Sample records for remote code execution

  1. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  2. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  3. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  4. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...

  5. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  6. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  7. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  8. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  9. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  10. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  11. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  13. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  14. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  15. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  16. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  17. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  18. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  19. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  20. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  1. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  2. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis...

  3. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  4. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  5. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  6. Experience with Remote Job Execution

    SciTech Connect (OSTI)

    Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Green, Mark L [ORNL; Kohl, James Arthur [ORNL; Miller, Stephen D [ORNL; Ren, Shelly [ORNL; Smith, Bradford C [ORNL; Vazhkudai, Sudharshan S [ORNL

    2008-01-01T23:59:59.000Z

    The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

  7. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  8. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. A remote user...

  9. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up...

  10. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  11. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  12. T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

  13. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  14. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary CodeImpactEnergy

  15. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department

  16. U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-082: McAfee SaaS...

  17. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  18. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  19. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  20. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  1. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  2. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

  3. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Broader source: Energy.gov (indexed) [DOE]

    Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  4. T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

  5. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

  6. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users Execute|Code |

  7. Remote-Handled Transuranic Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2001-08-01T23:59:59.000Z

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document representsthe development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specificidentification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites can be grouped under uniform content codes without any lossof waste characterization information. The RH-TRUCON document provides an all-encompassing|description for each content code and compiles this information for all DOE sites. Compliance withwaste generation, processing, and certification procedures at the sites (outlined in this document foreach content code) ensures that prohibited waste forms are not present in the waste. The contentcode gives an overall description of the RH-TRU waste material in terms of processes and|packaging, as well as the generation location. This helps to provide cradle-to-grave traceability ofthe waste material so that the various actions required to assess its qualification as payload for the72-B cask can be performed. The content codes also impose restrictions and requirements on themanner in which a payload can be assembled.The RH-TRU Waste Authorized Methods for Payload Control (RH-TRAMPAC), Appendix 1.3.7of the 72-B Cask Safety Analysis Report (SAR), describes the current governing procedures|applicable for the qualification of waste as payload for the 72-B cask. The logic for this|classification is presented in the 72-B Cask SAR. Together, these documents (RH-TRUCON,|RH-TRAMPAC, and relevant sections of the 72-B Cask SAR) present the foundation and|justification for classifying RH-TRU waste into content codes. Only content codes described in thisdocument can be considered for transport in the 72-B cask. Revisions to this document will be madeas additional waste qualifies for transport. |Each content code uniquely identifies the generated waste and provides a system for tracking theprocess and packaging history. Each content code begins with a two-letter site abbreviation thatindicates the shipper of the RH-TRU waste. The site-specific letter designations for each of the|DOE sites are provided in Table 1. Not all of the sites listed in Table 1 have generated/stored RH-|TRU waste.

  8. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  9. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code...

  10. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code...

  11. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

    2007-09-25T23:59:59.000Z

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  12. User authentication and remote execution across administrative domains

    E-Print Network [OSTI]

    Kaminsky, Michael, 1976-

    2004-01-01T23:59:59.000Z

    (cont.) selectively delegates authority to processes running on remote machines that need to access other resources. The delegation mechanism lets users incrementally construct trust policies for remote machines. Measurements ...

  13. MSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real

    E-Print Network [OSTI]

    Turletti, Thierry

    : information-centric networking over mobile ad hoc network using the PARC CCNx code, and a seamless handoffMSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real of Tokyo, Japan INRIA, France Abstract We propose to demonstrate Direct Code Execution (DCE)1 , a ns-3

  14. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Environmental Management (EM)

    can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid...

  15. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  16. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on...

  17. U-051: Skype Discloses IP Addresses to Remote Users | Department...

    Broader source: Energy.gov (indexed) [DOE]

    available at the time of this entry. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

  18. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Energy Savers [EERE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  19. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  20. Preliminary Project Execution Plan for the Remote-Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    David Duncan

    2011-05-01T23:59:59.000Z

    This preliminary project execution plan (PEP) defines U.S. Department of Energy (DOE) project objectives, roles and responsibilities of project participants, project organization, and controls to effectively manage acquisition of capital funds for construction of a proposed remote-handled low-level waste (LLW) disposal facility at the Idaho National Laboratory (INL). The plan addresses the policies, requirements, and critical decision (CD) responsibilities identified in DOE Order 413.3B, 'Program and Project Management for the Acquisition of Capital Assets.' This plan is intended to be a 'living document' that will be periodically updated as the project progresses through the CD process to construction and turnover for operation.

  1. Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory

    E-Print Network [OSTI]

    Aickelin, Uwe

    Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory Jungwon an artificial immune system. A recently developed hypothesis in immunology, the Danger The- ory, states that our invaders, plus signals generated by the host indic- ating danger and damage. We propose the incorporation

  2. SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification

    E-Print Network [OSTI]

    Simha, Rahul

    SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification Olga those using the Internet and exploiting the vul- nerabilities in the software and applications, software ­ for software integrity protection and authentication and presents performance results. Our system architecture

  3. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  4. Remote-Handled Low-Level Waste (RHLLW) Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2010-10-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of fiscal year 2015). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability.

  5. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code...

  6. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2012-04-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  7. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2011-04-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  8. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2011-01-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  9. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2012-06-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  10. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2014-06-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  11. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Environmental Management (EM)

    of the DCERPC Inspection Buffer Overflow Vulnerability may cause a stack overflow and permit the execution of arbitrary commands. Solution: The vendor has issued a fix. Addthis...

  12. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that,...

  13. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to...

  14. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player...

  15. Project Execution Plan for the Remote Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Danny Anderson

    2014-07-01T23:59:59.000Z

    As part of ongoing cleanup activities at the Idaho National Laboratory (INL), closure of the Radioactive Waste Management Complex (RWMC) is proceeding under the Comprehensive Environmental Response, Compensation, and Liability Act (42 USC 9601 et seq. 1980). INL-generated radioactive waste has been disposed of at RWMC since 1952. The Subsurface Disposal Area (SDA) at RWMC accepted the bulk of INL’s contact and remote-handled low-level waste (LLW) for disposal. Disposal of contact-handled LLW and remote-handled LLW ion-exchange resins from the Advanced Test Reactor in the open pit of the SDA ceased September 30, 2008. Disposal of remote-handled LLW in concrete disposal vaults at RWMC will continue until the facility is full or until it must be closed in preparation for final remediation of the SDA (approximately at the end of fiscal year FY 2017). The continuing nuclear mission of INL, associated ongoing and planned operations, and Naval spent fuel activities at the Naval Reactors Facility (NRF) require continued capability to appropriately dispose of contact and remote handled LLW. A programmatic analysis of disposal alternatives for contact and remote-handled LLW generated at INL was conducted by the INL contractor in Fiscal Year 2006; subsequent evaluations were completed in Fiscal Year 2007. The result of these analyses was a recommendation to the Department of Energy (DOE) that all contact-handled LLW generated after September 30, 2008, be disposed offsite, and that DOE proceed with a capital project to establish replacement remote-handled LLW disposal capability. An analysis of the alternatives for providing replacement remote-handled LLW disposal capability has been performed to support Critical Decision-1. The highest ranked alternative to provide this required capability has been determined to be the development of a new onsite remote-handled LLW disposal facility to replace the existing remote-handled LLW disposal vaults at the SDA. Several offsite DOE and commercial disposal options exist for contact-handled LLW; however, offsite disposal options are either not currently available (i.e., commercial disposal facilities), practical, or cost-effective for all remote-handled LLW streams generated at INL. Offsite disposal of all INL and tenant-generated remote-handled waste is further complicated by issues associated with transporting highly radioactive waste in commerce; and infrastructure and processing changes at the generating facilities, specifically NRF, that would be required to support offsite disposal. The INL Remote-Handled LLW Disposal Project will develop a new remote handled LLW disposal facility to meet mission-critical, remote-handled LLW disposal needs. A formal DOE decision to proceed with the project has been made in accordance with the requirements of National Environmental Policy Act (42 USC§ 4321 et seq.). Remote-handled LLW is generated from nuclear programs conducted at INL, including spent nuclear fuel handling and operations at NRF and operations at the Advanced Test Reactor. Remote-handled LLW also will be generated by new INL programs and from segregation and treatment (as necessary) of remote handled scrap and waste currently stored in the Radioactive Scrap and Waste Facility at the Materials and Fuels Complex.

  16. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    certificate has been disabled and incorrectly accept certificates signed by that root server CVE-2011-0214. On systems with the 'AutoFill web forms' feature enabled, a remote...

  17. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were...

  18. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

  19. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications...

  20. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |RemoteDepartment

  1. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode | Department of

  2. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  3. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  4. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy Symantec

  5. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment ofDepartment

  6. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartmentDepartment of

  7. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks and|

  8. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergy July

  9. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of EnergyDepartmentURL

  10. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|

  11. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScripting

  12. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5|

  13. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe|2:

  14. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConduct Cross-Site

  15. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode | Department of

  16. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode |Disclosure

  17. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgeryCode |

  18. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code |

  19. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department of

  20. U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code |Department

  1. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCode | Department of

  2. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury atArbitrary Code and Deny

  3. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBM MultipleFixationofAuthenticationCode

  4. Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    , all as security extensions to the state-of-the- art code dissemination system named Deluge. However with Seluge, a security extension to Deluge for injecting new code images. We perform a substantial set], [12], [15], [21], [23], [24] have been proposed for wireless sensor networks. Deluge [12] is generally

  5. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  6. Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of

    E-Print Network [OSTI]

    Binder, Walter

    Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications Walter Binder and Bal´azs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 applications. Mobile code is used for application upload, as well as for remote configuration and maintenance

  7. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code | Department of

  8. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  9. A loop is the only control-flow construct that lets you go back to an earlier point in the code. Loops are designed to allow us to iterate--to execute the same piece of code over and over again.

    E-Print Network [OSTI]

    Peters, Dennis

    A loop is the only control-flow construct that lets you go back to an earlier point in the code. After the body is executed, we go back and test the loop continuation condition again As soon. Note that the first example (temperature conversion) is basically a variation on this theme. Event

  10. Self-assembled software and method of overriding software execution

    DOE Patents [OSTI]

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08T23:59:59.000Z

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  11. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Broader source: Energy.gov (indexed) [DOE]

    data CVE-2013-3813 A remote user can exploit a flaw in the UtilityRemote Execution Server(in.rexecd) component to partially access data CVE-2013-0398 A remote user can...

  12. U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

  13. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  14. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  15. 8 Executive Summary Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    8 Executive Summary Executive Summary 1. World Robotics 2012 Industrial Robots 2. World Robotics 2012 Service Robots 1. World Robotics 2012 Industrial Robots 2011: The most successful year for industrial robots since 1961 In 2011, robot sales again increased by 38% to 166,028 units, by far the highest

  16. Executive Summary 11 Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    Executive Summary 11 Executive Summary 1. World Robotics 2014 Industrial Robots 2. World Robotics 2014 Service Robots 1. World Robotics 2014 Industrial Robots 2013: The highest number of industrial recorded for one year. Sales of industrial robots to the automotive, the chemical, and the rubber

  17. 10 Executive Summary Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    10 Executive Summary Executive Summary 1. World Robotics 2013 Industrial Robots 2. World Robotics 2013 Service Robots 1. World Robotics 2013 Industrial Robots 2012: Second highest number of robots sold for the slight sales reduction. Sales of industrial robots to the automotive industry continued to increase

  18. Executive Officer

    Broader source: Energy.gov [DOE]

    THIS VACANCY ANNOUNCEMENT HAS BEEN MODIFIED TO EXTEND THE CLOSING DATE. A successful candidate in this position will serve as the Executive Officer to the Administrator of the Bonneville Power...

  19. act executive orders: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Sciences Websites Summary: Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code) An administrative officer or supervisor of...

  20. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    Eirinaki, Magdalini

    Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

  1. Executive MBA* Executive MBA at a Glance

    E-Print Network [OSTI]

    Manufacturing Natural Resources Not-for-Profit Public Service Real Estate Development Technology Transportation, strategic analysis, and change management * Additional Options The Americas MBA for Executives Executive MBA

  2. Remote Batch Invocation for Compositional Object Services

    E-Print Network [OSTI]

    Ryder, Barbara G.

    Remote Batch Invocation for Compositional Object Services Ali Ibrahim2 , Yang Jiao1 , Eli Tilevich1 Remote Procedure Calls do not compose efficiently, design- ers of distributed object systems use Data Transfer and Remote Fac¸ade patterns to create large-granularity interfaces, hard-coded for particular

  3. FEI Program Session: Date: CHRIS Code: Session Number:

    Broader source: Energy.gov (indexed) [DOE]

    OPM Federal Executive Institute - DOE CHRIS Codes: (Program Tuition Cost - 19,875.00) *Program Calendar for Fiscal Year 2015 FEI Program Session: Date: CHRIS Code: Session Number:...

  4. Virtual Private Environments for Multiphysics Code Validation on Computing Grids

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Virtual Private Environments for Multiphysics Code Validation on Computing Grids Toan Nguyen-based computing environments and deploys, tests and analyzes multiphysics codes. A second approach executes model coupling, error correlations, alert definitions, best usage practices, code verification and code

  5. Executive Director

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /EmailMolecular Solids | MIT-HarvardExecutive Director

  6. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  7. Remote Job Testing for the Neutron Science TeraGrid Gateway

    SciTech Connect (OSTI)

    Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Miller, Stephen D [ORNL; Reuter, Michael A [ORNL; Smith, Bradford C [ORNL

    2009-01-01T23:59:59.000Z

    Remote job execution gives neutron science facilities access to high performance computing such as the TeraGrid. A scientific community can use community software with a community certificate and account through a common interface of a portal. Results show this approach is successful, but with more testing and problem solving, we expect remote job executions to become more reliable.

  8. Real-time Remote Sensing of Snowmobiles Emissions at

    E-Print Network [OSTI]

    Denver, University of

    Real-time Remote Sensing of Snowmobiles Emissions at Yellowstone National Park: An Oxygenated Fuel 68509 #12;Real-time Remote Sensing of Snowmobile Emissions at Yellowstone National Park 2 Executive emissions from snowmobiles. Ratios of CO, HC and toluene to CO2 were measured and used to calculate %CO, %HC

  9. Visualization of Program-Execution Data for Deployed

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    · Color used to represent characteristics of code and its executions · Mapping of data to color dependent Collection Daemon Database Customer 1 Customer 2 Customer N program instrumented program execution data data · Maps field data to program representations using color · Provides multiple levels of abstraction

  10. Chip Laingen Executive Director

    E-Print Network [OSTI]

    Levinson, David M.

