE SHARED MEMORY MULTIPROCESSORS by Luiz André Barroso Copyright 1996 Luiz André Barroso #12;ii to Jacqueline Chame #12;iii Acknowledgments During my stay at USC I

Barroso, Luiz André

423

MemTable : contextual memory in group workspaces  

E-Print Network [OSTI]

This thesis presents the design and implementation of MemTable, an interactive touch table that supports co-located group meetings by capturing both digital and physical interactions in its memory. The goal of the project ...

Hunter, Seth E

2009-01-01T23:59:59.000Z

424

A limited memory algorithm for inequality constrained minimization 1 ...  

E-Print Network [OSTI]

Oct 2, 2003 ... In Section 3, we give the estimates of the amount of memory and ...... 1603. 0,16. 639. 0,76. 20. MCCORMCK. 5000. 10000. 0. 20. 1,252. 8. 1,22.

2003-10-07T23:59:59.000Z

425

ORIGINAL PAPER Recorded Versus Organic Memory: Interaction of Two  

E-Print Network [OSTI]

of interpretation, i.e., hermeneutic systems, meaning involves contexts, history, memory, learning, and experience grammars), or touched down from the heights of holistic sciences such as systems biology or hermeneutics

Markos, Anton

426

Gamification: Creating Gameful and Playful Application for Complementing Human Memory  

E-Print Network [OSTI]

Gamification: Creating Gameful and Playful Application for Complementing Human Memory Master thesis of this Master/Diploma thesis is to develop gamification-based design, approach and application that support

Nejdl, Wolfgang

427

Multi-item memory in the primate prefrontal cortex  

E-Print Network [OSTI]

The ability to retain multiple items in short-term memory is fundamental for cognition, yet almost nothing is known about its neural basis. To explore the mechanisms underlying this ability, we trained two monkeys to ...

Warden, Melissa R. (Melissa Rhoads)

2006-01-01T23:59:59.000Z

428

A phenomenological constitutive model for magnetic shape memory alloys  

E-Print Network [OSTI]

A thermodynamics-based constitutive model is derived which predicts the nonlinear strain and magnetization response that magnetic shape memory alloys (MSMAs) exhibit when subjected to mechanical and magnetic loads. The model development is conducted...

Kiefer, Bjoern

2007-04-25T23:59:59.000Z

429

High density Ru nanocrystal deposition for nonvolatile memory applications  

E-Print Network [OSTI]

High density Ru nanocrystal deposition for nonvolatile memory applications Damon B. Farmer School density optimizes the charge storing capability of the floating layer, while a high degree of size

430

Fabrication and characterization of porous shape memory alloys  

E-Print Network [OSTI]

This work details an investigation into the production of porous shape memory alloys (SMAs) via hot isostatic press (HIP) from prealloyed powders. HIPing is one of three main methods for producing porous SMAs, the other two are conventional...

Penrod, Luke Edward

2004-09-30T23:59:59.000Z

431

The Influence of Socioeconomic Status on Working Memory Performance   

E-Print Network [OSTI]

analyses, there were no significant differences observed when SES grade E was included in pairwise comparisons. Results indicated that SES influences level of working memory performance, with those in a higher SES grade scoring higher on average than...

Cleary, Ruth

2012-11-28T23:59:59.000Z

432

Using shape memory alloy as dampers : design methodology  

E-Print Network [OSTI]

Many shape memory alloy (SMA) material models have been proposed in the literature, but most are suited only to forward analysis and not to design. This project proposes a generalized friction element, the lambda box, to ...

Leong, Siu Loong

2005-01-01T23:59:59.000Z

433

Topobo : a 3-D constructive assembly system with kinetic memory  

E-Print Network [OSTI]

We introduce Topobo, a 3-D constructive assembly system em- bedded with kinetic memory, the ability to record and playback physical motion. Unique among modeling systems is Topobo's coincident physical input and output ...

Raffle, Hayes Solos, 1974-

2004-01-01T23:59:59.000Z

434

The Effects of Ageing on Memory and Thinking   

E-Print Network [OSTI]

The main aim of the present study is to examine the effects of ageing on memory and thinking by examining verbal fluency performance. More specifically looking at the differences between older and younger people, to ...

