Powered by Deep Web Technologies
Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Understanding the Energy Consumption of Dynamic Random Access Memories  

Science Conference Proceedings (OSTI)

Energy consumption has become a major constraint on the capabilities of computer systems. In large systems the energy consumed by Dynamic Random Access Memories (DRAM) is a significant part of the total energy consumption. It is possible to calculate ... Keywords: DRAM, power

Thomas Vogelsang

2010-12-01T23:59:59.000Z

2

Hybrid silicon nanocrystal silicon nitride dynamic random access memory  

Science Conference Proceedings (OSTI)

This paper introduces a silicon nanocrystal-silicon nitride hybrid single transistor cell for potential dynamic RAM (DRAM) applications that stores charge in silicon nanocrystals or a silicon nitride charge trapping layer or both. The memory operates ...

R. F. Steimle; M. Sadd; R. Muralidhar; Rajesh Rao; B. Hradsky; S. Straub; B. E. White, Jr.

2003-12-01T23:59:59.000Z

3

Analysis of copper ion filaments and retention of dual-layered devices for resistance random access memory applications  

Science Conference Proceedings (OSTI)

For improvement of switching uniformity, we propose a dual-layer structure with different resistance values in each layer. During the forming process, a current path is created in a high-resistance region which localizes filament formation in ultra-thin ... Keywords: Copper filament, Dual-layer, Resistance random access memory (ReRAM)

Jaesik Yoon; Joonmyoung Lee; Hyejung Choi; Ju-Bong Park; Dong-jun Seong; Wootae Lee; Chunhum Cho; Seonghyun Kim; Hyunsang Hwang

2009-07-01T23:59:59.000Z

4

An electron optical technique for large-capacity random-access memories  

Science Conference Proceedings (OSTI)

Memories of the electron beam recording type have many desirable features for large capacity applications. At the Wescon Conference of 1958, the author proposed a class of electron optical memories of very high storage density under the title, "Information ...

Sterling P. Newberry

1966-11-01T23:59:59.000Z

5

Effect of memory access and caching on high performance computing.  

E-Print Network (OSTI)

??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers… (more)

Groening, James

2012-01-01T23:59:59.000Z

6

Bridging the memory access gap  

Science Conference Proceedings (OSTI)

The rapid growth of electronic data processing over the past two decades has been characterized by an almost insatiable appetite for larger and faster memories. In fact, over this period of time, on-line storage capacity has increased about three times ...

Dennis E. Speliotis

1975-05-01T23:59:59.000Z

7

Exposing Memory Access Regularities Using Object-Relative Memory Profiling  

Science Conference Proceedings (OSTI)

Memory profiling is the process of characterizing a program's memorybehavior by observing and recording its response to specific inputsets. Relevant aspects of the program's memory behavior maythen be used to guide memory optimizations in an aggressively ...

Qiang Wu; Artem Pyatakov; Alexey Spiridonov; Easwaran Raman; Douglas W. Clark; David I. August

2004-03-01T23:59:59.000Z

8

Memory access problems in block cyclic reduction on vector computers  

Science Conference Proceedings (OSTI)

In the present paper, modifications of block cyclic reduction are introduced by which the often significant memory access problems of this method on vector computers can be drastically reduced. The modifications are discussed in the context of an interval ... Keywords: Block cyclic reduction, interval arithmetics, memory access problems, vector computers

Hartmut Schwandt

1991-06-01T23:59:59.000Z

9

Purify: Fast detection of memory leaks and access errors  

E-Print Network (OSTI)

This paper describes Purifyru, a software testing and quality assurance Ool that detects memory leaks and access erors. Purify inserts additional checking instructions directly into the object code produced by existing compilers. These instructions check every memory read and write performed by the program-under-test and detect several types of access errors, such as reading uninitialized memory or witing to freed memory. Purify inserts checking logic into all of the code in a program, including third-party and vendor object-code libraries, and verifies system call interfaces. In addition, Purify tracks memory usage and identifies individual memory leals using a novel adaptation of garbage collection techniques. Purify produce standard executable files compatible with existing debuggers, and currently runs on Sun Microsystems ' SPARC family of workstations. Purify's neafly-comprehensive memory access checking slows the target program down typically by less than a facor of three and has resulted in significantly more reliable software for several development goups. L.

Reed Hastings; Bob Joyce

1991-01-01T23:59:59.000Z

10

Optimizing memory accesses for spatial computation  

Science Conference Proceedings (OSTI)

In this paper we present the internal representation and optimizations used by the CASH compiler for improving the memory parallelism of pointer-based programs. CASH uses an SSA-based representation for memory, which compactly summarizes both control-flow-and ...

Mihai Budiu; Seth C. Goldstein

2003-03-01T23:59:59.000Z

11

Empirical Memory-Access Cost Models in Multicore NUMA Architectures  

SciTech Connect

Data location is of prime importance when scheduling tasks in a non-uniform memory access (NUMA) architecture. The characteristics of the NUMA architecture must be understood so tasks can be scheduled onto processors that are close to the task's data. However, in modern NUMA architectures, such as AMD Magny-Cours and Intel Nehalem, there may be a relatively large number of memory controllers with sockets that are connected in a non-intuitive manner, leading to performance degradation due to uninformed task-scheduling decisions. In this paper, we provide a method for experimentally characterizing memory-access costs for modern NUMA architectures via memory latency and bandwidth microbenchmarks. Using the results of these benchmarks, we propose a memory-access cost model to improve task-scheduling decisions by scheduling tasks near the data they need. Simple task-scheduling experiments using the memory-access cost models validate the use of empirical memory-access cost models to significantly improve program performance.

McCormick, Patrick S. [Los Alamos National Laboratory; Braithwaite, Ryan Karl [Los Alamos National Laboratory; Feng, Wu-chun [Virginia Tech

2011-01-01T23:59:59.000Z

12

Fast Access to Distributed Atomic Memory  

Science Conference Proceedings (OSTI)

We study efficient and robust implementations of an atomic read-write data structure over an asynchronous distributed message-passing system made of reader and writer processes, as well as a number of servers implementing the data structure. We determine ... Keywords: Byzantine failures, atomic registers, distributed algorithms, fault-tolerance, shared-memory emulations, time-complexity

Partha Dutta; Rachid Guerraoui; Ron R. Levy; Marko Vukoli?

2010-08-01T23:59:59.000Z

13

Al-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous  

NLE Websites -- All DOE Office Websites (Extended Search)

Al-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous Al-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous Incremental Checkpointing Title Al-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous Incremental Checkpointing Publication Type Conference Proceedings Year of Publication 2013 Authors Nicolae, B, Cappello, F Conference Name HPDC'13 Conference Location New York City Abstract With increasing scale and complexity of supercomputing and cloud computing architectures, faults are becoming a frequent occurrence, which makes reliability a difficult challenge. Although for some applications it is enough to restart failed tasks, there is a large class of applications where tasks run for a long time or are tightly coupled, thus making a restart from scratch unfeasible. Checkpoint-Restart (CR), the main method to survive failures for such applications faces additional challenges in this context: not only does it need to minimize the performance overhead on the application due to checkpointing, but it also needs to operate with scarce resources. Given the iterative nature of the targeted applications, we launch the assumption that first-time writes to memory during asynchronous checkpointing generate the same kind of interference as they did in past iterations. Based on this assumption, we propose novel asynchronous checkpointing approach that leverages both current and past access pattern trends in order to optimize the order in which memory pages are flushed to stable storage. Large scale experiments show up to 60% improvement when compared to state-of-art checkpointing approaches, all this achievable with an extra memory requirement of less than 5% of the total application memory.

14

Exploiting off-chip memory access modes in high-level synthesis  

Science Conference Proceedings (OSTI)

Memory-intensive behaviors often contain large arrays that are synthesized into off-chip memories. With the increasing gap between on-chip and off-chip memory access delays, it is imperative to exploit the efficient access mode features of modern-day ... Keywords: Memory Synthesis, DRAM, High Level Synthesis

Preeti Ranjan Panda; Nikil D. Dutt; Alexandru Nicolau

1997-11-01T23:59:59.000Z

15

Mission-Aware Medium Access Control in Random Access Networks  

E-Print Network (OSTI)

We study mission-critical networking in wireless communication networks, where network users are subject to critical events such as emergencies and crises. If a critical event occurs to a user, the user needs to send necessary information for help as early as possible. However, most existing medium access control (MAC) protocols are not adequate to meet the urgent need for information transmission by users in a critical situation. In this paer, we propose a novel class of MAC protocols that utilize available past information as well as current information. Our proposed protocols are mission-aware since they prescribe different transmission decision rules to users in different situations. We show that the proposed protocols perform well not only when the system faces a critical situation but also when there is no critical situation. By utilizing past information, the proposed protocols coordinate transmissions by users to achieve high throughput in the normal phase of operation and to let a user in a critical ...

Park, Jaeok

2009-01-01T23:59:59.000Z

16

Glift: Generic, efficient, random-access GPU data structures  

Science Conference Proceedings (OSTI)

This article presents Glift, an abstraction and generic template library for defining complex, random-access graphics processor (GPU) data structures. Like modern CPU data structure libraries, Glift enables GPU programmers to separate algorithms from ... Keywords: Adaptive, GPGPU, GPU, adaptive shadow maps, data structures, graphics hardware, multiresolution, octree textures, parallel computation

Aaron E. Lefohn; Shubhabrata Sengupta; Joe Kniss; Robert Strzodka; John D. Owens

2006-01-01T23:59:59.000Z

17

Distributed anemone: transparent low-latency access to remote memory  

Science Conference Proceedings (OSTI)

Performance of large memory applications degrades rapidly once the system hits the physical memory limit and starts paging to local disk. We present the design, implementation and evaluation of Distributed Anemone (Adaptive Network Memory Engine) ...

Michael R. Hines; Jian Wang; Kartik Gopalan

2006-12-01T23:59:59.000Z

18

Research on memory access vulnerability analysis technique in SCADA protocol implementation  

Science Conference Proceedings (OSTI)

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA ... Keywords: SCADA protocol implementation, dynamic analysis, memory access vulnerability

Fang Lan; Wang Chunlei; He Ronghui

2010-07-01T23:59:59.000Z

19

Optimisation and performance evaluation of mechanisms for latency tolerance in remote memory access communication on clusters  

Science Conference Proceedings (OSTI)

This paper describes the design and performance evaluation of the mechanisms for latency tolerance in the remote memory access communication on clusters equipped with high-performance networks such as Myrinet. It discusses strategies that bridge ... Keywords: aggregation, cluster computing, communication overlap, latency tolerance, non-blocking, remote memory access

J. Nieplocha; V. Tipparaju; M. Krishnan; G. Santhanaraman; D. K. Panda

2004-03-01T23:59:59.000Z

20

U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: libvirt virTypedParameterArrayClear() Memory Access Error 3: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service August 24, 2012 - 7:00am Addthis PROBLEM: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service PLATFORM: Version(s): 0.9.13 and prior ABSTRACT: A vulnerability was reported in libvirt. reference LINKS: libvirt SecurityTracker Alert ID: 1027437 Secunia Advisory SA50118 Bugtraq ID: 54748 CVE-2012-3445 IMPACT ASSESSMENT: Medium Discussion A remote user can send a specially crafted RPC call with the number of parameters set to zero to libvirtd to trigger a memory access error in virTypedParameterArrayClear() and cause the target service to crash. Impact:

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Hybrid in-memory and on-disk tables for speeding-up table accesses  

Science Conference Proceedings (OSTI)

Main memory database management systems have become essential for response-time-bounded applications, such as those in telecommunications systems or Internet, where users frequently access a table in order to get information or check whether an element ... Keywords: DBMS performance, hybrid tables, main memory databases

Joan Guisado-Gámez; Antoni Wolski; Calisto Zuzarte; Josep-Lluís Larriba-Pey; Victor Muntés-Mulero

2010-08-01T23:59:59.000Z

22

Complexity effective memory access scheduling for many-core accelerator architectures  

Science Conference Proceedings (OSTI)

Modern DRAM systems rely on memory controllers that employ out-of-order scheduling to maximize row access locality and bank-level parallelism, which in turn maximizes DRAM bandwidth. This is especially important in graphics processing unit (GPU) architectures, ... Keywords: graphics processors, memory controller, on-chip interconnection networks

George L. Yuan; Ali Bakhoda; Tor M. Aamodt

2009-12-01T23:59:59.000Z

23

A novel random access scan flip-flop design  

E-Print Network (OSTI)

Serial scan design causes unnecessary switching activity during testing causing enormous power dissipation. The test time increases enormously with the increase in number of flip-flops. An alternate to serial scan architecture is Random Access Scan (RAS). Here every flip-flop is uniquely addressed using an address decoder. Although it may seem to have solved most of the current problems associated with testing integrated circuits, yet one may impulsively conclude that the routing and area overhead associated with RAS is prohibitive. We present a design of the RAS flip-flop which uses a unique “toggle” mechanism, possible only in RAS. We minimize the number of gates (transistors) and eliminate the need for two globally routed (scan in and test control) signals present in earlier designs. Our design is built keeping in focus the address decoder complexity to a bare minimum. Our multistage scan-out system enables the addressed flip-flop to be observed without compromising performance due to a slow output bus. We have estimated the additional gates required to implement RAS over serial scan (SS). The design obtained equal fault coverage, 60 % test vector reduction and 99 % lesser power dissipation as compared to SS. 1.

S. Mudlapur; Vishwani D. Agrawal; Adit D. Singh

2005-01-01T23:59:59.000Z

24

Memory access scheduling and binding considering energy minimization in multi-bank memory systems  

Science Conference Proceedings (OSTI)

Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g., active, standby, nap, power-down) to facilitate energy saving. Furthermore, ... Keywords: binding, low energy design, scheduling

Chun-Gi Lyuh; Taewhan Kim

2004-06-01T23:59:59.000Z

25

Packet erasure coding with random access to reduce losses of delay sensitive multislot messages  

E-Print Network (OSTI)

Many commercial and military systems use some form of random access. ALOHA type protocols are particularly useful for multicast traffic and have low complexity; however, they suffer from low capacity and large loss ...

Zeger, Linda

26

Circuit design for embedded memory in low-power integrated circuits  

E-Print Network (OSTI)

This thesis explores the challenges for integrating embedded static random access memory (SRAM) and non-volatile memory-based on ferroelectric capacitor technology-into lowpower integrated circuits. First considered is the ...

Qazi, Masood

2012-01-01T23:59:59.000Z

27

On the Stability of Random Multiple Access with Stochastic Energy Harvesting  

E-Print Network (OSTI)

In this paper, we consider the random access of nodes having energy harvesting capability and a battery to store the harvested energy. Each node attempts to transmit the head-of-line packet in the queue if its battery is nonempty. The packet and energy arrivals into the queue and the battery are all modeled as a discrete-time stochastic process. The main contribution of this paper is the exact characterization of the stability region of the packet queues given the energy harvesting rates when a pair of nodes are randomly accessing a common channel having multipacket reception (MPR) capability. The channel with MPR capability is a generalized form of the wireless channel modeling which allows probabilistic receptions of the simultaneously transmitted packets. The results obtained in this paper are fairly general as the cases with unlimited energy for transmissions both with the collision channel and the channel with MPR capability can be derived from ours as special cases. Furthermore, we study the impact of t...

Jeon, Jeongho

2011-01-01T23:59:59.000Z

28

Bipolar resistive switching effect in Gd2O3 films for transparent memory application  

Science Conference Proceedings (OSTI)

A transparent resistive random access memory based on ITO/Gd"2O"3/ITO capacitor structure is fabricated on glass substrate. The transparent memory exhibits reliable resistive switching for more than 1000 cycles, low operation voltage of -2V/+2V, and ... Keywords: Gadolinium oxide, Gd2O3, RRAM, Resistive memory, TRRAM, Transparent memory

Kou-Chen Liu; Wen-Hsien Tzeng; Kow-Ming Chang; Yi-Chun Chan; Chun-Chih Kuo

2011-07-01T23:59:59.000Z

29

A frequent-value based PRAM memory architecture  

Science Conference Proceedings (OSTI)

Phase Change Random Access Memory (PRAM) has great potential as the replacement of DRAM as main memory, due to its advantages of high density, non-volatility, fast read speed, and excellent scalability. However, poor endurance and high write energy appear ...

Guangyu Sun; Dimin Niu; Jin Ouyang; Yuan Xie

2011-01-01T23:59:59.000Z

30

IEEE TRANSACTIONS ON ELECTRON DEVICES, VOL. 55, NO. 10, OCTOBER 2008 2785 Mechanically Operated Random Access Memory  

E-Print Network (OSTI)

, 19 2001 . 4 H. Lee, R. A. Coutu, S. Mall, and K. D. Leddy, J. Micromech. Microeng. 16, 557 2006 . 5 D

Yoon, Jun-Bo

31

MEMMU: Memory expansion for MMU-less embedded systems  

Science Conference Proceedings (OSTI)

Random access memory (RAM) is tightly constrained in the least expensive, lowest-power embedded systems such as sensor network nodes and portable consumer electronics. The most widely used sensor network nodes have only 4 to 10KB of RAM and do not contain ... Keywords: Data compression, embedded system, wireless sensor network

Lan S. Bai; Lei Yang; Robert P. Dick

2009-04-01T23:59:59.000Z

32

System for loading executable code into volatile memory in a downhole tool  

DOE Patents (OSTI)

A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

2007-09-25T23:59:59.000Z

33

Page placement in hybrid memory systems  

Science Conference Proceedings (OSTI)

Phase-Change Memory (PCM) technology has received substantial attention recently. Because PCM is byte-addressable and exhibits access times in the nanosecond range, it can be used in main memory designs. In fact, PCM has higher density and lower idle ... Keywords: hybrid memory, memory controller, phase-change memory

Luiz E. Ramos; Eugene Gorbatov; Ricardo Bianchini

2011-05-01T23:59:59.000Z

34

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

35

Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems  

Science Conference Proceedings (OSTI)

Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network nodes and portable consumer electronics. The most widely-used sensor network ... Keywords: data compression, embedded system, wireless sensor network

Lan S. Bai; Lei Yang; Robert P. Dick

2006-10-01T23:59:59.000Z

36

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMSDEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated...

37

An empirical comparison of monitoring algorithms for access anomaly detection  

Science Conference Proceedings (OSTI)

One of the major disadvantages of parallel programming with shared memory is the nondeterministic behavior caused by uncoordinated access to shared variables, known as access anomalies. Monitoring program execution to detect access anomalies ...

A. Dinning; E. Schonberg

1990-02-01T23:59:59.000Z

38

Dry etching of CoFe films using a CH{sub 4}/Ar inductively coupled plasma for magnetic random access memory application  

Science Conference Proceedings (OSTI)

In this study, the CoFe thin film was studied using an inductively coupled plasma system in CH{sub 4}-based gas chemistries. The etch rate of the CoFe thin film was systemically studied by the process parameters including the gas mixing ratio, the rf power, the dc-bias power, and the process pressure. The best gas composition for etching was in CH{sub 4} (20%)/Ar (80%) ratio. As the rf power and the dc-bias voltage were increased, the etch rate of the CoFe thin film increased in a CH{sub 4}/Ar inductively coupled plasma system. The best process pressure condition for etching was 10 mTorr in the CH{sub 4}/Ar inductively coupled plasma system. The changes in the components on the surface of the CoFe thin film were investigated with energy dispersive x ray.

Um, Doo-Seung; Kim, Dong-Pyo; Woo, Jong-Chang; Kim, Chang-Il; Lee, Sung-Kwon; Jung, Tae-Woo; Moon, Seung-Chan [School of Electrical and Electronics Engineering, Chung-Ang University, 221 Heukseok-Dong, Dongjak-Gu, Seoul 156-756 (Korea, Republic of); Hynix Semiconductor Inc., San 136-1, Ami-ri, Bubal-eub, Icheon-si, Kyoungki-do 467-701 (Korea, Republic of)

2009-07-15T23:59:59.000Z

39

Open Access  

E-Print Network (OSTI)

Research article A unique population of effector memory lymphocytes identified by CD146 having a distinct immunophenotypic and genomic profile

Bmc Immunology; Mohamed F Elshal; Sameena S Khan; Nalini Raghavachari; Yoshiyuki Takahashi; Jennifer Barb; James J Bailey; Peter J Munson; Michael A Solomon; Robert L Danner; J Philip; Robert L Danner; J Philip Mccoy

2007-01-01T23:59:59.000Z

40

Scientific Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Scientific Access The APS is a open user facility that makes beam time available to the international scientific community through a peer-reviewed proposal process. Two access...

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Open Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Communication » Communication » Open Access Open Access Open access (OA) is the practice of providing unrestricted access via the Internet to peer-reviewed scholarly journal articles. Learn more below... Questions? Open Access Email Open access publishing and publications have experienced substantial growth, expansion and uptake in recent years. What exactly is an open access publication? There are many definitions, but in a nutshell an open access publication is a publication that provides immediately free online access to all users worldwide. This may sound like a tall order, and yet there are to date over 4000 journal publications that fit this definition. The need for this type of access has been driven by the out-of-control costs for scholarly publications. Statistics kept by the Association for Research Libraries

42

Shared Memory Programming in Metacomputing Environments: The Global Array Approach  

Science Conference Proceedings (OSTI)

The performance of the Global Array shared-memory nonuniform memory-access programming model is explored in a wide-area-network (WAN) distributed supercomputer environment. The Global Array model is extended by introducing a concept of mirrored arrays ... Keywords: Metacomputing, NUMA memory architecture, distributed arrays, global arrays, shared-memory programming

Jarek Nieplocha; Robert Harrison

1997-10-01T23:59:59.000Z

43

Clotho: decoupling memory page layout from storage organization  

Science Conference Proceedings (OSTI)

As database application performance depends on the utilization of the memory hierarchy, smart data placement plays a central role in increasing locality and in improving memory utilization. Existing techniques, however, do not optimize accesses to all ...

Minglong Shao; Jiri Schindler; Steven W. Schlosser; Anastassia Ailamaki; Gregory R. Ganger

2004-08-01T23:59:59.000Z

44

Open Access  

E-Print Network (OSTI)

© 2007 Brewer; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License

Earl J Brewer; Earl J Brewer

2007-01-01T23:59:59.000Z

45

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMS/DEFINITIONS FROM DOE M 470.4-7 TERMS/DEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated security areas. ACCESS CONTROL MEASURES. Hardware and software features, physical controls, operating procedures, administrative procedures, and various combinations of these designed to detect or prevent unauthorized access to classified information; special nuclear materials; Government property; automated information systems, facilities, or materials; or areas containing the above and to enforce use of these measures to protect Departmental security and property interests. CRITICAL PATH SCENARIO. An adversary-based scenario that is generated during the conduct of a vulnerability assessment and accounts for adversary tactics that

46

Better I/O through byte-addressable, persistent memory  

Science Conference Proceedings (OSTI)

Modern computer systems have been built around the assumption that persistent storage is accessed via a slow, block-based interface. However, new byte-addressable, persistent memory technologies such as phase change memory (PCM) offer fast, fine-grained ... Keywords: file systems, performance, phase change memory

Jeremy Condit; Edmund B. Nightingale; Christopher Frost; Engin Ipek; Benjamin Lee; Doug Burger; Derrick Coetzee

2009-10-01T23:59:59.000Z

47

Context and Structure in Automated Full-Text Information Access  

E-Print Network (OSTI)

Context and Structure in Automated Full-Text Information Access Marti A. Hearst Report No. UCB 94720 #12;#12;Context and Structure in Automated Full-Text Information Access by Marti A. Hearst B and Structure in Automated Full-Text Information Access Copyright c 1994 by Marti A. Hearst #12;In memory of my

Hearst, Marti

48

A memory mapping approach for network and controller optimization in parallel interleaver architectures  

Science Conference Proceedings (OSTI)

Recent communication standards and storage systems uses parallel architectures for error correcting codes (LDPC or Turbo-codes) to reliably transfer data between two equipments. However, parallel architectures suffer from memory access conflicts. In ... Keywords: interleavers, memory mapping, parallel architectures

Aroua Briki; Cyrille Chavet; Philippe Coussy

2013-05-01T23:59:59.000Z

49

Access to recorded interviews: A research agenda  

Science Conference Proceedings (OSTI)

Recorded interviews form a rich basis for scholarly inquiry. Examples include oral histories, community memory projects, and interviews conducted for broadcast media. Emerging technologies offer the potential to radically transform the way in which recorded ... Keywords: Interviews, access technology, oral history, speech indexing, spoken word archives

Franciska De Jong; Douglas W. Oard; Willemijn Heeren; Roeland Ordelman

2008-06-01T23:59:59.000Z

50

Tolerating data access latency with register preloading  

Science Conference Proceedings (OSTI)

By exploiting fine grain parallelism, superscalar processors can potentially increase the performance of future supercomputers. However, supercomputers typically have a long access delay to their first level memory which can severely restrict the performance ... Keywords: VLIW/superscalar processor, data dependence analysis, load latency, register file, register preload

William Y. Chen; Scott A. Mahlke; Wen-mei W. Hwu; Tokuzo Kiyohara; Pohua P. Chang

1992-08-01T23:59:59.000Z

51

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to...

52

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Gate Access Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register...