    Link 3) MilTech · Defense Alliance / APC Staff 1) Executive Director 2) Business / Finance Director

  11. Remote File Access 2010

    E-Print Network [OSTI]

    University of Technology, Sydney

    Remote File Access 2010 Mac Users Guide #12;Remote File Access: MAC Users Guide 2010 2 Table Remote File Access 11 Part IV: Using Remote File Access 15 Part V: FAQ 24 #12;Remote File Access: MAC Users Guide 2010 3 1. What is Remote File Access? UTS Remote File Access service is provided to enable

  12. executive.mcgill.ca Understand how to enter and develop global business opportunities as they arise

    E-Print Network [OSTI]

    Fabry, Frederic

    of constant change. ALAIN LAFOREST - BMW GROUP OF CANADA #12;Designed for senior managers and executives · Developing global synergy and collaboration · Principles of leading in remote (virtual) work environments

  13. Tabled Execution in Scheme

    SciTech Connect (OSTI)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19T23:59:59.000Z

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  14. Remote Method Invocation Remote Method Invocation

    E-Print Network [OSTI]

    Hao, Jin-Kao

    Remote Method Invocation Remote Method Invocation Jean-Michel Richer jean-michel.richer@univ-angers.fr http://www.info.univ-angers.fr/pub/richer M2 Informatique 2010-2011 1 / 22 #12;Remote Method Invocation Plan Plan 1 Introduction 2 RMI en d´etails 3 Exemple 4 Application 2 / 22 #12;Remote Method Invocation

  15. ISO 14001: An Executive Report

    E-Print Network [OSTI]

    Simon, Richard

    1998-01-01T23:59:59.000Z

    Review: ISO 14001: An Executive Report By Gordon A. West andA. and Manta, Joseph G. ISO 14001: An Executive Report.management standards, ISO 14001: An Executive Report stands

  16. Shared prefetching to reduce execution skew in multi-threaded systems

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16T23:59:59.000Z

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  17. Handleiding Remote Desktop Service

    E-Print Network [OSTI]

    Galis, Frietson

    Handleiding Remote Desktop Service Versie: 1.3 Remote Desktop Datum: 29-08-2013 #12;2 Configureren Remote Desktop Connection 1) Type in de zoekbalk van Windows 7: "remote" of "mstsc" en start de applicatie "Remote Desktop Connection" zoals in onderstaand voorbeeld wordt getoond. 2) Selecteer "Show

  18. Remote administration and user experience evaluation of the iLab Heat Transfer Project site

    E-Print Network [OSTI]

    Graham, Rodney K

    2006-01-01T23:59:59.000Z

    The iLab Heat Transfer Project provides a means for students to remotely execute, via a web interface, experiments related to the topic of heat transfer. The website associated with this project provides instructors with ...

  19. Executive Secretariat | Department of Energy

    Energy Savers [EERE]

    Executive Secretariat The Office of the Executive Secretariat manages the Department's top-level written communications, such as letters, information, action, and decision memos,...

  20. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements Recently ApprovedReliability Technology earnsRemembering 9-11'sRemote

  1. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT: Execution of arbitrary code via network, User...

  2. Data processing with microcode designed with source coding

    DOE Patents [OSTI]

    McCoy, James A; Morrison, Steven E

    2013-05-07T23:59:59.000Z

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  3. Steering Committee Executive Sponsor,

    E-Print Network [OSTI]

    Alvarez-Cohen, Lisa

    , Academic Planning & Facilities Executive Vice Chancellor & Provost George W. Breslauer Members Hermalin, Representative, Budget and Interdepartmental Relations Chika Kondo, Undergraduate Student Implementation Project Team Functional Owner, Mara Hancock, Director, Educational Technology Services Members

  4. Carrie Takeyasu Executive Director

    E-Print Network [OSTI]

    Burg, Theresa

    Carrie Takeyasu Executive Director Daryl Schacher Manager, Materials Management Lyn Jose Besplug Materials Handling Worker Chris Charles Materials Handling Worker Gerry Ste Marie Materials Handling Worker Mark Sabo Materials Handling Worker Michele Roberts General Clerk Laurie Martin Purchasing

  5. Sandia National Laboratories: REMOTE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    REMOTE Sandia to Partner with MOgene Green Chemicals on ARPA-E REMOTE Project On October 2, 2013, in Energy, News, News & Events, Partnership, Research & Capabilities,...

  6. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  7. Code Description Code Description

    E-Print Network [OSTI]

    Leave* 5127 Officials 5217 Faculty Sick Leave Payment 5124 Personal Service Contracts 5211 Research Services Contracts Scholarships & Fellowships Faculty Fringe Contract Services #12;Banner Account Code

  8. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-08-31T23:59:59.000Z

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  9. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

    2009-04-14T23:59:59.000Z

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  10. On-Road Remote Sensing of Automobile Emissions in the Phoenix Area: Year 4,

    E-Print Network [OSTI]

    Denver, University of

    On-Road Remote Sensing of Automobile Emissions in the Phoenix Area: Year 4, November 2002 Gary A Sensing of Automobile Emissions in the Phoenix Area: Year 4 1 EXECUTIVE SUMMARY The University of Denver #12;On-Road Remote Sensing of Automobile Emissions in the Phoenix Area: Year 4 2 by 5 years

  11. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC...

  12. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC...

  13. U-052: HP Protect Tools Device Access Manager Unspecified Bug...

    Broader source: Energy.gov (indexed) [DOE]

    Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

  14. Executive report Building knowledge

    E-Print Network [OSTI]

    Geffner, Hector

    Executive report Building knowledge To build citizens To build cities UPF CAMPUS ICŔRIA INTERNATIONAL PROJECT 2010 International Campus of Excellence Programme #12;2 UPF CAMPUS ICŔRIA INTERNATIONAL this presentation from the one submitted in the CEI 2009 programme where UPF was classified as a `promising

  15. Execution Version POWER PURCHASE AGREEMENT

    E-Print Network [OSTI]

    Firestone, Jeremy

    ") and BLUEWATER WIND DELAWARE LLC ("Seller") June 23, 2008 #12;Execution Version POWER PURCHASE AGREEMENT TableExecution Version POWER PURCHASE AGREEMENT between DELMARVA POWER & LIGHT COMPANY ("Buyer 3.5 Energy Forecasts, Scheduling and Balancing.......................................... 40 3

  16. Executive Committee | Department of Energy

    Office of Environmental Management (EM)

    Executive Committee Executive Committee May 27, 2015 6:00PM to 7:00PM EDT The meeting is open to the public. Location: DOE Information Center 1 Science.Gov Way Oak Ridge, TN 37830...

  17. Business Model Guide Executive Summary

    Broader source: Energy.gov [DOE]

    The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

  18. ENGO 435 Remote Sensing LAB 1: INTRODUCTION TO REMOTE SENSING

    E-Print Network [OSTI]

    Habib, Ayman

    ENGO 435 ­ Remote Sensing Fall 2003 LAB 1: INTRODUCTION TO REMOTE SENSING Due: By 4:30 pm on September 30th Objectives: To familiarize you with: Remote sensing resources on the Internet. Some remote (Metadata). Part A: Remote Sensing Resources There is a wealth of remote sensing information and data

  19. Remote Desktop | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Desktop Use a remote desktop connection to access your work computer from home. Using Remote Desktop to Connect to Your Work Computer With Remote Desktop, you can have...

  20. National Ignition Facility project execution plan

    SciTech Connect (OSTI)

    Paisner, J., LLNL

    1997-08-01T23:59:59.000Z

    This project execution plan covers: Justification of Mission Need; Project Description; Management Roles and Responsibilities; Project Execution; Method of Accomplishment.

  1. Spinal codes

    E-Print Network [OSTI]

    Perry, Jonathan, S.M. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    Spinal codes are a new class of rateless codes that enable wireless networks to cope with time-varying channel conditions in a natural way, without requiring any explicit bit rate selection. The key idea in the code is the ...

  2. Foundational Certified Code in a Metalogical KARL CRARY and SUSMIT SARKAR

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    Foundational Certified Code in a Metalogical Framework KARL CRARY and SUSMIT SARKAR Carnegie Mellon not reflect the views of this agency. #12;2 · K. Crary and S. Sarkar the executable code is accompanied

  3. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser ServicesUsers' Executive

  4. Remote File PC Users Guide

    E-Print Network [OSTI]

    University of Technology, Sydney

    UTS: ITD Remote File Access 2010 PC Users Guide V3.0 #12;UTS:ITD Remote File Access: PC Users Guide Part III: Accessing Remote File Access 8 Part IV: Using Remote File Access 14 Part V: FAQ 25 #12;UTS:ITD Remote File Access: PC Users Guide v3.0 2010 3 1. What is Remote File Access? UTS Remote File Access

  5. Fuzzy Partitioning Using Real Coded Variable Length Genetic Algorithm for Pixel Classification

    E-Print Network [OSTI]

    Bandyopadhyay, Sanghamitra

    , fuzzy clustering, pattern recognition, remote sensing imagery, Department of Computer Science, KalyaniFuzzy Partitioning Using Real Coded Variable Length Genetic Algorithm for Pixel Classification space. Real-coded variable string length genetic fuzzy clustering with automatic evolution of clusters

  6. Remote Sensing ENGO 435 Introduction to Remote Sensing

    E-Print Network [OSTI]

    Habib, Ayman

    1 Remote Sensing ENGO 435 Introduction to Remote Sensing Fall 2003 #12;2 Remote Sensing ENGO 435://www.geomatics.ucalgar.ca/~habib/courses.html #12;3 Remote Sensing ENGO 435 Grading Scheme · Lab Assignments (5 labs): (25% of Total Grade will be reduced by 10% per day for each day overdue. #12;4 Remote Sensing ENGO 435 Programming & Software

  7. Remote I/O : fast access to distant storage.

    SciTech Connect (OSTI)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17T23:59:59.000Z

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  8. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, Russell E. (West Melbourne, FL)

    1987-01-01T23:59:59.000Z

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  9. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28T23:59:59.000Z

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  10. Remote Belief: Preserving Volition 2 Remote Belief: Preserving Volition 3

    E-Print Network [OSTI]

    Sivilotti, Paul

    1 ! " Remote Belief: Preserving Volition 2 # $ % & # ' # (& #) & $ $ $ $ $ & $ * # # $ $ * # * # $ $ # $ & # * & & %+ $ ' # & $ Remote Belief: Preserving Volition 3 , $ (- ). / $ / $ / 0 1/ / & $ / 0 $ $ & (1 - & ) 2 & # & $ & / 3 & / * # $ / 4 & Remote Belief: Preserving Volition 4 ! All possible scenarios Equivalence classes of scenarios

  11. Remote USB Ports

    E-Print Network [OSTI]

    Roshan, Rakesh

    2013-10-01T23:59:59.000Z

    or actuator placed in fields can be accessed by a system remotely and securely. In this thesis, we propose a remote USB port, which is an abstraction of a USB port. In the USB core driver of the server machine, with the hub information, port status of all...

  12. Remote actuated valve implant

    DOE Patents [OSTI]

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25T23:59:59.000Z

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  13. JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP

    E-Print Network [OSTI]

    Peak, Derek

    JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP MENTOR HANDBOOK September2014................................................................................................................................................... 3 C. Benefits of JSGS Internships .................................................................................................................................... 4 Both partner organizations and interns benefit from JSGS Executive Internships

  14. SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...

    Office of Environmental Management (EM)

    SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal Training SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal...

  15. Executive Order 13423: Strengthening Federal Environmental, Energy...

    Broader source: Energy.gov (indexed) [DOE]

    text of Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management. eo13423.pdf More Documents & Publications Executive Order 13423-...

  16. Code constructions and code families for nonbinary quantum stabilizer code

    E-Print Network [OSTI]

    Ketkar, Avanti Ulhas

    2005-11-01T23:59:59.000Z

    Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer codes have received much...

  17. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  18. Procedure-level Authorization for Java Remote Method Invocation Using SSL Credentials

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Procedure-level Authorization for Java Remote Method Invocation Using SSL Credentials Alexander of any thread assumptions. KEYWORDS Java, RMI, RPC, mobile code, SSL, Authorization #12;i TABLE............................................................ 2 Figure 2: The creation and registration of an SSL socket

  19. Center for Remote Sensing Remote Sensing Seminar Series 2009

    E-Print Network [OSTI]

    Firestone, Jeremy

    Feili Li Center for Remote Sensing 10-20-2009 Remote Sensing Seminar Series 2009 #12;Outline for Meteorological Satellite Studies · University of South Florida - Institute for Marine Remote Sensing · Rutgers MODIS Today Real-Time Polar Remote Sensing Products #12;Software Visualization FlAniS AniS is still

  20. A PVM Executive Program for Use with RELAP5-3D

    SciTech Connect (OSTI)

    Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

    2002-04-01T23:59:59.000Z

    A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

  1. Holographic codes

    E-Print Network [OSTI]

    Latorre, Jose I

    2015-01-01T23:59:59.000Z

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  2. Holographic codes

    E-Print Network [OSTI]

    Jose I. Latorre; German Sierra

    2015-02-23T23:59:59.000Z

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  3. Extension Program Council's Executive Board.

    E-Print Network [OSTI]

    Marshall, Mary G.; Richardson, Burl B.

    1986-01-01T23:59:59.000Z

    ~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate...

  4. Regulatory constraints on executive compensation

    E-Print Network [OSTI]

    Joskow, Paul L.

    1993-01-01T23:59:59.000Z

    This paper explores the influence of economic regulation on the level and structure of executive compensation. We find substantial and persistent differences in CEO compensation between firms subject to economic regulation ...