Ford, Amanda

2007-01-01T23:59:59.000Z

435

CITI Technical Report 00-3 Encrypting Virtual Memory  

E-Print Network [OSTI]

secured against physical attacks or protected against security compromises that alloCITI Technical Report 00-3 Encrypting Virtual Memory Niels Provos provos@citi.umich.edu Abstract

Michigan, University of

436

Design and characterization of acoustic pulse shape memory alloy actuators  

E-Print Network [OSTI]

Single crystal Ni-Mn-Ga ferromagnetic shape memory alloys (FSMAs) are active materials which produce strain when a magnetic field is applied. The large saturation strain (6%) of Ni-Mn-Ga, and material energy density ...

Chambers, Joshua Michael

2005-01-01T23:59:59.000Z

437

Approximate Associative Memristive Memory for Energy-Efficient GPUs  

E-Print Network [OSTI]

Approximate Associative Memristive Memory for Energy-Efficient GPUs Abbas Rahimi, Amirali Ghofrani at the architectural and algorithmic levels. At the hardware level, energy-efficiency techniques that employ voltage

Liebling, Michael

438

Memory & Cognition 2005, 33 (5), 871-886  

E-Print Network [OSTI]

Memory & Cognition 2005, 33 (5), 871-886 Since Paul Broca's discovery (1861) of an association (Gardner, Brownell, Wapner, & Michelow, 871 Copyright 2005 Psychonomic Society, Inc. The work reported here

Kutas, Marta

439

Life-cycle assessment of NAND flash memory  

E-Print Network [OSTI]

this possibility, a life-cycle assessment (LCA) of NAND ?ashstudy presents a life-cycle assessment (LCA) of ?ash memoryInput- Output Life Cycle Assessment (EIO-LCA), US 1997

Boyd, Sarah; Horvath, A; Dornfeld, David

2010-01-01T23:59:59.000Z

440

Wakate-Initiative Seminar Memory formation in the fly brain!  

E-Print Network [OSTI]

Wakate-Initiative Seminar Memory formation in the fly brain! Dr. Hiromu Tanimoto Head is synthesized in ~280 neurons in the fly brain and involved also in other brain functions, it is important

Ejiri, Shinji

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Information Ecology: Open System Environment for Data, Memories and Knowing  

E-Print Network [OSTI]

Information Ecology: Open System Environment for Data, Memories and Knowing Karen S. Baker@scu.edu Abstract. An information ecology provides a conceptual framework to consider data, the creation Ecological Research (LTER) community, presents some manifestations of traditionally unreported `invisible

Bowker, Geoffrey C.

442

Abstract versus exemplar memory representations: the role of contextual interference  

E-Print Network [OSTI]

of memory representations, and to try and replicate the findings of Chamberlin and Magill (1992b). Both experiments required the participants to perform 297 trials per day, of three separate tasks, for four consecutive days, followed by a retention...

Johnson, Jennifer Linnea

1998-01-01T23:59:59.000Z

443

activation facilitates memory: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Fractal Consistency: Architecting the Memory System to Facilitate Verification Computer...

444

ON A CLASS OF LIMITED MEMORY PRECONDITIONERS FOR ...  

E-Print Network [OSTI]

In the rest of this section, we show that this memory ...... k Api = 0. (3.12). Proposition 3.4. Let pi, i = 1,...,k, be k conjugate gradient directions generated during the ...

2008-12-04T23:59:59.000Z

445

Replay of memories of extended behavior in the rat hippocampus  

E-Print Network [OSTI]

The hippocampus is a highly conserved structure in the medial temporal lobe of the brain that is known to be critical for spatial learning in rodents, and spatial and episodic memory in humans. During pauses in exploration, ...

Davidson, Thomas James Damon Cheakamus

2009-01-01T23:59:59.000Z

446

Simulation Steering with SCIRun in a Distributed Memory Environment  

E-Print Network [OSTI]

Lake City, UT 84112 fmmiller, hansen, sparker, crjg@cs.utah.edu http://www.cs.utah.edu/¸sci #12Simulation Steering with SCIRun in a Distributed Memory Environment Michelle Miller, Charles D

Utah, University of

447

Simulation Steering with SCIRun in a Distributed Memory Environment  

E-Print Network [OSTI]

Lake City, UT 84112 fmmiller, hansen, sparker, crjg@cs.utah.edu http: www.cs.utah.edu sci #12;AbstractSimulation Steering with SCIRun in a Distributed Memory Environment Michelle Miller, Charles D

Utah, University of

448

Heterogeneous-race-free Memory Models Derek R. Hower  

E-Print Network [OSTI]

1 Heterogeneous-race-free Memory Models Derek R. Hower , Blake A. Hechtman§ , Bradford M. Beckmann Electrical and Computer Engineering University of Wisconsin-Madison Computer Sciences {derek.hower, brad

Wood, David A.