53

Active memory operations  

Science Conference Proceedings (OSTI)

The performance of modern microprocessors is increasingly limited by their inability to hide main memory latency. The problem is worse in large-scale shared memory systems, where remote memory latencies are hundreds, and soon thousands, of processor ... Keywords: DRAM, cache coherence, distributed shared memory, memory performance, stream processing, thread synchronization

Zhen Fang; Lixin Zhang; John B. Carter; Ali Ibrahim; Michael A. Parker

2007-06-01T23:59:59.000Z

54

Experiences with Co-Array Fortran on Hardware Shared Memory Platforms  

E-Print Network (OSTI)

Abstract. Source-to-source translation is an important code generation strategy commonly used by parallelizing compilers and compilers for parallel languages. In this paper, we investigate the performance impact of using different Fortran 90 representations for local and remote accesses on scalable shared-memory multiprocessors when generating SPMD code for Co-array Fortran. Our aim is to deliver the full power of the hardware platform to the application when operating on local data and when accessing remote data using either coarse-grain or fine-grain communication. We explored the performance impact of several different representations for shared data and several different ways of implementing communication. Using CAF variants of the STREAM, Random Access, and NAS MG & SP benchmarks, we compared the performance of library-based implementations of one-sided communication with fine-grain communication that uses pointers to access remote data using load and store operations. Our experiments showed that using pointer-based fine-grain communication improved performance as much as a factor of 24 on an SGI Altix and as much as a factor of five on an SGI Origin, when pointer initialization is hoisted out of a loop performing data accesses. 1

Yuri Dotsenko; Cristian Coarfa; John Mellor-crummey; Daniel Chavarría-mir

2004-01-01T23:59:59.000Z

55

A new parallel sorting approach with sorting memory module  

Science Conference Proceedings (OSTI)

A new approach to accelerating parallel sorting processes is introduced in this paper. This approach involves the design of a new type of memory chip with sorting functions. This type of sorting memory chip is feasible with today's VLSI techniques. A memory module organizing several sorting memory chips associated with additional ECL or TTL control logic circuits is also presented. Using the sorting memory modules in a shared memory parallel processor machine, parallel sorting algorithms such as the column sort method can reduce the row access time significantly and avoid data collisions in the interconnection network. Experimental simulation results on the practical speedup achieved and the memory utilization for the proposed approach are described.

Zhu, C.Q. (Illinois Univ., Urbana, IL (USA). Center for Supercomputing Research and Development); Fang, Z. (Research and Development, Concurrent Computer Corp., Tinton Falls, NJ (US)); Li, X. (Dept. of Computing Science, Univ. of Alberta, Edmonton, Alberta (CA))

1989-12-01T23:59:59.000Z

56

Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Scope, Shape memory alloys (SMA) have received widespread attention from ... The symposium focuses on shape memory and superelastic materials and their ...

57

Randomized selection on the GPU  

SciTech Connect

We implement here a fast and memory-sparing probabilistic top N selection algorithm on the GPU. To our knowledge, this is the first direct selection in the literature for the GPU. The algorithm proceeds via a probabilistic-guess-and-chcck process searching for the Nth element. It always gives a correct result and always terminates. The use of randomization reduces the amount of data that needs heavy processing, and so reduces the average time required for the algorithm. Probabilistic Las Vegas algorithms of this kind are a form of stochastic optimization and can be well suited to more general parallel processors with limited amounts of fast memory.

Monroe, Laura Marie [Los Alamos National Laboratory; Wendelberger, Joanne R [Los Alamos National Laboratory; Michalak, Sarah E [Los Alamos National Laboratory

2011-01-13T23:59:59.000Z

58

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register with the ALS...

59

Capital Access Program (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

60

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

62

Memory Considerations for Carver  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Overview Carver login nodes each have 48GB of physical memory. Most compute nodes have 24GB; however, 80 compute nodes have 48GB. Not all of this memory is available to user processes. Some memory is reserved for the Linux kernel. Furthermore, since Carver nodes have no disk, the "root" file system (including /tmp) is kept in memory ("ramdisk"). The kernel and root file system combined occupy about 4GB of memory. Therefore users should try to use no more than 20GB on most compute nodes, or 44GB on the large-memory compute nodes. There are also two "extra-large" memory nodes; each node has four 8-core Intel X7550 ("Nehalem EX") 2.0 GHz processors (32 cores total) and 1TB memory. These nodes are available through the queue "reg_xlmem". Please

63

Nanopatterned ferroelectrics for ultrahigh density rad-hard nonvolatile memories.  

SciTech Connect

Radiation hard nonvolatile random access memory (NVRAM) is a crucial component for DOE and DOD surveillance and defense applications. NVRAMs based upon ferroelectric materials (also known as FERAMs) are proven to work in radiation-rich environments and inherently require less power than many other NVRAM technologies. However, fabrication and integration challenges have led to state-of-the-art FERAMs still being fabricated using a 130nm process while competing phase-change memory (PRAM) has been demonstrated with a 20nm process. Use of block copolymer lithography is a promising approach to patterning at the sub-32nm scale, but is currently limited to self-assembly directly on Si or SiO{sub 2} layers. Successful integration of ferroelectrics with discrete and addressable features of {approx}15-20nm would represent a 100-fold improvement in areal memory density and would enable more highly integrated electronic devices required for systems advances. Towards this end, we have developed a technique that allows us to carry out block copolymer self-assembly directly on a huge variety of different materials and have investigated the fabrication, integration, and characterization of electroceramic materials - primarily focused on solution-derived ferroelectrics - with discrete features of {approx}20nm and below. Significant challenges remain before such techniques will be capable of fabricating fully integrated NVRAM devices, but the tools developed for this effort are already finding broader use. This report introduces the nanopatterned NVRAM device concept as a mechanism for motivating the subsequent studies, but the bulk of the document will focus on the platform and technology development.

Brennecka, Geoffrey L.; Stevens, Jeffrey; Scrymgeour, David; Gin, Aaron V.; Tuttle, Bruce Andrew

2010-09-01T23:59:59.000Z

64

Optical memory  

DOE Patents (OSTI)

Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

Mao, Samuel S; Zhang, Yanfeng

2013-07-02T23:59:59.000Z

65

PDSF Memory Considerations  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Interactive Nodes The amount of memory available on the interactive nodes is described on the Interactive (login) Nodes page. The interactive nodes are shared among all users and running high memory jobs on the interactive nodes slows them down for everyone. If you think your work might be disruptive you should either run it in batch or run it interactively on a batch node as described here. Batch Nodes The batch system knows how much memory each node has and how much memory each job requires. By default each job is given 1.1GB, but you can request more or less memory by following the instructions in Submitting Jobs. However, it should be noted that the more memory you require, the harder it will be for the batch system to schedule your job, especially when the

66

Web accessible image similarity measurements  

Science Conference Proceedings (OSTI)

Web accessible image similarity measurements. Background: There ... messages). Web Access to Image Similarity Measurements. ...

2013-04-16T23:59:59.000Z

67

Decoupled DIMM: Building High-Bandwidth Memory System from Low-Speed DRAM Devices  

E-Print Network (OSTI)

The widespread use of multicore processors has dramatically increased the demands on high bandwidth and large capacity from memory systems. In a conventional DDRx DRAM memory system, the memory bus and DRAM devices run at the same data rate. To improve memory bandwidth, we propose a new memory system design called decoupled DIMM that allows the memory bus to operate at a data rate much higher than that of the DRAM devices. In the design, a synchronization buffer is added to relay data between the slow DRAM devices and the fast memory bus; and memory access scheduling is revised to avoid access conflicts on memory ranks. The design not only improves memory bandwidth beyond what can be supported by current memory devices, but also improves reliability, power efficiency, and cost effectiveness by using relatively slow memory devices. The idea of decoupling, precisely the decoupling of bandwidth match between memory bus and a single rank of devices, can also be applied to other types of memory systems including FB-DIMM. Our experimental results show that a decoupled DIMM system of 2667MT/s bus data rate and 1333MT/s device data rate improves the performance of memory-intensive workloads by 51 % on average over a conventional memory system of 1333MT/s data rate. Alternatively, a decoupled DIMM system of 1600MT/s bus data rate and 800MT/s device data rate incurs only 8 % performance loss when compared with a conventional system of 1600MT/s data rate, with 16 % reduction on the memory power consumption and 9 % saving of memory energy.

Hongzhong Zheng; Jiang Lin; Zhao Zhang; Zhichun Zhu

2009-01-01T23:59:59.000Z

68

Traffic management: a holistic approach to memory placement on NUMA systems  

Science Conference Proceedings (OSTI)

NUMA systems are characterized by Non-Uniform Memory Access times, where accessing data in a remote node takes longer than a local access. NUMA hardware has been built since the late 80's, and the operating systems designed for it were optimized for ... Keywords: multicore, numa, operating systems, scheduling

Mohammad Dashti; Alexandra Fedorova; Justin Funston; Fabien Gaud; Renaud Lachaize; Baptiste Lepers; Vivien Quema; Mark Roth

2013-04-01T23:59:59.000Z

69

Silicon nanocrystal memories  

Science Conference Proceedings (OSTI)

In this paper, we present an overview of memory structures fabricated by our group by using silicon nanocrystals as storage nodes. These devices show promising characteristics as candidates for future deep-submicron non-volatile memories.

S. Lombardo; B. De Salvo; C. Gerardi; T. Baron

2004-05-01T23:59:59.000Z

70

Drifting absence :: drafting memory  

E-Print Network (OSTI)

The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

Kuhn, Marlene Eva

2006-01-01T23:59:59.000Z

71

Samuel Rosen Memorial Award  

Science Conference Proceedings (OSTI)

Recognizing accomplishments in surfactant chemistry. The Samuel Rosen Memorial Award is sponsored by Milton J. Rosen. Samuel Rosen Memorial Award Membership Information achievement application award Awards distinguished division Divisions fats job

72

Tolerating memory leaks  

Science Conference Proceedings (OSTI)

Type safety and garbage collection in managed languages eliminate memory errors such as dangling pointers, double frees, and leaks of unreachable objects. Unfortunately, a program still leaks memory if it maintains references to objects it will never ... Keywords: bug tolerance, managed languages, memory leaks

Michael D. Bond; Kathryn S. McKinley

2008-10-01T23:59:59.000Z

73

External Memory Algorithms  

Science Conference Proceedings (OSTI)

Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/ output communication (or I/O) between fast internal memory and slower external memory (such as disks) can be a major performance ...

Jeffrey Scott Vitter

1998-08-01T23:59:59.000Z

74

A high-level abstraction of shared accesses  

Science Conference Proceedings (OSTI)

We describe the design and use of the tape mechanism, a new high-level abstraction of accesses to shared data for software DSMs. Tapes consolidate and generalize a number of recent protocol optimizations, including update-based locks ... Keywords: DSM, programming libraries, shared memory, update protocols

Peter J. Keleher

2000-02-01T23:59:59.000Z

75

REMEM: REmote MEMory as Checkpointing Storage  

SciTech Connect

Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively studied in research but made little success in practice due to its complexity and potential reliability concerns. In this study we present the design and implementation of REMEM, a REmote MEMory checkpointing system to extend the checkpointing storage from disk to remote memory. A unique feature of REMEM is that it can be integrated into existing disk-based checkpointing systems seamlessly. A user can flexibly switch between REMEM and disk as checkpointing storage to balance the efficiency and reliability. The implementation of REMEM on Open MPI is also introduced. The experimental results confirm that REMEM and the proposed adaptive checkpointing storage selection are promising in both performance, reliability and scalability.

Jin, Hui [Illinois Institute of Technology; Sun, Xian-He [Illinois Institute of Technology; Chen, Yong [ORNL; Ke, Tao [Illinois Institute of Technology

2010-01-01T23:59:59.000Z

76

Using DMA for copying performance counter data to memory  

SciTech Connect

A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance data.

Gara, Alan; Salapura, Valentina; Wisniewski, Robert W

2013-12-31T23:59:59.000Z

77

Role Based Access Control  

Science Conference Proceedings (OSTI)

... Nash and Poland [10] discuss the application of role based access control to cryptographic authentication devices commonly used in the banking ...

78

Access Grid - CECM  

E-Print Network (OSTI)

"The Access Grid (AG) is the ensemble of resources that can be used to support ... We shall also illustrate the basic capture capacities that Smart Technology's ...

79

Science Open Access Journals  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. Results are consolidated and returned in relevance-ranked order, and users are...

80

Making VRML Accessible  

Science Conference Proceedings (OSTI)

... Paper - Making VRML Accessible for People with Disabilities by Sandy Ressler and Qiming Wang to Appear in Proceeding of ASSETS 98. ...

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Integrating program transformations in the memory-based synthesis of image and video algorithms  

Science Conference Proceedings (OSTI)

In this paper we discuss the interaction and integration of two important program transformations in high-level synthesis—Tree Height Reduction and Redundant Memory-access Elimination. Intuitively, these program transformations do not interfere ...

David J. Kolson; Alexandru Nicolau; Nikil Dutt

1994-11-01T23:59:59.000Z

82

Accessibility validation with RAVEN  

Science Conference Proceedings (OSTI)

Testing is, for most, a necessary evil in the software life cycle. One very important form of testing is the evaluation of software products according to mandated criteria or guidelines such as those that specify level of accessibility. Such evaluations ... Keywords: AOP, GUI, Java, accessibility, reflection, rich-client

Barry Feigenbaum; Michael Squillace

2006-05-01T23:59:59.000Z

83

Accessing HPSS at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Accessing HPSS Accessing HPSS Accessing HPSS Once you have successfully generated an HPSS token you can access NERSC's HPSS in the different ways listed below. HSI and HTAR are usually the best ways to transfer data in and out of HPSS but other methods are also included. Access Method When to use this method Features Limitations HSI When a full-featured unix-like interface is desired high performance (parallel); unix-like user interface; firewall mode client is specific to HPSS version and might not work at other sites; HTAR When you have large collections of smaller (~10MB or less) files high performance (parallel); creates a tar file directly in HPSS along with an index file; more efficient for large collections of file same client limitations as HSI; also does not have firewall mode so using on a remote site with a firewall will require modification of firewall rules

84

Cache directory look-up re-use as conflict check mechanism for speculative memory requests  

DOE Patents (OSTI)

In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

Ohmacht, Martin

2013-09-10T23:59:59.000Z

85

Using Cyclic Memory Allocation to Eliminate Memory Leaks  

E-Print Network (OSTI)

We present and evaluate a new memory management technique for eliminating memory leaks in programs with dynamic memory allocation. This technique observes the execution of the program on a sequence of training inputs to ...

Nguyen, Huu Hai

86

Memory Usage Considerations on Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Memory Usage Considerations on Hopper Most Hopper compute nodes have 32 GB of physical memory, but, not all that memory is available to user programs. Compute Node Linux (the kernel), the Lustre file system software, and message passing library buffers all consume memory, as does loading the executable into memory. Thus the precise memory available to an application varies. Approximately 31 GB of memory can be allocated from within an MPI program using all 24 cores per node, i.e., 1.29 GB per MPI task on average. If an application uses 12 MPI tasks per node, then each MPI task could use about 2.58 GB of memory. You may see an error message such as "OOM killer terminated this process." "OOM" means Out of Memory and it means that your code has exhausted the

87

The Broadband Access Facility  

Science Conference Proceedings (OSTI)

The deployment of broadband access networks will revolutionise many aspects of society in the early years of the next millennium. Manufacturers, telecommunications providers and cable television operators world-wide are investing heavily on research ...

J. Kelly; R. Adnams; M. Enrico; M. Whittle

2000-01-01T23:59:59.000Z

88

Hysteresis, Reversibility, and Shape Memory  

Science Conference Proceedings (OSTI)

Basic Properties of Shape Memory Materials from First-Principles ... Control Loops of Shape Memory Actuators by Detection of the Electrical Resistance.

89

Shape memory alloys  

SciTech Connect

A shape memory alloy is disclosed consisting essentially of, by weight ratio, 2 to 15% aluminium, 0.01 to 3% beryllium and the balance being substantially copper, with impurities being inevitably present in the process of preparation, and a shape memory alloy further including 0.05 to 15% zinc, both including composition ranges which allows cold work.

Suzuki, K.

1983-10-04T23:59:59.000Z

90

The Java memory model  

Science Conference Proceedings (OSTI)

This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations ... Keywords: Java, concurrency, memory model, multithreading

Jeremy Manson; William Pugh; Sarita V. Adve

2005-01-01T23:59:59.000Z

91

Technology strategy for the semiconductor memory market  

E-Print Network (OSTI)

Solid state memories are used in a variety of applications as data and code storages. A non-volatile memory is a memory that retains information when its power supply is off. Flash memory is a type of nonvolatile memory ...

Nakamura, Tomohiko

2012-01-01T23:59:59.000Z

92

Computer memory management system  

DOE Patents (OSTI)

A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

Kirk, III, Whitson John (Greenwood, MO)

2002-01-01T23:59:59.000Z

93

Brief announcement: subgraph isomorphism on a multithreaded shared memory architecture  

Science Conference Proceedings (OSTI)

Graph algorithms tend to suffer poor performance due to the irregularity of access patterns within general graph data structures, arising from poor data locality, which translates to high memory latency. The result is that advances in high-performance ... Keywords: cray xmt, graphs, mutlithreading, subgraph isomorphism

Claire C. Ralph; Vitus J. Leung; William McLendon, III

2012-06-01T23:59:59.000Z

94

Coherence-Centric Logging and Recovery for Home-Based Software Distributed Shared Memory  

E-Print Network (OSTI)

Coherence-Centric Logging and Recovery for Home-Based Software Distributed Shared Memory Angkul, called the coherence-centric logging (CCL) and re- covery protocol, for home-based SDSM. Our CCL mini access latency by overlapping disk accesses with coherence-induced com- munication existing in home-based

Tzeng, Nian-Feng

95

Quantum Random Number Generator  

Science Conference Proceedings (OSTI)

... trusted beacon of random numbers. You could conduct secure auctions, or certify randomized audits of data. One of the most ...

2013-08-30T23:59:59.000Z

96

Memory in the system: trajectory-environment  

E-Print Network (OSTI)

In the paper the memory effect in the system consisting from a trajectory of process and an environment is considered. The environment is presented by scalar potential and noise. The evolution of system is interpreted as process of the continuous "measurement" of a trajectory by an environment and\\or on the contrary. In this sense the measured value is entropy-the information about embedding of the trajectory into configurations space. The concepts "measurement" and "interaction" are identified alike in quantum theory. Thus, the entropy evolution is not only the effect of dynamics, but also its cause, if it is possible to speak about causality in this case. It is shown, that such non-elastic interaction leads to occurrence of memory in the system. The reflex memory mechanism is realized as a real conformal dynamic metrics. The metastable event (attractor) is defined and time of its life is estimated. It is shown, that in the system there is a change of dynamic modes from spatial localization to random walk (fluctuation, relaxation). On scale of the attractors dynamics the memory is appearing as a semi-regular (in some information sense) drift of the image of fluctuations in a power spectrum of environment to absolute minimum. The latter properties (topological convergence) attract the attention to algorithmic aspect of a considered system.

Maxim Budaev

2007-08-10T23:59:59.000Z

97

Mondriaan memory protection  

E-Print Network (OSTI)

Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

Witchel, Emmett Jethro, 1970-

2004-01-01T23:59:59.000Z

98

Reconsidering custom memory allocation  

Science Conference Proceedings (OSTI)

Programmers hoping to achieve performance improvements often use custom memory allocators. This in-depth study examines eight applications that use custom allocators. Surprisingly, for six of these applications, a state-of-the-art general-purpose allocator ...

Emery D. Berger; Benjamin G. Zorn; Kathryn S. McKinley

2002-11-01T23:59:59.000Z

99

Warship : memorial in antithesis  

E-Print Network (OSTI)

This thesis is divided into three distinct yet related parts. The first consists of observations and reflections on some of New York City's many war memorials, ranging from one commemorating the Revolutionary War to one ...

Tchelistcheff, Andre Victor

1992-01-01T23:59:59.000Z

100

A fast and memory-sparing probabilistic selection algorithm for the GPU  

SciTech Connect

A fast and memory-sparing probabilistic top-N selection algorithm is implemented on the GPU. This probabilistic algorithm gives a deterministic result and always terminates. The use of randomization reduces the amount of data that needs heavy processing, and so reduces both the memory requirements and the average time required for the algorithm. This algorithm is well-suited to more general parallel processors with multiple layers of memory hierarchy. Probabilistic Las Vegas algorithms of this kind are a form of stochastic optimization and can be especially useful for processors having a limited amount of fast memory available.

Monroe, Laura M [Los Alamos National Laboratory; Wendelberger, Joanne [Los Alamos National Laboratory; Michalak, Sarah [Los Alamos National Laboratory

2010-09-29T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Magnetic Memory Print Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

102

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Magnetic Memory Print Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

103

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Disorder-Induced Microscopic Magnetic Memory Disorder-Induced Microscopic Magnetic Memory Print Wednesday, 26 October 2005 00:00 The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

104

Quasi-random testing  

Science Conference Proceedings (OSTI)

Quasi-random sequences, also known as low-discrepancy or low-dispersion sequences, are sequences of points in an n-dimensional unit hypercube. These sequences have the property that points are spread more evenly throughout the cube than random point ... Keywords: adaptive random testing, automated testing, low-discrepancy sequence, quasi-random sequence, random testing

Tsong Yueh Chen; Robert Merkel

2005-11-01T23:59:59.000Z

105

Access Grid | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Grid Access Grid Access Grid The Access Grid is the ensemble of resources that can be used to support human interaction across the grid. It consists of multimedia display, presentation and interactive environments, interfaces to grid middleware, and interfaces to visualization environments. The Access Grid will support large-scale distributed meetings, collaborative work sessions, seminars, lectures, tutorials and training. The Access Grid design point is group-to-group communication (thus differentiating it from desktop to desktop based tools that focus on individual communication). The Access Grid environment must enable both formal and informal group interactions. Large-format displays integrated with intelligent or active meeting rooms are a central feature of the Access Grid nodes. Access Grid nodes are

106

Using Cyclic Memory Allocation to Eliminate Memory Leaks  

E-Print Network (OSTI)

We present and evaluate a new memory management technique foreliminating memory leaks in programs with dynamic memoryallocation. This technique observes the execution of the program on asequence of training inputsto find ...

Nguyen, Huu Hai

2005-10-26T23:59:59.000Z

107

The rope memory: a permanent storage device  

Science Conference Proceedings (OSTI)

A powerful way of increasing the capability and flexibility of digital computing systems is through the use of permanent storage memories. Such memories are also known as readonly memories or NDRO electrically unalterable memories. As an example of the ...

P. Kuttner

1963-11-01T23:59:59.000Z

108

Dynamically replicated memory: building reliable systems from nanoscale resistive memories  

Science Conference Proceedings (OSTI)

DRAM is facing severe scalability challenges in sub-45nm tech- nology nodes due to precise charge placement and sensing hur- dles in deep-submicron geometries. Resistive memories, such as phase-change memory (PCM), already scale well beyond DRAM and ... Keywords: phase-change memory, write endurance

Engin Ipek; Jeremy Condit; Edmund B. Nightingale; Doug Burger; Thomas Moscibroda

2010-03-01T23:59:59.000Z

109

High Temperature Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 5, 2013 ... Shape Memory Response of NiTiHfPd High Strength and High Hysteresis Shape Memory Alloys: Emre Acar1; Haluk Karaca1; Hirobumi Tobe1; ...

110

Thomas H. Smouse Memorial Fellowship  

Science Conference Proceedings (OSTI)

Awarded to a graduate student doing research in areas of interest to AOCS. Thomas H. Smouse Memorial Fellowship Thomas H. Smouse Memorial Fellowship graduate research scholastically outstanding Smouse Award Student Award Student Awards achievemen

111

Unifluxor: a permanent memory element  

Science Conference Proceedings (OSTI)

The Unifluxor is a new binary permanent memory element which appears to have the advantages of high-speed operation, easy fabrication, and low cost. Unlike cores, twistors, capacitors, and other commonly used memory devices, the Unifluxor does not depend ...

A. M. Renard; W. J. Neumann

1960-05-01T23:59:59.000Z

112

Memory Usage Considerations on Franklin  

NLE Websites -- All DOE Office Websites (Extended Search)

the memory requirement vvia internal checking in their codes or by some tools. Craypat could track heap usage. And IPM also tracks memory usage. Last edited: 2013-06-30 08:33:51...

113

VEHICLE ACCESS PORTALS  

NLE Websites -- All DOE Office Websites (Extended Search)

East Jemez Road (Map 1) East Jemez Road (Map 1) VEHICLE ACCESS PORTALS Traffic Lane 1: Closed except for emergencies and maintenance operations. Traffic Lanes 2-7: Drivers required to stop and present LANL badges or other form of valid identification to Protective Force officers. Drivers may proceed upon direction of the officers. Note: Commercial delivery vehicle drivers must also pres- ent their inspection passes from Post 10. More Information: spp-questions@lanl.gov Non-work Hours Vehicles entering LANL at the East Jemez VAPs during non-work hours (between 7

114

Shape memory polymer medical device  

SciTech Connect

A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

Maitland, Duncan (Pleasant Hill, CA); Benett, William J. (Livermore, CA); Bearinger, Jane P. (Livermore, CA); Wilson, Thomas S. (San Leandro, CA); Small, IV, Ward (Livermore, CA); Schumann, Daniel L. (Concord, CA); Jensen, Wayne A. (Livermore, CA); Ortega, Jason M. (Pacifica, CA); Marion, III, John E. (Livermore, CA); Loge, Jeffrey M. (Stockton, CA)

2010-06-29T23:59:59.000Z

115

ARCS – Access Rate Control System  

protected steel housing. ... Access Rate Control System This rugged, maintenance- ... Y-12 is seeking an industry partner to fully com-

116

Topic: Emergency Egress and Access  

Science Conference Proceedings (OSTI)

Topic: Emergency Egress and Access. Fire Research Seminar Series. NIST WTC Recommendations Are Basis for New Set of Revised Codes. ...

2012-08-20T23:59:59.000Z

117

Transparently consistent asynchronous shared memory  

Science Conference Proceedings (OSTI)

The advent of many-core processors is imposing many changes on the operating system. The resources that are under contention have changed; previously, CPU cycles were the resource in demand and required fair and precise sharing. Now compute cycles are ... Keywords: copy on write, memory management, memory sharing, virtual memory

Hakan Akkan, Latchesar Ionkov, Michael Lang

2013-06-01T23:59:59.000Z

118

Open Access Transmission Tariff  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission | OATT Transmission | OATT Skip Navigation Links Transmission Functions Infrastructure projects Interconnection OASIS OATT Western Open Access Transmission Service Tariff Revision Western Area Power Administration submitted its revised Open Access Transmission Service Tariff with the Federal Energy Regulatory Commission on Sept. 30, 2009. The tariff became effective on Dec. 1, 2009, as modified by Western's March 2, 2011 compliance filing. The revised tariff was developed to comply with FERC Order No. 890 and to be consistent with Western's statutory and regulatory requirements. It addresses changes in transmission services and planning. FERC issued an order on Dec. 2, 2010, granting Western's petition for a Declaratory Order approving the tariff as an acceptable reciprocity tariff, subject to Western making a compliance filing within 30 days to address items in Attachment C, Attachment P and Attachment Q. Western made its compliance filing on March 2, 2010, addressing FERC's Dec. 2, 2010, order. FERC accepted Western's March 2, 2011 compliance filing on April 25, 2011. Western has made several ministerial filings to its OATT as part of FERC's eTariff viewer system, the last of these was approved on March 29, 2013. Further detail can be found in the links below.Current OATT

119

NBTI induced performance degradation in logic and memory circuits: how effectively can we approach a reliability solution?  