  5. Presidential Orders Executive Order 31

    E-Print Network [OSTI]

    Yetisgen-Yildiz, Meliha

    1 Presidential Orders Executive Order 31 Non-discrimination and Affirmative Action 1. Non. As permitted by applicable law, the University will take affirmative action to ensure equality of opportunity

  6. U-017: HP MFP Digital Sending Software Lets Local Users Obtain...

    Broader source: Energy.gov (indexed) [DOE]

    TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  7. REMOTE SENSING OF THE ENVIRONMENT

    E-Print Network [OSTI]

    Gilbes, Fernando

    1 CHAPTER 1: REMOTE SENSING OF THE ENVIRONMENT REFERENCE: Remote Sensing of the Environment John R. Jensen (2007) Second Edition Pearson Prentice Hall What is Remote Sensing? #12;2 Photogrammetry ­ the art of identifying objects and judging their significance (Colwell, 1966). Remote Sensing ­ the measurement

  8. Thermal Infrared Remote Sensing

    E-Print Network [OSTI]

    Thermal Infrared Remote Sensing Thermal Infrared Remote Sensing #12;0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4 and x-ray Ultraviolet Infrared Microwave and radio waves Wavelength in meters (m) Electromagnetic.77 700 red limit 30k0.041 2.48 green500 near-infrared far infrared ultraviolet Thermal Infrare refers

  9. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph (Las Cruces, NM); Olsen, Khris (Richland, WA); Larson, David (Las Cruces, NM)

    1997-01-01T23:59:59.000Z

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  10. Parallel execution model for Prolog

    SciTech Connect (OSTI)

    Fagin, B.S.

    1987-01-01T23:59:59.000Z

    One candidate language for parallel symbolic computing is Prolog. Numerous ways for executing Prolog in parallel have been proposed, but current efforts suffer from several deficiencies. Many cannot support fundamental types of concurrency in Prolog. Other models are of purely theoretical interest, ignoring implementation costs. Detailed simulation studies of execution models are scare; at present little is known about the costs and benefits of executing Prolog in parallel. In this thesis, a new parallel execution model for Prolog is presented: the PPP model or Parallel Prolog Processor. The PPP supports AND-parallelism, OR-parallelism, and intelligent backtracking. An implementation of the PPP is described, through the extension of an existing Prolog abstract machine architecture. Several examples of PPP execution are presented, and compilation to the PPP abstract instruction set is discussed. The performance effects of this model are reported, based on a simulation of a large benchmark set. The implications of these results for parallel Prolog systems are discussed, and directions for future work are indicated.

  11. High Performance “Reach” Codes

    E-Print Network [OSTI]

    Edelson, J.

    2011-01-01T23:59:59.000Z

    Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

  12. CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 Hunter College of the City Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR DEGREE AUDIT UNIT Student Specialization Section #12;CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 *****A SEPARATE

  13. CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1/24/2006 Hunter College of the City-mail address Department Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR, DEGREE Section Only For January 2010 Graduate #12;CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1

  14. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12T23:59:59.000Z

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  15. Business Development Executive (BDE) Program

    SciTech Connect (OSTI)

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05T23:59:59.000Z

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  16. Remote connector development study

    SciTech Connect (OSTI)

    Parazin, R.J.

    1995-05-01T23:59:59.000Z

    Plutonium-uranium extraction (PUREX) connectors, the most common connectors used at the Hanford site, offer a certain level of flexibility in pipe routing, process system configuration, and remote equipment/instrument replacement. However, these desirable features have inherent shortcomings like leakage, high pressure drop through the right angle bends, and a limited range of available pipe diameters that can be connect by them. Costs for construction, maintenance, and operation of PUREX connectors seem to be very high. The PUREX connector designs include a 90{degree} bend in each connector. This increases the pressure drop and erosion effects. Thus, each jumper requires at least two 90{degree} bends. PUREX connectors have not been practically used beyond 100 (4 in.) inner diameter. This study represents the results of a survey on the use of remote pipe-connection systems in US and foreign plants. This study also describes the interdependence between connectors, remote handling equipment, and the necessary skills of the operators.

  17. Executive Summit on Wind Research and Development | Department...

    Office of Environmental Management (EM)

    Executive Summit on Wind Research and Development Executive Summit on Wind Research and Development Executive Summit on Wind Research and Development Each year, DOE EERE invests...

  18. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, J.; Olsen, K.; Larson, D.

    1997-10-14T23:59:59.000Z

    An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

  19. rfs Remote File System Softwarepraktikum fur Fortgeschrittene

    E-Print Network [OSTI]

    rfs ­ Remote File System Softwarepraktikum f¨ur Fortgeschrittene Parallele und Verteilte Systeme. Overview 5 2.1. Remote File System Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2. Remote File System Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3. Global Remote

  20. NARSTO OZONE ASSESSMENT EXECUTIVE SUMMARY

    E-Print Network [OSTI]

    vi NARSTO OZONE ASSESSMENT EXECUTIVE SUMMARY Prepared as a NARSTO initiative, this tropospheric O3 in the accompanying Textbox, the NARSTO Ozone Assessment contains two product components. The first of these is a set aspects of tropospheric ozone pollution. The second component, the NARSTO Ozone Assessment Document

  1. Faculty of Engineering Executive Committee

    E-Print Network [OSTI]

    Petriu, Emil M.

    is in progress. #12;2 The Dean met with the ESS executive and informed then that the Faculty is open to a shared or broader use of CBY A04. Once the ESS has revised their preliminary proposal, the Faculty will undertake to be submitted this week. The Dean discussed our pilot evaluation of TAs at the academic planning committee. TA

  2. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    de Lijser, Peter

    Rev 2/2013 Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

  3. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08T23:59:59.000Z

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.

  4. UCSF Sustainability Action Plan: Executive Summary

    E-Print Network [OSTI]

    Yamamoto, Keith

    UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

  5. Northwest Energy Efficiency Taskforce Executive Committee

    E-Print Network [OSTI]

    #12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

  6. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

  7. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

  8. Interpreting Remote Sensing NOx Measurements

    E-Print Network [OSTI]

    Denver, University of

    Interpreting Remote Sensing NOx Measurements Robert Slott, Consultant, Donald Stedman and Saj tailpipe emissions (HC, CO, NOx) are changing with time hUse remote sensing hMeasurements in at least 4 of the year at each location hUniform QC/QA and data reporting Paper # 2001-01-3640 #12;Remote Sensing

  9. Remote Implementation of Quantum Operations

    E-Print Network [OSTI]

    Susana F. Huelga; Martin B. Plenio; Guo-Yong Xiang; Jian Li}and Guang-Can Guo

    2005-09-08T23:59:59.000Z

    Shared entanglement allows, under certain conditions, the remote implementation of quantum operations. We revise and extend recent theoretical results on the remote control of quantum systems as well as experimental results on the remote manipulation of photonic qubits via linear optical elements.

  10. Executive Order 13423- Strengthening Federal Environmental, Energy...

    Energy Savers [EERE]

    423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

  11. Vacuum Vessel Remote Handling

    E-Print Network [OSTI]

    and Remote Handling 4 Vacuum vessel functions · Plasma vacuum environment · Primary tritium confinement, incl ports 65 tonnes - Weight of torus shielding 100 tonnes · Coolant - Normal Operation Water, Handling 12 Vessel octant subassembly fab. (3) · Octant-to-octant splice joint requires double wall weld

  12. Remote Sensing Ayman F. Habib Introduction

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 1 Introduction #12;Remote Sensing Ayman F. Habib 2 Overview · Remote sensing: definition. · Remote sensing versus photogrammetry. · Elements of remote sensing. · Key;Remote Sensing Ayman F. Habib 3 Overview · Acquisition platforms: ­ Historical overview. ­ Terrestrial

  13. ByteCode 2011 LCT: An Open Source Concolic Testing Tool

    E-Print Network [OSTI]

    Heljanko, Keijo

    recently received interest is concolic testing which combines concrete and symbolic execution. Based Concolic testing [5,11,2] is a method where a given program is executed both concretely and symbolicallyByteCode 2011 LCT: An Open Source Concolic Testing Tool for Java Programs1 Kari K¨ahk¨onen, Tuomas

  14. Executive Director Carleton Sustainable Energy Research Centre

    E-Print Network [OSTI]

    Dawson, Jeff W.

    Executive Director Carleton Sustainable Energy Research Centre Carleton University is seeking to appoint an Executive Director to its Sustainable Energy Research Centre. This Centre is one of a series of recent Carleton initiatives in the area of sustainable energy. The Executive Director

  15. December 17, 2008 Robert Almgren / Encyclopedia of Quantitative Finance Execution Costs 1 Execution Costs

    E-Print Network [OSTI]

    Almgren, Robert F.

    December 17, 2008 Robert Almgren / Encyclopedia of Quantitative Finance Execution Costs 1 Execution Costs Execution costs are the difference in value between an ideal trade and what was actually done. The execution cost of a single completed trade is typically the difference between the final average trade price

  16. Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA

    E-Print Network [OSTI]

    Pasareanu, Corina

    Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA-level concrete execution for generating test cases that satisfy user-specified testing criteria. We have to testing complex safety critical software that combines unit-level symbolic execution and system

  17. Collection Management Policy Executive Summary

    E-Print Network [OSTI]

    Levi, Ran

    Collection Development Budget Allocation 1.4 Responsibility for Collection Development within the Library 2 Management 3.1 Locations and Availability of Material 3.1.1 Heavy Demand 3.1.2 Closed access and remote - Collection Maintenance and Evaluation 4.1 De-Selection of Materials #12;4.1.1 Criteria for Retention

  18. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Energy Savers [EERE]

    T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute...

  19. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-07-23T23:59:59.000Z

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  20. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  1. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    None

    2014-11-06T23:59:59.000Z

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  2. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29T23:59:59.000Z

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  3. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

    1997-12-16T23:59:59.000Z

    A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

  4. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K. (Ballston Spa, NY); Wilkinson, Jay C. (Ballston Spa, NY); Wooding, David R. (Saratoga Springs, NY)

    1997-01-01T23:59:59.000Z

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  5. Automatic generation of executable communication specifications from parallel applications

    SciTech Connect (OSTI)

    Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

    2011-01-19T23:59:59.000Z

    Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  7. NREL: Energy Executive Leadership Academy - Executive Energy Leadership

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Saleshttp://www.fnal.gov/directorate/nalcal/nalcal02_07_05_files/nalcal.gifNRELPowerNewsletterAcademy Alumni Executive Energy

  8. Remote state preparation: arbitrary remote control of photon polarization Nicholas A. Peters,1

    E-Print Network [OSTI]

    Kwiat, Paul

    Remote state preparation: arbitrary remote control of photon polarization Nicholas A. Peters,1 University, Kirksville, MO 63501 (Dated: October 22, 2004) We experimentally demonstrate the first remote, we remotely prepare arbitrary states at two wavelengths. Further, we derive theoretical bounds

  9. Executive Resources | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 Russian NuclearandJunetrackEllen|July 14,Department ofExecutive Resources

  10. STEP Participant Survey Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy atLLC - FE DKT. 10-160-LNG - ORDERSTATE ENERGY PROGRAMJulyExecutive S ummary

  11. Office of the Executive Secretariat

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National,2008aims to increaseExecutive

  12. FY2003 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive

  13. FY2005 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive5

  14. FY2006 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive56

  15. FY2007 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive567

  16. An Extended Network Coding Opportunity Discovery Scheme in Wireless Networks

    E-Print Network [OSTI]

    Zhao, Yunlong; Iwai, Masayuki; Sezaki, Kaoru; Tobe, Yoshito; 10.5121/ijcnc.2012.4106

    2012-01-01T23:59:59.000Z

    Network coding is known as a promising approach to improve wireless network performance. How to discover the coding opportunity in relay nodes is really important for it. There are more coding chances, there are more times it can improve network throughput by network coding operation. In this paper, an extended network coding opportunity discovery scheme (ExCODE) is proposed, which is realized by appending the current node ID and all its 1-hop neighbors' IDs to the packet. ExCODE enables the next hop relay node to know which nodes else have already overheard the packet, so it can discover the potential coding opportunities as much as possible. ExCODE expands the region of discovering coding chance to n-hops, and have more opportunities to execute network coding operation in each relay node. At last, we implement ExCODE over the AODV protocol, and efficiency of the proposed mechanism is demonstrated with NS2 simulations, compared to the existing coding opportunity discovery scheme.

  17. REMOTE AND RURAL ENTERPRISE (RARE)

    E-Print Network [OSTI]

    Viglas, Anastasios

    in remote central Australia is establishing a commercial aquaponics enterprise, a social entrepreneur, hospitality and horticulture. The current focus is on a commercial aquaponics enterprise and a cultural

  18. Generalized concatenated quantum codes

    E-Print Network [OSTI]

    Grassl, Markus

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using ...

  19. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote AccessSpectrum

  20. Budget Execution Funds Distribution and Control

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-01-09T23:59:59.000Z

    The Order describes Department of Energy systems, requirements, and assignment of responsibilities for control of the Department budget execution process. Cancels DOE O 135.1.

  1. 2009 Wind Technologies Market Report: Executive Summary

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.

    2010-08-01T23:59:59.000Z

    This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

  2. Concatenated Conjugate Codes

    E-Print Network [OSTI]

    Mitsuru Hamada

    2006-10-31T23:59:59.000Z

    A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

  3. CURRICULUM CODE 308 DEGREE CODE _40

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE 308 DEGREE CODE _40 Hunter College of the City University of New York - Office Print) E-mail address OES Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR Specialization Section #12;CURRICULUM CODE_308_ DEGREE CODE _40__ Course Prefix & Number Course Title Credits

  4. Remote-State Prparation eines einzelnen Atoms

    E-Print Network [OSTI]

    Weinfurter, Harald

    Remote-State Präparation eines einzelnen Atoms Diplomarbeit am Department für Physik der Ludwig . . . . . . . . . . . . . . . . . . . . . 8 1.3.3 Remote-State-Präparation . . . . . . . . . . . . . . . . . . . . . 11 1.3.4 Zusammenfassung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3 Remote-State-Präparation 31 3.1 Einleitung

  5. Remotely operated pipe connector

    DOE Patents [OSTI]

    Josefiak, Leonard J. (Scotia, NY); Cramer, Charles E. (Guilderford, NY)

    1988-01-01T23:59:59.000Z

    An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

  6. Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for

    E-Print Network [OSTI]

    Corbalan, Julita

    Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors UPC Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya #12;Dept. d'Arquitectura de Computadors Execution Environments

  7. Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for

    E-Print Network [OSTI]

    Corbalan, Julita

    Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya Dept. d'Arquitectura de Computadors Execution Environments for Parallel

  8. Modeling Correlation Noise Statistics at Decoder for Pixel Based Wyner-Ziv Video Coding *

    E-Print Network [OSTI]

    Pereira, Fernando

    , and is responsible to achieve the best rate-distortion (RD) performance, while the decoder remains a pure executer in Wyner-Ziv (WZ) video coding, a particular case of DVC. In the literature, many practical WZ coding once and decoded many times, i.e. one-to-many topologies, such as broadcasting or video-on-demand

  9. IBM Global Business Services Executive Report

    E-Print Network [OSTI]

    -based strategic insights for senior executives around critical public and private sector issues. This executive perspectives Creating new business models for a changing world of energy Energy and Utilities #12;IBM Institute to facilitate not only traditional energy generation and delivery, but also emerging products and services

  10. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2011-09-01T23:59:59.000Z

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  11. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2010-10-01T23:59:59.000Z

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the “Grand Challenge” for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  12. Homological stabilizer codes

    SciTech Connect (OSTI)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15T23:59:59.000Z

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  13. The Minimum Assumed Incentive Effect of Executive Share Options 

    E-Print Network [OSTI]

    Main, Brian G M; Skovoroda, Rodion; Buck, Trevor; Bruce, Alistair

    2003-01-01T23:59:59.000Z

    In granting executive share options (ESOs), companies hand over financial assets to the executive at an opportunity cost that generally outweighs the value placed on those assets by the executive on the receiving end. This ...