449

Analog VLSI Implementations of Continuous-Time Memory Structures  

E-Print Network [OSTI]

Analog VLSI Implementations of Continuous-Time Memory Structures Jui-Kuo Juan, John G. Harris exactly the same as the cascade of fol- lower integrator circuits described in Mead's textbook [lo

Harris, John G.

450

Mpemba paradox: Hydrogen bond memory and water-skin supersolidity  

E-Print Network [OSTI]

Numerical reproduction of measurements, experimental evidence for skin super-solidity and hydrogen-bond memory clarified that Mpemba paradox integrates the heat emission-conduction-dissipation dynamics in the source-path-drain cycle system.

Chang Q Sun

2015-01-05T23:59:59.000Z

451

Energy-Aware Microprocessor Synchronization: Transactional Memory vs. Locks  

E-Print Network [OSTI]

, but they are difficult to use. In particular, they introduce substantial software engineering problems, or aborts) and are serializable. Hardware transactional memory proposals (e.g., [7], [10], [17], [21], [22

Moreshet, Tali

452

An electron-beam programmable erasable memory device  

E-Print Network [OSTI]

AN ELECTRON-BEAM PROGRAMMABLE ERASABLE MEMORY DEVICE A Thesis by RANG-HUAI WANG Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirement for the degree of MASTER OP SCIENCE August 1984 Major... Subject: Electrical Engineering AN ELECTRON-BEAM PROGRAMMABLE ERASABLE MEMORY DEVICE A Thesis by Kang-Huai Wang Approved as to style and content by: Dona L. Parker (Chairman of Committee) Mark H. Weicho d (Member) omas . air, III (Member...

Wang, Kang-Huai

1984-01-01T23:59:59.000Z

453

A perturbative and gauge invariant treatment of gravitational wave memory  

E-Print Network [OSTI]

We present a perturbative treatment of gravitational wave memory. The coordinate invariance of Einstein's equations leads to a type of gauge invariance in perturbation theory. As with any gauge invariant theory, results are more clear when expressed in terms of manifestly gauge invariant quantities. Therefore we derive all our results from the perturbed Weyl tensor rather than the perturbed metric. We derive gravitational wave memory for the Einstein equations coupled to a general energy-momentum tensor that reaches null infinity.

Lydia Bieri; David Garfinkle

2014-04-03T23:59:59.000Z

454

Multi mode nano scale Raman echo quantum memory  

E-Print Network [OSTI]

Low loss magnetic surface plasmon polariton (SPP) modes characterized by enhanced electrical field component and subwavelength confinement on the dielectric and negative-index metamaterial interface are presented. We demonstrate a possibility of storage and perfect retrieval of the low loss magnetic SPP fields by using a photon echo quantum memory on Raman atomic transition. We describe specific properties of the proposed technique which opens a possibility for efficient nano scale multi-mode quantum memory.

S. A. Moiseev; E. S. Moiseev

2010-01-31T23:59:59.000Z

455

Channel Access Client Toolbox for Matlab  

SciTech Connect (OSTI)

This paper reports on MATLAB Channel Access (MCA) Toolbox--MATLAB [1] interface to EPICS Channel Access (CA) client library. We are developing the toolbox for SPEAR3 accelerator controls, but it is of general use for accelerator and experimental physics applications programming. It is packaged as a MATLAB toolbox to allow easy development of complex CA client applications entirely in MATLAB. The benefits include: the ability to calculate and display parameters that use EPICS process variables as inputs, availability of MATLAB graphics tools for user interface design, and integration with the MATLAB-based accelerator modeling software--Accelerator Toolbox [2-4]. Another purpose of this paper is to propose a feasible path to a synergy between accelerator control systems and accelerator simulation codes, the idea known as on-line accelerator model.