Science Conference Proceedings (OSTI)

This paper evaluates the severity of negative bias temperature instability (NBTI) degradation in two major circuit applications: random logic and memory array. For improved lifetime stability, we propose/select an efficient reliability-aware circuit ...

Kunhyuk Kang; Saakshi Gangwal; Sang Phill Park; Kaushik Roy

2008-01-01T23:59:59.000Z

120

The memory book  

Science Conference Proceedings (OSTI)

In this paper we present an Augmented Reality book for remembering past events and to plan future ones. We have developed this system using Brainstorm eStudio. We have incorporated Augmented Reality options into Brainstorm eStudio using a plugin of ARToolKit. ... Keywords: augmented reality, memory book, storytelling

M. C. Juan; B. Rey; D. Perez; D. Tomas; M. Alcañiz

2005-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Library Book Memorial and  

E-Print Network (OSTI)

Library Book Memorial and Honorary Gift Program A university library provides the information or event. We will inform the individual or family of your gift and the book(s) we add to the library Enclosed is my $___________ contribution for gift books. K $20 or more -- Bookplate(s) K Under $20

VanDieren, Monica

122

NSLS User Access | Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

123

Template Discontinuation Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOR SUBJECT FOR SUBJECT FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions signed on [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. A review of that form disclosed recent use of illegal drugs. [Insert a brief description of the circumstances such as: Specifically, you listed marijuana use 1 time in 5/02; 1 time in 2/03; and 1 time in 3/07.] This office has discontinued the personnel security processing of your security clearance due to your illegal drug usage within twelve months of the signing of your security clearance application.

124

Remote access of electronic resources for thermal plant using mobile devices  

Science Conference Proceedings (OSTI)

This paper proposes a framework that extends a typical intelligent thermal system management that enables field engineers retrieving vital resources from centralised management station using mobile devices with limited memory, such as PDAs and cell phones. ... Keywords: J2ME, PDAs, artificial intelligence, cell phones, fault diagnosis, intelligent thermal management, mobile devices, mobile phones, remote access, thermal management systems, thermal plants, thermodynamic properties

F-L. Tan; S-C. Fok

2007-11-01T23:59:59.000Z

125

REMOTE ACCESS SERVICES | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Access the information you need... Anywhere. Anytime. Different service providers within the Department offer remote access services based on your specific work requirements. If you need assistance, please contact your individual service provider. Energy IT Services (EITS) Remote Access Services Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network Instructions Citrix Workplace Instructions Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN Office of Intelligence and Counterintelligence (IN) Remote Access Services Outlook Web Access Office of Science (SC) Remote Access Services Citrix Workplace Help for EITS Customers

126

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Core Plan OPEN ACCESS PLUS MEDICAL BENEFITS ............................................................................................................................................11 Open Access Plus Medical Benefits

127

Performance analysis of memory hierachies in high performance systems  

SciTech Connect

This thesis studies memory bandwidth as a performance predictor of programs. The focus of this work is on computationally intensive programs. These programs are the most likely to access large amounts of data, stressing the memory system. Computationally intensive programs are also likely to use highly optimizing compilers to produce the fastest executables possible. Methods to reduce the amount of data traffic by increasing the average number of references to each item while it resides in the cache are explored. Increasing the average number of references to each cache item reduces the number of memory requests. Chapter 2 describes the DLX architecture. This is the architecture on which all the experiments were performed. Chapter 3 studies memory moves as a performance predictor for a group of application programs. Chapter 4 introduces a model to study the performance of programs in the presence of memory hierarchies. Chapter 5 explores some compiler optimizations that can help increase the references to each item while it resides in the cache.

Yogesh, A.

1993-07-01T23:59:59.000Z

128

Laboratory Access | Sample Preparation Laboratories  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Access Planning Ahead Planning Ahead Please complete the Beam Time Request (BTR) and Support Request forms thourgh the User Portal. Thorough chemical and sample information must be included in your BTR. Support Request forms include a list of collaborators that require laboratory access and your group's laboratory equipment requests. Researcher safety is taken seriously at SLAC. Please remember that radioactive materials, nanomaterials, and biohazardous materials have additional safety requirements. Refer to the SSRL or LCLS Safety Offices for further guidance. Upon Arrival Upon Arrival Once you arrive you must complete training and access forms before accessing the Sample Preparation Laboratories (SPL). All Sample Prep Lab doors are locked with access key codes. Once your SPL

129

Shape memory alloy actuator  

DOE Patents (OSTI)

An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

Varma, Venugopal K. (Knoxville, TN)

2001-01-01T23:59:59.000Z

130

Genepool Memory Heatmaps  

NLE Websites -- All DOE Office Websites (Extended Search)

Genepool Memory Heatmaps Genepool Memory Heatmaps Heatmap of Memory and Slots Requested vs Time Waited (in hours) | Queue: All | Last 7 Days Memory Requested Slots <5GB 5-10GB 10-20GB 20-30GB 30-40GB 40-50GB 50-100GB 100-150GB 150-200GB 200-256GB 256-512GB 512+GB Job Count Longest Wait 1 2.26 (2693) 10.5 (201167) 3.2 (11650) 0 1.75 (282) 1.49 (1627) 0.03 (1) 0 0 0 0 0 217420 538.96 2 0.26 (103) 1.02 (2817) 0 0 0 0 0 0 0 0 0 0 2920 9.1 4 1.55 (198) 1.48 (104) 0.34 (8) 0 0 0 1.86 (3) 0 0 0 0 0 313 20.48 6 0.01 (1) 0.09 (34) 0 0 0 0 0 0 0 0 0 0 35 1.22 8 0.34 (37) 6.15 (12376) 1.01 (17) 24.7 (1) 0.03 (3) 0 0.02 (6) 0 0 0 0 0 12440 46.16 10 0 8.56 (1) 0 0 0 0 0 0 0 0 0 0 1 8.56 16 0 0.03 (1) 0 0 0 0 0 0 0 0 0 0 1 0.03 24 0 0 0.01 (1) 0 0 0 0 0 0 0 0 0 1 0.01 32 0 0.01 (4) 0.05 (9) 0 0.01 (6) 0 0.0 (1) 0 0 0 0 0 20 0.26

131

Optical access port  

DOE Patents (OSTI)

A 0.025 m diameter optical access port system is provided for a high-pressure (20.4 bars) and high-temperature (538{degrees}C) fixed-bed coal gasification process stream. A pair of proximal channels lead into the pipe containing the process stream with the proximal channels disposed on opposite sides of the pipe and coaxial. A pair of ball valves are attached to respective ends of proximal channels for fluidly closing the respective channels in a closed position and for providing a fluid and optical aperture in an open position. A pair of distal channels are connected to respective ball valves. These distal channels are also coaxial with each other and with the proximal channels. Each distal channel includes an optical window disposed therein and associated sealing gaskets. A purge gas is introduced into each distal channel adjacent a respective optical window. The purge gas is heated by a heater before entry into the distal channels. Preferably the optical windows are made of fused silica and the seals are Grafoil gaskets which are pressed against the optical window. 3 figs.

Lutz, S.A.; Anderson, R.J.

1988-09-14T23:59:59.000Z

132

Access Control Policy Tool (ACPT)  

Science Conference Proceedings (OSTI)

... In regard to cyber security, privacy, and information sharing, access control is one of the crucial elements in protecting the nation's critical IT ...

2013-01-15T23:59:59.000Z

133

Foreign National Access Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

will be allowed access to the ANL facility prior to approval by the Security and Counterintelligence Division. The visitor must have a valid passport and visa (or supplemental...

134

Science Open Access Journals - About  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. The query is sent simultaneously to each individual database searched by SOAJ,...

135

APC: a performance metric of memory systems  

Science Conference Proceedings (OSTI)

Due to the infamous "memory wall" problem and a drastic increase in the number of data intensive applications, memory rather than processor has become the leading performance bottleneck of modern computing systems. Evaluating and understanding memory ... Keywords: measurement methodology, memory metric, memory performance measurement

Xian-He Sun; Dawei Wang

2012-10-01T23:59:59.000Z

136

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

8:54 AM Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Basic Plan OPEN ACCESS PLUS MEDICAL ...................................................................................................................................................10 Open Access Plus Medical Benefits Basic Plan ...............................................................................................................................................................12 Open Access Plus Medical Benefits Core Plan

137

Internal Controls Over Sensitive Compartmented Information Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Controls Over Sensitive Compartmented Information Access for Selected Field Intelligence Elements, IG-0796 Internal Controls Over Sensitive Compartmented Information Access...

138

Using Hardware Memory Protection to Build a High-Performance, Strongly-Atomic Hybrid Transactional Memory  

Science Conference Proceedings (OSTI)

We demonstrate how fine-grained memory protection can be used in support of transactional memory systems: first showing how a software transactional memory system (STM) can be made strongly atomic by using memory protection on transactionally-held state, ... Keywords: Transactional Memory, Hybrid, Memory Protection, Primitives, Abort Handler, Strong Atomicity

Lee Baugh; Naveen Neelakantam; Craig Zilles

2008-06-01T23:59:59.000Z

139

Applications of Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 3, 2011 ... More than 50 years after the discovery of shape memory alloys, and after investments of millions of dollars, there are very few successful ...

140

Gaussian random number generators  

Science Conference Proceedings (OSTI)

Rapid generation of high quality Gaussian random numbers is a key capability for simulations across a wide range of disciplines. Advances in computing have brought the power to conduct simulations with very large numbers of random numbers and with it, ... Keywords: Gaussian, Random numbers, normal, simulation

David B. Thomas; Wayne Luk; Philip H.W. Leong; John D. Villasenor

2007-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

An analysis of MRAM based memory technologies  

E-Print Network (OSTI)

MRAM is a memory (RAM) technology that uses electron spin to store information. Often been called "the ideal memory", it can potentially combine the density of DRAM with the speed of SRAM and non-volatility of FLASH memory ...

Vijayaraghavan, Rangarajan, M. Eng. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

142

Cisco 5915 Embedded Services Routers  

Science Conference Proceedings (OSTI)

... keys stored in Dynamic Random Access ... health, temperature, memory status, voltage, packet statistics ... user rights, and restore router configurations. ...

2013-04-12T23:59:59.000Z

143

Economic Impact of Measurement in the Semiconductor ...  

Science Conference Proceedings (OSTI)

... semiconductors are the workhorses that take electric voltage and engender ... the distance between lines of memory (dynamic random access ...

2012-10-09T23:59:59.000Z

144

NIST Elect. Opt. Phys. Div. - 2004: Strategic Focus 1  

Science Conference Proceedings (OSTI)

... This effect, called giant magnetoresistance, is used in magnetic sensors, magnetic random access memory (MRAM), and read heads in magnetic ...

145

Request for Comments on Candidate Algorithms for the AES  

Science Conference Proceedings (OSTI)

... 5131 of the Information Technology Management Reform Act of 1996 ... EEROM), and mainframe computers using Random Access Memory (RAM). ...

146

Federal Register/Vol. 64, No. 214/Friday, November 5, 1999 ...  

Science Conference Proceedings (OSTI)

... 5131 of the Information Technology Management Reform Act of 1996 ... EEROM), and mainframe computers using Random Access Memory (RAM). ...

2009-01-05T23:59:59.000Z

147

FIPS 46-3, Data Encryption Standard (DES) (withdrawn May ...  

Science Conference Proceedings (OSTI)

... 5131 of the Information Technology Management Reform Act of 1996 ... EEROM), and mainframe computers using Random Access Memory (RAM). ...

2012-12-12T23:59:59.000Z

148

Processing of Silver-Implanted Aluminum Nitride for Energy Harvesting Devices  

E-Print Network (OSTI)

architectures were found to include magnetic read heads, magnetic random-access memory (MRAM), resonators, actuators, and smart grid

Alleyne, Fatima

2013-01-01T23:59:59.000Z

149

Memory exploration for low power, embedded systems  

Science Conference Proceedings (OSTI)

Keywords: cache simulator, design automation, low power design, low power embedded systems, memory exploration and optimization, memory hierarchy, off-chip data assignment

Wen-Tsong Shiue; Chaitali Chakrabarti

1999-06-01T23:59:59.000Z

150

Shape memory alloy thaw sensors  

DOE Patents (OSTI)

A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

1998-01-01T23:59:59.000Z

151

SPRNG Parallel Random Number Generators at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

SPRNG SPRNG SPRNG Description The SPRNG libraries of generators produce good quality random numbers, and are also fast. They have been subjected to some of the largest random number tests, with around 10^13 RNs per test. SPRNG provides both FORTRAN and C (also C++) interfaces for the use of the parallel random number generators. Access SPRNG v2.0 is available on Carver (gcc, intel and pgi) and Cray systems (pgi and cce). Use the module utility to load the software. module load sprng Using SPRNG On Cray systems: ftn sprng_test.F $SPRNG -lsprng On Carver: mpif90 sprng_test.F $SPRNG -lsprng Documentation On Carver there are various documents in $SPRNG/DOCS and various examples in $SPRNG/EXAMPLES. See the SPRNG web site at Florida State University for complete details. For help using SPRNG at NERSC contact the

152

Gender and lexical access in Bulgarian  

E-Print Network (OSTI)

Two procedures were used to explore the effects of semantic and grammatical gender on the recognition and processing of Bulgarian nouns, in relation to other factors that are known to affect lexical access. This study in a three-gender language was modeled on previous work in Italian, a two-gender language (Bates, Devescovi, Pizzamiglio, D’Amico, & Hernandez, 1995). Words were presented auditorily in randomized lists in two tasks: (1) repeat the word as quickly as possible and (2) determine the grammatical gender of the noun as soon as possible and indicate the decision by pressing a button. Reaction times in both tasks were influenced by phonological factors, word frequency, and irregularity of gender marking, but semantic and grammatical gender affected only gender monitoring. The significant contribution of semantic gender to processing in Bulgarian contrasts with previous findings for Italian. Also, we obtained an interaction between sex of the subject and noun gender, reflecting a bias toward one’s own grammatical gender “counterpart ” (especially for females). Reanalysis of the prior study in Italian showed a similar interaction but confirmed no effects of the semantic gender of the noun, suggesting that these two natural gender effects can dissociate. Possible reasons for cross-linguistic differences are discussed, with implications for comparative studies of gender and lexical access. Recently, there has been a surge of interest in the nature

Elena Andonova; Antonella Devescovi

2004-01-01T23:59:59.000Z

153

A High Integrity Profile for Memory Safe Programming in Real-time Java Alex Potanin1  

E-Print Network (OSTI)

to their classes' packages abstract class ScopeGate { protected ScopeGate(LTMemory memory); public final void reset Zen's structure, we then had to relocate classes into the correct packages, adjusting their defini.3. Step 3: Access Mode Adaption and Type Specialization Once the package structure of the program has been

Zhao, Tian

154

Notices Accessible Format: Individuals with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

472 Federal Register 472 Federal Register / Vol. 77, No. 83 / Monday, April 30, 2012 / Notices Accessible Format: Individuals with disabilities can obtain this document in an accessible format (e.g., braille, large print, audiotape, or computer diskette) on request to the program contact person listed under FOR FURTHER INFORMATION CONTACT. Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document

155

Network Access to Multimedia Information  

Science Conference Proceedings (OSTI)

This report summarises the requirements of research and academic network users for network access to multimedia information. It does this by investigating some of the projects planned or currently underway in the community. Existing information systems ...

C. Adie

1994-05-01T23:59:59.000Z

156

Categorical Exclusion for Access Road  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Road Access Road Improvements along the Pinnacle Peak- Prescott 230-kV Transmission Line between Structures 16813 and 170/1 Yavapai County. Arizona * RECORD OF CATEGORICAL EXCLUSION DETERMINATION A. Proposed Action: Western proposes to improve access roads along a portion of the Pinnacle Peak to Prescott 230-kV Transmission Line (Structures 168/3 and 170/1). which are currently impassable. to maintain worker safety and the reliability of the bulk electric system. Western plans to blade and grade the existing access road where it enters and leaves three washes so that Western's maintenance vehicles can drive across the washes. We will remove dirt from the road prism by starting at wash edges and pulling dirt up slope in order to create ramps with grades suitable for our equipment.

157

Random multiparty entanglement distillation  

E-Print Network (OSTI)

We describe various results related to the random distillation of multiparty entangled states - that is, conversion of such states into entangled states shared between fewer parties, where those parties are not predetermined. In previous work [Phys. Rev. Lett. 98, 260501 (2007)] we showed that certain output states (namely Einstein-Podolsky-Rosen (EPR) pairs) could be reliably acquired from a prescribed initial multipartite state (namely the W state) via random distillation that could not be reliably created between predetermined parties. Here we provide a more rigorous definition of what constitutes ``advantageous'' random distillation. We show that random distillation is always advantageous for W-class three-qubit states (but only sometimes for Greenberger-Horne-Zeilinger (GHZ)-class states). We show that the general class of multiparty states known as symmetric Dicke states can be readily converted to many other states in the class via random distillation. Finally we show that random distillation is provab...

Fortescue, Ben

2007-01-01T23:59:59.000Z

158

Random coincidence of $2\  

E-Print Network (OSTI)

Two neutrino double $\\beta$ decay can create irremovable background even in high energy resolution detectors searching for neutrinoless double $\\beta$ decay due to random coincidence of $2\

D. M. Chernyak; F. A. Danevich; A. Giuliani; E. Olivieri; M. Tenconi; V. I. Tretyak

2013-01-17T23:59:59.000Z

159

Selling Random Energy  

E-Print Network (OSTI)

variability of wind and solar power production poses seriousof wind and solar power. They are essentially random – ais variability in wind an solar power production dealt with

Bitar, Eilyan Yamen

2011-01-01T23:59:59.000Z

160

XML access control using static analysis  

Science Conference Proceedings (OSTI)

Access control policies for XML typically use regular path expressions such as XPath for specifying the objects for access-control policies. However such access-control policies are burdens to the query engines for XML documents. To relieve this burden, ... Keywords: Access control, XML, XPath, XQuery, automaton, query optimization, schema, static analysis, value-based access control, view schema

Makoto Murata; Akihiko Tozawa; Michiharu Kudo; Satoshi Hada

2006-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

ELECTROSTATIC MEMORY SYSTEM  

DOE Patents (OSTI)

An improved electrostatic memory system is de scribed fer a digital computer wherein a plarality of storage tubes are adapted to operate in either of two possible modes. According to the present irvention, duplicate storage tubes are provided fur each denominational order of the several binary digits. A single discriminator system is provided between corresponding duplicate tubes to determine the character of the infurmation stored in each. If either tube produces the selected type signal, corresponding to binazy "1" in the preferred embodiment, a "1" is regenerated in both tubes. In one mode of operation each bit of information is stored in two corresponding tubes, while in the other mode of operation each bit is stored in only one tube in the conventional manner.

Chu, J.C.

1958-09-23T23:59:59.000Z

162

Multi-Level Bitmap Indexes for Flash Memory Storage  

SciTech Connect

Due to their low access latency, high read speed, and power-efficient operation, flash memory storage devices are rapidly emerging as an attractive alternative to traditional magnetic storage devices. However, tests show that the most efficient indexing methods are not able to take advantage of the flash memory storage devices. In this paper, we present a set of multi-level bitmap indexes that can effectively take advantage of flash storage devices. These indexing methods use coarsely binned indexes to answer queries approximately, and then use finely binned indexes to refine the answers. Our new methods read significantly lower volumes of data at the expense of an increased disk access count, thus taking full advantage of the improved read speed and low access latency of flash devices. To demonstrate the advantage of these new indexes, we measure their performance on a number of storage systems using a standard data warehousing benchmark called the Set Query Benchmark. We observe that multi-level strategies on flash drives are up to 3 times faster than traditional indexing strategies on magnetic disk drives.

Wu, Kesheng; Madduri, Kamesh; Canon, Shane

2010-07-23T23:59:59.000Z

163

Shape memory metals. Final report  

SciTech Connect

The ability to define a manufacturing process to form, heat-treat, and join parts made of nickel-titanium and/or copper-zinc-aluminum shape memory alloys was investigated. The specific emphasis was to define a process that would produce shape memory alloy parts in the configuration of helical coils emulating the appearance of compression springs. In addition, the mechanical strength of the finished parts along with the development of a electrical lead attachment method using shape memory alloy wire was investigated.

Dworak, T.D.

1993-09-01T23:59:59.000Z

164

A durable and energy efficient main memory using phase change memory technology  

Science Conference Proceedings (OSTI)

Using nonvolatile memories in memory hierarchy has been investigated to reduce its energy consumption because nonvolatile memories consume zero leakage power in memory cells. One of the difficulties is, however, that the endurance of most nonvolatile ... Keywords: endurance, low power, phase change memory

Ping Zhou; Bo Zhao; Jun Yang; Youtao Zhang

2009-06-01T23:59:59.000Z

165

HM-ACCESS Project | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HM-ACCESS Project HM-ACCESS Project Framework for the Use of Electronic Shipping Papers for the Transport of Hazardous Materials HM-ACCESS Project (Framework for the Use of...

166

2e Carbon Access | Open Energy Information  

Open Energy Info (EERE)

Access Jump to: navigation, search Name 2e Carbon Access Place New York, New York Zip 10280 Sector Carbon Product 2E Carbon Access is an enterprise focused solely on bringing...

167

Impugning Randomness, Convincingly  

Science Conference Proceedings (OSTI)

John organized a state lottery and his wife won the main prize. You may feel that the event of her winning wasn't particularly random, but how would you argue that in a fair court of law? Traditional probability theory does not even have the notion of ... Keywords: Cournot's Principle, definability, information complexity, randomness

Yuri Gurevich; Grant Olney Passmore

2012-04-01T23:59:59.000Z

168

Enhanced input/output architecture for toroidally-connected distributed-memory parallel computers  

SciTech Connect

This patent describes an improvement in a toroidally-connected distributed-memory parallel computer having rows and columns of processors, wherein each processor has an independent memory and is connected to four neighboring processors. It comprises: at least one common I/O channel; a buffering mechanisms, each being connected to such I/O channel and to only one corresponding processor in a given row of processors; and each such processor of the given row being connected to only one corresponding buffer mechanism in such a manner that it can access its buffer mechanism independently of the access top such buffer mechanism by the I/O channel, and independently of access to the buffer mechanisms corresponding to other processors in the given row.

Cok, R.S.

1990-07-17T23:59:59.000Z

169

Distance Expanding Random  

E-Print Network (OSTI)

In this manuscript we introduce measurable expanding random systems, develop the thermodynamical formalism and establish, in particular, exponential decay of correlations and analyticity of the expected pressure although the spectral gap property does not hold. This theory is then used to investigate fractal properties of conformal random systems. We prove a Bowen’s formula and develop the multifractal formalism of the Gibbs states. Depending on the behavior of the Birkhoff sums of the pressure function we get a natural classifications of the systems into two classes: quasi-deterministic systems which share many properties of deterministic ones and essential random systems which are rather generic and never bilipschitz equivalent to deterministic systems. We show in the essential case that the Hausdorff measure vanishes which refutes a conjecture of Bogenschütz and Ochs. We finally give applications of our results to various specific conformal random systems and positively answer a question of Brück and Büger concerning the Hausdorff dimension of random Julia sets.

Volker Mayer; Bart?omiej Skorulski; Mariusz Urba?ski

2011-01-01T23:59:59.000Z

170

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Neustar, Inc. ("Neustar") hereby submits comments in response to the captioned Request for Information ("RFI") of the Department of Energy ("DOE"). The...

171

International Electricity Trade - Open Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

172

Remote Access of Computer Controlled Experiments.  

E-Print Network (OSTI)

??In this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program.… (more)

Nilsson, Kristian; Zackrisson, Johan

2008-01-01T23:59:59.000Z

173

OMC-INTEGRAL Memory Management  

Science Conference Proceedings (OSTI)

The management of the memory restrictions imposed by the processor (1750A) was one of the major difficulties found in designing the Software (SW) controlling the Optical Monitoring Camera (OMC) payload of the International Gamma Ray Laboratory (INTEGRAL) ...

Jose Manuel Pérez Lobato; Eva Martín Lobo

2002-06-01T23:59:59.000Z

174

Shape memory alloy thaw sensors  

SciTech Connect

A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

Shahinpoor, M.; Martinez, D.R.

1998-04-07T23:59:59.000Z

175

Engineering basic algorithms of an in-memory text search engine  

Science Conference Proceedings (OSTI)

Inverted index data structures are the key to fast text search engines. We first investigate one of the predominant operation on inverted indexes, which asks for intersecting two sorted lists of document IDs of different lengths. We explore compression ... Keywords: Inverted index, in-memory search engine, randomization

Frederik Transier; Peter Sanders

2010-12-01T23:59:59.000Z

176

A software memory partition approach for eliminating bank-level interference in multicore systems  

E-Print Network (OSTI)

Main memory system is a shared resource in modern multicore machines, resulting in serious interference, which causes performance degradation in terms of throughput slowdown and unfairness. Numerous new memory scheduling algorithms have been proposed to address the interference problem. However, these algorithms usually employ complex scheduling logic and need hardware modification to memory controllers, as a result, industrial venders seem to have some hesitation in adopting them. This paper presents a practical software approach to effectively eliminate the interference without hardware modification. The key idea is to modify the OS memory management subsystem to adopt a page-coloring based bank-level partition mechanism (BPM), which allocates specific DRAM banks to specific cores (threads). By using BPM, memory controllers can passively schedule memory requests in a core-cluster (or thread-cluster) way. We implement BPM in Linux 2.6.32.15 kernel and evaluate BPM on 4-core and 8-core real machines by running randomly generated 20 multi-programmed workloads (each contains 4/8 benchmarks) and multi-threaded benchmark. Experimental results show that BPM can improve the overall system throughput by 4.7% on average (up to 8.6%), and reduce the maximum slowdown by 4.5 % on average (up to 15.8%). Moreover, BPM also saves 5.2% of the energy consumption of memory system.