  14. Insertion of operation-and-indicate instructions for optimized SIMD code

    DOE Patents [OSTI]

    Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

    2013-06-04T23:59:59.000Z

    Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

  15. Half-Product Codes

    E-Print Network [OSTI]

    Emmadi, Santosh Kumar

    2014-12-11T23:59:59.000Z

    A class of codes, half-product codes, derived from product codes, is characterized. These codes have the implementation advantages of product codes and possess a special structural property which leads them to have larger (at least 3/2 times more...

  16. Executive Order 12088: Federal Compliance with Pollution Control...

    Energy Savers [EERE]

    088: Federal Compliance with Pollution Control Standards Executive Order 12088: Federal Compliance with Pollution Control Standards The head of each Executive agency is responsible...

  17. Eastern Wind Integration and Transmission Study: Executive Summary...

    Energy Savers [EERE]

    Study: Executive Summary and Project Overview Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview This study evaluates the future operational...

  18. FY 2006 Executive Order 13101 Report: Department of Energy Affirmative...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 31207 FY 2006 Executive Order 13101 Report: Department of...

  19. American Indian Policy and Relevant DOE and Executive Orders...

    Energy Savers [EERE]

    Services Communication & Engagement Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive...

  20. Renewable Energy Requirement Guidance for EPAct 2005 and Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies conditions for...

  1. New Executive Order Establishes a Federal Flood Risk Management...

    Energy Savers [EERE]

    New Executive Order Establishes a Federal Flood Risk Management Standard New Executive Order Establishes a Federal Flood Risk Management Standard February 5, 2015 - 10:55am Addthis...

  2. Richard Lazarus Named as Executive Director of National Commission...

    Office of Environmental Management (EM)

    Lazarus Named as Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National...

  3. White House Announces New Executive Order To Reduce Greenhouse...

    Energy Savers [EERE]

    White House Announces New Executive Order To Reduce Greenhouse Gas Emissions in the Federal Government White House Announces New Executive Order To Reduce Greenhouse Gas Emissions...

  4. President Issues Executive Order Aimed at Preparing for the Impacts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for the...

  5. List of codes Language abbreviation codes

    E-Print Network [OSTI]

    Portugal MT Malta GR Greece SE Sweden TR Turkey Country codes for the ERASMUS Institutional Identification codes A Austria IR L Ireland BG Bulgaria LV Latvia B Belgium IS Iceland CY Cyprus MT Malta D Germany L

  6. Generalized Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Grassl, Markus

    We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are ...

  7. Remote Method Invocations 13.1 Introduction

    E-Print Network [OSTI]

    Garg, Vijay

    Chapter 13 Remote Method Invocations 13.1 Introduction A popular way of developing distributed applications is based on the concept of remote procedure calls (RPC's) or remote method invocations (RMI's). Here the main idea is that a process can make calls to methods of a remote object as if it were

  8. Remote Sensing Ayman F. Habib Image Classification

    E-Print Network [OSTI]

    Habib, Ayman

    1 Remote Sensing Ayman F. Habib 1 Chapter 6 Image Classification Remote Sensing Ayman F. Habib 2. ­ Unsupervised classification. · Accuracy assessment. #12;2 Remote Sensing Ayman F. Habib 3 Image Classification of image pixels is based on their digital numbers/grey values in one or more spectral bands. Remote Sensing

  9. Quantum convolutional stabilizer codes

    E-Print Network [OSTI]

    Chinthamani, Neelima

    2004-09-30T23:59:59.000Z

    Quantum error correction codes were introduced as a means to protect quantum information from decoherance and operational errors. Based on their approach to error control, error correcting codes can be divided into two different classes: block codes...

  10. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by...

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2009 S.B. 1182 created the Oklahoma Uniform Building Code Commission. The 11-member Commission was given the power to conduct rulemaking processes to adopt new building codes. The codes adopted...

  12. Remote Sensing Ayman F. Habib Radiometric Processing of Remote Sensing Data

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 4 Radiometric Processing of Remote Sensing Data #12;Remote. · Noise removal. · Point and edge detection. ­ Frequency domain. #12;Remote Sensing Ayman F. Habib 3 Radiometric Calibration #12;Remote Sensing Ayman F. Habib 4 Recorded Digital Numbers (DN) · Recorded grey

  13. Codeword Stabilized Quantum Codes

    E-Print Network [OSTI]

    Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng

    2007-09-27T23:59:59.000Z

    We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.

  14. Generalized Concatenated Quantum Codes

    E-Print Network [OSTI]

    Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng

    2009-01-09T23:59:59.000Z

    We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.

  15. Encoding Subsystem Codes

    E-Print Network [OSTI]

    Pradeep Kiran Sarvepalli; Andreas Klappenecker

    2008-06-30T23:59:59.000Z

    In this paper we investigate the encoding of operator quantum error correcting codes i.e. subsystem codes. We show that encoding of subsystem codes can be reduced to encoding of a related stabilizer code making it possible to use all the known results on encoding of stabilizer codes. Along the way we also show how Clifford codes can be encoded. We also show that gauge qubits can be exploited to reduce the encoding complexity.

  16. Chit-based Remote Storage

    E-Print Network [OSTI]

    Paluska, Justin Mazzola

    We propose a model for reliable remote storage founded on contract law. Consumers submit their bits to storage providers in exchange for a chit. A chit is a cryptographically secure, verifiable contract between a consumer ...

  17. Project Execution Plan, Rev. 3

    SciTech Connect (OSTI)

    IT Corporation, Las Vegas

    2002-08-01T23:59:59.000Z

    This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

  18. On optimal constacyclic codes

    E-Print Network [OSTI]

    Giuliano G. La Guardia

    2013-11-11T23:59:59.000Z

    In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  20. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  1. Account Executive Account Manager of Sales

    E-Print Network [OSTI]

    Engineer Naval Surface Ship Warfare Officer Network Administrator Networking/Engineering Level II NetworkAccount Executive Account Manager of Sales Administrative Assistant Advanced Systems Engineer Engineer Assistant Administrator Assistant Analyst Assistant Development Engineer Assistant Director

  2. Executive Committee meeting | Department of Energy

    Office of Environmental Management (EM)

    meeting Executive Committee meeting June 24, 2015 6:00PM to 7:00PM EDT The meeting is open to the public. Location: DOE Information Center 1 Science.Gov Way Oak Ridge, TN 37830...

  3. v 2002 SITE ENVIRONMENTAL REPORT Executive Summary

    E-Print Network [OSTI]

    Homes, Christopher C.

    Department of Environmental Conservation (NYSDEC) granted BNLs request to modify its State Pollutantv 2002 SITE ENVIRONMENTAL REPORT Executive Summary The 2002 Site Environmental Report (SER the status of Brookhaven National Laboratorys (BNL) environmental pro- grams and performance and restoration

  4. Executive Summary Mitigation of Climate Change through

    E-Print Network [OSTI]

    Brown, Sally

    Executive Summary Mitigation of Climate Change through Land Reclamation with Biosolids: Carbon storage in reclaimed mine soils, life cycle analysis of biosolids reclamation, and ecosystem services; Pacala and Socolow, 2004). · Land reclamation with municipal wastewater solids (biosolids) can play

  5. Stateless and stateful implementations of faithful execution

    DOE Patents [OSTI]

    Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

    2014-12-16T23:59:59.000Z

    A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

  6. Chief executive officers: their mentoring relationships

    E-Print Network [OSTI]

    Rosser, Manda Hays

    2005-02-17T23:59:59.000Z

    CHIEF EXECUTIVE OFFICERS: THEIR MENTORING RELATIONSHIPS A Dissertation by MANDA HAYS ROSSER Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... EXECUTIVE OFFICERS: THEIR MENTORING RELATIONSHIPS A Dissertation by MANDA HAYS ROSSER Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved as to style and content by...

  7. TECATE - a code for anisotropic thermoelasticity in high-average-power laser technology. Phase 1 final report

    SciTech Connect (OSTI)

    Gelinas, R.J.; Doss, S.K.; Carlson, N.N.

    1985-01-01T23:59:59.000Z

    This report describes a totally Eulerian code for anisotropic thermoelasticity (code name TECATE) which may be used in evaluations of prospective crystal media for high-average-power lasers. The present TECATE code version computes steady-state distributions of material temperatures, stresses, strains, and displacement fields in 2-D slab geometry. Numerous heat source and coolant boundary condition options are available in the TECATE code for laser design considerations. Anisotropic analogues of plane stress and plane strain evaluations can be executed for any and all crystal symmetry classes. As with all new and/or large physics codes, it is likely that some code imperfections will emerge at some point in time.

  8. Remote monitoring for international safeguards

    SciTech Connect (OSTI)

    Dupree, S.A. [Sandia National Labs., Albuquerque, NM (United States); Sonnier, C.S. [Jupiter Corp., Albuquerque, NM (United States)

    1997-09-01T23:59:59.000Z

    Remote monitoring is not a new technology, and its application to safeguards relevant activities has been examined for a number of years. On behalf of the US Department of Energy and international partners, remote monitoring systems have been emplaced in nuclear facilities and laboratories in various parts of the world. The experience gained from these field trials of remote monitoring systems has shown the viability of the concept of using integrated monitoring systems. Although a wide variety of sensors has been used in the remote monitoring field trials conducted to date, the possible range of instrumentation that might be used has scarcely been touched. As the technology becomes widespread, large amounts of data will become available to inspectors responsible for safeguards activities at the sites. Effective use of remote monitoring will require processing, archiving, presenting, and assessing of these data. To provide reasonable efficiency in the application of this technology, data processing should be done in a careful and organized manner. The problem will be not an issue of poring over scant records but of surviving under a deluge of information made possible by modern technology. Fortunately, modern technology, which created the problem of the data glut, is available to come to the assistance of those inundated by data. Apart from the technological problems, one of the most important aspects of remote monitoring is the potential constraint related to the transmission of data out of a facility or beyond national borders. Remote monitoring across national borders can be seriously considered only in the context of a comprehensive, transparent, and open implementation regime.

  9. Vol. 48 No. SIG 0(PRO 35) 2007 Java Remote GluonJ Remote GluonJ

    E-Print Network [OSTI]

    Chiba, Shigeru

    Vol. 48 No. SIG 0(PRO 35) 2007 Java Remote GluonJ Remote GluonJ Remote GluonJ Remote GluonJ Java Remote GluonJ Remote GluonJ An AOP based Agile Development Environment for Distributed Software Muga/from the existing program easily. To support software development for Java with our method, we developed Remote

  10. Self-Tuned Remote Execution for Pervasive Computing Jason Flinn, Dushyanth Narayanan and M. Satyanarayanan

    E-Print Network [OSTI]

    Smailagic, Asim

    . The size limitations of these devices con- strain their compute power, battery energy and storage capacity

  11. SelfTuned Remote Execution for Pervasive Computing Jason Flinn, Dushyanth Narayanan and M. Satyanarayanan

    E-Print Network [OSTI]

    Flinn, Jason

    . The size limitations of these devices con­ strain their compute power, battery energy and storage capacity

  12. Using Behavior Templates To Design Remotely Executing Agents for Wireless Clients

    E-Print Network [OSTI]

    Zhou, Yuanyuan

    of Internet applications, as servers must now handle a broad range of computing power and/or connectivity to purchase merchandise over the Internet. A typical mobile client adds many challenges that must be met that a purchase was completed, possibly sending a duplicate purchase order due to an intervening disconnection

  13. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in...

  14. V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment of

  15. T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities

  16. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment

  17. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis Success

  18. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere isArbitrary

  19. Execution timesand execution jitter analysis of real-time tasks under fixed-priority pre-emptive scheduling

    E-Print Network [OSTI]

    Bril, Reinder J.

    Execution timesand execution jitter analysis of real-time tasks under fixed-priority pre In this paper, we present worst-case and best-case execution times and (absolute) execution jitter analysis fixed-priority pre-emptive scheduling (FPPS), arbitrary phasing, (absolute) activation jitter

  20. Generalized Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Markus Grassl; Peter W. Shor; Bei Zeng

    2009-05-04T23:59:59.000Z

    We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.

  1. Graph concatenation for quantum codes

    E-Print Network [OSTI]

    Beigi, Salman

    Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code and every codeword stabilized code can be described by a graph and a classical code. For the ...

  2. T-589: Citrix XenApp and Citrix Presentation Server Bug

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system.

  3. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Broader source: Energy.gov (indexed) [DOE]

    Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

  4. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  5. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-117: Potential security vulnerability has been identified with...

    Broader source: Energy.gov (indexed) [DOE]

    printer firmware. PLATFORM: Select HP printers and Digital Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a...

  7. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia...

  8. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    An update that fixes 25 vulnerabilities is now available. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  9. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    An update that fixes 25 vulnerabilities is now available. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  10. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  11. CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES

    E-Print Network [OSTI]

    Wong, Tan F.

    CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES John M. Shea, Florida Abstract--Turbo-codes provide communications near capac- ity when very large interleavers (and parity-check code can be used as an outer code with a turbo code as an inner code in a serial

  12. The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report

    SciTech Connect (OSTI)

    Not Available

    2006-09-01T23:59:59.000Z

    This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

  13. Remote Store Programming: Mechanisms and Performance

    E-Print Network [OSTI]

    Wentzlaff, David

    2009-05-05T23:59:59.000Z

    This paper presents remote store programming (RSP). This paradigm combines usability and efficiency through the exploitation of a simple hardware mechanism, the remote store, which can easily be added to existing ...