Terebilo, Andrei

2002-08-07T23:59:59.000Z

456

National Radiobiology Archives distributed access programmer's guide  

SciTech Connect (OSTI)

The National Radiobiology Archives is a comprehensive effort to gather, organize, and catalog original data, representative specimens, and supporting materials related to significant radiobiology studies. This provides researchers with information for analyses which compare or combine results of these and other studies and with materials for analysis by advanced molecular biology techniques. This Programmer's Guide document describes the database access software, NRADEMO, and the subset loading script NRADEMO/MAINT/MAINTAIN, which comprise the National Laboratory Archives Distributed Access Package. The guide is intended for use by an experienced database management specialist. It contains information about the physical and logical organization of the software and data files. It also contains printouts of all the scripts and associated batch processing files. It is part of a suite of documents published by the National Radiobiology Archives.

Prather, J. C. [Linfield Coll., McMinnville, OR (United States); Smith, S. K.; Watson, C. R. [Pacific Northwest Lab., Richland, WA (United States)

1991-12-01T23:59:59.000Z

457

Non-Markovianity through accessible information  

E-Print Network [OSTI]

The degree of non-Markovianity of quantum processes has been characterized in several different ways in the recent literature. However, the relationship between the non-Markovian behavior and the flow of information between the system and the environment through an entropic measure has not been yet established. We propose an entanglement-based measure of non-Markovianity by employing the concept of assisted knowledge, where the environment E, acquires information about a system S, by means of its measurement apparatus A. The assisted knowledge, based on the accessible information in terms of von-Neumann entropy, monotonically increases in time for all Markovian quantum processes. We demonstrate that the signatures of non-Markovianity can be captured by the nonmonotonic behaviour of the assisted knowledge. We explore this scenario for a two-level system undergoing a relaxation process, through an experimental implementation using an optical approach that allows full access to the state of the environment.

F. F. Fanchini; G. Karpat; B. Çakmak; L. K. Castelano; G. H. Aguilar; O. Jiménez Farías; S. P. Walborn; P. H. Souto Ribeiro; M. C. de Oliveira

2014-06-04T23:59:59.000Z

458

Shape memory response and microstructural evolution of a severe plastically deformed high temperature shape memory alloy (NiTiHf)  

E-Print Network [OSTI]

NiTiHf alloys have attracted considerable attention as potential high temperature Shape Memory Alloy (SMA) but the instability in transformation temperatures and significant irrecoverable strain during thermal cycling under constant stress remains a...

Simon, Anish Abraham

2006-04-12T23:59:59.000Z

459

The Human Right to Access Electricity  

SciTech Connect (OSTI)

Electricity access is already well established within the framework of human rights, either as an implicit attribute of a pre-existing right (such as non-discrimination or sustainable development) or explicitly in the context of eliminating discrimination against women. There is also broad acknowledgement by states of the desirability of eliminating energy poverty - for all, but particularly for the rural poor, and women. (author)

Tully, Stephen

2006-04-15T23:59:59.000Z

460

Derandomizing from Random Strings Harry Buhrman  

E-Print Network [OSTI]

Derandomizing from Random Strings Harry Buhrman CWI and University of Amsterdam buhrman c log n, R=c log n K , itself a strings of length nc , is complex enough to figure as a hard an alternative proof of the existence of an r.e. set A, due to Barzdin [4], such that for all time bounds t

Fortnow, Lance

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Diffusive limit for the random Lorentz gas  

E-Print Network [OSTI]

We review some recent results concerning the derivation of the diffusion equation and the validation of Fick's law for the microscopic model given by the random Lorentz Gas. These results are achieved by using a linear kinetic equation as an intermediate level of description between our original mechanical system and the diffusion equation.

Alessia Nota

2014-10-14T23:59:59.000Z

462

Randomization and the Gross-Pitaevskii hierarchy  

E-Print Network [OSTI]

We study the Gross-Pitaevskii hierarchy on the spatial domain $\\mathbb{T}^3$. By using an appropriate randomization of the Fourier coefficients in the collision operator, we prove an averaged form of the main estimate which is used in order to contract the Duhamel terms that occur in the study of the hierarchy. In the averaged estimate, we do not need to integrate in the time variable. An averaged spacetime estimate for this range of regularity exponents then follows as a direct corollary. The range of regularity exponents that we obtain is $\\alpha>\\frac{3}{4}$. It was shown in our previous joint work with Gressman that the range $\\alpha>1$ is sharp in the corresponding deterministic spacetime estimate. This is in contrast to the non-periodic setting, which was studied by Klainerman and Machedon, in which the spacetime estimate is known to hold whenever $\\alpha \\geq 1$. The goal of our paper is to extend the range of $\\alpha$ in this class of estimates in a \\emph{probabilistic sense}. We use the new estimate and the ideas from its proof in order to study randomized forms of the Gross-Pitaevskii hierarchy. More precisely, we consider hierarchies similar to the Gross-Pitaevskii hierarchy, but in which the collision operator has been randomized. For these hierarchies, we show convergence to zero in low regularity Sobolev spaces of Duhamel expansions of fixed deterministic density matrices. We believe that the study of the randomized collision operators could be the first step in the understanding of a nonlinear form of randomization.