Lei Liu; Zehan Cui; Mingjie Xing; Yungang Bao; Mingyu Chen; Chengyong Wu

2012-01-01T23:59:59.000Z

177

Energy efficient Phase Change Memory based main memory for future high performance systems  

Science Conference Proceedings (OSTI)

Phase Change Memory (PCM) has recently attracted a lot of attention as a scalable alternative to DRAM for main memory systems. As the need for high-density memory increases, DRAM has proven to be less attractive from the point of view of scaling and ... Keywords: DDR3 commodity DRAM memory system, energy efficient phase change memory, main memory, future high performance systems, energy consumption, latency issues, write energy, write endurance, cache, embedded DRAM

R. A. Bheda; Jason A. Poovey; J. G. Beu; T. M. Conte

2011-07-01T23:59:59.000Z

178

USRI Admins Accessing USRI Reports  

E-Print Network (OSTI)

button #12;Step 6: Search by Instructor Search Area Enter: Instructors ID; or Instructors full or partC Access Enter the following: User name, and Password with secure ID#s #12;Step 3: Click on the following: Mandatory Parameters Selections Select Term; Select Course Career; Select Releasable Type; Click

Habib, Ayman

179

Flexible access control for javascript  

Science Conference Proceedings (OSTI)

Providing security guarantees for systems built out of untrusted components requires the ability to define and enforce access control policies over untrusted code. In Web 2.0 applications, JavaScript code from different origins is often combined on a ... Keywords: delimited histories, javascript, same-origin policy, security

Gregor Richards, Christian Hammer, Francesco Zappa Nardelli, Suresh Jagannathan, Jan Vitek

2013-10-01T23:59:59.000Z

180

Selling Random Energy  

E-Print Network (OSTI)

Selling Random Energy in a Two-Settlement System 3.1Wind Energy Aggregation and Profit Sharing 4.1 IntroductionPower Model . . . . . . . . . . . . . 5.3.2 Energy Storage

Bitar, Eilyan Yamen

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Random array grid collimator  

DOE Patents (OSTI)

A hexagonally shaped quasi-random no-two-holes touching grid collimator. The quasi-random array grid collimator eliminates contamination from small angle off-axis rays by using a no-two-holes-touching pattern which simultaneously provides for a self-supporting array increasng throughput by elimination of a substrate. The presentation invention also provides maximum throughput using hexagonally shaped holes in a hexagonal lattice pattern for diffraction limited applications. Mosaicking is also disclosed for reducing fabrication effort.

Fenimore, E.E.

1980-08-22T23:59:59.000Z

182

Random multiparty entanglement distillation  

E-Print Network (OSTI)

We describe various results related to the random distillation of multiparty entangled states - that is, conversion of such states into entangled states shared between fewer parties, where those parties are not predetermined. In previous work [Phys. Rev. Lett. 98, 260501 (2007)] we showed that certain output states (namely Einstein-Podolsky-Rosen (EPR) pairs) could be reliably acquired from a prescribed initial multipartite state (namely the W state) via random distillation that could not be reliably created between predetermined parties. Here we provide a more rigorous definition of what constitutes ``advantageous'' random distillation. We show that random distillation is always advantageous for W-class three-qubit states (but only sometimes for Greenberger-Horne-Zeilinger (GHZ)-class states). We show that the general class of multiparty states known as symmetric Dicke states can be readily converted to many other states in the class via random distillation. Finally we show that random distillation is provably not advantageous in the limit of multiple copies of pure states.

Ben Fortescue; Hoi-Kwong Lo

2007-09-25T23:59:59.000Z

183

NBP_RFI_Data_Access.PDF | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF More Documents & Publications Silver Spring Networks comments on DOE NBP RFI: Data Access...

184

PIA - Foreign Access Central Tracking System (FACTS) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central...

185

ETTP Security Access Control System (ESACS) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

186

Design of a large-scale storage-class RRAM system  

Science Conference Proceedings (OSTI)

Resistive Random Access Memory (RRAM) is a promising next generation non-volatile memory (NVM) technology, thanks to its performance potential, endurance and ease-of-integration with standard silicon CMOS processes. While prior work has evaluated RRAM ... Keywords: crossbar array, macro-architecture, micro-architecture, non-volatile memory, resistive random access memory

Myoungsoo Jung, John Shalf, Mahmut Kandemir

2013-06-01T23:59:59.000Z

187

Reducing Cache Access Energy in Array-Intensive Applications  

E-Print Network (OSTI)

Mahmut Kandemir Microsystems Design Lab Pennsylvania State University University Park, PA, 16802, USA Ibrahim Kolcu UMIST P.O. Box 88, Sackville Street Manchester, M60 1QD, UK Cache memories are known to consume a large percentage of on-chip energy in current microprocessors. For example, [1] reports that the on-chip cache in DEC Alpha 21264 consumes approximately 25% of the on-chip energy. Both sizes and complexities of state-of-the-art caches play a major role in their energy consumption. Direct-mapped caches are, in general, more energy efficient (from a per access energy consumption viewpoint) as they are simpler as compared to set-associative caches, and require no complex line replacement mechanisms (i.e., there is no decision concerning which line has to be evicted when a new line is to be loaded).

Exte Nd Ed; Mahmut Kandemir; Ibrahim Kolcu

2002-01-01T23:59:59.000Z

188

SunShot Initiative: Access to Capital  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to Capital to someone by Access to Capital to someone by E-mail Share SunShot Initiative: Access to Capital on Facebook Tweet about SunShot Initiative: Access to Capital on Twitter Bookmark SunShot Initiative: Access to Capital on Google Bookmark SunShot Initiative: Access to Capital on Delicious Rank SunShot Initiative: Access to Capital on Digg Find More places to share SunShot Initiative: Access to Capital on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Reducing Non-Hardware Costs Lowering Barriers Fostering Growth Access to Capital Photo of a room full of people seated in rows with a few standing in the background. Two hands in the crowd are holding up sheets of paper with 'Like'. Participants at the SunShot Summit breakout session "Big and Small Ideas:

189

Ralph H. Potts Memorial Fellowship Award  

Science Conference Proceedings (OSTI)

Awarded to a graduate student doing research in fats and oils. Ralph H. Potts Memorial Fellowship Award Awards Program achievement aocs application award Awards baldwin distinguished division memorial nomination poster program recognizing research

190

Available Technologies:Collective Memory Transfers for ...  

APPLICATIONS OF TECHNOLOGY: High Performance Computing (HPC) Big Data processing and analysis; Processor manufacturers; Memory module manufacturers

191

NIST Demonstrates Better Memory with Quantum Computer ...  

Science Conference Proceedings (OSTI)

... to demonstrate a quantum physics version of computer memory lasting ... prospects for making practical, reliable quantum computers (which make ...

2013-01-03T23:59:59.000Z

192

Battelle Memorial Institute Technology Marketing Summaries ...  

... applications and industries, and development stage. Battelle Memorial ... Typical existing armor for vehicles uses rigid plates of steel.

193

Chapter 5: Virtual Memory Management 1 Virtual Memory Management  

E-Print Network (OSTI)

kernel data structures. The zone package This package facilitates fast allocation of memory for kernel data structures, some of which may be in time critical pieces of code. The zone package provides, organization, data structures, interactions. The emphasis is laid on both ma- chine dependent portion

Melbourne, University of

194

DOBSON: a Pentium-based SMP Linux PC Beowulf for distributed-memory high resolution environment modelling  

Science Conference Proceedings (OSTI)

With the increasing computational speed of PC processors, lowering hardware prices, and the increasing accessibility of open source software, PC clusters have become an attractive option for exploring budgetary high performance computation on high resolution ... Keywords: 07.05.Bx, 92.60.Fm, 92.60.Jq, 92.60.Sz, Air pollution modelling, Beowulf, Cluster computing, Distributed-memory computing

K. -Y. Wang; D. E. Shallcross; S. M. Hall; Y. -H. Lo; C. Chou; D. Chen

2005-10-01T23:59:59.000Z

195

Shape memory polymer foams for endovascular therapies  

DOE Patents (OSTI)

A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

Wilson, Thomas S. (Castro Valley, CA); Maitland, Duncan J. (Pleasant Hill, CA)

2012-03-13T23:59:59.000Z

196

Specifying memory consistency of write buffer multiprocessors  

Science Conference Proceedings (OSTI)

Write buffering is one of many successful mechanisms that improves the performance and scalability of multiprocessors. However, it leads to more complex memory system behavior, which cannot be described using intuitive consistency models, such as Sequential ... Keywords: Memory consistency framework, alpha, coherence, partial store order, relaxed memory order, sequential consistency, sparc multiprocessors, total store order, write-buffer architectures

Lisa Higham; Lillanne Jackson; Jalal Kawash

2007-02-01T23:59:59.000Z

197

Reducing memory sharing overheads in distributed JVMs  

Science Conference Proceedings (OSTI)

Distributed JVM systems by supporting Java’s shared-memory model enable concurrent Java applications to run transparently on clusters of computers. Aiming to reduce the overheads associated to memory coherence enforcement mechanisms required in ... Keywords: JVM, Java, cluster computing, concurrent Java applications, distributed shared memory, high-performance computing

Marcelo Lobosco; Orlando Loques; Claudio L. de Amorim

2005-09-01T23:59:59.000Z

198

Multistable Circuits for Analog Memories Implementation  

Science Conference Proceedings (OSTI)

In this work two multistable circuits suitable for analog memories implementation will be presented. These circuits have been used to implement completely asynchronous analog memories, one type based on a flash converter and thus having a linear complexity ... Keywords: analog memories, asynchronous converters, successive approximations

Giorgio Biagetti; Massimo Conti; Simone Orcioni

2004-04-01T23:59:59.000Z

199

The Tempest approach to distributed shared memory  

Science Conference Proceedings (OSTI)

This paper summarizes how distributed shared memory (DSM) can be both efficiently and portably supported by the Tempest interface. Tempest is a collection of mechanisms for communication and synchronization in parallel programs. These mechanisms provide ... Keywords: Tempest, Tempest interface, distributed shared memory, message passing, parallel programs, shared memory

David A. Wood; Mark D. Hill; James R. Larus

1996-10-01T23:59:59.000Z

200

Algorithms and data structures for external memory  

Science Conference Proceedings (OSTI)

Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/output communication (or I/O) between fast internal memory and slower external memory (such as disks) can be a major performance ...

Jeffrey Scott Vitter

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A discrete fractional random transform  

E-Print Network (OSTI)

We propose a discrete fractional random transform based on a generalization of the discrete fractional Fourier transform with an intrinsic randomness. Such discrete fractional random transform inheres excellent mathematical properties of the fractional Fourier transform along with some fantastic features of its own. As a primary application, the discrete fractional random transform has been used for image encryption and decryption.

Zhengjun Liu; Haifa Zhao; Shutian Liu

2006-05-20T23:59:59.000Z

202

Indiana Memorial Union Wells Library  

E-Print Network (OSTI)

Franklin Hall Bryan Hall Law Indiana Memorial Union Jordan Hall Morrison Hall Wells Library Loop (0.5 miles) IMU to Greenhouse (0.3 miles) Business to Law School (0.75 miles) Wells Library to Morrison Hall (0.5 miles) Wells Library to Muisc Library (0.4 miles) #12;

Indiana University

203

Trapped-flux superconducting memory  

Science Conference Proceedings (OSTI)

A memory cell based on trapped flux in superconductors has been built and tested. The cell is constructed entirely by vacuum evaporation of thin films and can be selected by coincident current or by other techniques, with drive-current requirements less ...

J. W. Crowe

1957-10-01T23:59:59.000Z

204

Design considerations for MRAM  

Science Conference Proceedings (OSTI)

MRAM (magnetic random access memory) technology, based on the use of magnetic tunnel junctions (MTJs) as memory elements, is a potentially fast nonvolatile memory technology with very high write endurance. This paper is an overview of MRAM design considerations. ...

T. M. Maffitt; J. K. DeBrosse; J. A. Gabric; E. T. Gow; M. C. Lamorey; J. S. Parenteau; D. R. Willmott; M. A. Wood; W. J. Gallagher

2006-01-01T23:59:59.000Z

205

An Access Definition and Query Language : Towards a Unified Access Control Model.  

E-Print Network (OSTI)

??In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of… (more)

Sonnenbichler, Andreas

2013-01-01T23:59:59.000Z

206

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Reply comments from Cleco Power LLC on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid:...

207

Game Accessibility: Enabling Everyone to Play  

Science Conference Proceedings (OSTI)

There is a growing push to make computer games accessible to the disabled. Keywords: Games,Assistive technology,Assistive devices,game developers,games,accessibility,disabilities,disabled,adaptive technology

Lee Garber

2013-06-01T23:59:59.000Z

208

arXiv.org help - Web Accessibility  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Accessibility The arXiv.org web site is designed to work on the largest possible set of browsers and platforms, and to be accessible to users with disabilities. Our web pages...

209

Access Solar Energy LLC | Open Energy Information  

Open Energy Info (EERE)

Access Solar Energy LLC Jump to: navigation, search Name Access Solar Energy LLC Place Park CIty, Utah Zip 84060 Sector Renewable Energy, Solar Product Utah-based developers of...

210

Access Control: Policies, Models, and Mechanisms  

Science Conference Proceedings (OSTI)

Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access control decision is enforced by a mechanism implementing regulations established ...

Pierangela Samarati; Sabrina De Capitani di Vimercati

2000-09-01T23:59:59.000Z

211

Survey of Substation Equipment Access Control Policies  

Science Conference Proceedings (OSTI)

Utility management and control of access to substations and equipment can help prevent not only unauthorized access by outside agents with ill intent, but also erroneous access to, or erroneous operation of, utility equipment by utility personnel.  This report provides the results of an EPRI–sponsored research project to identify how utilities manage access to transmission and distribution substations and equipment. BackgroundThe enhanced ...

2012-11-20T23:59:59.000Z

212

Transmission Access Charge Informational Filing  

E-Print Network (OSTI)

of any new Participating Transmission Owner (“Participating TO”) during the proceeding six months or (2) changes to Transmission Revenue Requirements of any of the Participating TOs. 1 Because the Access Charges are determined through a formula rate mechanism, these semi-annual adjustments take place automatically. In the enclosed informational filing, the ISO is providing notice regarding the updated Access Charges that reflect the charges that will be in effect beginning January 1, 2002 in accordance with the formula rate. The adjusted charges are based on the modified Transmission Revenue Requirements, both High Voltage and Low Voltage as a result of: (1) the Offer of Settlement accepted by the Commission in Pacific Gas & Electric Company’s (“PG&E”) Docket No. ER01-66-000, (2) San Diego Gas and Electric Company’s supplemental surcharge accepted, subject to refund, in Docket No. ER01-3074-000, and (3) the annual adjustment to the Transmission Revenue Balancing Account (“TRBA”) of the Participating TOs. 1 Capitalized terms not otherwise defined herein are defined in the Master Definitions

unknown authors

2001-01-01T23:59:59.000Z

213

Substation Security and Remote Access Implementation Strategies  

Science Conference Proceedings (OSTI)

This project analyzed control system remote access solutions in a side-by-side comparison. Five systems were lab-tested against common functions used by utilities to access and manage electronic control systems. The five vendors’ products met the basic remote access requirements tested.BackgroundElectronic control systems that actuate protective equipment and physical operations in the ...

2012-12-20T23:59:59.000Z

214

A propositional policy algebra for access control  

Science Conference Proceedings (OSTI)

Security-sensitive environments protect their information resources against unauthorized use by enforcing access control mechanisms driven by access control policies. Due to the need to compare, contrast, and compose such protected information resources, ... Keywords: Access control, policy algebra, policy composition, security policy

Duminda Wijesekera; Sushil Jajodia

2003-05-01T23:59:59.000Z

215

Programmer-focused website accessibility evaluations  

Science Conference Proceedings (OSTI)

Suggested methods for conducting website accessibility evaluations have typically focused on the needs of end-users who have disabilities. However, programmers, not people with disabilities, are the end-users of evaluations reports generated by accessibility ... Keywords: accessibility, evaluation, internet, reporting

Chris Law; Julie Jacko; Paula Edwards

2005-10-01T23:59:59.000Z

216

A systematic approach to static access control  

Science Conference Proceedings (OSTI)

The Java Security Architecture includes a dynamic mechanism for enforcing access control checks, the so-called stack inspection process. While the architecture has several appealing features, access control checks are all implemented via dynamic ... Keywords: Type systems, access control, stack inspection

François Pottier; Christian Skalka; Scott Smith

2005-03-01T23:59:59.000Z

217

Optimizing Memory Accesses For Spatial Computation Mihai Budiu and Seth C. Goldstein  

E-Print Network (OSTI)

- sented are: load/store hoisting (subsuming partial re- dundancy elimination and common programs in hardware. Each operation in the program is implemented as a hard- ware operator. Data flows

Goldstein, Seth Copen

218

Energy-performance trade-offs for spatial access methods on memory-resident data  

Science Conference Proceedings (OSTI)

The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious design is important at all levels of system architecture, and the software has a key role to play in conserving battery energy ... Keywords: Energy optimization, Multidimensional indexing, Resource-constrained computing, Spatial data

Ning An; Sudhanva Gurumurthi; Anand Sivasubramaniam; Narayanan Vijaykrishnan; Mahmut Kandemir; Mary Jane Irwin

2002-11-01T23:59:59.000Z

219

[hal-00809847, v1] AI-Ckpt: Leveraging Memory Access Patterns...  

NLE Websites -- All DOE Office Websites (Extended Search)

asynchronous checkpointing gen- erate the same kind of interference as they did in past iter- ations. Based on this assumption, we propose novel asyn- chronous checkpointing...

220

Utility Data Accessibility Map | Open Energy Information  

Open Energy Info (EERE)

Utility Data Accessibility Map Utility Data Accessibility Map Jump to: navigation, search Residential Commercial Benchmarking Energy Efficiency Delivery of Data Time Period Frequency of Data Access to Data Residential frequency of data access Ua Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Chapter_12_Special_Access_Programs  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Special Access Programs This chapter describes the DOE Special Access Program (SAP) at DOE HQ and implements the requirements of: * Executive Order 13526, Classified National Security Information, Section 4.3, Special Access Programs, and Section 5.4, General Responsibilities, subparagraph (d). * DOE Order 471.5, Special Access Programs. A SAP is a program established for a specific class of classified information that imposes safeguarding and access requirements exceeding those normally required for information at the same classification level. Terms and activities such as Limited Access, Controlled Access, and Limited Distribution programs are not authorized. HQ Implementation Procedures SAP administration for both DOE and NNSA is handled through the Executive

222

Access Fund Partners LP | Open Energy Information  

Open Energy Info (EERE)

Access Fund Partners LP Access Fund Partners LP Jump to: navigation, search Name Access Fund Partners, LP Place San Juan Capistrano, California Zip 92675 Product Boutique investment banking and investment advisory firm with clean energy focus References Access Fund Partners, LP[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Access Fund Partners, LP is a company located in San Juan Capistrano, California . References ↑ "Access Fund Partners, LP" Retrieved from "http://en.openei.org/w/index.php?title=Access_Fund_Partners_LP&oldid=341703" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes Special pages Printable version

223

On the impact of Gold Open Access journals  

Science Conference Proceedings (OSTI)

Gold Open Access (=Open Access publishing) is for many the preferred route to achieve unrestricted and immediate access to research output. However, true Gold Open Access journals are still outnumbered by traditional journals. Moreover availability of ... Keywords: Directory of Open Access journals (DOAJ), Gold Open Access, Impact analysis, Impact evolution, Journal citation reports (JCR), Journal impact factor, Open Access publishing, SJR, SNIP, Ulrichsweb

Christian Gumpenberger; María-Antonia Ovalle-Perandones; Juan Gorraiz

2013-07-01T23:59:59.000Z

224

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

225

SPEED CONTROL SYSTEM FOR AN ACCESS GATE - Energy Innovation Portal  

An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first ...

226

Symmetrization Of Binary Random Variables  

E-Print Network (OSTI)

A random variable Y is called an independent symmetrizer of a given random variable X if (a) it is independent of X and (b) the distribution of X Y is symmetric about 0. In cases where the distribution of X is symmetric about its mean, it is easy to see that the constant random variable Y is a minimum-variance independent symmetrizer. Taking

Abram Kagan; Colin Mallows; Larry Shepp; Robert J. Vanderbei; Yehuda Vardi

1999-01-01T23:59:59.000Z

227

Disaggregated memory for expansion and sharing in blade servers  

Science Conference Proceedings (OSTI)

Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contributed by memory systems to total datacenter costs and power consumption during ... Keywords: disaggregated memory, memory blades, memory capacity expansion, power and cost efficiencies

Kevin Lim; Jichuan Chang; Trevor Mudge; Parthasarathy Ranganathan; Steven K. Reinhardt; Thomas F. Wenisch

2009-06-01T23:59:59.000Z

228

Introspection-based memory de-duplication and migration  

Science Conference Proceedings (OSTI)

Memory virtualization abstracts a physical machine's memory resource and presents to the virtual machines running on it a piece of physical memory that could be shared, compressed and moved. To optimize the memory resource utilization by fully leveraging ... Keywords: introspection, memory de-duplication, vm migration

Jui-Hao Chiang; Han-Lin Li; Tzi-cker Chiueh

2013-03-01T23:59:59.000Z

229

Architecture extensions for efficient management of scratch-pad memory  

Science Conference Proceedings (OSTI)

Nowadays, many embedded processors include in their architecture on-chip static memories, so called scratch-pad memories (SPM). Compared to cache, these memories do not require complex control logic, thus resulting in increased efficiency both in silicon ... Keywords: embedded processors, memory architecture, scratch-pad memory

José V. Busquets-Mataix; Carlos Catalá; Antonio Martí-Campoy

2011-09-01T23:59:59.000Z

230

Experiments with Memory-to-Memory Coupling for End-to-End Fusion Simulation Workflows  

Science Conference Proceedings (OSTI)

Scientific applications are striving to accurately simulate multiple interacting physical processes that comprise complex phenomena being modeled. Efficient and scalable parallel implementations of these coupled simulations present challenging interaction ... Keywords: coupling, memory-to-memory, rdma, workflows

Ciprian Docan; Fan Zhang; Manish Parashar; Julian Cummings; Norbert Podhorszki; Scott Klasky

2010-05-01T23:59:59.000Z

231

SLAC Lightsource User Access Guidelines and Agreement  

NLE Websites -- All DOE Office Websites (Extended Search)

Lightsource User Access Guidelines & Agreement Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC Lightsource User Access Guidelines and Agreement LCLS / SSRL User Research Administration approval (signature/date): LCLS Safety Office approval (signature/date): SSRL Safety Office approval (signature/date): XFO Operations approval (signature/date): Revision Record Revision Date Revised Section(s) Affected Description of Change R001 October 4 th , 2010 User Form Updated SLAC Lightsource User Access Agreement Form R000 Sept 14, 2009 Original Release SLAC Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC LIGHTSOURCE USER ACCESS GUIDELINES & AGREEMENT Introduction Welcome to SSRL and LCLS, SLAC's lightsource user facilities. We hope that your stay here will be

232

Rotary actuator utilizing a shape memory alloy  

SciTech Connect

An apparatus is described comprising; (a) rotary accumulator means for accumulating a length of a shape memory alloy wire; (b) the shape memory alloy wire attached at one end to a point fixed with respect to the rotary accumulator means and attached at a second end to the rotary accumulator means; (c) biasing means for biasing the rotary accumulator means to a first position; and (d) means for heating the shape memory alloy wire to cause the shape memory alloy wire to contract, thereby rotating the rotary accumulator means from the first position to a second position.

Bloch, J.T.

1988-08-09T23:59:59.000Z

233

Exploiting Data Similarity to Reduce Memory Footprints  

SciTech Connect

Memory size has long limited large-scale applications on high-performance computing (HPC) systems. Since compute nodes frequently do not have swap space, physical memory often limits problem sizes. Increasing core counts per chip and power density constraints, which limit the number of DIMMs per node, have exacerbated this problem. Further, DRAM constitutes a significant portion of overall HPC system cost. Therefore, instead of adding more DRAM to the nodes, mechanisms to manage memory usage more efficiently - preferably transparently - could increase effective DRAM capacity and thus the benefit of multicore nodes for HPC systems. MPI application processes often exhibit significant data similarity. These data regions occupy multiple physical locations across the individual rank processes within a multicore node and thus offer a potential savings in memory capacity. These regions, primarily residing in heap, are dynamic, which makes them difficult to manage statically. Our novel memory allocation library, SBLLmalloc, automatically identifies identical memory blocks and merges them into a single copy. SBLLmalloc does not require application or OS changes since we implement it as a user-level library. Overall, we demonstrate that SBLLmalloc reduces the memory footprint of a range of MPI applications by 32.03% on average and up to 60.87%. Further, SBLLmalloc supports problem sizes for IRS over 21.36% larger than using standard memory management techniques, thus significantly increasing effective system size. Similarly, SBLLmalloc requires 43.75% fewer nodes than standard memory management techniques to solve an AMG problem.

Biswas, S; de Supinski, B R; Schulz, M; Franklin, D; Sherwood, T; Chong, F T

2011-01-28T23:59:59.000Z

234

Memory resource management in vmware esx server  

E-Print Network (OSTI)

VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified commodity operating systems. This paper introduces several novel ESX Server mechanisms and policies for managing memory. A ballooning technique reclaims the pages considered least valuable by the operating system running in a virtual machine. An idle memory tax achieves efficient memory utilization while maintaining performance isolation guarantees. Content-based page sharing and hot I/O page remapping exploit transparent page remapping to eliminate redundancy and reduce copying overheads. These techniques are combined to efficiently support virtual machine workloads that overcommit memory. 1

Carl A. Waldspurger

2002-01-01T23:59:59.000Z

235

Memorandum Memorializing Ex Parte Communication - August 12,...  

NLE Websites -- All DOE Office Websites (Extended Search)

Memorandum Memorializing Ex Parte Communication - August 12, 2011 On August 9, 2011, the Air-Conditioning, Heating and Refrigeration Institute's (AHRI) Unitary Small Engineering...

236

ON EFFICIENTLY COMBINING LIMITED MEMORY AND TRUST ...  

E-Print Network (OSTI)

... Euclidean norm with an insignificant computational overhead compared with the cost of computing the quasi-Newton direction in line-search limited memory ...