  14. Joint Source-Channel Coding via Turbo Codes

    E-Print Network [OSTI]

    Alajaji, Fady

    Joint Source-Channel Coding via Turbo Codes by Guang-Chong Zhu A dissertation submitted coding. One of the most exciting break- throughs in channel coding is the invention of Turbo codes, whose- tigate three joint source-channel coding issues in the context of Turbo codes. In the #12;rst part

  15. Remote Food Shopping Robot System in a Supermarket Realization of the shopping task from remote places

    E-Print Network [OSTI]

    Ohya, Akihisa

    Remote Food Shopping Robot System in a Supermarket ­Realization of the shopping task from remote- ulating remote objects. This system attempts to answer the challenge of extending mobile robot potentials in a supermarket from a remote location using the Internet. We built the prototype system by integrating custom

  16. Remote State Preparation: Arbitrary remote control of photon polarizations for quantum communication

    E-Print Network [OSTI]

    Kwiat, Paul

    Remote State Preparation: Arbitrary remote control of photon polarizations for quantum measurement to one photon of a polarization- entangled pair, we remotely prepare single photons in arbitrary. Finally, we discuss the states remotely preparable given a particular two-qubit resource state. Keywords

  17. Remote Sens. 2011, 3, 2529-2551; doi:10.3390/rs3112529 Remote Sensing

    E-Print Network [OSTI]

    Remote Sens. 2011, 3, 2529-2551; doi:10.3390/rs3112529 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Multispectral Remote Sensing from Unmanned Aircraft: Image Processing Workflows and Applications Abstract: Using unmanned aircraft systems (UAS) as remote sensing platforms offers the unique ability

  18. Remote Sens. 2009, 1, 519-533; doi:10.3390/rs1030519 Remote Sensing

    E-Print Network [OSTI]

    MacDonald, Lee

    Remote Sens. 2009, 1, 519-533; doi:10.3390/rs1030519 Remote Sensing ISSN 2072-4292 www of Remotely Sensed Data Paul H. Evangelista 1, *, Thomas J. Stohlgren 2 , Jeffrey T. Morisette 2 and Sunil model (Maxent) for its application and performance in remotely sensing invasive Tamarix sp. Six Landsat

  19. 10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Sensing

    E-Print Network [OSTI]

    Plaza, Antonio J.

    10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Book ReviewBook Review High Performance Computing in Remote Sensing introduces the most recent advances in the incorporation of the high-performance computing (HPC) paradigm in remote sensing missions. Eighteen well

  20. Unfolding the color code

    E-Print Network [OSTI]

    Aleksander Kubica; Beni Yoshida; Fernando Pastawski

    2015-03-06T23:59:59.000Z

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.

  1. Remote Laboratory Towards an integrated training system

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Remote Laboratory Towards an integrated training system Arnaud LELEVE, Hcene BENMOHAMED, Patrick.Meyer@ictt.ec-lyon.fr Abstract ­ Remote laboratories are essential to e-learning platforms in scientific and technical with the aim of giving means to instructors to build generic remote laboratory environments, homogeneously melt

  2. Remote Sensing for Water Quality Applications

    E-Print Network [OSTI]

    Remote Sensing for Water Quality Applications #12;Objective Give a brief update on GEO Inland and Nearshore Coastal Water Quality Remote Sensing Workshop (GEO Work Task WA-06-01)) Held in Geneva and Nearshore Coastal Water Quality Remote Sensing Workshop (GEO Work Task WA-06-01)) Organizing committee

  3. A REMOTE CONTROLLED UNDERWATER PHOTOGRAPHIC SURVEILLANCE SYSTEM

    E-Print Network [OSTI]

    A REMOTE CONTROLLED UNDERWATER PHOTOGRAPHIC SURVEILLANCE SYSTEM by Paul J. Kruse, Jr. MarineKernan, Director A Remote Controlled Underwater Photographic Surveillance System by Paul J. Kruse, Jr. United. September 1964 #12;#12;CONTENTS Page Introduction 1 Remote controlled photographic system and accessories 1

  4. List decoding of subspace codes and rank-metric codes

    E-Print Network [OSTI]

    Mahdavifar, Hessam

    2012-01-01T23:59:59.000Z

    2.2.2 Koetter-Kschischang Codes . . . . . . . . . . . .of Subspace Codes . . . . . . . . . . . . . . 2.3.1 OverviewList-decodable Codes of Arbitrary Dimension . . . . . . .

  5. A parallel execution model for Prolog

    SciTech Connect (OSTI)

    Fagin, B.

    1987-01-01T23:59:59.000Z

    In this thesis a new parallel execution model for Prolog is presented: The PPP model or Parallel Prolog Processor. The PPP supports AND-parallelism, OR- parallelism, and intelligent backtracking. An implementation of the PPP is described, through the extension of an existing Prolog abstract machine architecture. Several examples of PPP execution are presented and compilation to the PPP abstract instructions set is discussed. The performance effects of this model are reported, based on a simulation of a large benchmark set. The implications of these results for parallel Prolog systems are discussed, and directions for future work are indicated.

  6. Dependence driven execution for multiprogrammed multiprocessor

    SciTech Connect (OSTI)

    Vajracharya, S. [Los Alamos National Lab., NM (United States); Grunwald, D. [Univ. of Colorado, Boulder, CO (United States). Dept. of Computer Science

    1998-12-31T23:59:59.000Z

    Barrier synchronizations can be very expensive on multiprogramming environment because no process can go past a barrier until all the processes have arrived. If a process participating at a barrier is swapped out by the operating system, the rest of participating processes end up waiting for the swapped-out process. This paper presents a compile-time/run-time system that uses a dependence-driven execution to overlap the execution of computations separated by barriers so that the processes do not spend most of the time idling at the synchronization point.

  7. INTERVAL METHODS IN REMOTE SENSING

    E-Print Network [OSTI]

    Ward, Karen

    INTERVAL METHODS IN REMOTE SENSING: RELIABLE SUB­DIVISION OF GEOLOGICAL AREAS David D. Coblentz, G of the locations which weren't that thoroughly analyzed. 1 #12; 2 The subdivision of a geological zone TOPOGRAPHIC INFORMATION One reason for subjectivity of the geological subdivision is the fact

  8. The Remote Media Immersion (RMI)

    E-Print Network [OSTI]

    Shahabi, Cyrus

    the ultimate digital media delivery platform. Its streaming media server delivers multiple high- bandwidth aspects). The hope is that our advances in digital media delivery will enable new applicationsThe Remote Media Immersion (RMI) system blends multiple cutting- edge media technologies to create

  9. Remote Sensing Ayman F. Habib Electro-Magnetic Radiation

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 2 Electro-Magnetic Radiation #12;Remote Sensing Ayman F. Habib 2 Elements of Remote Sensing #12;Remote Sensing Ayman F. Habib 3 Chapter 2 Radiation: nature & source #12;Remote Sensing Ayman F. Habib 4 Chapter 2 Interaction with the atmosphere #12;Remote Sensing

  10. Remote Sensing Ayman F. Habib Electro-Magnetic Radiation

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 2 Electro-Magnetic Radiation Remote Sensing Ayman F. Habib 2 Elements of Remote Sensing #12;Remote Sensing Ayman F. Habib 3 Chapter 2 Radiation: nature & source Remote Sensing Ayman F. Habib 4 Chapter 2 Interaction with the atmosphere #12;Remote Sensing Ayman

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  12. Model Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  13. Compiling Codes on Euclid

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High...

  14. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01T23:59:59.000Z

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  15. Introduction to Algebraic Codes

    E-Print Network [OSTI]

    for health care. These self-correcting codes that occur in nature might be better than all of. our coding theory based on algebra or algebraic geometry. It is a myth

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

  18. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang (Athens, GA); Ljungdahl, Lars G. (Athens, GA); Chen, Huizhong (Lawrenceville, GA)

    2001-02-20T23:59:59.000Z

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    The New Jersey Uniform Construction Code Act provides that model codes and standards publications shall not be adopted more frequently than once every three years. However, a revision or amendment...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    All residential and commercial structures are required to comply with the state’s energy code. The 2009 New Mexico Energy Conservation Code (NMECC), effective June 2013, is based on 2009...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  2. Further Development at JET of Remote Digital Photogrammetry Techniques and Remote Welding Under Conditions of Restricted Access

    E-Print Network [OSTI]

    Further Development at JET of Remote Digital Photogrammetry Techniques and Remote Welding Under Conditions of Restricted Access

  3. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  4. The Remote Photogrammetric Survey and Engineering Analysis of the Divertor Structure during JET’s Remote Tile Exchange

    E-Print Network [OSTI]

    The Remote Photogrammetric Survey and Engineering Analysis of the Divertor Structure during JET’s Remote Tile Exchange

  5. Coding for Cooperative Communications

    E-Print Network [OSTI]

    Uppal, Momin Ayub

    2011-10-21T23:59:59.000Z

    of SWCNSQ based CF relaying as a performance benchmark, we will present a practical code design using low-density parity-check (LDPC) codes for error protection at the source, and nested scalar quantization plus irregular repeat-accumulate (IRA) codes... develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c...

  6. Homological Product Codes

    E-Print Network [OSTI]

    Sergey Bravyi; Matthew B. Hastings

    2013-11-04T23:59:59.000Z

    Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their simple syndrome readout circuits and potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor distance scaling limited by the square-root of the code length. This is in a sharp contrast with the classical case where good families of LDPC codes are known that combine constant encoding rate and linear distance. Here we propose the first family of good quantum codes with low-weight stabilizers. The new codes have a constant encoding rate, linear distance, and stabilizers acting on at most $\\sqrt{n}$ qubits, where $n$ is the code length. For comparison, all previously known families of good quantum codes have stabilizers of linear weight. Our proof combines two techniques: randomized constructions of good quantum codes and the homological product operation from algebraic topology. We conjecture that similar methods can produce good stabilizer codes with stabilizer weight $n^a$ for any $a>0$. Finally, we apply the homological product to construct new small codes with low-weight stabilizers.

  7. Understanding Perception Through Neural 'Codes'

    E-Print Network [OSTI]

    Freeman, Walter J III

    2011-01-01T23:59:59.000Z

    Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “

  8. Baldrige Executive Fellows Program -Prospectus Program Purpose

    E-Print Network [OSTI]

    Virtual meetings and calls throughout the year to translate learnings into actions for your company with other executives that will benefit you now and into the future Knowledge of the Baldrige framework planning; sustainability; core competencies; customer engagement; employee engagement; integration

  9. Curtin University Organisational Chart * Executive Managers

    E-Print Network [OSTI]

    Curtin University Organisational Chart * Executive Managers ** Seconded to CEC (Singapore Campus Mr Wing Chung Director Internal Audit * Professor David Wood Acting Deputy Vice-Chancellor Academic Sustainable Development Inst Mr TimothyWalton Director Energy Research Initiatives Mr Paul Nicholls Director

  10. Executive Vice President La-Verna Fountain

    E-Print Network [OSTI]

    Kim, Philip

    construction contracts went to MWL firms. During the past three fiscal years (2006-2008), Columbia contractedJoe Ienuso Executive Vice President La-Verna Fountain Associate Vice President Construction insurance and retirement benefits. Construction Jobs Referral Process As a service to those interested

  11. Academic Integrity Task Force Report Executive Summary

    E-Print Network [OSTI]

    Roy, Subrata

    . For a more comprehensive report of the findings as well as faculty suggestions for maintaining integrity1 Academic Integrity Task Force Report Executive Summary 11/22/11 INTRODUCTION CHARGE: To determine whether there is an issue with academic integrity at UF and, if so, to determine how widespread

  12. Scott Shreeve, MD Chief Executive Officer

    E-Print Network [OSTI]

    Rose, Michael R.

    is currently serving as chief executive office of Crossover Health, a next generation health care delivery, state wide health systems, and networks of primary care clinics. Dr. Shreeve is also founding member of the Health 2.0 technology and reform movement, serving as an advisor to the conference and spokesperson

  13. Executive Education Program Freight Transportation and

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

  14. February 1, 2006 Emmett Brown, Executive Director

    E-Print Network [OSTI]

    Arnold, Douglas N.

    February 1, 2006 Emmett Brown, Executive Director National Fresh Water Fishing Hall of Fame P deduce the length of the fish by assuming a height of the angler of 72" and using direct scaling. Even between the distance of the camera to the angler and to the fish. Discounting that distance leads

  15. WORLD ROBOTICS 2009 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2009 IX EXECUTIVE SUMMARY of 1. World Robotics 2009 Industrial Robots 2. World Robotics 2009 Service Robots 1. World Robotics 2009 Industrial Robots 2008 World Robot Market ­ Already affected by the economical downturn In 2008, the worldwide sales of industrial robots stagnated at about

  16. WORLD ROBOTICS 2010 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2010 VII EXECUTIVE SUMMARY of 1. World Robotics 2010 Industrial Robots 2. World Robotics 2010 Service Robots 1. World Robotics 2010 Industrial Robots Sales slump in 2009 In 2009, the worldwide economic and financial crisis caused a significant slump in the sales of industrial robots

  17. WORLD ROBOTICS 2011 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2011 VII EXECUTIVE SUMMARY of 1. World Robotics 2011 Industrial Robots 2. World Robotics 2011 Service Robots 1. World Robotics 2011 Industrial Robots 2010: Strong comeback of the robotics and financial crisis caused a significant slump in the sales of industrial robots. Compared to 2008, considered

  18. Optimal Execution with Nonlinear Impact Functions

    E-Print Network [OSTI]

    Almgren, Robert F.

    cost per share to be a power law function of the trading rate, with an arbitrary positive exponentOptimal Execution with Nonlinear Impact Functions and Trading-Enhanced Risk Robert F. Almgren October 2001 Abstract We determine optimal trading strategies for liquidation of a large single

  19. Carbon Management Plan 1. Executive summary 5

    E-Print Network [OSTI]

    Haase, Markus

    Carbon Management Plan June 2011 #12;2 #12;3 CONTENTS 1. Executive summary 5 2. Introduction 15 3. Background and context 16 4. Carbon management strategy 18 5. Carbon emissions baseline and projections 22 6. Past actions and achievements 30 7. Carbon Management Plan implementation 33 8. Carbon Management Plan

  20. Oracle SQL Exercise 1. Executing SQL Commands

    E-Print Network [OSTI]

    Lakshmanan, Laks V.S.