Vedran Sohinger; Gigliola Staffilani

2014-07-25T23:59:59.000Z

463

Auctions to gas transmission access : the British experience  

E-Print Network [OSTI]

When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

McDaniel, Tanga

2002-01-01T23:59:59.000Z

464

Phase II Smart Grid Data Access Funding Opportunity Winner Announced...  

Broader source: Energy.gov (indexed) [DOE]

Phase II Smart Grid Data Access Funding Opportunity Winner Announced Phase II Smart Grid Data Access Funding Opportunity Winner Announced January 8, 2014 - 12:00am Addthis The...

465

THE INTRODUCTION OF DIRECT ACCESS IN NEW ZEALAND'S ELECTRICITY MARKET  

E-Print Network [OSTI]

of the reform: namely, direct access from consumers to the energy suppliers, or direct access, for short the negotiations between the distributing company and the energy supplier could be sufficient to generate

California at Berkeley. University of

466

amigo online access: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

467

Memory of jamming and shear-jamming (in soft and granular matter)  

E-Print Network [OSTI]

Soft, disordered, micro-structured materials are ubiquitous but are different from ordinary fluids or solids; they display complicated flow properties, in-between the extremes. Of particular interest is the transition between fluid and solid, the so called jamming transition. A multitude of jamming-related phenomena have been catalogued, mostly as unrelated observations, but there is no theoretical framework that explains the complex behavior observed close to jamming. In this article, we present a unified model that remarkably captures and predicts these complexities. A simple, yet quantitative and predictive model is proposed based on the study of three-dimensional soft, frictionless, polydisperse spheres, using isotropic and shear tests. The key ingredient is the knowledge of how the jamming density as state-variable changes for different deformation modes. This encompasses the history of deformation and relates the system's macroscopic response to its micro-structure. The packing efficiency can increase logarithmically slow under gentle ``tapping' or repeated (isotropic) compression, leading to an increase of the jamming density. In contrast, shear deformations cause anisotropy and dilatancy, and rapidly decreases the jamming density that thus represents the memory of previous deformations. A micro-statistical model that explains the memory of the system near jamming involves a multi-scale, fractal-type energy landscape, providing a unified picture for the multitude of phenomena reported near jamming. Finally, to complement our work, a recipe to extract the history-dependent jamming-point from experimentally accessible data is provided. The present results can help avoiding geophysical hazards, bring forward industrial process design and optimization, and solve scientific challenges in fundamental research.

Nishant Kumar; Stefan Luding

2014-07-23T23:59:59.000Z

468

ibm.com/redbooks iNotes Web Access  

E-Print Network [OSTI]

environment secure Plan for capacity Front cover #12;#12;iNotes Web Access Deployment and Administration

469

Legal Protection of Solar Access under Japanese Law  

E-Print Network [OSTI]

solar access protection were considered one of the purposes behind a 20 meter height restriction in such districts, the roadway

Bennett Jr., Frank G.

1986-01-01T23:59:59.000Z

470

Invited Viewer Invited Viewer iSIS Portal Access  

E-Print Network [OSTI]

1 Invited Viewer Invited Viewer iSIS Portal Access Tufts "Invited Viewers" such as parents and spouses can be granted view-only access to a student's iSIS secure personal information. Students previously registered by another student or you do not have a Tufts Username and active iSIS access (most

Dennett, Daniel

471

UNIVERSITY OF ABERDEEN POLICY FOR ACCESS TO PERSONAL DATA  

E-Print Network [OSTI]

UNIVERSITY OF ABERDEEN POLICY FOR ACCESS TO PERSONAL DATA Policy for dealing with either external or internal requests to the University for access to personal and sensitive personal data in terms of the Data and outside of the University for access to personal data of staff or students held by the University

Levi, Ran

472

PeopleSoft (ERP) Finance Access Request Form User Guide  

E-Print Network [OSTI]