237

Characterization of Shape Memory Alloys: Deformation Behavior  

Science Conference Proceedings (OSTI)

Feb 28, 2011... expected that NiTi shape memory alloys (SMA) actuators would provide simple and light weight replacements for controlling chevron-shaped ...

238

Julian Szekely Memorial Symposium Rental Car Information  

Science Conference Proceedings (OSTI)

The Julian Szekely Memorial Symposium on Materials Processing will be held at the Royal Sonesta Hotel in Cambridge, Massachusetts, October 5-8, 1997.

239

Determining Memory Use | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Allinea DDT Core File Settings Determining Memory Use Using VNC with a Debugger bgqstack gdb Coreprocessor TotalView on BGQ Systems Performance Tools & APIs Software & Libraries...

240

Site Access Policy | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory About Work with Argonne Safety News Community Events Careers Directory Energy Environment Security User Facilities Science Technology Visiting Argonne Site Access...

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Presenting Accessibility to Mobility-Impaired Travelers  

E-Print Network (OSTI)

Behaviors of the Mobility-Disabled Consumer." Journal ofCampus Access Guide at the Disabled Student Program at UCto dental services for disabled people. A questionnaire

Nuernberger, Andrea

2008-01-01T23:59:59.000Z

242

Adjudicative Guidelines for Determining Eligibility for Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to help a foreign person, group, or country by providing that information; (c) counterintelligence information, that may be classified, indicates that the individual's access to...

243

Expanding Researcher Access to EIA Microdata  

U.S. Energy Information Administration (EIA)

personal computers at remote locations. EIA’s research access program is much more limited than those offered by other statistical agencies.

244

ORISE Resources: Puerto Rico Equal Access Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Minority AIDS Council (NMAC) and Office of AIDS Research (OAR) Puerto Rico Equal Access Program (PREAP). This PREAP training was specifically developed for the Puerto Rican...

245

Technology and Access to Knowledge - CECM  

E-Print Network (OSTI)

Feb 9, 1998 ... Technology and Access to Knowledge. Mathematics as a branch of human knowledge is several millenia old, and though each individual ...

246

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for approximately 11 percent of all electric energy sold in the United States. NBP RFI: Data Access More Documents & Publications Re: DOE Request for Information - Implementing the...

247

Content-Based Access to Unstructured Information  

Science Conference Proceedings (OSTI)

... of automatic systems that can provide content-based access to information that has not been explicitly structured for machine consumption. ...

2012-01-03T23:59:59.000Z

248

Free randomness can be amplified  

E-Print Network (OSTI)

Are there fundamentally random processes in nature? Theoretical predictions, confirmed experimentally, such as the violation of Bell inequalities, point to an affirmative answer. However, these results are based on the assumption that measurement settings can be chosen freely at random, so assume the existence of perfectly free random processes from the outset. Here we consider a scenario in which this assumption is weakened and show that partially free random bits can be amplified to make arbitrarily free ones. More precisely, given a source of random bits whose correlation with other variables is below a certain threshold, we propose a procedure for generating fresh random bits that are virtually uncorrelated with all other variables. We also conjecture that such procedures exist for any non-trivial threshold. Our result is based solely on the no-signalling principle, which is necessary for the existence of free randomness.

Roger Colbeck; Renato Renner

2011-05-16T23:59:59.000Z

249

Memory, Bias and Correlations in Bidirectional Transport of Molecular Motor-driven Cargoes  

E-Print Network (OSTI)

Molecular motors are specialized proteins which perform active, directed transport of cellular cargoes on cytoskeletal filaments. In many cases, cargo motion powered by motor proteins is found to be bidirectional, and may be viewed as a biased random walk with fast unidirectional runs interspersed with slow `tug-of-war' states. The statistical properties of this walk are not known in detail, and here, we study memory and bias, as well as directional correlations between successive runs in bidirectional transport. We show, based on a study of the direction reversal probabilities of the cargo using a purely stochastic (tug-of-war) model, that bidirectional motion of cellular cargoes is, in general, a correlated random walk. In particular, while the motion of a cargo driven by two oppositely pulling motors is a Markovian random walk, memory of direction appears when multiple motors haul the cargo in one or both directions. In the latter case, the Markovian nature of the underlying single motor processes is hidden by internal transitions between degenerate run and pause states of the cargo. Interestingly, memory is found to be a non-monotonic function of the number of motors. Stochastic numerical simulations of the tug-of-war model support our mathematical results and extend them to biologically relevant situations.

Deepak Bhat; Manoj Gopalakrishnan

2013-08-13T23:59:59.000Z

250

Random Access Game in Fading Channels with Capture: Equilibria and Braess-like Paradoxes  

E-Print Network (OSTI)

The Nash equilibrium point of the transmission probabilities in a slotted ALOHA system with selfish nodes is analyzed. The system consists of a finite number of heterogeneous nodes, each trying to minimize its average transmission probability (or power investment) selfishly while meeting its average throughput demand over the shared wireless channel to a common base station (BS). We use a game-theoretic approach to analyze the network under two reception models: one is called power capture, the other is called signal to interference plus noise ratio (SINR) capture. Contrary to one's intuition, we show analytically the occurrence of Braess-like paradoxes that the performance of the system may degrade when channel state information (CSI) is available at the nodes.

Hsu, Fu-Te

2010-01-01T23:59:59.000Z

251

A DSL approach for object memory management of small devices  

Science Conference Proceedings (OSTI)

Small devices have a specific hardware configuration. In particular, they usually include several types of memories (typically ROM, internal and external RAM, Flash memory) different in quantities and properties. We propose an object memory management ...

Kevin Marquet; Gilles Grimaud

2007-09-01T23:59:59.000Z

252

Models on Distributed Memory Architectures  

NLE Websites -- All DOE Office Websites (Extended Search)

5/2004 Y.He 1 5/2004 Y.He 1 MPH: a Library for Coupling Multi-Component Models on Distributed Memory Architectures and its Applications Yun (Helen) He and Chris Ding CRD Division Lawrence Berkeley National Laboratory 10/15/2004 Y.He 2 10/15/2004 Y.He 3 Motivation n Application problems grow in scale & complexity n Effective organization of simulation software system that is maintainable, reusable, sharable, and efficient è a major issue n Community Climate System Model (CCSM) development n Software lasts much longer than a computer! 10/15/2004 Y.He 4

253

Central Limit Theorem for Branching Random Walks in Random Environment  

E-Print Network (OSTI)

We consider branching random walks in $d$-dimensional integer lattice with time-space i.i.d. offspring distributions. When $d \\ge 3$ and the fluctuation of the environment is well moderated by the random walk, we prove a central limit theorem for the density of the population, together with upper bounds for the density of the most populated site and the replica overlap. We also discuss the phase transition of this model in connection with directed polymers in random environment.

Nobuo Yoshida

2007-12-05T23:59:59.000Z

254

Data Center Access Policies and Version 2.0  

E-Print Network (OSTI)

Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 University://uits.arizona.edu #12;Table of Contents UITS Data Center Access Policies and Procedures!3 .Introduction!3 Overview!3 Data Center Access!3 Data Center Access - Levels of Access!4 Periodic Review and Termination of Access

Watkins, Joseph C.

255

Archive Access and Accessibility: A Progress Report on Social Networking at Work  

E-Print Network (OSTI)

bubble demo: http://lah.soas.ac.uk/projects/dev/bubble-player/wilbur.html 34 Access is also about perceptions ? perceptions of interfaces – like Facebook, ELAR “reduces distance and power disparities, supports interactions” ? difficult access mistaken...

Nathan, David

2010-12-10T23:59:59.000Z

256

Three web accessibility evaluation perspectives for RIA  

Science Conference Proceedings (OSTI)

With the increasing popularity of Rich Internet Applications (RIAs), several challenges arise in the area of web accessibility evaluation. A particular set of challenges emerges from RIAs dynamic nature: original static Web specifications can change ... Keywords: automated evaluation, web accessibility, web browser processing, web science

Nádia Fernandes, Ana Sofia Batista, Daniel Costa, Carlos Duarte, Luís Carriço

2013-05-01T23:59:59.000Z

257

Web Accessibility Office of Diversity and Inclusion  

E-Print Network (OSTI)

Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

Jones, Michelle

258

National Radiobiology Archives Distributed Access user's manual  

SciTech Connect

This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

1991-11-01T23:59:59.000Z

259

Improving Access to Web Content at Google  

E-Print Network (OSTI)

1 Improving Access to Web Content at Google Loretta Guarino Reid (LorettaGuarino@google.com) Srinivas Annam (AnnamS@google.com) March 12, 2008 #12;2 Overview Accessibility developments for : · Gmail · Search · Toolbar · Maps & Transit · Books · Video & Captions · Short Topics ­ Calendar, Google Groups

Cortes, Corinna

260

Distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide users with different services in terms ...

Haodong Wang; Qun Li

2006-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Locally Accessible Information and Distillation of Entanglement  

E-Print Network (OSTI)

A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

2004-03-18T23:59:59.000Z

262

DOE - Office of Legacy Management -- Memorial Hospital - NY 0...  

Office of Legacy Management (LM)

Memorial Hospital - NY 0-16 FUSRAP Considered Sites Site: MEMORIAL HOSPITAL (NY.0-16 ) Eliminated from consideration under FUSRAP Designated Name: Not Designated Alternate Name:...

263

Crystallographic Boundary in a Magnetic Shape Memory Material  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Science Highlights Science Briefs Crystallographic Boundary in a Magnetic Shape Memory Material Crystallographic Boundary in a Magnetic Shape Memory Material Print...

264

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised) Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised)...

265

Ethiopia Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Ethiopia Energy Access Project Ethiopia Energy Access Project Jump to: navigation, search Name of project Ethiopia Energy Access Project Location of project Ethiopia Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2005 Organization World Bank Website http://documents.worldbank.org Coordinates 9.145°, 40.489673° References The World Bank[1] The Energy Access Project for Ethiopia will establish a sustainable program for expanding the population's access to electricity and improving the quality and adequacy of electricity supply, reduce environmental degradation and improve energy end-use efficiency; reduce the barriers to the wide spread adoption of renewable energy technologies, and provide technical support for institutional and capacity building of key sector

266

Shape memory polymer actuator and catheter  

SciTech Connect

An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

Maitland, Duncan J. (Pleasant Hill, CA); Lee, Abraham P. (Walnut Creek, CA); Schumann, Daniel L. (Concord, CA); Matthews, Dennis L. (Moss Beach, CA); Decker, Derek E. (Byron, CA); Jungreis, Charles A. (Pittsburgh, PA)

2007-11-06T23:59:59.000Z

267

Quantifying Dynamic Stability of Genetic Memory Circuits  

Science Conference Proceedings (OSTI)

Bistability/Multistability has been found in many biological systems including genetic memory circuits. Proper characterization of system stability helps to understand biological functions and has potential applications in fields such as synthetic biology. ... Keywords: Dynamic stability, genetic memory, gene circuit, dynamic noise margin.

Yong Zhang; Peng Li; Garng Huang

2012-05-01T23:59:59.000Z

268

Optimum LDPC decoder: a memory architecture problem  

Science Conference Proceedings (OSTI)

This paper addresses a frequently overlooked problem: designing a memory architecture for an LDPC decoder. We analyze the requirements to support the codes defined in the IEEE 802.11n and 802.16e standards. We show a design methodology for a flexible ... Keywords: LDPC codes, low power architectures, memory optimization

Erick Amador; Renaud Pacalet; Vincent Rezard

2009-07-01T23:59:59.000Z

269

Memory Fault Modeling Trends: A Case Study  

Science Conference Proceedings (OSTI)

In recent years, embedded memories are the fastest growing segment of system on chip. They therefore have a major impact on the overall Defect per Million (DPM). Further, the shrinking technologies and processes introduce new defects that cause previously ... Keywords: data backgrounds, dynamic faults, fault coverage, fault models, memory tests, static faults

Said Hamdioui; Rob Wadsworth; John Delos Reyes; Ad J. Van De Goor

2004-06-01T23:59:59.000Z

270

Preserved Access to Abstract Letter Identities Despite Abolished Letter . . .  

E-Print Network (OSTI)

In this paper, we discuss the letter processing difficulties of a patient (MS) with pure alexia after left hemisphere stroke who is unable to read any words aloud despite preserved writing and good performance at naming orally spelled words. MS is completely unable to name visually presented letters even though she can name them when they are presented in other modalities. Despite her poor naming, she can distinguish correctly oriented letters from mirror reversals and can perform accurate cross-case matching of visually presented letters. It, therefore, appears that MS is able to access the abstract identity of visually presented letters despite her total inability to name them. This is a more precise form of letter processing impairment than that which has been reported in previous cases of pure alexic patients who are unable to name visually presented letters [Caplan, L.R., & HedleyWhite, T. (1974). Cueing and memory function in alexia without agraphia: a case report. Brain, 115, 251-262; Miozzo, M., & Caramazza, A. (1998). Varieties of pure alexia: the case of failure to access graphemic representations. Cognitive Neuropsychology, 15, 203-238; Sevush, S., & Heilman, K.M. (1984). A case of literal alexia. Brain & Language, 22, 92-108]. It suggests that representations of the graphemic identities of letters used in reading are either modality specific or else they are hemisphere specific [Saffran, E.M., & Coslett, H.B. (1998). Implicit vs. letter-by-letter reading in pure alexia: a tale of two systems. Cognitive Neuropsychology, 15, 141-165]. Her letter processing impairment also appears to be different from that observed in a letter-by-letter reader [Perri, R., Bartolomeo, P., & Silveri, M.C. (1996). Letter dyslexia in a letter-by-letter reader. Brain & Language, 53,...

R. Mycroft; J. R. Hanley B; J. Kay A

2002-01-01T23:59:59.000Z

271

ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains  

Science Conference Proceedings (OSTI)

In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently ... Keywords: decentralized access control, identity privacy, location privacy, mobile privacy, wireless security

Jiejun Kong; Shirshanka Das; Edward Tsai; Mario Gerla

2003-09-01T23:59:59.000Z

272

Collective behavior in random interaction  

E-Print Network (OSTI)

Recent investigations have looked at the many-body spectra of random two-body interactions. In fermion systems, such as the interacting shell model, one finds pairing-like spectra, while in boson systems, such as IBM-1, one finds rotational and vibrational spectra. We discuss the search for random ensembles of fermion interactions that yield rotational and vibrational spectra, and in particular present results from a new ensemble, the ``random quadrupole-quadrupole ensemble''

Johnson, C W; Johnson, Calvin W.; Nam, Hai Ah

2006-01-01T23:59:59.000Z

273

Collective behavior in random interaction  

E-Print Network (OSTI)

Recent investigations have looked at the many-body spectra of random two-body interactions. In fermion systems, such as the interacting shell model, one finds pairing-like spectra, while in boson systems, such as IBM-1, one finds rotational and vibrational spectra. We discuss the search for random ensembles of fermion interactions that yield rotational and vibrational spectra, and in particular present results from a new ensemble, the ``random quadrupole-quadrupole ensemble''

Calvin W. Johnson; Hai Ah Nam

2006-01-30T23:59:59.000Z

274

Improving Organizational Memories Through User Feedback  

E-Print Network (OSTI)

The benefits of an organizational memory are ultimately determined by the usefulness of the organizational memory as perceived by its users. Therefore, an improvement of an organizational memory should be measured in the added perceived usefulness. Unfortunately, the perceived usefulness has many impact factors (e.g., the precision of the user query, the urgency with which the user needs information, the coverage of the underlying knowledge base, the quality of the schema used to store knowledge, and the quality of the implementation). Hence, it is difficult to identify good starting points for improvement. This paper presents the goal-oriented method OMI (Organizational Memory Improvement) for improving an organizational memory incrementally from the user's point of view. It has been developed through several case studies and consists of a general usage model, a set of indicators for improvement potential, and a cause-effect model. At each step of the general usage model of OMI, pro...

Klaus-Dieter Althoff; Markus Nick; Carsten Tautz

1999-01-01T23:59:59.000Z

275

Stretched Polymers in Random Environment  

E-Print Network (OSTI)

We survey recent results and open questions on the ballistic phase of stretched polymers in both annealed and quenched random environments.

Dmitry Ioffe; Yvan Velenik

2010-11-01T23:59:59.000Z

276

The Scalable Parallel Random Number Generators (SPRNG) ...  

Science Conference Proceedings (OSTI)

... Random Number Generators (SPRNG) Library is a widely used tool for random number generation on high-performance computing platforms. ...

2011-05-04T23:59:59.000Z

277

Rail Access to Yucca Mountain: Critical Issues  

SciTech Connect

The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

Halstead, R. J.; Dilger, F.; Moore, R. C.

2003-02-25T23:59:59.000Z

278

PARS II User Account Access Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Management Office of Management Office of Engineering and Construction Management User Account Access Guide for PARS II Version 1.5 June 25, 2011 Submitted by: Energy Enterprise Solutions 20440 Century Blvd. Suite 150 Germantown, MD 20874 Phone 301-916-0050 Fax 301-916-0066 www.eesllc.net June 25, 2011 (V1.5) PARS II User Account Access Guide ii This page intentionally left blank. June 25, 2011 (V1.5) PARS II User Account Access Guide iii Title Page Document Name: User Account Access Guide for PARS II Version Number: V1.5 Publication Date: June 25, 2011 Contract Number: DE-AT01-06IM00102 Project Number: 1ME07 CLIN 4 Prepared by: Scott Burns, Energy Enterprise Solutions, LLC Reviewed by: Judith Bernsen, Energy Enterprise Solutions, LLC

279

Dynamic spectrum access -- concepts and future architectures  

Science Conference Proceedings (OSTI)

New trends and developments in radio technology are enhancing the future capabilities of devices to access electromagnetic spectrum using the full range of dimensions associated with the spectrum. This increased capability, together with current developments ...

M. Nekovee

2006-04-01T23:59:59.000Z

280

Decision Analysis of Dynamic Spectrum Access Rules  

SciTech Connect

A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Accessing speech data using strategic fixation  

Science Conference Proceedings (OSTI)

When users access information from text, they engage in strategic fixation, visually scanning the text to focus on regions of interest. However, because speech is both serial and ephemeral, it does not readily support strategic fixation. This paper describes ...

Steve Whittaker; Julia Hirschberg

2007-04-01T23:59:59.000Z

282

Fair resource allocation in multiple access channels  

E-Print Network (OSTI)

We consider the problem of resource allocation in a multiple access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates over ...

ParandehGheibi, Ali

2008-01-01T23:59:59.000Z

283

JOBAID-ACCESSING AND MODIFYING TALENT PROFILE  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

284

North Carolina Capital Access Program (North Carolina)  

Energy.gov (U.S. Department of Energy (DOE))

The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lender’s usual standards. The average CAP loan is ...

285

Radio over fiber in multimedia access networks  

Science Conference Proceedings (OSTI)

Dominant broadband access technologies today are Digital Subscriber Line (DSL) and hybrid fiber coaxial (HFC) networks. DSL leads, with global subscribers exceeding 100 million, while cable-modem subscribers worldwide total 55 million in 2005 [1]. Recently, ...

Xavier Fernando

2006-09-01T23:59:59.000Z

286

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

287

Crystallographic attributes of a shape-memory alloy  

SciTech Connect

Shape-memory alloys are attractive for many potential applications. In an attempt to provide ideas and guidelines for the development of new shape-memory alloys, this paper reports on a series of investigations that examine the reasons in the crystallography that made (i) shape-memory alloys special amongst martensites and (ii) Nickel-Titanium special among shape-memory alloys.

Bhattacharya, K. [California Inst. of Tech., Pasadena, CA (United States). Div. of Engineering and Applied Science

1999-01-01T23:59:59.000Z

288

L6: Memory Hierarchy Optimization III, Bandwidth Optimization  

E-Print Network (OSTI)

wherever there are capacity limitations ­ Between grids if total data exceeds global memory capacity will "spill" data to local memory · Local memory ­ Deals with capacity limitations of registers and shared ­ Across thread blocks if shared data exceeds shared memory capacity (also to partition computation across

Hall, Mary W.

289

Cork: dynamic memory leak detection for garbage-collected languages  

Science Conference Proceedings (OSTI)

A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap growth, degrading performance and resulting in program crashes after ... Keywords: dynamic, garbage collection, memory leak detection, memory leaks, runtime analysis

Maria Jump; Kathryn S. McKinley

2007-01-01T23:59:59.000Z

290

Journal of Experimental Psychology: Learning, Memory, and Cognition  

E-Print Network (OSTI)

explicit and implicit tests of memory (for reviews, see Graf & Masson, 1993; Lewandosky, Dunn, & Kirsner

Shimamura, Arthur P.

291

Persistent systems techniques in forensic acquisition of memory  

Science Conference Proceedings (OSTI)

In this paper we discuss how operating system design and implementation influence the methodology for computer forensics investigations, with the focus on forensic acquisition of memory. In theory the operating system could support such investigations ... Keywords: Computer forensics, Memory acquisition, Memory forensics, Memory persistence, Persistent operating systems

Ewa Huebner; Derek Bem; Frans Henskens; Mark Wallis

2007-09-01T23:59:59.000Z

292

Memory energy management for an enterprise decision support system  

Science Conference Proceedings (OSTI)

Energy efficiency is an important factor in designing and configuring enterprise servers. In these servers, memory may consume 40% of the total system power. Different memory configurations (sizes, numbers of ranks, speeds, etc.) can have significant ... Keywords: memory power management, power-aware memory

Karthik Kumar; Kshitij Doshi; Martin Dimitrov; Yung-Hsiang Lu

2011-08-01T23:59:59.000Z

293

Architecting phase change memory as a scalable dram alternative  

Science Conference Proceedings (OSTI)

Memory scaling is in jeopardy as charge storage and sensing mechanisms become less reliable for prevalent memory technologies, such as DRAM. In contrast, phase change memory (PCM) storage relies on scalable current and thermal mechanisms. To exploit ... Keywords: dram alternative, endurance, energy, pcm, performance, phase change memory, power, scalability

Benjamin C. Lee; Engin Ipek; Onur Mutlu; Doug Burger

2009-06-01T23:59:59.000Z

294

Characterizing the Memory Behavior of Compiler-Parallelized Applications  

Science Conference Proceedings (OSTI)

Abstract¿Compiler-parallelized applications are increasing in importance as moderate-scale multiprocessors become common. This paper evaluates how features of advanced memory systems (e.g., longer cache lines) impact memory system behavior for applications ... Keywords: Parallelizing compilers, memory hierarchies, shared-memory multiprocessors, cache performance, false and true sharing, parallelism granularity.

Evan Torrie; Margaret Martonosi; Chau-Wen Tseng; Mary W. Hall

1996-12-01T23:59:59.000Z

295

Dynamic tracking of page miss ratio curve for memory management  

Science Conference Proceedings (OSTI)

Memory can be efficiently utilized if the dynamic memory demands of applications can be determined and analyzed at run-time. The page miss ratio curve(MRC), i.e. page miss rate vs. memory size curve, is a good performance-directed metric to serve this ... Keywords: memory management, power management, resource allocation

Pin Zhou; Vivek Pandey; Jagadeesan Sundaresan; Anand Raghuraman; Yuanyuan Zhou; Sanjeev Kumar

2004-12-01T23:59:59.000Z

296

On Working Memory: Its organization and capacity limits  

E-Print Network (OSTI)

64 iii 6.2 Working memory capacity10 1.4 Capacity limits of workingcapacity . . . . . . . . . . . . . . . . . . . . . . . . . .

Lara, Antonio Homero

2010-01-01T23:59:59.000Z

297

A Quantum Information Retrieval Approach to Memory  

E-Print Network (OSTI)

As computers approach the physical limits of information storable in memory, new methods will be needed to further improve information storage and retrieval. We propose a quantum inspired vector based approach, which offers a contextually dependent mapping from the subsymbolic to the symbolic representations of information. If implemented computationally, this approach would provide exceptionally high density of information storage, without the traditionally required physical increase in storage capacity. The approach is inspired by the structure of human memory and incorporates elements of Gardenfors' Conceptual Space approach and Humphreys et al.'s matrix model of memory.

Kirsty Kitto; Peter Bruza; Liane Gabora

2013-10-11T23:59:59.000Z

298

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

299

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

300

Random Deployment of Data Collectors for Serving Randomly-Located Sensors  

E-Print Network (OSTI)

Recently, wireless communication industries have begun to extend their services to machine-type communication devices as well as to the user equipment. Such machine-type communication devices as meters and sensors need intermittent uplink resources to report measured or sensed data to their serving data collector. It is however hard to dedicate limited uplink resources to each of them. Thus, efficient service of a tremendous number of devices with low activities may consider simple random access as a solution. The data collectors receiving the measured data from many sensors simultaneously can successfully decode only signals with signal-to-interference-plus-noise-ratio (SINR) above a certain value. The main design issues for this environment become how many data collectors are needed, how much power sensor nodes transmit with, and how wireless channels affect the performance. This paper provides answers to those questions through a stochastic analysis based on a spatial point process and on simulations.

Kwon, Taesoo

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Coherent instabilities in random lasers  

SciTech Connect

A numerical study is presented of random lasers as a function of the pumping rate above the threshold for lasing. Depending on the leakiness of the system resonances, which is typically larger in random lasers compared to conventional lasers, we observe that the stationary lasing regime becomes unstable above a second threshold. Coherent instabilities are observed as self pulsation at a single frequency of the output intensity, population inversion, as well as the atomic polarization. We find these Rabi oscillations have the same frequency everywhere in the random laser despite the fact that the field intensity strongly depends on the spatial location.

Andreasen, Jonathan; Sebbah, Patrick; Vanneste, Christian [Laboratoire de Physique de la Matiere Condensee, CNRS UMR 6622, Universite de Nice-Sophia Antipolis, Parc Valrose, F-06108, Nice Cedex 02 (France)

2011-08-15T23:59:59.000Z

302

Why Has the Land Memory Changed?  

Science Conference Proceedings (OSTI)

The “land memory” refers to an interseasonal predictability of the summer monsoon rainfall in the southwestern United States, describing a relationship of the summer monsoon rainfall anomaly with anomalies in the antecedent winter season snow and ...

Qi Hu; Song Feng

2004-08-01T23:59:59.000Z

303

The Neural Substrate of Orientation Working Memory  

Science Conference Proceedings (OSTI)

We have used positron emission tomography (PET) to identify the neural substrate of two major cognitive components of working memory (WM), maintenance and manipulation of a single elementary visual attribute, i.e., the orientation of a grating presented ...