    . The command may extend over several lines and can be broken anywhere there is a space. SQL commands must end*Plus command. List n - displays the nth line of the command SQL> List 2 #12;Run - lists and executes the last in the buffer can be edited using the following commands. Only the current line is affected. c(hange) /oldstring

  1. UNIVERSITY OF CALIFORNIA HAITI INITIATIVE Executive Committee

    E-Print Network [OSTI]

    UNIVERSITY OF CALIFORNIA HAITI INITIATIVE Executive Committee Housed at the UCLA Program in Global'Etat d'Haiti Main Campus Planning and Reform Duration 3-4 weeks in Haiti, continual basis Funding While in Haiti: Cost of living, international transportation Background The UC Haiti Initiative (UCHI

  2. Middleware Based Executive for Embedded Reconfigurable Platforms

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Middleware Based Executive for Embedded Reconfigurable Platforms A. Khiar and N.Knecht and L embedded Multiprocessor Systems-on-Chip (MPSoC) platform containing reconfigurable hardware computing units of the french ANR FOSFOR (Flexible Operating System FOr Reconfigurable platforms) [1] project, the objective

  3. Hawaii energy strategy: Executive summary, October 1995

    SciTech Connect (OSTI)

    NONE

    1995-10-01T23:59:59.000Z

    This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

  4. Understanding Multi-Transputer Execution Susan Stepney

    E-Print Network [OSTI]

    Stepney, Susan

    of the execution of occam (2) programs. But even the static structure of an occam program is considerably more of the communication. Folds are used to control the amount of information being displayed. Once the static structure and understanding of occam programs. PAR router(...) mixer(...) worker(...) Susan Stepney. "Understanding Multi

  5. Executive Summaries for the Hydrogen Storage Materials Center...

    Energy Savers [EERE]

    Executive Summaries for the Hydrogen Storage Materials Center of Excellence - Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Executive Summaries for...

  6. Executive Function and Pediatric Overweight: A Problem-Solving Framework

    E-Print Network [OSTI]

    Johnson, Audrea

    2012-10-19T23:59:59.000Z

    . The present study examines potential relations between aspects of executive function and pediatric weight status as well as obesity-prone eating behaviors. Executive function is operationally defined as a problem-solving construct with four steps that work...

  7. Extractive Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM

    E-Print Network [OSTI]

    Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM Vale Columbia Center UNIVERSITY Center on Globalization and Sustainable Development EARTH INSTITUTE | COLUMBIA UNIVERSITY #12; Extractive Industries and Sustainable Development Executive Training

  8. Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution

    E-Print Network [OSTI]

    Near, Joseph P.

    2014-04-22T23:59:59.000Z

    Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...

  9. Shortened Turbo Codes

    E-Print Network [OSTI]

    David J.C. MacKay

    Simple arguments suggest that shortened codes must have distance properties equal to or better than those of their parent codes, and that they should be equally practical to decode. This relationship holds true in the case of low density generator codes and low density parity check codes. We investigate the properties of shortened turbo codes. I. Motivation for Shortening In our previous work on codes based on very sparse matrices we have observed that while codes with a low density generator matrix [1] are asymptotically bad, codes with a low density parity check matrix [2] are asymptotically good [3, 4, 5]. One way of viewing the relationship between low density generator matrix codes and low density parity check matrix codes is that one obtains a low density parity check matrix by taking the M \\Theta N parity check matrix [P IM ] of a (N; K) low density generator matrix code and chopping off its right-most M columns (where M = N \\Gamma K), to yield an M \\Theta K matrix [P], which...

  10. EXECUTION COSTS IN FINANCIAL MARKETS WITH SEVERAL INSTITUTIONAL INVESTORS

    E-Print Network [OSTI]

    Li, Yuying

    strategies to execute a trade. For a given price-impact function, the execution cost problem dealsEXECUTION COSTS IN FINANCIAL MARKETS WITH SEVERAL INSTITUTIONAL INVESTORS Somayeh Moazeni, Yuying trade large volumes face a price impact that depends on their trading volumes simul- taneously

  11. Disposable remote zero headspace extractor

    DOE Patents [OSTI]

    Hand, Julie J. (Idaho Falls, ID); Roberts, Mark P. (Arco, ID)

    2006-03-21T23:59:59.000Z

    The remote zero headspace extractor uses a sampling container inside a stainless steel vessel to perform toxicity characteristics leaching procedure to analyze volatile organic compounds. The system uses an in line filter for ease of replacement. This eliminates cleaning and disassembly of the extractor. All connections are made with quick connect fittings which can be easily replaced. After use, the bag can be removed and disposed of, and a new sampling container is inserted for the next extraction.

  12. Remote Sensing R. E. Mcintosh

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote Access

  13. Mission Need Statement for the Idaho National Laboratory Remote-Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Lisa Harvego

    2009-06-01T23:59:59.000Z

    The Idaho National Laboratory proposes to establish replacement remote-handled low-level waste disposal capability to meet Nuclear Energy and Naval Reactors mission-critical, remote-handled low-level waste disposal needs beyond planned cessation of existing disposal capability at the end of Fiscal Year 2015. Remote-handled low-level waste is generated from nuclear programs conducted at the Idaho National Laboratory, including spent nuclear fuel handling and operations at the Naval Reactors Facility and operations at the Advanced Test Reactor. Remote-handled low-level waste also will be generated by new programs and from segregation and treatment (as necessary) of remote-handled scrap and waste currently stored in the Radioactive Scrap and Waste Facility at the Materials and Fuels Complex. Replacement disposal capability must be in place by Fiscal Year 2016 to support uninterrupted Idaho operations. This mission need statement provides the basis for the laboratory’s recommendation to the Department of Energy to proceed with establishing the replacement remote-handled low-level waste disposal capability, project assumptions and constraints, and preliminary cost and schedule information for developing the proposed capability. Without continued remote-handled low-level waste disposal capability, Department of Energy missions at the Idaho National Laboratory would be jeopardized, including operations at the Naval Reactors Facility that are critical to effective execution of the Naval Nuclear Propulsion Program and national security. Remote-handled low-level waste disposal capability is also critical to the Department of Energy’s ability to meet obligations with the State of Idaho.

  14. A Global View Programming Abstraction for Transitioning MPI Codes to PGAS Languages

    SciTech Connect (OSTI)

    Mintz, Tiffany M [ORNL] [ORNL; Hernandez, Oscar R [ORNL] [ORNL; Bernholdt, David E [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    The multicore generation of scientific high performance computing has provided a platform for the realization of Exascale computing, and has also underscored the need for new paradigms in coding parallel applications. The current standard for writing parallel applications requires programmers to use languages designed for sequential execution. These languages have abstractions that only allow programmers to operate on the process centric local view of data. To provide suitable languages for parallel execution, many research efforts have designed languages based on the Partitioned Global Address Space (PGAS) programming model. Chapel is one of the more recent languages to be developed using this model. Chapel supports multithreaded execution with high-level abstractions for parallelism. With Chapel in mind, we have developed a set of directives that serve as intermediate expressions for transitioning scientific applications from languages designed for sequential execution to PGAS languages like Chapel that are being developed with parallelism in mind.

  15. Use of remote sensing data to enhance the performance of a hydrodynamic simulation of a partially frozen power plant

    E-Print Network [OSTI]

    Salvaggio, Carl

    , USA b Savannah River National Laboratory, Aiken, South Carolina, USA c Rochester Institute. INTRODUCTION The ALGE code is a hydrodynamic model developed by Savannah River National Laboratory (SRNL of Technology, Center for Imaging Science, Digital Imaging and Remote Sensing Laboratory, Rochester, New York

  16. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  17. V-075: EMC AlphaStor Command Injection and Format String Flaws...

    Broader source: Energy.gov (indexed) [DOE]

    5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

  18. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    SciTech Connect (OSTI)

    kelkar, sharad

    2013-04-30T23:59:59.000Z

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  19. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    kelkar, sharad

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  20. Mechanical code comparator

    DOE Patents [OSTI]

    Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

    2002-01-01T23:59:59.000Z

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  1. Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner

    E-Print Network [OSTI]

    Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner Finance (FO-P's). Implementation of the Index has greatly decreased data entry coding ­ Account (object) - Program (FOAP) code numbers on any of your accounting forms (Contracts, Purchase Orders

  2. TESLA Technical Design Report Executive Summary

    E-Print Network [OSTI]

    TESLA Technical Design Report PART I Executive Summary March 2001 Editors: F.Richard, J.R.Schneider, D.Trines, A.Wagner #12;#12;Dedicated to the memory of Bjørn H. Wiik (1937-1999) #12;#12;TESLA ­ A Summary This report describes the scientific aims and potential as well as the technical de- sign of TESLA

  3. Sandia National Laboratories: Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Codes Solar Thermochemical Hydrogen Production On June 13, 2014, in SNL maintains the equipment, experts, and partnerships required to develop technology for solar thermochemical...

  4. Tokamak Systems Code

    SciTech Connect (OSTI)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01T23:59:59.000Z

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  5. Graph Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Salman Beigi; Isaac Chuang; Markus Grassl; Peter Shor; Bei Zeng

    2010-02-03T23:59:59.000Z

    Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code, and every codeword stabilized code can be described by a graph and a classical code. For the construction of good quantum codes of relatively large block length, concatenated quantum codes and their generalizations play an important role. We develop a systematic method for constructing concatenated quantum codes based on "graph concatenation", where graphs representing the inner and outer codes are concatenated via a simple graph operation called "generalized local complementation." Our method applies to both binary and non-binary concatenated quantum codes as well as their generalizations.

  6. Remote State Preparation for Quantum Fields

    E-Print Network [OSTI]

    Ran Ber; Erez Zohar

    2015-01-07T23:59:59.000Z

    Remote state preparation is generation of a desired state by a remote observer. In spite of causality, it is well known, according to the Reeh-Schlieder theorem, that it is possible for relativistic quantum field theories, and a "physical" process achieving this task, involving superoscillatory functions, has recently been introduced. In this work we deal with non-relativistic fields, and show that remote state preparation is also possible for them, hence generalizing the Reeh-Schlieder theorem.

  7. Remote Sensing Ayman F. Habib Image Registration & Rectification

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 5 Image Registration & Rectification #12;Remote Sensing: Resampling techniques. #12;Remote Sensing Ayman F. Habib 3 Image Registration #12;Remote Sensing Ayman F be integrated/fused. Object Space Left Image Right Image Image Registration: Objective #12;Remote Sensing Ayman

  8. Remote Sensing Ayman F. Habib Image Registration & Rectification

    E-Print Network [OSTI]

    Habib, Ayman

    1 Remote Sensing Ayman F. Habib 1 Chapter 5 Image Registration & Rectification Remote Sensing Ayman: Resampling techniques. #12;2 Remote Sensing Ayman F. Habib 3 Image Registration Remote Sensing Ayman F. Habib be integrated/fused. Object Space Left Image Right Image Image Registration: Objective #12;3 Remote Sensing

  9. Remote Sensing Ayman F. Habib Data Acquisition Systems

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 3 Data Acquisition Systems #12;Remote Sensing Ayman F. ­ Electro-mechanical scanners. #12;Remote Sensing Ayman F. Habib 3 Overview · LIDAR operational principles for recognition and classification purposes. #12;Remote Sensing Ayman F. Habib 4 Remote Sensing Systems Utilized

  10. Sandia National Laboratories: remote sensing devices

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    remote sensing devices Sandia, Endicott Interconnect Technologies, EMCORE, International Micro Industries, NREL, Universal Instruments: Solar Glitter On March 21, 2013, in...

  11. Remote Sens. 2013, 5, 5969-5998; doi:10.3390/rs5115969 Remote Sensing

    E-Print Network [OSTI]

    Crawford, Ian

    Remote Sens. 2013, 5, 5969-5998; doi:10.3390/rs5115969 Remote Sensing ISSN 2072-4292 www, the technique presented in this paper would help them to quantify the impacts of OPEN ACCESS #12;Remote Sens; urban heat island effect; NDVI; artificial neural network; Markov chain; Dhaka 1. Introduction Urban

  12. Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing

    E-Print Network [OSTI]

    Stephens, Scott L.

    Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing ISSN 2072-4292 www for a geosynchronous OPEN ACCESS #12;Remote Sens. 2013, 5 5174 satellite with modern imaging detectors, software, and algorithms able to detect heat from early and small fires, and yield minute-scale detection times. Keywords

  13. Remote Sens. 2013, 5, 1484-1497; doi:10.3390/rs5031484 Remote Sensing

    E-Print Network [OSTI]

    Myneni, Ranga B.

    Remote Sens. 2013, 5, 1484-1497; doi:10.3390/rs5031484 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal and the Community Land Model version 4 (CLM4), we investigated percent changes and controlling factors of global vegetation growth for the period 1982 to 2009. Over that 28-year period, both the remote-sensing estimate

  14. Remote Sens. 2013, 5, 2857-2882; doi:10.3390/rs5062857 Remote Sensing

    E-Print Network [OSTI]

    Myneni, Ranga B.

    Remote Sens. 2013, 5, 2857-2882; doi:10.3390/rs5062857 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Evaluation of CLM4 Solar Radiation Partitioning Scheme Using Remote Sensing and Site Level FPAR.e., that of the Community Land Model version 4 (CLM4) with coupled carbon and nitrogen cycles. Taking advantage of a unique

  15. CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of

    E-Print Network [OSTI]

    Gilbes, Fernando

    - and middle-infrared regions, water bodies appear very dark even black becausebodies appear very dark, even and pure and contains little suspended sediment or organic matter. Water Penetration Cozumel Island1 CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of WaterWaterWaterWater REFERENCE: Remote

  16. Remote imaging of concealed objects

    SciTech Connect (OSTI)

    Lev, Aner, E-mail: lev@soreq.gov.il; Sfez, Bruno, E-mail: lev@soreq.gov.il [Soreq NRC, Yavne, 81800 (Israel)

    2014-05-27T23:59:59.000Z

    Optical detection of objects hidden behind opaque screening layers is a challenging problem. We demonstrate an optically detected echographic-like method that combines collimated acoustic and laser beams. The acoustic waves cross the screening layers and their back-reflection from the hidden objects is detected through the analysis of a dynamic laser speckle pattern created at the outer surface of the screening layer. Real-time remote detection of moving targets 15 meters away, with a few mm resolutions is demonstrated using a very sensitive camera detection scheme.

  17. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote Access Ames Laboratory

  18. Reed-Muller Codes: Spherically-Punctured Codes and Decoding Algorithms

    E-Print Network [OSTI]

    Kapralova, Olga

    2013-01-01T23:59:59.000Z

    Linear codes . . . . . . . . . . . . . . . . . . . . . . .3.3 Code parameters . . . . . . . . . . . . . .of linear codes . . . . . . . . . . . . 1.5 Reed-Muller

  19. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

  20. User Guide Remote Workplace to VDI Using RSA | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide Remote Workplace to VDI Using RSA User Guide Remote Workplace to VDI Using RSA Last updated on March 17, 2015 This document provides instructions for logging onto Remote...