PeopleSoft (ERP) Finance Access Request Form User Guide Last Revised: 3/22/11 #12;PeopleSoft ERP Finance Access Request Form User Guide FINAL Last Revised: 3/22/11 Page ii REVISION CONTROL Document Title: PeopleSoft ERP Finance Access Request Form User Guide Author: IT Training & Support File Reference

de Lijser, Peter

473

Measuring Accessibility by Automobile Report # 11 in the series  

E-Print Network [OSTI]

Measuring Accessibility by Automobile Report # 11 in the series Access to Destinations Study Report by Automobile March 2010 6. 7. Author(s) 8. Performing Organization Report No. David Levinson, Bernadette Marion measures for the Twin Cities region that measure accessibility by the automobile mode over the period from

Levinson, David M.

474

CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE  

E-Print Network [OSTI]

CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE Abstract This work develops an econometric model that links credit access with agricultural profitability and investment. Using data. Econometric estimates are run for agricultural investment and profitability as a function of credit access

Foltz, Jeremy D.

475

Access Control Policies and Languages in Open Environments  

E-Print Network [OSTI]

systems is specifying and enforcing access control security policies regulating interactions between languages and coming from different systems can be combined. 1 Introduction Access control is the process should be granted or denied. Access control plays an important role in overall system security

Samarati, Pierangela

476

ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE SP-18 Revision 01  

E-Print Network [OSTI]

ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE SP-18 Page 1 Revision 01 April 17, 2007 NATIONAL HIGH ______________________________________________________ ASSOCIATE DIRECTOR for MANAGEMENT & ADMINISTRATION Brian Fairhurst #12;ELECTRICAL AREA CONTROLLED ACCESS TITLE: ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE 1.0 PURPOSE 1.1 This document establishes policy

Weston, Ken

477

Statler College Research Data Center Access and Usage Policy  

E-Print Network [OSTI]

Statler College Research Data Center Access and Usage Policy Objective Access to the Statler under WVU and federal guidelines. Scope This policy applies to all Statler staff, faculty, administrators, officers, contractors and students. Policy Access to the RDC shall be limited to those authorized

Mohaghegh, Shahab

478

XML ACCESS CONTROL SYSTEMS: A COMPONENT-BASED APPROACH  

E-Print Network [OSTI]

the characteristics of XML documents, allowing the definition of access control policies that operate with a fine to the integration of the access control system with Web based systems. #12;The analysis contained in this paperCHAPTER 4 XML ACCESS CONTROL SYSTEMS: A COMPONENT-BASED APPROACH E. Damiani1 S. De Capitani di

Samarati, Pierangela

479

A Smart Energy System with Distributed Access Control  

E-Print Network [OSTI]

systems to date support remote control and automation but not access control, making them applicable to HVAC (heating, ventilation, and air conditioning) systems. SE has the potential of significantly access from a remote site over the Internet, in which case access control in the form of a shared key

Shinozuka, Masanobu

480

Competitive Interference-aware Spectrum Access in Cognitive Radio Networks  

E-Print Network [OSTI]

Competitive Interference-aware Spectrum Access in Cognitive Radio Networks Jocelyne Elias, Fabio studies the spectrum access problem in cognitive radio networks from a game theoretical perspective. Finally, we provide numerical results of the proposed spectrum access game in several cognitive radio

Boyer, Edmond

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Cooperation and Learning in Multiuser Opportunistic Spectrum Access  

E-Print Network [OSTI]

for the efficient utilization of the radio frequency spectrum is opportunistic spectrum access (OSA), whereCooperation and Learning in Multiuser Opportunistic Spectrum Access Hua Liu§ , Bhaskar spectrum access net- work where spectrum opportunities are time varying and spatially inhomogeneous

Islam, M. Saif

482

MAP: Multiauctioneer Progressive Auction for Dynamic Spectrum Access  

E-Print Network [OSTI]

to access the licensed spectrum, and dynamic spectrum access (DSA) is one of the fundamental functions of CR solution according to the length of step. Index Terms--Cognitive radio, dynamic spectrum access, auction from scarcity in spectrum resource and inefficiency in spectrum usage. Cognitive radio (CR) or dynamic

Wang, Xinbing

483

UC SANTA BARBARA POLICY AND PROCEDURE Physical Access Control  

E-Print Network [OSTI]

property. A successful program is dependent on every member of the community being diligent access controls are to enhance the personal safety of the campus community and to secure University physical access controls for all facilities managed by UCSB (University facilities). Physical access