L. Cornette; P. Dupont; E. Salmon; Guy A. Orban

2001-08-01T23:59:59.000Z

304

30 days to a more powerful memory  

Science Conference Proceedings (OSTI)

With phones ringing off the hook, constantly changing to-do lists, and increasingly complicated schedules, having a good memory has become more important than ever. Drawing on the latest research from cognitive experts and psychologists, 30 Days to a ...

Gini Scott

2007-04-01T23:59:59.000Z

305

A strategy of memory : Suzhou, China  

E-Print Network (OSTI)

The thesis is trying to establish a strategy of memory for the urban preservation of old cities, like Suzhou, within the context of the rapid growing economy in Southern China. The general attitude towards the problem ...

Chang, Ping Hung

1995-01-01T23:59:59.000Z

306

Revisiting parallel rendering for shared memory machines  

Science Conference Proceedings (OSTI)

Increasing the core count of CPUs to increase computational performance has been a significant trend for the better part of a decade. This has led to an unprecedented availability of large shared memory machines. Programming paradigms and systems are ...

B. Nouanesengsy; J. Ahrens; J. Woodring; H. Shen

2011-04-01T23:59:59.000Z

307

Commercialization of germanium based nanocrystal memory  

E-Print Network (OSTI)

This thesis explores the commercialization of germanium-based nanocrystal memories. Demand for smaller and faster electronics and embedded systems supports the development of high-density, low-power non-volatile electronic ...

Seow, Kian Chiew

2007-01-01T23:59:59.000Z

308

Cultural differences on the children's memory scale  

E-Print Network (OSTI)

Memory is an essential component for learning. Deficits in verbal short-term memory (STM) and working memory (WM) are thought to hinder language learning, reading acquisition, and academic achievement. The Children’s Memory Scale (CMS) is an assessment instrument used to identify memory and learning deficits and strengths in children ages five through 16. This study investigated the impact of culture and parent educational level (PEL) on student performance on the Children’s Memory Scale using the CMS standardization data. The major question addressed was: Will CMS subtest performance differ significantly between ethnic groups or as a function of PEL? The results of this study support a relationship between STM and WM performance and culture. Culture as defined by ethnicity minimally impacted student subtest performance on the CMS when PEL was taken into account. In contrast, PEL was significantly associated with student subtest performance within each ethnic group. Student subtest performance improved with each increase in PEL regardless of ethnicity. CMS subtest performance of Hispanic and African American students was most affected by PEL; however, no difference occurred in subtest performance by ethnicity or as a function of PEL for African American and Hispanic students on the Family Pictures subtest which examines visual and auditory memory processes through recall of everyday life tasks in meaningful context. Although statistical significance was found between CMS subtest performance and cultural factors, the effect sizes were mainly in the small range and variance was not specific to any one subtest. Larger effect sizes were found on verbal subtests which in previous studies have been found to be most impacted by quality of schooling and lower PELs. Mean score differences did not exceed one standard deviation with the exception of one subtest. The results of this study provide a better understanding of the effect of culture and PEL on memory and learning.

Cash, Deborah Dyer

2007-08-01T23:59:59.000Z

309

Distributed trace using central performance counter memory  

SciTech Connect

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L.; Sexton, James C.

2013-01-22T23:59:59.000Z

310

Distributed trace using central performance counter memory  

Science Conference Proceedings (OSTI)

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L; Sexton, James C

2013-10-22T23:59:59.000Z

311

Advanced Spintronic Materials - Programmaster.org  

Science Conference Proceedings (OSTI)

... Spin/Magnetic Logic Devices, Magnetic Random Access Memory, Giant/ Tunneling Magnetoresistance, Spin-Transfer-Torque, Spin-Orbit Torques, Spin Hall ...

312

Using FS-ST-FMR for MRAM Research  

Science Conference Proceedings (OSTI)

... Industry planners are concerned that the ubiquitous dynamic random access memory (DRAM) chip, a key component of computers for more than ...

2013-08-14T23:59:59.000Z

313

Property:EnergyAccessYearInitiated | Open Energy Information  

Open Energy Info (EERE)

EnergyAccessYearInitiated EnergyAccessYearInitiated Jump to: navigation, search Property Name EnergyAccessYearInitiated Property Type Date Description Year Initiated Pages using the property "EnergyAccessYearInitiated" Showing 10 pages using this property. B Benin: Increased Access to Modern Energy Project + 2009 + Burkina Faso Energy Access Project + 2007 + E Ethiopia Energy Access Project + 2005 + G Ghana Energy Development and Access Project (GEDAP) + 2007 + M Mongolia Renewable Energy and Rural Electricity Access Project + 2006 + P Papua New Guinea Improved Energy Access for Rural Communities + 2012 + R Republic of Yemen Energy Access Project + 2006 + S Sri Lanka Credit to Connect + 2011 + T Tanzania Energy Development and Access Expansion Project + 2007 + V Viet Nam Rural Electrification + 2009 +

314

Center for Nanoscale Materials User Access Program Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Materials User Access Program Overview Materials User Access Program Overview CNM User Access Program Overview 1. Objective ............................................................................................................................................... 1 2. Submission Guidelines .......................................................................................................................... 1 2.1 Proposal Content ............................................................................................................................ 1 3. Proposal Review Process ....................................................................................................................... 2 3.1 Proposal Evaluation Board .............................................................................................................. 2

315

Environment/Health/Safety/Security (EHSS): Building Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Access Building Access Access Control - On-site access is controlled by either keys or by LBNL's automated access control system. LBNL's automated access control system is used for exterior perimeter doors to most buildings, as well as some individual labs, offices, and equipment. The access system is linked to the LBNL Human Resources PeopleSoft database and is updated with the employees' or affiliates' current appointment status at the Laboratory. . If your LBNL appointment end date has expired, then your access will be suspended. Security Access Managers (SAM) Administrators - LBNL's automated access control system is a decentralized access permission control structure managed by each Division or major program via Security Access Managers (SAM) Administrators and In-putters. Go here for the current

316

Web accessibility testing: when the method is the culprit  

Science Conference Proceedings (OSTI)

Testing accessibility of a web site is still an art. Lack of appropriate definitions of accessibility and of standard testing methods are some of the reasons why Web accessibility is so difficult to achieve The paper describes a heuristic walkthrough ...

Giorgio Brajnik

2006-07-01T23:59:59.000Z

317

On Randomness in Quantum Mechanics  

E-Print Network (OSTI)

The quantum mechanical probability densities are compared with the probability densities treated by the theory of random variables. The relevance of their difference for the interpretation of quantum mechanics is commented.

Alberto C. de la Torre

2007-07-19T23:59:59.000Z

318

Random Distances Associated with Rhombuses  

E-Print Network (OSTI)

Parallelograms are one of the basic building blocks in two-dimensional tiling. They have important applications in a wide variety of science and engineering fields, such as wireless communication networks, urban transportation, operations research, etc. Different from rectangles and squares, the coordinates of a random point in parallelograms are no longer independent. As a case study of parallelograms, the explicit probability density functions of the random Euclidean distances associated with rhombuses are given in this report, when both endpoints are randomly distributed in 1) the same rhombus, 2) two parallel rhombuses sharing a side, and 3) two rhombuses having a common diagonal, respectively. The accuracy of the distance distribution functions is verified by simulation, and the correctness is validated by a recursion and a probabilistic sum. The first two statistical moments of the random distances, and the polynomial fit of the density functions are also given in this report for practical uses.

Yanyan Zhuang; Jianping Pan

2011-06-07T23:59:59.000Z

319

Universality for random matrices and log-gases  

E-Print Network (OSTI)

Eugene Wigner's revolutionary vision predicted that the energy levels of large complex quantum systems exhibit a universal behavior: the statistics of energy gaps depend only on the basic symmetry type of the model. Simplified models of Wigner's thesis have recently become mathematically accessible. For mean field models represented by large random matrices with independent entries, the celebrated Wigner-Dyson-Gaudin-Mehta (WDGM) conjecture asserts that the local eigenvalue statistics are universal. For invariant matrix models, the eigenvalue distributions are given by a log-gas with potential $V$ and inverse temperature $\\beta = 1, 2, 4$. corresponding to the orthogonal, unitary and symplectic ensembles. For $\\beta \

Laszlo Erdos

2012-12-04T23:59:59.000Z

320

NBP RFI: Data Access Honeywell Responses To Request for Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

RE: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Building Owners and Managers Association International on DOE Request for Information-Implementing the National...

322

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of...

323

RE: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Southern California Edison on DOE Request for Information-Implementing the National Broadband Plan by Empowering...

324

Environment/Health/Safety/Security (EHSS): Site Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Access Office Site Access Office Contact Information | Feedback Most-viewed links: Badging Getting a badge - new, stolen, or replacement. Building Access On-site access, key requests, Security Access Managers. Visitor Access Visitor passes, general information. Parking at the Lab Permits, parking map, vehicles registration, parking policy. Other information: FAQ Frequently Asked Questions. Foreign National Access Information on access to DOE sites. Gate Information Information on the different Lab gates. Getting to the Lab Directions and options for getting to Berkeley Lab: buses, carpooling, rapid transit, biking. Guest House Guest House information. Lost and Found Lost and found information and contacts. Meeting and Conference Meeting and conference procedures and general information.

325

Wind Access and Permitting Law | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access and Permitting Law Wind Access and Permitting Law < Back Eligibility Residential Savings Category Wind Buying & Making Electricity Program Info State Delaware Program Type...

326

Green Button Energy Data Access Expanding Across America | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Button Energy Data Access Expanding Across America Green Button Energy Data Access Expanding Across America October 17, 2012 - 6:01pm Addthis Utilities demonstrating the...

327

Re~ Request for Information NBP RFI: Data Access | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Re Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

328

Request for Information NBP RFI: Data Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

329

Reading Systems for eBooks Need to Become Accessible  

Science Conference Proceedings (OSTI)

Reading Systems for eBooks Need to Become Accessible. While the Publication Structure 1.0 spec is accessible, the reading systems are not. ...

2001-05-25T23:59:59.000Z

330

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

331

Solar access of residential rooftops in four California cities  

E-Print Network (OSTI)

the solar access of rooftop solar-energy systems, includingthermal collection by rooftop solar-energy equipment. It canthe solar access of rooftop solar-energy systems, including

Levinson, Ronnen

2010-01-01T23:59:59.000Z

332

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

333

Rail Access Modes and Catchment Areas for the BART System  

E-Print Network (OSTI)

parking supplies), ridership (e.g. , rail modal splits), andof California at Berkeley Rail Access Modes and CatchmentHypothesized Distributions of Rail Station Access Modes as a

Cervero, Robert

1995-01-01T23:59:59.000Z

334

City of Boulder - Solar Access Ordinance (Colorado) | Open Energy...  

Open Energy Info (EERE)

solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

335

ORISE Resources: Equal Access Initiative Computer Grants Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Equal Access Initiative Computer Grants Program The Equal Access Initiative Computer Grants Program is sponsored by the National Minority AIDS Council (NMAC) and the National...

336

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

337

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

338

Test Procedure for §170.302 (p) Emergency Access  

Science Conference Proceedings (OSTI)

... September 24, 2010 1 Test Procedure for §170.302 (p) Emergency Access ... 170.302(p) Emergency Access. Permit authorized users ...

2013-11-06T23:59:59.000Z

339

Uniform Transboundary Pollution Reciprocal Access Act (Montana) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Institutional Fuel Distributor Transportation Program Info State Montana Program Type Environmental Regulations This Act allows any entity in a Reciprocating Jurisdiction harmed by pollution originating in the state of Montana to bring an action or other proceeding against the source of that pollution in the state of Montana. Such an entity has the same rights in the state of Montana as they would if

340

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access NBP RFI: Data Access NBP RFI: Data Access The National Rural Electric Cooperative Association (NRECA) is the national service organization representing more than 900 not-for-profit, member-owned rural electric cooperatives ("Cooperatives"). Most of NRECA's members are distribution cooperatives, providing retail electric service to more than 42 million consumers in 47 states. NRECA members also include approximately 66 generation and transmission ("G&T") cooperatives that supply wholesale power to their distribution cooperative member-owners. Cooperatives provide service to approximately 75 percent of the nation's land mass, resulting in a consumer density of just seven consumers per mile of line, significantly less density than that of

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Notices Electronic Access to This Document:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

805 Federal Register 805 Federal Register / Vol. 77, No. 67 / Friday, April 6, 2012 / Notices Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document Format (PDF). To use PDF you must have Adobe Acrobat Reader, which is available free at the site. You may also access documents of the Department published in the Federal Register by using the article search feature at: www.federalregister.gov.

342

Shape memory system with integrated actuation using embedded particles  

SciTech Connect

A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

2009-09-22T23:59:59.000Z

343

Shape memory system with integrated actuation using embedded particles  

DOE Patents (OSTI)

A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

2012-05-29T23:59:59.000Z

344

Algorithmic randomness, quantum physics, and incompleteness  

Science Conference Proceedings (OSTI)

Is randomness in quantum mechanics “algorithmically random”? Is there any relation between Heisenberg's uncertainty relation and Gödel's incompleteness? Can quantum randomness be used to trespass the Turing's barrier? Can ...

Cristian S. Calude

2004-09-01T23:59:59.000Z

345

Security and Access Policy Security of and access to campus facilities, including campus residences  

E-Print Network (OSTI)

Security and Access Policy Security of and access to campus facilities, including campus residences facilities. Residence halls are secured 24 hours a day. Over extended breaks, the doors of all residence halls will be secured around the clock. Some facilities may have individual hours, which may vary

Escher, Christine

346

Quantum internet using code division multiple access  

E-Print Network (OSTI)

A crucial open problem in large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

Jing Zhang; Yu-xi Liu; Sahin Kaya Ozdemir; Re-Bing Wu; Feifei Gao; Xiang-Bin Wang; Lan Yang; Franco Nori

2012-04-08T23:59:59.000Z

347

The non-trivial random walk of stock prices  

E-Print Network (OSTI)

We investigate the random walk of prices by developing a simple model relating the properties of the signs and absolute values of individual price changes to the diffusion rate (volatility) of prices at longer time scales. We find that for one hour intervals this model consistently over-predicts the observed volatility of real price series by about 40%, and that this effect becomes stronger as the length of the intervals increases. By selectively shuffling some components of the data while preserving others we are able to show that this discrepancy is caused by a subtle but long-range non-contemporaneous correlation between the signs and sizes of individual returns. We conjecture that this is related to the long-memory of transaction signs and the need to enforce market efficiency.

La Spada, Gabriele; Lillo, Fabrizio

2007-01-01T23:59:59.000Z

348

Localization for Branching Random Walks in Random Environment  

E-Print Network (OSTI)

We consider branching random walks in $d$-dimensional integer lattice with time-space i.i.d. offspring distributions. This model is known to exhibit a phase transition: If $d \\ge 3$ and the environment is "not too random", then, the total population grows as fast as its expectation with strictly positive probability. If,on the other hand, $d \\le 2$, or the environment is ``random enough", then the total population grows strictly slower than its expectation almost surely. We show the equivalence between the slow population growth and a natural localization property in terms of "replica overlap". We also prove a certain stronger localization property, whenever the total population grows strictly slower than its expectation almost surely.

Yueyun Hu; Nobuo Yoshida

2007-12-05T23:59:59.000Z

349

Scalla: Structured Cluster Architecture for Low Latency Access  

Science Conference Proceedings (OSTI)

Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

2012-03-20T23:59:59.000Z

350

Compile-Time Compaction Of Traces For Memory Simulation  

E-Print Network (OSTI)

This thesis examines compile-time compaction of program execution traces. It presents a new method for compacting traces for memory simulation. Further, it describes a tool prototype that implements the method. Experiments with the tool prototype show that the new method reduces the time needed in simulating the operation of memories. Memory simulation is needed in the performance analysis and in the design of programs. In high performance applications, the data transfer between different layers of memory is one of the main bottlenecks. A program execution trace is a list of memory references. Using traces as simulation inputs is a flexible way of analyzing the memory perfor...

Vesa Hirvisalo; Vesa Hirvisalo; Dr. Tech Esko Nuutila

1998-01-01T23:59:59.000Z

351

Open Access and UK universities: an introduction  

E-Print Network (OSTI)

both Gold and Green OA options but with a preference for Gold (= immediate access and maximum opportunity for re-use) • Preferred Green embargos: max. 6 months (STEM) & 12 months (A/H/SS) – but 12 /24 months are acceptable during transition period...

Morgan, Peter

2013-05-17T23:59:59.000Z

352

Securing network access in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure ... Keywords: elliptic curve cryptography, security, sensor networks

Kun Sun; An Liu; Roger Xu; Peng Ning; Douglas Maughan

2009-03-01T23:59:59.000Z

353

Providing Access to High Performance Computing Technologies  

E-Print Network (OSTI)

Providing Access to High Performance Computing Technologies Jack Dongarra 1 , Shirley Browne 2 to high performance computing technologies. One effort, the National HPCC Software Exchange, is providing scientists involved with High Performance Computing and Communications (HPCC) [1] 3 . The NHSE facilitates

Dongarra, Jack

354

Consumer Devices for eCommerce Access  

Science Conference Proceedings (OSTI)

It is widely predicted that electronic commerce will have a far-reaching impact on businesses in the next few years. For this to occur it will be essential that users are able to access and use eCommerce services when and where they wish, at times and ...

M. C. Revett; G. J. South

1999-07-01T23:59:59.000Z

355

Creating home network access for the elderly  

Science Conference Proceedings (OSTI)

Wireless broadband networks for home environment present us with many challenges unfamiliar in more public settings. At home, we encounter the end-users with little ICT experience. Probably among the most challenging members of the home network are the ... Keywords: accessibility, authentication, home networks, security, usability, user interface design

Kristiina Karvonen

2007-07-01T23:59:59.000Z

356

The capacity of hybrid quantum memory  

E-Print Network (OSTI)

The general stable quantum memory unit is a hybrid consisting of a classical digit with a quantum digit (qudit) assigned to each classical state. The shape of the memory is the vector of sizes of these qudits, which may differ. We determine when N copies of a quantum memory A embed in N(1+o(1)) copies of another quantum memory B. This relationship captures the notion that B is as at least as useful as A for all purposes in the bulk limit. We show that the embeddings exist if and only if for all p >= 1, the p-norm of the shape of A does not exceed the p-norm of the shape of B. The log of the p-norm of the shape of A can be interpreted as the maximum of S(\\rho) + H(\\rho)/p (quantum entropy plus discounted classical entropy) taken over all mixed states \\rho on A. We also establish a noiseless coding theorem that justifies these entropies. The noiseless coding theorem and the bulk embedding theorem together say that either A blindly bulk-encodes into B with perfect fidelity, or A admits a state that does not visibly bulk-encode into B with high fidelity. In conclusion, the utility of a hybrid quantum memory is determined by its simultaneous capacity for classical and quantum entropy, which is not a finite list of numbers, but rather a convex region in the classical-quantum entropy plane.

Greg Kuperberg

2002-03-21T23:59:59.000Z

357

Organic Data Memory using the DNA Approach  

Science Conference Proceedings (OSTI)

A data preservation problem looms large behind today's information superhighway. During the prehistoric age, humans preserved their knowledge by engraving bones and rocks. About two millenniums ago, people invented paper and started writing and publishing. In today?s electronic age, we use magnetic media and silicon chips to store our data. But bones and rocks erode, paper disintegrates, and electronic memory simply loses its contents into thin air. All these storage media require constant attention to maintain their information content. All of them can easily be destroyed intentionally or accidentally by people or natural disasters. With the large amount of information generated by our society every day, it is time to think of a new generation of data memory. In an effort to search for an inexpensive and lasting data memory, scientists at the Pacific Northwest National Laboratory (PNNL) have investigated the use of deoxyribonucleic acid--commonly known as DNA--as an information storage medium since 1998. The ambitious goal is to develop a data memory technology that has a life expectancy much longer than any of the existing ones. The creation of our initial DNA memory prototype consists of four major steps: encoding meaningful information as artificial DNA sequences, transforming the sequences to living organisms, allowing the organisms to grow and multiply, and eventually extracting the information back from the organisms. This article describes the objective of our investigation, followed by a brief description of our recent experiments and several potential applications being considered at PNNL.

Wong, Pak C.; Wong, Kwong K.; Foote, Harlan P.

2003-01-01T23:59:59.000Z

358

Julian Szekely Memorial Symposium: Royal Sonesta Hotel  

Science Conference Proceedings (OSTI)

... easy access to the historic waterfront, Quincy Market and the financial district. ... If you need any additional information on location directions, please contact ...

359

Speed control system for an access gate  

DOE Patents (OSTI)

An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

Bzorgi, Fariborz M. (Knoxville, TN)

2012-03-20T23:59:59.000Z

360

5.3 Identity Management - Data Access Authorization Policy ...  

Science Conference Proceedings (OSTI)

****WORKING DOCUMENT****. 5.3 Identity Management - Data Access Authorization Policy Management in the Cloud. ...

2010-11-02T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

An access control model for dynamic client-side content  

Science Conference Proceedings (OSTI)

The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources are usually static, and an access control policy ... Keywords: access control, authentication, credentials, trust negotiation

Adam Hess; Kent E. Seamons

2003-06-01T23:59:59.000Z

362

Chemistry Central Journal Commentary Open access and medicinal chemistry  

E-Print Network (OSTI)

This is an Open Access article distributed under the terms of the Creative Commons Attribution License

Chris Swain; Chris Swain

2007-01-01T23:59:59.000Z

363

Guidelines for Handling Confidential Information by Remote Access  

E-Print Network (OSTI)

Guidelines for Handling Confidential Information by Remote Access You have signed an OHSU of your access to OHSU electronic information and/or other sanctions. Remember, using remote access of the OHSU facilities. When you are utilizing remote access, you must provide the same level of security used

Chapman, Michael S.

364

NIST Offering Free Access to Standards for First Responders  

Science Conference Proceedings (OSTI)

NIST Offering Free Access to Standards for First Responders. From NIST Tech Beat: April 26, 2011. ...

2011-04-26T23:59:59.000Z

365

Privacy, Security, Accessibility, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

low-power source of flash memory and data storage. Find out more about how these nano-sized particles could be applied to phase-change random access memory technologies and...

367

Positional Games on Random Graphs  

E-Print Network (OSTI)

We introduce and study Maker/Breaker-type positional games on random graphs. Our main concern is to determine the threshold probability pF for the existence of Maker's strategy to claim a member of in the unbiased game played on the edges of random graph G(n, p), for various target families of winning sets. More generally, for each probability above this threshold we study the smallest bias b such that Maker wins the (1: b) biased game. We investigate these functions for a number of basic games, like the connectivity game, the perfect matching game, the clique game and the Hamiltonian cycle game.

Milos Stojakovic; Tibor Szabo

2005-01-01T23:59:59.000Z

368

Truncations of Random Orthogonal Matrices  

E-Print Network (OSTI)

Statistical properties of non--symmetric real random matrices of size $M$, obtained as truncations of random orthogonal $N\\times N$ matrices are investigated. We derive an exact formula for the density of eigenvalues which consists of two components: finite fraction of eigenvalues are real, while the remaining part of the spectrum is located inside the unit disk symmetrically with respect to the real axis. In the case of strong non--orthogonality, $M/N=$const, the behavior typical to real Ginibre ensemble is found. In the case $M=N-L$ with fixed $L$, a universal distribution of resonance widths is recovered.

Boris A. Khoruzhenko; Hans-Juergen Sommers; Karol Zyczkowski

2010-08-12T23:59:59.000Z

369

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

370

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

371

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

372

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

373

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

374

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

375

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

376

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

377

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

378

Query Evaluation in the Presence of Fine-grained Access Control.  

E-Print Network (OSTI)

??Access controls are mechanisms to enhance security by protecting data from unauthorized accesses. In contrast to traditional access controls that grant access rights at the… (more)

Zhang, Huaxin

2008-01-01T23:59:59.000Z

379

Memorandum Memorializing Ex Parte Communication, DOE impending  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Memorandum Memorializing Ex Parte Communication, DOE impending Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. The meeting was requested by AMCA International to introduce the association's leadership, standards, and experience in developing fan standards to DOE; to learn more about the DOE process for developing regulations for fan efficiency standards; and to inform DOE on how commercial and industrial fan markets work. AMCA_Ex_Parte.pdf More Documents & Publications DOE-STD-1168-2013 DOE Meeting Memorandum: Ex Parte Communications Independent Oversight Review, Savannah River Site - August 2011

380

Home-based Shared Virtual Memory  

E-Print Network (OSTI)

In this dissertation, I investigate how to improve the performance of shared virtual memory (SVM) by examining consistency models, protocols, hardware support and applications. The main conclusion of this research is that the performance of shared virtual memory can be significantly improved when performance-enhancing techniques from all these areas are combined. This dissertation proposes home-based lazy release consistency as a simple, effective, and scalable way to build shared virtual memory systems. In home-based protocols each shared page has a home to which all writes are propagated and from which all copies are derived. Two home-based protocols are described, implemented and evaluated on two hardware and software platforms: Automatic Update Release Consistency (AURC), which requires hardware support for fine-grained remote writes (automatic updates), and Homebased Lazy Release Consistency (HLRC), which is implemented exclusively in software. The dissertation investigates the ...

Liviu Iftode

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Profile Guided Load Marking for Memory Renaming  

E-Print Network (OSTI)

Memory operations remain a significant bottleneck in dynamically scheduled pipelined processors, due in part to the inability to statically determine the existence of memory address dependencies. Hardware memory renaming techniques have been proposed which predict which stores a load might be dependent upon. These prediction techniques can be used to speculatively forward a value from a predicted store dependency to a load through a value prediction table; however, these techniques require large and time-consuming hardware tables. In this paper we propose a software-guided approach for identifying dependencies between store and load instructions and the Load Marking (LM) architecture to communicate these dependencies to the hardware. Compiler analysis and profiles are used to find important store/load relationships, and these relationships are identified during execution via hints or an n-bit tag. For those loads that are not marked for renaming, we then use additional profiling inform...