  1. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, Albert (Santa Fe, NM); Swift, Gregory W. (Los Alamos, NM); Garrett, Steven L. (Pebble Beach, CA)

    1986-01-01T23:59:59.000Z

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  2. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, A.; Swift, G.W.; Garrett, S.L.

    1985-04-30T23:59:59.000Z

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  3. Universal space-time codes from demultiplexed trellis codes

    E-Print Network [OSTI]

    Kose, Cenk; Wesel, R D

    2006-01-01T23:59:59.000Z

    and A. R. Calderbank, “Space-time codes for high data ratePerformance criteria and code construction,” IEEE Trans.of space–time trellis codes,” IEEE Trans. Commun. , vol. 51,

  4. Relation Between Surface Codes and Hypermap-Homology Quantum Codes

    E-Print Network [OSTI]

    Pradeep Sarvepalli

    2014-03-14T23:59:59.000Z

    Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.

  5. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect (OSTI)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29T23:59:59.000Z

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  6. Report number codes

    SciTech Connect (OSTI)

    Nelson, R.N. (ed.)

    1985-05-01T23:59:59.000Z

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  7. Executive Committee meeting | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic Plan Departmentof1-SCORECARD-09-21-11AprilWednesday,TechnologyExecutive

  8. Tribal Roundable Executive Summary | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfact sheetTransferringInc. |ofofDepartmentExecutive

  9. Other Executive Positions | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTest andOptimize carbon AboutOrganizing|Executive

  10. NREL: Energy Executive Leadership Academy - Leadership Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Saleshttp://www.fnal.gov/directorate/nalcal/nalcal02_07_05_files/nalcal.gifNRELPowerNewsletterAcademy Alumni Executive

  11. Executive Positions | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /EmailMolecular Solids | MIT-HarvardExecutive

  12. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A.; Smith, Brian E.

    2013-01-29T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  13. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-25T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  14. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-18T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  15. Quantum stabilizer codes and beyond

    E-Print Network [OSTI]

    Pradeep Kiran Sarvepalli

    2008-10-14T23:59:59.000Z

    The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. This dissertation makes a threefold contribution to the mathematical theory of quantum error-correcting codes. Firstly, it extends the framework of an important class of quantum codes -- nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work establishes a close link between subsystem codes and classical codes showing that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels.

  16. The role of executive capital and the market for alternative candidates in CEO dismissal and labor market consequences for dismissed chief executives

    E-Print Network [OSTI]

    Schepker, Donald Joseph

    2012-08-31T23:59:59.000Z

    ......................................................... 41 Firm Performance and Executive Dismissal...................................................... 42 The Interaction of Performance and Executive Dismissal.......................... 42 The Interaction of Performance and the Managerial Labor...

  17. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

  18. automated remote plant: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Siegel, Mel 15 Use of remote sensing data to enhance the performance of a hydrodynamic simulation of a partially frozen power plant Engineering Websites Summary: Use of remote...

  19. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  20. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

  1. availiable remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote SensingThermal Infrared Remote Sensing Thermal infrared) and thermal infrared energy (3.0 - 14 m). However, thermal infrared sensors allow humans to sense 2 Thermal...

  2. atmospheric remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrared Remote SensingThermal Infrared Remote Sensing Thermal infrared) and thermal infrared energy (3.0 - 14 m). However, thermal infrared sensors allow humans to...

  3. aerospace remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote SensingThermal Infrared Remote Sensing Thermal infrared) and thermal infrared energy (3.0 - 14 m). However, thermal infrared sensors allow humans to sense 2 Thermal...

  4. Rateless Codes for AVC Models

    E-Print Network [OSTI]

    Sarwate, A D; Gastpar, M

    2010-01-01T23:59:59.000Z

    2004. [7] M. Luby, “LT codes,” in Proc. 43rd Ann. IEEE Symp.8] A. Shokrollahi, “Fountain codes,” in Proc. 41st AllertonChannel capacities for list codes,” J. Appl. Probabil. ,

  5. Unequal Error Protection Turbo Codes

    E-Print Network [OSTI]

    Henkel, Werner

    Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure

  6. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Office of Environmental Management (EM)

    have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM:...

  7. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  8. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities | Department of

  9. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe| Department

  10. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWith theirabout

  11. Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes

    E-Print Network [OSTI]

    Dave Bacon; Andrea Casaccino

    2006-10-17T23:59:59.000Z

    The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.

  12. Optimal Execution Under Jump Models For Uncertain Price Impact

    E-Print Network [OSTI]

    2012-08-13T23:59:59.000Z

    May 12, 2011 ... Unfortunately current quantitative analysis of the execution cost ... Thus risk assessment under this model, particularly the tail risk, is likely to be ...

  13. OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental...

    Broader source: Energy.gov (indexed) [DOE]

    OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance More Documents & Publications Microsoft PowerPoint - 08 Lawrence 2010 DOE PM...

  14. Executive Order 13148-Greening the Government Through Leadership...

    Energy Savers [EERE]

    148-Greening the Government Through Leadership in Environmental Management Executive Order 13148-Greening the Government Through Leadership in Environmental Management The head of...

  15. Implementation of Executive Order 13514, Federal Leadership in...

    Broader source: Energy.gov (indexed) [DOE]

    goal.pdf More Documents & Publications OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance FY 2012 Highlighted Sustainable...

  16. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    SciTech Connect (OSTI)

    Haase, S.

    2009-11-01T23:59:59.000Z

    This executive summary provides an overview of an NREL assessment to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region around Greensburg, Kansas.

  17. accelerator executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 163 Executive...

  18. astronomy executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 163 Executive...

  19. abstract executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 165 Executive...

  20. assessment program executive: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

  1. Written Testimony of Wes Kelley Executive Director Columbia Power...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Testimony of Wes Kelley Executive Director Columbia Power & Water Systems Columbia, Tennessee Before the Department of Energy, Quadrennial Energy Review Public Meeting 10:...

  2. No Code: Null Programs

    E-Print Network [OSTI]

    Montfort, Nick

    2014-06-05T23:59:59.000Z

    To continue the productive discussion of uninscribed artworks in Craig Dworkin’s No Medium, this report discusses, in detail, those computer programs that have no code, and are thus empty or null. Several specific examples ...

  3. Climate Code Foundation

    E-Print Network [OSTI]

    Barnes, Nick; Jones, David

    2011-07-05T23:59:59.000Z

    Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    Authority for adopting the state energy codes was previously vested in the Energy Security Office of the Department of Commerce (originally the Department of Public Services). In 1999-2000, the...

  5. Quantum error control codes

    E-Print Network [OSTI]

    Abdelhamid Awad Aly Ahmed, Sala

    2008-10-10T23:59:59.000Z

    QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

  6. Nested Quantum Error Correction Codes

    E-Print Network [OSTI]

    Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

    2009-09-28T23:59:59.000Z

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  7. Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary

    E-Print Network [OSTI]

    Sason, Igal

    Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary Erasure Channel Capacity@ee.technion.ac.il Abstract The paper introduces ensembles of accumulate-repeat-accumulate (ARA) codes which asymp- totically by the first capacity-achieving ensembles of ir- regular repeat-accumulate (IRA) codes with bounded complexity

  8. Code: A Lightweight and Flexible Mobile Code Toolkit

    E-Print Network [OSTI]

    Picco, Gian Pietro

    evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of client­server and mobile code in reducing the network traffic generated by management. The theoreticalŻCode: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e

  9. A Fault-Oblivious Extreme-Scale Execution Environment (FOX)

    SciTech Connect (OSTI)

    Van Hensbergen, Eric; Speight, William; Xenidis, Jimi

    2013-03-15T23:59:59.000Z

    IBM Research’s contribution to the Fault Oblivious Extreme-scale Execution Environment (FOX) revolved around three core research deliverables: ? collaboration with Boston University around the Kittyhawk cloud infrastructure which both enabled a development and deployment platform for the project team and provided a fault-injection testbed to evaluate prototypes ? operating systems research focused on exploring role-based operating system technologies through collaboration with Sandia National Labs on the NIX research operating system and collaboration with the broader IBM Research community around a hybrid operating system model which became known as FusedOS ? IBM Research also participated in an advisory capacity with the Boston University SESA project, the core of which was derived from the K42 operating system research project funded in part by DARPA’s HPCS program. Both of these contributions were built on a foundation of previous operating systems research funding by the Department of Energy’s FastOS Program. Through the course of the X-stack funding we were able to develop prototypes, deploy them on production clusters at scale, and make them available to other researchers. As newer hardware, in the form of BlueGene/Q, came online, we were able to port the prototypes to the new hardware and release the source code for the resulting prototypes as open source to the community. In addition to the open source coded for the Kittyhawk and NIX prototypes, we were able to bring the BlueGene/Q Linux patches up to a more recent kernel and contribute them for inclusion by the broader Linux community. The lasting impact of the IBM Research work on FOX can be seen in its effect on the shift of IBM’s approach to HPC operating systems from Linux and Compute Node Kernels to role-based approaches as prototyped by the NIX and FusedOS work. This impact can be seen beyond IBM in follow-on ideas being incorporated into the proposals for the Exasacale Operating Systems/Runtime program.

  10. Method for remote detection of trace contaminants

    DOE Patents [OSTI]

    Simonson, Robert J.; Hance, Bradley G.

    2003-09-09T23:59:59.000Z

    A method for remote detection of trace contaminants in a target area comprises applying sensor particles that preconcentrate the trace contaminant to the target area and detecting the contaminant-sensitive fluorescence from the sensor particles. The sensor particles can have contaminant-sensitive and contaminant-insensitive fluorescent compounds to enable the determination of the amount of trace contaminant present in the target are by relative comparison of the emission of the fluorescent compounds by a local or remote fluorescence detector. The method can be used to remotely detect buried minefields.

  11. Heating remote rooms in passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1981-01-01T23:59:59.000Z

    Remote rooms can be effectively heated by convection through a connecting doorway. A simple steady-state equation is developed for design purposes. Validation of a dynamic model is achieved using data obtained over a 13-day period. Dynamic effects are investigated using a simulation analysis for three different cases of driving temperature; the effect is to reduce the temperature difference between the driving room and the remote room compared to the steady-state model. For large temperature swings in the driving room a strategy which uses the intervening door in a diode mode is effective. The importance of heat-storing mass in the remote room is investigated.

  12. Method of remote powering and detecting multiple UWB passive tags in an RFID system

    DOE Patents [OSTI]

    Dowla, Farid U. (Castro Valley, CA); Nekoogar, Faranak (San Ramon, CA); Benzel, David M. (Livermore, CA); Dallum, Gregory E. (Livermore, CA); Spiridon, Alex (Palo Alto, CA)

    2012-05-29T23:59:59.000Z

    A new Radio Frequency Identification (RFID), tracking, powering apparatus/system and method using coded Ultra-wideband (UWB) signaling is introduced. The proposed hardware and techniques disclosed herein utilize a plurality of passive UWB transponders in a field of an RFID-radar system. The radar system itself enables multiple passive tags to be remotely powered (activated) at about the same time frame via predetermined frequency UWB pulsed formats. Once such tags are in an activated state, an UWB radar transmits specific "interrogating codes" to put predetermined tags in an awakened status. Such predetermined tags can then communicate by a unique "response code" so as to be detected by an UWB system using radar methods.

  13. NARSTO Quality Planning and Data Management Handbooks Executive Summary

    E-Print Network [OSTI]

    'existingqualityassuranceprograms. The first of the three documents, the NARSTO Quality Systems Management Plan (QSMP), is the umbrella underNARSTO Quality Planning and Data Management Handbooks Executive Summary This brief Executive, and guidance documents for quality planning and data management. NARSTO is a non-binding, tri-national public

  14. SPACE UTILIZATION STUDY -EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES

    E-Print Network [OSTI]

    Delene, David J.

    SPACE UTILIZATION STUDY - EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES UNIVERSITY School of Medicine & Health Sciences - Space Utilization Study Grand Forks, ND EXECUTIVE SUMMARY SUITAb of Medicine and Health Sciences. It currently contains nearly 380,000 GSF (Gross Square Feet) with multiple

  15. 11/24/13 Committee Reports Executive Report

    E-Print Network [OSTI]

    Royer, Dana

    Trexler `14 Executive Committee 1. General Assembly Feedback 2. PostThanksgiving Executive Committee, indeed, create that kind of statement. Presumably, WesDivest will be directing their energies towards to President Roth for residential campus innovations. Many of the proposals discussed on Thursday concerned

  16. Executability of Scenarios in Petri Nets Robert Lorenz

    E-Print Network [OSTI]

    Desel, Jörg

    Executability of Scenarios in Petri Nets Robert Lorenz Lehrstuhl f¨ur Angewandte Informatik whether a scenario is an execution of a Petri net. This holds for a wide variety of Petri net classes, ranging from elementary nets to general inhibitor nets. Scenarios are given by causal structures

  17. Executive Budget Support Team Office of the President

    E-Print Network [OSTI]

    Jacobs, Laurence J.

    Executive Budget Support Team Office of the President Provost / Executive Vice President Institute Budget Planning & Admin. Jim Kirk Asst Budget Director Vacant Sr. Budget Analyst Ebony Thompson Budget Development & Capital Budgets Director Lisa Godfrey Systems Support Engr II Vacant Sr. Budget

  18. Towards a New Execution Model for HPC Clouds Thomas Sterling

    E-Print Network [OSTI]

    Lumsdaine, Andrew

    Towards a New Execution Model for HPC Clouds Thomas Sterling Center for Research in Extreme Scale an alternative paradigm for bringing Clouds more closely aligned to Science, Technology, Engineering Execution Model for HPC Clouds Thomas Sterling 1. Introduction Even as HPC is transiting the pan

  19. Robert D. Kimble Deputy Program Executive Officer for Strike

    E-Print Network [OSTI]

    and Deputy Program Manager for Production and Quality. From January 2000 to February 2001, Mr. Kimble of Maryland. He graduated from the Defense Systems Management College and the Senior Executive ManagementRobert D. Kimble Deputy Program Executive Officer for Strike Weapons, PEO(U&W) Naval Air Systems

  20. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  1. Can remote sensing of land cover improve species distribution modelling?