Bigelow, Stephen

484

Mott law as lower bound for a random walk in a random environment  

E-Print Network [OSTI]

We consider a random walk on the support of a stationary simple point process on $R^d$, $d\\geq 2$ which satisfies a mixing condition w.r.t.the translations or has a strictly positive density uniformly on large enough cubes. Furthermore the point process is furnished with independent random bounded energy marks. The transition rates of the random walk decay exponentially in the jump distances and depend on the energies through a factor of the Boltzmann-type. This is an effective model for the phonon-induced hopping of electrons in disordered solids within the regime of strong Anderson localization. We show that the rescaled random walk converges to a Brownian motion whose diffusion coefficient is bounded below by Mott's law for the variable range hopping conductivity at zero frequency. The proof of the lower bound involves estimates for the supercritical regime of an associated site percolation problem.

A. Faggionato; H. Schulz-Baldes; D. Spehner

2006-04-18T23:59:59.000Z

485

Regulatory Considerations Of Waste Emplacement Within The WIPP Repository: Random Versus Non-Random Distribution  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE) is responsible for disposing of transuranic waste in the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico. As part of that responsibility, DOE must comply with the U.S. Environmental Protection Agency's (EPA) radiation protection standards in Title 40 Code of Federal Regulations (CFR), Parts 191 and 194. This paper addresses compliance with the criteria of 40 CFR Section 194.24(d) and 194.24(f) that require DOE to either provide a waste loading scheme for the WIPP repository or to assume random emplacement in the mandated performance and compliance assessments. The DOE established a position on waste loading schemes during the process of obtaining the EPA's initial Certification in 1998. The justification for utilizing a random waste emplacement distribution within the WIPP repository was provided to the EPA. During the EPA rulemaking process for the initial certification, the EPA questioned DOE on whether waste would be loaded randomly as modeled in long-term performance assessment (PA) and the impact, if any, of nonrandom loading. In response, DOE conducted an impact assessment for non-random waste loading. The results of this assessment supported the contention that it does not matter whether random or non-random waste loading is assumed for the PA. The EPA determined that a waste loading plan was unnecessary because DOE had assumed random waste loading and evaluated the potential consequences of non-random loading for a very high activity waste stream. In other words, the EPA determined that DOE was not required to provide a waste loading scheme because compliance is not affected by the actual distribution of waste containers in the WIPP.

Casey, S. C.; Patterson, R. L.; Gross, M.; Lickliter, K.; Stein, J. S.

2003-02-25T23:59:59.000Z

486

Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution  

E-Print Network [OSTI]

We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

Laszlo Gyongyosi

2014-10-30T23:59:59.000Z

487

Memory and correlation effects in nuclear collisions  

SciTech Connect (OSTI)

Relaxation rates are calculated by numerically solving the Kadanoff-Baym equations for an extended system of nuclear matter. The time evolutions of initial nonequilibrium distributions in momentum space, defined by two Fermi spheres, is studied. Comparisons are made with the (semi-) classical method used in BUU, VUU, etc. Danielewicz has found that at a nucleon density of {similar_to}0.3 nucleon/fm{sup 3} and an equilibrated temperature of about 70 MeV, the quantum relaxation rate is smaller than the classical by a factor of about 2. These results are confirmed. The calculations are extended to lower temperatures (energies) and densities and this ratio is found to be essentially unchanged over a wide range although there are deviations from this rule as seen in the text. The quantum evolutions are started either with an uncorrelated or a correlated initial distribution. The latter are obtained with imaginary time stepping. The relaxation time approximation was previously found to be excellent for the classical evolution. It is found to be as good for the quantum evolution. The memory time is in the present calculations found to be less than 5 fm/{ital c} (i.e., {similar_to}1.7{times}10{sup {minus}23} s). One concludes that quantum-mechanical effects have to be incorporated in the models of heavy ion collisions and nuclear dynamics. Not until this is done comprehensively will one be able to readily assess the role of two-nucleon collisions in the equilibration process.

Koehler, H.S. [Physics Department, University of Arizona, Tucson, Arizona 85721 (United States)] [Physics Department, University of Arizona, Tucson, Arizona 85721 (United States)

1995-06-01T23:59:59.000Z

488

SUBJECT ACCESS REQUEST PROCEDURE The Data Protection Act 1998 (DPA) entitles individuals to request access to any personal  

E-Print Network [OSTI]

access to any personal data that the University is holding about them. This is known as a `Subject Access Request' (SAR). This information explains the process for obtaining your personal data. The Process AllSUBJECT ACCESS REQUEST PROCEDURE The Data Protection Act 1998 (DPA) entitles individuals to request

Mumby, Peter J.