Glenn Reinman; Brad Calder; Dean Tullsen; Gary Tyson; Todd Austin

1998-01-01T23:59:59.000Z

382

DIODE STEERED MANGETIC-CORE MEMORY  

DOE Patents (OSTI)

A word-arranged magnetic-core memory is designed for use in a digital computer utilizing the reverse or back current property of the semi-conductor diodes to restore the information in the memory after read-out. In order to ob tain a read-out signal from a magnetic core storage unit, it is necessary to change the states of some of the magnetic cores. In order to retain the information in the memory after read-out it is then necessary to provide a means to return the switched cores to their states before read-out. A rewrite driver passes a pulse back through each row of cores in which some switching has taken place. This pulse combines with the reverse current pulses of diodes for each column in which a core is switched during read-out to cause the particular cores to be switched back into their states prior to read-out. (AEC)

Melmed, A.S.; Shevlin, R.T.; Laupheimer, R.

1962-09-18T23:59:59.000Z

383

Memory device using movement of protons  

DOE Patents (OSTI)

An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

2000-01-01T23:59:59.000Z

384

Shape Memory Behavior of Heat Treated Ni60Ti40 (wt%)  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Shape Memory Behavior of Heat ...

385

THE FOUNDATION, INC. THE ALLEN SHACKELFORD AIFD MEMORIAL SCHOLARSHIP FUND  

E-Print Network (OSTI)

THE FOUNDATION, INC. THE ALLEN SHACKELFORD AIFD MEMORIAL SCHOLARSHIP FUND THE EULALAH OVERMEYER of an application for scholarship under The Allen Shackelford AIFD Memorial Scholarship Fund, The Eulalah Overmeyer

Schweik, Charles M.

386

Estimating Local Memory of Tropical Cyclones through MPI Anomaly Evolution  

Science Conference Proceedings (OSTI)

This study examines the local memory of atmospheric and oceanic changes associated with a tropical cyclone (TC). The memory is quantified through anomalous maximum potential intensity (MPI) evolution for 20 days prior to the arrival of a TC ...

Robert E. Hart; Ryan N. Maue; Michael C. Watson

2007-12-01T23:59:59.000Z

387

Dynamic Memory Optimization using Pool Allocation and Prefetching  

E-Print Network (OSTI)

Heap memory allocation plays an important role in modern applications. Conventional heap allocators, however, generally ignore the underlying memory hierarchy of the system, favoring instead a low runtime overhead and fast ...

Zhao, Qin

388

Speedy transactions in multicore in-memory databases  

Science Conference Proceedings (OSTI)

Silo is a new in-memory database that achieves excellent performance and scalability on modern multicore machines. Silo was designed from the ground up to use system memory and caches efficiently. For instance, it avoids all centralized contention points, ...

Stephen Tu, Wenting Zheng, Eddie Kohler, Barbara Liskov, Samuel Madden

2013-11-01T23:59:59.000Z

389

Design and Implementation of High Speed Memory in 130 nm  

Science Conference Proceedings (OSTI)

This paper deals with the design and analysis of high speed SRAM memory using ATD (Address Transition Detector) technique in 130 nm with the capacitive load of the memory is 5pF

Sampath Kumar; Arti Noor; Sanjay Kr. Singh

2010-01-01T23:59:59.000Z

390

Intellectual property strategy : analysis of the flash memory industry  

E-Print Network (OSTI)

This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

Ogura, Tomoko H

2006-01-01T23:59:59.000Z

391

Teapot: language support for writing memory coherence protocols  

Science Conference Proceedings (OSTI)

Recent shared-memory parallel computer systems offer the exciting possibility of customizing memory coherence protocols to fit an application's semantics and sharing patterns. Custom protocols have been used to achieve message-passing performance---while ...

Satish Chandra; Brad Richards; James R. Larus

1996-05-01T23:59:59.000Z

392

Purify: Fast Detection of Memory Leaks and Access Errors This paper describes Purify, a software testing and quality assurance tool that detects memory leaks and  

E-Print Network (OSTI)

], Catalytix [Feuer85] and various similar malloc_debug packages use. Byte and two-byte checking cannot spent eliminating leaks in the X11R4 server for Sun workstations. All that effort, yet dozens of leaks as gcc. The data was collected on a Sun SPARCstation SLC running SUNOS 4.1.1, and all times are real

Qin, Feng

393

Randomized Benchmarking of Quantum Gates  

E-Print Network (OSTI)

A key requirement for scalable quantum computing is that elementary quantum gates can be implemented with sufficiently low error. One method for determining the error behavior of a gate implementation is to perform process tomography. However, standard process tomography is limited by errors in state preparation, measurement and one-qubit gates. It suffers from inefficient scaling with number of qubits and does not detect adverse error-compounding when gates are composed in long sequences. An additional problem is due to the fact that desirable error probabilities for scalable quantum computing are of the order of 0.0001 or lower. Experimentally proving such low errors is challenging. We describe a randomized benchmarking method that yields estimates of the computationally relevant errors without relying on accurate state preparation and measurement. Since it involves long sequences of randomly chosen gates, it also verifies that error behavior is stable when used in long computations. We implemented randomized benchmarking on trapped atomic ion qubits, establishing a one-qubit error probability per randomized pi/2 pulse of 0.00482(17) in a particular experiment. We expect this error probability to be readily improved with straightforward technical modifications.

E. Knill; D. Leibfried; R. Reichle; J. Britton; R. B. Blakestad; J. D. Jost; C. Langer; R. Ozeri; S. Seidelin; D. J. Wineland

2007-07-06T23:59:59.000Z

394

Expanders via random spanning trees  

Science Conference Proceedings (OSTI)

Motivated by the problem of routing reliably and scalably in a graph, we introduce the notion of a splicer, the union of spanning trees of a graph. We prove that for any bounded-degree n-vertex graph, the union of two random spanning ...

Navin Goyal; Luis Rademacher; Santosh Vempala

2009-01-01T23:59:59.000Z

395

Accelerometers and randomness: perfect together  

Science Conference Proceedings (OSTI)

Accelerometers are versatile sensors that are nearly ubiquitous. They are available on a wide variety of devices and are particularly common on those that are mobile or have wireless capabilities. Accelerometers are applicable in a number of settings ... Keywords: computational RFID, random number generation, sensors, ubiquitous computing

Jonathan Voris; Nitesh Saxena; Tzipora Halevi

2011-06-01T23:59:59.000Z

396

Precipitate Phases in Several High Temperature Shape Memory ...  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Precipitate Phases in Several High ...

397

Improving the Performance of Software Distributed Shared Memory with Speculation  

E-Print Network (OSTI)

in a release consistent software distributed shared memory system. We propose a new protocol, Speculative Home-based

Alvisi, Lorenzo

398

Physical and Mechanical Metallurgy of Shape Memory Alloys for ...  

Science Conference Proceedings (OSTI)

About this Symposium. Meeting, 2011 TMS Annual Meeting & Exhibition. Symposium, Physical and Mechanical Metallurgy of Shape Memory Alloys for Actuator ...

399

Societal Implicit Memory and his Speed on Tracking Extrema in ...  

E-Print Network (OSTI)

of emergent adaptive memory, cooperative learning and perception ..... comparison purposes, we plotted bold curves for static Ackley functions with respective ...

400

LOUIS CALDER MEMORIAL LIBRARY AND BIOMEDICAL COMMUNICATIONS  

E-Print Network (OSTI)

's online catalog provides full bibliographic access, by title, subject, author, and keyword, to all from a citation directly to the full text of the article. · Google and Google Scholar provide oneclick access from many citations identified in a search directly to the full text of the articles

Shyu, Mei-Ling

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Pricing and Security of ResidentialPricing and Security of Residential Broadband AccessBroadband Access  

E-Print Network (OSTI)

and Department of Electrical Engineering Pennsylvania State University kesidis@engr.psu.edu Carlos Kirjner McKinsey and Company, New York Carlos_Kirjner@Mckinsey.com #12;2 OutlineOutline Growth in residential broadband access

Yener, Aylin

402

The nature of the working memory system underlying language processing and its relationship to the long-term memory system  

E-Print Network (OSTI)

This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

Fedorenko, Evelina Georgievna

2007-01-01T23:59:59.000Z

403

Executive Order 12968 Access to Classified Information  

NLE Websites -- All DOE Office Websites (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

404

Access Venture Partners | Open Energy Information  

Open Energy Info (EERE)

Logo: Access Venture Partners Name Access Venture Partners Address 8787 Turnpike Drive, Suite 260 Place Westminster, Colorado Zip 80030 Region Rockies Area Product Venture Capital Number of employees 1-10 Year founded 1998 Phone number 303-426-8899 Website http://www.accessvp.com/ Coordinates 39.854298°, -105.052635° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.854298,"lon":-105.052635,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

405

NSLS User Access | Requesting Beam Time  

NLE Websites -- All DOE Office Websites (Extended Search)

Requesting Beam Time Requesting Beam Time Use one of the following options depending on your research: General User Proposal General User proposals are peer reviewed for scientific merit by a Proposal Review Panel (PRP). General User proposals compete for beamtime with other General User Proposals based on scientific merit. Once the original proposal and beam time request is reviewed and rated in the PASS System, additional beam time requests can be submitted against the original proposal for its lifetime, a period of up to six cycles (two years). Data taken during experiments associated with a General User proposal is considered to be in the public domain. There is no charge for General User beamtime. Rapid Access Rapid Access proposals are a subset of General User proposals available for

406

Accounts & Access | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Account Information Accounts and Access FAQ Connect & Log In Using CRYPTOCards SSH Keys on Surveyor Disk Space Quota Management Allocations Decommissioning of BG/P Systems and Resources Blue Gene/Q Versus Blue Gene/P Mira/Cetus/Vesta Intrepid/Challenger/Surveyor Tukey Eureka / Gadzooks Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Accounts & Access Account Information Account Information: All computing carried out on the ALCF systems is associated with a user "account." This account is used to log onto the login servers and run jobs on the resources. Using CRYPTOcards Using CRYPTOCards: Useful information to guide you in using and troubleshooting your CRYPTOcard.

407

Easy Access to Energy Improvement Funds  

NLE Websites -- All DOE Office Websites (Extended Search)

EASY ACCESS TO ENERGY IMPROVEMENT EASY ACCESS TO ENERGY IMPROVEMENT FUNDS IN THE PUBLIC SECTOR Are you postponing the installation of energy efficiency projects because the money is not in your current budget? Do you find yourself weighing the benefits of installing energy efficiency equipment today against the hassles and expense of requesting new or additional debt? Are energy efficiency projects being delayed because you are understaffed? If you answered "YES" to any of these questions, you will be happy to know there are several simple, fast, legal, and well-tested financing alternatives that may address your concerns. In the public sector, two of the most popular mechanisms for financing energy efficiency projects are performance contracts and tax- exempt lease-purchase agreements. A

408

Safety testing for LHC access system  

E-Print Network (OSTI)

In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of systemâ??s models through an automatic systemâ??s state space exploration against some property formulas.

Valentini, F; Ninin, P; Scibile, S

2008-01-01T23:59:59.000Z

409

Open Access Transmission and Renewable Energy Technologies  

Science Conference Proceedings (OSTI)

In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

Porter, K.

1996-09-01T23:59:59.000Z

410

Direct match data flow memory for data driven computing  

DOE Patents (OSTI)

A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

1997-01-01T23:59:59.000Z

411

Performance implications of fence-based memory models  

Science Conference Proceedings (OSTI)

Most mainstream shared-memory parallel programming languages are converging to a memory model, or shared variable semantics, centered on providing sequential consistency for most data-race-free programs. OpenMP, along with a small number of other languages, ... Keywords: OpenMP, atomic operations, critical sections, fences, locks, memory model

Hans-J. Boehm

2011-06-01T23:59:59.000Z

412

Guide wire extension for shape memory polymer occlusion removal devices  

DOE Patents (OSTI)

A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

Maitland, Duncan J. (Pleasant Hill, CA); Small, IV, Ward (Livermore, CA); Hartman, Jonathan (Sacramento, CA)

2009-11-03T23:59:59.000Z

413

Quantum interference of electromagnetic fields from remote quantum memories  

E-Print Network (OSTI)

We observe quantum, Hong-Ou-Mandel, interference of fields produced by two remote atomic memories. High-visibility interference is obtained by utilizing the finite atomic memory time in four-photon delayed coincidence measurements. Interference of fields from remote atomic memories is a crucial element in protocols for scalable generation of multi-node remote qubit entanglement.

T. Chaneliere; D. N. Matsukevich; S. D. Jenkins; S. -Y. Lan; R. Zhao; T. A. B. Kennedy; A. Kuzmich

2006-09-27T23:59:59.000Z

414

Nonlinear quantization on Hebbian-type associative memories  

Science Conference Proceedings (OSTI)

Hebbian-type associative memory is characterized by its simple architecture. However, the hardware implementation of Hebbian-type associative memories is normally complicated when there are a huge number of patterns stored. To simplify the interconnection ... Keywords: Hebbian-type associative memory, Interconnection, Neuron, Nonlinear quantization, Probability of direct convergence

Chishyan Liaw; Ching-Tsorng Tsai; Chao-Hui Ko

2012-06-01T23:59:59.000Z

415

Energy Efficient Proactive Thermal Management in Memory Subsystem  

E-Print Network (OSTI)

Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

Simunic, Tajana

416

Self-Optimizing Memory Controllers: A Reinforcement Learning Approach  

Science Conference Proceedings (OSTI)

Efficiently utilizing off-chip DRAM bandwidth is a critical issuein designing cost-effective, high-performance chip multiprocessors(CMPs). Conventional memory controllers deliver relativelylow performance in part because they often employ fixed,rigid ... Keywords: Chip Multiprocessors, Memory Systems, Memory Controller, Machine Learning, Reinforcement Learning

Engin Ipek; Onur Mutlu; José F. Martínez; Rich Caruana

2008-06-01T23:59:59.000Z

417

Buffer memory optimization for video codec application modeled in Simulink  

Science Conference Proceedings (OSTI)

Reduction of the on-chip memory size is a key issue in video codec system design. Because video codec applications involve complex algorithms that are both data-intensive and control-dependent, memory optimization based on global and precise analysis ... Keywords: Simulink, memory size reduction, video codec application

Sang-Il Han; Xavier Guerin; Soo-Ik Chae; Ahmed A. Jerraya

2006-07-01T23:59:59.000Z

418

A memory aid with remote communication using distributed technology  

Science Conference Proceedings (OSTI)

Electronic memory aids have been used successfully to give reminders to individuals with memory problems. These aids usually present short action reminders that are acknowledged by the user. The recent enhancement of handheld computers with wireless ... Keywords: Elderly, Memory-impaired users, Personal digital assistant, Remote communication

Andrea Szymkowiak; Kenny Morrison; Peter Gregor; Prveen Shah; J. Evans; A. Wilson

2005-01-01T23:59:59.000Z

419

Accessibility in 5-Axis Milling Environment  

E-Print Network (OSTI)

Using algorithms from computer graphics, namely hidden line and surface removal, techniques have been constructed to derive the 3-axis visible or millable set of a computer model from a given orientation or simulate and verify machining toolpaths. In this paper, an approach that reduces the accessibility problem of 5-axis milling using a flat end tool into a 3-axis accessibility problem is discussed. Using this approach, global detection of possible gouging into other parts, while a 5-axis flat end mill is in use, is made feasible and collisions can be avoided. Key Words: NURBs, accessibility, 5-axis machining. 1 Introduction Several methods are in use, when freeform computer models are realized using milling machines. Possibly the most common approach utilizes a ball end tool with three degrees of freedom, namely translation in x, y, and z [1, 2, 4, 5, 6, 7]. The ball end center of the tool follows an offset [8] to the model by the tool radius while the ball end surface is tangent to...

Gershon Elber

1997-01-01T23:59:59.000Z

420

Alternative Fuels Data Center: Access to State Alternative Fueling Stations  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Access to State Access to State Alternative Fueling Stations to someone by E-mail Share Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Facebook Tweet about Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Twitter Bookmark Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Google Bookmark Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Delicious Rank Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Digg Find More places to share Alternative Fuels Data Center: Access to State Alternative Fueling Stations on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Access to State Alternative Fueling Stations

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Predicting locality phases for dynamic memory optimization  

Science Conference Proceedings (OSTI)

Dynamic data, cache, and memory adaptation can significantly improve program performance when they are applied on long continuous phases of execution that have dynamic but predictable locality. To support phase-based adaptation, this paper defines the ... Keywords: Dynamic optimization, Locality analysis and optimization, Phase hierarchy, Program phase prediction, Reconfigurable architecture

Xipeng Shen; Yutao Zhong; Chen Ding

2007-07-01T23:59:59.000Z

422

A Memory Efficient 3-D DWT Architecture  

Science Conference Proceedings (OSTI)

This paper proposes a memory efficientreal-time 3-D DWT algorithm and its architectural implementation. As the running JD-DWT refreshes the wavelet coefficients with the arrival of every two newframes, the latency of the conventional 3D-DWT reduces by ...

B. Das; Swapna Banerjee

2003-01-01T23:59:59.000Z

423

Verifying concurrent memory reclamation algorithms with grace  

Science Conference Proceedings (OSTI)

Memory management is one of the most complex aspects of modern concurrent algorithms, and various techniques proposed for it--such as hazard pointers, read-copy-update and epoch-based reclamation--have proved very challenging for formal reasoning. In ...

Alexey Gotsman; Noam Rinetzky; Hongseok Yang

2013-03-01T23:59:59.000Z

424

Evaluating operating system vulnerability to memory errors  

Science Conference Proceedings (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While ... Keywords: DRAM failures, fault-tolerance, operating systems

Kurt B. Ferreira; Kevin Pedretti; Ron Brightwell; Patrick G. Bridges; David Fiala; Frank Mueller

2012-06-01T23:59:59.000Z

425

A performance study of memory consistency models  

Science Conference Proceedings (OSTI)

Recent advances in technology are such that the speed of processors is increasing faster than memory latency is decreasing. Therefore the relative cost of a cache miss is becoming more important. However, the full cost of a cache miss need not be paid ...

Richard N. Zucker; Jean-Loup Baer

1992-04-01T23:59:59.000Z

426

Cohesion: a hybrid memory model for accelerators  

Science Conference Proceedings (OSTI)

Two broad classes of memory models are available today: models with hardware cache coherence, used in conventional chip multiprocessors, and models that rely upon software to manage coherence, found in compute accelerators. In some systems, both types ... Keywords: accelerator, cache coherence, computer architecture

John H. Kelm; Daniel R. Johnson; William Tuohy; Steven S. Lumetta; Sanjay J. Patel

2010-06-01T23:59:59.000Z

427

Hybrid cache architecture with disparate memory technologies  

Science Conference Proceedings (OSTI)

Caching techniques have been an efficient mechanism for mitigating the effects of the processor-memory speed gap. Traditional multi-level SRAM-based cache hierarchies, especially in the context of chip multiprocessors (CMPs), present many challenges ... Keywords: hybrid cache architecture, three-dimensional ic

Xiaoxia Wu; Jian Li; Lixin Zhang; Evan Speight; Ram Rajamony; Yuan Xie

2009-06-01T23:59:59.000Z

428

Generating Cosmological Gaussian Random Fields  

E-Print Network (OSTI)

We present a generic algorithm for generating Gaussian random initial conditions for cosmological simulations on periodic rectangular lattices. We show that imposing periodic boundary conditions on the real-space correlator and choosing initial conditions by convolving a white noise random field results in a significantly smaller error than the traditional procedure of using the power spectrum. This convolution picture produces exact correlation functions out to separations of L/2, where L is the box size, which is the maximum theoretically allowed. This method also produces tophat sphere fluctuations which are exact at radii $ R \\le L/4 $. It is equivalent to windowing the power spectrum with the simulation volume before discretizing, thus bypassing sparse sampling problems. The mean density perturbation in the volume is no longer constrained to be zero, allowing one to assemble a large simulation using a series of smaller ones. This is especially important for simulations of Lyman-$\\alpha$ systems where sma...

Pen, U L

1997-01-01T23:59:59.000Z

429

Lecture 2227 Continuous Random Variables  

E-Print Network (OSTI)

-x/100 dx = -e-x/100 100 0 = 1 - e-1 = .632 text typo Example 3 (Light Bulb): The lifetime X, in hours, of a certain kind of light bulb is a continuous random variable with density f(x) = 1500 x2 I(1500,) Check = 1 4 = p Let B denote the number of failures before 2000 hours among 5 light bulbs. Then P(B 1) = P

Scholz, Fritz

430

Lecture 2227 Continuous Random Variables  

E-Print Network (OSTI)

) = 100 0 1 100 e-x/100 dx = -e-x/100 100 0 = 1 - e-1 = .632 text typo Example 3 (Light Bulb): The lifetime X, in hours, of a certain kind of light bulb is a continuous random variable with density f 2000 1500 = 1 - 3 4 = 1 4 = p Let B denote the number of failures before 2000 hours among 5 light bulbs

Scholz, Fritz

431

Alternative Fuels Data Center: Public Access to State Compressed Natural  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Public Access to State Public Access to State Compressed Natural Gas (CNG) Fueling Stations to someone by E-mail Share Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Facebook Tweet about Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Twitter Bookmark Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Google Bookmark Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Delicious Rank Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Digg Find More places to share Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on

432

Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Limited Speed Vehicle Limited Speed Vehicle Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Google Bookmark Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Delicious Rank Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Limited Speed Vehicle Access to Roadways A limited speed vehicle is defined as a vehicle that is capable of

433

Solar/Wind Access Policy | Open Energy Information  

Open Energy Info (EERE)

Solar/Wind Access Policy Solar/Wind Access Policy < Solar Jump to: navigation, search Solar and wind access laws are designed to establish a right to install and operate a solar or wind energy system at a home or other facility. Some solar access laws also ensure a system owner's access to sunlight. These laws may be implemented at both the state and local levels. In some states, access rights prohibit homeowners associations, neighborhood covenants and local ordinances from restricting a homeowner's right to use solar energy. Easements, the most common form of solar access law, allow for the rights to existing access to a renewable resource on the part of one property owner to be secured from an owner whose property could be developed in such a way as to restrict that resource. An easement is

434

Web accessibility compliance of government web sites in Korea  

Science Conference Proceedings (OSTI)

This paper introduces Korean web accessibility activities, such as relational laws, ordinances, policies, guidelines. It also presents analytical result of the investigation on web-contents accessibilities of the 39 Korean government agencies. The result ...

Joonho Hyun; Doojin Choi; Sukil Kim

2007-07-01T23:59:59.000Z

435

Re: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the topics of data access, third party usage and privacy as they relate to consumers energy usage information and the Smart Grid. Re: NBP RFI: Data Access More Documents &...

436

Auctions to gas transmission access : the British experience  

E-Print Network (OSTI)

When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

McDaniel, Tanga

2002-01-01T23:59:59.000Z

437

Green Button: Providing Consumers with Access to Their Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Button: Providing Consumers with Access to Their Energy Data Green Button: Providing Consumers with Access to Their Energy Data January 19, 2012 - 2:54pm Addthis Aneesh...

438

Foundation for a time interval access control model  

Science Conference Proceedings (OSTI)

A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a “time interval access graph.” The time ...

Francis B. Afinidad; Timothy E. Levin; Cynthia E. Irvine; Thuy D. Nguyen

2005-09-01T23:59:59.000Z

439

Femtocell access control strategy in UMTS and LTE  

Science Conference Proceedings (OSTI)

Femtocells have become an attractive device for operators to offer extended services on their licensed UMTS/LTE spectrum. In this article we focus on the access control strategy -- a crucial aspect for operators to give preferential access to femtocells ...

Assen Golaup; Mona Mustapha; Leo Boonchin Patanapongpibul

2009-09-01T23:59:59.000Z

440

Questions_and_Answers_on_the_New_Access_Control_System  

NLE Websites -- All DOE Office Websites (Extended Search)

Questions and Answers on the New Access Control System for HQ Security Areas September 15, 2010 Question: Why is the current access control system to security areas being changed?...

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Access Rate Control System | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support...

442

Efficient Construction of (Distributed) Verifiable Random Functions  

Science Conference Proceedings (OSTI)

We give the first simple and efficient construction of verifiable random functions (VRFs). VRFs, introduced by Micali et al. [13], combine the properties of regular pseudorandom functions (PRFs) (i.e., indistinguishability from a random function) and ...

Yevgeniy Dodis

2003-01-01T23:59:59.000Z

443

Source codes as random number generators  

E-Print Network (OSTI)

Abstract—A random number generator generates fair coin flips by processing deterministically an arbitrary source of nonideal randomness. An optimal random number generator generates asymptotically fair coin flips from a stationary ergodic source at a rate of bits per source symbol equal to the entropy rate of the source. Since optimal noiseless data compression codes produce incompressible outputs, it is natural to investigate their capabilities as optimal random number generators. In this paper we show under general conditions that optimal variable-length source codes asymptotically achieve optimal variable-length random bit generation in a rather strong sense. In particular, we show in what sense the Lempel–Ziv algorithm can be considered an optimal universal random bit generator from arbitrary stationary ergodic random sources with unknown distributions. Index Terms — Data compression, entropy, Lempel–Ziv algorithm, random number generation, universal source coding.

Karthik Visweswariah; Student Member; Sanjeev R. Kulkarni; Senior Member; Sergio Verdú

1998-01-01T23:59:59.000Z

444

Risk-based access control systems built on fuzzy inferences  

Science Conference Proceedings (OSTI)

Fuzzy inference is a promising approach to implement risk-based access control systems. However, its application to access control raises some novel problems that have not been yet investigated. First, because there are many different fuzzy operations, ... Keywords: access control, fuzzy inference, risk

Qun Ni; Elisa Bertino; Jorge Lobo

2010-04-01T23:59:59.000Z

445

Oblivious transfer with complex attribute-based access control  

Science Conference Proceedings (OSTI)

In this paper, we present oblivious transfer with complex attribute-based access control policies. The protocol allows a database server to directly enforce "and" and "or" access control policies (c11 ? c12 ... Keywords: access control, attribute-based encryption, oblivious transfer

Lingling Xu; Fangguo Zhang

2010-12-01T23:59:59.000Z

446

Achieving distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user an access right to the stored information. It is essential for future real sensor network deployment in which sensors may provide users with different services in terms of data ... Keywords: Elliptic Curve Cryptography, Public key cryptography, Sensor networks, User access control

Haodong Wang; Qun Li

2012-05-01T23:59:59.000Z

447

Trading in risk: using markets to improve access control  

Science Conference Proceedings (OSTI)

With the increasing need to securely share information, current access control systems are proving too in flexible and difficult to adapt. Recent work on risk-based access control systems has shown promise at resolving the inadequacies of traditional ... Keywords: market, risk, risk-based access control

Ian Molloy; Pau-Chen Cheng; Pankaj Rohatgi

2009-08-01T23:59:59.000Z

448

On random sampling auctions for digital goods  

Science Conference Proceedings (OSTI)

In the context of auctions for digital goods, an interesting Random Sampling Optimal Price auction (RSOP) has been proposed by Goldberg, Hartline and Wright; this leads to a truthful mechanism. Since random sampling is a popular approach for auctions ... Keywords: auction, mechanism design, random sampling

Saeed Alaei; Azarakhsh Malekian; Aravind Srinivasan

2009-07-01T23:59:59.000Z

449

FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS  

Science Conference Proceedings (OSTI)

FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contents of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk. COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever-increasing number of vulnerable computers on the Internet the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.