    E-Print Network [OSTI]

    Bradley, Bethany

    COMMENTARY Can remote sensing of land cover improve species distribution modelling? Remote sensing- guish among broad classes of vegetation. However, the applicability of remote sensing to classification like from remote sensing ­ a map of tree species ­ and what can be delivered ­ a map of forest types

  2. applied remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Thermal Infrared Remote Sensing Thermal Infrared Remote Sensing 12;0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4 Infrared Remote SensingThermal Infrared Remote SensingThermal Infrared...

  3. Coccinelle 1D: A one-dimensional neutron kinetic code using time-step size control

    SciTech Connect (OSTI)

    Engrand, P.R.; Effantin, M.E.; Gherchanoc, J. [Electricite de France, Clamart (France); Larive, B. [Electricite de France, Villeurbanne (France)

    1995-12-31T23:59:59.000Z

    COCCINELLE 1D is a one-dimensional neutron kinetic code that has been adapted from Electricite de France (EDF)`s core design code : COCCINELLE. The aim of this work is to integrate a code, derived from COCCINELLE and therefore taking advantage of most of its developments, into EDF`s Pressurized Water Reactors (PWR) simulation tools. The neutronic model of COCCINELLE ID has been optimized so that the code executes as rapidly as possible. In particular, a fast and stable kinetic method has been implemented: the Generalized Runge-Kutta (GRK) method together with its associated time-step size control. Moreover, efforts have been made to structure the code such that it could be easily integrated into any PWR simulation tool. Results show that the code executes at a rate faster than real-time on several test cases, and that, once integrated in a PWR simulation tool, the system is in good agreement with an experimental transient, that is a 3-hour load follow transient.

  4. User Guide Remote PIV to VDI Using ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Click here to view certificate properties. Select the Detail tab. U. S. Department of Energy | Remote PIV to VDI Using a PIV Card 7 a. Select Enhanced Key Usage to display the...

  5. The Remote distractor effect in manual responses 

    E-Print Network [OSTI]

    Ricketts, Katie

    2006-01-01T23:59:59.000Z

    The remote distracter effect (RDE) has previously only been studied in relation to the saccadic system. Given the hypothesis of the premotor theory (Rizzolatti et al, 1987) that a covert shift of attention is a programmed ...

  6. MHD Generation Code

    E-Print Network [OSTI]

    Frutos-Alfaro, Francisco

    2015-01-01T23:59:59.000Z

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  7. Remote sensing, imaging, and signal engineering

    SciTech Connect (OSTI)

    Brase, J.M.

    1993-03-01T23:59:59.000Z

    This report discusses the Remote Sensing, Imaging, and Signal Engineering (RISE) trust area which has been very active in working to define new directions. Signal and image processing have always been important support for existing programs at Lawrence Livermore National Laboratory (LLNL), but now these technologies are becoming central to the formation of new programs. Exciting new applications such as high-resolution telescopes, radar remote sensing, and advanced medical imaging are allowing us to participate in the development of new programs.

  8. REMOTE OPERATION PATTERN Class Structural Enable clients to invoke operations on remote objects as if they were local. This pattern

    E-Print Network [OSTI]

    Keller, Rudolf K.

    1 / 7 REMOTE OPERATION PATTERN Class Structural Intent Enable clients to invoke operations on remote objects as if they were local. This pattern decouples the client from the network calls needed to access the remote object. Also Known As Remote Procedure Call Motivation This pattern applies

  9. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, M.A.

    1992-11-10T23:59:59.000Z

    A fiber optically isolated and remotely stabilized data transmission systems described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber. 3 figs.

  10. Cyclic simplex coded OTDR SNR enhancement of coded optical time domain reflectometry using cyclic simplex codes

    E-Print Network [OSTI]

    Park, Namkyoo

    Cyclic simplex coded OTDR SNR enhancement of coded optical time domain reflectometry using cyclic simplex codes *, , , e-mail : nkpark@plaza.snu.ac.kr Abstract: We propose and experimentally demonstrate the performance improvement of a coded optical time domain reflectometry using cyclic simplex

  11. Remotely releasable template and dome

    SciTech Connect (OSTI)

    Allen, G.G. Jr.

    1986-12-02T23:59:59.000Z

    This patent describes a remotely releasable template assembly for precision placement of a template of the type having at least one sleeve member for placing about a well casing stub extending from the sea floor, comprising: mating means mounted with the template for demountably coupling the template to a complementary end of a drill string extending from a support structure located above the well casing stub. The mating means is positioned near the template assembly center of balance when the template assembly is demountably coupled to the drill string; the vertical axis of the drill string being essentially parallel to the longitudinal axis of the sleeve member when the drill string is demountably couple to the template assembly; the end of the drill string includes a gyroscopic orientation means for detecting the deviation of the template from a desired bearing; and the mating means maintains the template semi-ridgidly coupled to the drill string until the template is controllably released from the drill string; whereby the rotation of the drill string about the vertical axis of the drill string rotates the template assembly into the desired orientation.

  12. Extended quantum color coding

    SciTech Connect (OSTI)

    Hayashi, A.; Hashimoto, T.; Horibe, M. [Department of Applied Physics, Fukui University, Fukui 910-8507 (Japan)

    2005-01-01T23:59:59.000Z

    The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only {approx}2{radical}(N) quantum colors to order N objects in large N limit, whereas {approx}N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix.

  13. CONCEPT computer code

    SciTech Connect (OSTI)

    Delene, J.

    1984-01-01T23:59:59.000Z

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated.

  14. Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about Uncertainty

    E-Print Network [OSTI]

    McGregor, Andrew

    Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about: April 29, 2014 #12;Coding for Transmission Coding for Compression Bonus Section Information Theory. #12;Coding for Transmission Coding for Compression Bonus Section Encoding Messages with Redundancy

  15. 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview...

    Energy Savers [EERE]

    1: Executive Summary and Overview Summary Slides 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview Summary Slides Summary and overview slides for 20% Wind Energy...

  16. Course Code: Course Title

    E-Print Network [OSTI]

    Painter, Kevin

    - Frameworks; Decision Making Development life-cycle of a software system Bi-directional influence between-Critical Systems; Technology & Society. Brave New Worlds - Co-operative Computing; eLife. Learning OutcomesCourse Code: F29PD Course Title: Professional Development Course Co-ordinator: Sandy Jean

  17. The Woodland Carbon Code

    E-Print Network [OSTI]

    The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

  18. Chaotic Turbo Codes

    E-Print Network [OSTI]

    S. Adrian Barbulescu; Andrew Guidi; Steven S. Pietrobon

    This paper describes a new class of codes, chaotic turbo codes. They were born from a symbiosis between a chaotical digital encoder and a turbo code. This paper investigates the most important properties of both chaotic digital encoders and turbo encoders in order to understand how the two complement each other. A Chaotic Turbo Encoder is then described and initial results will be presented. I. INTRODUCTION A chaotic digital encoder was defined for the first time in [1] as a non--linear digital filter with finite precision (8 bits) which behaves in a quasi--chaotic fashion, both with zero and nonzero input sequences. A simple chaotic encoder is shown in Figure 1 [1]. D Y k X k LCIRC D Figure 1: Chaotic Digital Encoder Mapper L L L L L L 1 The main features of chaotic digital encoders that are used in this paper are: # The system is digital which makes possible its integration with a turbo code. # The output of a chaotic digital encoder with arbitrary inputs has a broad...

  19. 2007 Urban Remote Sensing Joint Event Application of satellite Remote Sensing for Urban

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    2007 Urban Remote Sensing Joint Event Application of satellite Remote Sensing for Urban Risk Analysis: a case study of the 2003 extreme heat wave in Paris Bénédicte Dousset Hawaii Institute@ogs.trieste.it Abstract ­ Satellite observations are used to monitor the August 2003 heat wave in Paris

  20. Medical Remote Monitoring using sound environment analysis and wearable sensors 1 Medical Remote Monitoring using sound

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Medical Remote Monitoring using sound environment analysis and wearable sensors 1 X Medical Remote Monitoring using sound environment analysis and wearable sensors Dan Istrate1, Jérôme Boudy2, Hamid Medjahed1. In Europe, for example, the life expectancy for men is about 71 years and for women about 79 years

  1. REMOTE LABORATORIES IN AUTOMATION: AIP-PRIMECA RAO ARI PLATFORM Remote Laboratories in Automation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    for thorough trainings in industrial We thank our sponsors : Schneider Electric which provided the automationREMOTE LABORATORIES IN AUTOMATION: AIP-PRIMECA RAO ARI PLATFORM Remote Laboratories in Automation of resources and competencies about industrial topics for many universities in Rhône-Alpes french Region. Due

  2. Erasure Techniques in MRD codes

    E-Print Network [OSTI]

    W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

    2012-05-03T23:59:59.000Z

    This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

  3. Optimized Generation of Data-Path from C Codes for FPGAs

    E-Print Network [OSTI]

    Guo, Zhi; Najjar, Walid; Vissers, Kees

    2011-01-01T23:59:59.000Z

    FPGAs, as computing devices, offer significant speedup over microprocessors. Furthermore, their configurability offers an advantage over traditional ASICs. However, they do not yet enjoy high-level language programmability, as microprocessors do. This has become the main obstacle for their wider acceptance by application designers. ROCCC is a compiler designed to generate circuits from C source code to execute on FPGAs, more specifically on CSoCs. It generates RTL level HDLs from frequently executing kernels in an application. In this paper, we describe ROCCC's system overview and focus on its data path generation. We compare the performance of ROCCC-generated VHDL code with that of Xilinx IPs. The synthesis result shows that ROCCC-generated circuit takes around 2x ~ 3x area and runs at comparable clock rate.

  4. REDUCED-COMPLEXITY DECODING FOR CONCATENATED CODES BASED ON RECTANGULAR PARITY-CHECK CODES AND TURBO CODES

    E-Print Network [OSTI]

    Wong, Tan F.

    AND TURBO CODES John M. Shea and Tan F. Wong University of Florida Department of Electrical and Computer-check code (RPCC) with a turbo code. These concatenated codes are referred to as RPCC+turbo codes. RPCC+turbo codes have been shown to significantly outperform turbo codes in several scenarios [1],[2]. One

  5. Advanced transport codes for nuclear thermal rocket analysis

    SciTech Connect (OSTI)

    Perry, R.T.; Buksa, J.J.; Houts, M.G. (Los Alamos National Lab., NM (United States))

    1992-01-01T23:59:59.000Z

    Nuclear thermal rocket (NTR) propulsion systems will enable the manned exploration of our solar system. In the context of current and future safety standards and environmental constraints, the likelihood of any large nuclear engine testing program similar in scope to the ROVER/NERVA program is remote. Consequently, extensive computational verification of the safety, reliability, and performance of the reactor and spacecraft will be required. Fortunately, the development of new codes coupled with computer hardware advances will make this feasible and cost-effective. Although coupled-phenomena and separate-effects modeling at the component and system levels will be necessary, this paper addresses only radiation transport modeling of NTR systems and reviews the status and applicability of several codes that Los Alamos National Laboratory (LANL) is using.

  6. NREL: Energy Executive Leadership Academy Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster ToStaff Webmaster

  7. John Hairston rounds out BPA's executive office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as Ready for(SC) Jetting

  8. Coded modulation with Low Density Parity Check codes

    E-Print Network [OSTI]

    Narayanaswami, Ravi

    2001-01-01T23:59:59.000Z

    This thesis proposes the design of Low Density Parity Check (LDPC) codes for cases where coded modulation is used. We design these codes by extending the idea of Density Evolution (DE) that has been introduced as a powerful tool to analyze LDPC...

  9. Generating Code for High-Level Operations through Code Composition

    E-Print Network [OSTI]

    Generating Code for High-Level Operations through Code Composition James M. Stichnoth August 1997 of the authors and should not be interpreted as necessarily representing the official policies or endorsements: Compilers, code generation, parallelism, communication generation #12;Abstract A traditional compiler

  10. Multiclass learning with simplex coding

    E-Print Network [OSTI]

    Mroueh, Youssef

    In this paper we discuss a novel framework for multiclass learning, defined by a suitable coding/decoding strategy, namely the simplex coding, that allows us to generalize to multiple classes a relaxation approach commonly ...

  11. Distributed control of coded networks

    E-Print Network [OSTI]

    Zhao, Fang, Ph. D. Massachusetts Institute of Technology

    2010-01-01T23:59:59.000Z

    The introduction of network coding has the potential to revolutionize the way people operate networks. For the benefits of network coding to be realized, distributed solutions are needed for various network problems. In ...

  12. Nevada Energy Code for Buildings

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  13. Confocal coded aperture imaging

    DOE Patents [OSTI]

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01T23:59:59.000Z

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  14. Understanding the Team Dynamics of an Executive Virtual Team

    E-Print Network [OSTI]

    Riley, Ramona Leonard

    2011-10-21T23:59:59.000Z

    employ virtuality in their work regimen. Therefore, organizations employ virtual executives to work teams with ideal skill sets to effectively persevere and complete tasks through distance, space, and time. The purpose of this study was to identify...

  15. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE)

    This executive summary provides an overview of a technical report on an assessment NREL conducted in Greensburg, Kansas, to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region.

  16. Robust, goal-directed plan execution with bounded risk

    E-Print Network [OSTI]

    Ono, Masahiro, Ph. D. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For example, a fleet of unmanned aerial vehicles ...

  17. Robust execution of bipedal walking tasks from biomechanical principles

    E-Print Network [OSTI]

    Hofmann, Andreas G. (Andreas Gunther)

    2006-01-01T23:59:59.000Z

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  18. Robust Execution of Bipedal Walking Tasks From Biomechanical Principles

    E-Print Network [OSTI]

    Hofmann, Andreas

    2006-04-28T23:59:59.000Z

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  19. Learning Structured Reactive Navigation Plans from Executing MDP Navigation Policies

    E-Print Network [OSTI]

    Cremers, Daniel

    Learning Structured Reactive Navigation Plans from Executing MDP Navigation Policies Michael Beetz, beetz,belker@cs.uni-bonn.de Abstract. Autonomous robots, such as robot office couriers, need navigation

  20. Paducah CAB Executive Board - May | Department of Energy

    Energy Savers [EERE]

    - May Paducah CAB Executive Board - May May 11, 2015 3:30PM to 5:30PM CDT Paducah CAB Office, 111 Memorial Drive, Paducah, KY 42001 Contact Buz Smith, DOE Site Office 270-441-6821...