489

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND My signature on the "Mobile Technology Access and Payment Option Request"  

E-Print Network [OSTI]

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

Oregon, University of

490

File: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Remote Access Service  

E-Print Network [OSTI]

to connecting. You must be approved by your Responsibility Center Administrator to access Network ConnectFile: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Restricted University Online Resources Using Network Connect on the Secure Remote Access Service Table

Jiang, Huiqiang

491

The SCALE DRAM subsystem  

E-Print Network [OSTI]

Dynamic Random Access Memory (DRAM) is consuming an ever-increasing portion of a system's energy budget as advances are made in low-power processors. In order to reduce these energy costs, modern DRAM chips implement ...

Pharris, Brian S. (Brian Scott), 1978-

2004-01-01T23:59:59.000Z

492

A graphics architecture for ray tracing and photon mapping  

E-Print Network [OSTI]

and spatial locality, as well as eliminating unnecessary random memory accesses. A high level abstraction of the combined ray tracing and photon mapping streaming pipeline is introduced. Based on this abstraction, an e?cient ray tracing and photon...

Ling, Junyi

2005-11-01T23:59:59.000Z

493

A strategic and financial analysis of the DRAM industry  

E-Print Network [OSTI]

The manufacturing and development of Dynamic Random Access Memory (DRAM) is a large global industry that involves various advanced technologies and significant capital expenditures. The industry has seen tremendous ...

Lo, Matthew A. (Matthew Adam(/))

2012-01-01T23:59:59.000Z

494

Improving Access to Foundational Energy Performance Data  

SciTech Connect (OSTI)

Access to foundational energy performance data is key to improving the efficiency of the built environment. However, stakeholders often lack access to what they perceive as credible energy performance data. Therefore, even if a stakeholder determines that a product would increase efficiency, they often have difficulty convincing their management to move forward. Even when credible data do exist, such data are not always sufficient to support detailed energy performance analyses, or the development of robust business cases. One reason for this is that the data parameters that are provided are generally based on the respective industry norms. Thus, for mature industries with extensive testing standards, the data made available are often quite detailed. But for emerging technologies, or for industries with less well-developed testing standards, available data are generally insufficient to support robust analysis. However, even for mature technologies, there is no guarantee that the data being supplied are the same data needed to accurately evaluate a product?s energy performance. To address these challenges, the U.S. Department of Energy funded development of a free, publically accessible Web-based portal, the Technology Performance Exchange(TM), to facilitate the transparent identification, storage, and sharing of foundational energy performance data. The Technology Performance Exchange identifies the intrinsic, technology-specific parameters necessary for a user to perform a credible energy analysis and includes a robust database to store these data. End users can leverage stored data to evaluate the site-specific performance of various technologies, support financial analyses with greater confidence, and make better informed procurement decisions.

Studer, D.; Livingood, W.; Torcellini, P.

2014-08-01T23:59:59.000Z

495

From Boltzmann to random matrices and beyond  

E-Print Network [OSTI]

These expository notes propose to follow, across fields, some aspects of the concept of entropy. Starting from the work of Boltzmann in the kinetic theory of gases, various universes are visited, including Markov processes and their Helmholtz free energy, the Shannon monotonicity problem in the central limit theorem, the Voiculescu free probability theory and the free central limit theorem, random walks on regular trees, the circular law for the complex Ginibre ensemble of random matrices, and finally the asymptotic analysis of mean-field particle systems in arbitrary dimension, confined by an external field and experiencing singular pair repulsion. The text is written in an informal style driven by energy and entropy. It aims to be recreative and to provide to the curious readers entry points in the literature, and connections across boundaries.

Djalil Chafaï

2014-07-03T23:59:59.000Z

496

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

497

Open Access: From Myth to Paradox  

ScienceCinema (OSTI)

True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculate on the sociology of the next generation of users.

Paul Ginsparg

2010-01-08T23:59:59.000Z

498

Access Venture Partners | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpenWende NewSowitecAWS Ocean Energy Ltd JumpAbraxa IFSAccentAccess

499

Accessibility Standard Statement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility About

500

Accessing the Laboratory | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility Home |