Jared Stimson Edward Murphy

2007-06-01T23:59:59.000Z

450

Complex bodies with memory: linearized setting  

E-Print Network (OSTI)

The mechanics of complex bodies with memory effects is discussed in linearized setting. The attention is focused on the characterization of free energies in terms of minimum work and maximum recoverable work in the bulk and along a discontinuity surface endowed with its own surface energy, a surface internal to the body. To this aim, use is made of techniques proposed by Del Piero. Consequences of the Clausius-Duhem inequality are investigated for complex bodies with instantaneous linear elastic response.

Paolo Maria Mariano; Paolo Paoletti

2008-05-28T23:59:59.000Z

451

Optimal superdense coding over memory channels  

SciTech Connect

We study the superdense coding capacity in the presence of quantum channels with correlated noise. We investigate both the cases of unitary and nonunitary encoding. Pauli channels for arbitrary dimensions are treated explicitly. The superdense coding capacity for some special channels and resource states is derived for unitary encoding. We also provide an example of a memory channel where nonunitary encoding leads to an improvement in the superdense coding capacity.

Shadman, Z.; Kampermann, H.; Bruss, D.; Macchiavello, C. [Institute fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, DE-40225 Duesseldorf (Germany); Dipartimento di Fisica ''A. Volta'' and INFM-Unita di Pavia, Via Bassi 6, IT-27100 Pavia (Italy)

2011-10-15T23:59:59.000Z

452

Shape Memory Polymer Therapeutic Devices for Stroke  

SciTech Connect

Shape memory polymers (SMPs) are attracting a great deal of interest in the scientific community for their use in applications ranging from light weight structures in space to micro-actuators in MEMS devices. These relatively new materials can be formed into a primary shape, reformed into a stable secondary shape, and then controllably actuated to recover their primary shape. The first part of this presentation will be a brief review of the types of polymeric structures which give rise to shape memory behavior in the context of new shape memory polymers with highly regular network structures recently developed at LLNL for biomedical devices. These new urethane SMPs have improved optical and physical properties relative to commercial SMPs, including improved clarity, high actuation force, and sharper actuation transition. In the second part of the presentation we discuss the development of SMP based devices for mechanically removing neurovascular occlusions which result in ischemic stroke. These devices are delivered to the site of the occlusion in compressed form, are pushed through the occlusion, actuated (usually optically) to take on an expanded conformation, and then used to dislodge and grip the thrombus while it is withdrawn through the catheter.

Wilson, T S; Small IV, W; Benett, W J; Bearinger, J P; Maitland, D J

2005-10-11T23:59:59.000Z

453

Performance of memory reclamation for lockless synchronization  

E-Print Network (OSTI)

Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace locks with non-blocking synchronization to protect against deadlock, priority inversion, and convoying. In both cases, dynamic data structures that avoid locking require a memory reclamation scheme that reclaims elements once they are no longer in use. The performance of existing memory reclamation schemes has not been thoroughly evaluated. We conduct the first fair and comprehensive comparison of three recent schemes—quiescent-state-based reclamation, epoch-based reclamation, and hazard-pointer-based reclamation—using a flexible microbenchmark. Our results show that there is no globally optimal scheme. When evaluating lockless synchronization, programmers and algorithm designers should thus carefully consider the data structure, the workload, and the execution environment, each of which can dramatically affect the memory reclamation performance. We discuss the consequences of our results for programmers and algorithm designers. Finally, we describe the use of one scheme, quiescentstate-based reclamation, in the context of an OS kernel—an execution environment which is well suited to this scheme.

Thomas E. Hart; Paul E. McKenney; Angela Demke Brown; Jonathan Walpole

2007-01-01T23:59:59.000Z

454

The Energy Access Situation in Developing Countries | Open Energy  

Open Energy Info (EERE)

Energy Access Situation in Developing Countries Energy Access Situation in Developing Countries Jump to: navigation, search Tool Summary Name: The Energy Access Situation in Developing Countries Agency/Company /Organization: World Health Organization (WHO), United Nations Development Programme (UNDP) Sector: Energy Focus Area: Renewable Energy, Biomass, Energy Efficiency Topics: Co-benefits assessment, - Energy Access, - Health Resource Type: Presentation, Technical report User Interface: Website Website: www.who.int/indoorair/publications/energyaccesssituation/en/index.html Cost: Free A Review focusing on the Least Developed Countries and Sub-Saharan Africa The "Energy Access Situation in Developing Countries - A Review focusing on the Least Developed Countries and Sub-Saharan Africa" report draws

455

Generating Cosmological Gaussian Random Fields  

E-Print Network (OSTI)

We present a generic algorithm for generating Gaussian random initial conditions for cosmological simulations on periodic rectangular lattices. We show that imposing periodic boundary conditions on the real-space correlator and choosing initial conditions by convolving a white noise random field results in a significantly smaller error than the traditional procedure of using the power spectrum. This convolution picture produces exact correlation functions out to separations of L/2, where L is the box size, which is the maximum theoretically allowed. This method also produces tophat sphere fluctuations which are exact at radii $ R \\le L/4 $. It is equivalent to windowing the power spectrum with the simulation volume before discretizing, thus bypassing sparse sampling problems. The mean density perturbation in the volume is no longer constrained to be zero, allowing one to assemble a large simulation using a series of smaller ones. This is especially important for simulations of Lyman-$\\alpha$ systems where small boxes with steep power spectra are routinely used. We also present an extension of this procedure which generates exact initial conditions for hierarchical grids at negligible cost.

Ue-Li Pen

1997-09-25T23:59:59.000Z

456

City of Boulder - Solar Access Ordinance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Ordinance Access Ordinance City of Boulder - Solar Access Ordinance < Back Eligibility Construction Residential Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Program Info State Colorado Program Type Solar/Wind Access Policy Provider City of Boulder The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted shading by new construction. A solar access permit is available to those who have installed or who plan to install a solar energy system and need more protection than is provided by the ordinance. For new developments, all units which are not planned to

457

UN-Energy-Measuring Energy Access | Open Energy Information  

Open Energy Info (EERE)

UN-Energy-Measuring Energy Access UN-Energy-Measuring Energy Access Jump to: navigation, search Tool Summary LAUNCH TOOL Name: UN-Energy-Measuring Energy Access Agency/Company /Organization: United Nations Energy Knowledge Network (UN-Energy) Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset, Maps Website: www.un-energy.org/measuring-energy-access Cost: Free Language: English UN-Energy-Measuring Energy Access Screenshot References: UN-Energy-Measuring Energy Access[1] "A reliable and comprehensive information base is necessary to inform target-setting and to monitor outcomes. Openly available and visually attractive information presentation can support the design of innovative policies and measures, and underpin detailed analysis. UN-Energy, the

458

Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fuel Alternative Fuel Vehicle (AFV) Access to Tunnels to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Google Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Delicious Rank Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

459

Mozambique-Biofuels, Land Access and Rural Livelihoods | Open Energy  

Open Energy Info (EERE)

Biofuels, Land Access and Rural Livelihoods Biofuels, Land Access and Rural Livelihoods Jump to: navigation, search Name Mozambique-Biofuels, Land Access and Rural Livelihoods Agency/Company /Organization International Institute for Environment and Development Sector Energy, Land Focus Area Biomass, - Biofuels, Forestry, Agriculture Topics Implementation, Co-benefits assessment, - Energy Access, Resource assessment, Background analysis Resource Type Publications, Case studies/examples Website http://www.iied.org/pubs/pdfs/ Country Mozambique UN Region Eastern Africa References Mozambique-Biofuels, Land Access and Rural Livelihoods[1] Mozambique-Biofuels, Land Access and Rural Livelihoods Screenshot Background "This report documents how the spread of biofuels is affecting land access for poorer groups in Mozambique, and what actions are being taken,

460

Access to Climate Change Technology by Developing Countries | Open Energy  

Open Energy Info (EERE)

Access to Climate Change Technology by Developing Countries Access to Climate Change Technology by Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Access to Climate Change Technology by Developing Countries Agency/Company /Organization: International Centre for Trade and Sustainable Development Sector: Energy, Land Focus Area: Renewable Energy Topics: Finance, Implementation Resource Type: Publications, Guide/manual Website: ictsd.org/downloads/2009/11/access-to-climate-change-technology-by-dev Access to Climate Change Technology by Developing Countries Screenshot References: Developing Country-Access to CC Tech[1] "The paper critically examines various approaches that have been suggested for achieving greater access to climate change technology by developing countries, including compulsory licensing, patent pools, patent databases

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Access Energy Coop | Open Energy Information  

Open Energy Info (EERE)

Coop Coop Jump to: navigation, search Name Access Energy Coop Place Iowa Utility Id 16611 Utility Location Yes Ownership C NERC Location SERC NERC SERC Yes ISO Other Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Interruptible Large Power Rate* Industrial Large Commercial Rate Commercial Large Power Rate Schedule Industrial Residential Single Phase Rate Residential Security Lights HPS 100 W Lighting Security Lights HPS 1000 W Lighting Security Lights HPS 250 W Lighting Security Lights HPS 400 W Lighting

462

Template for Discontinuation of Access Eligibility Determination  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MEMORANDUM FOR (SUBJECT'S NAME) MEMORANDUM FOR (SUBJECT'S NAME) FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions (QNSP) signed [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. Your case was submitted to the Office of Personnel Management (OPM) and an investigation dated [insert date] has been received. [Insert a brief description of the circumstances such as: A review of your case reveals that you listed marijuana use 5-10 times from 8/01 to 5/05 on your QNSP. During the personal subject interview with OPM, you stated that the end date for the marijuana use was incorrect and the last time

463

Science Open Access Journals - Alerts Help  

Office of Scientific and Technical Information (OSTI)

SOAJ Alerts Fast Facts SOAJ Alerts Fast Facts You can easily create an alert right from the results page. Alerts run automatically, based on the schedule you choose. New relevantly ranked results are automatically sent to you through email or an individual or shared RSS/ATOM feed. There is no limit to the number of alerts you can create. Up to 6 previous sets of alert results may be accessed, with permanent links to the sources where possible. Selected results can be emailed, printed, or downloaded into a citation manager such as EndNote, RefWorks or Bib Tex. Alerts Help Alerts will make your recurring searches even easier by automating your search and sending you the results on a regular basis. To receive alerts on your topic(s) of interest, simply create an Alerts account, specify your

464

HitME: low power Hit MEmory buffer for embedded systems  

Science Conference Proceedings (OSTI)

In this paper, we present a novel HitME (Hit-MEmory) buffer to reduce the energy consumption of memory hierarchy in embedded processors. The HitME buffer is a small direct-mapped cache memory that is added as additional memory into existing cache memory ...

Andhi Janapsatya; Sri Parameswaran; Aleksandar Ignjatovi?

2009-01-01T23:59:59.000Z

465

(Ni,Pt)Ti High Temperature Shape Memory Alloys  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Phase Field Modeling of P-Phase ...

466

Determination of the recovery stresses developed by shape memory alloys  

SciTech Connect

A simple relationship has been developed between recovery stresses, temperature, and strain, to explain the mechanical shape memory effect in some alloys which undergo thermoelastic martensitic transformation. (GHT)

Mohamed, H.A.

1978-03-01T23:59:59.000Z

467

Novel and NiTi-based Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 4, 2013 ... Phase Constitution, Mechanical and Shape Memory Properties of (Pt,Co)Ti Alloys: Hideki Hosoda1; Satoshi Tsutsumi1; Masaki Tahara1; ...

468

Superelastic and Shape Memory Effects of Copper-Based Shape ...  

Science Conference Proceedings (OSTI)

Abstract Scope, Shape memory alloys have been considered for applications as sensors, actuators, and energy-absorbing materials because of their impressive ...

469

Whirlpools on the Nanoscale Could Multiply Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

cells housed on nanoscale metal disks, instead of the two-bit magnetic domains of standard magnetic memories. In magnetic vortices, parallel electron spins point either...

470

Optimization Online - On Efficiently Combining Limited Memory and ...  

E-Print Network (OSTI)

Nov 25, 2013... the limited memory methods are usually combined with a line search. ... by the Euclidean norm with an insignificant computational overhead ...

471

Y-12 historian assists in Lincoln Memorial University display...  

National Nuclear Security Administration (NNSA)

of Lincoln Memorial University in Harrogate, Tenn. Located in LMU's new Math and Science Building, the display pays tribute to nuclear energy research and the subsequent creation...

472

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(Brochure) (Revised) This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas. 47461.pdf More...

473

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure)  

Science Conference Proceedings (OSTI)

This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas.

Not Available

2010-03-01T23:59:59.000Z

474

Building Green in Greensburg: Kiowa County Memorial Hospital  

Energy.gov (U.S. Department of Energy (DOE))

This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

475

Fundamentals of Shape Memory and Related Transitions (Electronic ...  

Science Conference Proceedings (OSTI)

Jun 1, 2007 ... These papers are based on presentations prepared for the symposium Fundamentals of Shape Memory and Related Transitions. The original ...

476

Physical and Mechanical Metallurgy of Shape Memory Alloys for ...  

Science Conference Proceedings (OSTI)

Physical and Mechanical Metallurgy of. Shape Memory Alloys for Actuator Applications. Sponsored by. TMS Structural Materials Division (SMD). TMS/ASM:  ...

477

Institute of Computer Science New class of limited-memory ...  

E-Print Network (OSTI)

Institute of Computer Science. Academy of Sciences of the Czech Republic. New class of limited-memory variationally-derived variable metric methods. J. Vlcek ...

478

Institute of Computer Science Limited-memory projective variable ...  

E-Print Network (OSTI)

Institute of Computer Science. Academy of Sciences of the Czech Republic. Limited-memory projective variable metric methods for unconstrained minimization.

479

False Memories of UFO Encounters: An fMRI Investigation .  

E-Print Network (OSTI)

??The idea of ‘false memories’ for traumatic events has powered numerous controversies. For this reason, the present study was designed as an attempt to resolve… (more)

Lambrinos, Angela

2011-01-01T23:59:59.000Z

480

Estimating solar access of typical residential rooftops: A case study in San Jose, CA  

E-Print Network (OSTI)

the solar access of rooftop solar-energy systems, includingthe solar access of rooftop solar-energy systems, includingof shading on residential rooftop solar access in various

Levinson, Ronnen M

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "random access memory" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

A KNOWLEDGE BASED SYSTEM FOR PROVIDING INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE  

E-Print Network (OSTI)

INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE Steven

Rosenberg, Steven

2011-01-01T23:59:59.000Z

482

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

483

Hybrid NOrec: a case study in the effectiveness of best effort hardware transactional memory  

Science Conference Proceedings (OSTI)

Transactional memory (TM) is a promising synchronization mechanism for the next generation of multicore processors. Best-effort Hardware Transactional Memory (HTM) designs, such as Sun's prototype Rock processor and AMD's proposed Advanced Synchronization ... Keywords: transactional memory

Luke Dalessandro; François Carouge; Sean White; Yossi Lev; Mark Moir; Michael L. Scott; Michael F. Spear

2012-06-01T23:59:59.000Z

484

Strata: wait-free synchronization with efficient memory reclamation by using chronological memory allocation  

Science Conference Proceedings (OSTI)

A locking is the typical mechanism to coordinate the race between multiple threads. But it downgrades the overall system performance due to the waiting time for the locked data to be unlocked. Wait-free synchronization is the one of the schemes to cope ... Keywords: memory management, wait-free synchronization

Eunhwan Shin; Inhyuk Kim; Junghan Kim; Young Ik Eom

2011-06-01T23:59:59.000Z

485

Utilizing Home Node Prediction to Improve the Performance of Software Distributed Shared Memory  

E-Print Network (OSTI)

Many researchers use a home-based lazy release consistent protocol (HLRC) to provide a simple, effective, and scalable way to build software distributed shared memory (DSM) systems. However, the performance of HLRC is notoriously sensitive to the initial page distribution among home nodes. This paper proposes an adaptive HLRC protocol in which the home page designation is able to change according to the observed application sharing pattern. Our system differs from HLRC and other adaptive derivatives in the following respects. First, the number of home nodes for each shared page can be varied, as opposed to having only a single home node. Second, we use prediction in a novel way to dynamically change the the location of home nodes according to different memory access patterns. The home node of each shared page is able to propagate, perish, and migrate. An online home predictor determine whether or not the current node should remain a home node or drop from the current set of home nodes for a given page. Finally, all decisions concerning home node group membership are made locally, eliminating the costly global decision-making communication present in many other systems. Performance evaluations using six well-known DSM benchmarks show that our adaptive protocol outperforms conventional HLRC by up to 60%. 1

Song Peng

2004-01-01T23:59:59.000Z

486

Measuring Energy Access: Supporting a Global Target | Open Energy  

Open Energy Info (EERE)

Measuring Energy Access: Supporting a Global Target Measuring Energy Access: Supporting a Global Target Jump to: navigation, search Tool Summary Name: Measuring Energy Access: Supporting a Global Target Agency/Company /Organization: Columbia University Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Publications Website: www.unido.org/fileadmin/user_media/Services/Energy_and_Climate_Change/ Cost: Free Language: English References: Measuring Energy Access: Supporting a Global Target[1] "This paper first describes the relevant context, definitions, data, and links to national policies and energy planning. Section 2 reviews relevant development and energy metrics. Several options for measuring energy access are then presented in section 3. Finally, Section 4 offers thoughts on

487

OpenEI:Utility data access map | Open Energy Information  

Open Energy Info (EERE)

Utility data access map Utility data access map Jump to: navigation, search Ret Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored and the overall map will become more complete. Try searching for your utility company to see your electricity data access options.

488

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 March 11, 2011 - 4:03pm Addthis The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy Yesterday, the Department of Energy announced that we've now finalized a loan for nearly $50 million to the Vehicle Production Group - or VPG. The project will support the development and manufacturing of a new wheelchair accessible, fuel-efficient car, the MV-1, that will run on compressed natural gas instead of gasoline, produce low emissions, and create 900 jobs

489

Burkina Faso Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Faso Energy Access Project Faso Energy Access Project Jump to: navigation, search Name of project Burkina Faso Energy Access Project Location of project Burkina Faso Year initiated 2007 Organization World Bank Website http://documents.worldbank.org Coordinates 12.238333°, -1.561593° References Document[1] Energy Access Project aims to support Burkina Faso's efforts to increase access to, and use of energy services to improve living conditions in selected rural, peri-urban, and urban areas. The project includes the following components : increasing access to electricity services in the urban, peri-urban and rural areas; woodfuels supply management and inter-fuel substitution initiatives; and institutional strengthening, capacity development, and harmonization. References ↑ "Document"

490

Adjudicative Guidelines for Determining Eligibility for Access to  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adjudicative Guidelines for Determining Eligibility for Access to Adjudicative Guidelines for Determining Eligibility for Access to Classified Information Adjudicative Guidelines for Determining Eligibility for Access to Classified Information Introduction. The following adjudicative guidelines are established for all U.S. government civilian and military personnel, consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified information. They apply to persons being considered for initial or continued eligibility for access to classified information, to include sensitive compartmented information and special access programs, and are to be used by government departments and agencies in all final clearance determinations. Government departments and agencies may also choose to

491

Definition: Open Access Same Time Information Service | Open Energy  

Open Energy Info (EERE)

Access Same Time Information Service Access Same Time Information Service Jump to: navigation, search Dictionary.png Open Access Same Time Information Service An electronic posting system that the Transmission Service Provider maintains for transmission access data and that allows all transmission customers to view the data simultaneously.[1] View on Wikipedia Wikipedia Definition Also Known As Open Access Same-Time Information System (OASIS) Related Terms transmission lines, transmission Service Provider, system, electricity generation, transmission line References ↑ Glossary of Terms Used in Reliability Standards An inli LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ne Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Open_Access_Same_Time_Information_Service&oldid=480308"

492

Overview of Access Authorization Process for Applicants, May, 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 May, 2013 This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization. You are a part of a select group of individuals who are being considered for access to classified information maintained by DOE. As you know, the protection of classified information is very important to our national security. Generally, classified information is official information or material that requires protection in

493

Using Microfinance to Expand Access to Energy Services | Open Energy  

Open Energy Info (EERE)

Using Microfinance to Expand Access to Energy Services Using Microfinance to Expand Access to Energy Services Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Using Microfinance to Expand Access to Energy Services Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Renewable Energy Topics: Co-benefits assessment, - Energy Access, Finance Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: waterwiki.net/images/6/65/File_Energy_Summary_FINAL.pdf Language: English References: Using Microfinance to Expand Access to Energy Services[1] Logo: Using Microfinance to Expand Access to Energy Services "To carry out this research, SES and the SEEP Network invited MFIs in Africa, Asia, Latin America and the Caribbean (LAC) to participate in an

494

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

495

IEA-Electricity Access Database | Open Energy Information  

Open Energy Info (EERE)

IEA-Electricity Access Database IEA-Electricity Access Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: IEA-Electricity Access Database Agency/Company /Organization: International Energy Agency (IEA) Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset Website: www.iea.org/weo/electricity.asp Language: English IEA-Electricity Access Database Screenshot References: Electricity Access Database[1] "In a continuing effort to improve our understanding of the electrification process, we have updated, for the fifth time, the database on electrification rates that we first built for WEO-2002. The database shows detailed data on urban and rural electrification collected from industry, national surveys and international sources. Based on this updated analysis,

496

Allegories of Modernity, Geographies of Memory  

E-Print Network (OSTI)

This dissertation examines how postmodernist narratives of memory in Graham Swift's Waterland, Salman Rushdie's Midnight's Children, and Amitav Ghosh's The Shadow Lines retrieve the stories of those who have been lost or forgotten in official history and refigure the temporal and spatial imaginary in intertwining personal stories of crisis with public history through acts of remembering. Questioning the modernist ideology of progress based on the idea of linear sequence of time, the novels not only retrace the heterogeneous and discontinuous layers of stories overlooked or repressed in official accounts of modern history, but also re-examine the contradictory and contested process by which subjects are situated or positioned, and its effects on the production of knowledge. These postmodern historical novels examine history as a discourse and explore its limits. The narrators of the novels are engaged with an autobiographical act of rewriting their lives, but their efforts to reconstitute themselves in unity and continuity are undermined by the disjunctive narrative form of the novels. The layered narrative of memory through which the novels reconstruct modern history is allegorical in the double sense that it exposes the act of signification by decentering the symbol of the transcendental signifier while telling an allegorical story of personal and familial history that mirrors national history in a fragmented way. In Waterland, Tom Crick retells his personal and familial stories intertwined with local and national history as alternative history lessons and challenges the Idea of Progress by revisiting sites of traumatic memory. Midnight's Children constructs counter-stories of Post-Independence India as multiple alternatives to one official version of history and addresses the limits of history in terms of "a border zone of temporality." In The Shadow Lines, the narrator retells his family history as a story of borders through his struggle with gaps in official history and creates a national imaginary with mirror images and events. The postmodernist narrative of memory in these novels turns the time of the now into a time for the "past as to come," a time to detect the unrealized and unfulfilled possibilities of the past, through retellings of the past.

Jeon, Seenhwa

2012-08-01T23:59:59.000Z

497

Nickel porphyrins for memory optical applications  

DOE Patents (OSTI)

The present invention relates to a nickel-porphyrin derivative in a matrix, the nickel-porphyrin derivative comprising at least two conformational isomers, a lower-energy-state conformer and a higher-energy-state conformer, such that when the higher-energy-state conformer is generated from the lower-energy-state conformer following absorption of a photon of suitable energy, the time to return to the lower-energy-state conformer is greater than 40 nanoseconds at approximately room temperature. The nickel-porphyrin derivative is useful in optical memory applications.

Shelnutt, John A. (Tijeras, NM); Jia, Songling (Albuquerque, NM); Medforth, Craig (Vacaville, CA); Holten, Dewey (St. Louis, MO); Nelson, Nora Y. (Manteca, CA); Smith, Kevin M. (Davis, CA)

2000-01-01T23:59:59.000Z

498

Oil Price Trackers Inspired by Immune Memory  

E-Print Network (OSTI)

We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

Wilson, WIlliam; Aickelin, Uwe

2010-01-01T23:59:59.000Z

499

Highly multimode memory in a crystal  

E-Print Network (OSTI)

We experimentally demonstrate the storage of 1060 temporal modes onto a thulium-doped crystal using an atomic frequency comb (AFC). The comb covers 0.93 GHz defining the storage bandwidth. As compared to previous AFC preparation methods (pulse sequences i.e. amplitude modulation), we only use frequency modulation to produce the desired optical pumping spectrum. To ensure an accurate spectrally selective optical pumping, the frequency modulated laser is self-locked on the atomic comb. Our approach is general and should be applicable to a wide range of rare-earth doped material in the context of multimode quantum memory.

Bonarota, M; Chanelière, T

2010-01-01T23:59:59.000Z

500

Highly multimode memory in a crystal  

E-Print Network (OSTI)

We experimentally demonstrate the storage of 1060 temporal modes onto a thulium-doped crystal using an atomic frequency comb (AFC). The comb covers 0.93 GHz defining the storage bandwidth. As compared to previous AFC preparation methods (pulse sequences i.e. amplitude modulation), we only use frequency modulation to produce the desired optical pumping spectrum. To ensure an accurate spectrally selective optical pumping, the frequency modulated laser is self-locked on the atomic comb. Our approach is general and should be applicable to a wide range of rare-earth doped material in the context of multimode quantum memory.

M. Bonarota; J. -L. Le Gouët; T. Chanelière

2010-09-13T23:59:59.000Z